Hay
Date
June 23, 2025, 7:07 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   36.189694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   36.404450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   36.313397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   36.572736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   66.380406] ==================================================================
[   66.380504] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   66.380504] 
[   66.380617] Use-after-free read at 0x00000000a1a519f6 (in kfence-#191):
[   66.380679]  test_krealloc+0x51c/0x830
[   66.380741]  kunit_try_run_case+0x170/0x3f0
[   66.380801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.380860]  kthread+0x328/0x630
[   66.380909]  ret_from_fork+0x10/0x20
[   66.380961] 
[   66.380990] kfence-#191: 0x00000000a1a519f6-0x0000000039b9aabb, size=32, cache=kmalloc-32
[   66.380990] 
[   66.381079] allocated by task 349 on cpu 1 at 66.379406s (0.001668s ago):
[   66.381164]  test_alloc+0x29c/0x628
[   66.381218]  test_krealloc+0xc0/0x830
[   66.381268]  kunit_try_run_case+0x170/0x3f0
[   66.381317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.381374]  kthread+0x328/0x630
[   66.381419]  ret_from_fork+0x10/0x20
[   66.381466] 
[   66.381494] freed by task 349 on cpu 1 at 66.379795s (0.001694s ago):
[   66.381568]  krealloc_noprof+0x148/0x360
[   66.381619]  test_krealloc+0x1dc/0x830
[   66.381667]  kunit_try_run_case+0x170/0x3f0
[   66.381718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.381771]  kthread+0x328/0x630
[   66.381815]  ret_from_fork+0x10/0x20
[   66.381864] 
[   66.381916] CPU: 1 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   66.382012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.382084] Hardware name: linux,dummy-virt (DT)
[   66.382131] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   39.200247] ==================================================================
[   39.200443] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   39.200443] 
[   39.200591] Invalid free of 0x00000000ca7e0302 (in kfence-#126):
[   39.200730]  test_double_free+0x1bc/0x238
[   39.200847]  kunit_try_run_case+0x170/0x3f0
[   39.200958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.201087]  kthread+0x328/0x630
[   39.201189]  ret_from_fork+0x10/0x20
[   39.201290] 
[   39.201349] kfence-#126: 0x00000000ca7e0302-0x000000000cb24181, size=32, cache=kmalloc-32
[   39.201349] 
[   39.201474] allocated by task 315 on cpu 0 at 39.198062s (0.003403s ago):
[   39.201618]  test_alloc+0x29c/0x628
[   39.201720]  test_double_free+0xd4/0x238
[   39.201821]  kunit_try_run_case+0x170/0x3f0
[   39.201916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.202020]  kthread+0x328/0x630
[   39.202180]  ret_from_fork+0x10/0x20
[   39.202299] 
[   39.202364] freed by task 315 on cpu 0 at 39.199682s (0.002673s ago):
[   39.202688]  test_double_free+0x1ac/0x238
[   39.202828]  kunit_try_run_case+0x170/0x3f0
[   39.202942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.203195]  kthread+0x328/0x630
[   39.203389]  ret_from_fork+0x10/0x20
[   39.203531] 
[   39.203634] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   39.203904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.204014] Hardware name: linux,dummy-virt (DT)
[   39.204161] ==================================================================
[   39.304794] ==================================================================
[   39.304864] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   39.304864] 
[   39.304934] Invalid free of 0x00000000a8618b22 (in kfence-#127):
[   39.304995]  test_double_free+0x100/0x238
[   39.305104]  kunit_try_run_case+0x170/0x3f0
[   39.305220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.305394]  kthread+0x328/0x630
[   39.305506]  ret_from_fork+0x10/0x20
[   39.305624] 
[   39.305679] kfence-#127: 0x00000000a8618b22-0x0000000060c9e402, size=32, cache=test
[   39.305679] 
[   39.306522] allocated by task 317 on cpu 0 at 39.304205s (0.002285s ago):
[   39.306791]  test_alloc+0x230/0x628
[   39.307528]  test_double_free+0xd4/0x238
[   39.307632]  kunit_try_run_case+0x170/0x3f0
[   39.308269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.308713]  kthread+0x328/0x630
[   39.308808]  ret_from_fork+0x10/0x20
[   39.308901] 
[   39.308956] freed by task 317 on cpu 0 at 39.304325s (0.004623s ago):
[   39.310066]  test_double_free+0xf0/0x238
[   39.310375]  kunit_try_run_case+0x170/0x3f0
[   39.310857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.311296]  kthread+0x328/0x630
[   39.311520]  ret_from_fork+0x10/0x20
[   39.311910] 
[   39.312048] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   39.312704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.313204] Hardware name: linux,dummy-virt (DT)
[   39.313291] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   66.189611] ==================================================================
[   66.189705] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   66.189705] 
[   66.189813] Use-after-free read at 0x000000007d625021 (in kfence-#189):
[   66.189874]  test_memcache_typesafe_by_rcu+0x280/0x560
[   66.189941]  kunit_try_run_case+0x170/0x3f0
[   66.189997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.190134]  kthread+0x328/0x630
[   66.190196]  ret_from_fork+0x10/0x20
[   66.190245] 
[   66.190274] kfence-#189: 0x000000007d625021-0x0000000067006ca6, size=32, cache=test
[   66.190274] 
[   66.190338] allocated by task 347 on cpu 0 at 66.167851s (0.022483s ago):
[   66.190422]  test_alloc+0x230/0x628
[   66.190475]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   66.190529]  kunit_try_run_case+0x170/0x3f0
[   66.190631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.190692]  kthread+0x328/0x630
[   66.190753]  ret_from_fork+0x10/0x20
[   66.190804] 
[   66.190833] freed by task 347 on cpu 0 at 66.168011s (0.022818s ago):
[   66.190906]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   66.190964]  kunit_try_run_case+0x170/0x3f0
[   66.191012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.191100]  kthread+0x328/0x630
[   66.191148]  ret_from_fork+0x10/0x20
[   66.191197] 
[   66.191253] CPU: 0 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   66.191350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.191387] Hardware name: linux,dummy-virt (DT)
[   66.191430] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   45.593389] ==================================================================
[   45.593629] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   45.593629] 
[   45.593841] Invalid read at 0x00000000e65d83af:
[   45.594130]  test_invalid_access+0xdc/0x1f0
[   45.594276]  kunit_try_run_case+0x170/0x3f0
[   45.594412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.594532]  kthread+0x328/0x630
[   45.594659]  ret_from_fork+0x10/0x20
[   45.594803] 
[   45.594916] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   45.595144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.595234] Hardware name: linux,dummy-virt (DT)
[   45.595325] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   45.363494] ==================================================================
[   45.363581] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.363581] 
[   45.363656] Corrupted memory at 0x00000000df0aed74 [ ! . . . . . . . . . . . . . . . ] (in kfence-#185):
[   45.364015]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.364112]  kunit_try_run_case+0x170/0x3f0
[   45.364169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.364224]  kthread+0x328/0x630
[   45.364270]  ret_from_fork+0x10/0x20
[   45.364321] 
[   45.364350] kfence-#185: 0x000000008c50db01-0x000000009d0de778, size=73, cache=kmalloc-96
[   45.364350] 
[   45.364414] allocated by task 337 on cpu 1 at 45.363200s (0.001209s ago):
[   45.364488]  test_alloc+0x29c/0x628
[   45.364541]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   45.364598]  kunit_try_run_case+0x170/0x3f0
[   45.364650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.364705]  kthread+0x328/0x630
[   45.364750]  ret_from_fork+0x10/0x20
[   45.364798] 
[   45.364827] freed by task 337 on cpu 1 at 45.363407s (0.001415s ago):
[   45.364906]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.364962]  kunit_try_run_case+0x170/0x3f0
[   45.365013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.365088]  kthread+0x328/0x630
[   45.365134]  ret_from_fork+0x10/0x20
[   45.365183] 
[   45.365229] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   45.365326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.365363] Hardware name: linux,dummy-virt (DT)
[   45.365403] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   45.259689] ==================================================================
[   45.259824] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   45.259824] 
[   45.259943] Out-of-bounds read at 0x00000000a528ab6f (105B right of kfence-#184):
[   45.260015]  test_kmalloc_aligned_oob_read+0x238/0x468
[   45.260115]  kunit_try_run_case+0x170/0x3f0
[   45.260177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.260231]  kthread+0x328/0x630
[   45.260279]  ret_from_fork+0x10/0x20
[   45.260331] 
[   45.260360] kfence-#184: 0x0000000000ba79a4-0x0000000023382c9c, size=73, cache=kmalloc-96
[   45.260360] 
[   45.260424] allocated by task 335 on cpu 1 at 45.259292s (0.001127s ago):
[   45.260509]  test_alloc+0x29c/0x628
[   45.260562]  test_kmalloc_aligned_oob_read+0x100/0x468
[   45.260615]  kunit_try_run_case+0x170/0x3f0
[   45.260667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.260722]  kthread+0x328/0x630
[   45.260766]  ret_from_fork+0x10/0x20
[   45.260814] 
[   45.260869] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   45.260966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.261002] Hardware name: linux,dummy-virt (DT)
[   45.261062] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   40.156068] ==================================================================
[   40.156212] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   40.156212] 
[   40.156339] Corrupted memory at 0x00000000e7ee4673 [ ! ] (in kfence-#135):
[   40.156684]  test_corruption+0x284/0x378
[   40.157212]  kunit_try_run_case+0x170/0x3f0
[   40.157635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.158129]  kthread+0x328/0x630
[   40.158244]  ret_from_fork+0x10/0x20
[   40.159601] 
[   40.159672] kfence-#135: 0x00000000ba58ed36-0x0000000069adc79a, size=32, cache=kmalloc-32
[   40.159672] 
[   40.159845] allocated by task 323 on cpu 0 at 40.155585s (0.004248s ago):
[   40.160012]  test_alloc+0x29c/0x628
[   40.160202]  test_corruption+0x198/0x378
[   40.160361]  kunit_try_run_case+0x170/0x3f0
[   40.160461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.160567]  kthread+0x328/0x630
[   40.160652]  ret_from_fork+0x10/0x20
[   40.161863] 
[   40.161943] freed by task 323 on cpu 0 at 40.155743s (0.006188s ago):
[   40.162646]  test_corruption+0x284/0x378
[   40.162783]  kunit_try_run_case+0x170/0x3f0
[   40.163496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.163648]  kthread+0x328/0x630
[   40.163939]  ret_from_fork+0x10/0x20
[   40.164072] 
[   40.164474] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   40.165462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.165545] Hardware name: linux,dummy-virt (DT)
[   40.165624] ==================================================================
[   39.837251] ==================================================================
[   39.837395] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   39.837395] 
[   39.837522] Corrupted memory at 0x000000006fd693aa [ ! . . . . . . . . . . . . . . . ] (in kfence-#132):
[   39.839612]  test_corruption+0x278/0x378
[   39.839766]  kunit_try_run_case+0x170/0x3f0
[   39.839980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.840184]  kthread+0x328/0x630
[   39.840299]  ret_from_fork+0x10/0x20
[   39.840488] 
[   39.840567] kfence-#132: 0x000000004d318858-0x00000000cb81aea1, size=32, cache=kmalloc-32
[   39.840567] 
[   39.840885] allocated by task 323 on cpu 0 at 39.836901s (0.003906s ago):
[   39.841343]  test_alloc+0x29c/0x628
[   39.841492]  test_corruption+0xdc/0x378
[   39.841679]  kunit_try_run_case+0x170/0x3f0
[   39.841735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.841807]  kthread+0x328/0x630
[   39.841946]  ret_from_fork+0x10/0x20
[   39.842185] 
[   39.842244] freed by task 323 on cpu 0 at 39.837085s (0.005150s ago):
[   39.842424]  test_corruption+0x278/0x378
[   39.842949]  kunit_try_run_case+0x170/0x3f0
[   39.843272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.843485]  kthread+0x328/0x630
[   39.843594]  ret_from_fork+0x10/0x20
[   39.843913] 
[   39.844176] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   39.844672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.844775] Hardware name: linux,dummy-virt (DT)
[   39.844858] ==================================================================
[   40.261277] ==================================================================
[   40.261418] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   40.261418] 
[   40.261544] Corrupted memory at 0x0000000048c98904 [ ! . . . . . . . . . . . . . . . ] (in kfence-#136):
[   40.264219]  test_corruption+0x120/0x378
[   40.264429]  kunit_try_run_case+0x170/0x3f0
[   40.264837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.265094]  kthread+0x328/0x630
[   40.265416]  ret_from_fork+0x10/0x20
[   40.265542] 
[   40.265606] kfence-#136: 0x00000000e134741e-0x000000002f4eda49, size=32, cache=test
[   40.265606] 
[   40.265746] allocated by task 325 on cpu 0 at 40.260990s (0.004745s ago):
[   40.266684]  test_alloc+0x230/0x628
[   40.266759]  test_corruption+0xdc/0x378
[   40.266820]  kunit_try_run_case+0x170/0x3f0
[   40.266998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.267148]  kthread+0x328/0x630
[   40.267689]  ret_from_fork+0x10/0x20
[   40.267824] 
[   40.267887] freed by task 325 on cpu 0 at 40.261126s (0.006752s ago):
[   40.268171]  test_corruption+0x120/0x378
[   40.268346]  kunit_try_run_case+0x170/0x3f0
[   40.268565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.268838]  kthread+0x328/0x630
[   40.268925]  ret_from_fork+0x10/0x20
[   40.269809] 
[   40.270119] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   40.270316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.270389] Hardware name: linux,dummy-virt (DT)
[   40.270505] ==================================================================
[   40.365656] ==================================================================
[   40.366098] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   40.366098] 
[   40.366347] Corrupted memory at 0x00000000b10f91d0 [ ! ] (in kfence-#137):
[   40.366712]  test_corruption+0x1d8/0x378
[   40.366965]  kunit_try_run_case+0x170/0x3f0
[   40.367097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.367262]  kthread+0x328/0x630
[   40.367365]  ret_from_fork+0x10/0x20
[   40.367492] 
[   40.367660] kfence-#137: 0x00000000b2749bc3-0x000000007ed02576, size=32, cache=test
[   40.367660] 
[   40.368011] allocated by task 325 on cpu 0 at 40.364950s (0.003033s ago):
[   40.368367]  test_alloc+0x230/0x628
[   40.368470]  test_corruption+0x198/0x378
[   40.368579]  kunit_try_run_case+0x170/0x3f0
[   40.368688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.368858]  kthread+0x328/0x630
[   40.369435]  ret_from_fork+0x10/0x20
[   40.369774] 
[   40.369847] freed by task 325 on cpu 0 at 40.365104s (0.004733s ago):
[   40.370012]  test_corruption+0x1d8/0x378
[   40.370240]  kunit_try_run_case+0x170/0x3f0
[   40.370344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.370527]  kthread+0x328/0x630
[   40.370712]  ret_from_fork+0x10/0x20
[   40.370836] 
[   40.370925] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   40.371231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.371445] Hardware name: linux,dummy-virt (DT)
[   40.371548] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   39.512570] ==================================================================
[   39.512713] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   39.512713] 
[   39.512836] Invalid free of 0x000000008e0e8cde (in kfence-#129):
[   39.512949]  test_invalid_addr_free+0xec/0x238
[   39.513080]  kunit_try_run_case+0x170/0x3f0
[   39.513189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.513295]  kthread+0x328/0x630
[   39.513390]  ret_from_fork+0x10/0x20
[   39.513482] 
[   39.513535] kfence-#129: 0x00000000ca51d17b-0x000000000770dc52, size=32, cache=test
[   39.513535] 
[   39.513651] allocated by task 321 on cpu 0 at 39.512359s (0.001285s ago):
[   39.513792]  test_alloc+0x230/0x628
[   39.513888]  test_invalid_addr_free+0xd4/0x238
[   39.513986]  kunit_try_run_case+0x170/0x3f0
[   39.514865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.514960]  kthread+0x328/0x630
[   39.515009]  ret_from_fork+0x10/0x20
[   39.515117] 
[   39.515337] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   39.515805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.515882] Hardware name: linux,dummy-virt (DT)
[   39.515972] ==================================================================
[   39.405979] ==================================================================
[   39.406679] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   39.406679] 
[   39.406954] Invalid free of 0x00000000264f8b1b (in kfence-#128):
[   39.407137]  test_invalid_addr_free+0x1ac/0x238
[   39.407261]  kunit_try_run_case+0x170/0x3f0
[   39.407394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.407793]  kthread+0x328/0x630
[   39.408148]  ret_from_fork+0x10/0x20
[   39.408299] 
[   39.408502] kfence-#128: 0x000000000ebc1ead-0x00000000778f2188, size=32, cache=kmalloc-32
[   39.408502] 
[   39.408687] allocated by task 319 on cpu 0 at 39.405717s (0.002960s ago):
[   39.408841]  test_alloc+0x29c/0x628
[   39.408967]  test_invalid_addr_free+0xd4/0x238
[   39.409473]  kunit_try_run_case+0x170/0x3f0
[   39.409936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.410098]  kthread+0x328/0x630
[   39.410488]  ret_from_fork+0x10/0x20
[   39.411008] 
[   39.411160] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   39.411358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.411442] Hardware name: linux,dummy-virt (DT)
[   39.411522] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   33.323547] ==================================================================
[   33.323696] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   33.323967] Read of size 1 at addr fff00000c63f7473 by task kunit_try_catch/206
[   33.324200] 
[   33.324463] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.324694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.324767] Hardware name: linux,dummy-virt (DT)
[   33.324884] Call trace:
[   33.325095]  show_stack+0x20/0x38 (C)
[   33.325338]  dump_stack_lvl+0x8c/0xd0
[   33.325456]  print_report+0x118/0x608
[   33.325572]  kasan_report+0xdc/0x128
[   33.325694]  __asan_report_load1_noabort+0x20/0x30
[   33.326056]  ksize_unpoisons_memory+0x628/0x740
[   33.326403]  kunit_try_run_case+0x170/0x3f0
[   33.326734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.326993]  kthread+0x328/0x630
[   33.327199]  ret_from_fork+0x10/0x20
[   33.327694] 
[   33.327756] Allocated by task 206:
[   33.327840]  kasan_save_stack+0x3c/0x68
[   33.327995]  kasan_save_track+0x20/0x40
[   33.328114]  kasan_save_alloc_info+0x40/0x58
[   33.328224]  __kasan_kmalloc+0xd4/0xd8
[   33.328325]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.328429]  ksize_unpoisons_memory+0xc0/0x740
[   33.328522]  kunit_try_run_case+0x170/0x3f0
[   33.328628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.328929]  kthread+0x328/0x630
[   33.329115]  ret_from_fork+0x10/0x20
[   33.329245] 
[   33.329400] The buggy address belongs to the object at fff00000c63f7400
[   33.329400]  which belongs to the cache kmalloc-128 of size 128
[   33.329592] The buggy address is located 0 bytes to the right of
[   33.329592]  allocated 115-byte region [fff00000c63f7400, fff00000c63f7473)
[   33.329745] 
[   33.329796] The buggy address belongs to the physical page:
[   33.329935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.330148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.330349] page_type: f5(slab)
[   33.330461] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.330589] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.330781] page dumped because: kasan: bad access detected
[   33.330867] 
[   33.330914] Memory state around the buggy address:
[   33.331057]  fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.331255]  fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.331371] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.331469]                                                              ^
[   33.331611]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.331794]  fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.331890] ==================================================================
[   33.333202] ==================================================================
[   33.333301] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   33.333413] Read of size 1 at addr fff00000c63f7478 by task kunit_try_catch/206
[   33.333529] 
[   33.333592] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.333780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.333844] Hardware name: linux,dummy-virt (DT)
[   33.333915] Call trace:
[   33.333967]  show_stack+0x20/0x38 (C)
[   33.334135]  dump_stack_lvl+0x8c/0xd0
[   33.334276]  print_report+0x118/0x608
[   33.334765]  kasan_report+0xdc/0x128
[   33.334963]  __asan_report_load1_noabort+0x20/0x30
[   33.335174]  ksize_unpoisons_memory+0x618/0x740
[   33.335316]  kunit_try_run_case+0x170/0x3f0
[   33.335445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.336019]  kthread+0x328/0x630
[   33.336154]  ret_from_fork+0x10/0x20
[   33.336274] 
[   33.336337] Allocated by task 206:
[   33.336410]  kasan_save_stack+0x3c/0x68
[   33.336520]  kasan_save_track+0x20/0x40
[   33.336822]  kasan_save_alloc_info+0x40/0x58
[   33.336992]  __kasan_kmalloc+0xd4/0xd8
[   33.337136]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.337248]  ksize_unpoisons_memory+0xc0/0x740
[   33.337534]  kunit_try_run_case+0x170/0x3f0
[   33.338835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.338976]  kthread+0x328/0x630
[   33.339081]  ret_from_fork+0x10/0x20
[   33.339177] 
[   33.339222] The buggy address belongs to the object at fff00000c63f7400
[   33.339222]  which belongs to the cache kmalloc-128 of size 128
[   33.340131] The buggy address is located 5 bytes to the right of
[   33.340131]  allocated 115-byte region [fff00000c63f7400, fff00000c63f7473)
[   33.340383] 
[   33.340441] The buggy address belongs to the physical page:
[   33.340512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.341791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.341923] page_type: f5(slab)
[   33.342516] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.342837] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.342939] page dumped because: kasan: bad access detected
[   33.343575] 
[   33.343626] Memory state around the buggy address:
[   33.343876]  fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.344146]  fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.344203] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.344272]                                                                 ^
[   33.344440]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.344561]  fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.344818] ==================================================================
[   33.345973] ==================================================================
[   33.346094] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   33.346230] Read of size 1 at addr fff00000c63f747f by task kunit_try_catch/206
[   33.346357] 
[   33.346424] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.346689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.346781] Hardware name: linux,dummy-virt (DT)
[   33.346867] Call trace:
[   33.346923]  show_stack+0x20/0x38 (C)
[   33.347077]  dump_stack_lvl+0x8c/0xd0
[   33.347366]  print_report+0x118/0x608
[   33.347535]  kasan_report+0xdc/0x128
[   33.347701]  __asan_report_load1_noabort+0x20/0x30
[   33.347848]  ksize_unpoisons_memory+0x690/0x740
[   33.347996]  kunit_try_run_case+0x170/0x3f0
[   33.348145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.348421]  kthread+0x328/0x630
[   33.348733]  ret_from_fork+0x10/0x20
[   33.348915] 
[   33.348962] Allocated by task 206:
[   33.349052]  kasan_save_stack+0x3c/0x68
[   33.349154]  kasan_save_track+0x20/0x40
[   33.349247]  kasan_save_alloc_info+0x40/0x58
[   33.349332]  __kasan_kmalloc+0xd4/0xd8
[   33.349454]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.349745]  ksize_unpoisons_memory+0xc0/0x740
[   33.349885]  kunit_try_run_case+0x170/0x3f0
[   33.350006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.350145]  kthread+0x328/0x630
[   33.350250]  ret_from_fork+0x10/0x20
[   33.350356] 
[   33.350412] The buggy address belongs to the object at fff00000c63f7400
[   33.350412]  which belongs to the cache kmalloc-128 of size 128
[   33.350569] The buggy address is located 12 bytes to the right of
[   33.350569]  allocated 115-byte region [fff00000c63f7400, fff00000c63f7473)
[   33.350738] 
[   33.350798] The buggy address belongs to the physical page:
[   33.350873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.350994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.351118] page_type: f5(slab)
[   33.351205] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.351442] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.351674] page dumped because: kasan: bad access detected
[   33.351755] 
[   33.351813] Memory state around the buggy address:
[   33.351984]  fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.352126]  fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.352236] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.352335]                                                                 ^
[   33.352454]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.352574]  fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.352682] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   38.875906] ==================================================================
[   38.876060] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   38.876060] 
[   38.876226] Use-after-free read at 0x00000000abd44aef (in kfence-#123):
[   38.876339]  test_use_after_free_read+0x114/0x248
[   38.876456]  kunit_try_run_case+0x170/0x3f0
[   38.876561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.876667]  kthread+0x328/0x630
[   38.876758]  ret_from_fork+0x10/0x20
[   38.876849] 
[   38.876904] kfence-#123: 0x00000000abd44aef-0x0000000056336da7, size=32, cache=test
[   38.876904] 
[   38.877052] allocated by task 309 on cpu 0 at 38.875449s (0.001561s ago):
[   38.877239]  test_alloc+0x230/0x628
[   38.877363]  test_use_after_free_read+0xd0/0x248
[   38.877486]  kunit_try_run_case+0x170/0x3f0
[   38.877644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.877775]  kthread+0x328/0x630
[   38.877883]  ret_from_fork+0x10/0x20
[   38.878002] 
[   38.878125] freed by task 309 on cpu 0 at 38.875540s (0.002553s ago):
[   38.878530]  test_use_after_free_read+0xf0/0x248
[   38.878808]  kunit_try_run_case+0x170/0x3f0
[   38.878920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.879099]  kthread+0x328/0x630
[   38.879221]  ret_from_fork+0x10/0x20
[   38.879341] 
[   38.879442] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   38.879771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.879854] Hardware name: linux,dummy-virt (DT)
[   38.879957] ==================================================================
[   38.773528] ==================================================================
[   38.773677] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   38.773677] 
[   38.773888] Use-after-free read at 0x000000009ddcc803 (in kfence-#122):
[   38.774534]  test_use_after_free_read+0x114/0x248
[   38.774837]  kunit_try_run_case+0x170/0x3f0
[   38.774989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.775313]  kthread+0x328/0x630
[   38.775599]  ret_from_fork+0x10/0x20
[   38.775883] 
[   38.776009] kfence-#122: 0x000000009ddcc803-0x00000000bb47c840, size=32, cache=kmalloc-32
[   38.776009] 
[   38.776157] allocated by task 307 on cpu 0 at 38.772468s (0.003679s ago):
[   38.776923]  test_alloc+0x29c/0x628
[   38.777054]  test_use_after_free_read+0xd0/0x248
[   38.777463]  kunit_try_run_case+0x170/0x3f0
[   38.777669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.777777]  kthread+0x328/0x630
[   38.778629]  ret_from_fork+0x10/0x20
[   38.779204] 
[   38.779518] freed by task 307 on cpu 0 at 38.772561s (0.006947s ago):
[   38.779681]  test_use_after_free_read+0x1c0/0x248
[   38.780452]  kunit_try_run_case+0x170/0x3f0
[   38.781307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.782073]  kthread+0x328/0x630
[   38.782692]  ret_from_fork+0x10/0x20
[   38.783587] 
[   38.783835] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   38.785581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.785698] Hardware name: linux,dummy-virt (DT)
[   38.786463] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   38.669644] ==================================================================
[   38.669778] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   38.669778] 
[   38.670926] Out-of-bounds write at 0x00000000dd1f3a7a (1B left of kfence-#121):
[   38.671118]  test_out_of_bounds_write+0x100/0x240
[   38.672458]  kunit_try_run_case+0x170/0x3f0
[   38.672657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.673458]  kthread+0x328/0x630
[   38.673598]  ret_from_fork+0x10/0x20
[   38.673695] 
[   38.673757] kfence-#121: 0x00000000ecde970c-0x00000000cc58a22c, size=32, cache=test
[   38.673757] 
[   38.675237] allocated by task 305 on cpu 0 at 38.669004s (0.006103s ago):
[   38.676015]  test_alloc+0x230/0x628
[   38.676569]  test_out_of_bounds_write+0xc8/0x240
[   38.676688]  kunit_try_run_case+0x170/0x3f0
[   38.676792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.678076]  kthread+0x328/0x630
[   38.678228]  ret_from_fork+0x10/0x20
[   38.679014] 
[   38.679549] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   38.680230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.680303] Hardware name: linux,dummy-virt (DT)
[   38.681248] ==================================================================
[   38.564916] ==================================================================
[   38.565157] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   38.565157] 
[   38.565341] Out-of-bounds write at 0x0000000070181cce (1B left of kfence-#120):
[   38.565464]  test_out_of_bounds_write+0x100/0x240
[   38.565572]  kunit_try_run_case+0x170/0x3f0
[   38.565677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.565783]  kthread+0x328/0x630
[   38.565877]  ret_from_fork+0x10/0x20
[   38.565974] 
[   38.566047] kfence-#120: 0x000000005c11ca3d-0x00000000afa1abd7, size=32, cache=kmalloc-32
[   38.566047] 
[   38.566169] allocated by task 303 on cpu 0 at 38.562167s (0.003993s ago):
[   38.566323]  test_alloc+0x29c/0x628
[   38.566421]  test_out_of_bounds_write+0xc8/0x240
[   38.566517]  kunit_try_run_case+0x170/0x3f0
[   38.566960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.567432]  kthread+0x328/0x630
[   38.567819]  ret_from_fork+0x10/0x20
[   38.568490] 
[   38.569219] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   38.569489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.569562] Hardware name: linux,dummy-virt (DT)
[   38.570638] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   38.031923] ==================================================================
[   38.032085] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   38.032085] 
[   38.032261] Out-of-bounds read at 0x00000000cac57414 (1B left of kfence-#115):
[   38.032400]  test_out_of_bounds_read+0x114/0x3e0
[   38.032513]  kunit_try_run_case+0x170/0x3f0
[   38.032617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.032719]  kthread+0x328/0x630
[   38.032813]  ret_from_fork+0x10/0x20
[   38.034423] 
[   38.034759] kfence-#115: 0x00000000e394ed70-0x00000000e9a42170, size=32, cache=test
[   38.034759] 
[   38.034903] allocated by task 301 on cpu 0 at 38.031634s (0.003259s ago):
[   38.035153]  test_alloc+0x230/0x628
[   38.035222]  test_out_of_bounds_read+0xdc/0x3e0
[   38.035305]  kunit_try_run_case+0x170/0x3f0
[   38.035551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.035667]  kthread+0x328/0x630
[   38.035756]  ret_from_fork+0x10/0x20
[   38.035865] 
[   38.036020] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   38.036328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.036498] Hardware name: linux,dummy-virt (DT)
[   38.036782] ==================================================================
[   37.601309] ==================================================================
[   37.602684] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   37.602684] 
[   37.603566] Out-of-bounds read at 0x00000000d32db099 (1B left of kfence-#111):
[   37.604066]  test_out_of_bounds_read+0x114/0x3e0
[   37.604328]  kunit_try_run_case+0x170/0x3f0
[   37.604678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.605268]  kthread+0x328/0x630
[   37.605409]  ret_from_fork+0x10/0x20
[   37.605672] 
[   37.605751] kfence-#111: 0x000000009f851da8-0x00000000ac7bc858, size=32, cache=kmalloc-32
[   37.605751] 
[   37.606303] allocated by task 299 on cpu 0 at 37.599854s (0.006273s ago):
[   37.606476]  test_alloc+0x29c/0x628
[   37.606696]  test_out_of_bounds_read+0xdc/0x3e0
[   37.606962]  kunit_try_run_case+0x170/0x3f0
[   37.607558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.607908]  kthread+0x328/0x630
[   37.608202]  ret_from_fork+0x10/0x20
[   37.608460] 
[   37.608737] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.609199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.609613] Hardware name: linux,dummy-virt (DT)
[   37.609895] ==================================================================
[   38.245700] ==================================================================
[   38.246997] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   38.246997] 
[   38.247669] Out-of-bounds read at 0x00000000dfa7e149 (32B right of kfence-#117):
[   38.247908]  test_out_of_bounds_read+0x1c8/0x3e0
[   38.248046]  kunit_try_run_case+0x170/0x3f0
[   38.248158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.248974]  kthread+0x328/0x630
[   38.249276]  ret_from_fork+0x10/0x20
[   38.249622] 
[   38.249686] kfence-#117: 0x00000000394e334d-0x000000002b4ab4a5, size=32, cache=test
[   38.249686] 
[   38.250527] allocated by task 301 on cpu 0 at 38.245444s (0.005074s ago):
[   38.251071]  test_alloc+0x230/0x628
[   38.251471]  test_out_of_bounds_read+0x198/0x3e0
[   38.251588]  kunit_try_run_case+0x170/0x3f0
[   38.251685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.251779]  kthread+0x328/0x630
[   38.252441]  ret_from_fork+0x10/0x20
[   38.253194] 
[   38.253477] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   38.253665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.254685] Hardware name: linux,dummy-virt (DT)
[   38.254872] ==================================================================
[   37.817085] ==================================================================
[   37.817238] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   37.817238] 
[   37.817437] Out-of-bounds read at 0x0000000027fcb00c (32B right of kfence-#113):
[   37.817566]  test_out_of_bounds_read+0x1c8/0x3e0
[   37.818659]  kunit_try_run_case+0x170/0x3f0
[   37.818930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.820092]  kthread+0x328/0x630
[   37.821544]  ret_from_fork+0x10/0x20
[   37.821953] 
[   37.822066] kfence-#113: 0x00000000d12e21e8-0x00000000d9cce558, size=32, cache=kmalloc-32
[   37.822066] 
[   37.822577] allocated by task 299 on cpu 0 at 37.816766s (0.005416s ago):
[   37.822897]  test_alloc+0x29c/0x628
[   37.822998]  test_out_of_bounds_read+0x198/0x3e0
[   37.823242]  kunit_try_run_case+0x170/0x3f0
[   37.823498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.823841]  kthread+0x328/0x630
[   37.824401]  ret_from_fork+0x10/0x20
[   37.824550] 
[   37.824671] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.824864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.824958] Hardware name: linux,dummy-virt (DT)
[   37.825069] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_oob_memset_4
[   32.978970] ==================================================================
[   32.979255] BUG: KFENCE: memory corruption in kmalloc_oob_memset_4+0x170/0x300
[   32.979255] 
[   32.979559] Corrupted memory at 0x0000000025034bd4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#81):
[   32.983127]  kmalloc_oob_memset_4+0x170/0x300
[   32.983359]  kunit_try_run_case+0x170/0x3f0
[   32.983564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.983797]  kthread+0x328/0x630
[   32.983908]  ret_from_fork+0x10/0x20
[   32.984130] 
[   32.984598] kfence-#81: 0x000000004d816a72-0x00000000243d6fd4, size=120, cache=kmalloc-128
[   32.984598] 
[   32.985070] allocated by task 186 on cpu 1 at 32.973465s (0.011386s ago):
[   32.985618]  kmalloc_oob_memset_4+0xb0/0x300
[   32.985775]  kunit_try_run_case+0x170/0x3f0
[   32.986076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.986206]  kthread+0x328/0x630
[   32.986285]  ret_from_fork+0x10/0x20
[   32.986448] 
[   32.986770] freed by task 186 on cpu 1 at 32.977198s (0.009333s ago):
[   32.986986]  kmalloc_oob_memset_4+0x170/0x300
[   32.987155]  kunit_try_run_case+0x170/0x3f0
[   32.987264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.987381]  kthread+0x328/0x630
[   32.987621]  ret_from_fork+0x10/0x20
[   32.987815] 
[   32.988212] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.989169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.989266] Hardware name: linux,dummy-virt (DT)
[   32.989739] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   37.400880] ==================================================================
[   37.400981] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   37.401116] Write of size 1 at addr fff00000c7801378 by task kunit_try_catch/297
[   37.401233] 
[   37.401302] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.403649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.403736] Hardware name: linux,dummy-virt (DT)
[   37.403908] Call trace:
[   37.403971]  show_stack+0x20/0x38 (C)
[   37.404504]  dump_stack_lvl+0x8c/0xd0
[   37.404750]  print_report+0x118/0x608
[   37.404886]  kasan_report+0xdc/0x128
[   37.405836]  __asan_report_store1_noabort+0x20/0x30
[   37.406227]  strncpy_from_user+0x270/0x2a0
[   37.407103]  copy_user_test_oob+0x5c0/0xec8
[   37.407654]  kunit_try_run_case+0x170/0x3f0
[   37.407789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.407934]  kthread+0x328/0x630
[   37.408065]  ret_from_fork+0x10/0x20
[   37.408201] 
[   37.409307] Allocated by task 297:
[   37.409582]  kasan_save_stack+0x3c/0x68
[   37.410850]  kasan_save_track+0x20/0x40
[   37.410968]  kasan_save_alloc_info+0x40/0x58
[   37.411102]  __kasan_kmalloc+0xd4/0xd8
[   37.411205]  __kmalloc_noprof+0x198/0x4c8
[   37.411309]  kunit_kmalloc_array+0x34/0x88
[   37.413197]  copy_user_test_oob+0xac/0xec8
[   37.413362]  kunit_try_run_case+0x170/0x3f0
[   37.414497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.415130]  kthread+0x328/0x630
[   37.415231]  ret_from_fork+0x10/0x20
[   37.416169] 
[   37.416747] The buggy address belongs to the object at fff00000c7801300
[   37.416747]  which belongs to the cache kmalloc-128 of size 128
[   37.417473] The buggy address is located 0 bytes to the right of
[   37.417473]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.417678] 
[   37.418799] The buggy address belongs to the physical page:
[   37.419222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.419761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.420394] page_type: f5(slab)
[   37.420500] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.421146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.421281] page dumped because: kasan: bad access detected
[   37.421363] 
[   37.421745] Memory state around the buggy address:
[   37.422272]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.422707]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.423812] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.424096]                                                                 ^
[   37.424207]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.425147]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.426156] ==================================================================
[   37.388687] ==================================================================
[   37.388866] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   37.388996] Write of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.389140] 
[   37.389212] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.389414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.389555] Hardware name: linux,dummy-virt (DT)
[   37.389640] Call trace:
[   37.389730]  show_stack+0x20/0x38 (C)
[   37.389881]  dump_stack_lvl+0x8c/0xd0
[   37.390121]  print_report+0x118/0x608
[   37.390348]  kasan_report+0xdc/0x128
[   37.390535]  kasan_check_range+0x100/0x1a8
[   37.390779]  __kasan_check_write+0x20/0x30
[   37.390919]  strncpy_from_user+0x3c/0x2a0
[   37.391274]  copy_user_test_oob+0x5c0/0xec8
[   37.391459]  kunit_try_run_case+0x170/0x3f0
[   37.391725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.391966]  kthread+0x328/0x630
[   37.392194]  ret_from_fork+0x10/0x20
[   37.392390] 
[   37.392466] Allocated by task 297:
[   37.392553]  kasan_save_stack+0x3c/0x68
[   37.392663]  kasan_save_track+0x20/0x40
[   37.392766]  kasan_save_alloc_info+0x40/0x58
[   37.392937]  __kasan_kmalloc+0xd4/0xd8
[   37.393165]  __kmalloc_noprof+0x198/0x4c8
[   37.393304]  kunit_kmalloc_array+0x34/0x88
[   37.393428]  copy_user_test_oob+0xac/0xec8
[   37.393553]  kunit_try_run_case+0x170/0x3f0
[   37.393768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.393949]  kthread+0x328/0x630
[   37.394163]  ret_from_fork+0x10/0x20
[   37.394281] 
[   37.394335] The buggy address belongs to the object at fff00000c7801300
[   37.394335]  which belongs to the cache kmalloc-128 of size 128
[   37.394491] The buggy address is located 0 bytes inside of
[   37.394491]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.394720] 
[   37.394796] The buggy address belongs to the physical page:
[   37.394879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.395139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.395310] page_type: f5(slab)
[   37.395585] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.396065] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.396250] page dumped because: kasan: bad access detected
[   37.396331] 
[   37.396379] Memory state around the buggy address:
[   37.396450]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.396561]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.396662] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.396757]                                                                 ^
[   37.396967]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.397862]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.398090] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   37.332680] ==================================================================
[   37.332786] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   37.332907] Write of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.333483] 
[   37.333714] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.335060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.335228] Hardware name: linux,dummy-virt (DT)
[   37.335455] Call trace:
[   37.336220]  show_stack+0x20/0x38 (C)
[   37.336353]  dump_stack_lvl+0x8c/0xd0
[   37.337706]  print_report+0x118/0x608
[   37.338494]  kasan_report+0xdc/0x128
[   37.339179]  kasan_check_range+0x100/0x1a8
[   37.339882]  __kasan_check_write+0x20/0x30
[   37.340337]  copy_user_test_oob+0x35c/0xec8
[   37.340513]  kunit_try_run_case+0x170/0x3f0
[   37.340634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.341267]  kthread+0x328/0x630
[   37.341758]  ret_from_fork+0x10/0x20
[   37.342345] 
[   37.342418] Allocated by task 297:
[   37.342757]  kasan_save_stack+0x3c/0x68
[   37.343177]  kasan_save_track+0x20/0x40
[   37.343287]  kasan_save_alloc_info+0x40/0x58
[   37.343384]  __kasan_kmalloc+0xd4/0xd8
[   37.343474]  __kmalloc_noprof+0x198/0x4c8
[   37.343572]  kunit_kmalloc_array+0x34/0x88
[   37.343890]  copy_user_test_oob+0xac/0xec8
[   37.344171]  kunit_try_run_case+0x170/0x3f0
[   37.344569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.345218]  kthread+0x328/0x630
[   37.345336]  ret_from_fork+0x10/0x20
[   37.345435] 
[   37.346113] The buggy address belongs to the object at fff00000c7801300
[   37.346113]  which belongs to the cache kmalloc-128 of size 128
[   37.346896] The buggy address is located 0 bytes inside of
[   37.346896]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.347529] 
[   37.347588] The buggy address belongs to the physical page:
[   37.347666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.347809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.348167] page_type: f5(slab)
[   37.348381] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.348509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.348613] page dumped because: kasan: bad access detected
[   37.348691] 
[   37.348738] Memory state around the buggy address:
[   37.348817]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.348930]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.349129] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.349234]                                                                 ^
[   37.349356]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.349560]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.350268] ==================================================================
[   37.280098] ==================================================================
[   37.280341] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   37.280506] Write of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.280633] 
[   37.280724] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.280926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.280994] Hardware name: linux,dummy-virt (DT)
[   37.281628] Call trace:
[   37.281708]  show_stack+0x20/0x38 (C)
[   37.281874]  dump_stack_lvl+0x8c/0xd0
[   37.282121]  print_report+0x118/0x608
[   37.282258]  kasan_report+0xdc/0x128
[   37.282375]  kasan_check_range+0x100/0x1a8
[   37.282496]  __kasan_check_write+0x20/0x30
[   37.282635]  copy_user_test_oob+0x234/0xec8
[   37.282794]  kunit_try_run_case+0x170/0x3f0
[   37.282953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.283226]  kthread+0x328/0x630
[   37.283366]  ret_from_fork+0x10/0x20
[   37.283639] 
[   37.283937] Allocated by task 297:
[   37.284077]  kasan_save_stack+0x3c/0x68
[   37.284199]  kasan_save_track+0x20/0x40
[   37.284488]  kasan_save_alloc_info+0x40/0x58
[   37.284737]  __kasan_kmalloc+0xd4/0xd8
[   37.284909]  __kmalloc_noprof+0x198/0x4c8
[   37.285392]  kunit_kmalloc_array+0x34/0x88
[   37.285774]  copy_user_test_oob+0xac/0xec8
[   37.285943]  kunit_try_run_case+0x170/0x3f0
[   37.286100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.286209]  kthread+0x328/0x630
[   37.286330]  ret_from_fork+0x10/0x20
[   37.286754] 
[   37.286853] The buggy address belongs to the object at fff00000c7801300
[   37.286853]  which belongs to the cache kmalloc-128 of size 128
[   37.287003] The buggy address is located 0 bytes inside of
[   37.287003]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.287191] 
[   37.287255] The buggy address belongs to the physical page:
[   37.287340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.287607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.287745] page_type: f5(slab)
[   37.287897] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.288043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.288157] page dumped because: kasan: bad access detected
[   37.288235] 
[   37.288283] Memory state around the buggy address:
[   37.288408]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.288520]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.288626] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.288726]                                                                 ^
[   37.288875]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.288984]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.289618] ==================================================================
[   37.302652] ==================================================================
[   37.303556] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   37.304219] Read of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.304375] 
[   37.304452] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.304930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.305086] Hardware name: linux,dummy-virt (DT)
[   37.305225] Call trace:
[   37.305291]  show_stack+0x20/0x38 (C)
[   37.305444]  dump_stack_lvl+0x8c/0xd0
[   37.305696]  print_report+0x118/0x608
[   37.305938]  kasan_report+0xdc/0x128
[   37.306286]  kasan_check_range+0x100/0x1a8
[   37.306451]  __kasan_check_read+0x20/0x30
[   37.306690]  copy_user_test_oob+0x728/0xec8
[   37.307143]  kunit_try_run_case+0x170/0x3f0
[   37.307426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.307600]  kthread+0x328/0x630
[   37.307783]  ret_from_fork+0x10/0x20
[   37.307943] 
[   37.308002] Allocated by task 297:
[   37.308103]  kasan_save_stack+0x3c/0x68
[   37.308209]  kasan_save_track+0x20/0x40
[   37.308388]  kasan_save_alloc_info+0x40/0x58
[   37.308583]  __kasan_kmalloc+0xd4/0xd8
[   37.308868]  __kmalloc_noprof+0x198/0x4c8
[   37.308996]  kunit_kmalloc_array+0x34/0x88
[   37.309129]  copy_user_test_oob+0xac/0xec8
[   37.309437]  kunit_try_run_case+0x170/0x3f0
[   37.309716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.309845]  kthread+0x328/0x630
[   37.310123]  ret_from_fork+0x10/0x20
[   37.310326] 
[   37.310381] The buggy address belongs to the object at fff00000c7801300
[   37.310381]  which belongs to the cache kmalloc-128 of size 128
[   37.310661] The buggy address is located 0 bytes inside of
[   37.310661]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.310845] 
[   37.310913] The buggy address belongs to the physical page:
[   37.311178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.312327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.312524] page_type: f5(slab)
[   37.312632] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.312760] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.312914] page dumped because: kasan: bad access detected
[   37.313059] 
[   37.313145] Memory state around the buggy address:
[   37.313396]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.313510]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.313617] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.313713]                                                                 ^
[   37.313814]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.313920]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.314015] ==================================================================
[   37.376958] ==================================================================
[   37.377190] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   37.377472] Read of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.377697] 
[   37.377904] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.378220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.378292] Hardware name: linux,dummy-virt (DT)
[   37.378374] Call trace:
[   37.378560]  show_stack+0x20/0x38 (C)
[   37.378715]  dump_stack_lvl+0x8c/0xd0
[   37.378872]  print_report+0x118/0x608
[   37.379088]  kasan_report+0xdc/0x128
[   37.379277]  kasan_check_range+0x100/0x1a8
[   37.379501]  __kasan_check_read+0x20/0x30
[   37.379660]  copy_user_test_oob+0x4a0/0xec8
[   37.379850]  kunit_try_run_case+0x170/0x3f0
[   37.380054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.380216]  kthread+0x328/0x630
[   37.380995]  ret_from_fork+0x10/0x20
[   37.381192] 
[   37.381327] Allocated by task 297:
[   37.381406]  kasan_save_stack+0x3c/0x68
[   37.381509]  kasan_save_track+0x20/0x40
[   37.381613]  kasan_save_alloc_info+0x40/0x58
[   37.381733]  __kasan_kmalloc+0xd4/0xd8
[   37.381857]  __kmalloc_noprof+0x198/0x4c8
[   37.382147]  kunit_kmalloc_array+0x34/0x88
[   37.382290]  copy_user_test_oob+0xac/0xec8
[   37.382391]  kunit_try_run_case+0x170/0x3f0
[   37.382493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.382666]  kthread+0x328/0x630
[   37.382790]  ret_from_fork+0x10/0x20
[   37.383022] 
[   37.383141] The buggy address belongs to the object at fff00000c7801300
[   37.383141]  which belongs to the cache kmalloc-128 of size 128
[   37.383353] The buggy address is located 0 bytes inside of
[   37.383353]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.383589] 
[   37.383654] The buggy address belongs to the physical page:
[   37.383743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.383885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.384014] page_type: f5(slab)
[   37.384259] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.384617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.384909] page dumped because: kasan: bad access detected
[   37.385107] 
[   37.385165] Memory state around the buggy address:
[   37.385282]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.385397]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.385542] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.385641]                                                                 ^
[   37.385747]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.385851]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.385944] ==================================================================
[   37.368233] ==================================================================
[   37.368407] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   37.368559] Write of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.368698] 
[   37.368794] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.369233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.369430] Hardware name: linux,dummy-virt (DT)
[   37.369562] Call trace:
[   37.369670]  show_stack+0x20/0x38 (C)
[   37.369903]  dump_stack_lvl+0x8c/0xd0
[   37.370050]  print_report+0x118/0x608
[   37.370173]  kasan_report+0xdc/0x128
[   37.370290]  kasan_check_range+0x100/0x1a8
[   37.370426]  __kasan_check_write+0x20/0x30
[   37.370633]  copy_user_test_oob+0x434/0xec8
[   37.370845]  kunit_try_run_case+0x170/0x3f0
[   37.371020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.371180]  kthread+0x328/0x630
[   37.371310]  ret_from_fork+0x10/0x20
[   37.371429] 
[   37.371569] Allocated by task 297:
[   37.371680]  kasan_save_stack+0x3c/0x68
[   37.371790]  kasan_save_track+0x20/0x40
[   37.371884]  kasan_save_alloc_info+0x40/0x58
[   37.371980]  __kasan_kmalloc+0xd4/0xd8
[   37.372097]  __kmalloc_noprof+0x198/0x4c8
[   37.372194]  kunit_kmalloc_array+0x34/0x88
[   37.372288]  copy_user_test_oob+0xac/0xec8
[   37.372385]  kunit_try_run_case+0x170/0x3f0
[   37.372482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.372612]  kthread+0x328/0x630
[   37.372722]  ret_from_fork+0x10/0x20
[   37.372918] 
[   37.372976] The buggy address belongs to the object at fff00000c7801300
[   37.372976]  which belongs to the cache kmalloc-128 of size 128
[   37.373183] The buggy address is located 0 bytes inside of
[   37.373183]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.373428] 
[   37.373492] The buggy address belongs to the physical page:
[   37.373596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.373827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.374057] page_type: f5(slab)
[   37.374172] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.374299] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.374399] page dumped because: kasan: bad access detected
[   37.374539] 
[   37.374608] Memory state around the buggy address:
[   37.374801]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.374951]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.375143] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.375243]                                                                 ^
[   37.375413]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.375529]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.375633] ==================================================================
[   37.352200] ==================================================================
[   37.352304] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   37.352421] Read of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.352551] 
[   37.352625] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.352832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.352903] Hardware name: linux,dummy-virt (DT)
[   37.352974] Call trace:
[   37.353051]  show_stack+0x20/0x38 (C)
[   37.353174]  dump_stack_lvl+0x8c/0xd0
[   37.353288]  print_report+0x118/0x608
[   37.353418]  kasan_report+0xdc/0x128
[   37.353564]  kasan_check_range+0x100/0x1a8
[   37.354165]  __kasan_check_read+0x20/0x30
[   37.354614]  copy_user_test_oob+0x3c8/0xec8
[   37.354792]  kunit_try_run_case+0x170/0x3f0
[   37.354924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.355090]  kthread+0x328/0x630
[   37.355235]  ret_from_fork+0x10/0x20
[   37.355379] 
[   37.355554] Allocated by task 297:
[   37.356486]  kasan_save_stack+0x3c/0x68
[   37.356765]  kasan_save_track+0x20/0x40
[   37.356978]  kasan_save_alloc_info+0x40/0x58
[   37.357279]  __kasan_kmalloc+0xd4/0xd8
[   37.357549]  __kmalloc_noprof+0x198/0x4c8
[   37.357651]  kunit_kmalloc_array+0x34/0x88
[   37.357747]  copy_user_test_oob+0xac/0xec8
[   37.357847]  kunit_try_run_case+0x170/0x3f0
[   37.357944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.358073]  kthread+0x328/0x630
[   37.358173]  ret_from_fork+0x10/0x20
[   37.358288] 
[   37.358350] The buggy address belongs to the object at fff00000c7801300
[   37.358350]  which belongs to the cache kmalloc-128 of size 128
[   37.359302] The buggy address is located 0 bytes inside of
[   37.359302]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.360301] 
[   37.360418] The buggy address belongs to the physical page:
[   37.360558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.360730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.360872] page_type: f5(slab)
[   37.360986] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.361732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.361836] page dumped because: kasan: bad access detected
[   37.362068] 
[   37.362121] Memory state around the buggy address:
[   37.362200]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.362307]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.362412] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.362501]                                                                 ^
[   37.362660]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.362783]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.362962] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   37.188986] ==================================================================
[   37.189145] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   37.189313] Read of size 8 at addr fff00000c7801278 by task kunit_try_catch/293
[   37.189448] 
[   37.190010] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.190488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.190629] Hardware name: linux,dummy-virt (DT)
[   37.191145] Call trace:
[   37.191211]  show_stack+0x20/0x38 (C)
[   37.191349]  dump_stack_lvl+0x8c/0xd0
[   37.191718]  print_report+0x118/0x608
[   37.191867]  kasan_report+0xdc/0x128
[   37.192129]  __asan_report_load8_noabort+0x20/0x30
[   37.192658]  copy_to_kernel_nofault+0x204/0x250
[   37.193113]  copy_to_kernel_nofault_oob+0x158/0x418
[   37.193251]  kunit_try_run_case+0x170/0x3f0
[   37.193379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.194550]  kthread+0x328/0x630
[   37.194780]  ret_from_fork+0x10/0x20
[   37.195480] 
[   37.195539] Allocated by task 293:
[   37.196245]  kasan_save_stack+0x3c/0x68
[   37.196567]  kasan_save_track+0x20/0x40
[   37.196996]  kasan_save_alloc_info+0x40/0x58
[   37.197183]  __kasan_kmalloc+0xd4/0xd8
[   37.197290]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.197712]  copy_to_kernel_nofault_oob+0xc8/0x418
[   37.197817]  kunit_try_run_case+0x170/0x3f0
[   37.198129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.198656]  kthread+0x328/0x630
[   37.198774]  ret_from_fork+0x10/0x20
[   37.199088] 
[   37.199159] The buggy address belongs to the object at fff00000c7801200
[   37.199159]  which belongs to the cache kmalloc-128 of size 128
[   37.200007] The buggy address is located 0 bytes to the right of
[   37.200007]  allocated 120-byte region [fff00000c7801200, fff00000c7801278)
[   37.200199] 
[   37.200261] The buggy address belongs to the physical page:
[   37.200342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.201319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.202581] page_type: f5(slab)
[   37.202714] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.202986] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.203104] page dumped because: kasan: bad access detected
[   37.203927] 
[   37.203992] Memory state around the buggy address:
[   37.204491]  fff00000c7801100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.204605]  fff00000c7801180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.204717] >fff00000c7801200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.205856]                                                                 ^
[   37.206183]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.206590]  fff00000c7801300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.206701] ==================================================================
[   37.216834] ==================================================================
[   37.216930] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   37.217696] Write of size 8 at addr fff00000c7801278 by task kunit_try_catch/293
[   37.218842] 
[   37.218927] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.219743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.219967] Hardware name: linux,dummy-virt (DT)
[   37.220215] Call trace:
[   37.220294]  show_stack+0x20/0x38 (C)
[   37.220791]  dump_stack_lvl+0x8c/0xd0
[   37.221136]  print_report+0x118/0x608
[   37.221265]  kasan_report+0xdc/0x128
[   37.222153]  kasan_check_range+0x100/0x1a8
[   37.222665]  __kasan_check_write+0x20/0x30
[   37.222803]  copy_to_kernel_nofault+0x8c/0x250
[   37.223756]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   37.223980]  kunit_try_run_case+0x170/0x3f0
[   37.224120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.224277]  kthread+0x328/0x630
[   37.224412]  ret_from_fork+0x10/0x20
[   37.224551] 
[   37.224608] Allocated by task 293:
[   37.224715]  kasan_save_stack+0x3c/0x68
[   37.224919]  kasan_save_track+0x20/0x40
[   37.225092]  kasan_save_alloc_info+0x40/0x58
[   37.225433]  __kasan_kmalloc+0xd4/0xd8
[   37.225586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.225856]  copy_to_kernel_nofault_oob+0xc8/0x418
[   37.225993]  kunit_try_run_case+0x170/0x3f0
[   37.226537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.226848]  kthread+0x328/0x630
[   37.227045]  ret_from_fork+0x10/0x20
[   37.227149] 
[   37.227217] The buggy address belongs to the object at fff00000c7801200
[   37.227217]  which belongs to the cache kmalloc-128 of size 128
[   37.227480] The buggy address is located 0 bytes to the right of
[   37.227480]  allocated 120-byte region [fff00000c7801200, fff00000c7801278)
[   37.227646] 
[   37.227751] The buggy address belongs to the physical page:
[   37.227845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.227979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.228331] page_type: f5(slab)
[   37.228675] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.228803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.228936] page dumped because: kasan: bad access detected
[   37.229320] 
[   37.229384] Memory state around the buggy address:
[   37.229479]  fff00000c7801100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.229652]  fff00000c7801180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.229772] >fff00000c7801200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.229877]                                                                 ^
[   37.229990]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.230122]  fff00000c7801300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.230237] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   32.450041] ==================================================================
[   32.450179] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   32.450319] Read of size 1 at addr fff00000c7720000 by task kunit_try_catch/166
[   32.450431] 
[   32.450509] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.450702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.450772] Hardware name: linux,dummy-virt (DT)
[   32.450875] Call trace:
[   32.450935]  show_stack+0x20/0x38 (C)
[   32.451112]  dump_stack_lvl+0x8c/0xd0
[   32.451904]  print_report+0x118/0x608
[   32.452624]  kasan_report+0xdc/0x128
[   32.452791]  __asan_report_load1_noabort+0x20/0x30
[   32.452919]  page_alloc_uaf+0x328/0x350
[   32.453063]  kunit_try_run_case+0x170/0x3f0
[   32.453195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.454614]  kthread+0x328/0x630
[   32.455078]  ret_from_fork+0x10/0x20
[   32.455218] 
[   32.455520] The buggy address belongs to the physical page:
[   32.455878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720
[   32.456002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.456783] page_type: f0(buddy)
[   32.457166] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000
[   32.457286] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   32.457846] page dumped because: kasan: bad access detected
[   32.458067] 
[   32.458134] Memory state around the buggy address:
[   32.458583]  fff00000c771ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.458889]  fff00000c771ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.458992] >fff00000c7720000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.459095]                    ^
[   32.459173]  fff00000c7720080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.459520]  fff00000c7720100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.461244] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   37.109345] ==================================================================
[   37.109444] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   37.109555] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/281
[   37.109670] 
[   37.109735] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.109925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.109995] Hardware name: linux,dummy-virt (DT)
[   37.110108] Call trace:
[   37.110183]  show_stack+0x20/0x38 (C)
[   37.110326]  dump_stack_lvl+0x8c/0xd0
[   37.110468]  print_report+0x310/0x608
[   37.110666]  kasan_report+0xdc/0x128
[   37.110824]  __asan_report_load1_noabort+0x20/0x30
[   37.111000]  vmalloc_oob+0x51c/0x5d0
[   37.111240]  kunit_try_run_case+0x170/0x3f0
[   37.111372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.111566]  kthread+0x328/0x630
[   37.111700]  ret_from_fork+0x10/0x20
[   37.111842] 
[   37.111906] The buggy address belongs to the virtual mapping at
[   37.111906]  [ffff8000800fe000, ffff800080100000) created by:
[   37.111906]  vmalloc_oob+0x98/0x5d0
[   37.112102] 
[   37.112212] The buggy address belongs to the physical page:
[   37.112329] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107807
[   37.112482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.112811] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.112937] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.113057] page dumped because: kasan: bad access detected
[   37.113140] 
[   37.113219] Memory state around the buggy address:
[   37.113301]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.113418]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.113526] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   37.113657]                                                                 ^
[   37.113940]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.114073]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.114186] ==================================================================
[   37.103098] ==================================================================
[   37.103253] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   37.103515] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/281
[   37.103729] 
[   37.103914] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.104243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.104326] Hardware name: linux,dummy-virt (DT)
[   37.104416] Call trace:
[   37.104489]  show_stack+0x20/0x38 (C)
[   37.104634]  dump_stack_lvl+0x8c/0xd0
[   37.104769]  print_report+0x310/0x608
[   37.104951]  kasan_report+0xdc/0x128
[   37.105103]  __asan_report_load1_noabort+0x20/0x30
[   37.105229]  vmalloc_oob+0x578/0x5d0
[   37.105340]  kunit_try_run_case+0x170/0x3f0
[   37.105465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.105603]  kthread+0x328/0x630
[   37.105715]  ret_from_fork+0x10/0x20
[   37.105851] 
[   37.105937] The buggy address belongs to the virtual mapping at
[   37.105937]  [ffff8000800fe000, ffff800080100000) created by:
[   37.105937]  vmalloc_oob+0x98/0x5d0
[   37.106154] 
[   37.106223] The buggy address belongs to the physical page:
[   37.106328] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107807
[   37.106588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.106774] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.106915] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.107043] page dumped because: kasan: bad access detected
[   37.107158] 
[   37.107212] Memory state around the buggy address:
[   37.107290]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.107516]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.107699] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   37.107800]                                                              ^
[   37.107906]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.108006]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.108136] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   36.904212] ==================================================================
[   36.904311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   36.904429] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.904558] 
[   36.904759] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.904957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.905045] Hardware name: linux,dummy-virt (DT)
[   36.905122] Call trace:
[   36.905180]  show_stack+0x20/0x38 (C)
[   36.905307]  dump_stack_lvl+0x8c/0xd0
[   36.905648]  print_report+0x118/0x608
[   36.906018]  kasan_report+0xdc/0x128
[   36.906168]  __asan_report_load8_noabort+0x20/0x30
[   36.906460]  kasan_atomics_helper+0x3f04/0x4858
[   36.906616]  kasan_atomics+0x198/0x2e0
[   36.906842]  kunit_try_run_case+0x170/0x3f0
[   36.907023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.907303]  kthread+0x328/0x630
[   36.907514]  ret_from_fork+0x10/0x20
[   36.907842] 
[   36.907914] Allocated by task 277:
[   36.907992]  kasan_save_stack+0x3c/0x68
[   36.908202]  kasan_save_track+0x20/0x40
[   36.908350]  kasan_save_alloc_info+0x40/0x58
[   36.908460]  __kasan_kmalloc+0xd4/0xd8
[   36.908611]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.908679]  kasan_atomics+0xb8/0x2e0
[   36.908728]  kunit_try_run_case+0x170/0x3f0
[   36.908777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.908834]  kthread+0x328/0x630
[   36.908876]  ret_from_fork+0x10/0x20
[   36.908922] 
[   36.908947] The buggy address belongs to the object at fff00000c7805380
[   36.908947]  which belongs to the cache kmalloc-64 of size 64
[   36.909020] The buggy address is located 0 bytes to the right of
[   36.909020]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.909127] 
[   36.909153] The buggy address belongs to the physical page:
[   36.909193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.909256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.909314] page_type: f5(slab)
[   36.909361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.909424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.909475] page dumped because: kasan: bad access detected
[   36.909514] 
[   36.909537] Memory state around the buggy address:
[   36.909576]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.909630]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.909683] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.909729]                                      ^
[   36.909772]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.909827]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.909876] ==================================================================
[   37.013113] ==================================================================
[   37.013221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   37.013356] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.013493] 
[   37.013574] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.014399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.014477] Hardware name: linux,dummy-virt (DT)
[   37.014556] Call trace:
[   37.014628]  show_stack+0x20/0x38 (C)
[   37.014750]  dump_stack_lvl+0x8c/0xd0
[   37.014925]  print_report+0x118/0x608
[   37.015060]  kasan_report+0xdc/0x128
[   37.015199]  __asan_report_load8_noabort+0x20/0x30
[   37.015348]  kasan_atomics_helper+0x3df4/0x4858
[   37.015494]  kasan_atomics+0x198/0x2e0
[   37.015603]  kunit_try_run_case+0x170/0x3f0
[   37.015736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.015885]  kthread+0x328/0x630
[   37.016048]  ret_from_fork+0x10/0x20
[   37.016177] 
[   37.016299] Allocated by task 277:
[   37.016504]  kasan_save_stack+0x3c/0x68
[   37.016644]  kasan_save_track+0x20/0x40
[   37.016817]  kasan_save_alloc_info+0x40/0x58
[   37.016921]  __kasan_kmalloc+0xd4/0xd8
[   37.017020]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.017165]  kasan_atomics+0xb8/0x2e0
[   37.017282]  kunit_try_run_case+0x170/0x3f0
[   37.017396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.017503]  kthread+0x328/0x630
[   37.017609]  ret_from_fork+0x10/0x20
[   37.017727] 
[   37.017792] The buggy address belongs to the object at fff00000c7805380
[   37.017792]  which belongs to the cache kmalloc-64 of size 64
[   37.017944] The buggy address is located 0 bytes to the right of
[   37.017944]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.018135] 
[   37.018184] The buggy address belongs to the physical page:
[   37.018258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.018514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.018625] page_type: f5(slab)
[   37.018738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.019126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.019234] page dumped because: kasan: bad access detected
[   37.019368] 
[   37.019420] Memory state around the buggy address:
[   37.019497]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.019615]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.019722] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.019813]                                      ^
[   37.019978]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.020433]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.020543] ==================================================================
[   36.503305] ==================================================================
[   36.503570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   36.503745] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.504006] 
[   36.504154] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.504368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.504527] Hardware name: linux,dummy-virt (DT)
[   36.504645] Call trace:
[   36.504798]  show_stack+0x20/0x38 (C)
[   36.505112]  dump_stack_lvl+0x8c/0xd0
[   36.505262]  print_report+0x118/0x608
[   36.505384]  kasan_report+0xdc/0x128
[   36.506196]  kasan_check_range+0x100/0x1a8
[   36.508923]  __kasan_check_write+0x20/0x30
[   36.509135]  kasan_atomics_helper+0x99c/0x4858
[   36.509654]  kasan_atomics+0x198/0x2e0
[   36.509867]  kunit_try_run_case+0x170/0x3f0
[   36.510101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.510254]  kthread+0x328/0x630
[   36.510367]  ret_from_fork+0x10/0x20
[   36.510492] 
[   36.510543] Allocated by task 277:
[   36.510624]  kasan_save_stack+0x3c/0x68
[   36.510725]  kasan_save_track+0x20/0x40
[   36.510857]  kasan_save_alloc_info+0x40/0x58
[   36.510978]  __kasan_kmalloc+0xd4/0xd8
[   36.511190]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.511386]  kasan_atomics+0xb8/0x2e0
[   36.511662]  kunit_try_run_case+0x170/0x3f0
[   36.511842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.511965]  kthread+0x328/0x630
[   36.512085]  ret_from_fork+0x10/0x20
[   36.512242] 
[   36.512334] The buggy address belongs to the object at fff00000c7805380
[   36.512334]  which belongs to the cache kmalloc-64 of size 64
[   36.512475] The buggy address is located 0 bytes to the right of
[   36.512475]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.512698] 
[   36.512836] The buggy address belongs to the physical page:
[   36.512925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.513114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.513442] page_type: f5(slab)
[   36.513584] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.514272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.514377] page dumped because: kasan: bad access detected
[   36.514476] 
[   36.514547] Memory state around the buggy address:
[   36.514657]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.514782]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.514895] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.515054]                                      ^
[   36.515163]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.515284]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.515390] ==================================================================
[   36.843660] ==================================================================
[   36.843771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   36.844138] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.844574] 
[   36.844672] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.845463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.845544] Hardware name: linux,dummy-virt (DT)
[   36.845796] Call trace:
[   36.845893]  show_stack+0x20/0x38 (C)
[   36.846081]  dump_stack_lvl+0x8c/0xd0
[   36.846375]  print_report+0x118/0x608
[   36.846521]  kasan_report+0xdc/0x128
[   36.846940]  kasan_check_range+0x100/0x1a8
[   36.847159]  __kasan_check_write+0x20/0x30
[   36.847486]  kasan_atomics_helper+0x11f8/0x4858
[   36.847685]  kasan_atomics+0x198/0x2e0
[   36.848143]  kunit_try_run_case+0x170/0x3f0
[   36.849194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.849498]  kthread+0x328/0x630
[   36.849778]  ret_from_fork+0x10/0x20
[   36.850048] 
[   36.850120] Allocated by task 277:
[   36.850482]  kasan_save_stack+0x3c/0x68
[   36.850796]  kasan_save_track+0x20/0x40
[   36.851178]  kasan_save_alloc_info+0x40/0x58
[   36.851632]  __kasan_kmalloc+0xd4/0xd8
[   36.851781]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.852180]  kasan_atomics+0xb8/0x2e0
[   36.852333]  kunit_try_run_case+0x170/0x3f0
[   36.852438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.852729]  kthread+0x328/0x630
[   36.852900]  ret_from_fork+0x10/0x20
[   36.853377] 
[   36.853436] The buggy address belongs to the object at fff00000c7805380
[   36.853436]  which belongs to the cache kmalloc-64 of size 64
[   36.853648] The buggy address is located 0 bytes to the right of
[   36.853648]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.854386] 
[   36.854462] The buggy address belongs to the physical page:
[   36.854601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.854963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.855295] page_type: f5(slab)
[   36.855415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.855813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.855949] page dumped because: kasan: bad access detected
[   36.856127] 
[   36.856358] Memory state around the buggy address:
[   36.856469]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.856611]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.856992] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.857106]                                      ^
[   36.857626]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.857938]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.858229] ==================================================================
[   36.632630] ==================================================================
[   36.632737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   36.632860] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.632980] 
[   36.634514] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.635763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.635846] Hardware name: linux,dummy-virt (DT)
[   36.636058] Call trace:
[   36.636122]  show_stack+0x20/0x38 (C)
[   36.636916]  dump_stack_lvl+0x8c/0xd0
[   36.637496]  print_report+0x118/0x608
[   36.638198]  kasan_report+0xdc/0x128
[   36.638359]  __asan_report_load4_noabort+0x20/0x30
[   36.639087]  kasan_atomics_helper+0x3dd8/0x4858
[   36.639232]  kasan_atomics+0x198/0x2e0
[   36.639370]  kunit_try_run_case+0x170/0x3f0
[   36.639522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.640154]  kthread+0x328/0x630
[   36.640343]  ret_from_fork+0x10/0x20
[   36.640710] 
[   36.640820] Allocated by task 277:
[   36.640903]  kasan_save_stack+0x3c/0x68
[   36.641010]  kasan_save_track+0x20/0x40
[   36.641596]  kasan_save_alloc_info+0x40/0x58
[   36.641790]  __kasan_kmalloc+0xd4/0xd8
[   36.641994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.642125]  kasan_atomics+0xb8/0x2e0
[   36.642233]  kunit_try_run_case+0x170/0x3f0
[   36.642603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.643411]  kthread+0x328/0x630
[   36.643604]  ret_from_fork+0x10/0x20
[   36.643856] 
[   36.643973] The buggy address belongs to the object at fff00000c7805380
[   36.643973]  which belongs to the cache kmalloc-64 of size 64
[   36.644144] The buggy address is located 0 bytes to the right of
[   36.644144]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.644514] 
[   36.644590] The buggy address belongs to the physical page:
[   36.644891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.645227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.645508] page_type: f5(slab)
[   36.645736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.646003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.646134] page dumped because: kasan: bad access detected
[   36.646287] 
[   36.646335] Memory state around the buggy address:
[   36.646414]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.646572]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.647202] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.647324]                                      ^
[   36.647509]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.647648]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.647844] ==================================================================
[   36.756664] ==================================================================
[   36.756773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   36.757102] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.757444] 
[   36.757555] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.757766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.757954] Hardware name: linux,dummy-virt (DT)
[   36.758616] Call trace:
[   36.758736]  show_stack+0x20/0x38 (C)
[   36.758922]  dump_stack_lvl+0x8c/0xd0
[   36.759064]  print_report+0x118/0x608
[   36.759220]  kasan_report+0xdc/0x128
[   36.759579]  kasan_check_range+0x100/0x1a8
[   36.759826]  __kasan_check_write+0x20/0x30
[   36.759992]  kasan_atomics_helper+0xf20/0x4858
[   36.760213]  kasan_atomics+0x198/0x2e0
[   36.760561]  kunit_try_run_case+0x170/0x3f0
[   36.760686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.760818]  kthread+0x328/0x630
[   36.760926]  ret_from_fork+0x10/0x20
[   36.761068] 
[   36.761116] Allocated by task 277:
[   36.761199]  kasan_save_stack+0x3c/0x68
[   36.761357]  kasan_save_track+0x20/0x40
[   36.761473]  kasan_save_alloc_info+0x40/0x58
[   36.762242]  __kasan_kmalloc+0xd4/0xd8
[   36.762523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.762855]  kasan_atomics+0xb8/0x2e0
[   36.763114]  kunit_try_run_case+0x170/0x3f0
[   36.764169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.764460]  kthread+0x328/0x630
[   36.764754]  ret_from_fork+0x10/0x20
[   36.764847] 
[   36.764960] The buggy address belongs to the object at fff00000c7805380
[   36.764960]  which belongs to the cache kmalloc-64 of size 64
[   36.765208] The buggy address is located 0 bytes to the right of
[   36.765208]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.765508] 
[   36.765563] The buggy address belongs to the physical page:
[   36.765673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.766016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.766515] page_type: f5(slab)
[   36.767821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.767954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.768086] page dumped because: kasan: bad access detected
[   36.768399] 
[   36.770393] Memory state around the buggy address:
[   36.770503]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.770642]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.770762] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.770813]                                      ^
[   36.770860]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.770915]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.770960] ==================================================================
[   36.516863] ==================================================================
[   36.516966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   36.517105] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.518853]  kasan_atomics_helper+0xa04/0x4858
[   36.521392]  kthread+0x328/0x630
[   36.522280] 
[   36.522376] The buggy address belongs to the physical page:
[   36.522507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.522680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.522832] page_type: f5(slab)
[   36.522939] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.523267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.523410] page dumped because: kasan: bad access detected
[   36.523492] 
[   36.523549] Memory state around the buggy address:
[   36.523673]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.523803]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.523976] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.524121]                                      ^
[   36.524221]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.524415]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.524704] ==================================================================
[   36.832338] ==================================================================
[   36.832441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   36.832570] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.832804] 
[   36.832876] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.833317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.833515] Hardware name: linux,dummy-virt (DT)
[   36.833665] Call trace:
[   36.833734]  show_stack+0x20/0x38 (C)
[   36.834008]  dump_stack_lvl+0x8c/0xd0
[   36.834147]  print_report+0x118/0x608
[   36.834401]  kasan_report+0xdc/0x128
[   36.834530]  kasan_check_range+0x100/0x1a8
[   36.834727]  __kasan_check_write+0x20/0x30
[   36.834912]  kasan_atomics_helper+0x1190/0x4858
[   36.835134]  kasan_atomics+0x198/0x2e0
[   36.835251]  kunit_try_run_case+0x170/0x3f0
[   36.835397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.835776]  kthread+0x328/0x630
[   36.835904]  ret_from_fork+0x10/0x20
[   36.836041] 
[   36.836107] Allocated by task 277:
[   36.836194]  kasan_save_stack+0x3c/0x68
[   36.836411]  kasan_save_track+0x20/0x40
[   36.836521]  kasan_save_alloc_info+0x40/0x58
[   36.836618]  __kasan_kmalloc+0xd4/0xd8
[   36.836713]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.836887]  kasan_atomics+0xb8/0x2e0
[   36.837073]  kunit_try_run_case+0x170/0x3f0
[   36.837302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.837419]  kthread+0x328/0x630
[   36.837508]  ret_from_fork+0x10/0x20
[   36.837604] 
[   36.837663] The buggy address belongs to the object at fff00000c7805380
[   36.837663]  which belongs to the cache kmalloc-64 of size 64
[   36.837919] The buggy address is located 0 bytes to the right of
[   36.837919]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.838120] 
[   36.838174] The buggy address belongs to the physical page:
[   36.838304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.838648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.838779] page_type: f5(slab)
[   36.838928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.839154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.839299] page dumped because: kasan: bad access detected
[   36.839409] 
[   36.839460] Memory state around the buggy address:
[   36.839555]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.839705]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.839996] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.840150]                                      ^
[   36.840247]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.840361]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.840457] ==================================================================
[   36.995972] ==================================================================
[   36.996102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   36.996219] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.996336] 
[   36.996407] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.996619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.996745] Hardware name: linux,dummy-virt (DT)
[   36.997551] Call trace:
[   36.997756]  show_stack+0x20/0x38 (C)
[   36.997891]  dump_stack_lvl+0x8c/0xd0
[   36.998007]  print_report+0x118/0x608
[   37.000181]  kasan_report+0xdc/0x128
[   37.000338]  kasan_check_range+0x100/0x1a8
[   37.000460]  __kasan_check_write+0x20/0x30
[   37.001532]  kasan_atomics_helper+0x1644/0x4858
[   37.002114]  kasan_atomics+0x198/0x2e0
[   37.003001]  kunit_try_run_case+0x170/0x3f0
[   37.003686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.004093]  kthread+0x328/0x630
[   37.004216]  ret_from_fork+0x10/0x20
[   37.004335] 
[   37.004388] Allocated by task 277:
[   37.005261]  kasan_save_stack+0x3c/0x68
[   37.005389]  kasan_save_track+0x20/0x40
[   37.006073]  kasan_save_alloc_info+0x40/0x58
[   37.006389]  __kasan_kmalloc+0xd4/0xd8
[   37.006567]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.006856]  kasan_atomics+0xb8/0x2e0
[   37.007020]  kunit_try_run_case+0x170/0x3f0
[   37.007500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.007642]  kthread+0x328/0x630
[   37.007772]  ret_from_fork+0x10/0x20
[   37.007866] 
[   37.007915] The buggy address belongs to the object at fff00000c7805380
[   37.007915]  which belongs to the cache kmalloc-64 of size 64
[   37.008481] The buggy address is located 0 bytes to the right of
[   37.008481]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.008834] 
[   37.008892] The buggy address belongs to the physical page:
[   37.009008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.009170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.009530] page_type: f5(slab)
[   37.010781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.010922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.011054] page dumped because: kasan: bad access detected
[   37.011145] 
[   37.011205] Memory state around the buggy address:
[   37.011295]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.011419]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.011522] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.011682]                                      ^
[   37.011833]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.011949]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.012066] ==================================================================
[   36.679044] ==================================================================
[   36.679146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   36.681521] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.681646] 
[   36.681719] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.681913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.681979] Hardware name: linux,dummy-virt (DT)
[   36.682088] Call trace:
[   36.682156]  show_stack+0x20/0x38 (C)
[   36.682685]  dump_stack_lvl+0x8c/0xd0
[   36.682836]  print_report+0x118/0x608
[   36.682966]  kasan_report+0xdc/0x128
[   36.683169]  __asan_report_load4_noabort+0x20/0x30
[   36.683660]  kasan_atomics_helper+0x3e04/0x4858
[   36.683828]  kasan_atomics+0x198/0x2e0
[   36.684000]  kunit_try_run_case+0x170/0x3f0
[   36.684309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.684458]  kthread+0x328/0x630
[   36.684632]  ret_from_fork+0x10/0x20
[   36.684933] 
[   36.684984] Allocated by task 277:
[   36.685086]  kasan_save_stack+0x3c/0x68
[   36.685205]  kasan_save_track+0x20/0x40
[   36.685325]  kasan_save_alloc_info+0x40/0x58
[   36.686136]  __kasan_kmalloc+0xd4/0xd8
[   36.686254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.686376]  kasan_atomics+0xb8/0x2e0
[   36.686616]  kunit_try_run_case+0x170/0x3f0
[   36.686723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.686854]  kthread+0x328/0x630
[   36.686969]  ret_from_fork+0x10/0x20
[   36.687102] 
[   36.687396] The buggy address belongs to the object at fff00000c7805380
[   36.687396]  which belongs to the cache kmalloc-64 of size 64
[   36.687639] The buggy address is located 0 bytes to the right of
[   36.687639]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.687874] 
[   36.687991] The buggy address belongs to the physical page:
[   36.688091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.688355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.688574] page_type: f5(slab)
[   36.688684] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.688846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.689174] page dumped because: kasan: bad access detected
[   36.689431] 
[   36.689553] Memory state around the buggy address:
[   36.689639]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.689770]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.689907] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.690014]                                      ^
[   36.690132]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.690525]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.690788] ==================================================================
[   36.796598] ==================================================================
[   36.796720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   36.796843] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.796968] 
[   36.797057] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.797258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.797327] Hardware name: linux,dummy-virt (DT)
[   36.799164] Call trace:
[   36.799252]  show_stack+0x20/0x38 (C)
[   36.799775]  dump_stack_lvl+0x8c/0xd0
[   36.799937]  print_report+0x118/0x608
[   36.800163]  kasan_report+0xdc/0x128
[   36.800322]  kasan_check_range+0x100/0x1a8
[   36.800446]  __kasan_check_write+0x20/0x30
[   36.800558]  kasan_atomics_helper+0x1058/0x4858
[   36.800680]  kasan_atomics+0x198/0x2e0
[   36.800805]  kunit_try_run_case+0x170/0x3f0
[   36.801151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.802135]  kthread+0x328/0x630
[   36.802313]  ret_from_fork+0x10/0x20
[   36.802781] 
[   36.802840] Allocated by task 277:
[   36.802913]  kasan_save_stack+0x3c/0x68
[   36.803016]  kasan_save_track+0x20/0x40
[   36.803773]  kasan_save_alloc_info+0x40/0x58
[   36.804196]  __kasan_kmalloc+0xd4/0xd8
[   36.804746]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.805013]  kasan_atomics+0xb8/0x2e0
[   36.805526]  kunit_try_run_case+0x170/0x3f0
[   36.805829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.806353]  kthread+0x328/0x630
[   36.806695]  ret_from_fork+0x10/0x20
[   36.807165] 
[   36.807221] The buggy address belongs to the object at fff00000c7805380
[   36.807221]  which belongs to the cache kmalloc-64 of size 64
[   36.807360] The buggy address is located 0 bytes to the right of
[   36.807360]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.808295] 
[   36.808731] The buggy address belongs to the physical page:
[   36.808918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.809103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.809655] page_type: f5(slab)
[   36.809831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.810499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.811086] page dumped because: kasan: bad access detected
[   36.811804] 
[   36.812357] Memory state around the buggy address:
[   36.812657]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.813149]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.813303] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.813401]                                      ^
[   36.813737]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.813863]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.814263] ==================================================================
[   36.525961] ==================================================================
[   36.526090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   36.526305] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.526620] 
[   36.526770] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.527055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.527131] Hardware name: linux,dummy-virt (DT)
[   36.527354] Call trace:
[   36.527447]  show_stack+0x20/0x38 (C)
[   36.527689]  dump_stack_lvl+0x8c/0xd0
[   36.527813]  print_report+0x118/0x608
[   36.527929]  kasan_report+0xdc/0x128
[   36.528118]  kasan_check_range+0x100/0x1a8
[   36.528313]  __kasan_check_write+0x20/0x30
[   36.528462]  kasan_atomics_helper+0xa6c/0x4858
[   36.528595]  kasan_atomics+0x198/0x2e0
[   36.528759]  kunit_try_run_case+0x170/0x3f0
[   36.529749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.530406]  kthread+0x328/0x630
[   36.530832]  ret_from_fork+0x10/0x20
[   36.531167] 
[   36.531255] Allocated by task 277:
[   36.531529]  kasan_save_stack+0x3c/0x68
[   36.531697]  kasan_save_track+0x20/0x40
[   36.533686]  ret_from_fork+0x10/0x20
[   36.535716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.535923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.536108] page_type: f5(slab)
[   36.536296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.536419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.536520] page dumped because: kasan: bad access detected
[   36.536632] 
[   36.536810] Memory state around the buggy address:
[   36.536904]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.537110]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.537233] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.539134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   36.540706]  show_stack+0x20/0x38 (C)
[   36.543792]  kasan_save_track+0x20/0x40
[   36.546827] The buggy address is located 0 bytes to the right of
[   36.546827]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.547763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.547882] page_type: f5(slab)
[   36.547989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.548134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.548236] page dumped because: kasan: bad access detected
[   36.548316] 
[   36.549636] Memory state around the buggy address:
[   36.549759]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.549934]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.550064] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.550171]                                      ^
[   36.550431]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.550665]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.550792] ==================================================================
[   36.713958] ==================================================================
[   36.714227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   36.714504] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.714818] 
[   36.714891] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.715195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.715267] Hardware name: linux,dummy-virt (DT)
[   36.715374] Call trace:
[   36.715435]  show_stack+0x20/0x38 (C)
[   36.715588]  dump_stack_lvl+0x8c/0xd0
[   36.715723]  print_report+0x118/0x608
[   36.715849]  kasan_report+0xdc/0x128
[   36.715966]  kasan_check_range+0x100/0x1a8
[   36.716108]  __kasan_check_write+0x20/0x30
[   36.716284]  kasan_atomics_helper+0xe44/0x4858
[   36.716614]  kasan_atomics+0x198/0x2e0
[   36.716737]  kunit_try_run_case+0x170/0x3f0
[   36.716894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.717136]  kthread+0x328/0x630
[   36.717306]  ret_from_fork+0x10/0x20
[   36.717448] 
[   36.717511] Allocated by task 277:
[   36.718319]  kasan_save_stack+0x3c/0x68
[   36.718586]  kasan_save_track+0x20/0x40
[   36.719059]  kasan_save_alloc_info+0x40/0x58
[   36.719194]  __kasan_kmalloc+0xd4/0xd8
[   36.719298]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.719415]  kasan_atomics+0xb8/0x2e0
[   36.721090]  kunit_try_run_case+0x170/0x3f0
[   36.721583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.722196]  kthread+0x328/0x630
[   36.722296]  ret_from_fork+0x10/0x20
[   36.722395] 
[   36.723294] The buggy address belongs to the object at fff00000c7805380
[   36.723294]  which belongs to the cache kmalloc-64 of size 64
[   36.724128] The buggy address is located 0 bytes to the right of
[   36.724128]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.724731] 
[   36.725173] The buggy address belongs to the physical page:
[   36.725293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.725418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.725700] page_type: f5(slab)
[   36.726606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.727460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.727565] page dumped because: kasan: bad access detected
[   36.727610] 
[   36.727635] Memory state around the buggy address:
[   36.727699]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.727807]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.727922] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.728126]                                      ^
[   36.728386]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.728544]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.728906] ==================================================================
[   36.729753] ==================================================================
[   36.729810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   36.729899] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.730000] 
[   36.730076] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.730302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.730378] Hardware name: linux,dummy-virt (DT)
[   36.730453] Call trace:
[   36.730517]  show_stack+0x20/0x38 (C)
[   36.731170]  dump_stack_lvl+0x8c/0xd0
[   36.731284]  print_report+0x118/0x608
[   36.731355]  kasan_report+0xdc/0x128
[   36.731447]  __asan_report_store8_noabort+0x20/0x30
[   36.731690]  kasan_atomics_helper+0x3e5c/0x4858
[   36.731826]  kasan_atomics+0x198/0x2e0
[   36.732182]  kunit_try_run_case+0x170/0x3f0
[   36.732321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.732584]  kthread+0x328/0x630
[   36.732740]  ret_from_fork+0x10/0x20
[   36.732860] 
[   36.732908] Allocated by task 277:
[   36.733079]  kasan_save_stack+0x3c/0x68
[   36.733487]  kasan_save_track+0x20/0x40
[   36.733629]  kasan_save_alloc_info+0x40/0x58
[   36.733730]  __kasan_kmalloc+0xd4/0xd8
[   36.733850]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.733977]  kasan_atomics+0xb8/0x2e0
[   36.734526]  kunit_try_run_case+0x170/0x3f0
[   36.734782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.734915]  kthread+0x328/0x630
[   36.735013]  ret_from_fork+0x10/0x20
[   36.735142] 
[   36.735190] The buggy address belongs to the object at fff00000c7805380
[   36.735190]  which belongs to the cache kmalloc-64 of size 64
[   36.735595] The buggy address is located 0 bytes to the right of
[   36.735595]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.735816] 
[   36.735886] The buggy address belongs to the physical page:
[   36.735964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.736134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.736266] page_type: f5(slab)
[   36.736737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.736897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.737151] page dumped because: kasan: bad access detected
[   36.737235] 
[   36.737320] Memory state around the buggy address:
[   36.737409]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.737528]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.737632] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.737727]                                      ^
[   36.737824]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.737963]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.738083] ==================================================================
[   36.910197] ==================================================================
[   36.910293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   36.910477] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.910654] 
[   36.910822] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.911453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.911616] Hardware name: linux,dummy-virt (DT)
[   36.911715] Call trace:
[   36.911883]  show_stack+0x20/0x38 (C)
[   36.912067]  dump_stack_lvl+0x8c/0xd0
[   36.912461]  print_report+0x118/0x608
[   36.912599]  kasan_report+0xdc/0x128
[   36.912730]  kasan_check_range+0x100/0x1a8
[   36.912852]  __kasan_check_write+0x20/0x30
[   36.913153]  kasan_atomics_helper+0x1414/0x4858
[   36.913293]  kasan_atomics+0x198/0x2e0
[   36.913441]  kunit_try_run_case+0x170/0x3f0
[   36.913571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.913715]  kthread+0x328/0x630
[   36.913825]  ret_from_fork+0x10/0x20
[   36.913941] 
[   36.913994] Allocated by task 277:
[   36.914509]  kasan_save_stack+0x3c/0x68
[   36.914641]  kasan_save_track+0x20/0x40
[   36.915477]  kasan_save_alloc_info+0x40/0x58
[   36.915864]  __kasan_kmalloc+0xd4/0xd8
[   36.916193]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.916411]  kasan_atomics+0xb8/0x2e0
[   36.916634]  kunit_try_run_case+0x170/0x3f0
[   36.916746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.917333]  kthread+0x328/0x630
[   36.917507]  ret_from_fork+0x10/0x20
[   36.918004] 
[   36.918160] The buggy address belongs to the object at fff00000c7805380
[   36.918160]  which belongs to the cache kmalloc-64 of size 64
[   36.918821] The buggy address is located 0 bytes to the right of
[   36.918821]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.918986] 
[   36.919314] The buggy address belongs to the physical page:
[   36.919451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.919577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.919951] page_type: f5(slab)
[   36.920287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.920649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.920758] page dumped because: kasan: bad access detected
[   36.920936] 
[   36.921007] Memory state around the buggy address:
[   36.921397]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.921516]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.922214] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.922328]                                      ^
[   36.922418]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.922764]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.923149] ==================================================================
[   36.480591] ==================================================================
[   36.480922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   36.481467] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.481659] 
[   36.481735] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.481931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.481999] Hardware name: linux,dummy-virt (DT)
[   36.482095] Call trace:
[   36.482150]  show_stack+0x20/0x38 (C)
[   36.482271]  dump_stack_lvl+0x8c/0xd0
[   36.482390]  print_report+0x118/0x608
[   36.482529]  kasan_report+0xdc/0x128
[   36.489268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.491413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.496129] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.498187]  kunit_try_run_case+0x170/0x3f0
[   36.499138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.499249]  kasan_atomics+0xb8/0x2e0
[   36.499348]  kunit_try_run_case+0x170/0x3f0
[   36.499445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.499615]  kthread+0x328/0x630
[   36.499750]  ret_from_fork+0x10/0x20
[   36.499934] 
[   36.499995] The buggy address belongs to the object at fff00000c7805380
[   36.499995]  which belongs to the cache kmalloc-64 of size 64
[   36.500345] The buggy address is located 0 bytes to the right of
[   36.500345]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.500500] 
[   36.500551] The buggy address belongs to the physical page:
[   36.500629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.500794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.500914] page_type: f5(slab)
[   36.501063] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.501246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.501365] page dumped because: kasan: bad access detected
[   36.501505] 
[   36.501594] Memory state around the buggy address:
[   36.501688]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.501812]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.501951] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.502219]                                      ^
[   36.502320]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.502435]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.502529] ==================================================================
[   36.815119] ==================================================================
[   36.815217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   36.815326] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.815444] 
[   36.815524] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.816069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.816264] Hardware name: linux,dummy-virt (DT)
[   36.816477] Call trace:
[   36.816640]  show_stack+0x20/0x38 (C)
[   36.816834]  dump_stack_lvl+0x8c/0xd0
[   36.816962]  print_report+0x118/0x608
[   36.817102]  kasan_report+0xdc/0x128
[   36.817231]  kasan_check_range+0x100/0x1a8
[   36.817462]  __kasan_check_write+0x20/0x30
[   36.817619]  kasan_atomics_helper+0x10c0/0x4858
[   36.817753]  kasan_atomics+0x198/0x2e0
[   36.817928]  kunit_try_run_case+0x170/0x3f0
[   36.818131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.818425]  kthread+0x328/0x630
[   36.818658]  ret_from_fork+0x10/0x20
[   36.818882] 
[   36.818937] Allocated by task 277:
[   36.819043]  kasan_save_stack+0x3c/0x68
[   36.819237]  kasan_save_track+0x20/0x40
[   36.819339]  kasan_save_alloc_info+0x40/0x58
[   36.819550]  __kasan_kmalloc+0xd4/0xd8
[   36.819666]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.819808]  kasan_atomics+0xb8/0x2e0
[   36.819969]  kunit_try_run_case+0x170/0x3f0
[   36.820049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.820347]  kthread+0x328/0x630
[   36.820450]  ret_from_fork+0x10/0x20
[   36.820711] 
[   36.820829] The buggy address belongs to the object at fff00000c7805380
[   36.820829]  which belongs to the cache kmalloc-64 of size 64
[   36.820990] The buggy address is located 0 bytes to the right of
[   36.820990]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.821435] 
[   36.821516] The buggy address belongs to the physical page:
[   36.821660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.821784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.821897] page_type: f5(slab)
[   36.822092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.822227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.822420] page dumped because: kasan: bad access detected
[   36.822514] 
[   36.822561] Memory state around the buggy address:
[   36.822672]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.822852]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.822998] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.823109]                                      ^
[   36.823204]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.823349]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.823443] ==================================================================
[   36.985326] ==================================================================
[   36.985451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   36.985622] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.985855] 
[   36.985965] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.986179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.986249] Hardware name: linux,dummy-virt (DT)
[   36.986321] Call trace:
[   36.986377]  show_stack+0x20/0x38 (C)
[   36.986493]  dump_stack_lvl+0x8c/0xd0
[   36.986629]  print_report+0x118/0x608
[   36.986763]  kasan_report+0xdc/0x128
[   36.986903]  __asan_report_load8_noabort+0x20/0x30
[   36.987066]  kasan_atomics_helper+0x3db0/0x4858
[   36.987203]  kasan_atomics+0x198/0x2e0
[   36.987355]  kunit_try_run_case+0x170/0x3f0
[   36.987501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.987652]  kthread+0x328/0x630
[   36.988088]  ret_from_fork+0x10/0x20
[   36.988280] 
[   36.988339] Allocated by task 277:
[   36.989212]  kasan_save_stack+0x3c/0x68
[   36.989347]  kasan_save_track+0x20/0x40
[   36.991017]  kasan_save_alloc_info+0x40/0x58
[   36.991173]  __kasan_kmalloc+0xd4/0xd8
[   36.991583]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.991703]  kasan_atomics+0xb8/0x2e0
[   36.991859]  kunit_try_run_case+0x170/0x3f0
[   36.992058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.992193]  kthread+0x328/0x630
[   36.992285]  ret_from_fork+0x10/0x20
[   36.992382] 
[   36.992431] The buggy address belongs to the object at fff00000c7805380
[   36.992431]  which belongs to the cache kmalloc-64 of size 64
[   36.992740] The buggy address is located 0 bytes to the right of
[   36.992740]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.992953] 
[   36.993122] The buggy address belongs to the physical page:
[   36.993241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.993428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.993569] page_type: f5(slab)
[   36.993711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.994047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.994151] page dumped because: kasan: bad access detected
[   36.994231] 
[   36.994288] Memory state around the buggy address:
[   36.994444]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.994643]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.994761] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.994868]                                      ^
[   36.994986]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.995336]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.995502] ==================================================================
[   36.954893] ==================================================================
[   36.955005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   36.955165] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.955297] 
[   36.955369] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.955574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.955646] Hardware name: linux,dummy-virt (DT)
[   36.955723] Call trace:
[   36.955780]  show_stack+0x20/0x38 (C)
[   36.955898]  dump_stack_lvl+0x8c/0xd0
[   36.956015]  print_report+0x118/0x608
[   36.956157]  kasan_report+0xdc/0x128
[   36.956269]  kasan_check_range+0x100/0x1a8
[   36.956386]  __kasan_check_write+0x20/0x30
[   36.956993]  kasan_atomics_helper+0x154c/0x4858
[   36.957148]  kasan_atomics+0x198/0x2e0
[   36.957291]  kunit_try_run_case+0x170/0x3f0
[   36.957442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.958066]  kthread+0x328/0x630
[   36.958282]  ret_from_fork+0x10/0x20
[   36.958540] 
[   36.958650] Allocated by task 277:
[   36.958755]  kasan_save_stack+0x3c/0x68
[   36.959253]  kasan_save_track+0x20/0x40
[   36.959359]  kasan_save_alloc_info+0x40/0x58
[   36.959455]  __kasan_kmalloc+0xd4/0xd8
[   36.959554]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.959669]  kasan_atomics+0xb8/0x2e0
[   36.959834]  kunit_try_run_case+0x170/0x3f0
[   36.960051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.960191]  kthread+0x328/0x630
[   36.960283]  ret_from_fork+0x10/0x20
[   36.960518] 
[   36.960656] The buggy address belongs to the object at fff00000c7805380
[   36.960656]  which belongs to the cache kmalloc-64 of size 64
[   36.960979] The buggy address is located 0 bytes to the right of
[   36.960979]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.961152] 
[   36.961203] The buggy address belongs to the physical page:
[   36.961279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.961399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.961512] page_type: f5(slab)
[   36.961705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.962011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.962128] page dumped because: kasan: bad access detected
[   36.962214] 
[   36.962272] Memory state around the buggy address:
[   36.962642]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.962816]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.962936] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.963049]                                      ^
[   36.963353]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.963476]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.963577] ==================================================================
[   36.771707] ==================================================================
[   36.772001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   36.772260] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.772392] 
[   36.772566] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.772917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.773008] Hardware name: linux,dummy-virt (DT)
[   36.773465] Call trace:
[   36.773537]  show_stack+0x20/0x38 (C)
[   36.773677]  dump_stack_lvl+0x8c/0xd0
[   36.774057]  print_report+0x118/0x608
[   36.774540]  kasan_report+0xdc/0x128
[   36.774756]  kasan_check_range+0x100/0x1a8
[   36.774888]  __kasan_check_write+0x20/0x30
[   36.775024]  kasan_atomics_helper+0xf88/0x4858
[   36.775714]  kasan_atomics+0x198/0x2e0
[   36.776222]  kunit_try_run_case+0x170/0x3f0
[   36.776575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.776915]  kthread+0x328/0x630
[   36.777307]  ret_from_fork+0x10/0x20
[   36.777769] 
[   36.777846] Allocated by task 277:
[   36.778109]  kasan_save_stack+0x3c/0x68
[   36.778222]  kasan_save_track+0x20/0x40
[   36.778321]  kasan_save_alloc_info+0x40/0x58
[   36.778479]  __kasan_kmalloc+0xd4/0xd8
[   36.778735]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.779148]  kasan_atomics+0xb8/0x2e0
[   36.779870]  kunit_try_run_case+0x170/0x3f0
[   36.780191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.780339]  kthread+0x328/0x630
[   36.780494]  ret_from_fork+0x10/0x20
[   36.780599] 
[   36.780660] The buggy address belongs to the object at fff00000c7805380
[   36.780660]  which belongs to the cache kmalloc-64 of size 64
[   36.780800] The buggy address is located 0 bytes to the right of
[   36.780800]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.781011] 
[   36.781084] The buggy address belongs to the physical page:
[   36.781215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.781567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.781728] page_type: f5(slab)
[   36.781821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.781957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.782336] page dumped because: kasan: bad access detected
[   36.782432] 
[   36.782550] Memory state around the buggy address:
[   36.782974]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.783109]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.783233] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.783612]                                      ^
[   36.783889]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.784230]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.784347] ==================================================================
[   36.964080] ==================================================================
[   36.964261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   36.964393] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.964508] 
[   36.964606] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.964944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.965014] Hardware name: linux,dummy-virt (DT)
[   36.965115] Call trace:
[   36.965278]  show_stack+0x20/0x38 (C)
[   36.965580]  dump_stack_lvl+0x8c/0xd0
[   36.965701]  print_report+0x118/0x608
[   36.965999]  kasan_report+0xdc/0x128
[   36.966148]  kasan_check_range+0x100/0x1a8
[   36.966369]  __kasan_check_write+0x20/0x30
[   36.966651]  kasan_atomics_helper+0x15b4/0x4858
[   36.966813]  kasan_atomics+0x198/0x2e0
[   36.967530]  kunit_try_run_case+0x170/0x3f0
[   36.967714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.968659]  kthread+0x328/0x630
[   36.968788]  ret_from_fork+0x10/0x20
[   36.969896] 
[   36.970063] Allocated by task 277:
[   36.970353]  kasan_save_stack+0x3c/0x68
[   36.970466]  kasan_save_track+0x20/0x40
[   36.971422]  kasan_save_alloc_info+0x40/0x58
[   36.972193]  __kasan_kmalloc+0xd4/0xd8
[   36.972359]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.972578]  kasan_atomics+0xb8/0x2e0
[   36.972846]  kunit_try_run_case+0x170/0x3f0
[   36.973703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.973861]  kthread+0x328/0x630
[   36.974663]  ret_from_fork+0x10/0x20
[   36.975391] 
[   36.975456] The buggy address belongs to the object at fff00000c7805380
[   36.975456]  which belongs to the cache kmalloc-64 of size 64
[   36.975599] The buggy address is located 0 bytes to the right of
[   36.975599]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.976306] 
[   36.976811] The buggy address belongs to the physical page:
[   36.977058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.977465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.977674] page_type: f5(slab)
[   36.977764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.977886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.979544] page dumped because: kasan: bad access detected
[   36.979910] 
[   36.979963] Memory state around the buggy address:
[   36.980061]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.981607]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.982519] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.982896]                                      ^
[   36.983294]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.983713]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.984135] ==================================================================
[   36.691694] ==================================================================
[   36.691795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   36.692057] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.692284] 
[   36.692360] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.692560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.692630] Hardware name: linux,dummy-virt (DT)
[   36.692704] Call trace:
[   36.692759]  show_stack+0x20/0x38 (C)
[   36.692876]  dump_stack_lvl+0x8c/0xd0
[   36.692987]  print_report+0x118/0x608
[   36.693129]  kasan_report+0xdc/0x128
[   36.693249]  kasan_check_range+0x100/0x1a8
[   36.693371]  __kasan_check_read+0x20/0x30
[   36.693481]  kasan_atomics_helper+0xdd4/0x4858
[   36.693602]  kasan_atomics+0x198/0x2e0
[   36.693717]  kunit_try_run_case+0x170/0x3f0
[   36.693834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.693963]  kthread+0x328/0x630
[   36.694102]  ret_from_fork+0x10/0x20
[   36.694250] 
[   36.694310] Allocated by task 277:
[   36.694397]  kasan_save_stack+0x3c/0x68
[   36.694516]  kasan_save_track+0x20/0x40
[   36.695168]  kasan_save_alloc_info+0x40/0x58
[   36.695503]  __kasan_kmalloc+0xd4/0xd8
[   36.695622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.695743]  kasan_atomics+0xb8/0x2e0
[   36.695844]  kunit_try_run_case+0x170/0x3f0
[   36.696703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.696919]  kthread+0x328/0x630
[   36.697112]  ret_from_fork+0x10/0x20
[   36.697280] 
[   36.697346] The buggy address belongs to the object at fff00000c7805380
[   36.697346]  which belongs to the cache kmalloc-64 of size 64
[   36.698015] The buggy address is located 0 bytes to the right of
[   36.698015]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.698225] 
[   36.698339] The buggy address belongs to the physical page:
[   36.698416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.698539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.698736] page_type: f5(slab)
[   36.699375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.699546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.699716] page dumped because: kasan: bad access detected
[   36.699803] 
[   36.699855] Memory state around the buggy address:
[   36.699934]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.700054]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.700163] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.700288]                                      ^
[   36.700532]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.700715]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.700810] ==================================================================
[   36.551976] ==================================================================
[   36.552098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   36.552217] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.552341] 
[   36.552466] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.552687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.552982]  show_stack+0x20/0x38 (C)
[   36.555108]  kunit_try_run_case+0x170/0x3f0
[   36.556672]  __kasan_kmalloc+0xd4/0xd8
[   36.557734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.558109]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.560429] ==================================================================
[   36.701198] ==================================================================
[   36.701309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   36.701445] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.701570] 
[   36.701647] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.702521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.703149] Hardware name: linux,dummy-virt (DT)
[   36.703435] Call trace:
[   36.703506]  show_stack+0x20/0x38 (C)
[   36.703820]  dump_stack_lvl+0x8c/0xd0
[   36.703949]  print_report+0x118/0x608
[   36.704136]  kasan_report+0xdc/0x128
[   36.704500]  __asan_report_load8_noabort+0x20/0x30
[   36.704667]  kasan_atomics_helper+0x3f58/0x4858
[   36.705047]  kasan_atomics+0x198/0x2e0
[   36.705356]  kunit_try_run_case+0x170/0x3f0
[   36.705477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.705613]  kthread+0x328/0x630
[   36.705778]  ret_from_fork+0x10/0x20
[   36.705965] 
[   36.706076] Allocated by task 277:
[   36.706160]  kasan_save_stack+0x3c/0x68
[   36.706315]  kasan_save_track+0x20/0x40
[   36.707175]  kasan_save_alloc_info+0x40/0x58
[   36.707291]  __kasan_kmalloc+0xd4/0xd8
[   36.707414]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.707617]  kasan_atomics+0xb8/0x2e0
[   36.707928]  kunit_try_run_case+0x170/0x3f0
[   36.708062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.708337]  kthread+0x328/0x630
[   36.708563]  ret_from_fork+0x10/0x20
[   36.708829] 
[   36.708894] The buggy address belongs to the object at fff00000c7805380
[   36.708894]  which belongs to the cache kmalloc-64 of size 64
[   36.709189] The buggy address is located 0 bytes to the right of
[   36.709189]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.709346] 
[   36.709404] The buggy address belongs to the physical page:
[   36.709607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.709734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.710011] page_type: f5(slab)
[   36.710259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.710382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.710479] page dumped because: kasan: bad access detected
[   36.710616] 
[   36.710673] Memory state around the buggy address:
[   36.710806]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.710966]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.711739] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.712094]                                      ^
[   36.712532]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.712644]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.712994] ==================================================================
[   36.939363] ==================================================================
[   36.939497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   36.939610] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.939729] 
[   36.939799] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.939995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.940172] Hardware name: linux,dummy-virt (DT)
[   36.940382] Call trace:
[   36.940554]  show_stack+0x20/0x38 (C)
[   36.940875]  dump_stack_lvl+0x8c/0xd0
[   36.941162]  print_report+0x118/0x608
[   36.941415]  kasan_report+0xdc/0x128
[   36.941608]  kasan_check_range+0x100/0x1a8
[   36.941974]  __kasan_check_write+0x20/0x30
[   36.942211]  kasan_atomics_helper+0x14e4/0x4858
[   36.942336]  kasan_atomics+0x198/0x2e0
[   36.942453]  kunit_try_run_case+0x170/0x3f0
[   36.942621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.942786]  kthread+0x328/0x630
[   36.943210]  ret_from_fork+0x10/0x20
[   36.943356] 
[   36.943415] Allocated by task 277:
[   36.943499]  kasan_save_stack+0x3c/0x68
[   36.943607]  kasan_save_track+0x20/0x40
[   36.943711]  kasan_save_alloc_info+0x40/0x58
[   36.943919]  __kasan_kmalloc+0xd4/0xd8
[   36.944048]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.944305]  kasan_atomics+0xb8/0x2e0
[   36.944526]  kunit_try_run_case+0x170/0x3f0
[   36.944636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.944745]  kthread+0x328/0x630
[   36.944878]  ret_from_fork+0x10/0x20
[   36.945061] 
[   36.945119] The buggy address belongs to the object at fff00000c7805380
[   36.945119]  which belongs to the cache kmalloc-64 of size 64
[   36.945291] The buggy address is located 0 bytes to the right of
[   36.945291]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.945551] 
[   36.945660] The buggy address belongs to the physical page:
[   36.945760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.946477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.947242] page_type: f5(slab)
[   36.947873] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.948179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.949500] page dumped because: kasan: bad access detected
[   36.949597] 
[   36.949648] Memory state around the buggy address:
[   36.950391]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.950860]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.950973] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.951478]                                      ^
[   36.951610]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.951734]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.952418] ==================================================================
[   37.039236] ==================================================================
[   37.039348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   37.039606] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.039732] 
[   37.039809] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.040400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.040471] Hardware name: linux,dummy-virt (DT)
[   37.040547] Call trace:
[   37.040601]  show_stack+0x20/0x38 (C)
[   37.040719]  dump_stack_lvl+0x8c/0xd0
[   37.040829]  print_report+0x118/0x608
[   37.040955]  kasan_report+0xdc/0x128
[   37.041102]  kasan_check_range+0x100/0x1a8
[   37.041219]  __kasan_check_write+0x20/0x30
[   37.041397]  kasan_atomics_helper+0x175c/0x4858
[   37.041577]  kasan_atomics+0x198/0x2e0
[   37.041721]  kunit_try_run_case+0x170/0x3f0
[   37.041855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.041980]  kthread+0x328/0x630
[   37.042147]  ret_from_fork+0x10/0x20
[   37.042290] 
[   37.042580] Allocated by task 277:
[   37.042673]  kasan_save_stack+0x3c/0x68
[   37.042783]  kasan_save_track+0x20/0x40
[   37.042875]  kasan_save_alloc_info+0x40/0x58
[   37.042960]  __kasan_kmalloc+0xd4/0xd8
[   37.043011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.043127]  kasan_atomics+0xb8/0x2e0
[   37.043212]  kunit_try_run_case+0x170/0x3f0
[   37.043378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.043755]  kthread+0x328/0x630
[   37.044411]  ret_from_fork+0x10/0x20
[   37.044682] 
[   37.044745] The buggy address belongs to the object at fff00000c7805380
[   37.044745]  which belongs to the cache kmalloc-64 of size 64
[   37.045345] The buggy address is located 0 bytes to the right of
[   37.045345]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.045545] 
[   37.046051] The buggy address belongs to the physical page:
[   37.046480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.046780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.047338] page_type: f5(slab)
[   37.047481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.047715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.047837] page dumped because: kasan: bad access detected
[   37.047921] 
[   37.048016] Memory state around the buggy address:
[   37.048197]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.048307]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.048489] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.048757]                                      ^
[   37.048957]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.049084]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.049181] ==================================================================
[   37.049520] ==================================================================
[   37.049628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   37.050716] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.050844] 
[   37.050886] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.051069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.051132] Hardware name: linux,dummy-virt (DT)
[   37.051196] Call trace:
[   37.051225]  show_stack+0x20/0x38 (C)
[   37.051290]  dump_stack_lvl+0x8c/0xd0
[   37.051349]  print_report+0x118/0x608
[   37.051413]  kasan_report+0xdc/0x128
[   37.051471]  __asan_report_load8_noabort+0x20/0x30
[   37.051532]  kasan_atomics_helper+0x3e20/0x4858
[   37.051591]  kasan_atomics+0x198/0x2e0
[   37.051646]  kunit_try_run_case+0x170/0x3f0
[   37.051704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.051770]  kthread+0x328/0x630
[   37.051823]  ret_from_fork+0x10/0x20
[   37.051883] 
[   37.051909] Allocated by task 277:
[   37.051945]  kasan_save_stack+0x3c/0x68
[   37.052001]  kasan_save_track+0x20/0x40
[   37.052237]  kasan_save_alloc_info+0x40/0x58
[   37.052770]  __kasan_kmalloc+0xd4/0xd8
[   37.052870]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.052975]  kasan_atomics+0xb8/0x2e0
[   37.053087]  kunit_try_run_case+0x170/0x3f0
[   37.053196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.053320]  kthread+0x328/0x630
[   37.053416]  ret_from_fork+0x10/0x20
[   37.053505] 
[   37.053556] The buggy address belongs to the object at fff00000c7805380
[   37.053556]  which belongs to the cache kmalloc-64 of size 64
[   37.053692] The buggy address is located 0 bytes to the right of
[   37.053692]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.055002] 
[   37.055108] The buggy address belongs to the physical page:
[   37.055195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.055337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.056509] page_type: f5(slab)
[   37.056902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.057042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.058357] page dumped because: kasan: bad access detected
[   37.058486] 
[   37.058604] Memory state around the buggy address:
[   37.058689]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.058798]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.058996] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.059112]                                      ^
[   37.059892]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.060464]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.060607] ==================================================================
[   36.924069] ==================================================================
[   36.924170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   36.924280] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.924395] 
[   36.924461] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.924658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.924726] Hardware name: linux,dummy-virt (DT)
[   36.924795] Call trace:
[   36.924852]  show_stack+0x20/0x38 (C)
[   36.924967]  dump_stack_lvl+0x8c/0xd0
[   36.925107]  print_report+0x118/0x608
[   36.925228]  kasan_report+0xdc/0x128
[   36.925340]  kasan_check_range+0x100/0x1a8
[   36.925457]  __kasan_check_write+0x20/0x30
[   36.925573]  kasan_atomics_helper+0x147c/0x4858
[   36.925697]  kasan_atomics+0x198/0x2e0
[   36.925813]  kunit_try_run_case+0x170/0x3f0
[   36.931271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.931428]  kthread+0x328/0x630
[   36.932555]  ret_from_fork+0x10/0x20
[   36.932712] 
[   36.932773] Allocated by task 277:
[   36.932999]  kasan_save_stack+0x3c/0x68
[   36.933809]  kasan_save_track+0x20/0x40
[   36.933976]  kasan_save_alloc_info+0x40/0x58
[   36.934605]  __kasan_kmalloc+0xd4/0xd8
[   36.934729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.934868]  kasan_atomics+0xb8/0x2e0
[   36.934980]  kunit_try_run_case+0x170/0x3f0
[   36.935130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.935353]  kthread+0x328/0x630
[   36.935506]  ret_from_fork+0x10/0x20
[   36.935644] 
[   36.935697] The buggy address belongs to the object at fff00000c7805380
[   36.935697]  which belongs to the cache kmalloc-64 of size 64
[   36.935928] The buggy address is located 0 bytes to the right of
[   36.935928]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.936145] 
[   36.936227] The buggy address belongs to the physical page:
[   36.936437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.936714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.936832] page_type: f5(slab)
[   36.936947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.937101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.937213] page dumped because: kasan: bad access detected
[   36.937307] 
[   36.937366] Memory state around the buggy address:
[   36.937618]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.937781]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.938238] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.938433]                                      ^
[   36.938530]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.938776]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.938914] ==================================================================
[   37.021059] ==================================================================
[   37.021157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   37.021286] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.021583] 
[   37.021784] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.022349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.022444] Hardware name: linux,dummy-virt (DT)
[   37.022516] Call trace:
[   37.022637]  show_stack+0x20/0x38 (C)
[   37.022760]  dump_stack_lvl+0x8c/0xd0
[   37.022940]  print_report+0x118/0x608
[   37.023165]  kasan_report+0xdc/0x128
[   37.023287]  kasan_check_range+0x100/0x1a8
[   37.023418]  __kasan_check_write+0x20/0x30
[   37.023568]  kasan_atomics_helper+0x16d0/0x4858
[   37.023845]  kasan_atomics+0x198/0x2e0
[   37.024083]  kunit_try_run_case+0x170/0x3f0
[   37.024215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.024348]  kthread+0x328/0x630
[   37.024456]  ret_from_fork+0x10/0x20
[   37.024571] 
[   37.024623] Allocated by task 277:
[   37.024726]  kasan_save_stack+0x3c/0x68
[   37.024979]  kasan_save_track+0x20/0x40
[   37.025113]  kasan_save_alloc_info+0x40/0x58
[   37.025265]  __kasan_kmalloc+0xd4/0xd8
[   37.025369]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.025484]  kasan_atomics+0xb8/0x2e0
[   37.025640]  kunit_try_run_case+0x170/0x3f0
[   37.025838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.025971]  kthread+0x328/0x630
[   37.026081]  ret_from_fork+0x10/0x20
[   37.026175] 
[   37.026228] The buggy address belongs to the object at fff00000c7805380
[   37.026228]  which belongs to the cache kmalloc-64 of size 64
[   37.026363] The buggy address is located 0 bytes to the right of
[   37.026363]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.026772] 
[   37.026829] The buggy address belongs to the physical page:
[   37.026906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.027024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.027158] page_type: f5(slab)
[   37.027301] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.027520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.027815] page dumped because: kasan: bad access detected
[   37.028064] 
[   37.028199] Memory state around the buggy address:
[   37.028279]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.028428]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.028537] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.028770]                                      ^
[   37.028900]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.029385]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.029984] ==================================================================
[   36.739783] ==================================================================
[   36.741079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   36.741218] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.741334] 
[   36.741405] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.741607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.741762] Hardware name: linux,dummy-virt (DT)
[   36.741849] Call trace:
[   36.742380]  show_stack+0x20/0x38 (C)
[   36.742520]  dump_stack_lvl+0x8c/0xd0
[   36.743869]  print_report+0x118/0x608
[   36.743983]  kasan_report+0xdc/0x128
[   36.744487]  kasan_check_range+0x100/0x1a8
[   36.744679]  __kasan_check_write+0x20/0x30
[   36.744805]  kasan_atomics_helper+0xeb8/0x4858
[   36.744934]  kasan_atomics+0x198/0x2e0
[   36.745325]  kunit_try_run_case+0x170/0x3f0
[   36.745673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.746365]  kthread+0x328/0x630
[   36.746758]  ret_from_fork+0x10/0x20
[   36.747603] 
[   36.747643] Allocated by task 277:
[   36.747705]  kasan_save_stack+0x3c/0x68
[   36.747815]  kasan_save_track+0x20/0x40
[   36.747878]  kasan_save_alloc_info+0x40/0x58
[   36.747929]  __kasan_kmalloc+0xd4/0xd8
[   36.747977]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.748055]  kasan_atomics+0xb8/0x2e0
[   36.748479]  kunit_try_run_case+0x170/0x3f0
[   36.748612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.748734]  kthread+0x328/0x630
[   36.749093]  ret_from_fork+0x10/0x20
[   36.749808] 
[   36.750210] The buggy address belongs to the object at fff00000c7805380
[   36.750210]  which belongs to the cache kmalloc-64 of size 64
[   36.750935] The buggy address is located 0 bytes to the right of
[   36.750935]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.751181] 
[   36.751236] The buggy address belongs to the physical page:
[   36.751660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.752177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.752318] page_type: f5(slab)
[   36.752411] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.752537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.752880] page dumped because: kasan: bad access detected
[   36.753159] 
[   36.753257] Memory state around the buggy address:
[   36.753444]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.753985]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.754212] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.754873]                                      ^
[   36.755013]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.755332]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.755437] ==================================================================
[   37.030468] ==================================================================
[   37.030621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   37.030730] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.030959] 
[   37.031040] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.031431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.031535] Hardware name: linux,dummy-virt (DT)
[   37.031615] Call trace:
[   37.031710]  show_stack+0x20/0x38 (C)
[   37.031830]  dump_stack_lvl+0x8c/0xd0
[   37.032142]  print_report+0x118/0x608
[   37.032335]  kasan_report+0xdc/0x128
[   37.032497]  __asan_report_load8_noabort+0x20/0x30
[   37.032630]  kasan_atomics_helper+0x3e10/0x4858
[   37.033003]  kasan_atomics+0x198/0x2e0
[   37.033141]  kunit_try_run_case+0x170/0x3f0
[   37.033266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.033469]  kthread+0x328/0x630
[   37.033673]  ret_from_fork+0x10/0x20
[   37.033788] 
[   37.033866] Allocated by task 277:
[   37.033983]  kasan_save_stack+0x3c/0x68
[   37.034159]  kasan_save_track+0x20/0x40
[   37.034436]  kasan_save_alloc_info+0x40/0x58
[   37.034630]  __kasan_kmalloc+0xd4/0xd8
[   37.034726]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.034909]  kasan_atomics+0xb8/0x2e0
[   37.035069]  kunit_try_run_case+0x170/0x3f0
[   37.035172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.035276]  kthread+0x328/0x630
[   37.035380]  ret_from_fork+0x10/0x20
[   37.035516] 
[   37.035563] The buggy address belongs to the object at fff00000c7805380
[   37.035563]  which belongs to the cache kmalloc-64 of size 64
[   37.035945] The buggy address is located 0 bytes to the right of
[   37.035945]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.036194] 
[   37.036309] The buggy address belongs to the physical page:
[   37.036453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.036750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.036871] page_type: f5(slab)
[   37.037016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.037156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.037250] page dumped because: kasan: bad access detected
[   37.037344] 
[   37.037402] Memory state around the buggy address:
[   37.037487]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.037667]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.037821] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.037927]                                      ^
[   37.038007]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.038149]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.038477] ==================================================================
[   36.891690] ==================================================================
[   36.891886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   36.892019] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.892731] 
[   36.892822] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.893042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.893126] Hardware name: linux,dummy-virt (DT)
[   36.893385] Call trace:
[   36.893488]  show_stack+0x20/0x38 (C)
[   36.893629]  dump_stack_lvl+0x8c/0xd0
[   36.893999]  print_report+0x118/0x608
[   36.894157]  kasan_report+0xdc/0x128
[   36.894350]  kasan_check_range+0x100/0x1a8
[   36.894495]  __kasan_check_write+0x20/0x30
[   36.894643]  kasan_atomics_helper+0x1384/0x4858
[   36.895132]  kasan_atomics+0x198/0x2e0
[   36.895457]  kunit_try_run_case+0x170/0x3f0
[   36.895599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.896052]  kthread+0x328/0x630
[   36.896484]  ret_from_fork+0x10/0x20
[   36.896854] 
[   36.897141] Allocated by task 277:
[   36.897221]  kasan_save_stack+0x3c/0x68
[   36.897417]  kasan_save_track+0x20/0x40
[   36.897718]  kasan_save_alloc_info+0x40/0x58
[   36.898114]  __kasan_kmalloc+0xd4/0xd8
[   36.898407]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.898661]  kasan_atomics+0xb8/0x2e0
[   36.898885]  kunit_try_run_case+0x170/0x3f0
[   36.899008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.899463]  kthread+0x328/0x630
[   36.899570]  ret_from_fork+0x10/0x20
[   36.899683] 
[   36.899800] The buggy address belongs to the object at fff00000c7805380
[   36.899800]  which belongs to the cache kmalloc-64 of size 64
[   36.899942] The buggy address is located 0 bytes to the right of
[   36.899942]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.900133] 
[   36.900207] The buggy address belongs to the physical page:
[   36.900286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.900409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.900521] page_type: f5(slab)
[   36.900610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.900731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.900827] page dumped because: kasan: bad access detected
[   36.900905] 
[   36.900952] Memory state around the buggy address:
[   36.901410]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.901750]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.901896] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.902118]                                      ^
[   36.902351]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.903323]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.903426] ==================================================================
[   36.785234] ==================================================================
[   36.785336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   36.785454] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.785575] 
[   36.785896] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.786734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.786853] Hardware name: linux,dummy-virt (DT)
[   36.786932] Call trace:
[   36.787371]  show_stack+0x20/0x38 (C)
[   36.787690]  dump_stack_lvl+0x8c/0xd0
[   36.788101]  print_report+0x118/0x608
[   36.788628]  kasan_report+0xdc/0x128
[   36.789100]  kasan_check_range+0x100/0x1a8
[   36.789372]  __kasan_check_write+0x20/0x30
[   36.789628]  kasan_atomics_helper+0xff0/0x4858
[   36.789772]  kasan_atomics+0x198/0x2e0
[   36.789889]  kunit_try_run_case+0x170/0x3f0
[   36.790461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.790762]  kthread+0x328/0x630
[   36.791019]  ret_from_fork+0x10/0x20
[   36.791202] 
[   36.791310] Allocated by task 277:
[   36.791382]  kasan_save_stack+0x3c/0x68
[   36.791486]  kasan_save_track+0x20/0x40
[   36.791581]  kasan_save_alloc_info+0x40/0x58
[   36.791689]  __kasan_kmalloc+0xd4/0xd8
[   36.791831]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.792107]  kasan_atomics+0xb8/0x2e0
[   36.792257]  kunit_try_run_case+0x170/0x3f0
[   36.792370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.792636]  kthread+0x328/0x630
[   36.792801]  ret_from_fork+0x10/0x20
[   36.792900] 
[   36.792954] The buggy address belongs to the object at fff00000c7805380
[   36.792954]  which belongs to the cache kmalloc-64 of size 64
[   36.793104] The buggy address is located 0 bytes to the right of
[   36.793104]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.793278] 
[   36.793341] The buggy address belongs to the physical page:
[   36.793424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.794295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.794494] page_type: f5(slab)
[   36.794694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.794795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.794849] page dumped because: kasan: bad access detected
[   36.794909] 
[   36.794963] Memory state around the buggy address:
[   36.795016]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.795828]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.795969] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.796022]                                      ^
[   36.796098]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.796208]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.796260] ==================================================================
[   36.648826] ==================================================================
[   36.648929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   36.649066] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.649218] 
[   36.649352] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.649765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.649926] Hardware name: linux,dummy-virt (DT)
[   36.650005] Call trace:
[   36.650089]  show_stack+0x20/0x38 (C)
[   36.650215]  dump_stack_lvl+0x8c/0xd0
[   36.650470]  print_report+0x118/0x608
[   36.651088]  kasan_report+0xdc/0x128
[   36.652131]  kasan_check_range+0x100/0x1a8
[   36.652559]  __kasan_check_write+0x20/0x30
[   36.653389]  kasan_atomics_helper+0xd3c/0x4858
[   36.653523]  kasan_atomics+0x198/0x2e0
[   36.654137]  kunit_try_run_case+0x170/0x3f0
[   36.655235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.655717]  kthread+0x328/0x630
[   36.656349]  ret_from_fork+0x10/0x20
[   36.656479] 
[   36.657413] Allocated by task 277:
[   36.657727]  kasan_save_stack+0x3c/0x68
[   36.658275]  kasan_save_track+0x20/0x40
[   36.658447]  kasan_save_alloc_info+0x40/0x58
[   36.659244]  __kasan_kmalloc+0xd4/0xd8
[   36.659788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.659905]  kasan_atomics+0xb8/0x2e0
[   36.660007]  kunit_try_run_case+0x170/0x3f0
[   36.661062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.661766]  kthread+0x328/0x630
[   36.662068]  ret_from_fork+0x10/0x20
[   36.662852] 
[   36.662944] The buggy address belongs to the object at fff00000c7805380
[   36.662944]  which belongs to the cache kmalloc-64 of size 64
[   36.663256] The buggy address is located 0 bytes to the right of
[   36.663256]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.664203] 
[   36.664509] The buggy address belongs to the physical page:
[   36.664591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.664714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.664824] page_type: f5(slab)
[   36.667452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.667987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.668283] page dumped because: kasan: bad access detected
[   36.668671] 
[   36.669265] Memory state around the buggy address:
[   36.669736]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.670499]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.670854] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.671769]                                      ^
[   36.671945]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.672074]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.673402] ==================================================================
[   37.063446] ==================================================================
[   37.063549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   37.063912] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.064063] 
[   37.064257] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.064841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.064913] Hardware name: linux,dummy-virt (DT)
[   37.066414] Call trace:
[   37.066506]  show_stack+0x20/0x38 (C)
[   37.066678]  dump_stack_lvl+0x8c/0xd0
[   37.067271]  print_report+0x118/0x608
[   37.067497]  kasan_report+0xdc/0x128
[   37.067832]  kasan_check_range+0x100/0x1a8
[   37.067987]  __kasan_check_write+0x20/0x30
[   37.068173]  kasan_atomics_helper+0x17ec/0x4858
[   37.068356]  kasan_atomics+0x198/0x2e0
[   37.068478]  kunit_try_run_case+0x170/0x3f0
[   37.068612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.069001]  kthread+0x328/0x630
[   37.069155]  ret_from_fork+0x10/0x20
[   37.069282] 
[   37.069330] Allocated by task 277:
[   37.069401]  kasan_save_stack+0x3c/0x68
[   37.069611]  kasan_save_track+0x20/0x40
[   37.069857]  kasan_save_alloc_info+0x40/0x58
[   37.069972]  __kasan_kmalloc+0xd4/0xd8
[   37.070729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.070872]  kasan_atomics+0xb8/0x2e0
[   37.070987]  kunit_try_run_case+0x170/0x3f0
[   37.071124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.071327]  kthread+0x328/0x630
[   37.071440]  ret_from_fork+0x10/0x20
[   37.071542] 
[   37.071603] The buggy address belongs to the object at fff00000c7805380
[   37.071603]  which belongs to the cache kmalloc-64 of size 64
[   37.071745] The buggy address is located 0 bytes to the right of
[   37.071745]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.071897] 
[   37.071953] The buggy address belongs to the physical page:
[   37.072047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.072635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.073193] page_type: f5(slab)
[   37.073365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.073569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.073675] page dumped because: kasan: bad access detected
[   37.074145] 
[   37.074198] Memory state around the buggy address:
[   37.074432]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.074926]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.075211] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.075547]                                      ^
[   37.075668]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.075775]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.075870] ==================================================================
[   36.877669] ==================================================================
[   36.877976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   36.878312] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.878498] 
[   36.878656] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.878868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.878943] Hardware name: linux,dummy-virt (DT)
[   36.879162] Call trace:
[   36.879223]  show_stack+0x20/0x38 (C)
[   36.879520]  dump_stack_lvl+0x8c/0xd0
[   36.879647]  print_report+0x118/0x608
[   36.880062]  kasan_report+0xdc/0x128
[   36.880301]  kasan_check_range+0x100/0x1a8
[   36.880469]  __kasan_check_write+0x20/0x30
[   36.880595]  kasan_atomics_helper+0x12d8/0x4858
[   36.880725]  kasan_atomics+0x198/0x2e0
[   36.880845]  kunit_try_run_case+0x170/0x3f0
[   36.880986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.881164]  kthread+0x328/0x630
[   36.881738]  ret_from_fork+0x10/0x20
[   36.882110] 
[   36.882178] Allocated by task 277:
[   36.882272]  kasan_save_stack+0x3c/0x68
[   36.882448]  kasan_save_track+0x20/0x40
[   36.883188]  kasan_save_alloc_info+0x40/0x58
[   36.883635]  __kasan_kmalloc+0xd4/0xd8
[   36.884022]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.884191]  kasan_atomics+0xb8/0x2e0
[   36.884298]  kunit_try_run_case+0x170/0x3f0
[   36.884402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.884514]  kthread+0x328/0x630
[   36.884599]  ret_from_fork+0x10/0x20
[   36.884786] 
[   36.885153] The buggy address belongs to the object at fff00000c7805380
[   36.885153]  which belongs to the cache kmalloc-64 of size 64
[   36.885359] The buggy address is located 0 bytes to the right of
[   36.885359]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.886207] 
[   36.886639] The buggy address belongs to the physical page:
[   36.886825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.887155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.887754] page_type: f5(slab)
[   36.887953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.888299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.888411] page dumped because: kasan: bad access detected
[   36.888492] 
[   36.889064] Memory state around the buggy address:
[   36.889801]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.890056]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.890172] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.890267]                                      ^
[   36.890414]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.890524]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.890624] ==================================================================
[   36.823905] ==================================================================
[   36.824081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   36.824267] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.824546] 
[   36.824682] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.824932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.825079] Hardware name: linux,dummy-virt (DT)
[   36.825157] Call trace:
[   36.825353]  show_stack+0x20/0x38 (C)
[   36.825550]  dump_stack_lvl+0x8c/0xd0
[   36.825731]  print_report+0x118/0x608
[   36.825928]  kasan_report+0xdc/0x128
[   36.826067]  kasan_check_range+0x100/0x1a8
[   36.826193]  __kasan_check_write+0x20/0x30
[   36.826308]  kasan_atomics_helper+0x1128/0x4858
[   36.826427]  kasan_atomics+0x198/0x2e0
[   36.826600]  kunit_try_run_case+0x170/0x3f0
[   36.826727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.826898]  kthread+0x328/0x630
[   36.827141]  ret_from_fork+0x10/0x20
[   36.827280] 
[   36.827335] Allocated by task 277:
[   36.827407]  kasan_save_stack+0x3c/0x68
[   36.827606]  kasan_save_track+0x20/0x40
[   36.827746]  kasan_save_alloc_info+0x40/0x58
[   36.827895]  __kasan_kmalloc+0xd4/0xd8
[   36.828095]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.828206]  kasan_atomics+0xb8/0x2e0
[   36.828398]  kunit_try_run_case+0x170/0x3f0
[   36.828539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.828664]  kthread+0x328/0x630
[   36.828756]  ret_from_fork+0x10/0x20
[   36.828920] 
[   36.829010] The buggy address belongs to the object at fff00000c7805380
[   36.829010]  which belongs to the cache kmalloc-64 of size 64
[   36.829177] The buggy address is located 0 bytes to the right of
[   36.829177]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.829365] 
[   36.829420] The buggy address belongs to the physical page:
[   36.829493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.829637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.829917] page_type: f5(slab)
[   36.830013] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.830153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.830272] page dumped because: kasan: bad access detected
[   36.830368] 
[   36.830479] Memory state around the buggy address:
[   36.830675]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.830810]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.830915] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.831011]                                      ^
[   36.831160]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.831282]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.831440] ==================================================================
[   36.859612] ==================================================================
[   36.859710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   36.859825] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.859941] 
[   36.860817] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.861406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.861475] Hardware name: linux,dummy-virt (DT)
[   36.862044] Call trace:
[   36.862440]  show_stack+0x20/0x38 (C)
[   36.862739]  dump_stack_lvl+0x8c/0xd0
[   36.862869]  print_report+0x118/0x608
[   36.862988]  kasan_report+0xdc/0x128
[   36.864291]  kasan_check_range+0x100/0x1a8
[   36.865209]  __kasan_check_write+0x20/0x30
[   36.865674]  kasan_atomics_helper+0x126c/0x4858
[   36.865951]  kasan_atomics+0x198/0x2e0
[   36.866090]  kunit_try_run_case+0x170/0x3f0
[   36.866217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.866656]  kthread+0x328/0x630
[   36.866983]  ret_from_fork+0x10/0x20
[   36.867225] 
[   36.867441] Allocated by task 277:
[   36.868047]  kasan_save_stack+0x3c/0x68
[   36.868382]  kasan_save_track+0x20/0x40
[   36.868734]  kasan_save_alloc_info+0x40/0x58
[   36.868890]  __kasan_kmalloc+0xd4/0xd8
[   36.869494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.869625]  kasan_atomics+0xb8/0x2e0
[   36.869721]  kunit_try_run_case+0x170/0x3f0
[   36.869817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.869928]  kthread+0x328/0x630
[   36.870018]  ret_from_fork+0x10/0x20
[   36.870822] 
[   36.871114] The buggy address belongs to the object at fff00000c7805380
[   36.871114]  which belongs to the cache kmalloc-64 of size 64
[   36.871688] The buggy address is located 0 bytes to the right of
[   36.871688]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.871915] 
[   36.872198] The buggy address belongs to the physical page:
[   36.872360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.872637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.873472] page_type: f5(slab)
[   36.873651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.873820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.874540] page dumped because: kasan: bad access detected
[   36.874771] 
[   36.874949] Memory state around the buggy address:
[   36.875049]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.875878]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.875992] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.876337]                                      ^
[   36.876748]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.876875]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.876972] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   35.852749] ==================================================================
[   35.852917] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   35.853073] Read of size 1 at addr ffff800080b07c2a by task kunit_try_catch/261
[   35.853220] 
[   35.853389] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.853744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.853816] Hardware name: linux,dummy-virt (DT)
[   35.853899] Call trace:
[   35.853958]  show_stack+0x20/0x38 (C)
[   35.854106]  dump_stack_lvl+0x8c/0xd0
[   35.854229]  print_report+0x310/0x608
[   35.854354]  kasan_report+0xdc/0x128
[   35.854468]  __asan_report_load1_noabort+0x20/0x30
[   35.854727]  kasan_stack_oob+0x238/0x270
[   35.854887]  kunit_try_run_case+0x170/0x3f0
[   35.855056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.855323]  kthread+0x328/0x630
[   35.855519]  ret_from_fork+0x10/0x20
[   35.855660] 
[   35.855793] The buggy address belongs to stack of task kunit_try_catch/261
[   35.856161]  and is located at offset 138 in frame:
[   35.856267]  kasan_stack_oob+0x0/0x270
[   35.856669] 
[   35.856745] This frame has 4 objects:
[   35.857154]  [48, 49) '__assertion'
[   35.857272]  [64, 72) 'array'
[   35.857372]  [96, 112) '__assertion'
[   35.857499]  [128, 138) 'stack_array'
[   35.857631] 
[   35.857723] The buggy address belongs to the virtual mapping at
[   35.857723]  [ffff800080b00000, ffff800080b09000) created by:
[   35.857723]  kernel_clone+0x150/0x7a8
[   35.858140] 
[   35.858315] The buggy address belongs to the physical page:
[   35.858935] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.868222]     ok 57 kasan_stack_oob
[   35.873308] Read of size 1 at addr ffff800080b07b5f by task kunit_try_catch/263
[   35.875534]  kasan_alloca_oob_left+0x2b8/0x310
[   35.877259] 
[   35.878170] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.879780]  ffff800080b07c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   35.903849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.905273]  __asan_report_load1_noabort+0x20/0x30
[   35.907782] 
[   35.907850] The buggy address belongs to the physical page:
[   35.908104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643d
[   35.908489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.908644] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.909459]  ffff800080b07a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.933428]     # kasan_memchr: EXPECTATION FAILED at mm/kasan/kasan_test_c.c:1535
[   35.933428]     KASAN failure expected in "kasan_ptr_result = memchr(ptr, '1', size + 1)", but none occurred
[   35.955501]  __kasan_kmalloc+0xd4/0xd8
[   35.962647] 
[   35.963719] page dumped because: kasan: bad access detected
[   35.993323]     # kasan_strings: EXPECTATION FAILED at mm/kasan/kasan_test_c.c:1610
[   35.993323]     KASAN failure expected in "kasan_ptr_result = strchr(ptr, '1')", but none occurred
[   36.000449] Read of size 1 at addr fff00000c77fd290 by task kunit_try_catch/271
[   36.002294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.005303]  print_report+0x118/0x608
[   36.007487]  kasan_save_track+0x20/0x40
[   36.008152]  kasan_strings+0xc8/0xb00
[   36.010234]  kunit_try_run_case+0x170/0x3f0
[   36.011721] 
[   36.014653] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   36.016039] >fff00000c77fd280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   36.018002] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   35.816332] ==================================================================
[   35.816453] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   35.816570] Read of size 1 at addr ffffa42cff05668d by task kunit_try_catch/257
[   35.816683] 
[   35.816757] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.816948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.817009] Hardware name: linux,dummy-virt (DT)
[   35.821809] Call trace:
[   35.821914]  show_stack+0x20/0x38 (C)
[   35.822617]  dump_stack_lvl+0x8c/0xd0
[   35.822799]  print_report+0x310/0x608
[   35.823696]  kasan_report+0xdc/0x128
[   35.823825]  __asan_report_load1_noabort+0x20/0x30
[   35.824460]  kasan_global_oob_right+0x230/0x270
[   35.825166]  kunit_try_run_case+0x170/0x3f0
[   35.825305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.825649]  kthread+0x328/0x630
[   35.825995]  ret_from_fork+0x10/0x20
[   35.826232] 
[   35.826717] The buggy address belongs to the variable:
[   35.826818]  global_array+0xd/0x40
[   35.826912] 
[   35.827007] The buggy address belongs to the virtual mapping at
[   35.827007]  [ffffa42cfd210000, ffffa42cff111000) created by:
[   35.827007]  paging_init+0x66c/0x7d0
[   35.827260] 
[   35.827588] The buggy address belongs to the physical page:
[   35.827674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c56
[   35.827859] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   35.828046] raw: 03fffe0000002000 ffffc1ffc01f1588 ffffc1ffc01f1588 0000000000000000
[   35.828196] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.828294] page dumped because: kasan: bad access detected
[   35.828366] 
[   35.828416] Memory state around the buggy address:
[   35.828509]  ffffa42cff056580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.828616]  ffffa42cff056600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   35.828721] >ffffa42cff056680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   35.828812]                       ^
[   35.828892]  ffffa42cff056700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   35.828997]  ffffa42cff056780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.829128] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   35.769187] ==================================================================
[   35.769254] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   35.769320] Free of addr fff00000c76da801 by task kunit_try_catch/253
[   35.769372] 
[   35.769407] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.769510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.769545] Hardware name: linux,dummy-virt (DT)
[   35.769582] Call trace:
[   35.769608]  show_stack+0x20/0x38 (C)
[   35.769672]  dump_stack_lvl+0x8c/0xd0
[   35.769727]  print_report+0x118/0x608
[   35.769788]  kasan_report_invalid_free+0xc0/0xe8
[   35.769851]  check_slab_allocation+0xfc/0x108
[   35.769912]  __kasan_mempool_poison_object+0x78/0x150
[   35.769975]  mempool_free+0x28c/0x328
[   35.770184]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   35.770334]  mempool_kmalloc_invalid_free+0xc0/0x118
[   35.770961]  kunit_try_run_case+0x170/0x3f0
[   35.771372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.771536]  kthread+0x328/0x630
[   35.771736]  ret_from_fork+0x10/0x20
[   35.772106] 
[   35.772248] Allocated by task 253:
[   35.772507]  kasan_save_stack+0x3c/0x68
[   35.772608]  kasan_save_track+0x20/0x40
[   35.773015]  kasan_save_alloc_info+0x40/0x58
[   35.773165]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.773307]  remove_element+0x130/0x1f8
[   35.773502]  mempool_alloc_preallocated+0x58/0xc0
[   35.773614]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   35.773723]  mempool_kmalloc_invalid_free+0xc0/0x118
[   35.774255]  kunit_try_run_case+0x170/0x3f0
[   35.774421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.774695]  kthread+0x328/0x630
[   35.774847]  ret_from_fork+0x10/0x20
[   35.774960] 
[   35.775013] The buggy address belongs to the object at fff00000c76da800
[   35.775013]  which belongs to the cache kmalloc-128 of size 128
[   35.775170] The buggy address is located 1 bytes inside of
[   35.775170]  128-byte region [fff00000c76da800, fff00000c76da880)
[   35.775361] 
[   35.775413] The buggy address belongs to the physical page:
[   35.775576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   35.775720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.775897] page_type: f5(slab)
[   35.776099] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.776221] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.776317] page dumped because: kasan: bad access detected
[   35.776422] 
[   35.776533] Memory state around the buggy address:
[   35.776608]  fff00000c76da700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.776716]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.776848] >fff00000c76da800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.777015]                    ^
[   35.777321]  fff00000c76da880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.777441]  fff00000c76da900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.777549] ==================================================================
[   35.793674] ==================================================================
[   35.793782] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   35.793903] Free of addr fff00000c77b4001 by task kunit_try_catch/255
[   35.794010] 
[   35.794116] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.794375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.794450] Hardware name: linux,dummy-virt (DT)
[   35.794540] Call trace:
[   35.794663]  show_stack+0x20/0x38 (C)
[   35.794819]  dump_stack_lvl+0x8c/0xd0
[   35.795045]  print_report+0x118/0x608
[   35.795197]  kasan_report_invalid_free+0xc0/0xe8
[   35.795361]  __kasan_mempool_poison_object+0xfc/0x150
[   35.795524]  mempool_free+0x28c/0x328
[   35.795647]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   35.795769]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   35.795907]  kunit_try_run_case+0x170/0x3f0
[   35.796144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.796308]  kthread+0x328/0x630
[   35.796422]  ret_from_fork+0x10/0x20
[   35.796548] 
[   35.796670] The buggy address belongs to the physical page:
[   35.796975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4
[   35.797126] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.797239] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.797371] page_type: f8(unknown)
[   35.797546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.797669] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.797786] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.797909] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.798114] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff
[   35.798334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.798431] page dumped because: kasan: bad access detected
[   35.798504] 
[   35.798600] Memory state around the buggy address:
[   35.798680]  fff00000c77b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.798837]  fff00000c77b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.799002] >fff00000c77b4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.799149]                    ^
[   35.799234]  fff00000c77b4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.799479]  fff00000c77b4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.799584] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   35.729808] ==================================================================
[   35.729940] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.730112] Free of addr fff00000c77b0000 by task kunit_try_catch/249
[   35.730216] 
[   35.730294] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.730490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.730596] Hardware name: linux,dummy-virt (DT)
[   35.730764] Call trace:
[   35.730835]  show_stack+0x20/0x38 (C)
[   35.730988]  dump_stack_lvl+0x8c/0xd0
[   35.731144]  print_report+0x118/0x608
[   35.731282]  kasan_report_invalid_free+0xc0/0xe8
[   35.731452]  __kasan_mempool_poison_object+0x14c/0x150
[   35.731684]  mempool_free+0x28c/0x328
[   35.731819]  mempool_double_free_helper+0x150/0x2e8
[   35.731942]  mempool_kmalloc_large_double_free+0xc0/0x118
[   35.732096]  kunit_try_run_case+0x170/0x3f0
[   35.732291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.732427]  kthread+0x328/0x630
[   35.732596]  ret_from_fork+0x10/0x20
[   35.732806] 
[   35.732860] The buggy address belongs to the physical page:
[   35.732935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0
[   35.733086] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.733274] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.733465] page_type: f8(unknown)
[   35.733572] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.733707] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.733889] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.734104] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.734321] head: 0bfffe0000000002 ffffc1ffc31dec01 00000000ffffffff 00000000ffffffff
[   35.734442] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.734535] page dumped because: kasan: bad access detected
[   35.734866] 
[   35.735557] Memory state around the buggy address:
[   35.735624]  fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.735679]  fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.735744] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.735822]                    ^
[   35.735864]  fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.735916]  fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.735961] ==================================================================
[   35.755618] ==================================================================
[   35.755704] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.755835] Free of addr fff00000c77b0000 by task kunit_try_catch/251
[   35.755934] 
[   35.756005] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.756223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.756289] Hardware name: linux,dummy-virt (DT)
[   35.756357] Call trace:
[   35.756407]  show_stack+0x20/0x38 (C)
[   35.756545]  dump_stack_lvl+0x8c/0xd0
[   35.756664]  print_report+0x118/0x608
[   35.756785]  kasan_report_invalid_free+0xc0/0xe8
[   35.756908]  __kasan_mempool_poison_pages+0xe0/0xe8
[   35.757045]  mempool_free+0x24c/0x328
[   35.757163]  mempool_double_free_helper+0x150/0x2e8
[   35.757280]  mempool_page_alloc_double_free+0xbc/0x118
[   35.757405]  kunit_try_run_case+0x170/0x3f0
[   35.757523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.757661]  kthread+0x328/0x630
[   35.757915]  ret_from_fork+0x10/0x20
[   35.758076] 
[   35.758140] The buggy address belongs to the physical page:
[   35.758276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0
[   35.758425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.759131] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.759623] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.759766] page dumped because: kasan: bad access detected
[   35.759848] 
[   35.759896] Memory state around the buggy address:
[   35.760051]  fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.760176]  fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.760329] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.760744]                    ^
[   35.760836]  fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.761002]  fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.761095] ==================================================================
[   35.693015] ==================================================================
[   35.693650] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.694297] Free of addr fff00000c76da400 by task kunit_try_catch/247
[   35.694403] 
[   35.695529] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.695856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.695969] Hardware name: linux,dummy-virt (DT)
[   35.696067] Call trace:
[   35.696164]  show_stack+0x20/0x38 (C)
[   35.696296]  dump_stack_lvl+0x8c/0xd0
[   35.696416]  print_report+0x118/0x608
[   35.696767]  kasan_report_invalid_free+0xc0/0xe8
[   35.697157]  check_slab_allocation+0xd4/0x108
[   35.697521]  __kasan_mempool_poison_object+0x78/0x150
[   35.697747]  mempool_free+0x28c/0x328
[   35.698041]  mempool_double_free_helper+0x150/0x2e8
[   35.698188]  mempool_kmalloc_double_free+0xc0/0x118
[   35.698331]  kunit_try_run_case+0x170/0x3f0
[   35.698454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.698668]  kthread+0x328/0x630
[   35.698852]  ret_from_fork+0x10/0x20
[   35.698987] 
[   35.699061] Allocated by task 247:
[   35.699209]  kasan_save_stack+0x3c/0x68
[   35.699364]  kasan_save_track+0x20/0x40
[   35.699622]  kasan_save_alloc_info+0x40/0x58
[   35.699730]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.700387]  remove_element+0x130/0x1f8
[   35.700846]  mempool_alloc_preallocated+0x58/0xc0
[   35.701731]  mempool_double_free_helper+0x94/0x2e8
[   35.702045]  mempool_kmalloc_double_free+0xc0/0x118
[   35.702153]  kunit_try_run_case+0x170/0x3f0
[   35.702249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.702896]  kthread+0x328/0x630
[   35.703564]  ret_from_fork+0x10/0x20
[   35.703926] 
[   35.704055] Freed by task 247:
[   35.704176]  kasan_save_stack+0x3c/0x68
[   35.704423]  kasan_save_track+0x20/0x40
[   35.704999]  kasan_save_free_info+0x4c/0x78
[   35.705128]  __kasan_mempool_poison_object+0xc0/0x150
[   35.705337]  mempool_free+0x28c/0x328
[   35.705458]  mempool_double_free_helper+0x100/0x2e8
[   35.705562]  mempool_kmalloc_double_free+0xc0/0x118
[   35.705710]  kunit_try_run_case+0x170/0x3f0
[   35.705940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.706100]  kthread+0x328/0x630
[   35.706333]  ret_from_fork+0x10/0x20
[   35.706437] 
[   35.706620] The buggy address belongs to the object at fff00000c76da400
[   35.706620]  which belongs to the cache kmalloc-128 of size 128
[   35.706785] The buggy address is located 0 bytes inside of
[   35.706785]  128-byte region [fff00000c76da400, fff00000c76da480)
[   35.707061] 
[   35.707159] The buggy address belongs to the physical page:
[   35.707289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   35.707504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.707631] page_type: f5(slab)
[   35.707733] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.707946] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.708100] page dumped because: kasan: bad access detected
[   35.708210] 
[   35.708259] Memory state around the buggy address:
[   35.708414]  fff00000c76da300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.708520]  fff00000c76da380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.708618] >fff00000c76da400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.708765]                    ^
[   35.708970]  fff00000c76da480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.709163]  fff00000c76da500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.709350] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   35.672725] ==================================================================
[   35.672847] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   35.672987] Read of size 1 at addr fff00000c77b0000 by task kunit_try_catch/245
[   35.673122] 
[   35.673987] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.674867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.675311] Hardware name: linux,dummy-virt (DT)
[   35.675616] Call trace:
[   35.675683]  show_stack+0x20/0x38 (C)
[   35.676394]  dump_stack_lvl+0x8c/0xd0
[   35.676643]  print_report+0x118/0x608
[   35.676822]  kasan_report+0xdc/0x128
[   35.677181]  __asan_report_load1_noabort+0x20/0x30
[   35.677557]  mempool_uaf_helper+0x314/0x340
[   35.677712]  mempool_page_alloc_uaf+0xc0/0x118
[   35.677851]  kunit_try_run_case+0x170/0x3f0
[   35.678487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.678680]  kthread+0x328/0x630
[   35.678739]  ret_from_fork+0x10/0x20
[   35.678852] 
[   35.679049] The buggy address belongs to the physical page:
[   35.679134] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0
[   35.679577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.680357] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.680481] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.680577] page dumped because: kasan: bad access detected
[   35.680651] 
[   35.681077] Memory state around the buggy address:
[   35.681169]  fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.681390]  fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.681659] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.682020]                    ^
[   35.682399]  fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.682729]  fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.683118] ==================================================================
[   35.577853] ==================================================================
[   35.577923] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   35.577994] Read of size 1 at addr fff00000c77b0000 by task kunit_try_catch/241
[   35.578101] 
[   35.578175] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.578407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.578474] Hardware name: linux,dummy-virt (DT)
[   35.578546] Call trace:
[   35.578602]  show_stack+0x20/0x38 (C)
[   35.578719]  dump_stack_lvl+0x8c/0xd0
[   35.578843]  print_report+0x118/0x608
[   35.578957]  kasan_report+0xdc/0x128
[   35.579101]  __asan_report_load1_noabort+0x20/0x30
[   35.579464]  mempool_uaf_helper+0x314/0x340
[   35.579596]  mempool_kmalloc_large_uaf+0xc4/0x120
[   35.579729]  kunit_try_run_case+0x170/0x3f0
[   35.579847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.579972]  kthread+0x328/0x630
[   35.580381]  ret_from_fork+0x10/0x20
[   35.581165] 
[   35.581522] The buggy address belongs to the physical page:
[   35.581862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0
[   35.581995] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.583095] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.583793] page_type: f8(unknown)
[   35.584533] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.584718] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.585070] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.585210] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.585482] head: 0bfffe0000000002 ffffc1ffc31dec01 00000000ffffffff 00000000ffffffff
[   35.585985] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.586132] page dumped because: kasan: bad access detected
[   35.586211] 
[   35.586254] Memory state around the buggy address:
[   35.586335]  fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.588115]  fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.588181] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.588227]                    ^
[   35.588291]  fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.588563]  fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.588674] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   35.544244] ==================================================================
[   35.544375] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   35.544518] Read of size 1 at addr fff00000c76da000 by task kunit_try_catch/239
[   35.544647] 
[   35.544806] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.545542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.545627] Hardware name: linux,dummy-virt (DT)
[   35.545712] Call trace:
[   35.545772]  show_stack+0x20/0x38 (C)
[   35.546070]  dump_stack_lvl+0x8c/0xd0
[   35.546258]  print_report+0x118/0x608
[   35.546439]  kasan_report+0xdc/0x128
[   35.546673]  __asan_report_load1_noabort+0x20/0x30
[   35.546807]  mempool_uaf_helper+0x314/0x340
[   35.546923]  mempool_kmalloc_uaf+0xc4/0x120
[   35.547050]  kunit_try_run_case+0x170/0x3f0
[   35.547178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.547301]  kthread+0x328/0x630
[   35.547408]  ret_from_fork+0x10/0x20
[   35.547523] 
[   35.547566] Allocated by task 239:
[   35.547634]  kasan_save_stack+0x3c/0x68
[   35.547733]  kasan_save_track+0x20/0x40
[   35.547822]  kasan_save_alloc_info+0x40/0x58
[   35.547912]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.549176]  remove_element+0x130/0x1f8
[   35.549288]  mempool_alloc_preallocated+0x58/0xc0
[   35.549396]  mempool_uaf_helper+0xa4/0x340
[   35.549614]  mempool_kmalloc_uaf+0xc4/0x120
[   35.549719]  kunit_try_run_case+0x170/0x3f0
[   35.549812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.549919]  kthread+0x328/0x630
[   35.550993]  ret_from_fork+0x10/0x20
[   35.551536] 
[   35.551729] Freed by task 239:
[   35.551812]  kasan_save_stack+0x3c/0x68
[   35.552020]  kasan_save_track+0x20/0x40
[   35.552831]  kasan_save_free_info+0x4c/0x78
[   35.553196]  __kasan_mempool_poison_object+0xc0/0x150
[   35.553587]  mempool_free+0x28c/0x328
[   35.553982]  mempool_uaf_helper+0x104/0x340
[   35.554111]  mempool_kmalloc_uaf+0xc4/0x120
[   35.554211]  kunit_try_run_case+0x170/0x3f0
[   35.554303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.554407]  kthread+0x328/0x630
[   35.554487]  ret_from_fork+0x10/0x20
[   35.555046] 
[   35.555114] The buggy address belongs to the object at fff00000c76da000
[   35.555114]  which belongs to the cache kmalloc-128 of size 128
[   35.555249] The buggy address is located 0 bytes inside of
[   35.555249]  freed 128-byte region [fff00000c76da000, fff00000c76da080)
[   35.555584] 
[   35.555648] The buggy address belongs to the physical page:
[   35.555730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   35.556336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.556507] page_type: f5(slab)
[   35.556821] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.556977] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.557364] page dumped because: kasan: bad access detected
[   35.557539] 
[   35.557617] Memory state around the buggy address:
[   35.557862]  fff00000c76d9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.557996]  fff00000c76d9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.558319] >fff00000c76da000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.558446]                    ^
[   35.558659]  fff00000c76da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.558983]  fff00000c76da100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.559100] ==================================================================
[   35.611521] ==================================================================
[   35.611754] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   35.611947] Read of size 1 at addr fff00000c76dc240 by task kunit_try_catch/243
[   35.612463] 
[   35.612613] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.612810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.613616] Hardware name: linux,dummy-virt (DT)
[   35.613724] Call trace:
[   35.613789]  show_stack+0x20/0x38 (C)
[   35.614277]  dump_stack_lvl+0x8c/0xd0
[   35.614739]  print_report+0x118/0x608
[   35.615024]  kasan_report+0xdc/0x128
[   35.615238]  __asan_report_load1_noabort+0x20/0x30
[   35.615495]  mempool_uaf_helper+0x314/0x340
[   35.615730]  mempool_slab_uaf+0xc0/0x118
[   35.615866]  kunit_try_run_case+0x170/0x3f0
[   35.616111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.616262]  kthread+0x328/0x630
[   35.616387]  ret_from_fork+0x10/0x20
[   35.617041] 
[   35.617110] Allocated by task 243:
[   35.617295]  kasan_save_stack+0x3c/0x68
[   35.617438]  kasan_save_track+0x20/0x40
[   35.617643]  kasan_save_alloc_info+0x40/0x58
[   35.617761]  __kasan_mempool_unpoison_object+0xbc/0x180
[   35.617965]  remove_element+0x16c/0x1f8
[   35.618186]  mempool_alloc_preallocated+0x58/0xc0
[   35.618305]  mempool_uaf_helper+0xa4/0x340
[   35.618657]  mempool_slab_uaf+0xc0/0x118
[   35.618861]  kunit_try_run_case+0x170/0x3f0
[   35.619159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.619410]  kthread+0x328/0x630
[   35.619557]  ret_from_fork+0x10/0x20
[   35.619664] 
[   35.619833] Freed by task 243:
[   35.619963]  kasan_save_stack+0x3c/0x68
[   35.620333]  kasan_save_track+0x20/0x40
[   35.620492]  kasan_save_free_info+0x4c/0x78
[   35.620838]  __kasan_mempool_poison_object+0xc0/0x150
[   35.621105]  mempool_free+0x28c/0x328
[   35.621330]  mempool_uaf_helper+0x104/0x340
[   35.621677]  mempool_slab_uaf+0xc0/0x118
[   35.621793]  kunit_try_run_case+0x170/0x3f0
[   35.622066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.622373]  kthread+0x328/0x630
[   35.622525]  ret_from_fork+0x10/0x20
[   35.622777] 
[   35.622844] The buggy address belongs to the object at fff00000c76dc240
[   35.622844]  which belongs to the cache test_cache of size 123
[   35.623009] The buggy address is located 0 bytes inside of
[   35.623009]  freed 123-byte region [fff00000c76dc240, fff00000c76dc2bb)
[   35.623175] 
[   35.623231] The buggy address belongs to the physical page:
[   35.623735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076dc
[   35.623899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.624154] page_type: f5(slab)
[   35.624447] raw: 0bfffe0000000000 fff00000c598fb40 dead000000000122 0000000000000000
[   35.624571] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   35.624669] page dumped because: kasan: bad access detected
[   35.625637] 
[   35.625795] Memory state around the buggy address:
[   35.625876]  fff00000c76dc100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.625972]  fff00000c76dc180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.626100] >fff00000c76dc200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   35.626202]                                            ^
[   35.626295]  fff00000c76dc280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.626399]  fff00000c76dc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.626486] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   35.458163] ==================================================================
[   35.458552] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.458713] Read of size 1 at addr fff00000c77ae001 by task kunit_try_catch/235
[   35.458914] 
[   35.459006] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.459888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.459955] Hardware name: linux,dummy-virt (DT)
[   35.460059] Call trace:
[   35.460119]  show_stack+0x20/0x38 (C)
[   35.460244]  dump_stack_lvl+0x8c/0xd0
[   35.461697]  print_report+0x118/0x608
[   35.461851]  kasan_report+0xdc/0x128
[   35.461918]  __asan_report_load1_noabort+0x20/0x30
[   35.461977]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.462073]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   35.462182]  kunit_try_run_case+0x170/0x3f0
[   35.462247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.462341]  kthread+0x328/0x630
[   35.462522]  ret_from_fork+0x10/0x20
[   35.462800] 
[   35.462856] The buggy address belongs to the physical page:
[   35.462955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   35.463218] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.463520] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.463650] page_type: f8(unknown)
[   35.463786] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.463990] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.464343] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.464694] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.464816] head: 0bfffe0000000002 ffffc1ffc31deb01 00000000ffffffff 00000000ffffffff
[   35.464929] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.465023] page dumped because: kasan: bad access detected
[   35.465121] 
[   35.465173] Memory state around the buggy address:
[   35.465327]  fff00000c77adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.465497]  fff00000c77adf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.465616] >fff00000c77ae000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.465720]                    ^
[   35.465792]  fff00000c77ae080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.466075]  fff00000c77ae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.466257] ==================================================================
[   35.420200] ==================================================================
[   35.420325] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.420475] Read of size 1 at addr fff00000c63f0c73 by task kunit_try_catch/233
[   35.420590] 
[   35.420700] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.421558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.422022] Hardware name: linux,dummy-virt (DT)
[   35.422136] Call trace:
[   35.422206]  show_stack+0x20/0x38 (C)
[   35.423157]  dump_stack_lvl+0x8c/0xd0
[   35.423440]  print_report+0x118/0x608
[   35.423839]  kasan_report+0xdc/0x128
[   35.424015]  __asan_report_load1_noabort+0x20/0x30
[   35.424242]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.424408]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.424539]  kunit_try_run_case+0x170/0x3f0
[   35.424662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.424813]  kthread+0x328/0x630
[   35.425106]  ret_from_fork+0x10/0x20
[   35.425509] 
[   35.425559] Allocated by task 233:
[   35.425932]  kasan_save_stack+0x3c/0x68
[   35.426065]  kasan_save_track+0x20/0x40
[   35.426187]  kasan_save_alloc_info+0x40/0x58
[   35.426450]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.426631]  remove_element+0x130/0x1f8
[   35.426825]  mempool_alloc_preallocated+0x58/0xc0
[   35.427182]  mempool_oob_right_helper+0x98/0x2f0
[   35.427470]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.427769]  kunit_try_run_case+0x170/0x3f0
[   35.428278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.428397]  kthread+0x328/0x630
[   35.428483]  ret_from_fork+0x10/0x20
[   35.428577] 
[   35.428653] The buggy address belongs to the object at fff00000c63f0c00
[   35.428653]  which belongs to the cache kmalloc-128 of size 128
[   35.429042] The buggy address is located 0 bytes to the right of
[   35.429042]  allocated 115-byte region [fff00000c63f0c00, fff00000c63f0c73)
[   35.429351] 
[   35.429413] The buggy address belongs to the physical page:
[   35.429506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f0
[   35.429644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.429768] page_type: f5(slab)
[   35.429867] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.429980] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.430756] page dumped because: kasan: bad access detected
[   35.430863] 
[   35.431260] Memory state around the buggy address:
[   35.431379]  fff00000c63f0b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.431690]  fff00000c63f0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.431819] >fff00000c63f0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.431914]                                                              ^
[   35.432841]  fff00000c63f0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.432974]  fff00000c63f0d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.433116] ==================================================================
[   35.489653] ==================================================================
[   35.489938] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.490251] Read of size 1 at addr fff00000c76d92bb by task kunit_try_catch/237
[   35.490551] 
[   35.490717] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.491076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.491175] Hardware name: linux,dummy-virt (DT)
[   35.491255] Call trace:
[   35.491654]  show_stack+0x20/0x38 (C)
[   35.491786]  dump_stack_lvl+0x8c/0xd0
[   35.491966]  print_report+0x118/0x608
[   35.492158]  kasan_report+0xdc/0x128
[   35.492376]  __asan_report_load1_noabort+0x20/0x30
[   35.492686]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.492850]  mempool_slab_oob_right+0xc0/0x118
[   35.492975]  kunit_try_run_case+0x170/0x3f0
[   35.493123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.493427]  kthread+0x328/0x630
[   35.493564]  ret_from_fork+0x10/0x20
[   35.493684] 
[   35.493728] Allocated by task 237:
[   35.493799]  kasan_save_stack+0x3c/0x68
[   35.493898]  kasan_save_track+0x20/0x40
[   35.493989]  kasan_save_alloc_info+0x40/0x58
[   35.494108]  __kasan_mempool_unpoison_object+0xbc/0x180
[   35.494235]  remove_element+0x16c/0x1f8
[   35.494351]  mempool_alloc_preallocated+0x58/0xc0
[   35.494454]  mempool_oob_right_helper+0x98/0x2f0
[   35.494551]  mempool_slab_oob_right+0xc0/0x118
[   35.494659]  kunit_try_run_case+0x170/0x3f0
[   35.494812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.494991]  kthread+0x328/0x630
[   35.495502]  ret_from_fork+0x10/0x20
[   35.495620] 
[   35.495676] The buggy address belongs to the object at fff00000c76d9240
[   35.495676]  which belongs to the cache test_cache of size 123
[   35.495820] The buggy address is located 0 bytes to the right of
[   35.495820]  allocated 123-byte region [fff00000c76d9240, fff00000c76d92bb)
[   35.496457] 
[   35.496586] The buggy address belongs to the physical page:
[   35.496737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d9
[   35.497217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.497395] page_type: f5(slab)
[   35.497496] raw: 0bfffe0000000000 fff00000c598fa00 dead000000000122 0000000000000000
[   35.497609] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   35.497701] page dumped because: kasan: bad access detected
[   35.497786] 
[   35.497834] Memory state around the buggy address:
[   35.497909]  fff00000c76d9180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.498260]  fff00000c76d9200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   35.498885] >fff00000c76d9280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   35.499223]                                         ^
[   35.499431]  fff00000c76d9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.499695]  fff00000c76d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.501080] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   33.272816] ==================================================================
[   33.272943] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   33.273072] Free of addr fff00000c56f1320 by task kunit_try_catch/204
[   33.273170] 
[   33.273231] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.273422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.273489] Hardware name: linux,dummy-virt (DT)
[   33.273561] Call trace:
[   33.273610]  show_stack+0x20/0x38 (C)
[   33.273728]  dump_stack_lvl+0x8c/0xd0
[   33.273840]  print_report+0x118/0x608
[   33.273981]  kasan_report_invalid_free+0xc0/0xe8
[   33.275234]  check_slab_allocation+0xd4/0x108
[   33.275374]  __kasan_slab_pre_free+0x2c/0x48
[   33.275811]  kfree+0xe8/0x3c8
[   33.275943]  kfree_sensitive+0x3c/0xb0
[   33.276568]  kmalloc_double_kzfree+0x168/0x308
[   33.276876]  kunit_try_run_case+0x170/0x3f0
[   33.277117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.277255]  kthread+0x328/0x630
[   33.277394]  ret_from_fork+0x10/0x20
[   33.277653] 
[   33.277704] Allocated by task 204:
[   33.277819]  kasan_save_stack+0x3c/0x68
[   33.277918]  kasan_save_track+0x20/0x40
[   33.278010]  kasan_save_alloc_info+0x40/0x58
[   33.278129]  __kasan_kmalloc+0xd4/0xd8
[   33.278377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.278479]  kmalloc_double_kzfree+0xb8/0x308
[   33.280357]  kunit_try_run_case+0x170/0x3f0
[   33.280494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.280618]  kthread+0x328/0x630
[   33.280754]  ret_from_fork+0x10/0x20
[   33.280949] 
[   33.280996] Freed by task 204:
[   33.281225]  kasan_save_stack+0x3c/0x68
[   33.281818]  kasan_save_track+0x20/0x40
[   33.281917]  kasan_save_free_info+0x4c/0x78
[   33.282475]  __kasan_slab_free+0x6c/0x98
[   33.282595]  kfree+0x214/0x3c8
[   33.282949]  kfree_sensitive+0x80/0xb0
[   33.283494]  kmalloc_double_kzfree+0x11c/0x308
[   33.283630]  kunit_try_run_case+0x170/0x3f0
[   33.283964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.284558]  kthread+0x328/0x630
[   33.284653]  ret_from_fork+0x10/0x20
[   33.284946] 
[   33.285009] The buggy address belongs to the object at fff00000c56f1320
[   33.285009]  which belongs to the cache kmalloc-16 of size 16
[   33.285625] The buggy address is located 0 bytes inside of
[   33.285625]  16-byte region [fff00000c56f1320, fff00000c56f1330)
[   33.286571] 
[   33.286873] The buggy address belongs to the physical page:
[   33.286950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   33.287093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.287204] page_type: f5(slab)
[   33.287293] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   33.288878] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.289896] page dumped because: kasan: bad access detected
[   33.290626] 
[   33.290894] Memory state around the buggy address:
[   33.291022]  fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.291145]  fff00000c56f1280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.291246] >fff00000c56f1300: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   33.292681]                                ^
[   33.292815]  fff00000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.293066]  fff00000c56f1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.293535] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   34.756512] ==================================================================
[   34.756671] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   34.756850] Read of size 1 at addr fff00000c598f640 by task kunit_try_catch/227
[   34.756977] 
[   34.757303] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   34.757744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.757832] Hardware name: linux,dummy-virt (DT)
[   34.758114] Call trace:
[   34.758191]  show_stack+0x20/0x38 (C)
[   34.758337]  dump_stack_lvl+0x8c/0xd0
[   34.758524]  print_report+0x118/0x608
[   34.758665]  kasan_report+0xdc/0x128
[   34.758807]  __kasan_check_byte+0x54/0x70
[   34.758970]  kmem_cache_destroy+0x34/0x218
[   34.759197]  kmem_cache_double_destroy+0x174/0x300
[   34.759406]  kunit_try_run_case+0x170/0x3f0
[   34.759536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.759684]  kthread+0x328/0x630
[   34.759811]  ret_from_fork+0x10/0x20
[   34.759941] 
[   34.760005] Allocated by task 227:
[   34.760102]  kasan_save_stack+0x3c/0x68
[   34.760207]  kasan_save_track+0x20/0x40
[   34.760322]  kasan_save_alloc_info+0x40/0x58
[   34.760425]  __kasan_slab_alloc+0xa8/0xb0
[   34.760523]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.760651]  __kmem_cache_create_args+0x178/0x280
[   34.760774]  kmem_cache_double_destroy+0xc0/0x300
[   34.760881]  kunit_try_run_case+0x170/0x3f0
[   34.760977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.761503]  kthread+0x328/0x630
[   34.761903]  ret_from_fork+0x10/0x20
[   34.762373] 
[   34.762613] Freed by task 227:
[   34.762823]  kasan_save_stack+0x3c/0x68
[   34.763158]  kasan_save_track+0x20/0x40
[   34.763508]  kasan_save_free_info+0x4c/0x78
[   34.763872]  __kasan_slab_free+0x6c/0x98
[   34.764424]  kmem_cache_free+0x260/0x468
[   34.764695]  slab_kmem_cache_release+0x38/0x50
[   34.765088]  kmem_cache_release+0x1c/0x30
[   34.765272]  kobject_put+0x17c/0x420
[   34.765517]  sysfs_slab_release+0x1c/0x30
[   34.765726]  kmem_cache_destroy+0x118/0x218
[   34.765826]  kmem_cache_double_destroy+0x128/0x300
[   34.766221]  kunit_try_run_case+0x170/0x3f0
[   34.766530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.766658]  kthread+0x328/0x630
[   34.766766]  ret_from_fork+0x10/0x20
[   34.766873] 
[   34.767158] The buggy address belongs to the object at fff00000c598f640
[   34.767158]  which belongs to the cache kmem_cache of size 208
[   34.767672] The buggy address is located 0 bytes inside of
[   34.767672]  freed 208-byte region [fff00000c598f640, fff00000c598f710)
[   34.768117] 
[   34.768301] The buggy address belongs to the physical page:
[   34.768542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598f
[   34.768760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.769826] page_type: f5(slab)
[   34.769984] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   34.771189] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   34.771323] page dumped because: kasan: bad access detected
[   34.771400] 
[   34.771445] Memory state around the buggy address:
[   34.772672]  fff00000c598f500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.773272]  fff00000c598f580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   34.773871] >fff00000c598f600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   34.773977]                                            ^
[   34.774880]  fff00000c598f680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.775427]  fff00000c598f700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.775614] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   34.333723] ==================================================================
[   34.333867] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   34.334016] Read of size 1 at addr fff00000c76cf000 by task kunit_try_catch/225
[   34.334161] 
[   34.334250] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   34.334466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.334548] Hardware name: linux,dummy-virt (DT)
[   34.334681] Call trace:
[   34.335307]  show_stack+0x20/0x38 (C)
[   34.335467]  dump_stack_lvl+0x8c/0xd0
[   34.335655]  print_report+0x118/0x608
[   34.335973]  kasan_report+0xdc/0x128
[   34.336147]  __asan_report_load1_noabort+0x20/0x30
[   34.336468]  kmem_cache_rcu_uaf+0x388/0x468
[   34.336662]  kunit_try_run_case+0x170/0x3f0
[   34.336796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.336953]  kthread+0x328/0x630
[   34.337141]  ret_from_fork+0x10/0x20
[   34.337647] 
[   34.337704] Allocated by task 225:
[   34.337881]  kasan_save_stack+0x3c/0x68
[   34.338398]  kasan_save_track+0x20/0x40
[   34.338591]  kasan_save_alloc_info+0x40/0x58
[   34.338819]  __kasan_slab_alloc+0xa8/0xb0
[   34.338961]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.339240]  kmem_cache_rcu_uaf+0x12c/0x468
[   34.339413]  kunit_try_run_case+0x170/0x3f0
[   34.339520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.339648]  kthread+0x328/0x630
[   34.339787]  ret_from_fork+0x10/0x20
[   34.339892] 
[   34.339941] Freed by task 32:
[   34.340012]  kasan_save_stack+0x3c/0x68
[   34.340425]  kasan_save_track+0x20/0x40
[   34.340536]  kasan_save_free_info+0x4c/0x78
[   34.340638]  __kasan_slab_free+0x6c/0x98
[   34.340796]  slab_free_after_rcu_debug+0xd4/0x2f8
[   34.340998]  rcu_core+0x9f4/0x1e20
[   34.341126]  rcu_core_si+0x18/0x30
[   34.341237]  handle_softirqs+0x374/0xb28
[   34.341628]  __do_softirq+0x1c/0x28
[   34.342074] 
[   34.342123] Last potentially related work creation:
[   34.342201]  kasan_save_stack+0x3c/0x68
[   34.342446]  kasan_record_aux_stack+0xb4/0xc8
[   34.342612]  kmem_cache_free+0x120/0x468
[   34.342775]  kmem_cache_rcu_uaf+0x16c/0x468
[   34.343060]  kunit_try_run_case+0x170/0x3f0
[   34.343173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.343357]  kthread+0x328/0x630
[   34.343452]  ret_from_fork+0x10/0x20
[   34.343556] 
[   34.343607] The buggy address belongs to the object at fff00000c76cf000
[   34.343607]  which belongs to the cache test_cache of size 200
[   34.343753] The buggy address is located 0 bytes inside of
[   34.343753]  freed 200-byte region [fff00000c76cf000, fff00000c76cf0c8)
[   34.344448] 
[   34.344507] The buggy address belongs to the physical page:
[   34.344590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cf
[   34.344723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.345183] page_type: f5(slab)
[   34.345530] raw: 0bfffe0000000000 fff00000c598f500 dead000000000122 0000000000000000
[   34.345696] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   34.345796] page dumped because: kasan: bad access detected
[   34.345875] 
[   34.345916] Memory state around the buggy address:
[   34.346019]  fff00000c76cef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.346445]  fff00000c76cef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.346573] >fff00000c76cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.346854]                    ^
[   34.347076]  fff00000c76cf080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   34.347189]  fff00000c76cf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.347835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   34.116563] ==================================================================
[   34.116700] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   34.116846] Free of addr fff00000c6469001 by task kunit_try_catch/223
[   34.116947] 
[   34.117435] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   34.118175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.118252] Hardware name: linux,dummy-virt (DT)
[   34.118343] Call trace:
[   34.118404]  show_stack+0x20/0x38 (C)
[   34.119426]  dump_stack_lvl+0x8c/0xd0
[   34.119722]  print_report+0x118/0x608
[   34.119863]  kasan_report_invalid_free+0xc0/0xe8
[   34.120250]  check_slab_allocation+0xfc/0x108
[   34.120388]  __kasan_slab_pre_free+0x2c/0x48
[   34.120640]  kmem_cache_free+0xf0/0x468
[   34.120994]  kmem_cache_invalid_free+0x184/0x3c8
[   34.121173]  kunit_try_run_case+0x170/0x3f0
[   34.121508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.121639]  kthread+0x328/0x630
[   34.121753]  ret_from_fork+0x10/0x20
[   34.121871] 
[   34.121966] Allocated by task 223:
[   34.122063]  kasan_save_stack+0x3c/0x68
[   34.122183]  kasan_save_track+0x20/0x40
[   34.122367]  kasan_save_alloc_info+0x40/0x58
[   34.122544]  __kasan_slab_alloc+0xa8/0xb0
[   34.122962]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.123512]  kmem_cache_invalid_free+0x12c/0x3c8
[   34.123644]  kunit_try_run_case+0x170/0x3f0
[   34.123759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.123881]  kthread+0x328/0x630
[   34.123977]  ret_from_fork+0x10/0x20
[   34.124095] 
[   34.124143] The buggy address belongs to the object at fff00000c6469000
[   34.124143]  which belongs to the cache test_cache of size 200
[   34.125010] The buggy address is located 1 bytes inside of
[   34.125010]  200-byte region [fff00000c6469000, fff00000c64690c8)
[   34.125267] 
[   34.125420] The buggy address belongs to the physical page:
[   34.125519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106469
[   34.125782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.125973] page_type: f5(slab)
[   34.126100] raw: 0bfffe0000000000 fff00000c56418c0 dead000000000122 0000000000000000
[   34.126702] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   34.126984] page dumped because: kasan: bad access detected
[   34.127529] 
[   34.127728] Memory state around the buggy address:
[   34.127852]  fff00000c6468f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.128097]  fff00000c6468f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.128487] >fff00000c6469000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.128587]                    ^
[   34.128864]  fff00000c6469080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   34.128997]  fff00000c6469100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.129113] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   34.033515] ==================================================================
[   34.033670] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   34.033826] Free of addr fff00000c646a000 by task kunit_try_catch/221
[   34.033930] 
[   34.034112] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   34.034431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.034807] Hardware name: linux,dummy-virt (DT)
[   34.034897] Call trace:
[   34.035298]  show_stack+0x20/0x38 (C)
[   34.035663]  dump_stack_lvl+0x8c/0xd0
[   34.035808]  print_report+0x118/0x608
[   34.035979]  kasan_report_invalid_free+0xc0/0xe8
[   34.036134]  check_slab_allocation+0xd4/0x108
[   34.036318]  __kasan_slab_pre_free+0x2c/0x48
[   34.036455]  kmem_cache_free+0xf0/0x468
[   34.036602]  kmem_cache_double_free+0x190/0x3c8
[   34.037137]  kunit_try_run_case+0x170/0x3f0
[   34.037292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.037721]  kthread+0x328/0x630
[   34.037890]  ret_from_fork+0x10/0x20
[   34.038017] 
[   34.038089] Allocated by task 221:
[   34.038184]  kasan_save_stack+0x3c/0x68
[   34.038346]  kasan_save_track+0x20/0x40
[   34.038489]  kasan_save_alloc_info+0x40/0x58
[   34.038854]  __kasan_slab_alloc+0xa8/0xb0
[   34.039195]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.039461]  kmem_cache_double_free+0x12c/0x3c8
[   34.039570]  kunit_try_run_case+0x170/0x3f0
[   34.039682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.039802]  kthread+0x328/0x630
[   34.040253]  ret_from_fork+0x10/0x20
[   34.040516] 
[   34.040630] Freed by task 221:
[   34.040812]  kasan_save_stack+0x3c/0x68
[   34.040925]  kasan_save_track+0x20/0x40
[   34.041052]  kasan_save_free_info+0x4c/0x78
[   34.041206]  __kasan_slab_free+0x6c/0x98
[   34.041604]  kmem_cache_free+0x260/0x468
[   34.041719]  kmem_cache_double_free+0x140/0x3c8
[   34.041915]  kunit_try_run_case+0x170/0x3f0
[   34.042287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.042632]  kthread+0x328/0x630
[   34.042811]  ret_from_fork+0x10/0x20
[   34.043041] 
[   34.043207] The buggy address belongs to the object at fff00000c646a000
[   34.043207]  which belongs to the cache test_cache of size 200
[   34.043384] The buggy address is located 0 bytes inside of
[   34.043384]  200-byte region [fff00000c646a000, fff00000c646a0c8)
[   34.043530] 
[   34.043589] The buggy address belongs to the physical page:
[   34.043669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10646a
[   34.043825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.044020] page_type: f5(slab)
[   34.044269] raw: 0bfffe0000000000 fff00000c5641780 dead000000000122 0000000000000000
[   34.044769] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   34.044900] page dumped because: kasan: bad access detected
[   34.044994] 
[   34.045157] Memory state around the buggy address:
[   34.045268]  fff00000c6469f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.045370]  fff00000c6469f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.045481] >fff00000c646a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.045646]                    ^
[   34.045746]  fff00000c646a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   34.045979]  fff00000c646a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.046093] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   33.721804] ==================================================================
[   33.722070] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   33.722211] Read of size 1 at addr fff00000c64500c8 by task kunit_try_catch/219
[   33.722333] 
[   33.722418] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.722631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.722697] Hardware name: linux,dummy-virt (DT)
[   33.722783] Call trace:
[   33.722838]  show_stack+0x20/0x38 (C)
[   33.722961]  dump_stack_lvl+0x8c/0xd0
[   33.723096]  print_report+0x118/0x608
[   33.723217]  kasan_report+0xdc/0x128
[   33.723335]  __asan_report_load1_noabort+0x20/0x30
[   33.723457]  kmem_cache_oob+0x344/0x430
[   33.723569]  kunit_try_run_case+0x170/0x3f0
[   33.723756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.723883]  kthread+0x328/0x630
[   33.723988]  ret_from_fork+0x10/0x20
[   33.730832] 
[   33.731351] Allocated by task 219:
[   33.731445]  kasan_save_stack+0x3c/0x68
[   33.731565]  kasan_save_track+0x20/0x40
[   33.731666]  kasan_save_alloc_info+0x40/0x58
[   33.731825]  __kasan_slab_alloc+0xa8/0xb0
[   33.731963]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.732091]  kmem_cache_oob+0x12c/0x430
[   33.732180]  kunit_try_run_case+0x170/0x3f0
[   33.732275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.732721]  kthread+0x328/0x630
[   33.732827]  ret_from_fork+0x10/0x20
[   33.732941] 
[   33.733053] The buggy address belongs to the object at fff00000c6450000
[   33.733053]  which belongs to the cache test_cache of size 200
[   33.733249] The buggy address is located 0 bytes to the right of
[   33.733249]  allocated 200-byte region [fff00000c6450000, fff00000c64500c8)
[   33.733657] 
[   33.733789] The buggy address belongs to the physical page:
[   33.733864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106450
[   33.733990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.734129] page_type: f5(slab)
[   33.734315] raw: 0bfffe0000000000 fff00000c5641640 dead000000000122 0000000000000000
[   33.734509] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.734898] page dumped because: kasan: bad access detected
[   33.735044] 
[   33.736294] Memory state around the buggy address:
[   33.736383]  fff00000c644ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.736486]  fff00000c6450000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.736588] >fff00000c6450080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.737159]                                               ^
[   33.737456]  fff00000c6450100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.737773]  fff00000c6450180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.738425] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   33.652346] ==================================================================
[   33.652965] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   33.653412] Read of size 8 at addr fff00000c57bf600 by task kunit_try_catch/212
[   33.653968] 
[   33.654077] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.654589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.655072] Hardware name: linux,dummy-virt (DT)
[   33.655165] Call trace:
[   33.655793]  show_stack+0x20/0x38 (C)
[   33.655972]  dump_stack_lvl+0x8c/0xd0
[   33.656159]  print_report+0x118/0x608
[   33.656487]  kasan_report+0xdc/0x128
[   33.656969]  __asan_report_load8_noabort+0x20/0x30
[   33.657351]  workqueue_uaf+0x480/0x4a8
[   33.657653]  kunit_try_run_case+0x170/0x3f0
[   33.657901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.658207]  kthread+0x328/0x630
[   33.658676]  ret_from_fork+0x10/0x20
[   33.659214] 
[   33.659272] Allocated by task 212:
[   33.659359]  kasan_save_stack+0x3c/0x68
[   33.659467]  kasan_save_track+0x20/0x40
[   33.659569]  kasan_save_alloc_info+0x40/0x58
[   33.659675]  __kasan_kmalloc+0xd4/0xd8
[   33.660321]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.661001]  workqueue_uaf+0x13c/0x4a8
[   33.661143]  kunit_try_run_case+0x170/0x3f0
[   33.661879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.662525]  kthread+0x328/0x630
[   33.662627]  ret_from_fork+0x10/0x20
[   33.662730] 
[   33.662795] Freed by task 24:
[   33.663519]  kasan_save_stack+0x3c/0x68
[   33.663678]  kasan_save_track+0x20/0x40
[   33.664231]  kasan_save_free_info+0x4c/0x78
[   33.664625]  __kasan_slab_free+0x6c/0x98
[   33.664739]  kfree+0x214/0x3c8
[   33.665073]  workqueue_uaf_work+0x18/0x30
[   33.665190]  process_one_work+0x530/0xf98
[   33.665490]  worker_thread+0x618/0xf38
[   33.665910]  kthread+0x328/0x630
[   33.666001]  ret_from_fork+0x10/0x20
[   33.666116] 
[   33.666270] Last potentially related work creation:
[   33.666475]  kasan_save_stack+0x3c/0x68
[   33.666808]  kasan_record_aux_stack+0xb4/0xc8
[   33.667374]  __queue_work+0x65c/0xfe0
[   33.667554]  queue_work_on+0xbc/0xf8
[   33.667812]  workqueue_uaf+0x210/0x4a8
[   33.667935]  kunit_try_run_case+0x170/0x3f0
[   33.668051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.668199]  kthread+0x328/0x630
[   33.668288]  ret_from_fork+0x10/0x20
[   33.668423] 
[   33.668492] The buggy address belongs to the object at fff00000c57bf600
[   33.668492]  which belongs to the cache kmalloc-32 of size 32
[   33.668626] The buggy address is located 0 bytes inside of
[   33.668626]  freed 32-byte region [fff00000c57bf600, fff00000c57bf620)
[   33.668778] 
[   33.668827] The buggy address belongs to the physical page:
[   33.668908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057bf
[   33.669049] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.669179] page_type: f5(slab)
[   33.669545] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.669730] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.669895] page dumped because: kasan: bad access detected
[   33.670004] 
[   33.670070] Memory state around the buggy address:
[   33.670207]  fff00000c57bf500: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.670324]  fff00000c57bf580: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   33.670477] >fff00000c57bf600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.670584]                    ^
[   33.670907]  fff00000c57bf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.671043]  fff00000c57bf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.671141] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   33.593901] ==================================================================
[   33.595404] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   33.595654] Read of size 4 at addr fff00000c57bf400 by task swapper/1/0
[   33.596826] 
[   33.596957] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.597177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.597240] Hardware name: linux,dummy-virt (DT)
[   33.599406] Call trace:
[   33.599721]  show_stack+0x20/0x38 (C)
[   33.599968]  dump_stack_lvl+0x8c/0xd0
[   33.601254]  print_report+0x118/0x608
[   33.601386]  kasan_report+0xdc/0x128
[   33.601500]  __asan_report_load4_noabort+0x20/0x30
[   33.601617]  rcu_uaf_reclaim+0x64/0x70
[   33.601733]  rcu_core+0x9f4/0x1e20
[   33.601844]  rcu_core_si+0x18/0x30
[   33.601951]  handle_softirqs+0x374/0xb28
[   33.605128]  __do_softirq+0x1c/0x28
[   33.605264]  ____do_softirq+0x18/0x30
[   33.605392]  call_on_irq_stack+0x24/0x30
[   33.605522]  do_softirq_own_stack+0x24/0x38
[   33.605658]  __irq_exit_rcu+0x1fc/0x318
[   33.605784]  irq_exit_rcu+0x1c/0x80
[   33.605911]  el1_interrupt+0x38/0x58
[   33.605977]  el1h_64_irq_handler+0x18/0x28
[   33.606067]  el1h_64_irq+0x6c/0x70
[   33.606191]  tick_nohz_idle_enter+0x12c/0x1a8 (P)
[   33.606263]  do_idle+0xac/0x4e8
[   33.606319]  cpu_startup_entry+0x64/0x80
[   33.606373]  secondary_start_kernel+0x288/0x340
[   33.606429]  __secondary_switched+0xc0/0xc8
[   33.606496] 
[   33.606519] Allocated by task 210:
[   33.606585]  kasan_save_stack+0x3c/0x68
[   33.606762]  kasan_save_track+0x20/0x40
[   33.606903]  kasan_save_alloc_info+0x40/0x58
[   33.607000]  __kasan_kmalloc+0xd4/0xd8
[   33.607139]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.607247]  rcu_uaf+0xb0/0x2d8
[   33.607330]  kunit_try_run_case+0x170/0x3f0
[   33.607429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.607545]  kthread+0x328/0x630
[   33.607650]  ret_from_fork+0x10/0x20
[   33.607747] 
[   33.607792] Freed by task 0:
[   33.607878]  kasan_save_stack+0x3c/0x68
[   33.608007]  kasan_save_track+0x20/0x40
[   33.608129]  kasan_save_free_info+0x4c/0x78
[   33.608224]  __kasan_slab_free+0x6c/0x98
[   33.608317]  kfree+0x214/0x3c8
[   33.608424]  rcu_uaf_reclaim+0x28/0x70
[   33.608513]  rcu_core+0x9f4/0x1e20
[   33.608603]  rcu_core_si+0x18/0x30
[   33.608688]  handle_softirqs+0x374/0xb28
[   33.608779]  __do_softirq+0x1c/0x28
[   33.608882] 
[   33.608979] Last potentially related work creation:
[   33.609078]  kasan_save_stack+0x3c/0x68
[   33.609198]  kasan_record_aux_stack+0xb4/0xc8
[   33.609316]  __call_rcu_common.constprop.0+0x74/0x8c8
[   33.609478]  call_rcu+0x18/0x30
[   33.609579]  rcu_uaf+0x14c/0x2d8
[   33.609684]  kunit_try_run_case+0x170/0x3f0
[   33.609841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.610059]  kthread+0x328/0x630
[   33.610289]  ret_from_fork+0x10/0x20
[   33.610536] 
[   33.610895] The buggy address belongs to the object at fff00000c57bf400
[   33.610895]  which belongs to the cache kmalloc-32 of size 32
[   33.611070] The buggy address is located 0 bytes inside of
[   33.611070]  freed 32-byte region [fff00000c57bf400, fff00000c57bf420)
[   33.611330] 
[   33.611402] The buggy address belongs to the physical page:
[   33.611586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057bf
[   33.611759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.612143] page_type: f5(slab)
[   33.612278] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.612399] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.612526] page dumped because: kasan: bad access detected
[   33.612613] 
[   33.612691] Memory state around the buggy address:
[   33.612910]  fff00000c57bf300: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   33.613175]  fff00000c57bf380: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.613422] >fff00000c57bf400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.613537]                    ^
[   33.613696]  fff00000c57bf480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.613935]  fff00000c57bf500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.614420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   33.372348] ==================================================================
[   33.372470] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   33.372595] Read of size 1 at addr fff00000c63f7500 by task kunit_try_catch/208
[   33.372704] 
[   33.372774] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.372968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.373065] Hardware name: linux,dummy-virt (DT)
[   33.373152] Call trace:
[   33.373218]  show_stack+0x20/0x38 (C)
[   33.373359]  dump_stack_lvl+0x8c/0xd0
[   33.373717]  print_report+0x118/0x608
[   33.373857]  kasan_report+0xdc/0x128
[   33.373993]  __kasan_check_byte+0x54/0x70
[   33.374342]  ksize+0x30/0x88
[   33.374463]  ksize_uaf+0x168/0x5f8
[   33.374689]  kunit_try_run_case+0x170/0x3f0
[   33.374826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.375014]  kthread+0x328/0x630
[   33.375281]  ret_from_fork+0x10/0x20
[   33.375417] 
[   33.375464] Allocated by task 208:
[   33.375541]  kasan_save_stack+0x3c/0x68
[   33.375700]  kasan_save_track+0x20/0x40
[   33.375843]  kasan_save_alloc_info+0x40/0x58
[   33.375963]  __kasan_kmalloc+0xd4/0xd8
[   33.376220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.376332]  ksize_uaf+0xb8/0x5f8
[   33.376427]  kunit_try_run_case+0x170/0x3f0
[   33.376543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.376936]  kthread+0x328/0x630
[   33.377439]  ret_from_fork+0x10/0x20
[   33.377535] 
[   33.378176] Freed by task 208:
[   33.378267]  kasan_save_stack+0x3c/0x68
[   33.378366]  kasan_save_track+0x20/0x40
[   33.378459]  kasan_save_free_info+0x4c/0x78
[   33.379284]  __kasan_slab_free+0x6c/0x98
[   33.379425]  kfree+0x214/0x3c8
[   33.379521]  ksize_uaf+0x11c/0x5f8
[   33.379746]  kunit_try_run_case+0x170/0x3f0
[   33.379841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.380360]  kthread+0x328/0x630
[   33.380452]  ret_from_fork+0x10/0x20
[   33.380901] 
[   33.381070] The buggy address belongs to the object at fff00000c63f7500
[   33.381070]  which belongs to the cache kmalloc-128 of size 128
[   33.381939] The buggy address is located 0 bytes inside of
[   33.381939]  freed 128-byte region [fff00000c63f7500, fff00000c63f7580)
[   33.382645] 
[   33.382697] The buggy address belongs to the physical page:
[   33.382767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.382839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.382900] page_type: f5(slab)
[   33.382946] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.383007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.383257] page dumped because: kasan: bad access detected
[   33.383534] 
[   33.383685] Memory state around the buggy address:
[   33.383834]  fff00000c63f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.383946]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.384327] >fff00000c63f7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.384745]                    ^
[   33.384964]  fff00000c63f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.385084]  fff00000c63f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.385897] ==================================================================
[   33.401168] ==================================================================
[   33.401276] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   33.401397] Read of size 1 at addr fff00000c63f7578 by task kunit_try_catch/208
[   33.401509] 
[   33.401580] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.401776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.401842] Hardware name: linux,dummy-virt (DT)
[   33.401910] Call trace:
[   33.401961]  show_stack+0x20/0x38 (C)
[   33.403370]  dump_stack_lvl+0x8c/0xd0
[   33.403659]  print_report+0x118/0x608
[   33.403786]  kasan_report+0xdc/0x128
[   33.403908]  __asan_report_load1_noabort+0x20/0x30
[   33.404066]  ksize_uaf+0x544/0x5f8
[   33.404253]  kunit_try_run_case+0x170/0x3f0
[   33.404419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.404641]  kthread+0x328/0x630
[   33.404831]  ret_from_fork+0x10/0x20
[   33.405073] 
[   33.405235] Allocated by task 208:
[   33.405311]  kasan_save_stack+0x3c/0x68
[   33.405421]  kasan_save_track+0x20/0x40
[   33.405514]  kasan_save_alloc_info+0x40/0x58
[   33.405605]  __kasan_kmalloc+0xd4/0xd8
[   33.405690]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.405783]  ksize_uaf+0xb8/0x5f8
[   33.405864]  kunit_try_run_case+0x170/0x3f0
[   33.406017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.406245]  kthread+0x328/0x630
[   33.406337]  ret_from_fork+0x10/0x20
[   33.406506] 
[   33.406609] Freed by task 208:
[   33.406723]  kasan_save_stack+0x3c/0x68
[   33.406845]  kasan_save_track+0x20/0x40
[   33.406945]  kasan_save_free_info+0x4c/0x78
[   33.407121]  __kasan_slab_free+0x6c/0x98
[   33.407318]  kfree+0x214/0x3c8
[   33.407419]  ksize_uaf+0x11c/0x5f8
[   33.407586]  kunit_try_run_case+0x170/0x3f0
[   33.407887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.408049]  kthread+0x328/0x630
[   33.408284]  ret_from_fork+0x10/0x20
[   33.408381] 
[   33.408428] The buggy address belongs to the object at fff00000c63f7500
[   33.408428]  which belongs to the cache kmalloc-128 of size 128
[   33.408615] The buggy address is located 120 bytes inside of
[   33.408615]  freed 128-byte region [fff00000c63f7500, fff00000c63f7580)
[   33.409044] 
[   33.409103] The buggy address belongs to the physical page:
[   33.409188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.409571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.410288] page_type: f5(slab)
[   33.411346] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.411746] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.412098] page dumped because: kasan: bad access detected
[   33.412283] 
[   33.412332] Memory state around the buggy address:
[   33.412420]  fff00000c63f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.412535]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.413305] >fff00000c63f7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.414323]                                                                 ^
[   33.414691]  fff00000c63f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.415282]  fff00000c63f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.415622] ==================================================================
[   33.388375] ==================================================================
[   33.388495] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   33.388607] Read of size 1 at addr fff00000c63f7500 by task kunit_try_catch/208
[   33.388718] 
[   33.388789] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.388980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.389062] Hardware name: linux,dummy-virt (DT)
[   33.389148] Call trace:
[   33.389210]  show_stack+0x20/0x38 (C)
[   33.389408]  dump_stack_lvl+0x8c/0xd0
[   33.389637]  print_report+0x118/0x608
[   33.389781]  kasan_report+0xdc/0x128
[   33.389911]  __asan_report_load1_noabort+0x20/0x30
[   33.390129]  ksize_uaf+0x598/0x5f8
[   33.390352]  kunit_try_run_case+0x170/0x3f0
[   33.390475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.390862]  kthread+0x328/0x630
[   33.390981]  ret_from_fork+0x10/0x20
[   33.391167] 
[   33.391227] Allocated by task 208:
[   33.391345]  kasan_save_stack+0x3c/0x68
[   33.391478]  kasan_save_track+0x20/0x40
[   33.391587]  kasan_save_alloc_info+0x40/0x58
[   33.391713]  __kasan_kmalloc+0xd4/0xd8
[   33.392047]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.392156]  ksize_uaf+0xb8/0x5f8
[   33.392245]  kunit_try_run_case+0x170/0x3f0
[   33.392367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.392502]  kthread+0x328/0x630
[   33.392586]  ret_from_fork+0x10/0x20
[   33.392686] 
[   33.392815] Freed by task 208:
[   33.393011]  kasan_save_stack+0x3c/0x68
[   33.393133]  kasan_save_track+0x20/0x40
[   33.393251]  kasan_save_free_info+0x4c/0x78
[   33.393386]  __kasan_slab_free+0x6c/0x98
[   33.393798]  kfree+0x214/0x3c8
[   33.393907]  ksize_uaf+0x11c/0x5f8
[   33.394104]  kunit_try_run_case+0x170/0x3f0
[   33.394341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.394527]  kthread+0x328/0x630
[   33.394673]  ret_from_fork+0x10/0x20
[   33.394797] 
[   33.394848] The buggy address belongs to the object at fff00000c63f7500
[   33.394848]  which belongs to the cache kmalloc-128 of size 128
[   33.395073] The buggy address is located 0 bytes inside of
[   33.395073]  freed 128-byte region [fff00000c63f7500, fff00000c63f7580)
[   33.395364] 
[   33.395435] The buggy address belongs to the physical page:
[   33.395522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.395698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.395818] page_type: f5(slab)
[   33.395907] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.396043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.396143] page dumped because: kasan: bad access detected
[   33.396236] 
[   33.396291] Memory state around the buggy address:
[   33.396378]  fff00000c63f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.396825]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.396964] >fff00000c63f7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.397477]                    ^
[   33.397555]  fff00000c63f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.397659]  fff00000c63f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.397762] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   33.257662] ==================================================================
[   33.257781] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   33.257911] Read of size 1 at addr fff00000c56f1320 by task kunit_try_catch/204
[   33.258044] 
[   33.258121] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.258317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.258376] Hardware name: linux,dummy-virt (DT)
[   33.258448] Call trace:
[   33.258500]  show_stack+0x20/0x38 (C)
[   33.258616]  dump_stack_lvl+0x8c/0xd0
[   33.258733]  print_report+0x118/0x608
[   33.258857]  kasan_report+0xdc/0x128
[   33.258971]  __kasan_check_byte+0x54/0x70
[   33.259153]  kfree_sensitive+0x30/0xb0
[   33.259327]  kmalloc_double_kzfree+0x168/0x308
[   33.259562]  kunit_try_run_case+0x170/0x3f0
[   33.259705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.259845]  kthread+0x328/0x630
[   33.260140]  ret_from_fork+0x10/0x20
[   33.260271] 
[   33.260316] Allocated by task 204:
[   33.260391]  kasan_save_stack+0x3c/0x68
[   33.260488]  kasan_save_track+0x20/0x40
[   33.260582]  kasan_save_alloc_info+0x40/0x58
[   33.260689]  __kasan_kmalloc+0xd4/0xd8
[   33.260886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.260996]  kmalloc_double_kzfree+0xb8/0x308
[   33.261120]  kunit_try_run_case+0x170/0x3f0
[   33.261428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.261749]  kthread+0x328/0x630
[   33.261847]  ret_from_fork+0x10/0x20
[   33.262185] 
[   33.262233] Freed by task 204:
[   33.262982]  kasan_save_stack+0x3c/0x68
[   33.263210]  kasan_save_track+0x20/0x40
[   33.263358]  kasan_save_free_info+0x4c/0x78
[   33.263616]  __kasan_slab_free+0x6c/0x98
[   33.263714]  kfree+0x214/0x3c8
[   33.263853]  kfree_sensitive+0x80/0xb0
[   33.263959]  kmalloc_double_kzfree+0x11c/0x308
[   33.264296]  kunit_try_run_case+0x170/0x3f0
[   33.264674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.265107]  kthread+0x328/0x630
[   33.265196]  ret_from_fork+0x10/0x20
[   33.265970] 
[   33.266022] The buggy address belongs to the object at fff00000c56f1320
[   33.266022]  which belongs to the cache kmalloc-16 of size 16
[   33.266263] The buggy address is located 0 bytes inside of
[   33.266263]  freed 16-byte region [fff00000c56f1320, fff00000c56f1330)
[   33.266463] 
[   33.266512] The buggy address belongs to the physical page:
[   33.266638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   33.266921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.267143] page_type: f5(slab)
[   33.267324] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   33.267453] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.267559] page dumped because: kasan: bad access detected
[   33.267845] 
[   33.267930] Memory state around the buggy address:
[   33.267979]  fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.268062]  fff00000c56f1280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.268213] >fff00000c56f1300: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   33.268491]                                ^
[   33.268967]  fff00000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.269644]  fff00000c56f1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.269961] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   33.198926] ==================================================================
[   33.199115] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   33.199288] Read of size 1 at addr fff00000c570b7a8 by task kunit_try_catch/200
[   33.199512] 
[   33.199578] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.199770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.199836] Hardware name: linux,dummy-virt (DT)
[   33.199908] Call trace:
[   33.199959]  show_stack+0x20/0x38 (C)
[   33.200107]  dump_stack_lvl+0x8c/0xd0
[   33.200249]  print_report+0x118/0x608
[   33.200807]  kasan_report+0xdc/0x128
[   33.200941]  __asan_report_load1_noabort+0x20/0x30
[   33.201414]  kmalloc_uaf2+0x3f4/0x468
[   33.201543]  kunit_try_run_case+0x170/0x3f0
[   33.201662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.202020]  kthread+0x328/0x630
[   33.202176]  ret_from_fork+0x10/0x20
[   33.202349] 
[   33.202394] Allocated by task 200:
[   33.202533]  kasan_save_stack+0x3c/0x68
[   33.202802]  kasan_save_track+0x20/0x40
[   33.203258]  kasan_save_alloc_info+0x40/0x58
[   33.203363]  __kasan_kmalloc+0xd4/0xd8
[   33.203745]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.203884]  kmalloc_uaf2+0xc4/0x468
[   33.204348]  kunit_try_run_case+0x170/0x3f0
[   33.204440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.204544]  kthread+0x328/0x630
[   33.205903]  ret_from_fork+0x10/0x20
[   33.206072] 
[   33.206119] Freed by task 200:
[   33.206227]  kasan_save_stack+0x3c/0x68
[   33.206341]  kasan_save_track+0x20/0x40
[   33.206568]  kasan_save_free_info+0x4c/0x78
[   33.206663]  __kasan_slab_free+0x6c/0x98
[   33.206785]  kfree+0x214/0x3c8
[   33.207454]  kmalloc_uaf2+0x134/0x468
[   33.207633]  kunit_try_run_case+0x170/0x3f0
[   33.207731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.207851]  kthread+0x328/0x630
[   33.207937]  ret_from_fork+0x10/0x20
[   33.208049] 
[   33.209713] The buggy address belongs to the object at fff00000c570b780
[   33.209713]  which belongs to the cache kmalloc-64 of size 64
[   33.209921] The buggy address is located 40 bytes inside of
[   33.209921]  freed 64-byte region [fff00000c570b780, fff00000c570b7c0)
[   33.210944] 
[   33.211024] The buggy address belongs to the physical page:
[   33.211282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10570b
[   33.212171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.212309] page_type: f5(slab)
[   33.212487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.212684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.212814] page dumped because: kasan: bad access detected
[   33.212900] 
[   33.212954] Memory state around the buggy address:
[   33.213050]  fff00000c570b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.213212]  fff00000c570b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.213659] >fff00000c570b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.214107]                                   ^
[   33.214196]  fff00000c570b800: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   33.214662]  fff00000c570b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.215401] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   33.173832] ==================================================================
[   33.173902] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   33.173968] Write of size 33 at addr fff00000c570b600 by task kunit_try_catch/198
[   33.174056] 
[   33.174125] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.174339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.174404] Hardware name: linux,dummy-virt (DT)
[   33.174475] Call trace:
[   33.174530]  show_stack+0x20/0x38 (C)
[   33.174762]  dump_stack_lvl+0x8c/0xd0
[   33.175154]  print_report+0x118/0x608
[   33.175286]  kasan_report+0xdc/0x128
[   33.175411]  kasan_check_range+0x100/0x1a8
[   33.175697]  __asan_memset+0x34/0x78
[   33.175851]  kmalloc_uaf_memset+0x170/0x310
[   33.176105]  kunit_try_run_case+0x170/0x3f0
[   33.176265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.176398]  kthread+0x328/0x630
[   33.176502]  ret_from_fork+0x10/0x20
[   33.176616] 
[   33.176662] Allocated by task 198:
[   33.176738]  kasan_save_stack+0x3c/0x68
[   33.177010]  kasan_save_track+0x20/0x40
[   33.177134]  kasan_save_alloc_info+0x40/0x58
[   33.177624]  __kasan_kmalloc+0xd4/0xd8
[   33.178051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.178248]  kmalloc_uaf_memset+0xb8/0x310
[   33.178347]  kunit_try_run_case+0x170/0x3f0
[   33.178446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.178596]  kthread+0x328/0x630
[   33.178787]  ret_from_fork+0x10/0x20
[   33.178969] 
[   33.179021] Freed by task 198:
[   33.179107]  kasan_save_stack+0x3c/0x68
[   33.179222]  kasan_save_track+0x20/0x40
[   33.179395]  kasan_save_free_info+0x4c/0x78
[   33.179500]  __kasan_slab_free+0x6c/0x98
[   33.179805]  kfree+0x214/0x3c8
[   33.179937]  kmalloc_uaf_memset+0x11c/0x310
[   33.180106]  kunit_try_run_case+0x170/0x3f0
[   33.180381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.180567]  kthread+0x328/0x630
[   33.180689]  ret_from_fork+0x10/0x20
[   33.180802] 
[   33.180916] The buggy address belongs to the object at fff00000c570b600
[   33.180916]  which belongs to the cache kmalloc-64 of size 64
[   33.181130] The buggy address is located 0 bytes inside of
[   33.181130]  freed 64-byte region [fff00000c570b600, fff00000c570b640)
[   33.181378] 
[   33.181436] The buggy address belongs to the physical page:
[   33.181507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10570b
[   33.181651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.181837] page_type: f5(slab)
[   33.181976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.182118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.182226] page dumped because: kasan: bad access detected
[   33.182309] 
[   33.182351] Memory state around the buggy address:
[   33.182423]  fff00000c570b500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.182522]  fff00000c570b580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.183121] >fff00000c570b600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.183364]                    ^
[   33.183440]  fff00000c570b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.183585]  fff00000c570b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.183720] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   33.139977] ==================================================================
[   33.140115] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   33.140234] Read of size 1 at addr fff00000c56f1308 by task kunit_try_catch/196
[   33.140347] 
[   33.140420] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.140613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.140679] Hardware name: linux,dummy-virt (DT)
[   33.140763] Call trace:
[   33.140916]  show_stack+0x20/0x38 (C)
[   33.141142]  dump_stack_lvl+0x8c/0xd0
[   33.141318]  print_report+0x118/0x608
[   33.141463]  kasan_report+0xdc/0x128
[   33.141691]  __asan_report_load1_noabort+0x20/0x30
[   33.141912]  kmalloc_uaf+0x300/0x338
[   33.142064]  kunit_try_run_case+0x170/0x3f0
[   33.142248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.142392]  kthread+0x328/0x630
[   33.142623]  ret_from_fork+0x10/0x20
[   33.142849] 
[   33.142960] Allocated by task 196:
[   33.143131]  kasan_save_stack+0x3c/0x68
[   33.143241]  kasan_save_track+0x20/0x40
[   33.143440]  kasan_save_alloc_info+0x40/0x58
[   33.143635]  __kasan_kmalloc+0xd4/0xd8
[   33.143808]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.143916]  kmalloc_uaf+0xb8/0x338
[   33.144010]  kunit_try_run_case+0x170/0x3f0
[   33.144665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.145017]  kthread+0x328/0x630
[   33.145123]  ret_from_fork+0x10/0x20
[   33.145791] 
[   33.146051] Freed by task 196:
[   33.146125]  kasan_save_stack+0x3c/0x68
[   33.146226]  kasan_save_track+0x20/0x40
[   33.146319]  kasan_save_free_info+0x4c/0x78
[   33.147565]  __kasan_slab_free+0x6c/0x98
[   33.147915]  kfree+0x214/0x3c8
[   33.148786]  kmalloc_uaf+0x11c/0x338
[   33.149910]  kunit_try_run_case+0x170/0x3f0
[   33.150052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.150150]  kthread+0x328/0x630
[   33.150199]  ret_from_fork+0x10/0x20
[   33.150243] 
[   33.150289] The buggy address belongs to the object at fff00000c56f1300
[   33.150289]  which belongs to the cache kmalloc-16 of size 16
[   33.150386] The buggy address is located 8 bytes inside of
[   33.150386]  freed 16-byte region [fff00000c56f1300, fff00000c56f1310)
[   33.150457] 
[   33.150483] The buggy address belongs to the physical page:
[   33.150520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   33.150663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.150787] page_type: f5(slab)
[   33.150874] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   33.151100] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.151203] page dumped because: kasan: bad access detected
[   33.151285] 
[   33.151330] Memory state around the buggy address:
[   33.151408]  fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.151509]  fff00000c56f1280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.151608] >fff00000c56f1300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.151734]                       ^
[   33.151859]  fff00000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.151981]  fff00000c56f1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.152121] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   32.174446] ==================================================================
[   32.174674] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   32.174865] Read of size 1 at addr fff00000c56f127f by task kunit_try_catch/150
[   32.175015] 
[   32.175127] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.175544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.175965] Hardware name: linux,dummy-virt (DT)
[   32.176064] Call trace:
[   32.176594]  show_stack+0x20/0x38 (C)
[   32.176950]  dump_stack_lvl+0x8c/0xd0
[   32.177535]  print_report+0x118/0x608
[   32.177659]  kasan_report+0xdc/0x128
[   32.178409]  __asan_report_load1_noabort+0x20/0x30
[   32.178916]  kmalloc_oob_left+0x2ec/0x320
[   32.179314]  kunit_try_run_case+0x170/0x3f0
[   32.179468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.179999]  kthread+0x328/0x630
[   32.180240]  ret_from_fork+0x10/0x20
[   32.180383] 
[   32.181004] Allocated by task 21:
[   32.181472]  kasan_save_stack+0x3c/0x68
[   32.181691]  kasan_save_track+0x20/0x40
[   32.182273]  kasan_save_alloc_info+0x40/0x58
[   32.182503]  __kasan_kmalloc+0xd4/0xd8
[   32.182778]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   32.183415]  build_sched_domains+0x32c/0x3768
[   32.183529]  partition_sched_domains+0x79c/0x1098
[   32.183640]  rebuild_sched_domains_locked+0x494/0xde0
[   32.183754]  cpuset_handle_hotplug+0xab0/0x1480
[   32.184980]  cpuset_update_active_cpus+0x18/0x30
[   32.185098]  sched_cpu_activate+0x2d0/0x388
[   32.185642]  cpuhp_invoke_callback+0x5b8/0x1620
[   32.186330]  cpuhp_thread_fun+0x230/0x5d8
[   32.186485]  smpboot_thread_fn+0x2e8/0x760
[   32.186625]  kthread+0x328/0x630
[   32.186726]  ret_from_fork+0x10/0x20
[   32.187095] 
[   32.187419] Freed by task 21:
[   32.187529]  kasan_save_stack+0x3c/0x68
[   32.187630]  kasan_save_track+0x20/0x40
[   32.187719]  kasan_save_free_info+0x4c/0x78
[   32.187805]  __kasan_slab_free+0x6c/0x98
[   32.187996]  kfree+0x214/0x3c8
[   32.188099]  build_sched_domains+0x1c64/0x3768
[   32.188194]  partition_sched_domains+0x79c/0x1098
[   32.188322]  rebuild_sched_domains_locked+0x494/0xde0
[   32.188458]  cpuset_handle_hotplug+0xab0/0x1480
[   32.188554]  cpuset_update_active_cpus+0x18/0x30
[   32.188643]  sched_cpu_activate+0x2d0/0x388
[   32.188732]  cpuhp_invoke_callback+0x5b8/0x1620
[   32.188835]  cpuhp_thread_fun+0x230/0x5d8
[   32.188922]  smpboot_thread_fn+0x2e8/0x760
[   32.189016]  kthread+0x328/0x630
[   32.189743]  ret_from_fork+0x10/0x20
[   32.190729] 
[   32.190776] The buggy address belongs to the object at fff00000c56f1260
[   32.190776]  which belongs to the cache kmalloc-16 of size 16
[   32.190870] The buggy address is located 15 bytes to the right of
[   32.190870]  allocated 16-byte region [fff00000c56f1260, fff00000c56f1270)
[   32.191252] 
[   32.191422] The buggy address belongs to the physical page:
[   32.191496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   32.191623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.191740] page_type: f5(slab)
[   32.191830] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.191945] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.192057] page dumped because: kasan: bad access detected
[   32.192127] 
[   32.192170] Memory state around the buggy address:
[   32.192243]  fff00000c56f1100: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   32.192343]  fff00000c56f1180: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   32.192489] >fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.192716]                                                                 ^
[   32.192815]  fff00000c56f1280: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.192910]  fff00000c56f1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.193005] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   32.128492] ==================================================================
[   32.128625] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   32.128736] Write of size 1 at addr fff00000c56e8d78 by task kunit_try_catch/148
[   32.128941] 
[   32.129133] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.129551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.129614] Hardware name: linux,dummy-virt (DT)
[   32.129681] Call trace:
[   32.129730]  show_stack+0x20/0x38 (C)
[   32.129842]  dump_stack_lvl+0x8c/0xd0
[   32.129959]  print_report+0x118/0x608
[   32.130091]  kasan_report+0xdc/0x128
[   32.130203]  __asan_report_store1_noabort+0x20/0x30
[   32.130331]  kmalloc_oob_right+0x538/0x660
[   32.130640]  kunit_try_run_case+0x170/0x3f0
[   32.130792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.130945]  kthread+0x328/0x630
[   32.131090]  ret_from_fork+0x10/0x20
[   32.131276] 
[   32.131329] Allocated by task 148:
[   32.131405]  kasan_save_stack+0x3c/0x68
[   32.131512]  kasan_save_track+0x20/0x40
[   32.131727]  kasan_save_alloc_info+0x40/0x58
[   32.131959]  __kasan_kmalloc+0xd4/0xd8
[   32.132075]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.132175]  kmalloc_oob_right+0xb0/0x660
[   32.133140]  kunit_try_run_case+0x170/0x3f0
[   32.133258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.133428]  kthread+0x328/0x630
[   32.133519]  ret_from_fork+0x10/0x20
[   32.133927] 
[   32.133974] The buggy address belongs to the object at fff00000c56e8d00
[   32.133974]  which belongs to the cache kmalloc-128 of size 128
[   32.134457] The buggy address is located 5 bytes to the right of
[   32.134457]  allocated 115-byte region [fff00000c56e8d00, fff00000c56e8d73)
[   32.134810] 
[   32.134861] The buggy address belongs to the physical page:
[   32.135269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   32.135416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.135815] page_type: f5(slab)
[   32.135912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.136046] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.136451] page dumped because: kasan: bad access detected
[   32.136678] 
[   32.137112] Memory state around the buggy address:
[   32.137200]  fff00000c56e8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.137331]  fff00000c56e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.137845] >fff00000c56e8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.137936]                                                                 ^
[   32.138050]  fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.138150]  fff00000c56e8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.138235] ==================================================================
[   32.141746] ==================================================================
[   32.142189] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   32.142530] Read of size 1 at addr fff00000c56e8d80 by task kunit_try_catch/148
[   32.142834] 
[   32.142922] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.143850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.144262] Hardware name: linux,dummy-virt (DT)
[   32.144361] Call trace:
[   32.144417]  show_stack+0x20/0x38 (C)
[   32.144812]  dump_stack_lvl+0x8c/0xd0
[   32.144928]  print_report+0x118/0x608
[   32.145066]  kasan_report+0xdc/0x128
[   32.145200]  __asan_report_load1_noabort+0x20/0x30
[   32.145323]  kmalloc_oob_right+0x5d0/0x660
[   32.145939]  kunit_try_run_case+0x170/0x3f0
[   32.146170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.146711]  kthread+0x328/0x630
[   32.147093]  ret_from_fork+0x10/0x20
[   32.147229] 
[   32.147274] Allocated by task 148:
[   32.147576]  kasan_save_stack+0x3c/0x68
[   32.147706]  kasan_save_track+0x20/0x40
[   32.147806]  kasan_save_alloc_info+0x40/0x58
[   32.148528]  __kasan_kmalloc+0xd4/0xd8
[   32.148839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.148969]  kmalloc_oob_right+0xb0/0x660
[   32.149409]  kunit_try_run_case+0x170/0x3f0
[   32.149507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.150053]  kthread+0x328/0x630
[   32.150174]  ret_from_fork+0x10/0x20
[   32.150499] 
[   32.150545] The buggy address belongs to the object at fff00000c56e8d00
[   32.150545]  which belongs to the cache kmalloc-128 of size 128
[   32.151449] The buggy address is located 13 bytes to the right of
[   32.151449]  allocated 115-byte region [fff00000c56e8d00, fff00000c56e8d73)
[   32.151645] 
[   32.151947] The buggy address belongs to the physical page:
[   32.152163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   32.152313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.152679] page_type: f5(slab)
[   32.152864] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.153045] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.153298] page dumped because: kasan: bad access detected
[   32.153561] 
[   32.153801] Memory state around the buggy address:
[   32.154019]  fff00000c56e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.154298]  fff00000c56e8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.154396] >fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.154480]                    ^
[   32.154549]  fff00000c56e8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.154661]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.154768] ==================================================================
[   32.116990] ==================================================================
[   32.117378] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   32.118346] Write of size 1 at addr fff00000c56e8d73 by task kunit_try_catch/148
[   32.118478] 
[   32.119665] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.119843] Tainted: [N]=TEST
[   32.119888] Hardware name: linux,dummy-virt (DT)
[   32.120191] Call trace:
[   32.120401]  show_stack+0x20/0x38 (C)
[   32.120569]  dump_stack_lvl+0x8c/0xd0
[   32.120640]  print_report+0x118/0x608
[   32.120700]  kasan_report+0xdc/0x128
[   32.120754]  __asan_report_store1_noabort+0x20/0x30
[   32.120811]  kmalloc_oob_right+0x5a4/0x660
[   32.120866]  kunit_try_run_case+0x170/0x3f0
[   32.120926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.120990]  kthread+0x328/0x630
[   32.121061]  ret_from_fork+0x10/0x20
[   32.121247] 
[   32.121296] Allocated by task 148:
[   32.121438]  kasan_save_stack+0x3c/0x68
[   32.121525]  kasan_save_track+0x20/0x40
[   32.121576]  kasan_save_alloc_info+0x40/0x58
[   32.121622]  __kasan_kmalloc+0xd4/0xd8
[   32.121666]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.121715]  kmalloc_oob_right+0xb0/0x660
[   32.121759]  kunit_try_run_case+0x170/0x3f0
[   32.121803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.121854]  kthread+0x328/0x630
[   32.121894]  ret_from_fork+0x10/0x20
[   32.121961] 
[   32.122052] The buggy address belongs to the object at fff00000c56e8d00
[   32.122052]  which belongs to the cache kmalloc-128 of size 128
[   32.122168] The buggy address is located 0 bytes to the right of
[   32.122168]  allocated 115-byte region [fff00000c56e8d00, fff00000c56e8d73)
[   32.122252] 
[   32.122345] The buggy address belongs to the physical page:
[   32.122554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   32.122880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.123245] page_type: f5(slab)
[   32.123577] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.123652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.123789] page dumped because: kasan: bad access detected
[   32.123843] 
[   32.123877] Memory state around the buggy address:
[   32.124151]  fff00000c56e8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.124242]  fff00000c56e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.124312] >fff00000c56e8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.124379]                                                              ^
[   32.124486]  fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.124539]  fff00000c56e8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.124614] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   33.105684] ==================================================================
[   33.105824] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   33.106045] Read of size 64 at addr fff00000c570b304 by task kunit_try_catch/194
[   33.106215] 
[   33.106357] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.106624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.106703] Hardware name: linux,dummy-virt (DT)
[   33.106829] Call trace:
[   33.107086]  show_stack+0x20/0x38 (C)
[   33.107653]  dump_stack_lvl+0x8c/0xd0
[   33.108474]  print_report+0x118/0x608
[   33.108725]  kasan_report+0xdc/0x128
[   33.108908]  kasan_check_range+0x100/0x1a8
[   33.109043]  __asan_memmove+0x3c/0x98
[   33.110195]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   33.110605]  kunit_try_run_case+0x170/0x3f0
[   33.110827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.111013]  kthread+0x328/0x630
[   33.111232]  ret_from_fork+0x10/0x20
[   33.111389] 
[   33.111443] Allocated by task 194:
[   33.111530]  kasan_save_stack+0x3c/0x68
[   33.111826]  kasan_save_track+0x20/0x40
[   33.111927]  kasan_save_alloc_info+0x40/0x58
[   33.112113]  __kasan_kmalloc+0xd4/0xd8
[   33.112328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.112617]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   33.112856]  kunit_try_run_case+0x170/0x3f0
[   33.113670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.114012]  kthread+0x328/0x630
[   33.114124]  ret_from_fork+0x10/0x20
[   33.114614] 
[   33.114705] The buggy address belongs to the object at fff00000c570b300
[   33.114705]  which belongs to the cache kmalloc-64 of size 64
[   33.115233] The buggy address is located 4 bytes inside of
[   33.115233]  allocated 64-byte region [fff00000c570b300, fff00000c570b340)
[   33.115856] 
[   33.115924] The buggy address belongs to the physical page:
[   33.116150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10570b
[   33.116374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.116548] page_type: f5(slab)
[   33.116786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.116934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.117045] page dumped because: kasan: bad access detected
[   33.117131] 
[   33.117278] Memory state around the buggy address:
[   33.117356]  fff00000c570b200: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.117459]  fff00000c570b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.117559] >fff00000c570b300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.117646]                                            ^
[   33.117733]  fff00000c570b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.117833]  fff00000c570b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.117973] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   33.074168] ==================================================================
[   33.074416] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   33.074606] Read of size 18446744073709551614 at addr fff00000c570b104 by task kunit_try_catch/192
[   33.074823] 
[   33.074900] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.075127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.075163] Hardware name: linux,dummy-virt (DT)
[   33.075205] Call trace:
[   33.075232]  show_stack+0x20/0x38 (C)
[   33.075298]  dump_stack_lvl+0x8c/0xd0
[   33.075357]  print_report+0x118/0x608
[   33.075413]  kasan_report+0xdc/0x128
[   33.075470]  kasan_check_range+0x100/0x1a8
[   33.075530]  __asan_memmove+0x3c/0x98
[   33.075587]  kmalloc_memmove_negative_size+0x154/0x2e0
[   33.075650]  kunit_try_run_case+0x170/0x3f0
[   33.075706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.075769]  kthread+0x328/0x630
[   33.075824]  ret_from_fork+0x10/0x20
[   33.075881] 
[   33.075905] Allocated by task 192:
[   33.075940]  kasan_save_stack+0x3c/0x68
[   33.075994]  kasan_save_track+0x20/0x40
[   33.076068]  kasan_save_alloc_info+0x40/0x58
[   33.076120]  __kasan_kmalloc+0xd4/0xd8
[   33.076165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.076216]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   33.076266]  kunit_try_run_case+0x170/0x3f0
[   33.076312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.076365]  kthread+0x328/0x630
[   33.076404]  ret_from_fork+0x10/0x20
[   33.076446] 
[   33.076471] The buggy address belongs to the object at fff00000c570b100
[   33.076471]  which belongs to the cache kmalloc-64 of size 64
[   33.076538] The buggy address is located 4 bytes inside of
[   33.076538]  64-byte region [fff00000c570b100, fff00000c570b140)
[   33.076605] 
[   33.076631] The buggy address belongs to the physical page:
[   33.076667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10570b
[   33.076729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.076788] page_type: f5(slab)
[   33.076831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.076890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.076934] page dumped because: kasan: bad access detected
[   33.076971] 
[   33.076992] Memory state around the buggy address:
[   33.077294]  fff00000c570b000: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   33.077421]  fff00000c570b080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.077854] >fff00000c570b100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.077974]                    ^
[   33.078136]  fff00000c570b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.078619]  fff00000c570b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.078975] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   33.046404] ==================================================================
[   33.046517] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   33.046673] Write of size 16 at addr fff00000c63f7369 by task kunit_try_catch/190
[   33.047696] 
[   33.047818] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.048128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.048194] Hardware name: linux,dummy-virt (DT)
[   33.048269] Call trace:
[   33.048386]  show_stack+0x20/0x38 (C)
[   33.048506]  dump_stack_lvl+0x8c/0xd0
[   33.048618]  print_report+0x118/0x608
[   33.048728]  kasan_report+0xdc/0x128
[   33.048869]  kasan_check_range+0x100/0x1a8
[   33.048989]  __asan_memset+0x34/0x78
[   33.049113]  kmalloc_oob_memset_16+0x150/0x2f8
[   33.049228]  kunit_try_run_case+0x170/0x3f0
[   33.049347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.049469]  kthread+0x328/0x630
[   33.049582]  ret_from_fork+0x10/0x20
[   33.049907] 
[   33.050444] Allocated by task 190:
[   33.050521]  kasan_save_stack+0x3c/0x68
[   33.050814]  kasan_save_track+0x20/0x40
[   33.050931]  kasan_save_alloc_info+0x40/0x58
[   33.051631]  __kasan_kmalloc+0xd4/0xd8
[   33.052322]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.052431]  kmalloc_oob_memset_16+0xb0/0x2f8
[   33.052526]  kunit_try_run_case+0x170/0x3f0
[   33.052616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.052716]  kthread+0x328/0x630
[   33.052849]  ret_from_fork+0x10/0x20
[   33.053378] 
[   33.053514] The buggy address belongs to the object at fff00000c63f7300
[   33.053514]  which belongs to the cache kmalloc-128 of size 128
[   33.053931] The buggy address is located 105 bytes inside of
[   33.053931]  allocated 120-byte region [fff00000c63f7300, fff00000c63f7378)
[   33.054298] 
[   33.054500] The buggy address belongs to the physical page:
[   33.054600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.054770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.054939] page_type: f5(slab)
[   33.055148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.055405] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.056112] page dumped because: kasan: bad access detected
[   33.057315] 
[   33.057380] Memory state around the buggy address:
[   33.057456]  fff00000c63f7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.057728]  fff00000c63f7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.058260] >fff00000c63f7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.058676]                                                                 ^
[   33.058818]  fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.058948]  fff00000c63f7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.059066] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   33.011208] ==================================================================
[   33.011323] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   33.011441] Write of size 8 at addr fff00000c63f7271 by task kunit_try_catch/188
[   33.011549] 
[   33.011617] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.011809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.011869] Hardware name: linux,dummy-virt (DT)
[   33.011937] Call trace:
[   33.011991]  show_stack+0x20/0x38 (C)
[   33.012189]  dump_stack_lvl+0x8c/0xd0
[   33.012671]  print_report+0x118/0x608
[   33.012806]  kasan_report+0xdc/0x128
[   33.012937]  kasan_check_range+0x100/0x1a8
[   33.013084]  __asan_memset+0x34/0x78
[   33.014505]  kmalloc_oob_memset_8+0x150/0x2f8
[   33.015607]  kunit_try_run_case+0x170/0x3f0
[   33.016141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.016377]  kthread+0x328/0x630
[   33.016539]  ret_from_fork+0x10/0x20
[   33.016939] 
[   33.016991] Allocated by task 188:
[   33.017089]  kasan_save_stack+0x3c/0x68
[   33.017191]  kasan_save_track+0x20/0x40
[   33.017285]  kasan_save_alloc_info+0x40/0x58
[   33.017922]  __kasan_kmalloc+0xd4/0xd8
[   33.018016]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.018210]  kmalloc_oob_memset_8+0xb0/0x2f8
[   33.018809]  kunit_try_run_case+0x170/0x3f0
[   33.019017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.019336]  kthread+0x328/0x630
[   33.019418]  ret_from_fork+0x10/0x20
[   33.019503] 
[   33.019550] The buggy address belongs to the object at fff00000c63f7200
[   33.019550]  which belongs to the cache kmalloc-128 of size 128
[   33.019678] The buggy address is located 113 bytes inside of
[   33.019678]  allocated 120-byte region [fff00000c63f7200, fff00000c63f7278)
[   33.019821] 
[   33.020302] The buggy address belongs to the physical page:
[   33.020490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.021586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.021992] page_type: f5(slab)
[   33.022241] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.022681] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.022842] page dumped because: kasan: bad access detected
[   33.023281] 
[   33.023355] Memory state around the buggy address:
[   33.023451]  fff00000c63f7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.023630]  fff00000c63f7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.024295] >fff00000c63f7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.024438]                                                                 ^
[   33.024535]  fff00000c63f7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.024630]  fff00000c63f7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.024716] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   32.937155] ==================================================================
[   32.937272] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   32.937440] Write of size 2 at addr fff00000c63f7177 by task kunit_try_catch/184
[   32.937643] 
[   32.937975] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.938228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.938297] Hardware name: linux,dummy-virt (DT)
[   32.938372] Call trace:
[   32.938532]  show_stack+0x20/0x38 (C)
[   32.938660]  dump_stack_lvl+0x8c/0xd0
[   32.938864]  print_report+0x118/0x608
[   32.938975]  kasan_report+0xdc/0x128
[   32.939100]  kasan_check_range+0x100/0x1a8
[   32.939213]  __asan_memset+0x34/0x78
[   32.939313]  kmalloc_oob_memset_2+0x150/0x2f8
[   32.939421]  kunit_try_run_case+0x170/0x3f0
[   32.939534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.939654]  kthread+0x328/0x630
[   32.939757]  ret_from_fork+0x10/0x20
[   32.939870] 
[   32.939914] Allocated by task 184:
[   32.940315]  kasan_save_stack+0x3c/0x68
[   32.940488]  kasan_save_track+0x20/0x40
[   32.940598]  kasan_save_alloc_info+0x40/0x58
[   32.940809]  __kasan_kmalloc+0xd4/0xd8
[   32.941063]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.941270]  kmalloc_oob_memset_2+0xb0/0x2f8
[   32.941607]  kunit_try_run_case+0x170/0x3f0
[   32.941920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.942156]  kthread+0x328/0x630
[   32.942298]  ret_from_fork+0x10/0x20
[   32.942396] 
[   32.942445] The buggy address belongs to the object at fff00000c63f7100
[   32.942445]  which belongs to the cache kmalloc-128 of size 128
[   32.942690] The buggy address is located 119 bytes inside of
[   32.942690]  allocated 120-byte region [fff00000c63f7100, fff00000c63f7178)
[   32.942966] 
[   32.943244] The buggy address belongs to the physical page:
[   32.943327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   32.943466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.943811] page_type: f5(slab)
[   32.944181] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.944304] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.944484] page dumped because: kasan: bad access detected
[   32.944562] 
[   32.946611] Memory state around the buggy address:
[   32.946699]  fff00000c63f7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.946815]  fff00000c63f7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.946969] >fff00000c63f7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.947077]                                                                 ^
[   32.947460]  fff00000c63f7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.947562]  fff00000c63f7200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.947648] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   32.910633] ==================================================================
[   32.910796] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   32.910922] Write of size 128 at addr fff00000c63f7000 by task kunit_try_catch/182
[   32.911051] 
[   32.911132] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.911650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.911846] Hardware name: linux,dummy-virt (DT)
[   32.912388] Call trace:
[   32.912571]  show_stack+0x20/0x38 (C)
[   32.913219]  dump_stack_lvl+0x8c/0xd0
[   32.913411]  print_report+0x118/0x608
[   32.913837]  kasan_report+0xdc/0x128
[   32.914397]  kasan_check_range+0x100/0x1a8
[   32.914524]  __asan_memset+0x34/0x78
[   32.915000]  kmalloc_oob_in_memset+0x144/0x2d0
[   32.915670]  kunit_try_run_case+0x170/0x3f0
[   32.915834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.915988]  kthread+0x328/0x630
[   32.916125]  ret_from_fork+0x10/0x20
[   32.916244] 
[   32.916395] Allocated by task 182:
[   32.916478]  kasan_save_stack+0x3c/0x68
[   32.916592]  kasan_save_track+0x20/0x40
[   32.916773]  kasan_save_alloc_info+0x40/0x58
[   32.916992]  __kasan_kmalloc+0xd4/0xd8
[   32.917104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.917241]  kmalloc_oob_in_memset+0xb0/0x2d0
[   32.917340]  kunit_try_run_case+0x170/0x3f0
[   32.917463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.917571]  kthread+0x328/0x630
[   32.917681]  ret_from_fork+0x10/0x20
[   32.917807] 
[   32.917894] The buggy address belongs to the object at fff00000c63f7000
[   32.917894]  which belongs to the cache kmalloc-128 of size 128
[   32.918041] The buggy address is located 0 bytes inside of
[   32.918041]  allocated 120-byte region [fff00000c63f7000, fff00000c63f7078)
[   32.918180] 
[   32.918230] The buggy address belongs to the physical page:
[   32.918370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   32.918656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.918798] page_type: f5(slab)
[   32.918904] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.919086] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.919188] page dumped because: kasan: bad access detected
[   32.919272] 
[   32.919322] Memory state around the buggy address:
[   32.919406]  fff00000c63f6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.919517]  fff00000c63f6f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   32.919648] >fff00000c63f7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.919773]                                                                 ^
[   32.919937]  fff00000c63f7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.920076]  fff00000c63f7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.920327] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   32.861142] ==================================================================
[   32.861390] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   32.861683] Read of size 16 at addr fff00000c56f12e0 by task kunit_try_catch/180
[   32.861808] 
[   32.862003] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.862903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.862969] Hardware name: linux,dummy-virt (DT)
[   32.863067] Call trace:
[   32.863317]  show_stack+0x20/0x38 (C)
[   32.863447]  dump_stack_lvl+0x8c/0xd0
[   32.864339]  print_report+0x118/0x608
[   32.864811]  kasan_report+0xdc/0x128
[   32.865660]  __asan_report_load16_noabort+0x20/0x30
[   32.866220]  kmalloc_uaf_16+0x3bc/0x438
[   32.866455]  kunit_try_run_case+0x170/0x3f0
[   32.867350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.867997]  kthread+0x328/0x630
[   32.868342]  ret_from_fork+0x10/0x20
[   32.868464] 
[   32.868508] Allocated by task 180:
[   32.868575]  kasan_save_stack+0x3c/0x68
[   32.869878]  kasan_save_track+0x20/0x40
[   32.870467]  kasan_save_alloc_info+0x40/0x58
[   32.871279]  __kasan_kmalloc+0xd4/0xd8
[   32.871402]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.871833]  kmalloc_uaf_16+0x140/0x438
[   32.871944]  kunit_try_run_case+0x170/0x3f0
[   32.872419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.873048]  kthread+0x328/0x630
[   32.873140]  ret_from_fork+0x10/0x20
[   32.873547] 
[   32.873892] Freed by task 180:
[   32.874445]  kasan_save_stack+0x3c/0x68
[   32.874654]  kasan_save_track+0x20/0x40
[   32.874918]  kasan_save_free_info+0x4c/0x78
[   32.875102]  __kasan_slab_free+0x6c/0x98
[   32.875865]  kfree+0x214/0x3c8
[   32.876667]  kmalloc_uaf_16+0x190/0x438
[   32.877167]  kunit_try_run_case+0x170/0x3f0
[   32.877269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.877741]  kthread+0x328/0x630
[   32.878384]  ret_from_fork+0x10/0x20
[   32.878484] 
[   32.878957] The buggy address belongs to the object at fff00000c56f12e0
[   32.878957]  which belongs to the cache kmalloc-16 of size 16
[   32.879204] The buggy address is located 0 bytes inside of
[   32.879204]  freed 16-byte region [fff00000c56f12e0, fff00000c56f12f0)
[   32.879571] 
[   32.879623] The buggy address belongs to the physical page:
[   32.879693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   32.879813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.879925] page_type: f5(slab)
[   32.880485] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.881190] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.881775] page dumped because: kasan: bad access detected
[   32.881851] 
[   32.881895] Memory state around the buggy address:
[   32.881971]  fff00000c56f1180: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   32.883270]  fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.883392] >fff00000c56f1280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.884485]                                                        ^
[   32.884661]  fff00000c56f1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.884764]  fff00000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.885072] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   32.823647] ==================================================================
[   32.823775] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   32.823892] Write of size 16 at addr fff00000c56f12a0 by task kunit_try_catch/178
[   32.824012] 
[   32.824101] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.824289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.824348] Hardware name: linux,dummy-virt (DT)
[   32.824417] Call trace:
[   32.825341]  show_stack+0x20/0x38 (C)
[   32.825571]  dump_stack_lvl+0x8c/0xd0
[   32.826660]  print_report+0x118/0x608
[   32.826728]  kasan_report+0xdc/0x128
[   32.826831]  __asan_report_store16_noabort+0x20/0x30
[   32.826964]  kmalloc_oob_16+0x3a0/0x3f8
[   32.827388]  kunit_try_run_case+0x170/0x3f0
[   32.827526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.827828]  kthread+0x328/0x630
[   32.828002]  ret_from_fork+0x10/0x20
[   32.828205] 
[   32.828338] Allocated by task 178:
[   32.828614]  kasan_save_stack+0x3c/0x68
[   32.828718]  kasan_save_track+0x20/0x40
[   32.829430]  kasan_save_alloc_info+0x40/0x58
[   32.829528]  __kasan_kmalloc+0xd4/0xd8
[   32.830153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.830289]  kmalloc_oob_16+0xb4/0x3f8
[   32.830699]  kunit_try_run_case+0x170/0x3f0
[   32.831152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.831737]  kthread+0x328/0x630
[   32.831870]  ret_from_fork+0x10/0x20
[   32.832185] 
[   32.832235] The buggy address belongs to the object at fff00000c56f12a0
[   32.832235]  which belongs to the cache kmalloc-16 of size 16
[   32.832360] The buggy address is located 0 bytes inside of
[   32.832360]  allocated 13-byte region [fff00000c56f12a0, fff00000c56f12ad)
[   32.833536] 
[   32.833597] The buggy address belongs to the physical page:
[   32.833664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   32.833781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.833889] page_type: f5(slab)
[   32.833976] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.834107] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.834198] page dumped because: kasan: bad access detected
[   32.834268] 
[   32.834312] Memory state around the buggy address:
[   32.834381]  fff00000c56f1180: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   32.834476]  fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.835649] >fff00000c56f1280: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   32.835732]                                   ^
[   32.835814]  fff00000c56f1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.835941]  fff00000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.836080] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   32.759789] ==================================================================
[   32.759931] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   32.760122] Read of size 1 at addr fff00000c4511400 by task kunit_try_catch/176
[   32.760358] 
[   32.760483] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.760892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.761458] Hardware name: linux,dummy-virt (DT)
[   32.761835] Call trace:
[   32.762265]  show_stack+0x20/0x38 (C)
[   32.762483]  dump_stack_lvl+0x8c/0xd0
[   32.762925]  print_report+0x118/0x608
[   32.763355]  kasan_report+0xdc/0x128
[   32.763875]  __kasan_check_byte+0x54/0x70
[   32.763998]  krealloc_noprof+0x44/0x360
[   32.764136]  krealloc_uaf+0x180/0x520
[   32.764244]  kunit_try_run_case+0x170/0x3f0
[   32.765291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.765562]  kthread+0x328/0x630
[   32.766307]  ret_from_fork+0x10/0x20
[   32.766779] 
[   32.766836] Allocated by task 176:
[   32.767263]  kasan_save_stack+0x3c/0x68
[   32.767397]  kasan_save_track+0x20/0x40
[   32.767736]  kasan_save_alloc_info+0x40/0x58
[   32.767946]  __kasan_kmalloc+0xd4/0xd8
[   32.768376]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.768577]  krealloc_uaf+0xc8/0x520
[   32.768668]  kunit_try_run_case+0x170/0x3f0
[   32.768759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.768859]  kthread+0x328/0x630
[   32.768941]  ret_from_fork+0x10/0x20
[   32.769725] 
[   32.769784] Freed by task 176:
[   32.770429]  kasan_save_stack+0x3c/0x68
[   32.770739]  kasan_save_track+0x20/0x40
[   32.770875]  kasan_save_free_info+0x4c/0x78
[   32.770983]  __kasan_slab_free+0x6c/0x98
[   32.771793]  kfree+0x214/0x3c8
[   32.772134]  krealloc_uaf+0x12c/0x520
[   32.772689]  kunit_try_run_case+0x170/0x3f0
[   32.772839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.773458]  kthread+0x328/0x630
[   32.773654]  ret_from_fork+0x10/0x20
[   32.774171] 
[   32.774232] The buggy address belongs to the object at fff00000c4511400
[   32.774232]  which belongs to the cache kmalloc-256 of size 256
[   32.774560] The buggy address is located 0 bytes inside of
[   32.774560]  freed 256-byte region [fff00000c4511400, fff00000c4511500)
[   32.774704] 
[   32.775266] The buggy address belongs to the physical page:
[   32.775585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.775721] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.776087] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.776474] page_type: f5(slab)
[   32.776770] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.777112] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.777362] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.777481] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.777901] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.778159] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.778256] page dumped because: kasan: bad access detected
[   32.779091] 
[   32.779150] Memory state around the buggy address:
[   32.779236]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.779344]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.780075] >fff00000c4511400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.780169]                    ^
[   32.780237]  fff00000c4511480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.780345]  fff00000c4511500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.780435] ==================================================================
[   32.790247] ==================================================================
[   32.790347] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   32.791078] Read of size 1 at addr fff00000c4511400 by task kunit_try_catch/176
[   32.791211] 
[   32.791284] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.792232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.792691] Hardware name: linux,dummy-virt (DT)
[   32.792772] Call trace:
[   32.792824]  show_stack+0x20/0x38 (C)
[   32.792941]  dump_stack_lvl+0x8c/0xd0
[   32.793072]  print_report+0x118/0x608
[   32.793189]  kasan_report+0xdc/0x128
[   32.793302]  __asan_report_load1_noabort+0x20/0x30
[   32.794633]  krealloc_uaf+0x4c8/0x520
[   32.795792]  kunit_try_run_case+0x170/0x3f0
[   32.796330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.797348]  kthread+0x328/0x630
[   32.798091]  ret_from_fork+0x10/0x20
[   32.798496] 
[   32.798663] Allocated by task 176:
[   32.798932]  kasan_save_stack+0x3c/0x68
[   32.799606]  kasan_save_track+0x20/0x40
[   32.799792]  kasan_save_alloc_info+0x40/0x58
[   32.800488]  __kasan_kmalloc+0xd4/0xd8
[   32.800833]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.800949]  krealloc_uaf+0xc8/0x520
[   32.801904]  kunit_try_run_case+0x170/0x3f0
[   32.802826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.803258]  kthread+0x328/0x630
[   32.804137]  ret_from_fork+0x10/0x20
[   32.804814] 
[   32.804866] Freed by task 176:
[   32.805148]  kasan_save_stack+0x3c/0x68
[   32.805251]  kasan_save_track+0x20/0x40
[   32.805341]  kasan_save_free_info+0x4c/0x78
[   32.806202]  __kasan_slab_free+0x6c/0x98
[   32.806481]  kfree+0x214/0x3c8
[   32.806735]  krealloc_uaf+0x12c/0x520
[   32.806844]  kunit_try_run_case+0x170/0x3f0
[   32.807819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.807967]  kthread+0x328/0x630
[   32.808081]  ret_from_fork+0x10/0x20
[   32.808186] 
[   32.808240] The buggy address belongs to the object at fff00000c4511400
[   32.808240]  which belongs to the cache kmalloc-256 of size 256
[   32.808382] The buggy address is located 0 bytes inside of
[   32.808382]  freed 256-byte region [fff00000c4511400, fff00000c4511500)
[   32.808540] 
[   32.808592] The buggy address belongs to the physical page:
[   32.808766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.808941] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.809286] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.809432] page_type: f5(slab)
[   32.809522] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.809634] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.809745] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.809854] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.809965] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.810264] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.810630] page dumped because: kasan: bad access detected
[   32.810709] 
[   32.810798] Memory state around the buggy address:
[   32.810982]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.811116]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.811228] >fff00000c4511400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.811325]                    ^
[   32.811421]  fff00000c4511480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.811674]  fff00000c4511500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.811768] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   32.537006] ==================================================================
[   32.537327] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.537459] Write of size 1 at addr fff00000c45112c9 by task kunit_try_catch/170
[   32.537580] 
[   32.537781] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.538138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.538203] Hardware name: linux,dummy-virt (DT)
[   32.538275] Call trace:
[   32.538326]  show_stack+0x20/0x38 (C)
[   32.538449]  dump_stack_lvl+0x8c/0xd0
[   32.538671]  print_report+0x118/0x608
[   32.538822]  kasan_report+0xdc/0x128
[   32.539022]  __asan_report_store1_noabort+0x20/0x30
[   32.539435]  krealloc_less_oob_helper+0xa48/0xc50
[   32.539746]  krealloc_less_oob+0x20/0x38
[   32.539932]  kunit_try_run_case+0x170/0x3f0
[   32.540091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.540348]  kthread+0x328/0x630
[   32.540475]  ret_from_fork+0x10/0x20
[   32.540739] 
[   32.541209] Allocated by task 170:
[   32.541328]  kasan_save_stack+0x3c/0x68
[   32.542089]  kasan_save_track+0x20/0x40
[   32.542197]  kasan_save_alloc_info+0x40/0x58
[   32.542375]  __kasan_krealloc+0x118/0x178
[   32.542862]  krealloc_noprof+0x128/0x360
[   32.542986]  krealloc_less_oob_helper+0x168/0xc50
[   32.543102]  krealloc_less_oob+0x20/0x38
[   32.543221]  kunit_try_run_case+0x170/0x3f0
[   32.543442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.543560]  kthread+0x328/0x630
[   32.543746]  ret_from_fork+0x10/0x20
[   32.543842] 
[   32.543922] The buggy address belongs to the object at fff00000c4511200
[   32.543922]  which belongs to the cache kmalloc-256 of size 256
[   32.546071] The buggy address is located 0 bytes to the right of
[   32.546071]  allocated 201-byte region [fff00000c4511200, fff00000c45112c9)
[   32.546162] 
[   32.546191] The buggy address belongs to the physical page:
[   32.546240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.546904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.547039] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.547349] page_type: f5(slab)
[   32.547523] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.547638] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.547806] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.547995] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.548130] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.548242] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.548331] page dumped because: kasan: bad access detected
[   32.548399] 
[   32.548442] Memory state around the buggy address:
[   32.548517]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.548705]  fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.548807] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.548950]                                               ^
[   32.549167]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.549346]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.549823] ==================================================================
[   32.694732] ==================================================================
[   32.694919] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.695097] Write of size 1 at addr fff00000c577e0c9 by task kunit_try_catch/174
[   32.695226] 
[   32.695304] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.695605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.695691] Hardware name: linux,dummy-virt (DT)
[   32.695848] Call trace:
[   32.695908]  show_stack+0x20/0x38 (C)
[   32.696088]  dump_stack_lvl+0x8c/0xd0
[   32.696217]  print_report+0x118/0x608
[   32.696352]  kasan_report+0xdc/0x128
[   32.696490]  __asan_report_store1_noabort+0x20/0x30
[   32.696778]  krealloc_less_oob_helper+0xa48/0xc50
[   32.697154]  krealloc_large_less_oob+0x20/0x38
[   32.697494]  kunit_try_run_case+0x170/0x3f0
[   32.697842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.697976]  kthread+0x328/0x630
[   32.698120]  ret_from_fork+0x10/0x20
[   32.698351] 
[   32.698412] The buggy address belongs to the physical page:
[   32.698492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.699333] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.700022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.700229] page_type: f8(unknown)
[   32.700325] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.700442] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.700559] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.702184] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.702360] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.702576] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.703118] page dumped because: kasan: bad access detected
[   32.703215] 
[   32.703261] Memory state around the buggy address:
[   32.703679]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.704405]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.704511] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.705257]                                               ^
[   32.705830]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.706371]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.706493] ==================================================================
[   32.738096] ==================================================================
[   32.738303] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.738425] Write of size 1 at addr fff00000c577e0eb by task kunit_try_catch/174
[   32.738650] 
[   32.738720] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.738958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.739058] Hardware name: linux,dummy-virt (DT)
[   32.739260] Call trace:
[   32.739315]  show_stack+0x20/0x38 (C)
[   32.739445]  dump_stack_lvl+0x8c/0xd0
[   32.739754]  print_report+0x118/0x608
[   32.740048]  kasan_report+0xdc/0x128
[   32.740231]  __asan_report_store1_noabort+0x20/0x30
[   32.740354]  krealloc_less_oob_helper+0xa58/0xc50
[   32.740483]  krealloc_large_less_oob+0x20/0x38
[   32.740598]  kunit_try_run_case+0x170/0x3f0
[   32.740709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.740834]  kthread+0x328/0x630
[   32.740963]  ret_from_fork+0x10/0x20
[   32.741469] 
[   32.741520] The buggy address belongs to the physical page:
[   32.741721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.742172] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.742284] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.742396] page_type: f8(unknown)
[   32.742483] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.742615] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.743832] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.743952] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.744463] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.744645] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.744743] page dumped because: kasan: bad access detected
[   32.744815] 
[   32.744858] Memory state around the buggy address:
[   32.744937]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.745195]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.745298] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.745414]                                                           ^
[   32.745703]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.745806]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.745893] ==================================================================
[   32.709290] ==================================================================
[   32.709344] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.709478] Write of size 1 at addr fff00000c577e0d0 by task kunit_try_catch/174
[   32.709602] 
[   32.709727] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.709917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.709980] Hardware name: linux,dummy-virt (DT)
[   32.710069] Call trace:
[   32.710121]  show_stack+0x20/0x38 (C)
[   32.710235]  dump_stack_lvl+0x8c/0xd0
[   32.710344]  print_report+0x118/0x608
[   32.710456]  kasan_report+0xdc/0x128
[   32.710580]  __asan_report_store1_noabort+0x20/0x30
[   32.710935]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.711606]  krealloc_large_less_oob+0x20/0x38
[   32.711844]  kunit_try_run_case+0x170/0x3f0
[   32.712196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.712620]  kthread+0x328/0x630
[   32.713439]  ret_from_fork+0x10/0x20
[   32.713565] 
[   32.713612] The buggy address belongs to the physical page:
[   32.714365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.714498] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.714607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.714724] page_type: f8(unknown)
[   32.714830] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.714950] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.716384] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.716636] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.717303] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.717419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.717511] page dumped because: kasan: bad access detected
[   32.718497] 
[   32.718592] Memory state around the buggy address:
[   32.718869]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.718971]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.719709] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.719956]                                                  ^
[   32.720175]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.720364]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.720510] ==================================================================
[   32.731101] ==================================================================
[   32.731196] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.731310] Write of size 1 at addr fff00000c577e0ea by task kunit_try_catch/174
[   32.731435] 
[   32.731556] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.731780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.731858] Hardware name: linux,dummy-virt (DT)
[   32.731990] Call trace:
[   32.732199]  show_stack+0x20/0x38 (C)
[   32.732381]  dump_stack_lvl+0x8c/0xd0
[   32.732514]  print_report+0x118/0x608
[   32.732761]  kasan_report+0xdc/0x128
[   32.732928]  __asan_report_store1_noabort+0x20/0x30
[   32.733007]  krealloc_less_oob_helper+0xae4/0xc50
[   32.733131]  krealloc_large_less_oob+0x20/0x38
[   32.733249]  kunit_try_run_case+0x170/0x3f0
[   32.733447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.733606]  kthread+0x328/0x630
[   32.733815]  ret_from_fork+0x10/0x20
[   32.734040] 
[   32.734106] The buggy address belongs to the physical page:
[   32.734255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.734467] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.734731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.734940] page_type: f8(unknown)
[   32.735108] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.735229] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.735349] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.735505] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.735842] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.735976] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.736246] page dumped because: kasan: bad access detected
[   32.736450] 
[   32.736605] Memory state around the buggy address:
[   32.736679]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.736779]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.736879] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.736973]                                                           ^
[   32.737119]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.737352]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.737592] ==================================================================
[   32.721733] ==================================================================
[   32.721964] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.722173] Write of size 1 at addr fff00000c577e0da by task kunit_try_catch/174
[   32.722405] 
[   32.722483] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.722712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.722783] Hardware name: linux,dummy-virt (DT)
[   32.722846] Call trace:
[   32.722875]  show_stack+0x20/0x38 (C)
[   32.722938]  dump_stack_lvl+0x8c/0xd0
[   32.723046]  print_report+0x118/0x608
[   32.723212]  kasan_report+0xdc/0x128
[   32.723340]  __asan_report_store1_noabort+0x20/0x30
[   32.723682]  krealloc_less_oob_helper+0xa80/0xc50
[   32.724095]  krealloc_large_less_oob+0x20/0x38
[   32.724224]  kunit_try_run_case+0x170/0x3f0
[   32.724340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.724469]  kthread+0x328/0x630
[   32.724655]  ret_from_fork+0x10/0x20
[   32.725172] 
[   32.725267] The buggy address belongs to the physical page:
[   32.725337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.725451] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.726181] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.727160] page_type: f8(unknown)
[   32.727292] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.727642] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.727768] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.727883] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.728085] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.728361] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.728456] page dumped because: kasan: bad access detected
[   32.728565] 
[   32.728633] Memory state around the buggy address:
[   32.728752]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.728946]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.729061] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.729180]                                                     ^
[   32.729426]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.729526]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.729610] ==================================================================
[   32.564958] ==================================================================
[   32.565139] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.565408] Write of size 1 at addr fff00000c45112da by task kunit_try_catch/170
[   32.565997] 
[   32.566155] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.566357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.566418] Hardware name: linux,dummy-virt (DT)
[   32.566492] Call trace:
[   32.566814]  show_stack+0x20/0x38 (C)
[   32.567391]  dump_stack_lvl+0x8c/0xd0
[   32.567629]  print_report+0x118/0x608
[   32.567906]  kasan_report+0xdc/0x128
[   32.568142]  __asan_report_store1_noabort+0x20/0x30
[   32.568337]  krealloc_less_oob_helper+0xa80/0xc50
[   32.568550]  krealloc_less_oob+0x20/0x38
[   32.569022]  kunit_try_run_case+0x170/0x3f0
[   32.569234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.569429]  kthread+0x328/0x630
[   32.569547]  ret_from_fork+0x10/0x20
[   32.570113] 
[   32.570222] Allocated by task 170:
[   32.570314]  kasan_save_stack+0x3c/0x68
[   32.570489]  kasan_save_track+0x20/0x40
[   32.570592]  kasan_save_alloc_info+0x40/0x58
[   32.571094]  __kasan_krealloc+0x118/0x178
[   32.571331]  krealloc_noprof+0x128/0x360
[   32.571694]  krealloc_less_oob_helper+0x168/0xc50
[   32.572006]  krealloc_less_oob+0x20/0x38
[   32.572123]  kunit_try_run_case+0x170/0x3f0
[   32.572213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.572311]  kthread+0x328/0x630
[   32.572389]  ret_from_fork+0x10/0x20
[   32.572519] 
[   32.572567] The buggy address belongs to the object at fff00000c4511200
[   32.572567]  which belongs to the cache kmalloc-256 of size 256
[   32.572694] The buggy address is located 17 bytes to the right of
[   32.572694]  allocated 201-byte region [fff00000c4511200, fff00000c45112c9)
[   32.572869] 
[   32.572936] The buggy address belongs to the physical page:
[   32.573007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.574024] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.574180] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.574435] page_type: f5(slab)
[   32.574633] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.574965] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.575113] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.575239] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.575588] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.575940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.576268] page dumped because: kasan: bad access detected
[   32.576617] 
[   32.576969] Memory state around the buggy address:
[   32.577102]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.577488]  fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.577592] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.577643]                                                     ^
[   32.577689]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.577738]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.577780] ==================================================================
[   32.602636] ==================================================================
[   32.602742] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.603170] Write of size 1 at addr fff00000c45112eb by task kunit_try_catch/170
[   32.603330] 
[   32.603407] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.603605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.603676] Hardware name: linux,dummy-virt (DT)
[   32.603818] Call trace:
[   32.604014]  show_stack+0x20/0x38 (C)
[   32.604560]  dump_stack_lvl+0x8c/0xd0
[   32.604790]  print_report+0x118/0x608
[   32.605043]  kasan_report+0xdc/0x128
[   32.605284]  __asan_report_store1_noabort+0x20/0x30
[   32.605451]  krealloc_less_oob_helper+0xa58/0xc50
[   32.605743]  krealloc_less_oob+0x20/0x38
[   32.605954]  kunit_try_run_case+0x170/0x3f0
[   32.606092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.607161]  kthread+0x328/0x630
[   32.607926]  ret_from_fork+0x10/0x20
[   32.608632] 
[   32.609303] Allocated by task 170:
[   32.609473]  kasan_save_stack+0x3c/0x68
[   32.610433]  kasan_save_track+0x20/0x40
[   32.611064]  kasan_save_alloc_info+0x40/0x58
[   32.611169]  __kasan_krealloc+0x118/0x178
[   32.611271]  krealloc_noprof+0x128/0x360
[   32.612292]  krealloc_less_oob_helper+0x168/0xc50
[   32.613136]  krealloc_less_oob+0x20/0x38
[   32.613757]  kunit_try_run_case+0x170/0x3f0
[   32.613859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.614516]  kthread+0x328/0x630
[   32.614645]  ret_from_fork+0x10/0x20
[   32.614799] 
[   32.614902] The buggy address belongs to the object at fff00000c4511200
[   32.614902]  which belongs to the cache kmalloc-256 of size 256
[   32.615043] The buggy address is located 34 bytes to the right of
[   32.615043]  allocated 201-byte region [fff00000c4511200, fff00000c45112c9)
[   32.615189] 
[   32.615245] The buggy address belongs to the physical page:
[   32.615476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.615598] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.615768] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.615920] page_type: f5(slab)
[   32.616013] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.616148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.616261] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.616371] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.616481] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.616668] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.616869] page dumped because: kasan: bad access detected
[   32.616941] 
[   32.617483] Memory state around the buggy address:
[   32.618047]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.618610]  fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.619239] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.620211]                                                           ^
[   32.620524]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.620626]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.620716] ==================================================================
[   32.551790] ==================================================================
[   32.551879] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.551985] Write of size 1 at addr fff00000c45112d0 by task kunit_try_catch/170
[   32.552201] 
[   32.552306] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.552694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.552761] Hardware name: linux,dummy-virt (DT)
[   32.552898] Call trace:
[   32.552981]  show_stack+0x20/0x38 (C)
[   32.553422]  dump_stack_lvl+0x8c/0xd0
[   32.553729]  print_report+0x118/0x608
[   32.553877]  kasan_report+0xdc/0x128
[   32.553995]  __asan_report_store1_noabort+0x20/0x30
[   32.554882]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.555517]  krealloc_less_oob+0x20/0x38
[   32.555654]  kunit_try_run_case+0x170/0x3f0
[   32.555767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.555901]  kthread+0x328/0x630
[   32.556362]  ret_from_fork+0x10/0x20
[   32.556737] 
[   32.556842] Allocated by task 170:
[   32.556914]  kasan_save_stack+0x3c/0x68
[   32.557074]  kasan_save_track+0x20/0x40
[   32.557204]  kasan_save_alloc_info+0x40/0x58
[   32.557447]  __kasan_krealloc+0x118/0x178
[   32.557592]  krealloc_noprof+0x128/0x360
[   32.557758]  krealloc_less_oob_helper+0x168/0xc50
[   32.558050]  krealloc_less_oob+0x20/0x38
[   32.558166]  kunit_try_run_case+0x170/0x3f0
[   32.558288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.558616]  kthread+0x328/0x630
[   32.558717]  ret_from_fork+0x10/0x20
[   32.558837] 
[   32.558891] The buggy address belongs to the object at fff00000c4511200
[   32.558891]  which belongs to the cache kmalloc-256 of size 256
[   32.559081] The buggy address is located 7 bytes to the right of
[   32.559081]  allocated 201-byte region [fff00000c4511200, fff00000c45112c9)
[   32.559240] 
[   32.559294] The buggy address belongs to the physical page:
[   32.559367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.559534] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.559658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.559791] page_type: f5(slab)
[   32.559889] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.560013] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.560162] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.560316] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.560473] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.560597] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.560710] page dumped because: kasan: bad access detected
[   32.560813] 
[   32.560868] Memory state around the buggy address:
[   32.560988]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.561117]  fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.561269] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.561409]                                                  ^
[   32.561514]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.561630]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.561742] ==================================================================
[   32.583425] ==================================================================
[   32.583527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.583846] Write of size 1 at addr fff00000c45112ea by task kunit_try_catch/170
[   32.584576] 
[   32.584646] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.584941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.585718] Hardware name: linux,dummy-virt (DT)
[   32.585853] Call trace:
[   32.586185]  show_stack+0x20/0x38 (C)
[   32.586502]  dump_stack_lvl+0x8c/0xd0
[   32.586691]  print_report+0x118/0x608
[   32.587339]  kasan_report+0xdc/0x128
[   32.587470]  __asan_report_store1_noabort+0x20/0x30
[   32.587847]  krealloc_less_oob_helper+0xae4/0xc50
[   32.588766]  krealloc_less_oob+0x20/0x38
[   32.588944]  kunit_try_run_case+0x170/0x3f0
[   32.589450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.589969]  kthread+0x328/0x630
[   32.590528]  ret_from_fork+0x10/0x20
[   32.590670] 
[   32.590722] Allocated by task 170:
[   32.590813]  kasan_save_stack+0x3c/0x68
[   32.590927]  kasan_save_track+0x20/0x40
[   32.591024]  kasan_save_alloc_info+0x40/0x58
[   32.591342]  __kasan_krealloc+0x118/0x178
[   32.591527]  krealloc_noprof+0x128/0x360
[   32.592272]  krealloc_less_oob_helper+0x168/0xc50
[   32.592783]  krealloc_less_oob+0x20/0x38
[   32.593472]  kunit_try_run_case+0x170/0x3f0
[   32.593735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.593842]  kthread+0x328/0x630
[   32.594365]  ret_from_fork+0x10/0x20
[   32.594548] 
[   32.594735] The buggy address belongs to the object at fff00000c4511200
[   32.594735]  which belongs to the cache kmalloc-256 of size 256
[   32.594882] The buggy address is located 33 bytes to the right of
[   32.594882]  allocated 201-byte region [fff00000c4511200, fff00000c45112c9)
[   32.595023] 
[   32.596041] The buggy address belongs to the physical page:
[   32.596117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.596467] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.596626] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.596751] page_type: f5(slab)
[   32.597338] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.597537] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.597810] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.598208] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.598417] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.598536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.598630] page dumped because: kasan: bad access detected
[   32.599086] 
[   32.599144] Memory state around the buggy address:
[   32.599408]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.599874]  fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.599979] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.600334]                                                           ^
[   32.600926]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.601394]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.601523] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   32.486682] ==================================================================
[   32.486853] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   32.486990] Write of size 1 at addr fff00000c45110eb by task kunit_try_catch/168
[   32.487123] 
[   32.490405] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.490532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.490680] Hardware name: linux,dummy-virt (DT)
[   32.490894] Call trace:
[   32.490960]  show_stack+0x20/0x38 (C)
[   32.491116]  dump_stack_lvl+0x8c/0xd0
[   32.491779]  print_report+0x118/0x608
[   32.492218]  kasan_report+0xdc/0x128
[   32.492453]  __asan_report_store1_noabort+0x20/0x30
[   32.492838]  krealloc_more_oob_helper+0x60c/0x678
[   32.493097]  krealloc_more_oob+0x20/0x38
[   32.493226]  kunit_try_run_case+0x170/0x3f0
[   32.493459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.493657]  kthread+0x328/0x630
[   32.493826]  ret_from_fork+0x10/0x20
[   32.494042] 
[   32.494368] Allocated by task 168:
[   32.494448]  kasan_save_stack+0x3c/0x68
[   32.496209]  kasan_save_track+0x20/0x40
[   32.496320]  kasan_save_alloc_info+0x40/0x58
[   32.496487]  __kasan_krealloc+0x118/0x178
[   32.496617]  krealloc_noprof+0x128/0x360
[   32.497111]  krealloc_more_oob_helper+0x168/0x678
[   32.497211]  krealloc_more_oob+0x20/0x38
[   32.497300]  kunit_try_run_case+0x170/0x3f0
[   32.498094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.499527]  kthread+0x328/0x630
[   32.500373]  ret_from_fork+0x10/0x20
[   32.500863] 
[   32.500945] The buggy address belongs to the object at fff00000c4511000
[   32.500945]  which belongs to the cache kmalloc-256 of size 256
[   32.501459] The buggy address is located 0 bytes to the right of
[   32.501459]  allocated 235-byte region [fff00000c4511000, fff00000c45110eb)
[   32.501608] 
[   32.501660] The buggy address belongs to the physical page:
[   32.501737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.501856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.504423] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.505460] page_type: f5(slab)
[   32.505563] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.506575] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.507524] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.507656] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.507787] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.507907] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.508118] page dumped because: kasan: bad access detected
[   32.509016] 
[   32.509573] Memory state around the buggy address:
[   32.509660]  fff00000c4510f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.509763]  fff00000c4511000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.509859] >fff00000c4511080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.510511]                                                           ^
[   32.510652]  fff00000c4511100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.510784]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.511184] ==================================================================
[   32.653188] ==================================================================
[   32.653457] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   32.654345] Write of size 1 at addr fff00000c577e0eb by task kunit_try_catch/172
[   32.655116] 
[   32.655372] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.655957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.656053] Hardware name: linux,dummy-virt (DT)
[   32.656355] Call trace:
[   32.656654]  show_stack+0x20/0x38 (C)
[   32.657306]  dump_stack_lvl+0x8c/0xd0
[   32.657700]  print_report+0x118/0x608
[   32.657818]  kasan_report+0xdc/0x128
[   32.658600]  __asan_report_store1_noabort+0x20/0x30
[   32.658741]  krealloc_more_oob_helper+0x60c/0x678
[   32.658886]  krealloc_large_more_oob+0x20/0x38
[   32.659018]  kunit_try_run_case+0x170/0x3f0
[   32.659164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.659291]  kthread+0x328/0x630
[   32.660287]  ret_from_fork+0x10/0x20
[   32.660444] 
[   32.660832] The buggy address belongs to the physical page:
[   32.661380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.661890] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.662678] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.663220] page_type: f8(unknown)
[   32.663319] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.663744] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.664159] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.664629] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.664749] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.665625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.665925] page dumped because: kasan: bad access detected
[   32.666003] 
[   32.666063] Memory state around the buggy address:
[   32.666148]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.666255]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.666358] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   32.666448]                                                           ^
[   32.666541]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.666655]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.666880] ==================================================================
[   32.514647] ==================================================================
[   32.514762] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   32.514954] Write of size 1 at addr fff00000c45110f0 by task kunit_try_catch/168
[   32.515088] 
[   32.515165] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.515398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.515474] Hardware name: linux,dummy-virt (DT)
[   32.515750] Call trace:
[   32.515810]  show_stack+0x20/0x38 (C)
[   32.515968]  dump_stack_lvl+0x8c/0xd0
[   32.516210]  print_report+0x118/0x608
[   32.516387]  kasan_report+0xdc/0x128
[   32.516512]  __asan_report_store1_noabort+0x20/0x30
[   32.516649]  krealloc_more_oob_helper+0x5c0/0x678
[   32.516773]  krealloc_more_oob+0x20/0x38
[   32.516896]  kunit_try_run_case+0x170/0x3f0
[   32.517010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.517156]  kthread+0x328/0x630
[   32.517265]  ret_from_fork+0x10/0x20
[   32.517413] 
[   32.517477] Allocated by task 168:
[   32.517548]  kasan_save_stack+0x3c/0x68
[   32.517653]  kasan_save_track+0x20/0x40
[   32.517764]  kasan_save_alloc_info+0x40/0x58
[   32.517850]  __kasan_krealloc+0x118/0x178
[   32.517948]  krealloc_noprof+0x128/0x360
[   32.518060]  krealloc_more_oob_helper+0x168/0x678
[   32.518172]  krealloc_more_oob+0x20/0x38
[   32.518344]  kunit_try_run_case+0x170/0x3f0
[   32.518483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.519013]  kthread+0x328/0x630
[   32.519147]  ret_from_fork+0x10/0x20
[   32.519241] 
[   32.519289] The buggy address belongs to the object at fff00000c4511000
[   32.519289]  which belongs to the cache kmalloc-256 of size 256
[   32.519438] The buggy address is located 5 bytes to the right of
[   32.519438]  allocated 235-byte region [fff00000c4511000, fff00000c45110eb)
[   32.519690] 
[   32.519871] The buggy address belongs to the physical page:
[   32.519962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.520115] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.520339] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.520560] page_type: f5(slab)
[   32.520707] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.520960] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.521112] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.521230] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.521399] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.522648] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.522711] page dumped because: kasan: bad access detected
[   32.522758] 
[   32.522780] Memory state around the buggy address:
[   32.522844]  fff00000c4510f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.522921]  fff00000c4511000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.522972] >fff00000c4511080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.523015]                                                              ^
[   32.523187]  fff00000c4511100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.523481]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.524007] ==================================================================
[   32.668599] ==================================================================
[   32.668719] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   32.668955] Write of size 1 at addr fff00000c577e0f0 by task kunit_try_catch/172
[   32.669184] 
[   32.669363] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.669871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.670049] Hardware name: linux,dummy-virt (DT)
[   32.670140] Call trace:
[   32.670256]  show_stack+0x20/0x38 (C)
[   32.670382]  dump_stack_lvl+0x8c/0xd0
[   32.670642]  print_report+0x118/0x608
[   32.670777]  kasan_report+0xdc/0x128
[   32.670931]  __asan_report_store1_noabort+0x20/0x30
[   32.671080]  krealloc_more_oob_helper+0x5c0/0x678
[   32.671241]  krealloc_large_more_oob+0x20/0x38
[   32.671473]  kunit_try_run_case+0x170/0x3f0
[   32.671695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.671830]  kthread+0x328/0x630
[   32.671961]  ret_from_fork+0x10/0x20
[   32.672242] 
[   32.672340] The buggy address belongs to the physical page:
[   32.672415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.672682] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.672792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.672941] page_type: f8(unknown)
[   32.673207] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.673484] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.673685] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.673796] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.673907] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.674018] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.674131] page dumped because: kasan: bad access detected
[   32.674210] 
[   32.674328] Memory state around the buggy address:
[   32.674530]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.674693]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.674987] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   32.675126]                                                              ^
[   32.675235]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.675380]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.675547] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   32.381052] ==================================================================
[   32.381358] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   32.382155] Free of addr fff00000c5778001 by task kunit_try_catch/162
[   32.382662] 
[   32.382766] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.383500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.383568] Hardware name: linux,dummy-virt (DT)
[   32.383651] Call trace:
[   32.383717]  show_stack+0x20/0x38 (C)
[   32.383981]  dump_stack_lvl+0x8c/0xd0
[   32.384124]  print_report+0x118/0x608
[   32.384507]  kasan_report_invalid_free+0xc0/0xe8
[   32.384711]  __kasan_kfree_large+0x5c/0xa8
[   32.385001]  free_large_kmalloc+0x68/0x150
[   32.385135]  kfree+0x270/0x3c8
[   32.385238]  kmalloc_large_invalid_free+0x108/0x270
[   32.385607]  kunit_try_run_case+0x170/0x3f0
[   32.385759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.385943]  kthread+0x328/0x630
[   32.387137]  ret_from_fork+0x10/0x20
[   32.387489] 
[   32.387561] The buggy address belongs to the physical page:
[   32.387635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105778
[   32.387756] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.387868] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.388074] page_type: f8(unknown)
[   32.388264] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.388510] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.388750] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.388862] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.388973] head: 0bfffe0000000002 ffffc1ffc315de01 00000000ffffffff 00000000ffffffff
[   32.389754] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.389862] page dumped because: kasan: bad access detected
[   32.390188] 
[   32.390234] Memory state around the buggy address:
[   32.390309]  fff00000c5777f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.390414]  fff00000c5777f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.390513] >fff00000c5778000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.390722]                    ^
[   32.391511]  fff00000c5778080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.391634]  fff00000c5778100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.392147] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   32.356401] ==================================================================
[   32.356480] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   32.356550] Read of size 1 at addr fff00000c5778000 by task kunit_try_catch/160
[   32.356608] 
[   32.356648] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.356749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.356779] Hardware name: linux,dummy-virt (DT)
[   32.356816] Call trace:
[   32.356843]  show_stack+0x20/0x38 (C)
[   32.356905]  dump_stack_lvl+0x8c/0xd0
[   32.356962]  print_report+0x118/0x608
[   32.357020]  kasan_report+0xdc/0x128
[   32.357106]  __asan_report_load1_noabort+0x20/0x30
[   32.357164]  kmalloc_large_uaf+0x2cc/0x2f8
[   32.357218]  kunit_try_run_case+0x170/0x3f0
[   32.357275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.357336]  kthread+0x328/0x630
[   32.357386]  ret_from_fork+0x10/0x20
[   32.357443] 
[   32.357469] The buggy address belongs to the physical page:
[   32.357504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105778
[   32.357562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.357636] raw: 0bfffe0000000000 ffffc1ffc315df08 fff00000da496c80 0000000000000000
[   32.357693] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   32.357739] page dumped because: kasan: bad access detected
[   32.357776] 
[   32.357797] Memory state around the buggy address:
[   32.357834]  fff00000c5777f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.357884]  fff00000c5777f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.357932] >fff00000c5778000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.357974]                    ^
[   32.358007]  fff00000c5778080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.358135]  fff00000c5778100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.358236] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   32.322115] ==================================================================
[   32.322384] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   32.322530] Write of size 1 at addr fff00000c577a00a by task kunit_try_catch/158
[   32.322659] 
[   32.322751] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.322993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.323152] Hardware name: linux,dummy-virt (DT)
[   32.323399] Call trace:
[   32.323469]  show_stack+0x20/0x38 (C)
[   32.323592]  dump_stack_lvl+0x8c/0xd0
[   32.323718]  print_report+0x118/0x608
[   32.324100]  kasan_report+0xdc/0x128
[   32.324243]  __asan_report_store1_noabort+0x20/0x30
[   32.324595]  kmalloc_large_oob_right+0x278/0x2b8
[   32.324789]  kunit_try_run_case+0x170/0x3f0
[   32.325372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.325826]  kthread+0x328/0x630
[   32.326116]  ret_from_fork+0x10/0x20
[   32.326374] 
[   32.326675] The buggy address belongs to the physical page:
[   32.326782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105778
[   32.326906] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.327009] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.327235] page_type: f8(unknown)
[   32.327341] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.327487] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.327605] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.327789] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.328005] head: 0bfffe0000000002 ffffc1ffc315de01 00000000ffffffff 00000000ffffffff
[   32.328170] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.328335] page dumped because: kasan: bad access detected
[   32.328408] 
[   32.328451] Memory state around the buggy address:
[   32.328603]  fff00000c5779f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.328748]  fff00000c5779f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.328891] >fff00000c577a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.329062]                       ^
[   32.329150]  fff00000c577a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.329327]  fff00000c577a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.329455] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   32.289464] ==================================================================
[   32.289583] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   32.289715] Write of size 1 at addr fff00000c64f5f00 by task kunit_try_catch/156
[   32.289824] 
[   32.289898] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.291005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.291094] Hardware name: linux,dummy-virt (DT)
[   32.291173] Call trace:
[   32.291248]  show_stack+0x20/0x38 (C)
[   32.291838]  dump_stack_lvl+0x8c/0xd0
[   32.292072]  print_report+0x118/0x608
[   32.292207]  kasan_report+0xdc/0x128
[   32.292539]  __asan_report_store1_noabort+0x20/0x30
[   32.292689]  kmalloc_big_oob_right+0x2a4/0x2f0
[   32.292802]  kunit_try_run_case+0x170/0x3f0
[   32.293151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.293496]  kthread+0x328/0x630
[   32.293734]  ret_from_fork+0x10/0x20
[   32.293940] 
[   32.293989] Allocated by task 156:
[   32.294077]  kasan_save_stack+0x3c/0x68
[   32.294193]  kasan_save_track+0x20/0x40
[   32.294287]  kasan_save_alloc_info+0x40/0x58
[   32.294391]  __kasan_kmalloc+0xd4/0xd8
[   32.294497]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.294603]  kmalloc_big_oob_right+0xb8/0x2f0
[   32.294768]  kunit_try_run_case+0x170/0x3f0
[   32.295041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.295158]  kthread+0x328/0x630
[   32.295264]  ret_from_fork+0x10/0x20
[   32.295480] 
[   32.295533] The buggy address belongs to the object at fff00000c64f4000
[   32.295533]  which belongs to the cache kmalloc-8k of size 8192
[   32.295935] The buggy address is located 0 bytes to the right of
[   32.295935]  allocated 7936-byte region [fff00000c64f4000, fff00000c64f5f00)
[   32.296344] 
[   32.296471] The buggy address belongs to the physical page:
[   32.296546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f0
[   32.296666] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.297150] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.297508] page_type: f5(slab)
[   32.297695] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   32.297808] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   32.297921] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   32.298051] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   32.298859] head: 0bfffe0000000003 ffffc1ffc3193c01 00000000ffffffff 00000000ffffffff
[   32.299043] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   32.299272] page dumped because: kasan: bad access detected
[   32.299579] 
[   32.299641] Memory state around the buggy address:
[   32.299955]  fff00000c64f5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.300474]  fff00000c64f5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.300586] >fff00000c64f5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.300817]                    ^
[   32.300924]  fff00000c64f5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.301363]  fff00000c64f6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.301471] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   32.245869] ==================================================================
[   32.246699] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   32.246882] Write of size 1 at addr fff00000c56e8e78 by task kunit_try_catch/154
[   32.246958] 
[   32.247002] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.247175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.247209] Hardware name: linux,dummy-virt (DT)
[   32.247248] Call trace:
[   32.247275]  show_stack+0x20/0x38 (C)
[   32.247340]  dump_stack_lvl+0x8c/0xd0
[   32.247398]  print_report+0x118/0x608
[   32.247456]  kasan_report+0xdc/0x128
[   32.247510]  __asan_report_store1_noabort+0x20/0x30
[   32.247566]  kmalloc_track_caller_oob_right+0x40c/0x488
[   32.247625]  kunit_try_run_case+0x170/0x3f0
[   32.247683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.247744]  kthread+0x328/0x630
[   32.247794]  ret_from_fork+0x10/0x20
[   32.247851] 
[   32.247874] Allocated by task 154:
[   32.247908]  kasan_save_stack+0x3c/0x68
[   32.247959]  kasan_save_track+0x20/0x40
[   32.248005]  kasan_save_alloc_info+0x40/0x58
[   32.248077]  __kasan_kmalloc+0xd4/0xd8
[   32.248126]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   32.248181]  kmalloc_track_caller_oob_right+0xa8/0x488
[   32.248231]  kunit_try_run_case+0x170/0x3f0
[   32.248275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.248326]  kthread+0x328/0x630
[   32.248363]  ret_from_fork+0x10/0x20
[   32.248404] 
[   32.248427] The buggy address belongs to the object at fff00000c56e8e00
[   32.248427]  which belongs to the cache kmalloc-128 of size 128
[   32.248494] The buggy address is located 0 bytes to the right of
[   32.248494]  allocated 120-byte region [fff00000c56e8e00, fff00000c56e8e78)
[   32.248566] 
[   32.248589] The buggy address belongs to the physical page:
[   32.248625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   32.248686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.248747] page_type: f5(slab)
[   32.248793] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.248849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.248895] page dumped because: kasan: bad access detected
[   32.248929] 
[   32.248949] Memory state around the buggy address:
[   32.248985]  fff00000c56e8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.249190]  fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.249341] >fff00000c56e8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.249435]                                                                 ^
[   32.250483]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.250655]  fff00000c56e8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.250785] ==================================================================
[   32.252433] ==================================================================
[   32.252522] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   32.252647] Write of size 1 at addr fff00000c56e8f78 by task kunit_try_catch/154
[   32.252780] 
[   32.253335] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.253962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.254090] Hardware name: linux,dummy-virt (DT)
[   32.254306] Call trace:
[   32.254362]  show_stack+0x20/0x38 (C)
[   32.254476]  dump_stack_lvl+0x8c/0xd0
[   32.254644]  print_report+0x118/0x608
[   32.254799]  kasan_report+0xdc/0x128
[   32.255182]  __asan_report_store1_noabort+0x20/0x30
[   32.255319]  kmalloc_track_caller_oob_right+0x418/0x488
[   32.255465]  kunit_try_run_case+0x170/0x3f0
[   32.256455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.256597]  kthread+0x328/0x630
[   32.257003]  ret_from_fork+0x10/0x20
[   32.257672] 
[   32.257731] Allocated by task 154:
[   32.257828]  kasan_save_stack+0x3c/0x68
[   32.257998]  kasan_save_track+0x20/0x40
[   32.258246]  kasan_save_alloc_info+0x40/0x58
[   32.258362]  __kasan_kmalloc+0xd4/0xd8
[   32.258677]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   32.258831]  kmalloc_track_caller_oob_right+0x184/0x488
[   32.258998]  kunit_try_run_case+0x170/0x3f0
[   32.259224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.259451]  kthread+0x328/0x630
[   32.259753]  ret_from_fork+0x10/0x20
[   32.259857] 
[   32.260014] The buggy address belongs to the object at fff00000c56e8f00
[   32.260014]  which belongs to the cache kmalloc-128 of size 128
[   32.260207] The buggy address is located 0 bytes to the right of
[   32.260207]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   32.260443] 
[   32.260496] The buggy address belongs to the physical page:
[   32.260760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   32.261061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.261351] page_type: f5(slab)
[   32.261718] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.261891] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.262061] page dumped because: kasan: bad access detected
[   32.262243] 
[   32.262340] Memory state around the buggy address:
[   32.262705]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.262872]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.262979] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.263084]                                                                 ^
[   32.263183]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.263285]  fff00000c56e9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.263422] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   32.210060] ==================================================================
[   32.210190] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   32.210315] Read of size 1 at addr fff00000c76e9000 by task kunit_try_catch/152
[   32.210426] 
[   32.210499] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.210690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.210761] Hardware name: linux,dummy-virt (DT)
[   32.210835] Call trace:
[   32.210897]  show_stack+0x20/0x38 (C)
[   32.211234]  dump_stack_lvl+0x8c/0xd0
[   32.211406]  print_report+0x118/0x608
[   32.211530]  kasan_report+0xdc/0x128
[   32.211638]  __asan_report_load1_noabort+0x20/0x30
[   32.211754]  kmalloc_node_oob_right+0x2f4/0x330
[   32.211882]  kunit_try_run_case+0x170/0x3f0
[   32.212923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.213111]  kthread+0x328/0x630
[   32.214204]  ret_from_fork+0x10/0x20
[   32.214342] 
[   32.214655] Allocated by task 152:
[   32.214882]  kasan_save_stack+0x3c/0x68
[   32.215008]  kasan_save_track+0x20/0x40
[   32.215445]  kasan_save_alloc_info+0x40/0x58
[   32.215644]  __kasan_kmalloc+0xd4/0xd8
[   32.215865]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   32.216046]  kmalloc_node_oob_right+0xbc/0x330
[   32.216144]  kunit_try_run_case+0x170/0x3f0
[   32.217182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.217659]  kthread+0x328/0x630
[   32.217749]  ret_from_fork+0x10/0x20
[   32.217854] 
[   32.217902] The buggy address belongs to the object at fff00000c76e8000
[   32.217902]  which belongs to the cache kmalloc-4k of size 4096
[   32.218049] The buggy address is located 0 bytes to the right of
[   32.218049]  allocated 4096-byte region [fff00000c76e8000, fff00000c76e9000)
[   32.218211] 
[   32.218344] The buggy address belongs to the physical page:
[   32.218482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e8
[   32.219862] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.220239] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.220622] page_type: f5(slab)
[   32.220740] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   32.220856] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   32.221090] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   32.221447] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   32.221634] head: 0bfffe0000000003 ffffc1ffc31dba01 00000000ffffffff 00000000ffffffff
[   32.221769] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   32.221877] page dumped because: kasan: bad access detected
[   32.221953] 
[   32.222266] Memory state around the buggy address:
[   32.222360]  fff00000c76e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.222471]  fff00000c76e8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.223533] >fff00000c76e9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.223633]                    ^
[   32.224176]  fff00000c76e9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.224315]  fff00000c76e9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.224405] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  119.957471] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/670
[  119.959421] Modules linked in:
[  119.960392] CPU: 1 UID: 0 PID: 670 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[  119.961504] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  119.962187] Hardware name: linux,dummy-virt (DT)
[  119.962702] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  119.963494] pc : intlog10+0x38/0x48
[  119.964067] lr : intlog10_test+0xe4/0x200
[  119.964626] sp : ffff8000824a7c10
[  119.965111] x29: ffff8000824a7c90 x28: 0000000000000000 x27: 0000000000000000
[  119.966083] x26: 1ffe000018effca1 x25: 0000000000000000 x24: ffff8000824a7ce0
[  119.967054] x23: ffff8000824a7d00 x22: 0000000000000000 x21: 1ffff00010494f82
[  119.968005] x20: ffffa42cfb1ccaa0 x19: ffff800080087990 x18: 00000000e0b7aac4
[  119.968961] x17: 000000008580d5f9 x16: 000000003d420f14 x15: 00000000aee485a7
[  119.969904] x14: 00000000b7956979 x13: 0000000000000005 x12: ffff74859fe04189
[  119.970861] x11: 1ffff4859fe04188 x10: ffff74859fe04188 x9 : ffffa42cf883bd4c
[  119.971807] x8 : ffffa42cff020c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  119.972666] x5 : ffff700010494f82 x4 : 1ffff00010010f3a x3 : 1ffff4859f639954
[  119.974141] x2 : 1ffff4859f639954 x1 : 0000000000000003 x0 : 0000000000000000
[  119.975586] Call trace:
[  119.975876]  intlog10+0x38/0x48 (P)
[  119.976463]  kunit_try_run_case+0x170/0x3f0
[  119.976963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  119.977713]  kthread+0x328/0x630
[  119.978234]  ret_from_fork+0x10/0x20
[  119.978737] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  119.871618] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/652
[  119.873227] Modules linked in:
[  119.873715] CPU: 0 UID: 0 PID: 652 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[  119.874824] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  119.875448] Hardware name: linux,dummy-virt (DT)
[  119.876343] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  119.877537] pc : intlog2+0xd8/0xf8
[  119.878006] lr : intlog2_test+0xe4/0x200
[  119.878599] sp : ffff800082377c10
[  119.879288] x29: ffff800082377c90 x28: 0000000000000000 x27: 0000000000000000
[  119.880288] x26: 1ffe000018f206c1 x25: 0000000000000000 x24: ffff800082377ce0
[  119.881380] x23: ffff800082377d00 x22: 0000000000000000 x21: 1ffff0001046ef82
[  119.882278] x20: ffffa42cfb1cc9a0 x19: ffff800080087990 x18: 00000000c5d65f4c
[  119.883303] x17: 000000000984d305 x16: fff00000c5ea283c x15: fff00000ff616b08
[  119.884253] x14: 0000000000018fff x13: 1ffe00001b48e189 x12: ffff74859fe04189
[  119.885321] x11: 1ffff4859fe04188 x10: ffff74859fe04188 x9 : ffffa42cf883bf4c
[  119.886272] x8 : ffffa42cff020c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  119.887301] x5 : ffff70001046ef82 x4 : 1ffff00010010f3a x3 : 1ffff4859f639934
[  119.888689] x2 : 1ffff4859f639934 x1 : 0000000000000003 x0 : 0000000000000000
[  119.889662] Call trace:
[  119.890078]  intlog2+0xd8/0xf8 (P)
[  119.890958]  kunit_try_run_case+0x170/0x3f0
[  119.891516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  119.892156]  kthread+0x328/0x630
[  119.892568]  ret_from_fork+0x10/0x20
[  119.893147] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_lib_ratelimit
<8>[  452.896860] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
<8>[  452.537262] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>
Failure - log-parser-boot - internal-error-oops-oops-smp KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[  118.565105] Internal error: Oops: 0000000096000005 [#1]  SMP
[  118.578888] Modules linked in:
[  118.579985] CPU: 0 UID: 0 PID: 544 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[  118.582747] Tainted: [B]=BAD_PAGE, [N]=TEST
[  118.583879] Hardware name: linux,dummy-virt (DT)
[  118.584862] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  118.585693] pc : kunit_test_null_dereference+0x70/0x170
[  118.586211] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  118.587297] sp : ffff8000820f7d30
[  118.587696] x29: ffff8000820f7d90 x28: 0000000000000000 x27: 0000000000000000
[  118.588706] x26: 1ffe000018c8dd41 x25: 0000000000000000 x24: 0000000000000004
[  118.589883] x23: fff00000c646ea0c x22: ffffa42cf88287f0 x21: fff00000c43ddf08
[  118.591438] x20: 1ffff0001041efa6 x19: ffff800080087990 x18: 00000000a37a9bc2
[  118.592411] x17: 0000000000000001 x16: fff00000c5ea283c x15: fff00000ff616b08
[  118.593341] x14: 0000000000018fff x13: 1ffe00001b4925cd x12: fffd8000193538b4
[  118.594140] x11: 1ffe0000193538b3 x10: fffd8000193538b3 x9 : ffffa42cf881ff98
[  118.595207] x8 : ffff8000820f7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  118.596158] x5 : ffff70001041efa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  118.597734] x2 : dfff800000000000 x1 : fff00000c9a9bcc0 x0 : ffff800080087990
[  118.598505] Call trace:
[  118.599240]  kunit_test_null_dereference+0x70/0x170 (P)
[  118.599856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  118.600555]  kthread+0x328/0x630
[  118.601098]  ret_from_fork+0x10/0x20
[  118.602088] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  118.603318] ---[ end trace 0000000000000000 ]---