Hay
Date
June 25, 2025, 8:08 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   29.011059] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   28.974979] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   28.924565] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   28.917702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[  104.403295] Internal error: Oops: 0000000096000005 [#1]  SMP
[  104.409191] Modules linked in:
[  104.409674] CPU: 0 UID: 0 PID: 544 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[  104.410214] Tainted: [B]=BAD_PAGE, [N]=TEST
[  104.410478] Hardware name: linux,dummy-virt (DT)
[  104.410820] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  104.411247] pc : kunit_test_null_dereference+0x70/0x170
[  104.411615] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  104.412070] sp : ffff800080ed7d30
[  104.412619] x29: ffff800080ed7d90 x28: 0000000000000000 x27: 0000000000000000
[  104.413164] x26: 1ffe0000187eeec1 x25: 0000000000000000 x24: 0000000000000004
[  104.413612] x23: fff00000c3f7760c x22: ffff9ec8ad02ab20 x21: fff00000c139d288
[  104.414062] x20: 1ffff000101dafa6 x19: ffff800080087990 x18: 0000000018174c71
[  104.414516] x17: 0000000000000001 x16: fff00000da462d28 x15: fff00000ff616b08
[  104.414926] x14: 00000000f1f1f1f1 x13: 1ffe00001b48c589 x12: fffd800019798b3c
[  104.415341] x11: 1ffe000019798b3b x10: fffd800019798b3b x9 : ffff9ec8ad0222b0
[  104.415803] x8 : ffff800080ed7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  104.416234] x5 : ffff7000101dafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  104.416643] x2 : dfff800000000000 x1 : fff00000cbcc5100 x0 : ffff800080087990
[  104.417070] Call trace:
[  104.417261]  kunit_test_null_dereference+0x70/0x170 (P)
[  104.417708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  104.418031]  kthread+0x328/0x630
[  104.418253]  ret_from_fork+0x10/0x20
[  104.418724] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  104.419283] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   61.353038] ==================================================================
[   61.353103] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   61.353103] 
[   61.353195] Use-after-free read at 0x00000000fdc339b6 (in kfence-#163):
[   61.353248]  test_krealloc+0x51c/0x830
[   61.353293]  kunit_try_run_case+0x170/0x3f0
[   61.353339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.353385]  kthread+0x328/0x630
[   61.353438]  ret_from_fork+0x10/0x20
[   61.353480] 
[   61.353504] kfence-#163: 0x00000000fdc339b6-0x000000007a76df1a, size=32, cache=kmalloc-32
[   61.353504] 
[   61.353558] allocated by task 349 on cpu 0 at 61.352417s (0.001138s ago):
[   61.353627]  test_alloc+0x29c/0x628
[   61.353668]  test_krealloc+0xc0/0x830
[   61.353707]  kunit_try_run_case+0x170/0x3f0
[   61.353747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.353791]  kthread+0x328/0x630
[   61.353827]  ret_from_fork+0x10/0x20
[   61.353866] 
[   61.353889] freed by task 349 on cpu 0 at 61.352632s (0.001253s ago):
[   61.353951]  krealloc_noprof+0x148/0x360
[   61.353990]  test_krealloc+0x1dc/0x830
[   61.354038]  kunit_try_run_case+0x170/0x3f0
[   61.354077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.354120]  kthread+0x328/0x630
[   61.354155]  ret_from_fork+0x10/0x20
[   61.354192] 
[   61.354237] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   61.354315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.354343] Hardware name: linux,dummy-virt (DT)
[   61.354378] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   61.268309] ==================================================================
[   61.268420] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   61.268420] 
[   61.268518] Use-after-free read at 0x00000000a6f4c249 (in kfence-#162):
[   61.268572]  test_memcache_typesafe_by_rcu+0x280/0x560
[   61.268620]  kunit_try_run_case+0x170/0x3f0
[   61.268667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.268710]  kthread+0x328/0x630
[   61.268751]  ret_from_fork+0x10/0x20
[   61.268791] 
[   61.268815] kfence-#162: 0x00000000a6f4c249-0x00000000bbcf2cdf, size=32, cache=test
[   61.268815] 
[   61.268867] allocated by task 347 on cpu 1 at 61.252292s (0.016570s ago):
[   61.268938]  test_alloc+0x230/0x628
[   61.268977]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   61.269021]  kunit_try_run_case+0x170/0x3f0
[   61.269059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.269103]  kthread+0x328/0x630
[   61.269137]  ret_from_fork+0x10/0x20
[   61.269176] 
[   61.269200] freed by task 347 on cpu 1 at 61.252423s (0.016773s ago):
[   61.269255]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   61.269299]  kunit_try_run_case+0x170/0x3f0
[   61.269338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.269380]  kthread+0x328/0x630
[   61.269428]  ret_from_fork+0x10/0x20
[   61.269466] 
[   61.269511] CPU: 1 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   61.269588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.269618] Hardware name: linux,dummy-virt (DT)
[   61.269654] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   38.596017] ==================================================================
[   38.596166] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   38.596166] 
[   38.596266] Invalid read at 0x00000000c57d7bfd:
[   38.596434]  test_invalid_access+0xdc/0x1f0
[   38.597624]  kunit_try_run_case+0x170/0x3f0
[   38.597697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.597747]  kthread+0x328/0x630
[   38.597793]  ret_from_fork+0x10/0x20
[   38.598066] 
[   38.598445] CPU: 0 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   38.599116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.599287] Hardware name: linux,dummy-virt (DT)
[   38.599500] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   38.368544] ==================================================================
[   38.368636] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   38.368636] 
[   38.368699] Corrupted memory at 0x00000000b0604dca [ ! . . . . . . . . . . . . . . . ] (in kfence-#158):
[   38.369011]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   38.369058]  kunit_try_run_case+0x170/0x3f0
[   38.369102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.369146]  kthread+0x328/0x630
[   38.369184]  ret_from_fork+0x10/0x20
[   38.369224] 
[   38.369249] kfence-#158: 0x000000008755540d-0x000000009152afee, size=73, cache=kmalloc-96
[   38.369249] 
[   38.369301] allocated by task 337 on cpu 0 at 38.368293s (0.001004s ago):
[   38.369363]  test_alloc+0x29c/0x628
[   38.369417]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   38.369462]  kunit_try_run_case+0x170/0x3f0
[   38.369502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.369548]  kthread+0x328/0x630
[   38.369582]  ret_from_fork+0x10/0x20
[   38.369622] 
[   38.369645] freed by task 337 on cpu 0 at 38.368449s (0.001193s ago):
[   38.369707]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   38.369751]  kunit_try_run_case+0x170/0x3f0
[   38.369792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.369836]  kthread+0x328/0x630
[   38.369873]  ret_from_fork+0x10/0x20
[   38.369915] 
[   38.369960] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   38.370042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.370071] Hardware name: linux,dummy-virt (DT)
[   38.370104] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   38.056819] ==================================================================
[   38.056881] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   38.056881] 
[   38.056973] Out-of-bounds read at 0x00000000db2ea026 (105B right of kfence-#155):
[   38.057032]  test_kmalloc_aligned_oob_read+0x238/0x468
[   38.057081]  kunit_try_run_case+0x170/0x3f0
[   38.057126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.057168]  kthread+0x328/0x630
[   38.057208]  ret_from_fork+0x10/0x20
[   38.057247] 
[   38.057271] kfence-#155: 0x000000004dd8e523-0x00000000c30cfabc, size=73, cache=kmalloc-96
[   38.057271] 
[   38.057323] allocated by task 335 on cpu 0 at 38.056559s (0.000760s ago):
[   38.057392]  test_alloc+0x29c/0x628
[   38.057450]  test_kmalloc_aligned_oob_read+0x100/0x468
[   38.057494]  kunit_try_run_case+0x170/0x3f0
[   38.057534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.057578]  kthread+0x328/0x630
[   38.057613]  ret_from_fork+0x10/0x20
[   38.057654] 
[   38.057699] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   38.057778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.057807] Hardware name: linux,dummy-virt (DT)
[   38.057842] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   32.856587] ==================================================================
[   32.856680] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   32.856680] 
[   32.856742] Corrupted memory at 0x00000000f5cc9388 [ ! ] (in kfence-#105):
[   32.856868]  test_corruption+0x284/0x378
[   32.856915]  kunit_try_run_case+0x170/0x3f0
[   32.856959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.857004]  kthread+0x328/0x630
[   32.857043]  ret_from_fork+0x10/0x20
[   32.857082] 
[   32.857106] kfence-#105: 0x00000000e4547633-0x0000000037d65880, size=32, cache=kmalloc-32
[   32.857106] 
[   32.857161] allocated by task 323 on cpu 1 at 32.856299s (0.000858s ago):
[   32.857221]  test_alloc+0x29c/0x628
[   32.857262]  test_corruption+0x198/0x378
[   32.857301]  kunit_try_run_case+0x170/0x3f0
[   32.857342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.857385]  kthread+0x328/0x630
[   32.857434]  ret_from_fork+0x10/0x20
[   32.857473] 
[   32.857498] freed by task 323 on cpu 1 at 32.856413s (0.001080s ago):
[   32.857556]  test_corruption+0x284/0x378
[   32.857595]  kunit_try_run_case+0x170/0x3f0
[   32.857635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.857679]  kthread+0x328/0x630
[   32.857716]  ret_from_fork+0x10/0x20
[   32.857755] 
[   32.857797] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   32.857874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.857905] Hardware name: linux,dummy-virt (DT)
[   32.857939] ==================================================================
[   33.584510] ==================================================================
[   33.584611] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   33.584611] 
[   33.584677] Corrupted memory at 0x00000000e54e714b [ ! . . . . . . . . . . . . . . . ] (in kfence-#112):
[   33.584996]  test_corruption+0x120/0x378
[   33.585044]  kunit_try_run_case+0x170/0x3f0
[   33.585089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.585135]  kthread+0x328/0x630
[   33.585175]  ret_from_fork+0x10/0x20
[   33.585214] 
[   33.585238] kfence-#112: 0x000000000997f49e-0x000000003063e523, size=32, cache=test
[   33.585238] 
[   33.585292] allocated by task 325 on cpu 1 at 33.584337s (0.000951s ago):
[   33.585350]  test_alloc+0x230/0x628
[   33.585392]  test_corruption+0xdc/0x378
[   33.585442]  kunit_try_run_case+0x170/0x3f0
[   33.585482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.585526]  kthread+0x328/0x630
[   33.585561]  ret_from_fork+0x10/0x20
[   33.585601] 
[   33.585624] freed by task 325 on cpu 1 at 33.584413s (0.001207s ago):
[   33.585685]  test_corruption+0x120/0x378
[   33.585726]  kunit_try_run_case+0x170/0x3f0
[   33.585764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.585808]  kthread+0x328/0x630
[   33.585842]  ret_from_fork+0x10/0x20
[   33.585883] 
[   33.585927] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   33.586003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.586032] Hardware name: linux,dummy-virt (DT)
[   33.586066] ==================================================================
[   33.896523] ==================================================================
[   33.896623] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   33.896623] 
[   33.896684] Corrupted memory at 0x000000003e0e21f4 [ ! ] (in kfence-#115):
[   33.896798]  test_corruption+0x1d8/0x378
[   33.896843]  kunit_try_run_case+0x170/0x3f0
[   33.896887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.896930]  kthread+0x328/0x630
[   33.896970]  ret_from_fork+0x10/0x20
[   33.897009] 
[   33.897033] kfence-#115: 0x000000008f8d303f-0x0000000012ccc1de, size=32, cache=test
[   33.897033] 
[   33.897085] allocated by task 325 on cpu 1 at 33.896356s (0.000726s ago):
[   33.897146]  test_alloc+0x230/0x628
[   33.897187]  test_corruption+0x198/0x378
[   33.897228]  kunit_try_run_case+0x170/0x3f0
[   33.897268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.897313]  kthread+0x328/0x630
[   33.897349]  ret_from_fork+0x10/0x20
[   33.897389] 
[   33.897423] freed by task 325 on cpu 1 at 33.896432s (0.000988s ago):
[   33.897485]  test_corruption+0x1d8/0x378
[   33.897525]  kunit_try_run_case+0x170/0x3f0
[   33.897565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.897609]  kthread+0x328/0x630
[   33.897645]  ret_from_fork+0x10/0x20
[   33.897685] 
[   33.897728] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   33.897804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.897833] Hardware name: linux,dummy-virt (DT)
[   33.897866] ==================================================================
[   32.544545] ==================================================================
[   32.544637] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   32.544637] 
[   32.544700] Corrupted memory at 0x00000000cc33f377 [ ! . . . . . . . . . . . . . . . ] (in kfence-#102):
[   32.545014]  test_corruption+0x278/0x378
[   32.545060]  kunit_try_run_case+0x170/0x3f0
[   32.545108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.545157]  kthread+0x328/0x630
[   32.545197]  ret_from_fork+0x10/0x20
[   32.545239] 
[   32.545265] kfence-#102: 0x000000006984e281-0x000000000a6482b1, size=32, cache=kmalloc-32
[   32.545265] 
[   32.545323] allocated by task 323 on cpu 1 at 32.544329s (0.000991s ago):
[   32.545385]  test_alloc+0x29c/0x628
[   32.545439]  test_corruption+0xdc/0x378
[   32.545480]  kunit_try_run_case+0x170/0x3f0
[   32.545520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.545565]  kthread+0x328/0x630
[   32.545601]  ret_from_fork+0x10/0x20
[   32.545641] 
[   32.545664] freed by task 323 on cpu 1 at 32.544448s (0.001212s ago):
[   32.545723]  test_corruption+0x278/0x378
[   32.545763]  kunit_try_run_case+0x170/0x3f0
[   32.545802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.545844]  kthread+0x328/0x630
[   32.545880]  ret_from_fork+0x10/0x20
[   32.545918] 
[   32.545967] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   32.546042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.546071] Hardware name: linux,dummy-virt (DT)
[   32.546105] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   32.128365] ==================================================================
[   32.128466] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   32.128466] 
[   32.128528] Invalid free of 0x00000000d4f50f32 (in kfence-#98):
[   32.128580]  test_invalid_addr_free+0xec/0x238
[   32.128627]  kunit_try_run_case+0x170/0x3f0
[   32.128668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.128712]  kthread+0x328/0x630
[   32.128749]  ret_from_fork+0x10/0x20
[   32.128789] 
[   32.128812] kfence-#98: 0x00000000d380b172-0x00000000eebc3721, size=32, cache=test
[   32.128812] 
[   32.128864] allocated by task 321 on cpu 0 at 32.128250s (0.000611s ago):
[   32.128924]  test_alloc+0x230/0x628
[   32.128965]  test_invalid_addr_free+0xd4/0x238
[   32.129007]  kunit_try_run_case+0x170/0x3f0
[   32.129046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.129090]  kthread+0x328/0x630
[   32.129125]  ret_from_fork+0x10/0x20
[   32.129165] 
[   32.129205] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   32.129282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.129310] Hardware name: linux,dummy-virt (DT)
[   32.129344] ==================================================================
[   32.024413] ==================================================================
[   32.024499] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   32.024499] 
[   32.024560] Invalid free of 0x0000000070a563c6 (in kfence-#97):
[   32.024612]  test_invalid_addr_free+0x1ac/0x238
[   32.024658]  kunit_try_run_case+0x170/0x3f0
[   32.024703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.024748]  kthread+0x328/0x630
[   32.024785]  ret_from_fork+0x10/0x20
[   32.024826] 
[   32.024851] kfence-#97: 0x00000000aaa38ea0-0x00000000aafa96c1, size=32, cache=kmalloc-32
[   32.024851] 
[   32.024903] allocated by task 319 on cpu 0 at 32.024258s (0.000641s ago):
[   32.024965]  test_alloc+0x29c/0x628
[   32.025005]  test_invalid_addr_free+0xd4/0x238
[   32.025047]  kunit_try_run_case+0x170/0x3f0
[   32.025087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.025134]  kthread+0x328/0x630
[   32.025168]  ret_from_fork+0x10/0x20
[   32.025207] 
[   32.025252] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   32.025329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.025359] Hardware name: linux,dummy-virt (DT)
[   32.025404] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   31.920491] ==================================================================
[   31.920585] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   31.920585] 
[   31.920645] Invalid free of 0x00000000081551ee (in kfence-#96):
[   31.920697]  test_double_free+0x100/0x238
[   31.920742]  kunit_try_run_case+0x170/0x3f0
[   31.920784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.920830]  kthread+0x328/0x630
[   31.920869]  ret_from_fork+0x10/0x20
[   31.920907] 
[   31.920931] kfence-#96: 0x00000000081551ee-0x00000000e37aef70, size=32, cache=test
[   31.920931] 
[   31.920981] allocated by task 317 on cpu 1 at 31.920250s (0.000728s ago):
[   31.921043]  test_alloc+0x230/0x628
[   31.921084]  test_double_free+0xd4/0x238
[   31.921125]  kunit_try_run_case+0x170/0x3f0
[   31.921163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.921207]  kthread+0x328/0x630
[   31.921242]  ret_from_fork+0x10/0x20
[   31.921282] 
[   31.921304] freed by task 317 on cpu 1 at 31.920313s (0.000987s ago):
[   31.921366]  test_double_free+0xf0/0x238
[   31.921417]  kunit_try_run_case+0x170/0x3f0
[   31.921458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.921501]  kthread+0x328/0x630
[   31.921536]  ret_from_fork+0x10/0x20
[   31.921576] 
[   31.921621] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   31.921699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.921728] Hardware name: linux,dummy-virt (DT)
[   31.921761] ==================================================================
[   31.816566] ==================================================================
[   31.816684] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   31.816684] 
[   31.816757] Invalid free of 0x0000000094ee4f98 (in kfence-#95):
[   31.816822]  test_double_free+0x1bc/0x238
[   31.816868]  kunit_try_run_case+0x170/0x3f0
[   31.816914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.816958]  kthread+0x328/0x630
[   31.816997]  ret_from_fork+0x10/0x20
[   31.817037] 
[   31.817061] kfence-#95: 0x0000000094ee4f98-0x00000000590f49f0, size=32, cache=kmalloc-32
[   31.817061] 
[   31.817114] allocated by task 315 on cpu 1 at 31.816299s (0.000811s ago):
[   31.817176]  test_alloc+0x29c/0x628
[   31.817215]  test_double_free+0xd4/0x238
[   31.817256]  kunit_try_run_case+0x170/0x3f0
[   31.817297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.817342]  kthread+0x328/0x630
[   31.817379]  ret_from_fork+0x10/0x20
[   31.817434] 
[   31.817459] freed by task 315 on cpu 1 at 31.816377s (0.001078s ago):
[   31.817522]  test_double_free+0x1ac/0x238
[   31.817563]  kunit_try_run_case+0x170/0x3f0
[   31.817603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.817647]  kthread+0x328/0x630
[   31.817683]  ret_from_fork+0x10/0x20
[   31.817723] 
[   31.817768] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   31.817846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.817874] Hardware name: linux,dummy-virt (DT)
[   31.817908] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   31.504415] ==================================================================
[   31.504512] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   31.504512] 
[   31.504603] Use-after-free read at 0x00000000844f01de (in kfence-#92):
[   31.504654]  test_use_after_free_read+0x114/0x248
[   31.504701]  kunit_try_run_case+0x170/0x3f0
[   31.504745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.504791]  kthread+0x328/0x630
[   31.504829]  ret_from_fork+0x10/0x20
[   31.504870] 
[   31.504894] kfence-#92: 0x00000000844f01de-0x00000000093164be, size=32, cache=test
[   31.504894] 
[   31.504942] allocated by task 309 on cpu 1 at 31.504221s (0.000718s ago):
[   31.505012]  test_alloc+0x230/0x628
[   31.505051]  test_use_after_free_read+0xd0/0x248
[   31.505095]  kunit_try_run_case+0x170/0x3f0
[   31.505134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.505178]  kthread+0x328/0x630
[   31.505213]  ret_from_fork+0x10/0x20
[   31.505252] 
[   31.505275] freed by task 309 on cpu 1 at 31.504280s (0.000991s ago):
[   31.505375]  test_use_after_free_read+0xf0/0x248
[   31.505429]  kunit_try_run_case+0x170/0x3f0
[   31.505470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.505513]  kthread+0x328/0x630
[   31.505549]  ret_from_fork+0x10/0x20
[   31.505589] 
[   31.505633] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   31.505708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.505737] Hardware name: linux,dummy-virt (DT)
[   31.505771] ==================================================================
[   31.400641] ==================================================================
[   31.400754] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   31.400754] 
[   31.400859] Use-after-free read at 0x00000000fade0144 (in kfence-#91):
[   31.400912]  test_use_after_free_read+0x114/0x248
[   31.400960]  kunit_try_run_case+0x170/0x3f0
[   31.401005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.401049]  kthread+0x328/0x630
[   31.401087]  ret_from_fork+0x10/0x20
[   31.401128] 
[   31.401152] kfence-#91: 0x00000000fade0144-0x0000000061ee8479, size=32, cache=kmalloc-32
[   31.401152] 
[   31.401204] allocated by task 307 on cpu 1 at 31.400318s (0.000882s ago):
[   31.401273]  test_alloc+0x29c/0x628
[   31.401314]  test_use_after_free_read+0xd0/0x248
[   31.401356]  kunit_try_run_case+0x170/0x3f0
[   31.401411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.401456]  kthread+0x328/0x630
[   31.401491]  ret_from_fork+0x10/0x20
[   31.401531] 
[   31.401554] freed by task 307 on cpu 1 at 31.400391s (0.001159s ago):
[   31.401617]  test_use_after_free_read+0x1c0/0x248
[   31.401658]  kunit_try_run_case+0x170/0x3f0
[   31.401697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.401740]  kthread+0x328/0x630
[   31.401777]  ret_from_fork+0x10/0x20
[   31.401817] 
[   31.401865] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   31.401943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.401973] Hardware name: linux,dummy-virt (DT)
[   31.402008] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   31.194096] ==================================================================
[   31.194421] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   31.194421] 
[   31.194782] Out-of-bounds write at 0x0000000030931e37 (1B left of kfence-#89):
[   31.195303]  test_out_of_bounds_write+0x100/0x240
[   31.195418]  kunit_try_run_case+0x170/0x3f0
[   31.195471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.195516]  kthread+0x328/0x630
[   31.195742]  ret_from_fork+0x10/0x20
[   31.195812] 
[   31.195839] kfence-#89: 0x00000000cacf066f-0x00000000ec1e6156, size=32, cache=kmalloc-32
[   31.195839] 
[   31.196171] allocated by task 303 on cpu 0 at 31.193821s (0.002343s ago):
[   31.196307]  test_alloc+0x29c/0x628
[   31.196426]  test_out_of_bounds_write+0xc8/0x240
[   31.196479]  kunit_try_run_case+0x170/0x3f0
[   31.196520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.196564]  kthread+0x328/0x630
[   31.197024]  ret_from_fork+0x10/0x20
[   31.197591] 
[   31.197696] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   31.197960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.198288] Hardware name: linux,dummy-virt (DT)
[   31.198520] ==================================================================
[   31.296342] ==================================================================
[   31.296452] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   31.296452] 
[   31.296537] Out-of-bounds write at 0x00000000626102a9 (1B left of kfence-#90):
[   31.296594]  test_out_of_bounds_write+0x100/0x240
[   31.296642]  kunit_try_run_case+0x170/0x3f0
[   31.296686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.296731]  kthread+0x328/0x630
[   31.296772]  ret_from_fork+0x10/0x20
[   31.296817] 
[   31.296842] kfence-#90: 0x00000000f2b75796-0x0000000043e8a102, size=32, cache=test
[   31.296842] 
[   31.296892] allocated by task 305 on cpu 0 at 31.296265s (0.000623s ago):
[   31.296961]  test_alloc+0x230/0x628
[   31.297002]  test_out_of_bounds_write+0xc8/0x240
[   31.297046]  kunit_try_run_case+0x170/0x3f0
[   31.297086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.297128]  kthread+0x328/0x630
[   31.297164]  ret_from_fork+0x10/0x20
[   31.297203] 
[   31.297242] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   31.297319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.297348] Hardware name: linux,dummy-virt (DT)
[   31.297380] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   30.557601] ==================================================================
[   30.557681] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   30.557681] 
[   30.557788] Out-of-bounds read at 0x000000004d9a2610 (1B left of kfence-#83):
[   30.558082]  test_out_of_bounds_read+0x114/0x3e0
[   30.558153]  kunit_try_run_case+0x170/0x3f0
[   30.558197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.558381]  kthread+0x328/0x630
[   30.558533]  ret_from_fork+0x10/0x20
[   30.558819] 
[   30.558863] kfence-#83: 0x000000005dabf49f-0x0000000069f86460, size=32, cache=test
[   30.558863] 
[   30.558937] allocated by task 301 on cpu 0 at 30.557406s (0.001508s ago):
[   30.559152]  test_alloc+0x230/0x628
[   30.559249]  test_out_of_bounds_read+0xdc/0x3e0
[   30.559293]  kunit_try_run_case+0x170/0x3f0
[   30.559615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.559734]  kthread+0x328/0x630
[   30.559853]  ret_from_fork+0x10/0x20
[   30.559912] 
[   30.560104] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   30.560306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.560338] Hardware name: linux,dummy-virt (DT)
[   30.560372] ==================================================================
[   30.145028] ==================================================================
[   30.145244] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   30.145244] 
[   30.145729] Out-of-bounds read at 0x0000000000e2b419 (32B right of kfence-#79):
[   30.145895]  test_out_of_bounds_read+0x1c8/0x3e0
[   30.145950]  kunit_try_run_case+0x170/0x3f0
[   30.145993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.146089]  kthread+0x328/0x630
[   30.146138]  ret_from_fork+0x10/0x20
[   30.146179] 
[   30.146329] kfence-#79: 0x000000005ae89ba9-0x000000007a582b29, size=32, cache=kmalloc-32
[   30.146329] 
[   30.146532] allocated by task 299 on cpu 0 at 30.144633s (0.001850s ago):
[   30.146612]  test_alloc+0x29c/0x628
[   30.146698]  test_out_of_bounds_read+0x198/0x3e0
[   30.146766]  kunit_try_run_case+0x170/0x3f0
[   30.147254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.147372]  kthread+0x328/0x630
[   30.147422]  ret_from_fork+0x10/0x20
[   30.147591] 
[   30.147727] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   30.147815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.147895] Hardware name: linux,dummy-virt (DT)
[   30.147970] ==================================================================
[   30.038339] ==================================================================
[   30.038737] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   30.038737] 
[   30.039079] Out-of-bounds read at 0x000000008d22b23e (1B left of kfence-#78):
[   30.039471]  test_out_of_bounds_read+0x114/0x3e0
[   30.039570]  kunit_try_run_case+0x170/0x3f0
[   30.039621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.039666]  kthread+0x328/0x630
[   30.039722]  ret_from_fork+0x10/0x20
[   30.039778] 
[   30.039803] kfence-#78: 0x00000000ac6aad7c-0x000000000c04cf5a, size=32, cache=kmalloc-32
[   30.039803] 
[   30.039903] allocated by task 299 on cpu 0 at 30.037478s (0.002419s ago):
[   30.039972]  test_alloc+0x29c/0x628
[   30.040136]  test_out_of_bounds_read+0xdc/0x3e0
[   30.040182]  kunit_try_run_case+0x170/0x3f0
[   30.040515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.040679]  kthread+0x328/0x630
[   30.040792]  ret_from_fork+0x10/0x20
[   30.040956] 
[   30.041261] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   30.041539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.041589] Hardware name: linux,dummy-virt (DT)
[   30.041726] ==================================================================
[   30.870018] ==================================================================
[   30.870139] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   30.870139] 
[   30.870339] Out-of-bounds read at 0x00000000fef85494 (32B right of kfence-#86):
[   30.870732]  test_out_of_bounds_read+0x1c8/0x3e0
[   30.870801]  kunit_try_run_case+0x170/0x3f0
[   30.870845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.870888]  kthread+0x328/0x630
[   30.871029]  ret_from_fork+0x10/0x20
[   30.871075] 
[   30.871100] kfence-#86: 0x000000008a395800-0x00000000a511a9cd, size=32, cache=test
[   30.871100] 
[   30.871501] allocated by task 301 on cpu 0 at 30.869809s (0.001665s ago):
[   30.871750]  test_alloc+0x230/0x628
[   30.871800]  test_out_of_bounds_read+0x198/0x3e0
[   30.871843]  kunit_try_run_case+0x170/0x3f0
[   30.871917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.872085]  kthread+0x328/0x630
[   30.872487]  ret_from_fork+0x10/0x20
[   30.872606] 
[   30.872780] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   30.872860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.873220] Hardware name: linux,dummy-virt (DT)
[   30.873343] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kfree_action_wrapper
[   29.751661] ==================================================================
[   29.751766] BUG: KFENCE: memory corruption in kfree_action_wrapper+0x18/0x30
[   29.751766] 
[   29.751871] Corrupted memory at 0x000000009dcf67f0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#75):
[   29.754999]  kfree_action_wrapper+0x18/0x30
[   29.755060]  __kunit_action_free+0x58/0x80
[   29.755101]  kunit_remove_resource+0x14c/0x1f8
[   29.755143]  kunit_cleanup+0x6c/0x108
[   29.755181]  kunit_try_run_case_cleanup+0xa4/0xe0
[   29.755223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.755277]  kthread+0x328/0x630
[   29.755326]  ret_from_fork+0x10/0x20
[   29.755376] 
[   29.755543] kfence-#75: 0x00000000bf323abe-0x00000000256a4ca1, size=120, cache=kmalloc-128
[   29.755543] 
[   29.756124] allocated by task 297 on cpu 0 at 29.710347s (0.045316s ago):
[   29.756550]  kunit_kmalloc_array+0x34/0x88
[   29.756822]  copy_user_test_oob+0xac/0xec8
[   29.756926]  kunit_try_run_case+0x170/0x3f0
[   29.756976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.757138]  kthread+0x328/0x630
[   29.757210]  ret_from_fork+0x10/0x20
[   29.757646] 
[   29.758011] freed by task 298 on cpu 0 at 29.750934s (0.006888s ago):
[   29.758336]  kfree_action_wrapper+0x18/0x30
[   29.758493]  __kunit_action_free+0x58/0x80
[   29.758589]  kunit_remove_resource+0x14c/0x1f8
[   29.758691]  kunit_cleanup+0x6c/0x108
[   29.758730]  kunit_try_run_case_cleanup+0xa4/0xe0
[   29.758772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.759044]  kthread+0x328/0x630
[   29.759180]  ret_from_fork+0x10/0x20
[   29.759363] 
[   29.759496] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.759590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.759709] Hardware name: linux,dummy-virt (DT)
[   29.759939] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   29.677657] ==================================================================
[   29.677727] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   29.677801] Read of size 8 at addr fff00000c786ac78 by task kunit_try_catch/293
[   29.677853] 
[   29.677893] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.677983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.678013] Hardware name: linux,dummy-virt (DT)
[   29.678049] Call trace:
[   29.678074]  show_stack+0x20/0x38 (C)
[   29.678128]  dump_stack_lvl+0x8c/0xd0
[   29.678176]  print_report+0x118/0x608
[   29.678226]  kasan_report+0xdc/0x128
[   29.678271]  __asan_report_load8_noabort+0x20/0x30
[   29.678321]  copy_to_kernel_nofault+0x204/0x250
[   29.678371]  copy_to_kernel_nofault_oob+0x158/0x418
[   29.678469]  kunit_try_run_case+0x170/0x3f0
[   29.678520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.678594]  kthread+0x328/0x630
[   29.678658]  ret_from_fork+0x10/0x20
[   29.678737] 
[   29.678759] Allocated by task 293:
[   29.678791]  kasan_save_stack+0x3c/0x68
[   29.678888]  kasan_save_track+0x20/0x40
[   29.678987]  kasan_save_alloc_info+0x40/0x58
[   29.679055]  __kasan_kmalloc+0xd4/0xd8
[   29.679158]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.679235]  copy_to_kernel_nofault_oob+0xc8/0x418
[   29.679680]  kunit_try_run_case+0x170/0x3f0
[   29.679820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.679972]  kthread+0x328/0x630
[   29.680012]  ret_from_fork+0x10/0x20
[   29.680070] 
[   29.680104] The buggy address belongs to the object at fff00000c786ac00
[   29.680104]  which belongs to the cache kmalloc-128 of size 128
[   29.680167] The buggy address is located 0 bytes to the right of
[   29.680167]  allocated 120-byte region [fff00000c786ac00, fff00000c786ac78)
[   29.680437] 
[   29.680527] The buggy address belongs to the physical page:
[   29.680687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   29.680785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.681000] page_type: f5(slab)
[   29.681165] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.681288] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.681330] page dumped because: kasan: bad access detected
[   29.681578] 
[   29.681606] Memory state around the buggy address:
[   29.681742]  fff00000c786ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.681871]  fff00000c786ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.682045] >fff00000c786ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.682118]                                                                 ^
[   29.682253]  fff00000c786ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.682301]  fff00000c786ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.682608] ==================================================================
[   29.683795] ==================================================================
[   29.683856] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   29.684100] Write of size 8 at addr fff00000c786ac78 by task kunit_try_catch/293
[   29.684312] 
[   29.684444] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.684642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.684723] Hardware name: linux,dummy-virt (DT)
[   29.684811] Call trace:
[   29.684900]  show_stack+0x20/0x38 (C)
[   29.685055]  dump_stack_lvl+0x8c/0xd0
[   29.685271]  print_report+0x118/0x608
[   29.685360]  kasan_report+0xdc/0x128
[   29.685425]  kasan_check_range+0x100/0x1a8
[   29.685606]  __kasan_check_write+0x20/0x30
[   29.685775]  copy_to_kernel_nofault+0x8c/0x250
[   29.685936]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   29.686059]  kunit_try_run_case+0x170/0x3f0
[   29.686134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.686453]  kthread+0x328/0x630
[   29.686655]  ret_from_fork+0x10/0x20
[   29.686745] 
[   29.686775] Allocated by task 293:
[   29.686869]  kasan_save_stack+0x3c/0x68
[   29.687011]  kasan_save_track+0x20/0x40
[   29.687170]  kasan_save_alloc_info+0x40/0x58
[   29.687261]  __kasan_kmalloc+0xd4/0xd8
[   29.687352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.687478]  copy_to_kernel_nofault_oob+0xc8/0x418
[   29.687524]  kunit_try_run_case+0x170/0x3f0
[   29.687965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.688079]  kthread+0x328/0x630
[   29.688340]  ret_from_fork+0x10/0x20
[   29.688533] 
[   29.688614] The buggy address belongs to the object at fff00000c786ac00
[   29.688614]  which belongs to the cache kmalloc-128 of size 128
[   29.688827] The buggy address is located 0 bytes to the right of
[   29.688827]  allocated 120-byte region [fff00000c786ac00, fff00000c786ac78)
[   29.688959] 
[   29.689118] The buggy address belongs to the physical page:
[   29.689160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   29.689352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.689532] page_type: f5(slab)
[   29.689775] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.689985] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.690127] page dumped because: kasan: bad access detected
[   29.690166] 
[   29.690186] Memory state around the buggy address:
[   29.690433]  fff00000c786ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.690487]  fff00000c786ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.690592] >fff00000c786ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.690739]                                                                 ^
[   29.690902]  fff00000c786ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.691101]  fff00000c786ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.691148] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   29.628500] ==================================================================
[   29.628591] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   29.628753] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/281
[   29.628844] 
[   29.628924] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.629163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.629211] Hardware name: linux,dummy-virt (DT)
[   29.629246] Call trace:
[   29.629287]  show_stack+0x20/0x38 (C)
[   29.629340]  dump_stack_lvl+0x8c/0xd0
[   29.629433]  print_report+0x310/0x608
[   29.629510]  kasan_report+0xdc/0x128
[   29.629566]  __asan_report_load1_noabort+0x20/0x30
[   29.629670]  vmalloc_oob+0x578/0x5d0
[   29.629745]  kunit_try_run_case+0x170/0x3f0
[   29.629825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.629907]  kthread+0x328/0x630
[   29.629952]  ret_from_fork+0x10/0x20
[   29.630002] 
[   29.630032] The buggy address belongs to the virtual mapping at
[   29.630032]  [ffff8000800fe000, ffff800080100000) created by:
[   29.630032]  vmalloc_oob+0x98/0x5d0
[   29.630248] 
[   29.630277] The buggy address belongs to the physical page:
[   29.630453] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786e
[   29.630533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.630641] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.630706] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.630965] page dumped because: kasan: bad access detected
[   29.631131] 
[   29.631161] Memory state around the buggy address:
[   29.631198]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.631243]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.631569] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   29.631667]                                                              ^
[   29.631711]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.631755]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.631813] ==================================================================
[   29.632920] ==================================================================
[   29.632976] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   29.633055] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/281
[   29.633378] 
[   29.633442] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.633530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.633569] Hardware name: linux,dummy-virt (DT)
[   29.633648] Call trace:
[   29.633679]  show_stack+0x20/0x38 (C)
[   29.633730]  dump_stack_lvl+0x8c/0xd0
[   29.633778]  print_report+0x310/0x608
[   29.633823]  kasan_report+0xdc/0x128
[   29.633870]  __asan_report_load1_noabort+0x20/0x30
[   29.633917]  vmalloc_oob+0x51c/0x5d0
[   29.633962]  kunit_try_run_case+0x170/0x3f0
[   29.634022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.634076]  kthread+0x328/0x630
[   29.634121]  ret_from_fork+0x10/0x20
[   29.634183] 
[   29.634210] The buggy address belongs to the virtual mapping at
[   29.634210]  [ffff8000800fe000, ffff800080100000) created by:
[   29.634210]  vmalloc_oob+0x98/0x5d0
[   29.634283] 
[   29.634314] The buggy address belongs to the physical page:
[   29.634346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786e
[   29.634407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.634467] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.634517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.634559] page dumped because: kasan: bad access detected
[   29.634596] 
[   29.634642] Memory state around the buggy address:
[   29.634677]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.634893]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.635046] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   29.635090]                                                                 ^
[   29.635230]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.635284]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.635325] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   29.503847] ==================================================================
[   29.503943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   29.504673] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.504730] 
[   29.505097] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.505650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.506507] Hardware name: linux,dummy-virt (DT)
[   29.506752] Call trace:
[   29.506781]  show_stack+0x20/0x38 (C)
[   29.507223]  dump_stack_lvl+0x8c/0xd0
[   29.507356]  print_report+0x118/0x608
[   29.507529]  kasan_report+0xdc/0x128
[   29.508187]  kasan_check_range+0x100/0x1a8
[   29.508406]  __kasan_check_write+0x20/0x30
[   29.508453]  kasan_atomics_helper+0x11f8/0x4858
[   29.508503]  kasan_atomics+0x198/0x2e0
[   29.509721]  kunit_try_run_case+0x170/0x3f0
[   29.510029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.510511]  kthread+0x328/0x630
[   29.510964]  ret_from_fork+0x10/0x20
[   29.511261] 
[   29.511289] Allocated by task 277:
[   29.511322]  kasan_save_stack+0x3c/0x68
[   29.512221]  kasan_save_track+0x20/0x40
[   29.512381]  kasan_save_alloc_info+0x40/0x58
[   29.512989]  __kasan_kmalloc+0xd4/0xd8
[   29.513045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.513089]  kasan_atomics+0xb8/0x2e0
[   29.513967]  kunit_try_run_case+0x170/0x3f0
[   29.514174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.514568]  kthread+0x328/0x630
[   29.515138]  ret_from_fork+0x10/0x20
[   29.515191] 
[   29.515214] The buggy address belongs to the object at fff00000c787d680
[   29.515214]  which belongs to the cache kmalloc-64 of size 64
[   29.516358] The buggy address is located 0 bytes to the right of
[   29.516358]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.516590] 
[   29.516633] The buggy address belongs to the physical page:
[   29.516671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.517250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.517404] page_type: f5(slab)
[   29.517835] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.518708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.518764] page dumped because: kasan: bad access detected
[   29.519515] 
[   29.519566] Memory state around the buggy address:
[   29.520195]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.520404]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.520554] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.520886]                                      ^
[   29.520994]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.521041]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.521082] ==================================================================
[   29.314631] ==================================================================
[   29.314696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.314814] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.314866] 
[   29.314937] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.315023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.315050] Hardware name: linux,dummy-virt (DT)
[   29.315120] Call trace:
[   29.315169]  show_stack+0x20/0x38 (C)
[   29.315248]  dump_stack_lvl+0x8c/0xd0
[   29.315323]  print_report+0x118/0x608
[   29.315411]  kasan_report+0xdc/0x128
[   29.315460]  __asan_report_load4_noabort+0x20/0x30
[   29.315617]  kasan_atomics_helper+0x3dd8/0x4858
[   29.315672]  kasan_atomics+0x198/0x2e0
[   29.315719]  kunit_try_run_case+0x170/0x3f0
[   29.316175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.316324]  kthread+0x328/0x630
[   29.316454]  ret_from_fork+0x10/0x20
[   29.316581] 
[   29.316807] Allocated by task 277:
[   29.316843]  kasan_save_stack+0x3c/0x68
[   29.317044]  kasan_save_track+0x20/0x40
[   29.317175]  kasan_save_alloc_info+0x40/0x58
[   29.317279]  __kasan_kmalloc+0xd4/0xd8
[   29.317367]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.317591]  kasan_atomics+0xb8/0x2e0
[   29.317751]  kunit_try_run_case+0x170/0x3f0
[   29.317798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.318066]  kthread+0x328/0x630
[   29.318153]  ret_from_fork+0x10/0x20
[   29.318410] 
[   29.318632] The buggy address belongs to the object at fff00000c787d680
[   29.318632]  which belongs to the cache kmalloc-64 of size 64
[   29.318770] The buggy address is located 0 bytes to the right of
[   29.318770]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.318912] 
[   29.319005] The buggy address belongs to the physical page:
[   29.319037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.319091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.319290] page_type: f5(slab)
[   29.319458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.319517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.319585] page dumped because: kasan: bad access detected
[   29.319698] 
[   29.319892] Memory state around the buggy address:
[   29.320038]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.320097]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.320152] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.320194]                                      ^
[   29.320238]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.320308]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.320348] ==================================================================
[   29.213777] ==================================================================
[   29.213909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   29.213993] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.214046] 
[   29.214110] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.214933]  kasan_report+0xdc/0x128
[   29.217467]  kunit_try_run_case+0x170/0x3f0
[   29.219586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.221241]                                      ^
[   29.223564] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.227213]  __kasan_kmalloc+0xd4/0xd8
[   29.227426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.227605]  kasan_atomics+0xb8/0x2e0
[   29.227881]  kunit_try_run_case+0x170/0x3f0
[   29.227944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.228329]  kthread+0x328/0x630
[   29.228372]  ret_from_fork+0x10/0x20
[   29.228423] 
[   29.228486] The buggy address belongs to the object at fff00000c787d680
[   29.228486]  which belongs to the cache kmalloc-64 of size 64
[   29.228582] The buggy address is located 0 bytes to the right of
[   29.228582]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.228647] 
[   29.228669] The buggy address belongs to the physical page:
[   29.228719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.228787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.228849] page_type: f5(slab)
[   29.228890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.228941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.228983] page dumped because: kasan: bad access detected
[   29.229026] 
[   29.229062] Memory state around the buggy address:
[   29.229096]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.229141]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.229186] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.229234]                                      ^
[   29.229272]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.229322]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.229375] ==================================================================
[   29.594732] ==================================================================
[   29.594778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   29.594827] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.594878] 
[   29.594917] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.595000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.595027] Hardware name: linux,dummy-virt (DT)
[   29.595060] Call trace:
[   29.595083]  show_stack+0x20/0x38 (C)
[   29.595141]  dump_stack_lvl+0x8c/0xd0
[   29.595197]  print_report+0x118/0x608
[   29.595253]  kasan_report+0xdc/0x128
[   29.595300]  __asan_report_load8_noabort+0x20/0x30
[   29.595359]  kasan_atomics_helper+0x3e10/0x4858
[   29.595420]  kasan_atomics+0x198/0x2e0
[   29.595465]  kunit_try_run_case+0x170/0x3f0
[   29.595514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.595568]  kthread+0x328/0x630
[   29.595611]  ret_from_fork+0x10/0x20
[   29.595660] 
[   29.595680] Allocated by task 277:
[   29.596224]  kasan_save_stack+0x3c/0x68
[   29.596433]  kasan_save_track+0x20/0x40
[   29.596532]  kasan_save_alloc_info+0x40/0x58
[   29.596786]  __kasan_kmalloc+0xd4/0xd8
[   29.596944]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.597021]  kasan_atomics+0xb8/0x2e0
[   29.597060]  kunit_try_run_case+0x170/0x3f0
[   29.597099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.597145]  kthread+0x328/0x630
[   29.597179]  ret_from_fork+0x10/0x20
[   29.597217] 
[   29.597239] The buggy address belongs to the object at fff00000c787d680
[   29.597239]  which belongs to the cache kmalloc-64 of size 64
[   29.597299] The buggy address is located 0 bytes to the right of
[   29.597299]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.597365] 
[   29.597388] The buggy address belongs to the physical page:
[   29.597430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.597483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.597677] page_type: f5(slab)
[   29.597847] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.597960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.598266] page dumped because: kasan: bad access detected
[   29.598632] 
[   29.598721] Memory state around the buggy address:
[   29.598757]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.598801]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.599200] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.599324]                                      ^
[   29.599542]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.599767]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.600000] ==================================================================
[   29.336870] ==================================================================
[   29.336916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.336966] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.337328] 
[   29.337373] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.337471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.337519] Hardware name: linux,dummy-virt (DT)
[   29.337609] Call trace:
[   29.337669]  show_stack+0x20/0x38 (C)
[   29.337989]  dump_stack_lvl+0x8c/0xd0
[   29.338054]  print_report+0x118/0x608
[   29.338161]  kasan_report+0xdc/0x128
[   29.338237]  __asan_report_load8_noabort+0x20/0x30
[   29.338304]  kasan_atomics_helper+0x3f58/0x4858
[   29.338548]  kasan_atomics+0x198/0x2e0
[   29.338619]  kunit_try_run_case+0x170/0x3f0
[   29.338808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.338929]  kthread+0x328/0x630
[   29.339143]  ret_from_fork+0x10/0x20
[   29.339263] 
[   29.339313] Allocated by task 277:
[   29.339385]  kasan_save_stack+0x3c/0x68
[   29.339488]  kasan_save_track+0x20/0x40
[   29.339537]  kasan_save_alloc_info+0x40/0x58
[   29.339603]  __kasan_kmalloc+0xd4/0xd8
[   29.339680]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.340075]  kasan_atomics+0xb8/0x2e0
[   29.340189]  kunit_try_run_case+0x170/0x3f0
[   29.340293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.340340]  kthread+0x328/0x630
[   29.340386]  ret_from_fork+0x10/0x20
[   29.340434] 
[   29.340456] The buggy address belongs to the object at fff00000c787d680
[   29.340456]  which belongs to the cache kmalloc-64 of size 64
[   29.341019] The buggy address is located 0 bytes to the right of
[   29.341019]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.341454] 
[   29.341492] The buggy address belongs to the physical page:
[   29.341560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.341673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.341743] page_type: f5(slab)
[   29.341798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.342152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.342239] page dumped because: kasan: bad access detected
[   29.342343] 
[   29.342739] Memory state around the buggy address:
[   29.342828]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.342969]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.343031] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.343106]                                      ^
[   29.343150]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.343196]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.343236] ==================================================================
[   29.576318] ==================================================================
[   29.576717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   29.576786] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.576879] 
[   29.576949] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.577033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.577061] Hardware name: linux,dummy-virt (DT)
[   29.577093] Call trace:
[   29.577116]  show_stack+0x20/0x38 (C)
[   29.577174]  dump_stack_lvl+0x8c/0xd0
[   29.577223]  print_report+0x118/0x608
[   29.577272]  kasan_report+0xdc/0x128
[   29.577320]  __asan_report_load8_noabort+0x20/0x30
[   29.577377]  kasan_atomics_helper+0x3db0/0x4858
[   29.577438]  kasan_atomics+0x198/0x2e0
[   29.577484]  kunit_try_run_case+0x170/0x3f0
[   29.577533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.577588]  kthread+0x328/0x630
[   29.577632]  ret_from_fork+0x10/0x20
[   29.577680] 
[   29.577702] Allocated by task 277:
[   29.577731]  kasan_save_stack+0x3c/0x68
[   29.577771]  kasan_save_track+0x20/0x40
[   29.577811]  kasan_save_alloc_info+0x40/0x58
[   29.577858]  __kasan_kmalloc+0xd4/0xd8
[   29.577906]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.577948]  kasan_atomics+0xb8/0x2e0
[   29.577985]  kunit_try_run_case+0x170/0x3f0
[   29.578025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.578079]  kthread+0x328/0x630
[   29.578124]  ret_from_fork+0x10/0x20
[   29.578162] 
[   29.578183] The buggy address belongs to the object at fff00000c787d680
[   29.578183]  which belongs to the cache kmalloc-64 of size 64
[   29.578241] The buggy address is located 0 bytes to the right of
[   29.578241]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.578307] 
[   29.578336] The buggy address belongs to the physical page:
[   29.578371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.578435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.578483] page_type: f5(slab)
[   29.578520] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.578570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.578616] page dumped because: kasan: bad access detected
[   29.578649] 
[   29.578668] Memory state around the buggy address:
[   29.578967]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.579026]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.579072] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.579112]                                      ^
[   29.579148]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.579325]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.579453] ==================================================================
[   29.606945] ==================================================================
[   29.607114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   29.607174] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.607239] 
[   29.607270] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.607353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.607662] Hardware name: linux,dummy-virt (DT)
[   29.607721] Call trace:
[   29.607747]  show_stack+0x20/0x38 (C)
[   29.607835]  dump_stack_lvl+0x8c/0xd0
[   29.608139]  print_report+0x118/0x608
[   29.608450]  kasan_report+0xdc/0x128
[   29.608626]  __asan_report_load8_noabort+0x20/0x30
[   29.608734]  kasan_atomics_helper+0x3e20/0x4858
[   29.608949]  kasan_atomics+0x198/0x2e0
[   29.609033]  kunit_try_run_case+0x170/0x3f0
[   29.609103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.609162]  kthread+0x328/0x630
[   29.609226]  ret_from_fork+0x10/0x20
[   29.610219] 
[   29.610317] Allocated by task 277:
[   29.610407]  kasan_save_stack+0x3c/0x68
[   29.610461]  kasan_save_track+0x20/0x40
[   29.610511]  kasan_save_alloc_info+0x40/0x58
[   29.610566]  __kasan_kmalloc+0xd4/0xd8
[   29.610633]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.610675]  kasan_atomics+0xb8/0x2e0
[   29.610711]  kunit_try_run_case+0x170/0x3f0
[   29.610753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.610815]  kthread+0x328/0x630
[   29.610853]  ret_from_fork+0x10/0x20
[   29.610891] 
[   29.610913] The buggy address belongs to the object at fff00000c787d680
[   29.610913]  which belongs to the cache kmalloc-64 of size 64
[   29.610972] The buggy address is located 0 bytes to the right of
[   29.610972]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.611037] 
[   29.611061] The buggy address belongs to the physical page:
[   29.611108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.611173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.611228] page_type: f5(slab)
[   29.611267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.611317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.611371] page dumped because: kasan: bad access detected
[   29.611412] 
[   29.611432] Memory state around the buggy address:
[   29.611465]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.611509]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.611552] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.611593]                                      ^
[   29.611625]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.611668]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.612157] ==================================================================
[   29.587024] ==================================================================
[   29.587109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   29.587164] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.587216] 
[   29.587281] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.587366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.587407] Hardware name: linux,dummy-virt (DT)
[   29.587439] Call trace:
[   29.587715]  show_stack+0x20/0x38 (C)
[   29.588081]  dump_stack_lvl+0x8c/0xd0
[   29.588146]  print_report+0x118/0x608
[   29.588194]  kasan_report+0xdc/0x128
[   29.588241]  __asan_report_load8_noabort+0x20/0x30
[   29.588290]  kasan_atomics_helper+0x3df4/0x4858
[   29.588340]  kasan_atomics+0x198/0x2e0
[   29.588388]  kunit_try_run_case+0x170/0x3f0
[   29.588448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.588503]  kthread+0x328/0x630
[   29.588545]  ret_from_fork+0x10/0x20
[   29.588594] 
[   29.588615] Allocated by task 277:
[   29.588645]  kasan_save_stack+0x3c/0x68
[   29.588688]  kasan_save_track+0x20/0x40
[   29.588726]  kasan_save_alloc_info+0x40/0x58
[   29.588764]  __kasan_kmalloc+0xd4/0xd8
[   29.588803]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.588844]  kasan_atomics+0xb8/0x2e0
[   29.588882]  kunit_try_run_case+0x170/0x3f0
[   29.588921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.588966]  kthread+0x328/0x630
[   29.589000]  ret_from_fork+0x10/0x20
[   29.589038] 
[   29.589058] The buggy address belongs to the object at fff00000c787d680
[   29.589058]  which belongs to the cache kmalloc-64 of size 64
[   29.589116] The buggy address is located 0 bytes to the right of
[   29.589116]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.589181] 
[   29.589203] The buggy address belongs to the physical page:
[   29.589235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.589286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.589335] page_type: f5(slab)
[   29.589371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.589433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.589473] page dumped because: kasan: bad access detected
[   29.589507] 
[   29.589526] Memory state around the buggy address:
[   29.589559]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.589603]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.589648] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.589687]                                      ^
[   29.589720]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.589763]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.589803] ==================================================================
[   29.542316] ==================================================================
[   29.542368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   29.542436] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.542494] 
[   29.542525] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.542614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.542641] Hardware name: linux,dummy-virt (DT)
[   29.542681] Call trace:
[   29.542704]  show_stack+0x20/0x38 (C)
[   29.542753]  dump_stack_lvl+0x8c/0xd0
[   29.542801]  print_report+0x118/0x608
[   29.542855]  kasan_report+0xdc/0x128
[   29.542904]  __asan_report_load8_noabort+0x20/0x30
[   29.542952]  kasan_atomics_helper+0x3f04/0x4858
[   29.543003]  kasan_atomics+0x198/0x2e0
[   29.543048]  kunit_try_run_case+0x170/0x3f0
[   29.543106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.543171]  kthread+0x328/0x630
[   29.543224]  ret_from_fork+0x10/0x20
[   29.543283] 
[   29.543305] Allocated by task 277:
[   29.543334]  kasan_save_stack+0x3c/0x68
[   29.543376]  kasan_save_track+0x20/0x40
[   29.543425]  kasan_save_alloc_info+0x40/0x58
[   29.543465]  __kasan_kmalloc+0xd4/0xd8
[   29.543504]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.543544]  kasan_atomics+0xb8/0x2e0
[   29.543582]  kunit_try_run_case+0x170/0x3f0
[   29.543622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.543677]  kthread+0x328/0x630
[   29.543713]  ret_from_fork+0x10/0x20
[   29.543751] 
[   29.543771] The buggy address belongs to the object at fff00000c787d680
[   29.543771]  which belongs to the cache kmalloc-64 of size 64
[   29.543830] The buggy address is located 0 bytes to the right of
[   29.543830]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.543895] 
[   29.543915] The buggy address belongs to the physical page:
[   29.543948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.544002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.544048] page_type: f5(slab)
[   29.544085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.544135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.544457] page dumped because: kasan: bad access detected
[   29.544510] 
[   29.544532] Memory state around the buggy address:
[   29.544565]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.544611]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.544655] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.544695]                                      ^
[   29.544992]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.545058]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.545098] ==================================================================
[   29.418851] ==================================================================
[   29.419502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.419676] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.419729] 
[   29.419768] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.420857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.421206] Hardware name: linux,dummy-virt (DT)
[   29.421433] Call trace:
[   29.421489]  show_stack+0x20/0x38 (C)
[   29.422126]  dump_stack_lvl+0x8c/0xd0
[   29.422795]  print_report+0x118/0x608
[   29.423131]  kasan_report+0xdc/0x128
[   29.423280]  kasan_check_range+0x100/0x1a8
[   29.423357]  __kasan_check_write+0x20/0x30
[   29.424166]  kasan_atomics_helper+0xf88/0x4858
[   29.424341]  kasan_atomics+0x198/0x2e0
[   29.424533]  kunit_try_run_case+0x170/0x3f0
[   29.425193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.425732]  kthread+0x328/0x630
[   29.426131]  ret_from_fork+0x10/0x20
[   29.426302] 
[   29.426907] Allocated by task 277:
[   29.427287]  kasan_save_stack+0x3c/0x68
[   29.427339]  kasan_save_track+0x20/0x40
[   29.427702]  kasan_save_alloc_info+0x40/0x58
[   29.428276]  __kasan_kmalloc+0xd4/0xd8
[   29.428685]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.428743]  kasan_atomics+0xb8/0x2e0
[   29.429741]  kunit_try_run_case+0x170/0x3f0
[   29.429823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.430830]  kthread+0x328/0x630
[   29.430892]  ret_from_fork+0x10/0x20
[   29.431101] 
[   29.431220] The buggy address belongs to the object at fff00000c787d680
[   29.431220]  which belongs to the cache kmalloc-64 of size 64
[   29.431475] The buggy address is located 0 bytes to the right of
[   29.431475]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.432040] 
[   29.432088] The buggy address belongs to the physical page:
[   29.432126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.432746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.433843] page_type: f5(slab)
[   29.434132] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.434423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.434847] page dumped because: kasan: bad access detected
[   29.434891] 
[   29.434939] Memory state around the buggy address:
[   29.434976]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.435912]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.436037] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.436078]                                      ^
[   29.436116]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.436569]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.436967] ==================================================================
[   29.545800] ==================================================================
[   29.545853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   29.545950] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.546044] 
[   29.546123] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.546292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.546340] Hardware name: linux,dummy-virt (DT)
[   29.546387] Call trace:
[   29.546458]  show_stack+0x20/0x38 (C)
[   29.546524]  dump_stack_lvl+0x8c/0xd0
[   29.546572]  print_report+0x118/0x608
[   29.546624]  kasan_report+0xdc/0x128
[   29.546670]  kasan_check_range+0x100/0x1a8
[   29.546720]  __kasan_check_write+0x20/0x30
[   29.546764]  kasan_atomics_helper+0x1414/0x4858
[   29.546945]  kasan_atomics+0x198/0x2e0
[   29.547007]  kunit_try_run_case+0x170/0x3f0
[   29.547085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.547142]  kthread+0x328/0x630
[   29.547191]  ret_from_fork+0x10/0x20
[   29.547240] 
[   29.547291] Allocated by task 277:
[   29.547322]  kasan_save_stack+0x3c/0x68
[   29.547363]  kasan_save_track+0x20/0x40
[   29.547414]  kasan_save_alloc_info+0x40/0x58
[   29.547630]  __kasan_kmalloc+0xd4/0xd8
[   29.547685]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.547728]  kasan_atomics+0xb8/0x2e0
[   29.547833]  kunit_try_run_case+0x170/0x3f0
[   29.547909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.548053]  kthread+0x328/0x630
[   29.548105]  ret_from_fork+0x10/0x20
[   29.548145] 
[   29.548166] The buggy address belongs to the object at fff00000c787d680
[   29.548166]  which belongs to the cache kmalloc-64 of size 64
[   29.548225] The buggy address is located 0 bytes to the right of
[   29.548225]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.548289] 
[   29.548310] The buggy address belongs to the physical page:
[   29.548833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.548967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.549304] page_type: f5(slab)
[   29.549427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.549542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.549586] page dumped because: kasan: bad access detected
[   29.549619] 
[   29.549721] Memory state around the buggy address:
[   29.550082]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.550608]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.550672] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.550785]                                      ^
[   29.550907]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.550960]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.551064] ==================================================================
[   29.551651] ==================================================================
[   29.551794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   29.551891] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.552078] 
[   29.552414] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.552677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.552785] Hardware name: linux,dummy-virt (DT)
[   29.552891] Call trace:
[   29.553035]  show_stack+0x20/0x38 (C)
[   29.553148]  dump_stack_lvl+0x8c/0xd0
[   29.553269]  print_report+0x118/0x608
[   29.553318]  kasan_report+0xdc/0x128
[   29.553365]  kasan_check_range+0x100/0x1a8
[   29.553422]  __kasan_check_write+0x20/0x30
[   29.553467]  kasan_atomics_helper+0x147c/0x4858
[   29.553817]  kasan_atomics+0x198/0x2e0
[   29.554027]  kunit_try_run_case+0x170/0x3f0
[   29.554102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.554448]  kthread+0x328/0x630
[   29.554611]  ret_from_fork+0x10/0x20
[   29.554791] 
[   29.554814] Allocated by task 277:
[   29.554844]  kasan_save_stack+0x3c/0x68
[   29.555139]  kasan_save_track+0x20/0x40
[   29.555329]  kasan_save_alloc_info+0x40/0x58
[   29.555706]  __kasan_kmalloc+0xd4/0xd8
[   29.555785]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.555968]  kasan_atomics+0xb8/0x2e0
[   29.556062]  kunit_try_run_case+0x170/0x3f0
[   29.556180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.556229]  kthread+0x328/0x630
[   29.556288]  ret_from_fork+0x10/0x20
[   29.556327] 
[   29.556348] The buggy address belongs to the object at fff00000c787d680
[   29.556348]  which belongs to the cache kmalloc-64 of size 64
[   29.556567] The buggy address is located 0 bytes to the right of
[   29.556567]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.556810] 
[   29.556892] The buggy address belongs to the physical page:
[   29.556977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.557265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.557475] page_type: f5(slab)
[   29.557639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.557732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.557775] page dumped because: kasan: bad access detected
[   29.557809] 
[   29.558035] Memory state around the buggy address:
[   29.558279]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.558404]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.558479] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.558824]                                      ^
[   29.558995]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.559070]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.559195] ==================================================================
[   29.559732] ==================================================================
[   29.559895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   29.560062] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.560151] 
[   29.560604] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.560769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.560863] Hardware name: linux,dummy-virt (DT)
[   29.561077] Call trace:
[   29.561175]  show_stack+0x20/0x38 (C)
[   29.561289]  dump_stack_lvl+0x8c/0xd0
[   29.561359]  print_report+0x118/0x608
[   29.561459]  kasan_report+0xdc/0x128
[   29.561509]  kasan_check_range+0x100/0x1a8
[   29.561581]  __kasan_check_write+0x20/0x30
[   29.561726]  kasan_atomics_helper+0x14e4/0x4858
[   29.561854]  kasan_atomics+0x198/0x2e0
[   29.562001]  kunit_try_run_case+0x170/0x3f0
[   29.562112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.562175]  kthread+0x328/0x630
[   29.562221]  ret_from_fork+0x10/0x20
[   29.562281] 
[   29.562305] Allocated by task 277:
[   29.562334]  kasan_save_stack+0x3c/0x68
[   29.562377]  kasan_save_track+0x20/0x40
[   29.562429]  kasan_save_alloc_info+0x40/0x58
[   29.562469]  __kasan_kmalloc+0xd4/0xd8
[   29.562524]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.562566]  kasan_atomics+0xb8/0x2e0
[   29.562629]  kunit_try_run_case+0x170/0x3f0
[   29.562670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.562716]  kthread+0x328/0x630
[   29.562765]  ret_from_fork+0x10/0x20
[   29.562809] 
[   29.562844] The buggy address belongs to the object at fff00000c787d680
[   29.562844]  which belongs to the cache kmalloc-64 of size 64
[   29.562903] The buggy address is located 0 bytes to the right of
[   29.562903]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.562967] 
[   29.562998] The buggy address belongs to the physical page:
[   29.563037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.563090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.563136] page_type: f5(slab)
[   29.563186] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.563250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.563295] page dumped because: kasan: bad access detected
[   29.563328] 
[   29.563355] Memory state around the buggy address:
[   29.563388]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.563443]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.563487] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.563525]                                      ^
[   29.563559]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.563603]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.563642] ==================================================================
[   29.307211] ==================================================================
[   29.307255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   29.307321] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.307505] 
[   29.307541] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.307626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.307653] Hardware name: linux,dummy-virt (DT)
[   29.307684] Call trace:
[   29.307709]  show_stack+0x20/0x38 (C)
[   29.307757]  dump_stack_lvl+0x8c/0xd0
[   29.307971]  print_report+0x118/0x608
[   29.308059]  kasan_report+0xdc/0x128
[   29.308182]  kasan_check_range+0x100/0x1a8
[   29.308300]  __kasan_check_write+0x20/0x30
[   29.308629]  kasan_atomics_helper+0xca0/0x4858
[   29.308719]  kasan_atomics+0x198/0x2e0
[   29.308767]  kunit_try_run_case+0x170/0x3f0
[   29.308840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.308895]  kthread+0x328/0x630
[   29.308939]  ret_from_fork+0x10/0x20
[   29.309132] 
[   29.309255] Allocated by task 277:
[   29.309350]  kasan_save_stack+0x3c/0x68
[   29.309652]  kasan_save_track+0x20/0x40
[   29.309812]  kasan_save_alloc_info+0x40/0x58
[   29.309894]  __kasan_kmalloc+0xd4/0xd8
[   29.309956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.309997]  kasan_atomics+0xb8/0x2e0
[   29.310370]  kunit_try_run_case+0x170/0x3f0
[   29.310505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.310786]  kthread+0x328/0x630
[   29.310890]  ret_from_fork+0x10/0x20
[   29.311058] 
[   29.311125] The buggy address belongs to the object at fff00000c787d680
[   29.311125]  which belongs to the cache kmalloc-64 of size 64
[   29.311257] The buggy address is located 0 bytes to the right of
[   29.311257]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.311321] 
[   29.311342] The buggy address belongs to the physical page:
[   29.311600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.311819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.312183] page_type: f5(slab)
[   29.312237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.312316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.312358] page dumped because: kasan: bad access detected
[   29.312438] 
[   29.312459] Memory state around the buggy address:
[   29.312695]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.312813]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.313166] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.313277]                                      ^
[   29.313358]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.313474]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.313619] ==================================================================
[   29.231448] ==================================================================
[   29.231510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   29.231563] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.231915] 
[   29.232064] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.232482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.232618] Hardware name: linux,dummy-virt (DT)
[   29.232697] Call trace:
[   29.232799]  show_stack+0x20/0x38 (C)
[   29.232852]  dump_stack_lvl+0x8c/0xd0
[   29.233066]  print_report+0x118/0x608
[   29.233326]  kasan_report+0xdc/0x128
[   29.233579]  kasan_check_range+0x100/0x1a8
[   29.233702]  __kasan_check_write+0x20/0x30
[   29.233832]  kasan_atomics_helper+0x99c/0x4858
[   29.234038]  kasan_atomics+0x198/0x2e0
[   29.234233]  kunit_try_run_case+0x170/0x3f0
[   29.234321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.234456]  kthread+0x328/0x630
[   29.234579]  ret_from_fork+0x10/0x20
[   29.234687] 
[   29.235085] Allocated by task 277:
[   29.235138]  kasan_save_stack+0x3c/0x68
[   29.235289]  kasan_save_track+0x20/0x40
[   29.235548]  kasan_save_alloc_info+0x40/0x58
[   29.235713]  __kasan_kmalloc+0xd4/0xd8
[   29.235925]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.236131]  kasan_atomics+0xb8/0x2e0
[   29.236170]  kunit_try_run_case+0x170/0x3f0
[   29.236418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.236476]  kthread+0x328/0x630
[   29.236628]  ret_from_fork+0x10/0x20
[   29.236853] 
[   29.237033] The buggy address belongs to the object at fff00000c787d680
[   29.237033]  which belongs to the cache kmalloc-64 of size 64
[   29.237137] The buggy address is located 0 bytes to the right of
[   29.237137]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.237232] 
[   29.237462] The buggy address belongs to the physical page:
[   29.237671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.237784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.237973] page_type: f5(slab)
[   29.238114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.238204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.238463] page dumped because: kasan: bad access detected
[   29.239040] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.242936] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.243456]  kasan_check_range+0x100/0x1a8
[   29.244600]  kasan_save_stack+0x3c/0x68
[   29.246147] The buggy address is located 0 bytes to the right of
[   29.246147]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.246537] 
[   29.246645] The buggy address belongs to the physical page:
[   29.246721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.246920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.247027] page_type: f5(slab)
[   29.247169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.247221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.247269] page dumped because: kasan: bad access detected
[   29.247305] 
[   29.247325] Memory state around the buggy address:
[   29.247357]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.247412]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.247624] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.248135]                                      ^
[   29.248213]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.248320]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.248506] ==================================================================
[   29.371231] ==================================================================
[   29.371296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.372872] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.373138] 
[   29.373277] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.373997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.374483] Hardware name: linux,dummy-virt (DT)
[   29.374904] Call trace:
[   29.375084]  show_stack+0x20/0x38 (C)
[   29.375941]  dump_stack_lvl+0x8c/0xd0
[   29.376065]  print_report+0x118/0x608
[   29.376358]  kasan_report+0xdc/0x128
[   29.376506]  kasan_check_range+0x100/0x1a8
[   29.377477]  __kasan_check_write+0x20/0x30
[   29.377625]  kasan_atomics_helper+0xeb8/0x4858
[   29.377676]  kasan_atomics+0x198/0x2e0
[   29.378291]  kunit_try_run_case+0x170/0x3f0
[   29.378359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.378426]  kthread+0x328/0x630
[   29.378471]  ret_from_fork+0x10/0x20
[   29.378522] 
[   29.380843] Allocated by task 277:
[   29.381090]  kasan_save_stack+0x3c/0x68
[   29.381359]  kasan_save_track+0x20/0x40
[   29.381471]  kasan_save_alloc_info+0x40/0x58
[   29.381622]  __kasan_kmalloc+0xd4/0xd8
[   29.382473]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.382580]  kasan_atomics+0xb8/0x2e0
[   29.382632]  kunit_try_run_case+0x170/0x3f0
[   29.382674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.382720]  kthread+0x328/0x630
[   29.383548]  ret_from_fork+0x10/0x20
[   29.384062] 
[   29.384187] The buggy address belongs to the object at fff00000c787d680
[   29.384187]  which belongs to the cache kmalloc-64 of size 64
[   29.384740] The buggy address is located 0 bytes to the right of
[   29.384740]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.385426] 
[   29.386255] The buggy address belongs to the physical page:
[   29.386350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.386808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.386978] page_type: f5(slab)
[   29.387324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.388189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.388969] page dumped because: kasan: bad access detected
[   29.389443] 
[   29.389575] Memory state around the buggy address:
[   29.389622]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.390387]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.390968] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.391049]                                      ^
[   29.391555]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.391699]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.391741] ==================================================================
[   29.064364] ==================================================================
[   29.064778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   29.064899] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.065003] 
[   29.065127] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.065264] Hardware name: linux,dummy-virt (DT)
[   29.065298] Call trace:
[   29.065339]  show_stack+0x20/0x38 (C)
[   29.065515]  dump_stack_lvl+0x8c/0xd0
[   29.065754]  print_report+0x118/0x608
[   29.065829]  kasan_report+0xdc/0x128
[   29.065877]  kasan_check_range+0x100/0x1a8
[   29.065928]  __kasan_check_read+0x20/0x30
[   29.065975]  kasan_atomics_helper+0x1ec/0x4858
[   29.066023]  kasan_atomics+0x198/0x2e0
[   29.066070]  kunit_try_run_case+0x170/0x3f0
[   29.066121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.066174]  kthread+0x328/0x630
[   29.066242]  ret_from_fork+0x10/0x20
[   29.066293] 
[   29.066313] Allocated by task 277:
[   29.066341]  kasan_save_stack+0x3c/0x68
[   29.066406]  kasan_save_track+0x20/0x40
[   29.066448]  kasan_save_alloc_info+0x40/0x58
[   29.066544]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.066586]  kasan_atomics+0xb8/0x2e0
[   29.066762]  ret_from_fork+0x10/0x20
[   29.066897] The buggy address is located 0 bytes to the right of
[   29.066897]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.066974] 
[   29.067030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.067082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.067129] page_type: f5(slab)
[   29.067244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.068377] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.068872]                                      ^
[   29.069472]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.070644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   29.070926] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.075504] 
[   29.076729] 
[   29.077415] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.079754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.080677]  __kasan_check_read+0x20/0x30
[   29.082266]  kasan_save_stack+0x3c/0x68
[   29.083753] The buggy address is located 0 bytes to the right of
[   29.083753]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.087568] 
[   29.087724] Hardware name: linux,dummy-virt (DT)
[   29.088694]  kasan_atomics_helper+0x40fc/0x4858
[   29.091219]  kthread+0x328/0x630
[   29.092705] page dumped because: kasan: bad access detected
[   29.093437] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.096083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.097514]  kasan_atomics_helper+0x32c/0x4858
[   29.099259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.101207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.103603]  kthread+0x328/0x630
[   29.104717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.106015] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.108560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.109588]  __kasan_check_write+0x20/0x30
[   29.112289]  kasan_save_alloc_info+0x40/0x58
[   29.115367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.115842] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.119037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.120743]  kasan_atomics+0x198/0x2e0
[   29.121729]  kasan_atomics+0xb8/0x2e0
[   29.122206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.124691]  kasan_atomics_helper+0x47c/0x4858
[   29.125518] The buggy address is located 0 bytes to the right of
[   29.125518]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.127710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.129726] 
[   29.131214] 
[   29.131450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.131897] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.133198] Hardware name: linux,dummy-virt (DT)
[   29.134071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.136463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.138615] Hardware name: linux,dummy-virt (DT)
[   29.139845]  kunit_try_run_case+0x170/0x3f0
[   29.145732] The buggy address is located 0 bytes to the right of
[   29.145732]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.153649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   29.177973]  __kasan_kmalloc+0xd4/0xd8
[   29.179921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.181272]                                      ^
[   29.183738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.186765]  kasan_atomics+0xb8/0x2e0
[   29.187568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.188488] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.190617]  show_stack+0x20/0x38 (C)
[   29.191801]  kasan_atomics+0x198/0x2e0
[   29.194685] The buggy address is located 0 bytes to the right of
[   29.194685]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.196894] ==================================================================
[   29.439276] ==================================================================
[   29.439335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.439391] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.442417] 
[   29.443090] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.443432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.443516] Hardware name: linux,dummy-virt (DT)
[   29.443573] Call trace:
[   29.443637]  show_stack+0x20/0x38 (C)
[   29.443693]  dump_stack_lvl+0x8c/0xd0
[   29.444018]  print_report+0x118/0x608
[   29.444077]  kasan_report+0xdc/0x128
[   29.444123]  kasan_check_range+0x100/0x1a8
[   29.444172]  __kasan_check_write+0x20/0x30
[   29.444218]  kasan_atomics_helper+0xff0/0x4858
[   29.444268]  kasan_atomics+0x198/0x2e0
[   29.446042]  kunit_try_run_case+0x170/0x3f0
[   29.446307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.447078]  kthread+0x328/0x630
[   29.447367]  ret_from_fork+0x10/0x20
[   29.447480] 
[   29.447901] Allocated by task 277:
[   29.448249]  kasan_save_stack+0x3c/0x68
[   29.448519]  kasan_save_track+0x20/0x40
[   29.448994]  kasan_save_alloc_info+0x40/0x58
[   29.449432]  __kasan_kmalloc+0xd4/0xd8
[   29.450329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.450495]  kasan_atomics+0xb8/0x2e0
[   29.450714]  kunit_try_run_case+0x170/0x3f0
[   29.450804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.450851]  kthread+0x328/0x630
[   29.451363]  ret_from_fork+0x10/0x20
[   29.451428] 
[   29.451968] The buggy address belongs to the object at fff00000c787d680
[   29.451968]  which belongs to the cache kmalloc-64 of size 64
[   29.452752] The buggy address is located 0 bytes to the right of
[   29.452752]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.453244] 
[   29.453275] The buggy address belongs to the physical page:
[   29.453826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.454265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.454483] page_type: f5(slab)
[   29.454890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.455633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.455949] page dumped because: kasan: bad access detected
[   29.455987] 
[   29.456460] Memory state around the buggy address:
[   29.456504]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.457167]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.457553] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.457912]                                      ^
[   29.458171]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.458220]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.458853] ==================================================================
[   29.527921] ==================================================================
[   29.527972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   29.528021] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.528275] 
[   29.528337] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.528741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.528881] Hardware name: linux,dummy-virt (DT)
[   29.528990] Call trace:
[   29.529135]  show_stack+0x20/0x38 (C)
[   29.529253]  dump_stack_lvl+0x8c/0xd0
[   29.529335]  print_report+0x118/0x608
[   29.529527]  kasan_report+0xdc/0x128
[   29.529577]  kasan_check_range+0x100/0x1a8
[   29.529632]  __kasan_check_write+0x20/0x30
[   29.529679]  kasan_atomics_helper+0x12d8/0x4858
[   29.530005]  kasan_atomics+0x198/0x2e0
[   29.530180]  kunit_try_run_case+0x170/0x3f0
[   29.530300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.530690]  kthread+0x328/0x630
[   29.530884]  ret_from_fork+0x10/0x20
[   29.530979] 
[   29.531002] Allocated by task 277:
[   29.531032]  kasan_save_stack+0x3c/0x68
[   29.531373]  kasan_save_track+0x20/0x40
[   29.531496]  kasan_save_alloc_info+0x40/0x58
[   29.531610]  __kasan_kmalloc+0xd4/0xd8
[   29.531968]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.532020]  kasan_atomics+0xb8/0x2e0
[   29.532091]  kunit_try_run_case+0x170/0x3f0
[   29.532139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.532186]  kthread+0x328/0x630
[   29.532449]  ret_from_fork+0x10/0x20
[   29.532579] 
[   29.532700] The buggy address belongs to the object at fff00000c787d680
[   29.532700]  which belongs to the cache kmalloc-64 of size 64
[   29.532835] The buggy address is located 0 bytes to the right of
[   29.532835]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.533032] 
[   29.533373] The buggy address belongs to the physical page:
[   29.533438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.533536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.533611] page_type: f5(slab)
[   29.533647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.533895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.534032] page dumped because: kasan: bad access detected
[   29.534159] 
[   29.534237] Memory state around the buggy address:
[   29.534331]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.534698]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.534762] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.534814]                                      ^
[   29.534862]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.534922]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.534971] ==================================================================
[   29.461306] ==================================================================
[   29.461439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.461917] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.461993] 
[   29.462233] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.462851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.462889] Hardware name: linux,dummy-virt (DT)
[   29.462924] Call trace:
[   29.462950]  show_stack+0x20/0x38 (C)
[   29.463413]  dump_stack_lvl+0x8c/0xd0
[   29.463483]  print_report+0x118/0x608
[   29.463532]  kasan_report+0xdc/0x128
[   29.463659]  kasan_check_range+0x100/0x1a8
[   29.463720]  __kasan_check_write+0x20/0x30
[   29.464092]  kasan_atomics_helper+0x1058/0x4858
[   29.464147]  kasan_atomics+0x198/0x2e0
[   29.464917]  kunit_try_run_case+0x170/0x3f0
[   29.464987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.465043]  kthread+0x328/0x630
[   29.465088]  ret_from_fork+0x10/0x20
[   29.465139] 
[   29.465160] Allocated by task 277:
[   29.465190]  kasan_save_stack+0x3c/0x68
[   29.465734]  kasan_save_track+0x20/0x40
[   29.465786]  kasan_save_alloc_info+0x40/0x58
[   29.465826]  __kasan_kmalloc+0xd4/0xd8
[   29.465867]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.465910]  kasan_atomics+0xb8/0x2e0
[   29.465948]  kunit_try_run_case+0x170/0x3f0
[   29.465988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.466035]  kthread+0x328/0x630
[   29.466916]  ret_from_fork+0x10/0x20
[   29.466968] 
[   29.466990] The buggy address belongs to the object at fff00000c787d680
[   29.466990]  which belongs to the cache kmalloc-64 of size 64
[   29.467247] The buggy address is located 0 bytes to the right of
[   29.467247]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.467820] 
[   29.467931] The buggy address belongs to the physical page:
[   29.467970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.468028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.468079] page_type: f5(slab)
[   29.468119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.468168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.468212] page dumped because: kasan: bad access detected
[   29.469037] 
[   29.469063] Memory state around the buggy address:
[   29.469108]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.469383]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.469443] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.469481]                                      ^
[   29.469517]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.469561]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.469601] ==================================================================
[   29.257249] ==================================================================
[   29.257697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   29.257766] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.257819] 
[   29.258034] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.258133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.258566] Hardware name: linux,dummy-virt (DT)
[   29.258739] Call trace:
[   29.258774]  show_stack+0x20/0x38 (C)
[   29.258828]  dump_stack_lvl+0x8c/0xd0
[   29.258879]  print_report+0x118/0x608
[   29.259183]  kasan_report+0xdc/0x128
[   29.259618]  kasan_check_range+0x100/0x1a8
[   29.259693]  __kasan_check_write+0x20/0x30
[   29.259741]  kasan_atomics_helper+0xad4/0x4858
[   29.259899]  kasan_atomics+0x198/0x2e0
[   29.260217]  kunit_try_run_case+0x170/0x3f0
[   29.260630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.260893]  kthread+0x328/0x630
[   29.261035]  ret_from_fork+0x10/0x20
[   29.261201] 
[   29.261253] Allocated by task 277:
[   29.261285]  kasan_save_stack+0x3c/0x68
[   29.261762]  kasan_save_track+0x20/0x40
[   29.261829]  kasan_save_alloc_info+0x40/0x58
[   29.261894]  __kasan_kmalloc+0xd4/0xd8
[   29.262103]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.262481]  kasan_atomics+0xb8/0x2e0
[   29.262748]  kunit_try_run_case+0x170/0x3f0
[   29.263024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.263083]  kthread+0x328/0x630
[   29.263475]  ret_from_fork+0x10/0x20
[   29.263557] 
[   29.263752] The buggy address belongs to the object at fff00000c787d680
[   29.263752]  which belongs to the cache kmalloc-64 of size 64
[   29.263987] The buggy address is located 0 bytes to the right of
[   29.263987]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.264222] 
[   29.264434] The buggy address belongs to the physical page:
[   29.264510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.264678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.264783] page_type: f5(slab)
[   29.264929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.265004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.265055] page dumped because: kasan: bad access detected
[   29.265088] 
[   29.265109] Memory state around the buggy address:
[   29.265143]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.265433]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.265964] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.266027]                                      ^
[   29.266189]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266369]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266420] ==================================================================
[   29.277622] ==================================================================
[   29.277991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   29.278099] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.278367] 
[   29.278420] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.278686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.278730] Hardware name: linux,dummy-virt (DT)
[   29.278766] Call trace:
[   29.278929]  show_stack+0x20/0x38 (C)
[   29.279073]  dump_stack_lvl+0x8c/0xd0
[   29.279126]  print_report+0x118/0x608
[   29.279211]  kasan_report+0xdc/0x128
[   29.279291]  kasan_check_range+0x100/0x1a8
[   29.279346]  __kasan_check_write+0x20/0x30
[   29.279467]  kasan_atomics_helper+0xb70/0x4858
[   29.279522]  kasan_atomics+0x198/0x2e0
[   29.279569]  kunit_try_run_case+0x170/0x3f0
[   29.279941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.280054]  kthread+0x328/0x630
[   29.280391]  ret_from_fork+0x10/0x20
[   29.280586] 
[   29.280613] Allocated by task 277:
[   29.280645]  kasan_save_stack+0x3c/0x68
[   29.280717]  kasan_save_track+0x20/0x40
[   29.280903]  kasan_save_alloc_info+0x40/0x58
[   29.281068]  __kasan_kmalloc+0xd4/0xd8
[   29.281289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.281523]  kasan_atomics+0xb8/0x2e0
[   29.281583]  kunit_try_run_case+0x170/0x3f0
[   29.281625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.281872]  kthread+0x328/0x630
[   29.282150]  ret_from_fork+0x10/0x20
[   29.282410] 
[   29.282438] The buggy address belongs to the object at fff00000c787d680
[   29.282438]  which belongs to the cache kmalloc-64 of size 64
[   29.282621] The buggy address is located 0 bytes to the right of
[   29.282621]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.282913] 
[   29.282965] The buggy address belongs to the physical page:
[   29.283348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.283553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.283631] page_type: f5(slab)
[   29.284014] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.284277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.284512] page dumped because: kasan: bad access detected
[   29.284728] 
[   29.284845] Memory state around the buggy address:
[   29.284922]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.285208]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.285433] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.285508]                                      ^
[   29.285864]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.285981]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.286182] ==================================================================
[   29.492408] ==================================================================
[   29.492608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.492680] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.492746] 
[   29.493094] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.493289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.493317] Hardware name: linux,dummy-virt (DT)
[   29.493651] Call trace:
[   29.493688]  show_stack+0x20/0x38 (C)
[   29.493757]  dump_stack_lvl+0x8c/0xd0
[   29.493871]  print_report+0x118/0x608
[   29.494296]  kasan_report+0xdc/0x128
[   29.494863]  kasan_check_range+0x100/0x1a8
[   29.494939]  __kasan_check_write+0x20/0x30
[   29.494987]  kasan_atomics_helper+0x1190/0x4858
[   29.495525]  kasan_atomics+0x198/0x2e0
[   29.495716]  kunit_try_run_case+0x170/0x3f0
[   29.495770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.495825]  kthread+0x328/0x630
[   29.495876]  ret_from_fork+0x10/0x20
[   29.495927] 
[   29.495949] Allocated by task 277:
[   29.495980]  kasan_save_stack+0x3c/0x68
[   29.496781]  kasan_save_track+0x20/0x40
[   29.496843]  kasan_save_alloc_info+0x40/0x58
[   29.496883]  __kasan_kmalloc+0xd4/0xd8
[   29.496923]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.496967]  kasan_atomics+0xb8/0x2e0
[   29.497190]  kunit_try_run_case+0x170/0x3f0
[   29.497450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.497506]  kthread+0x328/0x630
[   29.497719]  ret_from_fork+0x10/0x20
[   29.497797] 
[   29.497819] The buggy address belongs to the object at fff00000c787d680
[   29.497819]  which belongs to the cache kmalloc-64 of size 64
[   29.498034] The buggy address is located 0 bytes to the right of
[   29.498034]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.498470] 
[   29.498594] The buggy address belongs to the physical page:
[   29.498769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.498832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.499201] page_type: f5(slab)
[   29.499367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.499543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.499593] page dumped because: kasan: bad access detected
[   29.499931] 
[   29.499962] Memory state around the buggy address:
[   29.500294]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.500940]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.501163] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.501206]                                      ^
[   29.501243]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.501289]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.501724] ==================================================================
[   29.600587] ==================================================================
[   29.600634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   29.600965] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.601031] 
[   29.601081] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.601173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.601218] Hardware name: linux,dummy-virt (DT)
[   29.601255] Call trace:
[   29.601281]  show_stack+0x20/0x38 (C)
[   29.601329]  dump_stack_lvl+0x8c/0xd0
[   29.601719]  print_report+0x118/0x608
[   29.601783]  kasan_report+0xdc/0x128
[   29.601882]  kasan_check_range+0x100/0x1a8
[   29.602005]  __kasan_check_write+0x20/0x30
[   29.602053]  kasan_atomics_helper+0x175c/0x4858
[   29.602111]  kasan_atomics+0x198/0x2e0
[   29.602215]  kunit_try_run_case+0x170/0x3f0
[   29.602364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.602431]  kthread+0x328/0x630
[   29.602474]  ret_from_fork+0x10/0x20
[   29.602871] 
[   29.602961] Allocated by task 277:
[   29.602998]  kasan_save_stack+0x3c/0x68
[   29.603295]  kasan_save_track+0x20/0x40
[   29.603351]  kasan_save_alloc_info+0x40/0x58
[   29.603564]  __kasan_kmalloc+0xd4/0xd8
[   29.603680]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.603723]  kasan_atomics+0xb8/0x2e0
[   29.603781]  kunit_try_run_case+0x170/0x3f0
[   29.603823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.604327]  kthread+0x328/0x630
[   29.604434]  ret_from_fork+0x10/0x20
[   29.604796] 
[   29.604874] The buggy address belongs to the object at fff00000c787d680
[   29.604874]  which belongs to the cache kmalloc-64 of size 64
[   29.604955] The buggy address is located 0 bytes to the right of
[   29.604955]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.605044] 
[   29.605067] The buggy address belongs to the physical page:
[   29.605102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.605154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.605203] page_type: f5(slab)
[   29.605242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.605615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.605704] page dumped because: kasan: bad access detected
[   29.605778] 
[   29.605801] Memory state around the buggy address:
[   29.605835]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.605894]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.605940] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.605989]                                      ^
[   29.606025]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.606078]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.606119] ==================================================================
[   29.330744] ==================================================================
[   29.331117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.331178] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.331229] 
[   29.331259] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.331513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.331556] Hardware name: linux,dummy-virt (DT)
[   29.331589] Call trace:
[   29.331612]  show_stack+0x20/0x38 (C)
[   29.331690]  dump_stack_lvl+0x8c/0xd0
[   29.331755]  print_report+0x118/0x608
[   29.331810]  kasan_report+0xdc/0x128
[   29.331950]  kasan_check_range+0x100/0x1a8
[   29.332104]  __kasan_check_read+0x20/0x30
[   29.332212]  kasan_atomics_helper+0xdd4/0x4858
[   29.332282]  kasan_atomics+0x198/0x2e0
[   29.332330]  kunit_try_run_case+0x170/0x3f0
[   29.332378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.332580]  kthread+0x328/0x630
[   29.332634]  ret_from_fork+0x10/0x20
[   29.332747] 
[   29.332880] Allocated by task 277:
[   29.332988]  kasan_save_stack+0x3c/0x68
[   29.333106]  kasan_save_track+0x20/0x40
[   29.333203]  kasan_save_alloc_info+0x40/0x58
[   29.333545]  __kasan_kmalloc+0xd4/0xd8
[   29.333690]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.333797]  kasan_atomics+0xb8/0x2e0
[   29.333848]  kunit_try_run_case+0x170/0x3f0
[   29.333888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.333934]  kthread+0x328/0x630
[   29.333970]  ret_from_fork+0x10/0x20
[   29.334009] 
[   29.334144] The buggy address belongs to the object at fff00000c787d680
[   29.334144]  which belongs to the cache kmalloc-64 of size 64
[   29.334278] The buggy address is located 0 bytes to the right of
[   29.334278]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.334392] 
[   29.334473] The buggy address belongs to the physical page:
[   29.334506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.334692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.334821] page_type: f5(slab)
[   29.334920] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.335050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.335169] page dumped because: kasan: bad access detected
[   29.335284] 
[   29.335351] Memory state around the buggy address:
[   29.335385]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.335442]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.335803] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.335908]                                      ^
[   29.335975]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.336040]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.336360] ==================================================================
[   29.349785] ==================================================================
[   29.349845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.349896] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.349946] 
[   29.349979] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.350097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.350137] Hardware name: linux,dummy-virt (DT)
[   29.350181] Call trace:
[   29.350299]  show_stack+0x20/0x38 (C)
[   29.350366]  dump_stack_lvl+0x8c/0xd0
[   29.350427]  print_report+0x118/0x608
[   29.350478]  kasan_report+0xdc/0x128
[   29.350526]  __asan_report_store8_noabort+0x20/0x30
[   29.350582]  kasan_atomics_helper+0x3e5c/0x4858
[   29.351981]  kasan_atomics+0x198/0x2e0
[   29.352311]  kunit_try_run_case+0x170/0x3f0
[   29.352984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.353093]  kthread+0x328/0x630
[   29.353138]  ret_from_fork+0x10/0x20
[   29.353189] 
[   29.353536] Allocated by task 277:
[   29.353634]  kasan_save_stack+0x3c/0x68
[   29.354331]  kasan_save_track+0x20/0x40
[   29.355205]  kasan_save_alloc_info+0x40/0x58
[   29.355420]  __kasan_kmalloc+0xd4/0xd8
[   29.355852]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.355959]  kasan_atomics+0xb8/0x2e0
[   29.356773]  kunit_try_run_case+0x170/0x3f0
[   29.357167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.357842]  kthread+0x328/0x630
[   29.358117]  ret_from_fork+0x10/0x20
[   29.358159] 
[   29.358182] The buggy address belongs to the object at fff00000c787d680
[   29.358182]  which belongs to the cache kmalloc-64 of size 64
[   29.358949] The buggy address is located 0 bytes to the right of
[   29.358949]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.359782] 
[   29.359955] The buggy address belongs to the physical page:
[   29.360221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.360760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.361094] page_type: f5(slab)
[   29.361142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.362163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.362419] page dumped because: kasan: bad access detected
[   29.362990] 
[   29.363050] Memory state around the buggy address:
[   29.363089]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.363365]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.363995] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.364422]                                      ^
[   29.364666]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.365098]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.365699] ==================================================================
[   29.320744] ==================================================================
[   29.320818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.321043] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.321095] 
[   29.321298] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.321508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.321567] Hardware name: linux,dummy-virt (DT)
[   29.321600] Call trace:
[   29.321682]  show_stack+0x20/0x38 (C)
[   29.321734]  dump_stack_lvl+0x8c/0xd0
[   29.321800]  print_report+0x118/0x608
[   29.321885]  kasan_report+0xdc/0x128
[   29.321957]  kasan_check_range+0x100/0x1a8
[   29.322009]  __kasan_check_write+0x20/0x30
[   29.322056]  kasan_atomics_helper+0xd3c/0x4858
[   29.322115]  kasan_atomics+0x198/0x2e0
[   29.322162]  kunit_try_run_case+0x170/0x3f0
[   29.322347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.322626]  kthread+0x328/0x630
[   29.322689]  ret_from_fork+0x10/0x20
[   29.322739] 
[   29.322844] Allocated by task 277:
[   29.323029]  kasan_save_stack+0x3c/0x68
[   29.323147]  kasan_save_track+0x20/0x40
[   29.323212]  kasan_save_alloc_info+0x40/0x58
[   29.323290]  __kasan_kmalloc+0xd4/0xd8
[   29.323357]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.323429]  kasan_atomics+0xb8/0x2e0
[   29.323506]  kunit_try_run_case+0x170/0x3f0
[   29.323548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.323593]  kthread+0x328/0x630
[   29.323737]  ret_from_fork+0x10/0x20
[   29.323989] 
[   29.324106] The buggy address belongs to the object at fff00000c787d680
[   29.324106]  which belongs to the cache kmalloc-64 of size 64
[   29.324339] The buggy address is located 0 bytes to the right of
[   29.324339]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.324520] 
[   29.324590] The buggy address belongs to the physical page:
[   29.324668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.324731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.324779] page_type: f5(slab)
[   29.324816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.324868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.324909] page dumped because: kasan: bad access detected
[   29.324942] 
[   29.324984] Memory state around the buggy address:
[   29.325018]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.325063]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.325318] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.325477]                                      ^
[   29.325800]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.325940]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.326019] ==================================================================
[   29.589936] ==================================================================
[   29.589976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   29.590020] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.590069] 
[   29.590097] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.590180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.590207] Hardware name: linux,dummy-virt (DT)
[   29.590238] Call trace:
[   29.590261]  show_stack+0x20/0x38 (C)
[   29.590307]  dump_stack_lvl+0x8c/0xd0
[   29.590354]  print_report+0x118/0x608
[   29.590452]  kasan_report+0xdc/0x128
[   29.590551]  kasan_check_range+0x100/0x1a8
[   29.590641]  __kasan_check_write+0x20/0x30
[   29.590688]  kasan_atomics_helper+0x16d0/0x4858
[   29.590775]  kasan_atomics+0x198/0x2e0
[   29.590948]  kunit_try_run_case+0x170/0x3f0
[   29.591118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.591240]  kthread+0x328/0x630
[   29.591316]  ret_from_fork+0x10/0x20
[   29.591551] 
[   29.591594] Allocated by task 277:
[   29.591624]  kasan_save_stack+0x3c/0x68
[   29.591668]  kasan_save_track+0x20/0x40
[   29.591731]  kasan_save_alloc_info+0x40/0x58
[   29.591771]  __kasan_kmalloc+0xd4/0xd8
[   29.591810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.591851]  kasan_atomics+0xb8/0x2e0
[   29.591907]  kunit_try_run_case+0x170/0x3f0
[   29.591960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.592006]  kthread+0x328/0x630
[   29.592041]  ret_from_fork+0x10/0x20
[   29.592079] 
[   29.592100] The buggy address belongs to the object at fff00000c787d680
[   29.592100]  which belongs to the cache kmalloc-64 of size 64
[   29.592159] The buggy address is located 0 bytes to the right of
[   29.592159]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.592429] 
[   29.592566] The buggy address belongs to the physical page:
[   29.592663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.592802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.592939] page_type: f5(slab)
[   29.593055] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.593139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.593592] page dumped because: kasan: bad access detected
[   29.593634] 
[   29.593654] Memory state around the buggy address:
[   29.593699]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.593774]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.594161] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.594325]                                      ^
[   29.594418]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.594463]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.594504] ==================================================================
[   29.471440] ==================================================================
[   29.471494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.471546] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.471597] 
[   29.471628] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.471713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.472910] Hardware name: linux,dummy-virt (DT)
[   29.472987] Call trace:
[   29.473013]  show_stack+0x20/0x38 (C)
[   29.473457]  dump_stack_lvl+0x8c/0xd0
[   29.473523]  print_report+0x118/0x608
[   29.473902]  kasan_report+0xdc/0x128
[   29.474175]  kasan_check_range+0x100/0x1a8
[   29.474226]  __kasan_check_write+0x20/0x30
[   29.474306]  kasan_atomics_helper+0x10c0/0x4858
[   29.474358]  kasan_atomics+0x198/0x2e0
[   29.474417]  kunit_try_run_case+0x170/0x3f0
[   29.474467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.474961]  kthread+0x328/0x630
[   29.475018]  ret_from_fork+0x10/0x20
[   29.475336] 
[   29.475366] Allocated by task 277:
[   29.475501]  kasan_save_stack+0x3c/0x68
[   29.475954]  kasan_save_track+0x20/0x40
[   29.476003]  kasan_save_alloc_info+0x40/0x58
[   29.476044]  __kasan_kmalloc+0xd4/0xd8
[   29.476212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.476304]  kasan_atomics+0xb8/0x2e0
[   29.476723]  kunit_try_run_case+0x170/0x3f0
[   29.476769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.476818]  kthread+0x328/0x630
[   29.476861]  ret_from_fork+0x10/0x20
[   29.476901] 
[   29.477375] The buggy address belongs to the object at fff00000c787d680
[   29.477375]  which belongs to the cache kmalloc-64 of size 64
[   29.477514] The buggy address is located 0 bytes to the right of
[   29.477514]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.477724] 
[   29.477747] The buggy address belongs to the physical page:
[   29.477874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.477992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.478314] page_type: f5(slab)
[   29.478359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.478684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.478961] page dumped because: kasan: bad access detected
[   29.479001] 
[   29.479022] Memory state around the buggy address:
[   29.479058]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.479536]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.479670] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.479759]                                      ^
[   29.479796]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.480116]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.480164] ==================================================================
[   29.397948] ==================================================================
[   29.398011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.398076] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.399046] 
[   29.399263] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.399355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.399383] Hardware name: linux,dummy-virt (DT)
[   29.399430] Call trace:
[   29.400728]  show_stack+0x20/0x38 (C)
[   29.400853]  dump_stack_lvl+0x8c/0xd0
[   29.400938]  print_report+0x118/0x608
[   29.401355]  kasan_report+0xdc/0x128
[   29.401795]  kasan_check_range+0x100/0x1a8
[   29.402761]  __kasan_check_write+0x20/0x30
[   29.403157]  kasan_atomics_helper+0xf20/0x4858
[   29.403494]  kasan_atomics+0x198/0x2e0
[   29.403544]  kunit_try_run_case+0x170/0x3f0
[   29.403603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.403659]  kthread+0x328/0x630
[   29.405744]  ret_from_fork+0x10/0x20
[   29.406130] 
[   29.406211] Allocated by task 277:
[   29.406286]  kasan_save_stack+0x3c/0x68
[   29.406336]  kasan_save_track+0x20/0x40
[   29.406378]  kasan_save_alloc_info+0x40/0x58
[   29.406428]  __kasan_kmalloc+0xd4/0xd8
[   29.407105]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.407467]  kasan_atomics+0xb8/0x2e0
[   29.407721]  kunit_try_run_case+0x170/0x3f0
[   29.407764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.407810]  kthread+0x328/0x630
[   29.407846]  ret_from_fork+0x10/0x20
[   29.408493] 
[   29.408518] The buggy address belongs to the object at fff00000c787d680
[   29.408518]  which belongs to the cache kmalloc-64 of size 64
[   29.409377] The buggy address is located 0 bytes to the right of
[   29.409377]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.409918] 
[   29.410359] The buggy address belongs to the physical page:
[   29.410836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.411013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.412049] page_type: f5(slab)
[   29.412174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.412242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.412767] page dumped because: kasan: bad access detected
[   29.412942] 
[   29.413300] Memory state around the buggy address:
[   29.413600]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.414127]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.414180] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.414220]                                      ^
[   29.414257]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.414303]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.415655] ==================================================================
[   29.535228] ==================================================================
[   29.535416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   29.535568] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.535621] 
[   29.535678] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.535793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.535840] Hardware name: linux,dummy-virt (DT)
[   29.536082] Call trace:
[   29.536133]  show_stack+0x20/0x38 (C)
[   29.536191]  dump_stack_lvl+0x8c/0xd0
[   29.536241]  print_report+0x118/0x608
[   29.536288]  kasan_report+0xdc/0x128
[   29.536419]  kasan_check_range+0x100/0x1a8
[   29.536599]  __kasan_check_write+0x20/0x30
[   29.536942]  kasan_atomics_helper+0x1384/0x4858
[   29.537091]  kasan_atomics+0x198/0x2e0
[   29.537572]  kunit_try_run_case+0x170/0x3f0
[   29.537705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.538027]  kthread+0x328/0x630
[   29.538096]  ret_from_fork+0x10/0x20
[   29.538164] 
[   29.538208] Allocated by task 277:
[   29.538238]  kasan_save_stack+0x3c/0x68
[   29.538280]  kasan_save_track+0x20/0x40
[   29.538320]  kasan_save_alloc_info+0x40/0x58
[   29.538374]  __kasan_kmalloc+0xd4/0xd8
[   29.538425]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.538466]  kasan_atomics+0xb8/0x2e0
[   29.538505]  kunit_try_run_case+0x170/0x3f0
[   29.538884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.538943]  kthread+0x328/0x630
[   29.539082]  ret_from_fork+0x10/0x20
[   29.539264] 
[   29.539409] The buggy address belongs to the object at fff00000c787d680
[   29.539409]  which belongs to the cache kmalloc-64 of size 64
[   29.539510] The buggy address is located 0 bytes to the right of
[   29.539510]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.539579] 
[   29.539611] The buggy address belongs to the physical page:
[   29.539931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.540086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.540198] page_type: f5(slab)
[   29.540298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.540631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.540696] page dumped because: kasan: bad access detected
[   29.540730] 
[   29.540751] Memory state around the buggy address:
[   29.540942]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.540989]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.541033] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.541259]                                      ^
[   29.541337]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.541455]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.541842] ==================================================================
[   29.297232] ==================================================================
[   29.297302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   29.297354] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.297812] 
[   29.297862] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.297958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.298500] Hardware name: linux,dummy-virt (DT)
[   29.298600] Call trace:
[   29.298628]  show_stack+0x20/0x38 (C)
[   29.298692]  dump_stack_lvl+0x8c/0xd0
[   29.298950]  print_report+0x118/0x608
[   29.299031]  kasan_report+0xdc/0x128
[   29.299082]  kasan_check_range+0x100/0x1a8
[   29.299525]  __kasan_check_write+0x20/0x30
[   29.299687]  kasan_atomics_helper+0xc08/0x4858
[   29.299747]  kasan_atomics+0x198/0x2e0
[   29.299804]  kunit_try_run_case+0x170/0x3f0
[   29.300202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.300282]  kthread+0x328/0x630
[   29.300327]  ret_from_fork+0x10/0x20
[   29.300378] 
[   29.300413] Allocated by task 277:
[   29.300668]  kasan_save_stack+0x3c/0x68
[   29.300947]  kasan_save_track+0x20/0x40
[   29.300993]  kasan_save_alloc_info+0x40/0x58
[   29.301407]  __kasan_kmalloc+0xd4/0xd8
[   29.301517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.301631]  kasan_atomics+0xb8/0x2e0
[   29.301939]  kunit_try_run_case+0x170/0x3f0
[   29.302054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.302330]  kthread+0x328/0x630
[   29.302485]  ret_from_fork+0x10/0x20
[   29.302591] 
[   29.302616] The buggy address belongs to the object at fff00000c787d680
[   29.302616]  which belongs to the cache kmalloc-64 of size 64
[   29.302691] The buggy address is located 0 bytes to the right of
[   29.302691]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.302760] 
[   29.302784] The buggy address belongs to the physical page:
[   29.302833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.302885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.302933] page_type: f5(slab)
[   29.302972] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.303022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.303063] page dumped because: kasan: bad access detected
[   29.303096] 
[   29.303146] Memory state around the buggy address:
[   29.303195]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.303253]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.303297] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.303348]                                      ^
[   29.303384]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.303439]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.303493] ==================================================================
[   29.343765] ==================================================================
[   29.343815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.343903] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.343956] 
[   29.343988] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.344119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.344149] Hardware name: linux,dummy-virt (DT)
[   29.344183] Call trace:
[   29.344209]  show_stack+0x20/0x38 (C)
[   29.344257]  dump_stack_lvl+0x8c/0xd0
[   29.344303]  print_report+0x118/0x608
[   29.344352]  kasan_report+0xdc/0x128
[   29.344686]  kasan_check_range+0x100/0x1a8
[   29.344819]  __kasan_check_write+0x20/0x30
[   29.344927]  kasan_atomics_helper+0xe44/0x4858
[   29.344980]  kasan_atomics+0x198/0x2e0
[   29.345185]  kunit_try_run_case+0x170/0x3f0
[   29.345290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.345456]  kthread+0x328/0x630
[   29.345530]  ret_from_fork+0x10/0x20
[   29.345581] 
[   29.345731] Allocated by task 277:
[   29.345795]  kasan_save_stack+0x3c/0x68
[   29.345931]  kasan_save_track+0x20/0x40
[   29.346011]  kasan_save_alloc_info+0x40/0x58
[   29.346208]  __kasan_kmalloc+0xd4/0xd8
[   29.346448]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.346518]  kasan_atomics+0xb8/0x2e0
[   29.346607]  kunit_try_run_case+0x170/0x3f0
[   29.346709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.346827]  kthread+0x328/0x630
[   29.346865]  ret_from_fork+0x10/0x20
[   29.346902] 
[   29.346925] The buggy address belongs to the object at fff00000c787d680
[   29.346925]  which belongs to the cache kmalloc-64 of size 64
[   29.346984] The buggy address is located 0 bytes to the right of
[   29.346984]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.347231] 
[   29.347281] The buggy address belongs to the physical page:
[   29.347350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.347446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.347733] page_type: f5(slab)
[   29.347825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.348017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.348061] page dumped because: kasan: bad access detected
[   29.348116] 
[   29.348137] Memory state around the buggy address:
[   29.348172]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.348215]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.348260] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.348301]                                      ^
[   29.348335]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.348380]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.348540] ==================================================================
[   29.287023] ==================================================================
[   29.287080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   29.287136] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.287196] 
[   29.287228] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.287318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.287355] Hardware name: linux,dummy-virt (DT)
[   29.287389] Call trace:
[   29.287426]  show_stack+0x20/0x38 (C)
[   29.287476]  dump_stack_lvl+0x8c/0xd0
[   29.287534]  print_report+0x118/0x608
[   29.287584]  kasan_report+0xdc/0x128
[   29.287633]  __asan_report_load4_noabort+0x20/0x30
[   29.287682]  kasan_atomics_helper+0x3dbc/0x4858
[   29.287732]  kasan_atomics+0x198/0x2e0
[   29.287779]  kunit_try_run_case+0x170/0x3f0
[   29.287828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.288559]  kthread+0x328/0x630
[   29.288643]  ret_from_fork+0x10/0x20
[   29.288748] 
[   29.289203] Allocated by task 277:
[   29.289242]  kasan_save_stack+0x3c/0x68
[   29.289626]  kasan_save_track+0x20/0x40
[   29.290034]  kasan_save_alloc_info+0x40/0x58
[   29.290094]  __kasan_kmalloc+0xd4/0xd8
[   29.290453]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.290531]  kasan_atomics+0xb8/0x2e0
[   29.290744]  kunit_try_run_case+0x170/0x3f0
[   29.290900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.290962]  kthread+0x328/0x630
[   29.291332]  ret_from_fork+0x10/0x20
[   29.291427] 
[   29.291616] The buggy address belongs to the object at fff00000c787d680
[   29.291616]  which belongs to the cache kmalloc-64 of size 64
[   29.291836] The buggy address is located 0 bytes to the right of
[   29.291836]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.292281] 
[   29.292433] The buggy address belongs to the physical page:
[   29.292635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.292793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.292918] page_type: f5(slab)
[   29.293205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.293320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.293616] page dumped because: kasan: bad access detected
[   29.293671] 
[   29.293691] Memory state around the buggy address:
[   29.293878]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.294118]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.294364] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.294607]                                      ^
[   29.294735]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.294896]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.295045] ==================================================================
[   29.249101] ==================================================================
[   29.249382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.249608] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.249683] 
[   29.249717] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.249802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.250020] Hardware name: linux,dummy-virt (DT)
[   29.250353] Call trace:
[   29.250499]  show_stack+0x20/0x38 (C)
[   29.250589]  dump_stack_lvl+0x8c/0xd0
[   29.250640]  print_report+0x118/0x608
[   29.251108]  kasan_report+0xdc/0x128
[   29.251281]  kasan_check_range+0x100/0x1a8
[   29.251507]  __kasan_check_write+0x20/0x30
[   29.251568]  kasan_atomics_helper+0xa6c/0x4858
[   29.251736]  kasan_atomics+0x198/0x2e0
[   29.251798]  kunit_try_run_case+0x170/0x3f0
[   29.252222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.252301]  kthread+0x328/0x630
[   29.252551]  ret_from_fork+0x10/0x20
[   29.252869] 
[   29.252992] Allocated by task 277:
[   29.253092]  kasan_save_stack+0x3c/0x68
[   29.253417]  kasan_save_track+0x20/0x40
[   29.253623]  kasan_save_alloc_info+0x40/0x58
[   29.253693]  __kasan_kmalloc+0xd4/0xd8
[   29.254037]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.254146]  kasan_atomics+0xb8/0x2e0
[   29.254391]  kunit_try_run_case+0x170/0x3f0
[   29.254498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.254680]  kthread+0x328/0x630
[   29.254748]  ret_from_fork+0x10/0x20
[   29.254879] 
[   29.254904] The buggy address belongs to the object at fff00000c787d680
[   29.254904]  which belongs to the cache kmalloc-64 of size 64
[   29.254973] The buggy address is located 0 bytes to the right of
[   29.254973]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.255038] 
[   29.255069] The buggy address belongs to the physical page:
[   29.255123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.255190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.255239] page_type: f5(slab)
[   29.255291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.255352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.255410] page dumped because: kasan: bad access detected
[   29.255460] 
[   29.255489] Memory state around the buggy address:
[   29.255523]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.255567]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.255611] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.255651]                                      ^
[   29.255694]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.255736]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.255784] ==================================================================
[   29.569927] ==================================================================
[   29.570003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   29.570056] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.570152] 
[   29.570262] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.570349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.570377] Hardware name: linux,dummy-virt (DT)
[   29.570422] Call trace:
[   29.570445]  show_stack+0x20/0x38 (C)
[   29.570493]  dump_stack_lvl+0x8c/0xd0
[   29.570539]  print_report+0x118/0x608
[   29.570586]  kasan_report+0xdc/0x128
[   29.570637]  kasan_check_range+0x100/0x1a8
[   29.570684]  __kasan_check_write+0x20/0x30
[   29.570728]  kasan_atomics_helper+0x15b4/0x4858
[   29.570778]  kasan_atomics+0x198/0x2e0
[   29.570970]  kunit_try_run_case+0x170/0x3f0
[   29.571069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.571183]  kthread+0x328/0x630
[   29.571234]  ret_from_fork+0x10/0x20
[   29.571299] 
[   29.571474] Allocated by task 277:
[   29.571586]  kasan_save_stack+0x3c/0x68
[   29.571692]  kasan_save_track+0x20/0x40
[   29.571845]  kasan_save_alloc_info+0x40/0x58
[   29.571945]  __kasan_kmalloc+0xd4/0xd8
[   29.572066]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.572128]  kasan_atomics+0xb8/0x2e0
[   29.572201]  kunit_try_run_case+0x170/0x3f0
[   29.572242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.572463]  kthread+0x328/0x630
[   29.572712]  ret_from_fork+0x10/0x20
[   29.572855] 
[   29.573004] The buggy address belongs to the object at fff00000c787d680
[   29.573004]  which belongs to the cache kmalloc-64 of size 64
[   29.573114] The buggy address is located 0 bytes to the right of
[   29.573114]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.573190] 
[   29.573211] The buggy address belongs to the physical page:
[   29.573245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.573631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.573781] page_type: f5(slab)
[   29.573874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.574117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.574238] page dumped because: kasan: bad access detected
[   29.574369] 
[   29.574738] Memory state around the buggy address:
[   29.574837]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.575289]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.575518] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.575586]                                      ^
[   29.575736]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.575879]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.576124] ==================================================================
[   29.267557] ==================================================================
[   29.267811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   29.267965] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.268019] 
[   29.268115] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.268254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.268354] Hardware name: linux,dummy-virt (DT)
[   29.268389] Call trace:
[   29.268720]  show_stack+0x20/0x38 (C)
[   29.268947]  dump_stack_lvl+0x8c/0xd0
[   29.269292]  print_report+0x118/0x608
[   29.269522]  kasan_report+0xdc/0x128
[   29.269780]  __asan_report_load4_noabort+0x20/0x30
[   29.269980]  kasan_atomics_helper+0x3dcc/0x4858
[   29.270087]  kasan_atomics+0x198/0x2e0
[   29.270354]  kunit_try_run_case+0x170/0x3f0
[   29.270611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.270699]  kthread+0x328/0x630
[   29.271089]  ret_from_fork+0x10/0x20
[   29.271157] 
[   29.271180] Allocated by task 277:
[   29.271432]  kasan_save_stack+0x3c/0x68
[   29.271594]  kasan_save_track+0x20/0x40
[   29.271882]  kasan_save_alloc_info+0x40/0x58
[   29.272149]  __kasan_kmalloc+0xd4/0xd8
[   29.272322]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.272468]  kasan_atomics+0xb8/0x2e0
[   29.272851]  kunit_try_run_case+0x170/0x3f0
[   29.272924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.272987]  kthread+0x328/0x630
[   29.273180]  ret_from_fork+0x10/0x20
[   29.273415] 
[   29.273453] The buggy address belongs to the object at fff00000c787d680
[   29.273453]  which belongs to the cache kmalloc-64 of size 64
[   29.273514] The buggy address is located 0 bytes to the right of
[   29.273514]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.273657] 
[   29.273691] The buggy address belongs to the physical page:
[   29.273726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.273799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.273850] page_type: f5(slab)
[   29.273903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.273964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.274014] page dumped because: kasan: bad access detected
[   29.274048] 
[   29.274070] Memory state around the buggy address:
[   29.274103]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.274157]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.274202] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.274251]                                      ^
[   29.274287]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.274330]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.274369] ==================================================================
[   29.612753] ==================================================================
[   29.612804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   29.612853] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.612948] 
[   29.613105] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.613247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.613315] Hardware name: linux,dummy-virt (DT)
[   29.613348] Call trace:
[   29.613429]  show_stack+0x20/0x38 (C)
[   29.613482]  dump_stack_lvl+0x8c/0xd0
[   29.613557]  print_report+0x118/0x608
[   29.613611]  kasan_report+0xdc/0x128
[   29.613694]  kasan_check_range+0x100/0x1a8
[   29.613745]  __kasan_check_write+0x20/0x30
[   29.613789]  kasan_atomics_helper+0x17ec/0x4858
[   29.613892]  kasan_atomics+0x198/0x2e0
[   29.614078]  kunit_try_run_case+0x170/0x3f0
[   29.614152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.614227]  kthread+0x328/0x630
[   29.614272]  ret_from_fork+0x10/0x20
[   29.614337] 
[   29.614366] Allocated by task 277:
[   29.614418]  kasan_save_stack+0x3c/0x68
[   29.614463]  kasan_save_track+0x20/0x40
[   29.614509]  kasan_save_alloc_info+0x40/0x58
[   29.614557]  __kasan_kmalloc+0xd4/0xd8
[   29.614603]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.614763]  kasan_atomics+0xb8/0x2e0
[   29.614812]  kunit_try_run_case+0x170/0x3f0
[   29.614909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.614964]  kthread+0x328/0x630
[   29.614999]  ret_from_fork+0x10/0x20
[   29.615038] 
[   29.615062] The buggy address belongs to the object at fff00000c787d680
[   29.615062]  which belongs to the cache kmalloc-64 of size 64
[   29.615121] The buggy address is located 0 bytes to the right of
[   29.615121]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.615246] 
[   29.615272] The buggy address belongs to the physical page:
[   29.615408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.615549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.615608] page_type: f5(slab)
[   29.615848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.616064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.616129] page dumped because: kasan: bad access detected
[   29.616206] 
[   29.616235] Memory state around the buggy address:
[   29.616272]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.616333]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.616377] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.616810]                                      ^
[   29.616884]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.617265]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.617413] ==================================================================
[   29.326574] ==================================================================
[   29.326716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.326775] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.326841] 
[   29.326963] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.327198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.327233] Hardware name: linux,dummy-virt (DT)
[   29.327294] Call trace:
[   29.327320]  show_stack+0x20/0x38 (C)
[   29.327455]  dump_stack_lvl+0x8c/0xd0
[   29.327508]  print_report+0x118/0x608
[   29.327605]  kasan_report+0xdc/0x128
[   29.327723]  __asan_report_load4_noabort+0x20/0x30
[   29.327839]  kasan_atomics_helper+0x3e04/0x4858
[   29.328014]  kasan_atomics+0x198/0x2e0
[   29.328066]  kunit_try_run_case+0x170/0x3f0
[   29.328131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.328186]  kthread+0x328/0x630
[   29.328520]  ret_from_fork+0x10/0x20
[   29.328637] 
[   29.328658] Allocated by task 277:
[   29.328729]  kasan_save_stack+0x3c/0x68
[   29.328829]  kasan_save_track+0x20/0x40
[   29.328874]  kasan_save_alloc_info+0x40/0x58
[   29.329057]  __kasan_kmalloc+0xd4/0xd8
[   29.329104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.329173]  kasan_atomics+0xb8/0x2e0
[   29.329212]  kunit_try_run_case+0x170/0x3f0
[   29.329252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.329298]  kthread+0x328/0x630
[   29.329342]  ret_from_fork+0x10/0x20
[   29.329379] 
[   29.329431] The buggy address belongs to the object at fff00000c787d680
[   29.329431]  which belongs to the cache kmalloc-64 of size 64
[   29.329499] The buggy address is located 0 bytes to the right of
[   29.329499]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.329564] 
[   29.329594] The buggy address belongs to the physical page:
[   29.329635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.329684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.329742] page_type: f5(slab)
[   29.329781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.329847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.329890] page dumped because: kasan: bad access detected
[   29.329921] 
[   29.329940] Memory state around the buggy address:
[   29.329983]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.330034]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.330080] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.330129]                                      ^
[   29.330178]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.330237]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.330287] ==================================================================
[   29.304570] ==================================================================
[   29.304620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   29.304669] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.304719] 
[   29.304752] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.304834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.304863] Hardware name: linux,dummy-virt (DT)
[   29.304896] Call trace:
[   29.304919]  show_stack+0x20/0x38 (C)
[   29.304970]  dump_stack_lvl+0x8c/0xd0
[   29.305019]  print_report+0x118/0x608
[   29.305068]  kasan_report+0xdc/0x128
[   29.305116]  __asan_report_load4_noabort+0x20/0x30
[   29.305166]  kasan_atomics_helper+0x3de4/0x4858
[   29.305216]  kasan_atomics+0x198/0x2e0
[   29.305263]  kunit_try_run_case+0x170/0x3f0
[   29.305313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.305367]  kthread+0x328/0x630
[   29.305423]  ret_from_fork+0x10/0x20
[   29.305472] 
[   29.305493] Allocated by task 277:
[   29.305522]  kasan_save_stack+0x3c/0x68
[   29.305565]  kasan_save_track+0x20/0x40
[   29.305606]  kasan_save_alloc_info+0x40/0x58
[   29.305650]  __kasan_kmalloc+0xd4/0xd8
[   29.305691]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.305734]  kasan_atomics+0xb8/0x2e0
[   29.305773]  kunit_try_run_case+0x170/0x3f0
[   29.305812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.305859]  kthread+0x328/0x630
[   29.305893]  ret_from_fork+0x10/0x20
[   29.305928] 
[   29.305950] The buggy address belongs to the object at fff00000c787d680
[   29.305950]  which belongs to the cache kmalloc-64 of size 64
[   29.306009] The buggy address is located 0 bytes to the right of
[   29.306009]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.306072] 
[   29.306092] The buggy address belongs to the physical page:
[   29.306124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.306176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.306224] page_type: f5(slab)
[   29.306264] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.306314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.306355] page dumped because: kasan: bad access detected
[   29.306386] 
[   29.306441] Memory state around the buggy address:
[   29.306474]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.306618]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.306728] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.306844]                                      ^
[   29.306902]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.306978]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.307024] ==================================================================
[   29.522444] ==================================================================
[   29.522497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   29.522549] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.522608] 
[   29.522641] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.522725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.524429] Hardware name: linux,dummy-virt (DT)
[   29.524789] Call trace:
[   29.524819]  show_stack+0x20/0x38 (C)
[   29.524870]  dump_stack_lvl+0x8c/0xd0
[   29.524953]  print_report+0x118/0x608
[   29.525000]  kasan_report+0xdc/0x128
[   29.525047]  kasan_check_range+0x100/0x1a8
[   29.525546]  __kasan_check_write+0x20/0x30
[   29.525592]  kasan_atomics_helper+0x126c/0x4858
[   29.525641]  kasan_atomics+0x198/0x2e0
[   29.525687]  kunit_try_run_case+0x170/0x3f0
[   29.525735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.525789]  kthread+0x328/0x630
[   29.525832]  ret_from_fork+0x10/0x20
[   29.525881] 
[   29.525903] Allocated by task 277:
[   29.525933]  kasan_save_stack+0x3c/0x68
[   29.525975]  kasan_save_track+0x20/0x40
[   29.526014]  kasan_save_alloc_info+0x40/0x58
[   29.526053]  __kasan_kmalloc+0xd4/0xd8
[   29.526092]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.526134]  kasan_atomics+0xb8/0x2e0
[   29.526172]  kunit_try_run_case+0x170/0x3f0
[   29.526212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.526258]  kthread+0x328/0x630
[   29.526293]  ret_from_fork+0x10/0x20
[   29.526331] 
[   29.526352] The buggy address belongs to the object at fff00000c787d680
[   29.526352]  which belongs to the cache kmalloc-64 of size 64
[   29.526424] The buggy address is located 0 bytes to the right of
[   29.526424]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.526510] 
[   29.526532] The buggy address belongs to the physical page:
[   29.526566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.526625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.526671] page_type: f5(slab)
[   29.526709] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.526759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.526822] page dumped because: kasan: bad access detected
[   29.526861] 
[   29.526890] Memory state around the buggy address:
[   29.526929]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.526991]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.527040] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.527079]                                      ^
[   29.527113]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.527157]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.527207] ==================================================================
[   29.579596] ==================================================================
[   29.579638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   29.579686] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.579782] 
[   29.579987] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.580358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.580388] Hardware name: linux,dummy-virt (DT)
[   29.580428] Call trace:
[   29.580529]  show_stack+0x20/0x38 (C)
[   29.580601]  dump_stack_lvl+0x8c/0xd0
[   29.580649]  print_report+0x118/0x608
[   29.580752]  kasan_report+0xdc/0x128
[   29.580960]  kasan_check_range+0x100/0x1a8
[   29.581051]  __kasan_check_write+0x20/0x30
[   29.581304]  kasan_atomics_helper+0x1644/0x4858
[   29.581357]  kasan_atomics+0x198/0x2e0
[   29.581509]  kunit_try_run_case+0x170/0x3f0
[   29.581741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.581816]  kthread+0x328/0x630
[   29.581927]  ret_from_fork+0x10/0x20
[   29.582166] 
[   29.582259] Allocated by task 277:
[   29.582571]  kasan_save_stack+0x3c/0x68
[   29.582689]  kasan_save_track+0x20/0x40
[   29.582768]  kasan_save_alloc_info+0x40/0x58
[   29.582809]  __kasan_kmalloc+0xd4/0xd8
[   29.582849]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.583166]  kasan_atomics+0xb8/0x2e0
[   29.583265]  kunit_try_run_case+0x170/0x3f0
[   29.583429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.583509]  kthread+0x328/0x630
[   29.583946]  ret_from_fork+0x10/0x20
[   29.584179] 
[   29.584257] The buggy address belongs to the object at fff00000c787d680
[   29.584257]  which belongs to the cache kmalloc-64 of size 64
[   29.584432] The buggy address is located 0 bytes to the right of
[   29.584432]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.584499] 
[   29.584520] The buggy address belongs to the physical page:
[   29.584554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.584608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.584676] page_type: f5(slab)
[   29.584716] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.584768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.584809] page dumped because: kasan: bad access detected
[   29.585022] 
[   29.585087] Memory state around the buggy address:
[   29.585265]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.585386]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.585676] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.585879]                                      ^
[   29.586002]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.586077]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.586199] ==================================================================
[   29.481836] ==================================================================
[   29.482309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.482382] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.482445] 
[   29.482481] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.482566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.483343] Hardware name: linux,dummy-virt (DT)
[   29.483389] Call trace:
[   29.483485]  show_stack+0x20/0x38 (C)
[   29.483537]  dump_stack_lvl+0x8c/0xd0
[   29.483585]  print_report+0x118/0x608
[   29.483631]  kasan_report+0xdc/0x128
[   29.484126]  kasan_check_range+0x100/0x1a8
[   29.484196]  __kasan_check_write+0x20/0x30
[   29.484246]  kasan_atomics_helper+0x1128/0x4858
[   29.484598]  kasan_atomics+0x198/0x2e0
[   29.484648]  kunit_try_run_case+0x170/0x3f0
[   29.485073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.485588]  kthread+0x328/0x630
[   29.485644]  ret_from_fork+0x10/0x20
[   29.485833] 
[   29.485857] Allocated by task 277:
[   29.486299]  kasan_save_stack+0x3c/0x68
[   29.486381]  kasan_save_track+0x20/0x40
[   29.486560]  kasan_save_alloc_info+0x40/0x58
[   29.487026]  __kasan_kmalloc+0xd4/0xd8
[   29.487161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.487204]  kasan_atomics+0xb8/0x2e0
[   29.487242]  kunit_try_run_case+0x170/0x3f0
[   29.487282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.487328]  kthread+0x328/0x630
[   29.487848]  ret_from_fork+0x10/0x20
[   29.487930] 
[   29.487952] The buggy address belongs to the object at fff00000c787d680
[   29.487952]  which belongs to the cache kmalloc-64 of size 64
[   29.488367] The buggy address is located 0 bytes to the right of
[   29.488367]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.488586] 
[   29.488610] The buggy address belongs to the physical page:
[   29.488758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.488830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.488889] page_type: f5(slab)
[   29.489038] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.489614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.489673] page dumped because: kasan: bad access detected
[   29.489958] 
[   29.489982] Memory state around the buggy address:
[   29.490218]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.490383]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.490453] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.490675]                                      ^
[   29.490941]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.490990]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.491320] ==================================================================
[   29.564708] ==================================================================
[   29.564760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   29.564812] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.564900] 
[   29.564937] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.565035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.565063] Hardware name: linux,dummy-virt (DT)
[   29.565131] Call trace:
[   29.565156]  show_stack+0x20/0x38 (C)
[   29.565205]  dump_stack_lvl+0x8c/0xd0
[   29.565279]  print_report+0x118/0x608
[   29.565335]  kasan_report+0xdc/0x128
[   29.565383]  kasan_check_range+0x100/0x1a8
[   29.565442]  __kasan_check_write+0x20/0x30
[   29.565487]  kasan_atomics_helper+0x154c/0x4858
[   29.565536]  kasan_atomics+0x198/0x2e0
[   29.565582]  kunit_try_run_case+0x170/0x3f0
[   29.565631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.565684]  kthread+0x328/0x630
[   29.565726]  ret_from_fork+0x10/0x20
[   29.565774] 
[   29.565796] Allocated by task 277:
[   29.565824]  kasan_save_stack+0x3c/0x68
[   29.565866]  kasan_save_track+0x20/0x40
[   29.566097]  kasan_save_alloc_info+0x40/0x58
[   29.566216]  __kasan_kmalloc+0xd4/0xd8
[   29.566315]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.566412]  kasan_atomics+0xb8/0x2e0
[   29.566455]  kunit_try_run_case+0x170/0x3f0
[   29.566617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.566831]  kthread+0x328/0x630
[   29.566907]  ret_from_fork+0x10/0x20
[   29.566947] 
[   29.567032] The buggy address belongs to the object at fff00000c787d680
[   29.567032]  which belongs to the cache kmalloc-64 of size 64
[   29.567148] The buggy address is located 0 bytes to the right of
[   29.567148]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.567215] 
[   29.567339] The buggy address belongs to the physical page:
[   29.567374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.567435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.567481] page_type: f5(slab)
[   29.567549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.567713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.567941] page dumped because: kasan: bad access detected
[   29.568005] 
[   29.568130] Memory state around the buggy address:
[   29.568338]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.568487]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.568721] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.568838]                                      ^
[   29.568918]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.569065]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.569170] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   29.018346] ==================================================================
[   29.021001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   29.021261] Hardware name: linux,dummy-virt (DT)
[   29.021496]  kasan_report+0xdc/0x128
[   29.021710]  kunit_try_run_case+0x170/0x3f0
[   29.022034]  kasan_save_track+0x20/0x40
[   29.022194]  kasan_bitops_generic+0xa0/0x1c8
[   29.023218] 
[   29.023407] page_type: f5(slab)
[   29.024151] 
[   29.024760] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.024855]                       ^
[   29.024961]  fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.041626]     ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   29.044386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   29.045534] Hardware name: linux,dummy-virt (DT)
[   29.045690]  show_stack+0x20/0x38 (C)
[   29.046433]  __asan_report_load4_noabort+0x20/0x30
[   29.047089]  kunit_try_run_case+0x170/0x3f0
[   29.048571]  __kasan_kmalloc+0xd4/0xd8
[   29.049874] The buggy address is located 0 bytes to the right of
[   29.049874]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.050544] page_type: f5(slab)
[   29.051016] 
[   29.051416]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.052554]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.054513] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.054572] 
[   29.054870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.055073] Hardware name: linux,dummy-virt (DT)
[   29.055586]  print_report+0x118/0x608
[   29.056902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.057734]  kasan_save_track+0x20/0x40
[   29.059224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.060310] 
[   29.060748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.061455] 
[   29.061931] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.061976]                                      ^
[   29.062038]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.062138]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.062180] ==================================================================
[   28.989162] ==================================================================
[   28.989333] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   28.989485] Read of size 8 at addr fff00000c454c808 by task kunit_try_catch/273
[   28.989539] 
[   28.989587] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.989729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.989786] Hardware name: linux,dummy-virt (DT)
[   28.989820] Call trace:
[   28.989871]  show_stack+0x20/0x38 (C)
[   28.989931]  dump_stack_lvl+0x8c/0xd0
[   28.990005]  print_report+0x118/0x608
[   28.990120]  kasan_report+0xdc/0x128
[   28.990215]  __asan_report_load8_noabort+0x20/0x30
[   28.990318]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   28.990377]  kasan_bitops_generic+0x11c/0x1c8
[   28.990437]  kunit_try_run_case+0x170/0x3f0
[   28.990606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.990773]  kthread+0x328/0x630
[   28.990899]  ret_from_fork+0x10/0x20
[   28.990989] 
[   28.991087] Allocated by task 273:
[   28.991118]  kasan_save_stack+0x3c/0x68
[   28.991231]  kasan_save_track+0x20/0x40
[   28.991279]  kasan_save_alloc_info+0x40/0x58
[   28.991325]  __kasan_kmalloc+0xd4/0xd8
[   28.991484]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.991580]  kasan_bitops_generic+0xa0/0x1c8
[   28.991624]  kunit_try_run_case+0x170/0x3f0
[   28.991664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.991710]  kthread+0x328/0x630
[   28.991881]  ret_from_fork+0x10/0x20
[   28.992386] 
[   28.992773] The buggy address belongs to the object at fff00000c454c800
[   28.992773]  which belongs to the cache kmalloc-16 of size 16
[   28.992859] The buggy address is located 8 bytes inside of
[   28.992859]  allocated 9-byte region [fff00000c454c800, fff00000c454c809)
[   28.992925] 
[   28.992948] The buggy address belongs to the physical page:
[   28.992982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c
[   28.993257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.993439] page_type: f5(slab)
[   28.993549] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   28.993676] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.993779] page dumped because: kasan: bad access detected
[   28.993847] 
[   28.993931] Memory state around the buggy address:
[   28.994008]  fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   28.994107]  fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[   28.994168] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.994209]                       ^
[   28.994274]  fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.994640]  fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.994748] ==================================================================
[   29.005354] ==================================================================
[   29.005422] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   29.005479] Write of size 8 at addr fff00000c454c808 by task kunit_try_catch/273
[   29.005530] 
[   29.005560] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.005649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.005727] Hardware name: linux,dummy-virt (DT)
[   29.005769] Call trace:
[   29.005795]  show_stack+0x20/0x38 (C)
[   29.005845]  dump_stack_lvl+0x8c/0xd0
[   29.005894]  print_report+0x118/0x608
[   29.005941]  kasan_report+0xdc/0x128
[   29.005993]  kasan_check_range+0x100/0x1a8
[   29.006044]  __kasan_check_write+0x20/0x30
[   29.006090]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   29.006147]  kasan_bitops_generic+0x11c/0x1c8
[   29.006196]  kunit_try_run_case+0x170/0x3f0
[   29.006246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.006309]  kthread+0x328/0x630
[   29.006351]  ret_from_fork+0x10/0x20
[   29.006842] 
[   29.006876] Allocated by task 273:
[   29.006909]  kasan_save_stack+0x3c/0x68
[   29.006963]  kasan_save_track+0x20/0x40
[   29.007126]  kasan_save_alloc_info+0x40/0x58
[   29.007240]  __kasan_kmalloc+0xd4/0xd8
[   29.007330]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.007374]  kasan_bitops_generic+0xa0/0x1c8
[   29.007587]  kunit_try_run_case+0x170/0x3f0
[   29.007702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.007777]  kthread+0x328/0x630
[   29.007813]  ret_from_fork+0x10/0x20
[   29.007857] 
[   29.008047] The buggy address belongs to the object at fff00000c454c800
[   29.008047]  which belongs to the cache kmalloc-16 of size 16
[   29.008153] The buggy address is located 8 bytes inside of
[   29.008153]  allocated 9-byte region [fff00000c454c800, fff00000c454c809)
[   29.008246] 
[   29.008370] The buggy address belongs to the physical page:
[   29.008431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c
[   29.008612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.008824] page_type: f5(slab)
[   29.008925] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.009037] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.009146] page dumped because: kasan: bad access detected
[   29.009509] 
[   29.009607] Memory state around the buggy address:
[   29.009761]  fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   29.009846]  fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[   29.009951] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.010139]                       ^
[   29.010240]  fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.010353]  fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.010542] ==================================================================
[   29.000305] ==================================================================
[   29.000352] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   29.000447] Read of size 8 at addr fff00000c454c808 by task kunit_try_catch/273
[   29.000500] 
[   29.000590] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.000674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.000703] Hardware name: linux,dummy-virt (DT)
[   29.000735] Call trace:
[   29.000776]  show_stack+0x20/0x38 (C)
[   29.000827]  dump_stack_lvl+0x8c/0xd0
[   29.000970]  print_report+0x118/0x608
[   29.001022]  kasan_report+0xdc/0x128
[   29.001068]  __asan_report_load8_noabort+0x20/0x30
[   29.001118]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   29.001175]  kasan_bitops_generic+0x11c/0x1c8
[   29.001234]  kunit_try_run_case+0x170/0x3f0
[   29.001285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.001340]  kthread+0x328/0x630
[   29.001381]  ret_from_fork+0x10/0x20
[   29.001442] 
[   29.001511] Allocated by task 273:
[   29.001554]  kasan_save_stack+0x3c/0x68
[   29.001598]  kasan_save_track+0x20/0x40
[   29.001637]  kasan_save_alloc_info+0x40/0x58
[   29.001676]  __kasan_kmalloc+0xd4/0xd8
[   29.001712]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.001754]  kasan_bitops_generic+0xa0/0x1c8
[   29.001839]  kunit_try_run_case+0x170/0x3f0
[   29.001880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.001927]  kthread+0x328/0x630
[   29.002518]  ret_from_fork+0x10/0x20
[   29.002600] 
[   29.002716] The buggy address belongs to the object at fff00000c454c800
[   29.002716]  which belongs to the cache kmalloc-16 of size 16
[   29.003172] The buggy address is located 8 bytes inside of
[   29.003172]  allocated 9-byte region [fff00000c454c800, fff00000c454c809)
[   29.003413] 
[   29.003439] The buggy address belongs to the physical page:
[   29.003693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c
[   29.003758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.003869] page_type: f5(slab)
[   29.003982] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.004110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.004155] page dumped because: kasan: bad access detected
[   29.004221] 
[   29.004242] Memory state around the buggy address:
[   29.004277]  fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   29.004343]  fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[   29.004415] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.004606]                       ^
[   29.004653]  fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.004701]  fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.004820] ==================================================================
[   28.995167] ==================================================================
[   28.995414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   28.995478] Write of size 8 at addr fff00000c454c808 by task kunit_try_catch/273
[   28.995529] 
[   28.995561] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.995682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.995847] Hardware name: linux,dummy-virt (DT)
[   28.995893] Call trace:
[   28.995925]  show_stack+0x20/0x38 (C)
[   28.995977]  dump_stack_lvl+0x8c/0xd0
[   28.996024]  print_report+0x118/0x608
[   28.996336]  kasan_report+0xdc/0x128
[   28.996451]  kasan_check_range+0x100/0x1a8
[   28.996538]  __kasan_check_write+0x20/0x30
[   28.996654]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   28.996715]  kasan_bitops_generic+0x11c/0x1c8
[   28.996789]  kunit_try_run_case+0x170/0x3f0
[   28.996840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.997031]  kthread+0x328/0x630
[   28.997078]  ret_from_fork+0x10/0x20
[   28.997139] 
[   28.997160] Allocated by task 273:
[   28.997190]  kasan_save_stack+0x3c/0x68
[   28.997274]  kasan_save_track+0x20/0x40
[   28.997457]  kasan_save_alloc_info+0x40/0x58
[   28.997514]  __kasan_kmalloc+0xd4/0xd8
[   28.997557]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.997745]  kasan_bitops_generic+0xa0/0x1c8
[   28.997789]  kunit_try_run_case+0x170/0x3f0
[   28.997829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.997989]  kthread+0x328/0x630
[   28.998079]  ret_from_fork+0x10/0x20
[   28.998193] 
[   28.998300] The buggy address belongs to the object at fff00000c454c800
[   28.998300]  which belongs to the cache kmalloc-16 of size 16
[   28.998391] The buggy address is located 8 bytes inside of
[   28.998391]  allocated 9-byte region [fff00000c454c800, fff00000c454c809)
[   28.998552] 
[   28.998630] The buggy address belongs to the physical page:
[   28.998702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c
[   28.998790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.998881] page_type: f5(slab)
[   28.998936] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   28.999058] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.999144] page dumped because: kasan: bad access detected
[   28.999247] 
[   28.999315] Memory state around the buggy address:
[   28.999348]  fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   28.999515]  fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[   28.999563] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.999603]                       ^
[   28.999889]  fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.999938]  fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.999980] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   28.929148] ==================================================================
[   28.929196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   28.929353] 
[   28.929712] Hardware name: linux,dummy-virt (DT)
[   28.929912]  print_report+0x118/0x608
[   28.930315]  kasan_bitops_generic+0x110/0x1c8
[   28.930801]  kasan_save_stack+0x3c/0x68
[   28.931513]  kasan_bitops_generic+0xa0/0x1c8
[   28.931931]  ret_from_fork+0x10/0x20
[   28.932990] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   28.934768] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   28.941543] Call trace:
[   28.943514]  kthread+0x328/0x630
[   28.944375]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.945262] 
[   28.945850] page dumped because: kasan: bad access detected
[   28.946826] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   28.888803] ==================================================================
[   28.888857] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   28.889050] Read of size 1 at addr fff00000c785da90 by task kunit_try_catch/271
[   28.889375] 
[   28.889544] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.889634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.889691] Hardware name: linux,dummy-virt (DT)
[   28.889759] Call trace:
[   28.889849]  show_stack+0x20/0x38 (C)
[   28.889903]  dump_stack_lvl+0x8c/0xd0
[   28.889950]  print_report+0x118/0x608
[   28.890193]  kasan_report+0xdc/0x128
[   28.890265]  __asan_report_load1_noabort+0x20/0x30
[   28.890541]  kasan_strings+0x95c/0xb00
[   28.890655]  kunit_try_run_case+0x170/0x3f0
[   28.890710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.890794]  kthread+0x328/0x630
[   28.890857]  ret_from_fork+0x10/0x20
[   28.890953] 
[   28.890978] Allocated by task 271:
[   28.891015]  kasan_save_stack+0x3c/0x68
[   28.891069]  kasan_save_track+0x20/0x40
[   28.891145]  kasan_save_alloc_info+0x40/0x58
[   28.891198]  __kasan_kmalloc+0xd4/0xd8
[   28.891254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.891297]  kasan_strings+0xc8/0xb00
[   28.891334]  kunit_try_run_case+0x170/0x3f0
[   28.891382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.891458]  kthread+0x328/0x630
[   28.891493]  ret_from_fork+0x10/0x20
[   28.891569] 
[   28.891590] Freed by task 271:
[   28.891618]  kasan_save_stack+0x3c/0x68
[   28.891694]  kasan_save_track+0x20/0x40
[   28.891741]  kasan_save_free_info+0x4c/0x78
[   28.891781]  __kasan_slab_free+0x6c/0x98
[   28.891828]  kfree+0x214/0x3c8
[   28.891865]  kasan_strings+0x24c/0xb00
[   28.891925]  kunit_try_run_case+0x170/0x3f0
[   28.892215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.892409]  kthread+0x328/0x630
[   28.892506]  ret_from_fork+0x10/0x20
[   28.892596] 
[   28.892620] The buggy address belongs to the object at fff00000c785da80
[   28.892620]  which belongs to the cache kmalloc-32 of size 32
[   28.892691] The buggy address is located 16 bytes inside of
[   28.892691]  freed 32-byte region [fff00000c785da80, fff00000c785daa0)
[   28.892758] 
[   28.892923] The buggy address belongs to the physical page:
[   28.893151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785d
[   28.893349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.893464] page_type: f5(slab)
[   28.893527] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.893679] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.893934] page dumped because: kasan: bad access detected
[   28.893996] 
[   28.894018] Memory state around the buggy address:
[   28.894054]  fff00000c785d980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.894291]  fff00000c785da00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   28.894503] >fff00000c785da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.894597]                          ^
[   28.894688]  fff00000c785db00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.894733]  fff00000c785db80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.896561] Read of size 1 at addr fff00000c785da90 by task kunit_try_catch/271
[   28.897512]  kthread+0x328/0x630
[   28.897888]  __kasan_kmalloc+0xd4/0xd8
[   28.898410]  kthread+0x328/0x630
[   28.898752]  kasan_save_free_info+0x4c/0x78
[   28.899133]  kthread+0x328/0x630
[   28.899516] The buggy address is located 16 bytes inside of
[   28.899516]  freed 32-byte region [fff00000c785da80, fff00000c785daa0)
[   28.899973] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.901477] 
[   28.901752]  show_stack+0x20/0x38 (C)
[   28.901820]  dump_stack_lvl+0x8c/0xd0
[   28.901867]  print_report+0x118/0x608
[   28.902272]  kunit_try_run_case+0x170/0x3f0
[   28.902849]  kasan_save_track+0x20/0x40
[   28.903156]  kasan_strings+0xc8/0xb00
[   28.903661] 
[   28.903803]  kasan_save_free_info+0x4c/0x78
[   28.904055]  kthread+0x328/0x630
[   28.904209] The buggy address is located 16 bytes inside of
[   28.904209]  freed 32-byte region [fff00000c785da80, fff00000c785daa0)
[   28.905814] >fff00000c785da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.912071] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   28.912220] Write of size 8 at addr fff00000c454c808 by task kunit_try_catch/273
[   28.912651]  show_stack+0x20/0x38 (C)
[   28.913278]  kasan_check_range+0x100/0x1a8
[   28.913831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.914199]  kasan_save_stack+0x3c/0x68
[   28.915034]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.915256]  ret_from_fork+0x10/0x20
[   28.915674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.916709] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   28.882155] ==================================================================
[   28.882207] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   28.882263] Read of size 1 at addr fff00000c785da90 by task kunit_try_catch/271
[   28.882314] 
[   28.882351] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.882460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.882490] Hardware name: linux,dummy-virt (DT)
[   28.882524] Call trace:
[   28.882905]  show_stack+0x20/0x38 (C)
[   28.883008]  dump_stack_lvl+0x8c/0xd0
[   28.883103]  print_report+0x118/0x608
[   28.883156]  kasan_report+0xdc/0x128
[   28.883223]  __asan_report_load1_noabort+0x20/0x30
[   28.883307]  strcmp+0xc0/0xc8
[   28.883350]  kasan_strings+0x340/0xb00
[   28.883415]  kunit_try_run_case+0x170/0x3f0
[   28.883465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.883519]  kthread+0x328/0x630
[   28.883562]  ret_from_fork+0x10/0x20
[   28.883791] 
[   28.883846] Allocated by task 271:
[   28.883912]  kasan_save_stack+0x3c/0x68
[   28.883960]  kasan_save_track+0x20/0x40
[   28.884033]  kasan_save_alloc_info+0x40/0x58
[   28.884252]  __kasan_kmalloc+0xd4/0xd8
[   28.884341]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.884383]  kasan_strings+0xc8/0xb00
[   28.884471]  kunit_try_run_case+0x170/0x3f0
[   28.884558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.884604]  kthread+0x328/0x630
[   28.884664]  ret_from_fork+0x10/0x20
[   28.884759] 
[   28.884782] Freed by task 271:
[   28.884811]  kasan_save_stack+0x3c/0x68
[   28.884859]  kasan_save_track+0x20/0x40
[   28.884899]  kasan_save_free_info+0x4c/0x78
[   28.884956]  __kasan_slab_free+0x6c/0x98
[   28.884996]  kfree+0x214/0x3c8
[   28.885030]  kasan_strings+0x24c/0xb00
[   28.885068]  kunit_try_run_case+0x170/0x3f0
[   28.885268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.885325]  kthread+0x328/0x630
[   28.885359]  ret_from_fork+0x10/0x20
[   28.885408] 
[   28.885866] The buggy address belongs to the object at fff00000c785da80
[   28.885866]  which belongs to the cache kmalloc-32 of size 32
[   28.885934] The buggy address is located 16 bytes inside of
[   28.885934]  freed 32-byte region [fff00000c785da80, fff00000c785daa0)
[   28.886020] 
[   28.886079] The buggy address belongs to the physical page:
[   28.886183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785d
[   28.886252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.886493] page_type: f5(slab)
[   28.886676] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.886776] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.886849] page dumped because: kasan: bad access detected
[   28.886929] 
[   28.887002] Memory state around the buggy address:
[   28.887094]  fff00000c785d980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.887158]  fff00000c785da00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   28.887242] >fff00000c785da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.887333]                          ^
[   28.887368]  fff00000c785db00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.887423]  fff00000c785db80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.887465] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   28.867271] ==================================================================
[   28.867334] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   28.867682] Read of size 1 at addr fff00000c785d8d8 by task kunit_try_catch/269
[   28.867759] 
[   28.867802] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.867908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.868050] Hardware name: linux,dummy-virt (DT)
[   28.868097] Call trace:
[   28.868133]  show_stack+0x20/0x38 (C)
[   28.868209]  dump_stack_lvl+0x8c/0xd0
[   28.868259]  print_report+0x118/0x608
[   28.868308]  kasan_report+0xdc/0x128
[   28.868357]  __asan_report_load1_noabort+0x20/0x30
[   28.868419]  memcmp+0x198/0x1d8
[   28.868463]  kasan_memcmp+0x16c/0x300
[   28.868512]  kunit_try_run_case+0x170/0x3f0
[   28.868562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.868616]  kthread+0x328/0x630
[   28.868819]  ret_from_fork+0x10/0x20
[   28.869032] 
[   28.869054] Allocated by task 269:
[   28.869112]  kasan_save_stack+0x3c/0x68
[   28.869265]  kasan_save_track+0x20/0x40
[   28.869332]  kasan_save_alloc_info+0x40/0x58
[   28.869512]  __kasan_kmalloc+0xd4/0xd8
[   28.869590]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.870067]  kasan_memcmp+0xbc/0x300
[   28.870183]  kunit_try_run_case+0x170/0x3f0
[   28.870263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.870440]  kthread+0x328/0x630
[   28.870517]  ret_from_fork+0x10/0x20
[   28.870555] 
[   28.870597] The buggy address belongs to the object at fff00000c785d8c0
[   28.870597]  which belongs to the cache kmalloc-32 of size 32
[   28.870688] The buggy address is located 0 bytes to the right of
[   28.870688]  allocated 24-byte region [fff00000c785d8c0, fff00000c785d8d8)
[   28.870754] 
[   28.870790] The buggy address belongs to the physical page:
[   28.870834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785d
[   28.870905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.870966] page_type: f5(slab)
[   28.871020] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.871091] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.871135] page dumped because: kasan: bad access detected
[   28.871166] 
[   28.871197] Memory state around the buggy address:
[   28.871250]  fff00000c785d780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.871301]  fff00000c785d800: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   28.871353] >fff00000c785d880: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.871392]                                                     ^
[   28.871448]  fff00000c785d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.871501]  fff00000c785d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.871552] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   28.852607] ==================================================================
[   28.852821] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   28.852888] Read of size 1 at addr ffff800080ab7b4a by task kunit_try_catch/265
[   28.852940] 
[   28.853022] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.853112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.853176] Hardware name: linux,dummy-virt (DT)
[   28.853411] Call trace:
[   28.853600]  show_stack+0x20/0x38 (C)
[   28.853685]  dump_stack_lvl+0x8c/0xd0
[   28.853737]  print_report+0x310/0x608
[   28.853817]  kasan_report+0xdc/0x128
[   28.853872]  __asan_report_load1_noabort+0x20/0x30
[   28.853921]  kasan_alloca_oob_right+0x2dc/0x340
[   28.853980]  kunit_try_run_case+0x170/0x3f0
[   28.854030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.854084]  kthread+0x328/0x630
[   28.854127]  ret_from_fork+0x10/0x20
[   28.854180] 
[   28.854205] The buggy address belongs to stack of task kunit_try_catch/265
[   28.854260] 
[   28.854289] The buggy address belongs to the virtual mapping at
[   28.854289]  [ffff800080ab0000, ffff800080ab9000) created by:
[   28.854289]  kernel_clone+0x150/0x7a8
[   28.854368] 
[   28.854392] The buggy address belongs to the physical page:
[   28.854445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785e
[   28.854498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.854581] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.854632] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.854674] page dumped because: kasan: bad access detected
[   28.854708] 
[   28.854728] Memory state around the buggy address:
[   28.855032]  ffff800080ab7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.855095]  ffff800080ab7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.855150] >ffff800080ab7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   28.855249]                                               ^
[   28.855292]  ffff800080ab7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   28.855535]  ffff800080ab7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.855584] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   28.841118] ==================================================================
[   28.841215] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   28.841284] Read of size 1 at addr ffff800080ab7b5f by task kunit_try_catch/263
[   28.841494] 
[   28.841576] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.841693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.841751] Hardware name: linux,dummy-virt (DT)
[   28.841807] Call trace:
[   28.841832]  show_stack+0x20/0x38 (C)
[   28.841906]  dump_stack_lvl+0x8c/0xd0
[   28.841961]  print_report+0x310/0x608
[   28.842011]  kasan_report+0xdc/0x128
[   28.842057]  __asan_report_load1_noabort+0x20/0x30
[   28.842278]  kasan_alloca_oob_left+0x2b8/0x310
[   28.842336]  kunit_try_run_case+0x170/0x3f0
[   28.842389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.842480]  kthread+0x328/0x630
[   28.842585]  ret_from_fork+0x10/0x20
[   28.842638] 
[   28.842667] The buggy address belongs to stack of task kunit_try_catch/263
[   28.842795] 
[   28.842826] The buggy address belongs to the virtual mapping at
[   28.842826]  [ffff800080ab0000, ffff800080ab9000) created by:
[   28.842826]  kernel_clone+0x150/0x7a8
[   28.842914] 
[   28.843119] The buggy address belongs to the physical page:
[   28.843250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785e
[   28.843329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.843409] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.843500] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.843544] page dumped because: kasan: bad access detected
[   28.843579] 
[   28.843599] Memory state around the buggy address:
[   28.843634]  ffff800080ab7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.843680]  ffff800080ab7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.843761] >ffff800080ab7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   28.843804]                                                     ^
[   28.843972]  ffff800080ab7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   28.844071]  ffff800080ab7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.844178] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   28.830155] ==================================================================
[   28.830259] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   28.830364] Read of size 1 at addr ffff800080a07c2a by task kunit_try_catch/261
[   28.830466] 
[   28.830508] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.830625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.830662] Hardware name: linux,dummy-virt (DT)
[   28.830720] Call trace:
[   28.830747]  show_stack+0x20/0x38 (C)
[   28.830799]  dump_stack_lvl+0x8c/0xd0
[   28.830881]  print_report+0x310/0x608
[   28.830943]  kasan_report+0xdc/0x128
[   28.831016]  __asan_report_load1_noabort+0x20/0x30
[   28.831067]  kasan_stack_oob+0x238/0x270
[   28.831274]  kunit_try_run_case+0x170/0x3f0
[   28.831499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.831573]  kthread+0x328/0x630
[   28.831620]  ret_from_fork+0x10/0x20
[   28.831672] 
[   28.831741] The buggy address belongs to stack of task kunit_try_catch/261
[   28.831929]  and is located at offset 138 in frame:
[   28.832089]  kasan_stack_oob+0x0/0x270
[   28.832358] 
[   28.832426] This frame has 4 objects:
[   28.832772]  [48, 49) '__assertion'
[   28.832819]  [64, 72) 'array'
[   28.832851]  [96, 112) '__assertion'
[   28.832894]  [128, 138) 'stack_array'
[   28.832940] 
[   28.833279] The buggy address belongs to the virtual mapping at
[   28.833279]  [ffff800080a00000, ffff800080a09000) created by:
[   28.833279]  kernel_clone+0x150/0x7a8
[   28.833450] 
[   28.833476] The buggy address belongs to the physical page:
[   28.833510] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e7
[   28.833573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.833807] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.834083] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.834236] page dumped because: kasan: bad access detected
[   28.834304] 
[   28.834326] Memory state around the buggy address:
[   28.834427]  ffff800080a07b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.834491]  ffff800080a07b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   28.834630] >ffff800080a07c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   28.834672]                                   ^
[   28.834707]  ffff800080a07c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   28.834918]  ffff800080a07d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.834960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   28.814688] ==================================================================
[   28.814745] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   28.814955] Read of size 1 at addr ffff9ec8b38c668d by task kunit_try_catch/257
[   28.815006] 
[   28.815042] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.815123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.815280] Hardware name: linux,dummy-virt (DT)
[   28.815322] Call trace:
[   28.815408]  show_stack+0x20/0x38 (C)
[   28.815487]  dump_stack_lvl+0x8c/0xd0
[   28.815537]  print_report+0x310/0x608
[   28.815831]  kasan_report+0xdc/0x128
[   28.815928]  __asan_report_load1_noabort+0x20/0x30
[   28.816077]  kasan_global_oob_right+0x230/0x270
[   28.816158]  kunit_try_run_case+0x170/0x3f0
[   28.816210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.816265]  kthread+0x328/0x630
[   28.816308]  ret_from_fork+0x10/0x20
[   28.816369] 
[   28.816840] The buggy address belongs to the variable:
[   28.816880]  global_array+0xd/0x40
[   28.816938] 
[   28.817013] The buggy address belongs to the virtual mapping at
[   28.817013]  [ffff9ec8b1a60000, ffff9ec8b3981000) created by:
[   28.817013]  paging_init+0x66c/0x7d0
[   28.817262] 
[   28.817637] The buggy address belongs to the physical page:
[   28.817724] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47cc6
[   28.817839] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   28.817938] raw: 03fffe0000002000 ffffc1ffc01f3188 ffffc1ffc01f3188 0000000000000000
[   28.818122] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.818382] page dumped because: kasan: bad access detected
[   28.818496] 
[   28.818574] Memory state around the buggy address:
[   28.818676]  ffff9ec8b38c6580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.818742]  ffff9ec8b38c6600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   28.818889] >ffff9ec8b38c6680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   28.818969]                       ^
[   28.819035]  ffff9ec8b38c6700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   28.819129]  ffff9ec8b38c6780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.819197] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   28.809079] ==================================================================
[   28.809132] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.809188] Free of addr fff00000c79f4001 by task kunit_try_catch/255
[   28.809367] 
[   28.809548] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.809690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.809767] Hardware name: linux,dummy-virt (DT)
[   28.809799] Call trace:
[   28.809829]  show_stack+0x20/0x38 (C)
[   28.809879]  dump_stack_lvl+0x8c/0xd0
[   28.809926]  print_report+0x118/0x608
[   28.809970]  kasan_report_invalid_free+0xc0/0xe8
[   28.810028]  __kasan_mempool_poison_object+0xfc/0x150
[   28.810080]  mempool_free+0x28c/0x328
[   28.810122]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.810173]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   28.810243]  kunit_try_run_case+0x170/0x3f0
[   28.810290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.810342]  kthread+0x328/0x630
[   28.810387]  ret_from_fork+0x10/0x20
[   28.810443] 
[   28.810462] The buggy address belongs to the physical page:
[   28.810493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f4
[   28.810544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.810590] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.810641] page_type: f8(unknown)
[   28.810679] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.810726] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.810774] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.810820] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.810868] head: 0bfffe0000000002 ffffc1ffc31e7d01 00000000ffffffff 00000000ffffffff
[   28.810914] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.810954] page dumped because: kasan: bad access detected
[   28.810983] 
[   28.811008] Memory state around the buggy address:
[   28.811039]  fff00000c79f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.811082]  fff00000c79f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.811131] >fff00000c79f4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.811175]                    ^
[   28.811202]  fff00000c79f4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.811246]  fff00000c79f4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.811292] ==================================================================
[   28.794087] ==================================================================
[   28.794146] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.794203] Free of addr fff00000c786a801 by task kunit_try_catch/253
[   28.794245] 
[   28.794717] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.795277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.795447] Hardware name: linux,dummy-virt (DT)
[   28.795606] Call trace:
[   28.795628]  show_stack+0x20/0x38 (C)
[   28.795682]  dump_stack_lvl+0x8c/0xd0
[   28.796074]  print_report+0x118/0x608
[   28.796706]  kasan_report_invalid_free+0xc0/0xe8
[   28.797173]  check_slab_allocation+0xfc/0x108
[   28.797623]  __kasan_mempool_poison_object+0x78/0x150
[   28.797687]  mempool_free+0x28c/0x328
[   28.797736]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.797792]  mempool_kmalloc_invalid_free+0xc0/0x118
[   28.797844]  kunit_try_run_case+0x170/0x3f0
[   28.797891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.797945]  kthread+0x328/0x630
[   28.799670]  ret_from_fork+0x10/0x20
[   28.799734] 
[   28.799753] Allocated by task 253:
[   28.799791]  kasan_save_stack+0x3c/0x68
[   28.799833]  kasan_save_track+0x20/0x40
[   28.799878]  kasan_save_alloc_info+0x40/0x58
[   28.799914]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.800836]  remove_element+0x130/0x1f8
[   28.800888]  mempool_alloc_preallocated+0x58/0xc0
[   28.800929]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   28.800974]  mempool_kmalloc_invalid_free+0xc0/0x118
[   28.801014]  kunit_try_run_case+0x170/0x3f0
[   28.801053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.801096]  kthread+0x328/0x630
[   28.801127]  ret_from_fork+0x10/0x20
[   28.801161] 
[   28.801183] The buggy address belongs to the object at fff00000c786a800
[   28.801183]  which belongs to the cache kmalloc-128 of size 128
[   28.803412] The buggy address is located 1 bytes inside of
[   28.803412]  128-byte region [fff00000c786a800, fff00000c786a880)
[   28.803482] 
[   28.803501] The buggy address belongs to the physical page:
[   28.803533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   28.803584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.803633] page_type: f5(slab)
[   28.803670] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.803719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.803759] page dumped because: kasan: bad access detected
[   28.803788] 
[   28.803807] Memory state around the buggy address:
[   28.803836]  fff00000c786a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.803889]  fff00000c786a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.803932] >fff00000c786a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.803968]                    ^
[   28.803996]  fff00000c786a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.804038]  fff00000c786a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.804076] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   28.753371] ==================================================================
[   28.753458] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.753528] Free of addr fff00000c79f0000 by task kunit_try_catch/249
[   28.753610] 
[   28.753647] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.753733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.753758] Hardware name: linux,dummy-virt (DT)
[   28.753791] Call trace:
[   28.753813]  show_stack+0x20/0x38 (C)
[   28.753864]  dump_stack_lvl+0x8c/0xd0
[   28.753910]  print_report+0x118/0x608
[   28.753957]  kasan_report_invalid_free+0xc0/0xe8
[   28.754009]  __kasan_mempool_poison_object+0x14c/0x150
[   28.755332]  mempool_free+0x28c/0x328
[   28.755545]  mempool_double_free_helper+0x150/0x2e8
[   28.755708]  mempool_kmalloc_large_double_free+0xc0/0x118
[   28.756213]  kunit_try_run_case+0x170/0x3f0
[   28.756293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.756660]  kthread+0x328/0x630
[   28.756713]  ret_from_fork+0x10/0x20
[   28.757318] 
[   28.757346] The buggy address belongs to the physical page:
[   28.757492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0
[   28.757876] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.758160] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.758249] page_type: f8(unknown)
[   28.758591] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.758930] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.759185] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.759261] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.759620] head: 0bfffe0000000002 ffffc1ffc31e7c01 00000000ffffffff 00000000ffffffff
[   28.759909] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.759954] page dumped because: kasan: bad access detected
[   28.759986] 
[   28.760529] Memory state around the buggy address:
[   28.760576]  fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.760875]  fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.761087] >fff00000c79f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.761170]                    ^
[   28.761326]  fff00000c79f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.761423]  fff00000c79f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.761463] ==================================================================
[   28.776641] ==================================================================
[   28.778139] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.778444] Free of addr fff00000c79f4000 by task kunit_try_catch/251
[   28.778488] 
[   28.778526] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.778610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.778637] Hardware name: linux,dummy-virt (DT)
[   28.778987] Call trace:
[   28.779013]  show_stack+0x20/0x38 (C)
[   28.779088]  dump_stack_lvl+0x8c/0xd0
[   28.779356]  print_report+0x118/0x608
[   28.779417]  kasan_report_invalid_free+0xc0/0xe8
[   28.779465]  __kasan_mempool_poison_pages+0xe0/0xe8
[   28.779518]  mempool_free+0x24c/0x328
[   28.779564]  mempool_double_free_helper+0x150/0x2e8
[   28.779615]  mempool_page_alloc_double_free+0xbc/0x118
[   28.780279]  kunit_try_run_case+0x170/0x3f0
[   28.780484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.780596]  kthread+0x328/0x630
[   28.780828]  ret_from_fork+0x10/0x20
[   28.781010] 
[   28.781036] The buggy address belongs to the physical page:
[   28.781067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f4
[   28.781365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.781443] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.781493] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.781534] page dumped because: kasan: bad access detected
[   28.781564] 
[   28.781585] Memory state around the buggy address:
[   28.782109]  fff00000c79f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.782190]  fff00000c79f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.782234] >fff00000c79f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.782389]                    ^
[   28.782488]  fff00000c79f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.782642]  fff00000c79f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.782853] ==================================================================
[   28.722931] ==================================================================
[   28.722996] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.723053] Free of addr fff00000c786a400 by task kunit_try_catch/247
[   28.723094] 
[   28.723126] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.723460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.723552] Hardware name: linux,dummy-virt (DT)
[   28.723583] Call trace:
[   28.723606]  show_stack+0x20/0x38 (C)
[   28.723910]  dump_stack_lvl+0x8c/0xd0
[   28.724134]  print_report+0x118/0x608
[   28.724241]  kasan_report_invalid_free+0xc0/0xe8
[   28.724295]  check_slab_allocation+0xd4/0x108
[   28.724343]  __kasan_mempool_poison_object+0x78/0x150
[   28.724407]  mempool_free+0x28c/0x328
[   28.724798]  mempool_double_free_helper+0x150/0x2e8
[   28.724915]  mempool_kmalloc_double_free+0xc0/0x118
[   28.725386]  kunit_try_run_case+0x170/0x3f0
[   28.725597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.726095]  kthread+0x328/0x630
[   28.726720]  ret_from_fork+0x10/0x20
[   28.727044] 
[   28.727123] Allocated by task 247:
[   28.727425]  kasan_save_stack+0x3c/0x68
[   28.727472]  kasan_save_track+0x20/0x40
[   28.727937]  kasan_save_alloc_info+0x40/0x58
[   28.727986]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.728352]  remove_element+0x130/0x1f8
[   28.728428]  mempool_alloc_preallocated+0x58/0xc0
[   28.728467]  mempool_double_free_helper+0x94/0x2e8
[   28.728659]  mempool_kmalloc_double_free+0xc0/0x118
[   28.728886]  kunit_try_run_case+0x170/0x3f0
[   28.728923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.728967]  kthread+0x328/0x630
[   28.728998]  ret_from_fork+0x10/0x20
[   28.729034] 
[   28.729053] Freed by task 247:
[   28.729079]  kasan_save_stack+0x3c/0x68
[   28.729121]  kasan_save_track+0x20/0x40
[   28.729951]  kasan_save_free_info+0x4c/0x78
[   28.730000]  __kasan_mempool_poison_object+0xc0/0x150
[   28.730041]  mempool_free+0x28c/0x328
[   28.730746]  mempool_double_free_helper+0x100/0x2e8
[   28.730908]  mempool_kmalloc_double_free+0xc0/0x118
[   28.731046]  kunit_try_run_case+0x170/0x3f0
[   28.731082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.731127]  kthread+0x328/0x630
[   28.731511]  ret_from_fork+0x10/0x20
[   28.731548] 
[   28.732052] The buggy address belongs to the object at fff00000c786a400
[   28.732052]  which belongs to the cache kmalloc-128 of size 128
[   28.732129] The buggy address is located 0 bytes inside of
[   28.732129]  128-byte region [fff00000c786a400, fff00000c786a480)
[   28.732638] 
[   28.732664] The buggy address belongs to the physical page:
[   28.732699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   28.732991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.733047] page_type: f5(slab)
[   28.733088] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.733452] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.733690] page dumped because: kasan: bad access detected
[   28.733869] 
[   28.733923] Memory state around the buggy address:
[   28.734130]  fff00000c786a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.734283]  fff00000c786a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.734468] >fff00000c786a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.734782]                    ^
[   28.734835]  fff00000c786a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.735187]  fff00000c786a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.735230] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   28.707995] ==================================================================
[   28.708223] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   28.708489] Read of size 1 at addr fff00000c79f0000 by task kunit_try_catch/245
[   28.708540] 
[   28.708677] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.708764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.708792] Hardware name: linux,dummy-virt (DT)
[   28.708825] Call trace:
[   28.708851]  show_stack+0x20/0x38 (C)
[   28.708902]  dump_stack_lvl+0x8c/0xd0
[   28.708990]  print_report+0x118/0x608
[   28.709120]  kasan_report+0xdc/0x128
[   28.709170]  __asan_report_load1_noabort+0x20/0x30
[   28.709217]  mempool_uaf_helper+0x314/0x340
[   28.709265]  mempool_page_alloc_uaf+0xc0/0x118
[   28.709634]  kunit_try_run_case+0x170/0x3f0
[   28.709872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.709983]  kthread+0x328/0x630
[   28.710045]  ret_from_fork+0x10/0x20
[   28.710093] 
[   28.710117] The buggy address belongs to the physical page:
[   28.710151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0
[   28.710215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.710340] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.710726] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.710966] page dumped because: kasan: bad access detected
[   28.710999] 
[   28.711019] Memory state around the buggy address:
[   28.711201]  fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.711248]  fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.711290] >fff00000c79f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.711327]                    ^
[   28.711354]  fff00000c79f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.711406]  fff00000c79f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.711444] ==================================================================
[   28.667507] ==================================================================
[   28.667569] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   28.667708] Read of size 1 at addr fff00000c79f0000 by task kunit_try_catch/241
[   28.667898] 
[   28.668062] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.668332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.668359] Hardware name: linux,dummy-virt (DT)
[   28.668418] Call trace:
[   28.668441]  show_stack+0x20/0x38 (C)
[   28.668490]  dump_stack_lvl+0x8c/0xd0
[   28.668537]  print_report+0x118/0x608
[   28.668583]  kasan_report+0xdc/0x128
[   28.668627]  __asan_report_load1_noabort+0x20/0x30
[   28.668674]  mempool_uaf_helper+0x314/0x340
[   28.668720]  mempool_kmalloc_large_uaf+0xc4/0x120
[   28.668768]  kunit_try_run_case+0x170/0x3f0
[   28.668817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.668923]  kthread+0x328/0x630
[   28.669155]  ret_from_fork+0x10/0x20
[   28.669388] 
[   28.669423] The buggy address belongs to the physical page:
[   28.669494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0
[   28.669621] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.669754] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.669847] page_type: f8(unknown)
[   28.669886] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.669940] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.670068] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.670266] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.670429] head: 0bfffe0000000002 ffffc1ffc31e7c01 00000000ffffffff 00000000ffffffff
[   28.670476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.670517] page dumped because: kasan: bad access detected
[   28.670549] 
[   28.670566] Memory state around the buggy address:
[   28.670600]  fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.670642]  fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.670684] >fff00000c79f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.670721]                    ^
[   28.670750]  fff00000c79f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.670791]  fff00000c79f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.670829] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   28.678545] ==================================================================
[   28.678616] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   28.678671] Read of size 1 at addr fff00000c7868240 by task kunit_try_catch/243
[   28.678720] 
[   28.678751] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.678835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.678860] Hardware name: linux,dummy-virt (DT)
[   28.678891] Call trace:
[   28.678911]  show_stack+0x20/0x38 (C)
[   28.678959]  dump_stack_lvl+0x8c/0xd0
[   28.679005]  print_report+0x118/0x608
[   28.679050]  kasan_report+0xdc/0x128
[   28.679096]  __asan_report_load1_noabort+0x20/0x30
[   28.679144]  mempool_uaf_helper+0x314/0x340
[   28.679189]  mempool_slab_uaf+0xc0/0x118
[   28.679232]  kunit_try_run_case+0x170/0x3f0
[   28.679279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.679331]  kthread+0x328/0x630
[   28.679370]  ret_from_fork+0x10/0x20
[   28.679500] 
[   28.679617] Allocated by task 243:
[   28.679663]  kasan_save_stack+0x3c/0x68
[   28.679705]  kasan_save_track+0x20/0x40
[   28.679761]  kasan_save_alloc_info+0x40/0x58
[   28.679798]  __kasan_mempool_unpoison_object+0xbc/0x180
[   28.679842]  remove_element+0x16c/0x1f8
[   28.679908]  mempool_alloc_preallocated+0x58/0xc0
[   28.680017]  mempool_uaf_helper+0xa4/0x340
[   28.680055]  mempool_slab_uaf+0xc0/0x118
[   28.680092]  kunit_try_run_case+0x170/0x3f0
[   28.680167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.680211]  kthread+0x328/0x630
[   28.680243]  ret_from_fork+0x10/0x20
[   28.680279] 
[   28.680299] Freed by task 243:
[   28.680349]  kasan_save_stack+0x3c/0x68
[   28.680388]  kasan_save_track+0x20/0x40
[   28.680576]  kasan_save_free_info+0x4c/0x78
[   28.680751]  __kasan_mempool_poison_object+0xc0/0x150
[   28.680794]  mempool_free+0x28c/0x328
[   28.680827]  mempool_uaf_helper+0x104/0x340
[   28.680863]  mempool_slab_uaf+0xc0/0x118
[   28.680901]  kunit_try_run_case+0x170/0x3f0
[   28.680985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.681167]  kthread+0x328/0x630
[   28.681200]  ret_from_fork+0x10/0x20
[   28.681356] 
[   28.682052] The buggy address belongs to the object at fff00000c7868240
[   28.682052]  which belongs to the cache test_cache of size 123
[   28.682390] The buggy address is located 0 bytes inside of
[   28.682390]  freed 123-byte region [fff00000c7868240, fff00000c78682bb)
[   28.682518] 
[   28.682580] The buggy address belongs to the physical page:
[   28.682613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868
[   28.682713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.682759] page_type: f5(slab)
[   28.682911] raw: 0bfffe0000000000 fff00000c790a3c0 dead000000000122 0000000000000000
[   28.683072] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   28.683116] page dumped because: kasan: bad access detected
[   28.683149] 
[   28.683166] Memory state around the buggy address:
[   28.683198]  fff00000c7868100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.683356]  fff00000c7868180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.683577] >fff00000c7868200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   28.683648]                                            ^
[   28.683724]  fff00000c7868280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.683768]  fff00000c7868300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.683942] ==================================================================
[   28.657220] ==================================================================
[   28.657342] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   28.657422] Read of size 1 at addr fff00000c786a000 by task kunit_try_catch/239
[   28.657499] 
[   28.657538] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.657637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.657719] Hardware name: linux,dummy-virt (DT)
[   28.657853] Call trace:
[   28.657887]  show_stack+0x20/0x38 (C)
[   28.658025]  dump_stack_lvl+0x8c/0xd0
[   28.658171]  print_report+0x118/0x608
[   28.658217]  kasan_report+0xdc/0x128
[   28.658262]  __asan_report_load1_noabort+0x20/0x30
[   28.658313]  mempool_uaf_helper+0x314/0x340
[   28.658359]  mempool_kmalloc_uaf+0xc4/0x120
[   28.658414]  kunit_try_run_case+0x170/0x3f0
[   28.658464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.658517]  kthread+0x328/0x630
[   28.658559]  ret_from_fork+0x10/0x20
[   28.658670] 
[   28.658689] Allocated by task 239:
[   28.658717]  kasan_save_stack+0x3c/0x68
[   28.658763]  kasan_save_track+0x20/0x40
[   28.658927]  kasan_save_alloc_info+0x40/0x58
[   28.658963]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.659110]  remove_element+0x130/0x1f8
[   28.659155]  mempool_alloc_preallocated+0x58/0xc0
[   28.659320]  mempool_uaf_helper+0xa4/0x340
[   28.659356]  mempool_kmalloc_uaf+0xc4/0x120
[   28.659403]  kunit_try_run_case+0x170/0x3f0
[   28.659440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.659484]  kthread+0x328/0x630
[   28.659539]  ret_from_fork+0x10/0x20
[   28.659592] 
[   28.659612] Freed by task 239:
[   28.659638]  kasan_save_stack+0x3c/0x68
[   28.659675]  kasan_save_track+0x20/0x40
[   28.659713]  kasan_save_free_info+0x4c/0x78
[   28.659747]  __kasan_mempool_poison_object+0xc0/0x150
[   28.659790]  mempool_free+0x28c/0x328
[   28.659853]  mempool_uaf_helper+0x104/0x340
[   28.660050]  mempool_kmalloc_uaf+0xc4/0x120
[   28.660089]  kunit_try_run_case+0x170/0x3f0
[   28.660125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.660192]  kthread+0x328/0x630
[   28.660223]  ret_from_fork+0x10/0x20
[   28.660259] 
[   28.660302] The buggy address belongs to the object at fff00000c786a000
[   28.660302]  which belongs to the cache kmalloc-128 of size 128
[   28.660364] The buggy address is located 0 bytes inside of
[   28.660364]  freed 128-byte region [fff00000c786a000, fff00000c786a080)
[   28.660434] 
[   28.660456] The buggy address belongs to the physical page:
[   28.660490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   28.660621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.660807] page_type: f5(slab)
[   28.660996] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.661073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.661113] page dumped because: kasan: bad access detected
[   28.661144] 
[   28.661162] Memory state around the buggy address:
[   28.661203]  fff00000c7869f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.661303]  fff00000c7869f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.661500] >fff00000c786a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.661540]                    ^
[   28.661568]  fff00000c786a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.661612]  fff00000c786a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.661650] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   28.610964] ==================================================================
[   28.611081] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   28.611141] Read of size 1 at addr fff00000c79ee001 by task kunit_try_catch/235
[   28.611703] 
[   28.611797] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.612108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.612154] Hardware name: linux,dummy-virt (DT)
[   28.612227] Call trace:
[   28.612335]  show_stack+0x20/0x38 (C)
[   28.612526]  dump_stack_lvl+0x8c/0xd0
[   28.612681]  print_report+0x118/0x608
[   28.612862]  kasan_report+0xdc/0x128
[   28.612951]  __asan_report_load1_noabort+0x20/0x30
[   28.613184]  mempool_oob_right_helper+0x2ac/0x2f0
[   28.613239]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   28.613321]  kunit_try_run_case+0x170/0x3f0
[   28.614238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.614323]  kthread+0x328/0x630
[   28.614504]  ret_from_fork+0x10/0x20
[   28.614779] 
[   28.614905] The buggy address belongs to the physical page:
[   28.614941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ec
[   28.615035] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.615081] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.615487] page_type: f8(unknown)
[   28.615530] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.615752] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.615916] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.616018] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.616068] head: 0bfffe0000000002 ffffc1ffc31e7b01 00000000ffffffff 00000000ffffffff
[   28.616179] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.616243] page dumped because: kasan: bad access detected
[   28.616275] 
[   28.616294] Memory state around the buggy address:
[   28.616329]  fff00000c79edf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.616671]  fff00000c79edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.616822] >fff00000c79ee000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.616868]                    ^
[   28.616898]  fff00000c79ee080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.616940]  fff00000c79ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.616978] ==================================================================
[   28.627370] ==================================================================
[   28.627457] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   28.627743] Read of size 1 at addr fff00000c786a2bb by task kunit_try_catch/237
[   28.627920] 
[   28.627954] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.628326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.628488] Hardware name: linux,dummy-virt (DT)
[   28.628585] Call trace:
[   28.628610]  show_stack+0x20/0x38 (C)
[   28.628662]  dump_stack_lvl+0x8c/0xd0
[   28.628709]  print_report+0x118/0x608
[   28.628766]  kasan_report+0xdc/0x128
[   28.628927]  __asan_report_load1_noabort+0x20/0x30
[   28.628989]  mempool_oob_right_helper+0x2ac/0x2f0
[   28.629038]  mempool_slab_oob_right+0xc0/0x118
[   28.629107]  kunit_try_run_case+0x170/0x3f0
[   28.629314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.629431]  kthread+0x328/0x630
[   28.629607]  ret_from_fork+0x10/0x20
[   28.629662] 
[   28.629680] Allocated by task 237:
[   28.629870]  kasan_save_stack+0x3c/0x68
[   28.629917]  kasan_save_track+0x20/0x40
[   28.629954]  kasan_save_alloc_info+0x40/0x58
[   28.629994]  __kasan_mempool_unpoison_object+0xbc/0x180
[   28.630258]  remove_element+0x16c/0x1f8
[   28.630325]  mempool_alloc_preallocated+0x58/0xc0
[   28.630383]  mempool_oob_right_helper+0x98/0x2f0
[   28.630462]  mempool_slab_oob_right+0xc0/0x118
[   28.630500]  kunit_try_run_case+0x170/0x3f0
[   28.630538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.630582]  kthread+0x328/0x630
[   28.630679]  ret_from_fork+0x10/0x20
[   28.630716] 
[   28.630771] The buggy address belongs to the object at fff00000c786a240
[   28.630771]  which belongs to the cache test_cache of size 123
[   28.630916] The buggy address is located 0 bytes to the right of
[   28.630916]  allocated 123-byte region [fff00000c786a240, fff00000c786a2bb)
[   28.630980] 
[   28.631000] The buggy address belongs to the physical page:
[   28.631077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   28.631143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.631374] page_type: f5(slab)
[   28.631510] raw: 0bfffe0000000000 fff00000c790a280 dead000000000122 0000000000000000
[   28.631594] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   28.631633] page dumped because: kasan: bad access detected
[   28.631664] 
[   28.631682] Memory state around the buggy address:
[   28.631741]  fff00000c786a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.631791]  fff00000c786a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   28.631933] >fff00000c786a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   28.631971]                                         ^
[   28.632006]  fff00000c786a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.632607]  fff00000c786a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.632655] ==================================================================
[   28.601929] ==================================================================
[   28.602010] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   28.602086] Read of size 1 at addr fff00000c5906c73 by task kunit_try_catch/233
[   28.602134] 
[   28.602178] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.602265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.602301] Hardware name: linux,dummy-virt (DT)
[   28.602333] Call trace:
[   28.602357]  show_stack+0x20/0x38 (C)
[   28.602423]  dump_stack_lvl+0x8c/0xd0
[   28.602473]  print_report+0x118/0x608
[   28.602524]  kasan_report+0xdc/0x128
[   28.602570]  __asan_report_load1_noabort+0x20/0x30
[   28.602617]  mempool_oob_right_helper+0x2ac/0x2f0
[   28.602668]  mempool_kmalloc_oob_right+0xc4/0x120
[   28.602718]  kunit_try_run_case+0x170/0x3f0
[   28.602767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.602819]  kthread+0x328/0x630
[   28.602863]  ret_from_fork+0x10/0x20
[   28.602913] 
[   28.602932] Allocated by task 233:
[   28.602962]  kasan_save_stack+0x3c/0x68
[   28.603001]  kasan_save_track+0x20/0x40
[   28.603040]  kasan_save_alloc_info+0x40/0x58
[   28.603075]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.603119]  remove_element+0x130/0x1f8
[   28.603155]  mempool_alloc_preallocated+0x58/0xc0
[   28.603195]  mempool_oob_right_helper+0x98/0x2f0
[   28.603235]  mempool_kmalloc_oob_right+0xc4/0x120
[   28.603275]  kunit_try_run_case+0x170/0x3f0
[   28.603311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.603355]  kthread+0x328/0x630
[   28.603386]  ret_from_fork+0x10/0x20
[   28.603433] 
[   28.603453] The buggy address belongs to the object at fff00000c5906c00
[   28.603453]  which belongs to the cache kmalloc-128 of size 128
[   28.603512] The buggy address is located 0 bytes to the right of
[   28.603512]  allocated 115-byte region [fff00000c5906c00, fff00000c5906c73)
[   28.603575] 
[   28.603597] The buggy address belongs to the physical page:
[   28.603633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   28.603689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.603742] page_type: f5(slab)
[   28.603783] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.603833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.603899] page dumped because: kasan: bad access detected
[   28.603932] 
[   28.603950] Memory state around the buggy address:
[   28.603985]  fff00000c5906b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.604028]  fff00000c5906b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.604070] >fff00000c5906c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.604109]                                                              ^
[   28.604149]  fff00000c5906c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.604191]  fff00000c5906d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.604229] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   28.046805] ==================================================================
[   28.046891] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   28.046965] Read of size 1 at addr fff00000c3ef9dc0 by task kunit_try_catch/227
[   28.047017] 
[   28.047060] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.047147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.047174] Hardware name: linux,dummy-virt (DT)
[   28.047206] Call trace:
[   28.047233]  show_stack+0x20/0x38 (C)
[   28.047285]  dump_stack_lvl+0x8c/0xd0
[   28.047337]  print_report+0x118/0x608
[   28.047407]  kasan_report+0xdc/0x128
[   28.047455]  __kasan_check_byte+0x54/0x70
[   28.047502]  kmem_cache_destroy+0x34/0x218
[   28.047549]  kmem_cache_double_destroy+0x174/0x300
[   28.047599]  kunit_try_run_case+0x170/0x3f0
[   28.047648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.047700]  kthread+0x328/0x630
[   28.047742]  ret_from_fork+0x10/0x20
[   28.047791] 
[   28.047810] Allocated by task 227:
[   28.047839]  kasan_save_stack+0x3c/0x68
[   28.047911]  kasan_save_track+0x20/0x40
[   28.047950]  kasan_save_alloc_info+0x40/0x58
[   28.047988]  __kasan_slab_alloc+0xa8/0xb0
[   28.048026]  kmem_cache_alloc_noprof+0x10c/0x398
[   28.048067]  __kmem_cache_create_args+0x178/0x280
[   28.048107]  kmem_cache_double_destroy+0xc0/0x300
[   28.048147]  kunit_try_run_case+0x170/0x3f0
[   28.048184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.048228]  kthread+0x328/0x630
[   28.048259]  ret_from_fork+0x10/0x20
[   28.048298] 
[   28.048316] Freed by task 227:
[   28.048344]  kasan_save_stack+0x3c/0x68
[   28.048383]  kasan_save_track+0x20/0x40
[   28.048431]  kasan_save_free_info+0x4c/0x78
[   28.048466]  __kasan_slab_free+0x6c/0x98
[   28.048504]  kmem_cache_free+0x260/0x468
[   28.048540]  slab_kmem_cache_release+0x38/0x50
[   28.048580]  kmem_cache_release+0x1c/0x30
[   28.048615]  kobject_put+0x17c/0x420
[   28.048653]  sysfs_slab_release+0x1c/0x30
[   28.048690]  kmem_cache_destroy+0x118/0x218
[   28.048730]  kmem_cache_double_destroy+0x128/0x300
[   28.048768]  kunit_try_run_case+0x170/0x3f0
[   28.048804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.048848]  kthread+0x328/0x630
[   28.048881]  ret_from_fork+0x10/0x20
[   28.048917] 
[   28.048936] The buggy address belongs to the object at fff00000c3ef9dc0
[   28.048936]  which belongs to the cache kmem_cache of size 208
[   28.048995] The buggy address is located 0 bytes inside of
[   28.048995]  freed 208-byte region [fff00000c3ef9dc0, fff00000c3ef9e90)
[   28.049055] 
[   28.049078] The buggy address belongs to the physical page:
[   28.049114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef9
[   28.049168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.049222] page_type: f5(slab)
[   28.049264] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122
[   28.049314] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   28.049355] page dumped because: kasan: bad access detected
[   28.049386] 
[   28.049415] Memory state around the buggy address:
[   28.049448]  fff00000c3ef9c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.049491]  fff00000c3ef9d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   28.049534] >fff00000c3ef9d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   28.049573]                                            ^
[   28.049606]  fff00000c3ef9e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.049647]  fff00000c3ef9e80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.049683] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   27.968410] ==================================================================
[   27.968505] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   27.968585] Read of size 1 at addr fff00000c78ed000 by task kunit_try_catch/225
[   27.968637] 
[   27.968678] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   27.968763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.968790] Hardware name: linux,dummy-virt (DT)
[   27.968824] Call trace:
[   27.968848]  show_stack+0x20/0x38 (C)
[   27.968902]  dump_stack_lvl+0x8c/0xd0
[   27.968959]  print_report+0x118/0x608
[   27.969006]  kasan_report+0xdc/0x128
[   27.969052]  __asan_report_load1_noabort+0x20/0x30
[   27.969100]  kmem_cache_rcu_uaf+0x388/0x468
[   27.969146]  kunit_try_run_case+0x170/0x3f0
[   27.969197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.969251]  kthread+0x328/0x630
[   27.969294]  ret_from_fork+0x10/0x20
[   27.969345] 
[   27.969363] Allocated by task 225:
[   27.969392]  kasan_save_stack+0x3c/0x68
[   27.969444]  kasan_save_track+0x20/0x40
[   27.969482]  kasan_save_alloc_info+0x40/0x58
[   27.969518]  __kasan_slab_alloc+0xa8/0xb0
[   27.969556]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.969598]  kmem_cache_rcu_uaf+0x12c/0x468
[   27.969636]  kunit_try_run_case+0x170/0x3f0
[   27.969672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.969716]  kthread+0x328/0x630
[   27.969746]  ret_from_fork+0x10/0x20
[   27.969784] 
[   27.969802] Freed by task 0:
[   27.969829]  kasan_save_stack+0x3c/0x68
[   27.969865]  kasan_save_track+0x20/0x40
[   27.969902]  kasan_save_free_info+0x4c/0x78
[   27.969936]  __kasan_slab_free+0x6c/0x98
[   27.969974]  slab_free_after_rcu_debug+0xd4/0x2f8
[   27.970013]  rcu_core+0x9f4/0x1e20
[   27.970051]  rcu_core_si+0x18/0x30
[   27.970096]  handle_softirqs+0x374/0xb28
[   27.970132]  __do_softirq+0x1c/0x28
[   27.970166] 
[   27.970185] Last potentially related work creation:
[   27.970211]  kasan_save_stack+0x3c/0x68
[   27.970248]  kasan_record_aux_stack+0xb4/0xc8
[   27.970285]  kmem_cache_free+0x120/0x468
[   27.970322]  kmem_cache_rcu_uaf+0x16c/0x468
[   27.970358]  kunit_try_run_case+0x170/0x3f0
[   27.970405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.970447]  kthread+0x328/0x630
[   27.970482]  ret_from_fork+0x10/0x20
[   27.970516] 
[   27.970535] The buggy address belongs to the object at fff00000c78ed000
[   27.970535]  which belongs to the cache test_cache of size 200
[   27.970591] The buggy address is located 0 bytes inside of
[   27.970591]  freed 200-byte region [fff00000c78ed000, fff00000c78ed0c8)
[   27.970653] 
[   27.970676] The buggy address belongs to the physical page:
[   27.970710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ed
[   27.970765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.970818] page_type: f5(slab)
[   27.970859] raw: 0bfffe0000000000 fff00000c790a140 dead000000000122 0000000000000000
[   27.970909] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   27.970951] page dumped because: kasan: bad access detected
[   27.970984] 
[   27.971003] Memory state around the buggy address:
[   27.971036]  fff00000c78ecf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.971080]  fff00000c78ecf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.971123] >fff00000c78ed000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.971161]                    ^
[   27.971188]  fff00000c78ed080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   27.971230]  fff00000c78ed100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.971269] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   27.572991] ==================================================================
[   27.573063] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   27.573134] Free of addr fff00000c78ef001 by task kunit_try_catch/223
[   27.573176] 
[   27.573216] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   27.573302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.573330] Hardware name: linux,dummy-virt (DT)
[   27.573363] Call trace:
[   27.573386]  show_stack+0x20/0x38 (C)
[   27.573451]  dump_stack_lvl+0x8c/0xd0
[   27.573513]  print_report+0x118/0x608
[   27.573562]  kasan_report_invalid_free+0xc0/0xe8
[   27.573612]  check_slab_allocation+0xfc/0x108
[   27.573672]  __kasan_slab_pre_free+0x2c/0x48
[   27.573722]  kmem_cache_free+0xf0/0x468
[   27.573780]  kmem_cache_invalid_free+0x184/0x3c8
[   27.573829]  kunit_try_run_case+0x170/0x3f0
[   27.573882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.573937]  kthread+0x328/0x630
[   27.573981]  ret_from_fork+0x10/0x20
[   27.574031] 
[   27.574049] Allocated by task 223:
[   27.574084]  kasan_save_stack+0x3c/0x68
[   27.574133]  kasan_save_track+0x20/0x40
[   27.574172]  kasan_save_alloc_info+0x40/0x58
[   27.574218]  __kasan_slab_alloc+0xa8/0xb0
[   27.574265]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.574305]  kmem_cache_invalid_free+0x12c/0x3c8
[   27.574347]  kunit_try_run_case+0x170/0x3f0
[   27.574385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.575167]  kthread+0x328/0x630
[   27.575222]  ret_from_fork+0x10/0x20
[   27.575456] 
[   27.575489] The buggy address belongs to the object at fff00000c78ef000
[   27.575489]  which belongs to the cache test_cache of size 200
[   27.575559] The buggy address is located 1 bytes inside of
[   27.575559]  200-byte region [fff00000c78ef000, fff00000c78ef0c8)
[   27.575618] 
[   27.575927] The buggy address belongs to the physical page:
[   27.576020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ef
[   27.576195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.576344] page_type: f5(slab)
[   27.576595] raw: 0bfffe0000000000 fff00000c790a000 dead000000000122 0000000000000000
[   27.576698] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   27.576742] page dumped because: kasan: bad access detected
[   27.576972] 
[   27.577098] Memory state around the buggy address:
[   27.577154]  fff00000c78eef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.577244]  fff00000c78eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.577382] >fff00000c78ef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.577468]                    ^
[   27.577628]  fff00000c78ef080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   27.577739]  fff00000c78ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.577853] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   27.538025] ==================================================================
[   27.538102] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   27.538178] Free of addr fff00000c790b000 by task kunit_try_catch/221
[   27.538221] 
[   27.538264] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   27.538352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.538379] Hardware name: linux,dummy-virt (DT)
[   27.538424] Call trace:
[   27.538449]  show_stack+0x20/0x38 (C)
[   27.538503]  dump_stack_lvl+0x8c/0xd0
[   27.538554]  print_report+0x118/0x608
[   27.538601]  kasan_report_invalid_free+0xc0/0xe8
[   27.538694]  check_slab_allocation+0xd4/0x108
[   27.538747]  __kasan_slab_pre_free+0x2c/0x48
[   27.538794]  kmem_cache_free+0xf0/0x468
[   27.538843]  kmem_cache_double_free+0x190/0x3c8
[   27.538889]  kunit_try_run_case+0x170/0x3f0
[   27.538940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.538993]  kthread+0x328/0x630
[   27.539045]  ret_from_fork+0x10/0x20
[   27.539094] 
[   27.539113] Allocated by task 221:
[   27.539154]  kasan_save_stack+0x3c/0x68
[   27.539195]  kasan_save_track+0x20/0x40
[   27.539233]  kasan_save_alloc_info+0x40/0x58
[   27.539284]  __kasan_slab_alloc+0xa8/0xb0
[   27.539338]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.539378]  kmem_cache_double_free+0x12c/0x3c8
[   27.540338]  kunit_try_run_case+0x170/0x3f0
[   27.540383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.541274]  kthread+0x328/0x630
[   27.541336]  ret_from_fork+0x10/0x20
[   27.541420] 
[   27.541469] Freed by task 221:
[   27.541576]  kasan_save_stack+0x3c/0x68
[   27.541662]  kasan_save_track+0x20/0x40
[   27.542064]  kasan_save_free_info+0x4c/0x78
[   27.542134]  __kasan_slab_free+0x6c/0x98
[   27.542227]  kmem_cache_free+0x260/0x468
[   27.542264]  kmem_cache_double_free+0x140/0x3c8
[   27.542334]  kunit_try_run_case+0x170/0x3f0
[   27.542418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.542500]  kthread+0x328/0x630
[   27.542802]  ret_from_fork+0x10/0x20
[   27.542851] 
[   27.542872] The buggy address belongs to the object at fff00000c790b000
[   27.542872]  which belongs to the cache test_cache of size 200
[   27.543309] The buggy address is located 0 bytes inside of
[   27.543309]  200-byte region [fff00000c790b000, fff00000c790b0c8)
[   27.543438] 
[   27.543514] The buggy address belongs to the physical page:
[   27.543581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790b
[   27.543689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.544075] page_type: f5(slab)
[   27.544135] raw: 0bfffe0000000000 fff00000c1b99dc0 dead000000000122 0000000000000000
[   27.544186] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   27.544227] page dumped because: kasan: bad access detected
[   27.544259] 
[   27.544277] Memory state around the buggy address:
[   27.544312]  fff00000c790af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.544670]  fff00000c790af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.544769] >fff00000c790b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.544850]                    ^
[   27.544878]  fff00000c790b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   27.545125]  fff00000c790b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.545274] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   27.254693] ==================================================================
[   27.254922] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   27.254995] Read of size 1 at addr fff00000c78160c8 by task kunit_try_catch/219
[   27.255045] 
[   27.255149] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   27.255385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.255421] Hardware name: linux,dummy-virt (DT)
[   27.255454] Call trace:
[   27.255477]  show_stack+0x20/0x38 (C)
[   27.255599]  dump_stack_lvl+0x8c/0xd0
[   27.255705]  print_report+0x118/0x608
[   27.255754]  kasan_report+0xdc/0x128
[   27.255829]  __asan_report_load1_noabort+0x20/0x30
[   27.255908]  kmem_cache_oob+0x344/0x430
[   27.255958]  kunit_try_run_case+0x170/0x3f0
[   27.256060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.256126]  kthread+0x328/0x630
[   27.256170]  ret_from_fork+0x10/0x20
[   27.256234] 
[   27.256252] Allocated by task 219:
[   27.256283]  kasan_save_stack+0x3c/0x68
[   27.256325]  kasan_save_track+0x20/0x40
[   27.256364]  kasan_save_alloc_info+0x40/0x58
[   27.256483]  __kasan_slab_alloc+0xa8/0xb0
[   27.256555]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.256633]  kmem_cache_oob+0x12c/0x430
[   27.256717]  kunit_try_run_case+0x170/0x3f0
[   27.256900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.256943]  kthread+0x328/0x630
[   27.256975]  ret_from_fork+0x10/0x20
[   27.257010] 
[   27.257029] The buggy address belongs to the object at fff00000c7816000
[   27.257029]  which belongs to the cache test_cache of size 200
[   27.257142] The buggy address is located 0 bytes to the right of
[   27.257142]  allocated 200-byte region [fff00000c7816000, fff00000c78160c8)
[   27.257493] 
[   27.257619] The buggy address belongs to the physical page:
[   27.257705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107816
[   27.257789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.257858] page_type: f5(slab)
[   27.257899] raw: 0bfffe0000000000 fff00000c3ef9c80 dead000000000122 0000000000000000
[   27.258217] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   27.258540] page dumped because: kasan: bad access detected
[   27.258576] 
[   27.258655] Memory state around the buggy address:
[   27.258700]  fff00000c7815f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.258763]  fff00000c7816000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.258807] >fff00000c7816080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   27.258848]                                               ^
[   27.258885]  fff00000c7816100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.259290]  fff00000c7816180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.259403] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   27.220860] ==================================================================
[   27.220940] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   27.221008] Read of size 8 at addr fff00000c7894ec0 by task kunit_try_catch/212
[   27.221059] 
[   27.221097] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   27.221185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.221212] Hardware name: linux,dummy-virt (DT)
[   27.221245] Call trace:
[   27.221268]  show_stack+0x20/0x38 (C)
[   27.221320]  dump_stack_lvl+0x8c/0xd0
[   27.221369]  print_report+0x118/0x608
[   27.221431]  kasan_report+0xdc/0x128
[   27.221491]  __asan_report_load8_noabort+0x20/0x30
[   27.221539]  workqueue_uaf+0x480/0x4a8
[   27.221582]  kunit_try_run_case+0x170/0x3f0
[   27.221631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.222059]  kthread+0x328/0x630
[   27.222578]  ret_from_fork+0x10/0x20
[   27.222985] 
[   27.223232] Allocated by task 212:
[   27.223328]  kasan_save_stack+0x3c/0x68
[   27.223402]  kasan_save_track+0x20/0x40
[   27.223440]  kasan_save_alloc_info+0x40/0x58
[   27.223702]  __kasan_kmalloc+0xd4/0xd8
[   27.223805]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.224252]  workqueue_uaf+0x13c/0x4a8
[   27.224311]  kunit_try_run_case+0x170/0x3f0
[   27.224348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.224392]  kthread+0x328/0x630
[   27.224436]  ret_from_fork+0x10/0x20
[   27.224474] 
[   27.224495] Freed by task 48:
[   27.224520]  kasan_save_stack+0x3c/0x68
[   27.224557]  kasan_save_track+0x20/0x40
[   27.224595]  kasan_save_free_info+0x4c/0x78
[   27.224630]  __kasan_slab_free+0x6c/0x98
[   27.224707]  kfree+0x214/0x3c8
[   27.224741]  workqueue_uaf_work+0x18/0x30
[   27.224778]  process_one_work+0x530/0xf98
[   27.225090]  worker_thread+0x618/0xf38
[   27.225132]  kthread+0x328/0x630
[   27.225166]  ret_from_fork+0x10/0x20
[   27.225203] 
[   27.225225] Last potentially related work creation:
[   27.225253]  kasan_save_stack+0x3c/0x68
[   27.225290]  kasan_record_aux_stack+0xb4/0xc8
[   27.225369]  __queue_work+0x65c/0xfe0
[   27.225829]  queue_work_on+0xbc/0xf8
[   27.225871]  workqueue_uaf+0x210/0x4a8
[   27.225934]  kunit_try_run_case+0x170/0x3f0
[   27.225971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.226015]  kthread+0x328/0x630
[   27.226047]  ret_from_fork+0x10/0x20
[   27.226086] 
[   27.226106] The buggy address belongs to the object at fff00000c7894ec0
[   27.226106]  which belongs to the cache kmalloc-32 of size 32
[   27.226670] The buggy address is located 0 bytes inside of
[   27.226670]  freed 32-byte region [fff00000c7894ec0, fff00000c7894ee0)
[   27.226769] 
[   27.226844] The buggy address belongs to the physical page:
[   27.226906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894
[   27.226960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.227011] page_type: f5(slab)
[   27.227060] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.227240] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   27.227341] page dumped because: kasan: bad access detected
[   27.227374] 
[   27.227392] Memory state around the buggy address:
[   27.227436]  fff00000c7894d80: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   27.227478]  fff00000c7894e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   27.227725] >fff00000c7894e80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   27.227769]                                            ^
[   27.227805]  fff00000c7894f00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.227847]  fff00000c7894f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.228104] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   27.198597] ==================================================================
[   27.198746] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   27.198818] Read of size 4 at addr fff00000c7894c80 by task swapper/1/0
[   27.198865] 
[   27.198906] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   27.198992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.199018] Hardware name: linux,dummy-virt (DT)
[   27.199052] Call trace:
[   27.199074]  show_stack+0x20/0x38 (C)
[   27.199124]  dump_stack_lvl+0x8c/0xd0
[   27.199172]  print_report+0x118/0x608
[   27.199218]  kasan_report+0xdc/0x128
[   27.199261]  __asan_report_load4_noabort+0x20/0x30
[   27.199308]  rcu_uaf_reclaim+0x64/0x70
[   27.199351]  rcu_core+0x9f4/0x1e20
[   27.199405]  rcu_core_si+0x18/0x30
[   27.199449]  handle_softirqs+0x374/0xb28
[   27.199495]  __do_softirq+0x1c/0x28
[   27.199537]  ____do_softirq+0x18/0x30
[   27.199579]  call_on_irq_stack+0x24/0x30
[   27.199624]  do_softirq_own_stack+0x24/0x38
[   27.199668]  __irq_exit_rcu+0x1fc/0x318
[   27.199711]  irq_exit_rcu+0x1c/0x80
[   27.199754]  el1_interrupt+0x38/0x58
[   27.199800]  el1h_64_irq_handler+0x18/0x28
[   27.199883]  el1h_64_irq+0x6c/0x70
[   27.200570]  arch_local_irq_enable+0x4/0x8 (P)
[   27.200664]  do_idle+0x384/0x4e8
[   27.200913]  cpu_startup_entry+0x68/0x80
[   27.201097]  secondary_start_kernel+0x288/0x340
[   27.201208]  __secondary_switched+0xc0/0xc8
[   27.201473] 
[   27.201689] Allocated by task 210:
[   27.201771]  kasan_save_stack+0x3c/0x68
[   27.201911]  kasan_save_track+0x20/0x40
[   27.201994]  kasan_save_alloc_info+0x40/0x58
[   27.202091]  __kasan_kmalloc+0xd4/0xd8
[   27.202184]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.202467]  rcu_uaf+0xb0/0x2d8
[   27.202652]  kunit_try_run_case+0x170/0x3f0
[   27.202744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.202790]  kthread+0x328/0x630
[   27.203019]  ret_from_fork+0x10/0x20
[   27.203163] 
[   27.203239] Freed by task 0:
[   27.203276]  kasan_save_stack+0x3c/0x68
[   27.203327]  kasan_save_track+0x20/0x40
[   27.203363]  kasan_save_free_info+0x4c/0x78
[   27.203412]  __kasan_slab_free+0x6c/0x98
[   27.203460]  kfree+0x214/0x3c8
[   27.203509]  rcu_uaf_reclaim+0x28/0x70
[   27.203546]  rcu_core+0x9f4/0x1e20
[   27.203589]  rcu_core_si+0x18/0x30
[   27.203632]  handle_softirqs+0x374/0xb28
[   27.203673]  __do_softirq+0x1c/0x28
[   27.203713] 
[   27.203745] Last potentially related work creation:
[   27.203796]  kasan_save_stack+0x3c/0x68
[   27.203837]  kasan_record_aux_stack+0xb4/0xc8
[   27.203902]  __call_rcu_common.constprop.0+0x74/0x8c8
[   27.203945]  call_rcu+0x18/0x30
[   27.203977]  rcu_uaf+0x14c/0x2d8
[   27.204012]  kunit_try_run_case+0x170/0x3f0
[   27.204185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.204239]  kthread+0x328/0x630
[   27.204270]  ret_from_fork+0x10/0x20
[   27.204315] 
[   27.204345] The buggy address belongs to the object at fff00000c7894c80
[   27.204345]  which belongs to the cache kmalloc-32 of size 32
[   27.204416] The buggy address is located 0 bytes inside of
[   27.204416]  freed 32-byte region [fff00000c7894c80, fff00000c7894ca0)
[   27.204478] 
[   27.204848] The buggy address belongs to the physical page:
[   27.204932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894
[   27.205042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.205095] page_type: f5(slab)
[   27.205160] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.205503] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   27.205580] page dumped because: kasan: bad access detected
[   27.205823] 
[   27.206013] Memory state around the buggy address:
[   27.206052]  fff00000c7894b80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   27.206405]  fff00000c7894c00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   27.206656] >fff00000c7894c80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   27.206720]                    ^
[   27.206750]  fff00000c7894d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.206979]  fff00000c7894d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.207217] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   26.945044] ==================================================================
[   26.945139] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   26.945206] Read of size 1 at addr fff00000c7895300 by task kunit_try_catch/208
[   26.945316] 
[   26.945358] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.945453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.945480] Hardware name: linux,dummy-virt (DT)
[   26.945512] Call trace:
[   26.945535]  show_stack+0x20/0x38 (C)
[   26.945593]  dump_stack_lvl+0x8c/0xd0
[   26.945643]  print_report+0x118/0x608
[   26.945690]  kasan_report+0xdc/0x128
[   26.945743]  __asan_report_load1_noabort+0x20/0x30
[   26.945791]  ksize_uaf+0x598/0x5f8
[   26.945831]  kunit_try_run_case+0x170/0x3f0
[   26.945878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.945930]  kthread+0x328/0x630
[   26.945972]  ret_from_fork+0x10/0x20
[   26.946018] 
[   26.946037] Allocated by task 208:
[   26.946064]  kasan_save_stack+0x3c/0x68
[   26.946108]  kasan_save_track+0x20/0x40
[   26.946146]  kasan_save_alloc_info+0x40/0x58
[   26.946183]  __kasan_kmalloc+0xd4/0xd8
[   26.946220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.946260]  ksize_uaf+0xb8/0x5f8
[   26.946294]  kunit_try_run_case+0x170/0x3f0
[   26.946332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.946376]  kthread+0x328/0x630
[   26.946708]  ret_from_fork+0x10/0x20
[   26.946763] 
[   26.947037] Freed by task 208:
[   26.947072]  kasan_save_stack+0x3c/0x68
[   26.947137]  kasan_save_track+0x20/0x40
[   26.947297]  kasan_save_free_info+0x4c/0x78
[   26.947443]  __kasan_slab_free+0x6c/0x98
[   26.947496]  kfree+0x214/0x3c8
[   26.947531]  ksize_uaf+0x11c/0x5f8
[   26.947567]  kunit_try_run_case+0x170/0x3f0
[   26.947742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.947820]  kthread+0x328/0x630
[   26.947855]  ret_from_fork+0x10/0x20
[   26.948035] 
[   26.948057] The buggy address belongs to the object at fff00000c7895300
[   26.948057]  which belongs to the cache kmalloc-128 of size 128
[   26.948117] The buggy address is located 0 bytes inside of
[   26.948117]  freed 128-byte region [fff00000c7895300, fff00000c7895380)
[   26.948543] 
[   26.948639] The buggy address belongs to the physical page:
[   26.948708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   26.948827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.948994] page_type: f5(slab)
[   26.949304] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.949486] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.949663] page dumped because: kasan: bad access detected
[   26.949772] 
[   26.949936] Memory state around the buggy address:
[   26.949987]  fff00000c7895200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.950418]  fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.950530] >fff00000c7895300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.950649]                    ^
[   26.950795]  fff00000c7895380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.951014]  fff00000c7895400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.951307] ==================================================================
[   26.952751] ==================================================================
[   26.953063] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   26.953230] Read of size 1 at addr fff00000c7895378 by task kunit_try_catch/208
[   26.953415] 
[   26.953633] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.953846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.954024] Hardware name: linux,dummy-virt (DT)
[   26.954609] Call trace:
[   26.954723]  show_stack+0x20/0x38 (C)
[   26.954985]  dump_stack_lvl+0x8c/0xd0
[   26.955066]  print_report+0x118/0x608
[   26.955433]  kasan_report+0xdc/0x128
[   26.956017]  __asan_report_load1_noabort+0x20/0x30
[   26.956098]  ksize_uaf+0x544/0x5f8
[   26.956233]  kunit_try_run_case+0x170/0x3f0
[   26.956383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.956519]  kthread+0x328/0x630
[   26.956571]  ret_from_fork+0x10/0x20
[   26.956625] 
[   26.956856] Allocated by task 208:
[   26.957187]  kasan_save_stack+0x3c/0x68
[   26.957411]  kasan_save_track+0x20/0x40
[   26.957619]  kasan_save_alloc_info+0x40/0x58
[   26.957764]  __kasan_kmalloc+0xd4/0xd8
[   26.957886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.958002]  ksize_uaf+0xb8/0x5f8
[   26.958095]  kunit_try_run_case+0x170/0x3f0
[   26.958200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.958412]  kthread+0x328/0x630
[   26.958519]  ret_from_fork+0x10/0x20
[   26.958666] 
[   26.958714] Freed by task 208:
[   26.958778]  kasan_save_stack+0x3c/0x68
[   26.958846]  kasan_save_track+0x20/0x40
[   26.958883]  kasan_save_free_info+0x4c/0x78
[   26.958920]  __kasan_slab_free+0x6c/0x98
[   26.958963]  kfree+0x214/0x3c8
[   26.959016]  ksize_uaf+0x11c/0x5f8
[   26.959060]  kunit_try_run_case+0x170/0x3f0
[   26.959104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.959149]  kthread+0x328/0x630
[   26.959182]  ret_from_fork+0x10/0x20
[   26.959217] 
[   26.959237] The buggy address belongs to the object at fff00000c7895300
[   26.959237]  which belongs to the cache kmalloc-128 of size 128
[   26.959294] The buggy address is located 120 bytes inside of
[   26.959294]  freed 128-byte region [fff00000c7895300, fff00000c7895380)
[   26.959361] 
[   26.959382] The buggy address belongs to the physical page:
[   26.959853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   26.959915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.959962] page_type: f5(slab)
[   26.959998] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.960721] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.960929] page dumped because: kasan: bad access detected
[   26.960981] 
[   26.961124] Memory state around the buggy address:
[   26.961288]  fff00000c7895200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.961557]  fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.961608] >fff00000c7895300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.961771]                                                                 ^
[   26.961863]  fff00000c7895380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.962044]  fff00000c7895400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.962138] ==================================================================
[   26.931716] ==================================================================
[   26.931961] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   26.932197] Read of size 1 at addr fff00000c7895300 by task kunit_try_catch/208
[   26.932670] 
[   26.932774] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.933128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.933367] Hardware name: linux,dummy-virt (DT)
[   26.933449] Call trace:
[   26.933621]  show_stack+0x20/0x38 (C)
[   26.933869]  dump_stack_lvl+0x8c/0xd0
[   26.933955]  print_report+0x118/0x608
[   26.934012]  kasan_report+0xdc/0x128
[   26.934071]  __kasan_check_byte+0x54/0x70
[   26.934120]  ksize+0x30/0x88
[   26.934164]  ksize_uaf+0x168/0x5f8
[   26.934218]  kunit_try_run_case+0x170/0x3f0
[   26.934268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.934321]  kthread+0x328/0x630
[   26.934373]  ret_from_fork+0x10/0x20
[   26.934448] 
[   26.934469] Allocated by task 208:
[   26.934513]  kasan_save_stack+0x3c/0x68
[   26.935152]  kasan_save_track+0x20/0x40
[   26.935229]  kasan_save_alloc_info+0x40/0x58
[   26.935443]  __kasan_kmalloc+0xd4/0xd8
[   26.935599]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.935829]  ksize_uaf+0xb8/0x5f8
[   26.936157]  kunit_try_run_case+0x170/0x3f0
[   26.936381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.936770]  kthread+0x328/0x630
[   26.936871]  ret_from_fork+0x10/0x20
[   26.936976] 
[   26.937066] Freed by task 208:
[   26.937097]  kasan_save_stack+0x3c/0x68
[   26.937391]  kasan_save_track+0x20/0x40
[   26.937688]  kasan_save_free_info+0x4c/0x78
[   26.937843]  __kasan_slab_free+0x6c/0x98
[   26.938006]  kfree+0x214/0x3c8
[   26.938103]  ksize_uaf+0x11c/0x5f8
[   26.938311]  kunit_try_run_case+0x170/0x3f0
[   26.938553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.938790]  kthread+0x328/0x630
[   26.938959]  ret_from_fork+0x10/0x20
[   26.939058] 
[   26.939079] The buggy address belongs to the object at fff00000c7895300
[   26.939079]  which belongs to the cache kmalloc-128 of size 128
[   26.939326] The buggy address is located 0 bytes inside of
[   26.939326]  freed 128-byte region [fff00000c7895300, fff00000c7895380)
[   26.939642] 
[   26.939730] The buggy address belongs to the physical page:
[   26.939899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   26.939955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.940013] page_type: f5(slab)
[   26.940053] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.940418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.940495] page dumped because: kasan: bad access detected
[   26.940673] 
[   26.940919] Memory state around the buggy address:
[   26.941107]  fff00000c7895200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.941292]  fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.941366] >fff00000c7895300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.941623]                    ^
[   26.941823]  fff00000c7895380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.941983]  fff00000c7895400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.942089] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   26.911648] ==================================================================
[   26.911708] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   26.911761] Read of size 1 at addr fff00000c789527f by task kunit_try_catch/206
[   26.911836] 
[   26.911869] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.912064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.912153] Hardware name: linux,dummy-virt (DT)
[   26.912335] Call trace:
[   26.912358]  show_stack+0x20/0x38 (C)
[   26.912422]  dump_stack_lvl+0x8c/0xd0
[   26.912631]  print_report+0x118/0x608
[   26.912907]  kasan_report+0xdc/0x128
[   26.913012]  __asan_report_load1_noabort+0x20/0x30
[   26.913092]  ksize_unpoisons_memory+0x690/0x740
[   26.913255]  kunit_try_run_case+0x170/0x3f0
[   26.913640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.913767]  kthread+0x328/0x630
[   26.913873]  ret_from_fork+0x10/0x20
[   26.914046] 
[   26.914180] Allocated by task 206:
[   26.914353]  kasan_save_stack+0x3c/0x68
[   26.914640]  kasan_save_track+0x20/0x40
[   26.914715]  kasan_save_alloc_info+0x40/0x58
[   26.914925]  __kasan_kmalloc+0xd4/0xd8
[   26.915052]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.915199]  ksize_unpoisons_memory+0xc0/0x740
[   26.915306]  kunit_try_run_case+0x170/0x3f0
[   26.915359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.915786]  kthread+0x328/0x630
[   26.915915]  ret_from_fork+0x10/0x20
[   26.916044] 
[   26.916125] The buggy address belongs to the object at fff00000c7895200
[   26.916125]  which belongs to the cache kmalloc-128 of size 128
[   26.916299] The buggy address is located 12 bytes to the right of
[   26.916299]  allocated 115-byte region [fff00000c7895200, fff00000c7895273)
[   26.916491] 
[   26.916561] The buggy address belongs to the physical page:
[   26.916691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   26.916916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.917028] page_type: f5(slab)
[   26.917150] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.917268] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.917537] page dumped because: kasan: bad access detected
[   26.917669] 
[   26.917893] Memory state around the buggy address:
[   26.918101]  fff00000c7895100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.918169]  fff00000c7895180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.918531] >fff00000c7895200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.918603]                                                                 ^
[   26.918809]  fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.918886]  fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.919146] ==================================================================
[   26.903871] ==================================================================
[   26.904074] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   26.904369] Read of size 1 at addr fff00000c7895278 by task kunit_try_catch/206
[   26.904541] 
[   26.904656] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.905003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.905177] Hardware name: linux,dummy-virt (DT)
[   26.905230] Call trace:
[   26.905255]  show_stack+0x20/0x38 (C)
[   26.905324]  dump_stack_lvl+0x8c/0xd0
[   26.905385]  print_report+0x118/0x608
[   26.905443]  kasan_report+0xdc/0x128
[   26.905500]  __asan_report_load1_noabort+0x20/0x30
[   26.905549]  ksize_unpoisons_memory+0x618/0x740
[   26.905605]  kunit_try_run_case+0x170/0x3f0
[   26.905655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.905717]  kthread+0x328/0x630
[   26.905769]  ret_from_fork+0x10/0x20
[   26.905825] 
[   26.905844] Allocated by task 206:
[   26.905872]  kasan_save_stack+0x3c/0x68
[   26.905912]  kasan_save_track+0x20/0x40
[   26.905950]  kasan_save_alloc_info+0x40/0x58
[   26.905998]  __kasan_kmalloc+0xd4/0xd8
[   26.906036]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.906076]  ksize_unpoisons_memory+0xc0/0x740
[   26.906121]  kunit_try_run_case+0x170/0x3f0
[   26.906169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.906234]  kthread+0x328/0x630
[   26.906266]  ret_from_fork+0x10/0x20
[   26.906311] 
[   26.906331] The buggy address belongs to the object at fff00000c7895200
[   26.906331]  which belongs to the cache kmalloc-128 of size 128
[   26.906688] The buggy address is located 5 bytes to the right of
[   26.906688]  allocated 115-byte region [fff00000c7895200, fff00000c7895273)
[   26.906939] 
[   26.907316] The buggy address belongs to the physical page:
[   26.907354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   26.907678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.907781] page_type: f5(slab)
[   26.908148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.908304] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.908479] page dumped because: kasan: bad access detected
[   26.908650] 
[   26.908780] Memory state around the buggy address:
[   26.909071]  fff00000c7895100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.909151]  fff00000c7895180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.909331] >fff00000c7895200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.909449]                                                                 ^
[   26.909516]  fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.909652]  fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.909818] ==================================================================
[   26.891768] ==================================================================
[   26.891833] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   26.892434] Read of size 1 at addr fff00000c7895273 by task kunit_try_catch/206
[   26.892960] 
[   26.893081] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.893538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.893707] Hardware name: linux,dummy-virt (DT)
[   26.893973] Call trace:
[   26.894047]  show_stack+0x20/0x38 (C)
[   26.894256]  dump_stack_lvl+0x8c/0xd0
[   26.894470]  print_report+0x118/0x608
[   26.894835]  kasan_report+0xdc/0x128
[   26.895094]  __asan_report_load1_noabort+0x20/0x30
[   26.895458]  ksize_unpoisons_memory+0x628/0x740
[   26.895570]  kunit_try_run_case+0x170/0x3f0
[   26.895825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.896094]  kthread+0x328/0x630
[   26.896252]  ret_from_fork+0x10/0x20
[   26.896307] 
[   26.896328] Allocated by task 206:
[   26.896359]  kasan_save_stack+0x3c/0x68
[   26.896566]  kasan_save_track+0x20/0x40
[   26.896727]  kasan_save_alloc_info+0x40/0x58
[   26.897188]  __kasan_kmalloc+0xd4/0xd8
[   26.897296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.897609]  ksize_unpoisons_memory+0xc0/0x740
[   26.897653]  kunit_try_run_case+0x170/0x3f0
[   26.897919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.898147]  kthread+0x328/0x630
[   26.898218]  ret_from_fork+0x10/0x20
[   26.898536] 
[   26.898569] The buggy address belongs to the object at fff00000c7895200
[   26.898569]  which belongs to the cache kmalloc-128 of size 128
[   26.899051] The buggy address is located 0 bytes to the right of
[   26.899051]  allocated 115-byte region [fff00000c7895200, fff00000c7895273)
[   26.899221] 
[   26.899622] The buggy address belongs to the physical page:
[   26.899695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   26.899943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.900206] page_type: f5(slab)
[   26.900251] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.900309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.900353] page dumped because: kasan: bad access detected
[   26.900902] 
[   26.900932] Memory state around the buggy address:
[   26.901125]  fff00000c7895100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.901270]  fff00000c7895180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.901600] >fff00000c7895200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.901795]                                                              ^
[   26.901978]  fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.902382]  fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.902534] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   26.865036] ==================================================================
[   26.865107] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   26.865313] Free of addr fff00000c3f9db40 by task kunit_try_catch/204
[   26.865739] 
[   26.865799] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.865886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.865913] Hardware name: linux,dummy-virt (DT)
[   26.866556] Call trace:
[   26.866611]  show_stack+0x20/0x38 (C)
[   26.866664]  dump_stack_lvl+0x8c/0xd0
[   26.866914]  print_report+0x118/0x608
[   26.867064]  kasan_report_invalid_free+0xc0/0xe8
[   26.867433]  check_slab_allocation+0xd4/0x108
[   26.867515]  __kasan_slab_pre_free+0x2c/0x48
[   26.867567]  kfree+0xe8/0x3c8
[   26.867845]  kfree_sensitive+0x3c/0xb0
[   26.867978]  kmalloc_double_kzfree+0x168/0x308
[   26.868046]  kunit_try_run_case+0x170/0x3f0
[   26.868101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.868598]  kthread+0x328/0x630
[   26.868801]  ret_from_fork+0x10/0x20
[   26.869083] 
[   26.869285] Allocated by task 204:
[   26.869384]  kasan_save_stack+0x3c/0x68
[   26.869568]  kasan_save_track+0x20/0x40
[   26.869814]  kasan_save_alloc_info+0x40/0x58
[   26.869914]  __kasan_kmalloc+0xd4/0xd8
[   26.870159]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.870448]  kmalloc_double_kzfree+0xb8/0x308
[   26.870653]  kunit_try_run_case+0x170/0x3f0
[   26.870752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.871101]  kthread+0x328/0x630
[   26.871383]  ret_from_fork+0x10/0x20
[   26.871525] 
[   26.871615] Freed by task 204:
[   26.871671]  kasan_save_stack+0x3c/0x68
[   26.872178]  kasan_save_track+0x20/0x40
[   26.872493]  kasan_save_free_info+0x4c/0x78
[   26.872714]  __kasan_slab_free+0x6c/0x98
[   26.872840]  kfree+0x214/0x3c8
[   26.872986]  kfree_sensitive+0x80/0xb0
[   26.873064]  kmalloc_double_kzfree+0x11c/0x308
[   26.873185]  kunit_try_run_case+0x170/0x3f0
[   26.873405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.873815]  kthread+0x328/0x630
[   26.874356]  ret_from_fork+0x10/0x20
[   26.874567] 
[   26.874682] The buggy address belongs to the object at fff00000c3f9db40
[   26.874682]  which belongs to the cache kmalloc-16 of size 16
[   26.874844] The buggy address is located 0 bytes inside of
[   26.874844]  16-byte region [fff00000c3f9db40, fff00000c3f9db50)
[   26.875205] 
[   26.875352] The buggy address belongs to the physical page:
[   26.875659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d
[   26.875870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.876128] page_type: f5(slab)
[   26.876362] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   26.876532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.876840] page dumped because: kasan: bad access detected
[   26.876989] 
[   26.877053] Memory state around the buggy address:
[   26.877087]  fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.877500]  fff00000c3f9da80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.877694] >fff00000c3f9db00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   26.877819]                                            ^
[   26.877971]  fff00000c3f9db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.878340]  fff00000c3f9dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.878510] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   26.855838] ==================================================================
[   26.855911] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   26.855982] Read of size 1 at addr fff00000c3f9db40 by task kunit_try_catch/204
[   26.856609] 
[   26.856735] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.856930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.857183] Hardware name: linux,dummy-virt (DT)
[   26.857319] Call trace:
[   26.857735]  show_stack+0x20/0x38 (C)
[   26.857877]  dump_stack_lvl+0x8c/0xd0
[   26.858082]  print_report+0x118/0x608
[   26.858523]  kasan_report+0xdc/0x128
[   26.858689]  __kasan_check_byte+0x54/0x70
[   26.859075]  kfree_sensitive+0x30/0xb0
[   26.859212]  kmalloc_double_kzfree+0x168/0x308
[   26.859611]  kunit_try_run_case+0x170/0x3f0
[   26.859737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.859841]  kthread+0x328/0x630
[   26.859889]  ret_from_fork+0x10/0x20
[   26.860299] 
[   26.860337] Allocated by task 204:
[   26.860540]  kasan_save_stack+0x3c/0x68
[   26.860639]  kasan_save_track+0x20/0x40
[   26.860768]  kasan_save_alloc_info+0x40/0x58
[   26.860810]  __kasan_kmalloc+0xd4/0xd8
[   26.860849]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.860888]  kmalloc_double_kzfree+0xb8/0x308
[   26.860926]  kunit_try_run_case+0x170/0x3f0
[   26.860993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.861038]  kthread+0x328/0x630
[   26.861069]  ret_from_fork+0x10/0x20
[   26.861107] 
[   26.861126] Freed by task 204:
[   26.861152]  kasan_save_stack+0x3c/0x68
[   26.861191]  kasan_save_track+0x20/0x40
[   26.861228]  kasan_save_free_info+0x4c/0x78
[   26.861272]  __kasan_slab_free+0x6c/0x98
[   26.861320]  kfree+0x214/0x3c8
[   26.861352]  kfree_sensitive+0x80/0xb0
[   26.861389]  kmalloc_double_kzfree+0x11c/0x308
[   26.861441]  kunit_try_run_case+0x170/0x3f0
[   26.861479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.861526]  kthread+0x328/0x630
[   26.861558]  ret_from_fork+0x10/0x20
[   26.861594] 
[   26.861614] The buggy address belongs to the object at fff00000c3f9db40
[   26.861614]  which belongs to the cache kmalloc-16 of size 16
[   26.861685] The buggy address is located 0 bytes inside of
[   26.861685]  freed 16-byte region [fff00000c3f9db40, fff00000c3f9db50)
[   26.861745] 
[   26.861779] The buggy address belongs to the physical page:
[   26.861813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d
[   26.861874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.861934] page_type: f5(slab)
[   26.861975] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   26.862034] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.862082] page dumped because: kasan: bad access detected
[   26.862118] 
[   26.862136] Memory state around the buggy address:
[   26.862178]  fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.862220]  fff00000c3f9da80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.862271] >fff00000c3f9db00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   26.862318]                                            ^
[   26.862379]  fff00000c3f9db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.863338]  fff00000c3f9dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.863442] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   26.811743] ==================================================================
[   26.811814] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   26.812051] Read of size 1 at addr fff00000c78b0ea8 by task kunit_try_catch/200
[   26.813018] 
[   26.813062] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.813158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.813358] Hardware name: linux,dummy-virt (DT)
[   26.813590] Call trace:
[   26.814332]  show_stack+0x20/0x38 (C)
[   26.814429]  dump_stack_lvl+0x8c/0xd0
[   26.814746]  print_report+0x118/0x608
[   26.814882]  kasan_report+0xdc/0x128
[   26.815011]  __asan_report_load1_noabort+0x20/0x30
[   26.815596]  kmalloc_uaf2+0x3f4/0x468
[   26.815835]  kunit_try_run_case+0x170/0x3f0
[   26.815956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.816135]  kthread+0x328/0x630
[   26.816340]  ret_from_fork+0x10/0x20
[   26.816474] 
[   26.816494] Allocated by task 200:
[   26.816534]  kasan_save_stack+0x3c/0x68
[   26.816575]  kasan_save_track+0x20/0x40
[   26.816613]  kasan_save_alloc_info+0x40/0x58
[   26.816651]  __kasan_kmalloc+0xd4/0xd8
[   26.816688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.816729]  kmalloc_uaf2+0xc4/0x468
[   26.816797]  kunit_try_run_case+0x170/0x3f0
[   26.816840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.816885]  kthread+0x328/0x630
[   26.816917]  ret_from_fork+0x10/0x20
[   26.816963] 
[   26.816997] Freed by task 200:
[   26.817031]  kasan_save_stack+0x3c/0x68
[   26.817078]  kasan_save_track+0x20/0x40
[   26.817116]  kasan_save_free_info+0x4c/0x78
[   26.817150]  __kasan_slab_free+0x6c/0x98
[   26.817188]  kfree+0x214/0x3c8
[   26.817219]  kmalloc_uaf2+0x134/0x468
[   26.817264]  kunit_try_run_case+0x170/0x3f0
[   26.817315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.817359]  kthread+0x328/0x630
[   26.817785]  ret_from_fork+0x10/0x20
[   26.817840] 
[   26.817890] The buggy address belongs to the object at fff00000c78b0e80
[   26.817890]  which belongs to the cache kmalloc-64 of size 64
[   26.818477] The buggy address is located 40 bytes inside of
[   26.818477]  freed 64-byte region [fff00000c78b0e80, fff00000c78b0ec0)
[   26.818630] 
[   26.818817] The buggy address belongs to the physical page:
[   26.819003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0
[   26.819287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.819728] page_type: f5(slab)
[   26.820034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.820433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.820561] page dumped because: kasan: bad access detected
[   26.820660] 
[   26.820679] Memory state around the buggy address:
[   26.820885]  fff00000c78b0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.821139]  fff00000c78b0e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.821503] >fff00000c78b0e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.821575]                                   ^
[   26.821719]  fff00000c78b0f00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   26.821767]  fff00000c78b0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.821996] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   26.786144] ==================================================================
[   26.786208] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   26.786270] Write of size 33 at addr fff00000c78b0d00 by task kunit_try_catch/198
[   26.786321] 
[   26.786359] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.786457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.786484] Hardware name: linux,dummy-virt (DT)
[   26.786517] Call trace:
[   26.786540]  show_stack+0x20/0x38 (C)
[   26.786592]  dump_stack_lvl+0x8c/0xd0
[   26.786643]  print_report+0x118/0x608
[   26.786689]  kasan_report+0xdc/0x128
[   26.786734]  kasan_check_range+0x100/0x1a8
[   26.786781]  __asan_memset+0x34/0x78
[   26.786825]  kmalloc_uaf_memset+0x170/0x310
[   26.786871]  kunit_try_run_case+0x170/0x3f0
[   26.786919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.786972]  kthread+0x328/0x630
[   26.787012]  ret_from_fork+0x10/0x20
[   26.787060] 
[   26.787080] Allocated by task 198:
[   26.787107]  kasan_save_stack+0x3c/0x68
[   26.787157]  kasan_save_track+0x20/0x40
[   26.787194]  kasan_save_alloc_info+0x40/0x58
[   26.787231]  __kasan_kmalloc+0xd4/0xd8
[   26.787266]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.787307]  kmalloc_uaf_memset+0xb8/0x310
[   26.787342]  kunit_try_run_case+0x170/0x3f0
[   26.787381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.787435]  kthread+0x328/0x630
[   26.787639]  ret_from_fork+0x10/0x20
[   26.787980] 
[   26.788107] Freed by task 198:
[   26.788256]  kasan_save_stack+0x3c/0x68
[   26.788354]  kasan_save_track+0x20/0x40
[   26.788880]  kasan_save_free_info+0x4c/0x78
[   26.789323]  __kasan_slab_free+0x6c/0x98
[   26.789872]  kfree+0x214/0x3c8
[   26.790018]  kmalloc_uaf_memset+0x11c/0x310
[   26.790113]  kunit_try_run_case+0x170/0x3f0
[   26.790533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.790852]  kthread+0x328/0x630
[   26.791000]  ret_from_fork+0x10/0x20
[   26.791321] 
[   26.791735] The buggy address belongs to the object at fff00000c78b0d00
[   26.791735]  which belongs to the cache kmalloc-64 of size 64
[   26.791898] The buggy address is located 0 bytes inside of
[   26.791898]  freed 64-byte region [fff00000c78b0d00, fff00000c78b0d40)
[   26.792497] 
[   26.792742] The buggy address belongs to the physical page:
[   26.792814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0
[   26.793010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.793391] page_type: f5(slab)
[   26.793694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.794043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.794151] page dumped because: kasan: bad access detected
[   26.794360] 
[   26.794491] Memory state around the buggy address:
[   26.794528]  fff00000c78b0c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.794597]  fff00000c78b0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.795193] >fff00000c78b0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.795346]                    ^
[   26.795453]  fff00000c78b0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.795723]  fff00000c78b0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.795959] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   26.766490] ==================================================================
[   26.766579] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   26.766652] Read of size 1 at addr fff00000c3f9db28 by task kunit_try_catch/196
[   26.766703] 
[   26.766752] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.766840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.766866] Hardware name: linux,dummy-virt (DT)
[   26.766909] Call trace:
[   26.766945]  show_stack+0x20/0x38 (C)
[   26.767002]  dump_stack_lvl+0x8c/0xd0
[   26.767058]  print_report+0x118/0x608
[   26.767106]  kasan_report+0xdc/0x128
[   26.767164]  __asan_report_load1_noabort+0x20/0x30
[   26.767212]  kmalloc_uaf+0x300/0x338
[   26.767255]  kunit_try_run_case+0x170/0x3f0
[   26.767309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.767360]  kthread+0x328/0x630
[   26.767414]  ret_from_fork+0x10/0x20
[   26.767463] 
[   26.767481] Allocated by task 196:
[   26.767508]  kasan_save_stack+0x3c/0x68
[   26.767551]  kasan_save_track+0x20/0x40
[   26.767587]  kasan_save_alloc_info+0x40/0x58
[   26.767624]  __kasan_kmalloc+0xd4/0xd8
[   26.767662]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.767701]  kmalloc_uaf+0xb8/0x338
[   26.767736]  kunit_try_run_case+0x170/0x3f0
[   26.767785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.767830]  kthread+0x328/0x630
[   26.767860]  ret_from_fork+0x10/0x20
[   26.768531] 
[   26.768593] Freed by task 196:
[   26.768644]  kasan_save_stack+0x3c/0x68
[   26.768716]  kasan_save_track+0x20/0x40
[   26.768832]  kasan_save_free_info+0x4c/0x78
[   26.768929]  __kasan_slab_free+0x6c/0x98
[   26.768970]  kfree+0x214/0x3c8
[   26.769195]  kmalloc_uaf+0x11c/0x338
[   26.769354]  kunit_try_run_case+0x170/0x3f0
[   26.769492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.769863]  kthread+0x328/0x630
[   26.769968]  ret_from_fork+0x10/0x20
[   26.770342] 
[   26.770387] The buggy address belongs to the object at fff00000c3f9db20
[   26.770387]  which belongs to the cache kmalloc-16 of size 16
[   26.770519] The buggy address is located 8 bytes inside of
[   26.770519]  freed 16-byte region [fff00000c3f9db20, fff00000c3f9db30)
[   26.770645] 
[   26.770758] The buggy address belongs to the physical page:
[   26.771031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d
[   26.771223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.771366] page_type: f5(slab)
[   26.771447] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   26.771689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.772167] page dumped because: kasan: bad access detected
[   26.772274] 
[   26.772688] Memory state around the buggy address:
[   26.772804]  fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.772911]  fff00000c3f9da80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.772983] >fff00000c3f9db00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   26.773147]                                   ^
[   26.773486]  fff00000c3f9db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.773661]  fff00000c3f9dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.773884] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   26.745831] ==================================================================
[   26.745902] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   26.745971] Read of size 64 at addr fff00000c78b0a04 by task kunit_try_catch/194
[   26.746425] 
[   26.746603] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.746699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.746734] Hardware name: linux,dummy-virt (DT)
[   26.746877] Call trace:
[   26.747107]  show_stack+0x20/0x38 (C)
[   26.747337]  dump_stack_lvl+0x8c/0xd0
[   26.747537]  print_report+0x118/0x608
[   26.747591]  kasan_report+0xdc/0x128
[   26.747707]  kasan_check_range+0x100/0x1a8
[   26.747759]  __asan_memmove+0x3c/0x98
[   26.747802]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   26.747977]  kunit_try_run_case+0x170/0x3f0
[   26.748075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.748250]  kthread+0x328/0x630
[   26.748300]  ret_from_fork+0x10/0x20
[   26.748524] 
[   26.748664] Allocated by task 194:
[   26.748719]  kasan_save_stack+0x3c/0x68
[   26.748836]  kasan_save_track+0x20/0x40
[   26.748878]  kasan_save_alloc_info+0x40/0x58
[   26.748914]  __kasan_kmalloc+0xd4/0xd8
[   26.748951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.748991]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   26.749033]  kunit_try_run_case+0x170/0x3f0
[   26.749079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.749124]  kthread+0x328/0x630
[   26.749158]  ret_from_fork+0x10/0x20
[   26.749193] 
[   26.749213] The buggy address belongs to the object at fff00000c78b0a00
[   26.749213]  which belongs to the cache kmalloc-64 of size 64
[   26.749282] The buggy address is located 4 bytes inside of
[   26.749282]  allocated 64-byte region [fff00000c78b0a00, fff00000c78b0a40)
[   26.749348] 
[   26.749368] The buggy address belongs to the physical page:
[   26.749418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0
[   26.749480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.749532] page_type: f5(slab)
[   26.749573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.749621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.749670] page dumped because: kasan: bad access detected
[   26.749701] 
[   26.749719] Memory state around the buggy address:
[   26.749766]  fff00000c78b0900: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   26.749826]  fff00000c78b0980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.749878] >fff00000c78b0a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.749916]                                            ^
[   26.749950]  fff00000c78b0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.749990]  fff00000c78b0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.750029] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   26.726830] ==================================================================
[   26.727045] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   26.727122] Read of size 18446744073709551614 at addr fff00000c78b0804 by task kunit_try_catch/192
[   26.727500] 
[   26.727562] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.727715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.727820] Hardware name: linux,dummy-virt (DT)
[   26.727855] Call trace:
[   26.728068]  show_stack+0x20/0x38 (C)
[   26.728403]  dump_stack_lvl+0x8c/0xd0
[   26.728619]  print_report+0x118/0x608
[   26.728826]  kasan_report+0xdc/0x128
[   26.729101]  kasan_check_range+0x100/0x1a8
[   26.729155]  __asan_memmove+0x3c/0x98
[   26.729243]  kmalloc_memmove_negative_size+0x154/0x2e0
[   26.729537]  kunit_try_run_case+0x170/0x3f0
[   26.729628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.729853]  kthread+0x328/0x630
[   26.729906]  ret_from_fork+0x10/0x20
[   26.729956] 
[   26.730044] Allocated by task 192:
[   26.730109]  kasan_save_stack+0x3c/0x68
[   26.730162]  kasan_save_track+0x20/0x40
[   26.730209]  kasan_save_alloc_info+0x40/0x58
[   26.730250]  __kasan_kmalloc+0xd4/0xd8
[   26.730302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.730343]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   26.730419]  kunit_try_run_case+0x170/0x3f0
[   26.730469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.730512]  kthread+0x328/0x630
[   26.730545]  ret_from_fork+0x10/0x20
[   26.730582] 
[   26.730607] The buggy address belongs to the object at fff00000c78b0800
[   26.730607]  which belongs to the cache kmalloc-64 of size 64
[   26.730679] The buggy address is located 4 bytes inside of
[   26.730679]  64-byte region [fff00000c78b0800, fff00000c78b0840)
[   26.730738] 
[   26.730767] The buggy address belongs to the physical page:
[   26.730800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0
[   26.730866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.730940] page_type: f5(slab)
[   26.730987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.731052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.731101] page dumped because: kasan: bad access detected
[   26.731134] 
[   26.731152] Memory state around the buggy address:
[   26.731214]  fff00000c78b0700: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   26.731274]  fff00000c78b0780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.731316] >fff00000c78b0800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.731360]                    ^
[   26.731434]  fff00000c78b0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.731862]  fff00000c78b0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.731924] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   26.704273] ==================================================================
[   26.704475] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   26.704545] Write of size 16 at addr fff00000c7895169 by task kunit_try_catch/190
[   26.704594] 
[   26.704960] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.705437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.705536] Hardware name: linux,dummy-virt (DT)
[   26.705776] Call trace:
[   26.705915]  show_stack+0x20/0x38 (C)
[   26.706310]  dump_stack_lvl+0x8c/0xd0
[   26.706424]  print_report+0x118/0x608
[   26.706768]  kasan_report+0xdc/0x128
[   26.706899]  kasan_check_range+0x100/0x1a8
[   26.707100]  __asan_memset+0x34/0x78
[   26.707368]  kmalloc_oob_memset_16+0x150/0x2f8
[   26.707629]  kunit_try_run_case+0x170/0x3f0
[   26.707863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.708095]  kthread+0x328/0x630
[   26.708199]  ret_from_fork+0x10/0x20
[   26.708249] 
[   26.708267] Allocated by task 190:
[   26.708780]  kasan_save_stack+0x3c/0x68
[   26.709011]  kasan_save_track+0x20/0x40
[   26.709332]  kasan_save_alloc_info+0x40/0x58
[   26.709556]  __kasan_kmalloc+0xd4/0xd8
[   26.709688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.710103]  kmalloc_oob_memset_16+0xb0/0x2f8
[   26.710195]  kunit_try_run_case+0x170/0x3f0
[   26.710464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.710768]  kthread+0x328/0x630
[   26.710959]  ret_from_fork+0x10/0x20
[   26.711073] 
[   26.711267] The buggy address belongs to the object at fff00000c7895100
[   26.711267]  which belongs to the cache kmalloc-128 of size 128
[   26.711601] The buggy address is located 105 bytes inside of
[   26.711601]  allocated 120-byte region [fff00000c7895100, fff00000c7895178)
[   26.711809] 
[   26.711948] The buggy address belongs to the physical page:
[   26.712127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   26.712204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.712257] page_type: f5(slab)
[   26.712561] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.712787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.713266] page dumped because: kasan: bad access detected
[   26.713449] 
[   26.713597] Memory state around the buggy address:
[   26.713727]  fff00000c7895000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.713838]  fff00000c7895080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.713881] >fff00000c7895100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.714062]                                                                 ^
[   26.714425]  fff00000c7895180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.715036]  fff00000c7895200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.715252] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   26.679905] ==================================================================
[   26.681051] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   26.681144] Write of size 8 at addr fff00000c7895071 by task kunit_try_catch/188
[   26.681578] 
[   26.681676] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.682000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.682287] Hardware name: linux,dummy-virt (DT)
[   26.682571] Call trace:
[   26.682655]  show_stack+0x20/0x38 (C)
[   26.682795]  dump_stack_lvl+0x8c/0xd0
[   26.682919]  print_report+0x118/0x608
[   26.683229]  kasan_report+0xdc/0x128
[   26.683545]  kasan_check_range+0x100/0x1a8
[   26.683964]  __asan_memset+0x34/0x78
[   26.684151]  kmalloc_oob_memset_8+0x150/0x2f8
[   26.684349]  kunit_try_run_case+0x170/0x3f0
[   26.684615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.684819]  kthread+0x328/0x630
[   26.684861]  ret_from_fork+0x10/0x20
[   26.684911] 
[   26.684929] Allocated by task 188:
[   26.685479]  kasan_save_stack+0x3c/0x68
[   26.685606]  kasan_save_track+0x20/0x40
[   26.685715]  kasan_save_alloc_info+0x40/0x58
[   26.685832]  __kasan_kmalloc+0xd4/0xd8
[   26.685896]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.686066]  kmalloc_oob_memset_8+0xb0/0x2f8
[   26.686506]  kunit_try_run_case+0x170/0x3f0
[   26.686618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.686729]  kthread+0x328/0x630
[   26.686948]  ret_from_fork+0x10/0x20
[   26.687166] 
[   26.687349] The buggy address belongs to the object at fff00000c7895000
[   26.687349]  which belongs to the cache kmalloc-128 of size 128
[   26.687604] The buggy address is located 113 bytes inside of
[   26.687604]  allocated 120-byte region [fff00000c7895000, fff00000c7895078)
[   26.687737] 
[   26.687931] The buggy address belongs to the physical page:
[   26.688115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   26.688168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.688217] page_type: f5(slab)
[   26.688559] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.688915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.689075] page dumped because: kasan: bad access detected
[   26.689143] 
[   26.689162] Memory state around the buggy address:
[   26.689563]  fff00000c7894f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.689632]  fff00000c7894f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.689921] >fff00000c7895000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.689973]                                                                 ^
[   26.690113]  fff00000c7895080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.690155]  fff00000c7895100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.690490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   26.651293] ==================================================================
[   26.651370] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   26.651878] Write of size 4 at addr fff00000c3fadf75 by task kunit_try_catch/186
[   26.652797] 
[   26.652931] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.653026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.653364] Hardware name: linux,dummy-virt (DT)
[   26.653417] Call trace:
[   26.653490]  show_stack+0x20/0x38 (C)
[   26.653665]  dump_stack_lvl+0x8c/0xd0
[   26.653885]  print_report+0x118/0x608
[   26.654282]  kasan_report+0xdc/0x128
[   26.654361]  kasan_check_range+0x100/0x1a8
[   26.654608]  __asan_memset+0x34/0x78
[   26.654852]  kmalloc_oob_memset_4+0x150/0x300
[   26.654902]  kunit_try_run_case+0x170/0x3f0
[   26.655305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.655514]  kthread+0x328/0x630
[   26.655571]  ret_from_fork+0x10/0x20
[   26.655773] 
[   26.655799] Allocated by task 186:
[   26.656009]  kasan_save_stack+0x3c/0x68
[   26.656079]  kasan_save_track+0x20/0x40
[   26.656430]  kasan_save_alloc_info+0x40/0x58
[   26.656477]  __kasan_kmalloc+0xd4/0xd8
[   26.656595]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.657034]  kmalloc_oob_memset_4+0xb0/0x300
[   26.657238]  kunit_try_run_case+0x170/0x3f0
[   26.657487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.657662]  kthread+0x328/0x630
[   26.657893]  ret_from_fork+0x10/0x20
[   26.657949] 
[   26.658140] The buggy address belongs to the object at fff00000c3fadf00
[   26.658140]  which belongs to the cache kmalloc-128 of size 128
[   26.658376] The buggy address is located 117 bytes inside of
[   26.658376]  allocated 120-byte region [fff00000c3fadf00, fff00000c3fadf78)
[   26.658594] 
[   26.658685] The buggy address belongs to the physical page:
[   26.658896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad
[   26.659035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.659248] page_type: f5(slab)
[   26.659323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.659553] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.659738] page dumped because: kasan: bad access detected
[   26.659897] 
[   26.659979] Memory state around the buggy address:
[   26.660139]  fff00000c3fade00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.660361]  fff00000c3fade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.660602] >fff00000c3fadf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.660679]                                                                 ^
[   26.660720]  fff00000c3fadf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.660765]  fff00000c3fae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.660802] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   26.419344] ==================================================================
[   26.419448] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   26.419529] Read of size 1 at addr fff00000c7960000 by task kunit_try_catch/166
[   26.419605] 
[   26.419651] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.419736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.419763] Hardware name: linux,dummy-virt (DT)
[   26.419806] Call trace:
[   26.419829]  show_stack+0x20/0x38 (C)
[   26.419879]  dump_stack_lvl+0x8c/0xd0
[   26.419936]  print_report+0x118/0x608
[   26.419982]  kasan_report+0xdc/0x128
[   26.420036]  __asan_report_load1_noabort+0x20/0x30
[   26.420083]  page_alloc_uaf+0x328/0x350
[   26.420129]  kunit_try_run_case+0x170/0x3f0
[   26.420178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.420229]  kthread+0x328/0x630
[   26.420270]  ret_from_fork+0x10/0x20
[   26.420323] 
[   26.420345] The buggy address belongs to the physical page:
[   26.420377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107960
[   26.420439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.420490] page_type: f0(buddy)
[   26.420583] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000
[   26.420689] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   26.420858] page dumped because: kasan: bad access detected
[   26.420891] 
[   26.420955] Memory state around the buggy address:
[   26.421017]  fff00000c795ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.421172]  fff00000c795ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.421262] >fff00000c7960000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.421440]                    ^
[   26.421577]  fff00000c7960080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.421709]  fff00000c7960100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.421774] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   26.634046] ==================================================================
[   26.634120] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   26.634267] Write of size 2 at addr fff00000c3fade77 by task kunit_try_catch/184
[   26.634319] 
[   26.634354] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.634493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.634552] Hardware name: linux,dummy-virt (DT)
[   26.634618] Call trace:
[   26.634895]  show_stack+0x20/0x38 (C)
[   26.635086]  dump_stack_lvl+0x8c/0xd0
[   26.635148]  print_report+0x118/0x608
[   26.635193]  kasan_report+0xdc/0x128
[   26.635296]  kasan_check_range+0x100/0x1a8
[   26.635460]  __asan_memset+0x34/0x78
[   26.635506]  kmalloc_oob_memset_2+0x150/0x2f8
[   26.635720]  kunit_try_run_case+0x170/0x3f0
[   26.635872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.635936]  kthread+0x328/0x630
[   26.635976]  ret_from_fork+0x10/0x20
[   26.636029] 
[   26.636048] Allocated by task 184:
[   26.636077]  kasan_save_stack+0x3c/0x68
[   26.636511]  kasan_save_track+0x20/0x40
[   26.636767]  kasan_save_alloc_info+0x40/0x58
[   26.636902]  __kasan_kmalloc+0xd4/0xd8
[   26.636942]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.637387]  kmalloc_oob_memset_2+0xb0/0x2f8
[   26.637626]  kunit_try_run_case+0x170/0x3f0
[   26.637752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.637809]  kthread+0x328/0x630
[   26.637841]  ret_from_fork+0x10/0x20
[   26.638012] 
[   26.638258] The buggy address belongs to the object at fff00000c3fade00
[   26.638258]  which belongs to the cache kmalloc-128 of size 128
[   26.638654] The buggy address is located 119 bytes inside of
[   26.638654]  allocated 120-byte region [fff00000c3fade00, fff00000c3fade78)
[   26.638893] 
[   26.639154] The buggy address belongs to the physical page:
[   26.639615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad
[   26.639998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.640083] page_type: f5(slab)
[   26.640156] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.640225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.640265] page dumped because: kasan: bad access detected
[   26.640311] 
[   26.640336] Memory state around the buggy address:
[   26.640368]  fff00000c3fadd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.640902]  fff00000c3fadd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.641072] >fff00000c3fade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.641258]                                                                 ^
[   26.641300]  fff00000c3fade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.641616]  fff00000c3fadf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.641707] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   26.616273] ==================================================================
[   26.616601] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   26.617050] Write of size 128 at addr fff00000c3fadd00 by task kunit_try_catch/182
[   26.617413] 
[   26.617464] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.617648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.617682] Hardware name: linux,dummy-virt (DT)
[   26.618049] Call trace:
[   26.618195]  show_stack+0x20/0x38 (C)
[   26.618259]  dump_stack_lvl+0x8c/0xd0
[   26.618307]  print_report+0x118/0x608
[   26.618352]  kasan_report+0xdc/0x128
[   26.618770]  kasan_check_range+0x100/0x1a8
[   26.619176]  __asan_memset+0x34/0x78
[   26.619488]  kmalloc_oob_in_memset+0x144/0x2d0
[   26.619626]  kunit_try_run_case+0x170/0x3f0
[   26.619680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.619767]  kthread+0x328/0x630
[   26.619971]  ret_from_fork+0x10/0x20
[   26.620129] 
[   26.620251] Allocated by task 182:
[   26.620406]  kasan_save_stack+0x3c/0x68
[   26.620467]  kasan_save_track+0x20/0x40
[   26.620511]  kasan_save_alloc_info+0x40/0x58
[   26.620992]  __kasan_kmalloc+0xd4/0xd8
[   26.621133]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.621310]  kmalloc_oob_in_memset+0xb0/0x2d0
[   26.621509]  kunit_try_run_case+0x170/0x3f0
[   26.621658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.621826]  kthread+0x328/0x630
[   26.622054]  ret_from_fork+0x10/0x20
[   26.622228] 
[   26.622461] The buggy address belongs to the object at fff00000c3fadd00
[   26.622461]  which belongs to the cache kmalloc-128 of size 128
[   26.622665] The buggy address is located 0 bytes inside of
[   26.622665]  allocated 120-byte region [fff00000c3fadd00, fff00000c3fadd78)
[   26.622980] 
[   26.623074] The buggy address belongs to the physical page:
[   26.623254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad
[   26.623415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.623538] page_type: f5(slab)
[   26.623602] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.623650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.623696] page dumped because: kasan: bad access detected
[   26.623741] 
[   26.623760] Memory state around the buggy address:
[   26.623799]  fff00000c3fadc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.623841]  fff00000c3fadc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.623900] >fff00000c3fadd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.623953]                                                                 ^
[   26.624130]  fff00000c3fadd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.624356]  fff00000c3fade00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.624521] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   26.594657] ==================================================================
[   26.594715] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   26.594775] Read of size 16 at addr fff00000c3f9db00 by task kunit_try_catch/180
[   26.594893] 
[   26.594934] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.595019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.595044] Hardware name: linux,dummy-virt (DT)
[   26.595075] Call trace:
[   26.595097]  show_stack+0x20/0x38 (C)
[   26.595148]  dump_stack_lvl+0x8c/0xd0
[   26.595197]  print_report+0x118/0x608
[   26.595243]  kasan_report+0xdc/0x128
[   26.595298]  __asan_report_load16_noabort+0x20/0x30
[   26.595346]  kmalloc_uaf_16+0x3bc/0x438
[   26.595389]  kunit_try_run_case+0x170/0x3f0
[   26.595484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.595538]  kthread+0x328/0x630
[   26.595839]  ret_from_fork+0x10/0x20
[   26.596240] 
[   26.596764] Allocated by task 180:
[   26.596916]  kasan_save_stack+0x3c/0x68
[   26.597179]  kasan_save_track+0x20/0x40
[   26.597223]  kasan_save_alloc_info+0x40/0x58
[   26.597662]  __kasan_kmalloc+0xd4/0xd8
[   26.597758]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.598100]  kmalloc_uaf_16+0x140/0x438
[   26.598184]  kunit_try_run_case+0x170/0x3f0
[   26.598447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.598618]  kthread+0x328/0x630
[   26.599107]  ret_from_fork+0x10/0x20
[   26.599188] 
[   26.599380] Freed by task 180:
[   26.599542]  kasan_save_stack+0x3c/0x68
[   26.599824]  kasan_save_track+0x20/0x40
[   26.600020]  kasan_save_free_info+0x4c/0x78
[   26.600129]  __kasan_slab_free+0x6c/0x98
[   26.600168]  kfree+0x214/0x3c8
[   26.600200]  kmalloc_uaf_16+0x190/0x438
[   26.600235]  kunit_try_run_case+0x170/0x3f0
[   26.600272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.600631]  kthread+0x328/0x630
[   26.600786]  ret_from_fork+0x10/0x20
[   26.600956] 
[   26.601054] The buggy address belongs to the object at fff00000c3f9db00
[   26.601054]  which belongs to the cache kmalloc-16 of size 16
[   26.601132] The buggy address is located 0 bytes inside of
[   26.601132]  freed 16-byte region [fff00000c3f9db00, fff00000c3f9db10)
[   26.601360] 
[   26.601597] The buggy address belongs to the physical page:
[   26.601672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d
[   26.601920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.602642] page_type: f5(slab)
[   26.602826] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   26.602997] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.603037] page dumped because: kasan: bad access detected
[   26.603320] 
[   26.603477] Memory state around the buggy address:
[   26.603554]  fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.603712]  fff00000c3f9da80: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   26.603914] >fff00000c3f9db00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.603985]                    ^
[   26.604016]  fff00000c3f9db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.604056]  fff00000c3f9dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.604526] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   26.574693] ==================================================================
[   26.574769] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   26.574836] Write of size 16 at addr fff00000c3f9daa0 by task kunit_try_catch/178
[   26.574886] 
[   26.574936] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.575021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.575046] Hardware name: linux,dummy-virt (DT)
[   26.575078] Call trace:
[   26.575101]  show_stack+0x20/0x38 (C)
[   26.575163]  dump_stack_lvl+0x8c/0xd0
[   26.575221]  print_report+0x118/0x608
[   26.575268]  kasan_report+0xdc/0x128
[   26.575326]  __asan_report_store16_noabort+0x20/0x30
[   26.575374]  kmalloc_oob_16+0x3a0/0x3f8
[   26.575439]  kunit_try_run_case+0x170/0x3f0
[   26.575488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.575539]  kthread+0x328/0x630
[   26.575579]  ret_from_fork+0x10/0x20
[   26.575626] 
[   26.575651] Allocated by task 178:
[   26.575680]  kasan_save_stack+0x3c/0x68
[   26.575718]  kasan_save_track+0x20/0x40
[   26.575754]  kasan_save_alloc_info+0x40/0x58
[   26.575788]  __kasan_kmalloc+0xd4/0xd8
[   26.575831]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.576637]  kmalloc_oob_16+0xb4/0x3f8
[   26.576788]  kunit_try_run_case+0x170/0x3f0
[   26.576937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.577085]  kthread+0x328/0x630
[   26.577118]  ret_from_fork+0x10/0x20
[   26.577332] 
[   26.577494] The buggy address belongs to the object at fff00000c3f9daa0
[   26.577494]  which belongs to the cache kmalloc-16 of size 16
[   26.577625] The buggy address is located 0 bytes inside of
[   26.577625]  allocated 13-byte region [fff00000c3f9daa0, fff00000c3f9daad)
[   26.577787] 
[   26.577997] The buggy address belongs to the physical page:
[   26.578105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d
[   26.578546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.578668] page_type: f5(slab)
[   26.578753] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   26.578856] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.578996] page dumped because: kasan: bad access detected
[   26.579064] 
[   26.579082] Memory state around the buggy address:
[   26.579285]  fff00000c3f9d980: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   26.579591]  fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.579727] >fff00000c3f9da80: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   26.579971]                                   ^
[   26.580044]  fff00000c3f9db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.580085]  fff00000c3f9db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.580130] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   26.550391] ==================================================================
[   26.550462] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   26.550578] Read of size 1 at addr fff00000c470f800 by task kunit_try_catch/176
[   26.550775] 
[   26.550874] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.551241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.551276] Hardware name: linux,dummy-virt (DT)
[   26.551345] Call trace:
[   26.551384]  show_stack+0x20/0x38 (C)
[   26.551499]  dump_stack_lvl+0x8c/0xd0
[   26.551575]  print_report+0x118/0x608
[   26.551815]  kasan_report+0xdc/0x128
[   26.552001]  __asan_report_load1_noabort+0x20/0x30
[   26.552199]  krealloc_uaf+0x4c8/0x520
[   26.552315]  kunit_try_run_case+0x170/0x3f0
[   26.552417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.552601]  kthread+0x328/0x630
[   26.552689]  ret_from_fork+0x10/0x20
[   26.552744] 
[   26.553047] Allocated by task 176:
[   26.553320]  kasan_save_stack+0x3c/0x68
[   26.553439]  kasan_save_track+0x20/0x40
[   26.553583]  kasan_save_alloc_info+0x40/0x58
[   26.553629]  __kasan_kmalloc+0xd4/0xd8
[   26.553665]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.553703]  krealloc_uaf+0xc8/0x520
[   26.553736]  kunit_try_run_case+0x170/0x3f0
[   26.553823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.553882]  kthread+0x328/0x630
[   26.553921]  ret_from_fork+0x10/0x20
[   26.553961] 
[   26.553981] Freed by task 176:
[   26.554007]  kasan_save_stack+0x3c/0x68
[   26.554044]  kasan_save_track+0x20/0x40
[   26.554079]  kasan_save_free_info+0x4c/0x78
[   26.554121]  __kasan_slab_free+0x6c/0x98
[   26.554165]  kfree+0x214/0x3c8
[   26.554197]  krealloc_uaf+0x12c/0x520
[   26.554230]  kunit_try_run_case+0x170/0x3f0
[   26.554272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.554323]  kthread+0x328/0x630
[   26.554362]  ret_from_fork+0x10/0x20
[   26.554406] 
[   26.554424] The buggy address belongs to the object at fff00000c470f800
[   26.554424]  which belongs to the cache kmalloc-256 of size 256
[   26.554479] The buggy address is located 0 bytes inside of
[   26.554479]  freed 256-byte region [fff00000c470f800, fff00000c470f900)
[   26.554536] 
[   26.554555] The buggy address belongs to the physical page:
[   26.554586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.554644] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.554689] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.554746] page_type: f5(slab)
[   26.554783] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.554830] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.554877] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.554923] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.554979] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.555025] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.555063] page dumped because: kasan: bad access detected
[   26.555098] 
[   26.555115] Memory state around the buggy address:
[   26.555144]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.555185]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.555234] >fff00000c470f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.555279]                    ^
[   26.555313]  fff00000c470f880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.555363]  fff00000c470f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.556142] ==================================================================
[   26.537629] ==================================================================
[   26.538014] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   26.538085] Read of size 1 at addr fff00000c470f800 by task kunit_try_catch/176
[   26.538149] 
[   26.538184] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.538652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.538707] Hardware name: linux,dummy-virt (DT)
[   26.538742] Call trace:
[   26.538930]  show_stack+0x20/0x38 (C)
[   26.539169]  dump_stack_lvl+0x8c/0xd0
[   26.539260]  print_report+0x118/0x608
[   26.539309]  kasan_report+0xdc/0x128
[   26.539353]  __kasan_check_byte+0x54/0x70
[   26.539565]  krealloc_noprof+0x44/0x360
[   26.539625]  krealloc_uaf+0x180/0x520
[   26.539895]  kunit_try_run_case+0x170/0x3f0
[   26.540155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.540216]  kthread+0x328/0x630
[   26.540257]  ret_from_fork+0x10/0x20
[   26.540303] 
[   26.540321] Allocated by task 176:
[   26.540351]  kasan_save_stack+0x3c/0x68
[   26.540390]  kasan_save_track+0x20/0x40
[   26.540440]  kasan_save_alloc_info+0x40/0x58
[   26.540476]  __kasan_kmalloc+0xd4/0xd8
[   26.540512]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.540552]  krealloc_uaf+0xc8/0x520
[   26.540989]  kunit_try_run_case+0x170/0x3f0
[   26.541294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.541485]  kthread+0x328/0x630
[   26.541871]  ret_from_fork+0x10/0x20
[   26.541993] 
[   26.542119] Freed by task 176:
[   26.542321]  kasan_save_stack+0x3c/0x68
[   26.542367]  kasan_save_track+0x20/0x40
[   26.542788]  kasan_save_free_info+0x4c/0x78
[   26.542929]  __kasan_slab_free+0x6c/0x98
[   26.543073]  kfree+0x214/0x3c8
[   26.543308]  krealloc_uaf+0x12c/0x520
[   26.543540]  kunit_try_run_case+0x170/0x3f0
[   26.543665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.543805]  kthread+0x328/0x630
[   26.544041]  ret_from_fork+0x10/0x20
[   26.544092] 
[   26.544114] The buggy address belongs to the object at fff00000c470f800
[   26.544114]  which belongs to the cache kmalloc-256 of size 256
[   26.544676] The buggy address is located 0 bytes inside of
[   26.544676]  freed 256-byte region [fff00000c470f800, fff00000c470f900)
[   26.544930] 
[   26.544977] The buggy address belongs to the physical page:
[   26.545072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.545126] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.545370] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.545725] page_type: f5(slab)
[   26.546079] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.546139] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.546352] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.546622] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.546760] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.546871] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.546912] page dumped because: kasan: bad access detected
[   26.546944] 
[   26.546963] Memory state around the buggy address:
[   26.547002]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.547058]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.547106] >fff00000c470f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.547151]                    ^
[   26.547177]  fff00000c470f880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.547225]  fff00000c470f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.547271] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   26.455606] ==================================================================
[   26.455658] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   26.455709] Write of size 1 at addr fff00000c470f6d0 by task kunit_try_catch/170
[   26.455768] 
[   26.455803] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.455883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.455909] Hardware name: linux,dummy-virt (DT)
[   26.455938] Call trace:
[   26.455958]  show_stack+0x20/0x38 (C)
[   26.456254]  dump_stack_lvl+0x8c/0xd0
[   26.456371]  print_report+0x118/0x608
[   26.456496]  kasan_report+0xdc/0x128
[   26.456601]  __asan_report_store1_noabort+0x20/0x30
[   26.456692]  krealloc_less_oob_helper+0xb9c/0xc50
[   26.456782]  krealloc_less_oob+0x20/0x38
[   26.456834]  kunit_try_run_case+0x170/0x3f0
[   26.456882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.456933]  kthread+0x328/0x630
[   26.457161]  ret_from_fork+0x10/0x20
[   26.457358] 
[   26.457503] Allocated by task 170:
[   26.457603]  kasan_save_stack+0x3c/0x68
[   26.457679]  kasan_save_track+0x20/0x40
[   26.457716]  kasan_save_alloc_info+0x40/0x58
[   26.457816]  __kasan_krealloc+0x118/0x178
[   26.458119]  krealloc_noprof+0x128/0x360
[   26.458266]  krealloc_less_oob_helper+0x168/0xc50
[   26.458390]  krealloc_less_oob+0x20/0x38
[   26.458537]  kunit_try_run_case+0x170/0x3f0
[   26.458596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.458638]  kthread+0x328/0x630
[   26.459042]  ret_from_fork+0x10/0x20
[   26.459125] 
[   26.459163] The buggy address belongs to the object at fff00000c470f600
[   26.459163]  which belongs to the cache kmalloc-256 of size 256
[   26.459250] The buggy address is located 7 bytes to the right of
[   26.459250]  allocated 201-byte region [fff00000c470f600, fff00000c470f6c9)
[   26.459575] 
[   26.459677] The buggy address belongs to the physical page:
[   26.459773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.459825] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.459891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.459941] page_type: f5(slab)
[   26.459978] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.460035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.460083] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.460145] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.460192] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.460252] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.460306] page dumped because: kasan: bad access detected
[   26.460345] 
[   26.460362] Memory state around the buggy address:
[   26.460391]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.460442]  fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.460483] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.460519]                                                  ^
[   26.460563]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.460614]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.460650] ==================================================================
[   26.511476] ==================================================================
[   26.511519] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   26.511561] Write of size 1 at addr fff00000c78260ea by task kunit_try_catch/174
[   26.511606] 
[   26.511632] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.511709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.511740] Hardware name: linux,dummy-virt (DT)
[   26.511778] Call trace:
[   26.511804]  show_stack+0x20/0x38 (C)
[   26.511848]  dump_stack_lvl+0x8c/0xd0
[   26.511902]  print_report+0x118/0x608
[   26.512851]  kasan_report+0xdc/0x128
[   26.512937]  __asan_report_store1_noabort+0x20/0x30
[   26.513031]  krealloc_less_oob_helper+0xae4/0xc50
[   26.513119]  krealloc_large_less_oob+0x20/0x38
[   26.513223]  kunit_try_run_case+0x170/0x3f0
[   26.513459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.513596]  kthread+0x328/0x630
[   26.513640]  ret_from_fork+0x10/0x20
[   26.513999] 
[   26.514183] The buggy address belongs to the physical page:
[   26.514263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.514511] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.514577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.514760] page_type: f8(unknown)
[   26.514860] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.515015] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.515195] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.515370] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.515503] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.515944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.516017] page dumped because: kasan: bad access detected
[   26.516113] 
[   26.516167] Memory state around the buggy address:
[   26.516220]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.516262]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.516302] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.516552]                                                           ^
[   26.516732]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.517183]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.517503] ==================================================================
[   26.518984] ==================================================================
[   26.519028] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   26.519227] Write of size 1 at addr fff00000c78260eb by task kunit_try_catch/174
[   26.519288] 
[   26.519370] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.519640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.519736] Hardware name: linux,dummy-virt (DT)
[   26.519814] Call trace:
[   26.519874]  show_stack+0x20/0x38 (C)
[   26.519981]  dump_stack_lvl+0x8c/0xd0
[   26.520028]  print_report+0x118/0x608
[   26.520453]  kasan_report+0xdc/0x128
[   26.520678]  __asan_report_store1_noabort+0x20/0x30
[   26.520906]  krealloc_less_oob_helper+0xa58/0xc50
[   26.520980]  krealloc_large_less_oob+0x20/0x38
[   26.521299]  kunit_try_run_case+0x170/0x3f0
[   26.521542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.521801]  kthread+0x328/0x630
[   26.521857]  ret_from_fork+0x10/0x20
[   26.522125] 
[   26.522295] The buggy address belongs to the physical page:
[   26.522452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.522555] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.522628] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.522863] page_type: f8(unknown)
[   26.523024] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.523145] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.523273] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.523462] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.523632] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.523713] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.523930] page dumped because: kasan: bad access detected
[   26.524177] 
[   26.524231] Memory state around the buggy address:
[   26.524276]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.524827]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.525270] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.525316]                                                           ^
[   26.525741]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.525895]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.526167] ==================================================================
[   26.502134] ==================================================================
[   26.502176] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   26.502330] Write of size 1 at addr fff00000c78260d0 by task kunit_try_catch/174
[   26.502603] 
[   26.502700] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.502783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.502907] Hardware name: linux,dummy-virt (DT)
[   26.502969] Call trace:
[   26.503007]  show_stack+0x20/0x38 (C)
[   26.503155]  dump_stack_lvl+0x8c/0xd0
[   26.503209]  print_report+0x118/0x608
[   26.503352]  kasan_report+0xdc/0x128
[   26.503414]  __asan_report_store1_noabort+0x20/0x30
[   26.503461]  krealloc_less_oob_helper+0xb9c/0xc50
[   26.503769]  krealloc_large_less_oob+0x20/0x38
[   26.503866]  kunit_try_run_case+0x170/0x3f0
[   26.503975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.504097]  kthread+0x328/0x630
[   26.504220]  ret_from_fork+0x10/0x20
[   26.504265] 
[   26.504310] The buggy address belongs to the physical page:
[   26.504342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.504635] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.504852] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.504983] page_type: f8(unknown)
[   26.505020] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.505348] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.505442] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.505563] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.505689] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.505865] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.505922] page dumped because: kasan: bad access detected
[   26.506052] 
[   26.506168] Memory state around the buggy address:
[   26.506204]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.506249]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.506366] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.506425]                                                  ^
[   26.506459]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.506499]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.506536] ==================================================================
[   26.508666] ==================================================================
[   26.508844] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   26.508904] Write of size 1 at addr fff00000c78260da by task kunit_try_catch/174
[   26.508951] 
[   26.508980] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.509069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.509094] Hardware name: linux,dummy-virt (DT)
[   26.509122] Call trace:
[   26.509491]  show_stack+0x20/0x38 (C)
[   26.509614]  dump_stack_lvl+0x8c/0xd0
[   26.509673]  print_report+0x118/0x608
[   26.509913]  kasan_report+0xdc/0x128
[   26.510087]  __asan_report_store1_noabort+0x20/0x30
[   26.510224]  krealloc_less_oob_helper+0xa80/0xc50
[   26.510276]  krealloc_large_less_oob+0x20/0x38
[   26.510331]  kunit_try_run_case+0x170/0x3f0
[   26.510424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.510479]  kthread+0x328/0x630
[   26.510520]  ret_from_fork+0x10/0x20
[   26.510574] 
[   26.510593] The buggy address belongs to the physical page:
[   26.510624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.510673] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.510716] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.510769] page_type: f8(unknown)
[   26.510806] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.510863] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.510919] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.510967] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.511013] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.511059] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.511097] page dumped because: kasan: bad access detected
[   26.511125] 
[   26.511143] Memory state around the buggy address:
[   26.511171]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.511211]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.511259] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.511295]                                                     ^
[   26.511329]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.511368]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.511424] ==================================================================
[   26.497726] ==================================================================
[   26.497822] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   26.497922] Write of size 1 at addr fff00000c78260c9 by task kunit_try_catch/174
[   26.498037] 
[   26.498069] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.498154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.498351] Hardware name: linux,dummy-virt (DT)
[   26.498406] Call trace:
[   26.498456]  show_stack+0x20/0x38 (C)
[   26.498532]  dump_stack_lvl+0x8c/0xd0
[   26.498645]  print_report+0x118/0x608
[   26.498701]  kasan_report+0xdc/0x128
[   26.498746]  __asan_report_store1_noabort+0x20/0x30
[   26.498809]  krealloc_less_oob_helper+0xa48/0xc50
[   26.498856]  krealloc_large_less_oob+0x20/0x38
[   26.498905]  kunit_try_run_case+0x170/0x3f0
[   26.499080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.499168]  kthread+0x328/0x630
[   26.499228]  ret_from_fork+0x10/0x20
[   26.499300] 
[   26.499339] The buggy address belongs to the physical page:
[   26.499407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.499466] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.499570] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.499647] page_type: f8(unknown)
[   26.499701] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.499749] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.499907] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.499974] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.500258] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.500339] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.500377] page dumped because: kasan: bad access detected
[   26.500564] 
[   26.500583] Memory state around the buggy address:
[   26.500828]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.500901]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.500987] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.501104]                                               ^
[   26.501138]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.501324]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.501470] ==================================================================
[   26.466552] ==================================================================
[   26.466640] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   26.466690] Write of size 1 at addr fff00000c470f6ea by task kunit_try_catch/170
[   26.466737] 
[   26.466765] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.466843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.466868] Hardware name: linux,dummy-virt (DT)
[   26.466917] Call trace:
[   26.467051]  show_stack+0x20/0x38 (C)
[   26.467133]  dump_stack_lvl+0x8c/0xd0
[   26.467266]  print_report+0x118/0x608
[   26.467354]  kasan_report+0xdc/0x128
[   26.467413]  __asan_report_store1_noabort+0x20/0x30
[   26.467730]  krealloc_less_oob_helper+0xae4/0xc50
[   26.467790]  krealloc_less_oob+0x20/0x38
[   26.467944]  kunit_try_run_case+0x170/0x3f0
[   26.468228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.468380]  kthread+0x328/0x630
[   26.468562]  ret_from_fork+0x10/0x20
[   26.468681] 
[   26.468749] Allocated by task 170:
[   26.468865]  kasan_save_stack+0x3c/0x68
[   26.468934]  kasan_save_track+0x20/0x40
[   26.469092]  kasan_save_alloc_info+0x40/0x58
[   26.469186]  __kasan_krealloc+0x118/0x178
[   26.469226]  krealloc_noprof+0x128/0x360
[   26.469261]  krealloc_less_oob_helper+0x168/0xc50
[   26.469299]  krealloc_less_oob+0x20/0x38
[   26.469438]  kunit_try_run_case+0x170/0x3f0
[   26.469593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.469638]  kthread+0x328/0x630
[   26.469886]  ret_from_fork+0x10/0x20
[   26.469935] 
[   26.470022] The buggy address belongs to the object at fff00000c470f600
[   26.470022]  which belongs to the cache kmalloc-256 of size 256
[   26.470149] The buggy address is located 33 bytes to the right of
[   26.470149]  allocated 201-byte region [fff00000c470f600, fff00000c470f6c9)
[   26.470232] 
[   26.470259] The buggy address belongs to the physical page:
[   26.470356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.470481] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.470863] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.471026] page_type: f5(slab)
[   26.471111] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.471220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.471317] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.471470] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.471584] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.471634] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.471847] page dumped because: kasan: bad access detected
[   26.471893] 
[   26.471910] Memory state around the buggy address:
[   26.472030]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.472072]  fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.472113] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.472148]                                                           ^
[   26.472420]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.472648]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.472792] ==================================================================
[   26.461556] ==================================================================
[   26.461628] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   26.461706] Write of size 1 at addr fff00000c470f6da by task kunit_try_catch/170
[   26.461780] 
[   26.461827] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.461907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.461977] Hardware name: linux,dummy-virt (DT)
[   26.462123] Call trace:
[   26.462151]  show_stack+0x20/0x38 (C)
[   26.462247]  dump_stack_lvl+0x8c/0xd0
[   26.462314]  print_report+0x118/0x608
[   26.462360]  kasan_report+0xdc/0x128
[   26.462436]  __asan_report_store1_noabort+0x20/0x30
[   26.462496]  krealloc_less_oob_helper+0xa80/0xc50
[   26.462560]  krealloc_less_oob+0x20/0x38
[   26.462605]  kunit_try_run_case+0x170/0x3f0
[   26.462651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.462701]  kthread+0x328/0x630
[   26.462909]  ret_from_fork+0x10/0x20
[   26.462961] 
[   26.462979] Allocated by task 170:
[   26.463038]  kasan_save_stack+0x3c/0x68
[   26.463114]  kasan_save_track+0x20/0x40
[   26.463161]  kasan_save_alloc_info+0x40/0x58
[   26.463237]  __kasan_krealloc+0x118/0x178
[   26.463284]  krealloc_noprof+0x128/0x360
[   26.463320]  krealloc_less_oob_helper+0x168/0xc50
[   26.463376]  krealloc_less_oob+0x20/0x38
[   26.463425]  kunit_try_run_case+0x170/0x3f0
[   26.463460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.463713]  kthread+0x328/0x630
[   26.463804]  ret_from_fork+0x10/0x20
[   26.463862] 
[   26.463963] The buggy address belongs to the object at fff00000c470f600
[   26.463963]  which belongs to the cache kmalloc-256 of size 256
[   26.464071] The buggy address is located 17 bytes to the right of
[   26.464071]  allocated 201-byte region [fff00000c470f600, fff00000c470f6c9)
[   26.464170] 
[   26.464197] The buggy address belongs to the physical page:
[   26.464255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.464305] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.464349] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.464407] page_type: f5(slab)
[   26.464443] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.464490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.464538] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.464725] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.464832] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.464925] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.465022] page dumped because: kasan: bad access detected
[   26.465074] 
[   26.465156] Memory state around the buggy address:
[   26.465205]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.465246]  fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.465503] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.465623]                                                     ^
[   26.465708]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.465766]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.465810] ==================================================================
[   26.447407] ==================================================================
[   26.447819] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   26.447903] Write of size 1 at addr fff00000c470f6c9 by task kunit_try_catch/170
[   26.448008] 
[   26.448088] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.448191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.448216] Hardware name: linux,dummy-virt (DT)
[   26.448249] Call trace:
[   26.448272]  show_stack+0x20/0x38 (C)
[   26.448375]  dump_stack_lvl+0x8c/0xd0
[   26.448580]  print_report+0x118/0x608
[   26.448684]  kasan_report+0xdc/0x128
[   26.448730]  __asan_report_store1_noabort+0x20/0x30
[   26.448923]  krealloc_less_oob_helper+0xa48/0xc50
[   26.449068]  krealloc_less_oob+0x20/0x38
[   26.449209]  kunit_try_run_case+0x170/0x3f0
[   26.449329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.449464]  kthread+0x328/0x630
[   26.449613]  ret_from_fork+0x10/0x20
[   26.449700] 
[   26.449782] Allocated by task 170:
[   26.449869]  kasan_save_stack+0x3c/0x68
[   26.449999]  kasan_save_track+0x20/0x40
[   26.450092]  kasan_save_alloc_info+0x40/0x58
[   26.450179]  __kasan_krealloc+0x118/0x178
[   26.450301]  krealloc_noprof+0x128/0x360
[   26.450340]  krealloc_less_oob_helper+0x168/0xc50
[   26.450411]  krealloc_less_oob+0x20/0x38
[   26.450446]  kunit_try_run_case+0x170/0x3f0
[   26.450495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.450747]  kthread+0x328/0x630
[   26.450845]  ret_from_fork+0x10/0x20
[   26.450970] 
[   26.451030] The buggy address belongs to the object at fff00000c470f600
[   26.451030]  which belongs to the cache kmalloc-256 of size 256
[   26.451104] The buggy address is located 0 bytes to the right of
[   26.451104]  allocated 201-byte region [fff00000c470f600, fff00000c470f6c9)
[   26.451327] 
[   26.451602] The buggy address belongs to the physical page:
[   26.451723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.451797] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.451843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.452218] page_type: f5(slab)
[   26.452322] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.452371] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.452578] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.452798] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.452915] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.453076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.453135] page dumped because: kasan: bad access detected
[   26.453427] 
[   26.453521] Memory state around the buggy address:
[   26.453581]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.453656]  fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.453762] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.453799]                                               ^
[   26.453878]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.454164]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.454325] ==================================================================
[   26.473634] ==================================================================
[   26.473729] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   26.473799] Write of size 1 at addr fff00000c470f6eb by task kunit_try_catch/170
[   26.473873] 
[   26.473902] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.473981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.474012] Hardware name: linux,dummy-virt (DT)
[   26.474042] Call trace:
[   26.474062]  show_stack+0x20/0x38 (C)
[   26.474117]  dump_stack_lvl+0x8c/0xd0
[   26.474173]  print_report+0x118/0x608
[   26.474219]  kasan_report+0xdc/0x128
[   26.474262]  __asan_report_store1_noabort+0x20/0x30
[   26.474308]  krealloc_less_oob_helper+0xa58/0xc50
[   26.474355]  krealloc_less_oob+0x20/0x38
[   26.474410]  kunit_try_run_case+0x170/0x3f0
[   26.474457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.474507]  kthread+0x328/0x630
[   26.474549]  ret_from_fork+0x10/0x20
[   26.474595] 
[   26.474618] Allocated by task 170:
[   26.474645]  kasan_save_stack+0x3c/0x68
[   26.474693]  kasan_save_track+0x20/0x40
[   26.474730]  kasan_save_alloc_info+0x40/0x58
[   26.474771]  __kasan_krealloc+0x118/0x178
[   26.474808]  krealloc_noprof+0x128/0x360
[   26.474844]  krealloc_less_oob_helper+0x168/0xc50
[   26.474882]  krealloc_less_oob+0x20/0x38
[   26.474917]  kunit_try_run_case+0x170/0x3f0
[   26.474961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.475004]  kthread+0x328/0x630
[   26.475035]  ret_from_fork+0x10/0x20
[   26.475069] 
[   26.475087] The buggy address belongs to the object at fff00000c470f600
[   26.475087]  which belongs to the cache kmalloc-256 of size 256
[   26.475146] The buggy address is located 34 bytes to the right of
[   26.475146]  allocated 201-byte region [fff00000c470f600, fff00000c470f6c9)
[   26.475207] 
[   26.475225] The buggy address belongs to the physical page:
[   26.475254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.475310] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.475363] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.475422] page_type: f5(slab)
[   26.475461] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.475640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.475695] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.475741] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.476028] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.476130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.476169] page dumped because: kasan: bad access detected
[   26.476199] 
[   26.476284] Memory state around the buggy address:
[   26.476333]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.476375]  fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.476425] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.476461]                                                           ^
[   26.476496]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.476536]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.476574] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   26.428875] ==================================================================
[   26.428937] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   26.429004] Write of size 1 at addr fff00000c470f4eb by task kunit_try_catch/168
[   26.429052] 
[   26.429085] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.429166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.429191] Hardware name: linux,dummy-virt (DT)
[   26.429221] Call trace:
[   26.429270]  show_stack+0x20/0x38 (C)
[   26.429320]  dump_stack_lvl+0x8c/0xd0
[   26.429366]  print_report+0x118/0x608
[   26.429426]  kasan_report+0xdc/0x128
[   26.429481]  __asan_report_store1_noabort+0x20/0x30
[   26.429528]  krealloc_more_oob_helper+0x60c/0x678
[   26.429575]  krealloc_more_oob+0x20/0x38
[   26.429618]  kunit_try_run_case+0x170/0x3f0
[   26.429666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.429716]  kthread+0x328/0x630
[   26.429757]  ret_from_fork+0x10/0x20
[   26.429804] 
[   26.429827] Allocated by task 168:
[   26.429855]  kasan_save_stack+0x3c/0x68
[   26.429894]  kasan_save_track+0x20/0x40
[   26.429931]  kasan_save_alloc_info+0x40/0x58
[   26.429966]  __kasan_krealloc+0x118/0x178
[   26.430002]  krealloc_noprof+0x128/0x360
[   26.430039]  krealloc_more_oob_helper+0x168/0x678
[   26.430076]  krealloc_more_oob+0x20/0x38
[   26.430120]  kunit_try_run_case+0x170/0x3f0
[   26.430172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.430214]  kthread+0x328/0x630
[   26.430250]  ret_from_fork+0x10/0x20
[   26.430293] 
[   26.430322] The buggy address belongs to the object at fff00000c470f400
[   26.430322]  which belongs to the cache kmalloc-256 of size 256
[   26.430379] The buggy address is located 0 bytes to the right of
[   26.430379]  allocated 235-byte region [fff00000c470f400, fff00000c470f4eb)
[   26.430449] 
[   26.430468] The buggy address belongs to the physical page:
[   26.430500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.430550] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.430595] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.430645] page_type: f5(slab)
[   26.430681] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.431117] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.431178] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.431225] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.431271] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.431317] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.431356] page dumped because: kasan: bad access detected
[   26.431658] 
[   26.431687] Memory state around the buggy address:
[   26.431769]  fff00000c470f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.431813]  fff00000c470f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.431890] >fff00000c470f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   26.431928]                                                           ^
[   26.431972]  fff00000c470f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.432081]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.432245] ==================================================================
[   26.488923] ==================================================================
[   26.489076] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   26.489134] Write of size 1 at addr fff00000c78260f0 by task kunit_try_catch/172
[   26.489180] 
[   26.489207] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.489289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.489484] Hardware name: linux,dummy-virt (DT)
[   26.489554] Call trace:
[   26.489614]  show_stack+0x20/0x38 (C)
[   26.489676]  dump_stack_lvl+0x8c/0xd0
[   26.489760]  print_report+0x118/0x608
[   26.489836]  kasan_report+0xdc/0x128
[   26.489890]  __asan_report_store1_noabort+0x20/0x30
[   26.489937]  krealloc_more_oob_helper+0x5c0/0x678
[   26.489984]  krealloc_large_more_oob+0x20/0x38
[   26.490030]  kunit_try_run_case+0x170/0x3f0
[   26.490078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.490145]  kthread+0x328/0x630
[   26.490185]  ret_from_fork+0x10/0x20
[   26.490239] 
[   26.490259] The buggy address belongs to the physical page:
[   26.490290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.490338] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.490390] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.490644] page_type: f8(unknown)
[   26.490826] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.490930] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.490980] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.491075] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.491136] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.491182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.491219] page dumped because: kasan: bad access detected
[   26.491321] 
[   26.491343] Memory state around the buggy address:
[   26.491626]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.491720]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.491789] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   26.491825]                                                              ^
[   26.491893]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.492032]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.492152] ==================================================================
[   26.432955] ==================================================================
[   26.433001] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   26.433051] Write of size 1 at addr fff00000c470f4f0 by task kunit_try_catch/168
[   26.433099] 
[   26.433127] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.433207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.433232] Hardware name: linux,dummy-virt (DT)
[   26.433261] Call trace:
[   26.433282]  show_stack+0x20/0x38 (C)
[   26.433327]  dump_stack_lvl+0x8c/0xd0
[   26.433436]  print_report+0x118/0x608
[   26.433609]  kasan_report+0xdc/0x128
[   26.433771]  __asan_report_store1_noabort+0x20/0x30
[   26.433906]  krealloc_more_oob_helper+0x5c0/0x678
[   26.433993]  krealloc_more_oob+0x20/0x38
[   26.434061]  kunit_try_run_case+0x170/0x3f0
[   26.434137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.434256]  kthread+0x328/0x630
[   26.434458]  ret_from_fork+0x10/0x20
[   26.434611] 
[   26.434629] Allocated by task 168:
[   26.434654]  kasan_save_stack+0x3c/0x68
[   26.434936]  kasan_save_track+0x20/0x40
[   26.435104]  kasan_save_alloc_info+0x40/0x58
[   26.435283]  __kasan_krealloc+0x118/0x178
[   26.435497]  krealloc_noprof+0x128/0x360
[   26.435655]  krealloc_more_oob_helper+0x168/0x678
[   26.435693]  krealloc_more_oob+0x20/0x38
[   26.435762]  kunit_try_run_case+0x170/0x3f0
[   26.435800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.435842]  kthread+0x328/0x630
[   26.436112]  ret_from_fork+0x10/0x20
[   26.436157] 
[   26.436188] The buggy address belongs to the object at fff00000c470f400
[   26.436188]  which belongs to the cache kmalloc-256 of size 256
[   26.436249] The buggy address is located 5 bytes to the right of
[   26.436249]  allocated 235-byte region [fff00000c470f400, fff00000c470f4eb)
[   26.436308] 
[   26.436327] The buggy address belongs to the physical page:
[   26.436588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.436672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.436781] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.436946] page_type: f5(slab)
[   26.437048] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.437189] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.437274] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.437676] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.437859] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.437982] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.438083] page dumped because: kasan: bad access detected
[   26.438211] 
[   26.438251] Memory state around the buggy address:
[   26.438354]  fff00000c470f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.438416]  fff00000c470f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.438455] >fff00000c470f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   26.438491]                                                              ^
[   26.438883]  fff00000c470f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.438975]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.439035] ==================================================================
[   26.483275] ==================================================================
[   26.483331] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   26.483421] Write of size 1 at addr fff00000c78260eb by task kunit_try_catch/172
[   26.483572] 
[   26.483662] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.483744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.484080] Hardware name: linux,dummy-virt (DT)
[   26.484186] Call trace:
[   26.484335]  show_stack+0x20/0x38 (C)
[   26.484455]  dump_stack_lvl+0x8c/0xd0
[   26.484595]  print_report+0x118/0x608
[   26.484749]  kasan_report+0xdc/0x128
[   26.484827]  __asan_report_store1_noabort+0x20/0x30
[   26.484913]  krealloc_more_oob_helper+0x60c/0x678
[   26.484961]  krealloc_large_more_oob+0x20/0x38
[   26.485151]  kunit_try_run_case+0x170/0x3f0
[   26.485202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.485254]  kthread+0x328/0x630
[   26.485294]  ret_from_fork+0x10/0x20
[   26.485512] 
[   26.485618] The buggy address belongs to the physical page:
[   26.485760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.485843] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.485987] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.486138] page_type: f8(unknown)
[   26.486290] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.486388] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.486679] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.486919] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.487066] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.487216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.487340] page dumped because: kasan: bad access detected
[   26.487509] 
[   26.487579] Memory state around the buggy address:
[   26.487611]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.487870]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.487915] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   26.487951]                                                           ^
[   26.487988]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.488027]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.488063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   26.281560] ==================================================================
[   26.281661] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   26.281726] Read of size 1 at addr fff00000c3f9da7f by task kunit_try_catch/150
[   26.281777] 
[   26.281814] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.281908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.282047] Hardware name: linux,dummy-virt (DT)
[   26.282214] Call trace:
[   26.282259]  show_stack+0x20/0x38 (C)
[   26.282365]  dump_stack_lvl+0x8c/0xd0
[   26.282447]  print_report+0x118/0x608
[   26.282492]  kasan_report+0xdc/0x128
[   26.282536]  __asan_report_load1_noabort+0x20/0x30
[   26.282582]  kmalloc_oob_left+0x2ec/0x320
[   26.282625]  kunit_try_run_case+0x170/0x3f0
[   26.282673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.282724]  kthread+0x328/0x630
[   26.282764]  ret_from_fork+0x10/0x20
[   26.282812] 
[   26.282829] Allocated by task 21:
[   26.282857]  kasan_save_stack+0x3c/0x68
[   26.282896]  kasan_save_track+0x20/0x40
[   26.282932]  kasan_save_alloc_info+0x40/0x58
[   26.282966]  __kasan_kmalloc+0xd4/0xd8
[   26.283001]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   26.283042]  build_sched_domains+0x32c/0x3768
[   26.283095]  partition_sched_domains+0x79c/0x1098
[   26.283250]  rebuild_sched_domains_locked+0x494/0xde0
[   26.283326]  cpuset_handle_hotplug+0xab0/0x1480
[   26.283426]  cpuset_update_active_cpus+0x18/0x30
[   26.283561]  sched_cpu_activate+0x2d0/0x388
[   26.283616]  cpuhp_invoke_callback+0x5b8/0x1620
[   26.283657]  cpuhp_thread_fun+0x230/0x5d8
[   26.283693]  smpboot_thread_fn+0x2e8/0x760
[   26.283730]  kthread+0x328/0x630
[   26.283760]  ret_from_fork+0x10/0x20
[   26.283794] 
[   26.283823] Freed by task 21:
[   26.283858]  kasan_save_stack+0x3c/0x68
[   26.283926]  kasan_save_track+0x20/0x40
[   26.284030]  kasan_save_free_info+0x4c/0x78
[   26.284084]  __kasan_slab_free+0x6c/0x98
[   26.284129]  kfree+0x214/0x3c8
[   26.284217]  build_sched_domains+0x1c64/0x3768
[   26.284331]  partition_sched_domains+0x79c/0x1098
[   26.284374]  rebuild_sched_domains_locked+0x494/0xde0
[   26.284425]  cpuset_handle_hotplug+0xab0/0x1480
[   26.284460]  cpuset_update_active_cpus+0x18/0x30
[   26.284505]  sched_cpu_activate+0x2d0/0x388
[   26.284588]  cpuhp_invoke_callback+0x5b8/0x1620
[   26.284627]  cpuhp_thread_fun+0x230/0x5d8
[   26.284815]  smpboot_thread_fn+0x2e8/0x760
[   26.284856]  kthread+0x328/0x630
[   26.284886]  ret_from_fork+0x10/0x20
[   26.284930] 
[   26.284952] The buggy address belongs to the object at fff00000c3f9da60
[   26.284952]  which belongs to the cache kmalloc-16 of size 16
[   26.285008] The buggy address is located 15 bytes to the right of
[   26.285008]  allocated 16-byte region [fff00000c3f9da60, fff00000c3f9da70)
[   26.285068] 
[   26.285088] The buggy address belongs to the physical page:
[   26.285119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d
[   26.285186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.285341] page_type: f5(slab)
[   26.285380] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   26.285439] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.285477] page dumped because: kasan: bad access detected
[   26.285506] 
[   26.285524] Memory state around the buggy address:
[   26.285650]  fff00000c3f9d900: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.285949]  fff00000c3f9d980: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   26.286004] >fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.286041]                                                                 ^
[   26.286089]  fff00000c3f9da80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.286156]  fff00000c3f9db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.286223] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   26.261594] ==================================================================
[   26.261631] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   26.261671] Read of size 1 at addr fff00000c3fada80 by task kunit_try_catch/148
[   26.261717] 
[   26.261744] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.261822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.261847] Hardware name: linux,dummy-virt (DT)
[   26.261876] Call trace:
[   26.261896]  show_stack+0x20/0x38 (C)
[   26.261940]  dump_stack_lvl+0x8c/0xd0
[   26.261984]  print_report+0x118/0x608
[   26.262029]  kasan_report+0xdc/0x128
[   26.262073]  __asan_report_load1_noabort+0x20/0x30
[   26.262127]  kmalloc_oob_right+0x5d0/0x660
[   26.262172]  kunit_try_run_case+0x170/0x3f0
[   26.262217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.262268]  kthread+0x328/0x630
[   26.262309]  ret_from_fork+0x10/0x20
[   26.262353] 
[   26.262370] Allocated by task 148:
[   26.262498]  kasan_save_stack+0x3c/0x68
[   26.262585]  kasan_save_track+0x20/0x40
[   26.262711]  kasan_save_alloc_info+0x40/0x58
[   26.262768]  __kasan_kmalloc+0xd4/0xd8
[   26.262804]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.262863]  kmalloc_oob_right+0xb0/0x660
[   26.262899]  kunit_try_run_case+0x170/0x3f0
[   26.262938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.262980]  kthread+0x328/0x630
[   26.263011]  ret_from_fork+0x10/0x20
[   26.263045] 
[   26.263119] The buggy address belongs to the object at fff00000c3fada00
[   26.263119]  which belongs to the cache kmalloc-128 of size 128
[   26.263229] The buggy address is located 13 bytes to the right of
[   26.263229]  allocated 115-byte region [fff00000c3fada00, fff00000c3fada73)
[   26.263310] 
[   26.263340] The buggy address belongs to the physical page:
[   26.263386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad
[   26.263470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.263538] page_type: f5(slab)
[   26.263575] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.263731] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.263911] page dumped because: kasan: bad access detected
[   26.263967] 
[   26.263994] Memory state around the buggy address:
[   26.264024]  fff00000c3fad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.264080]  fff00000c3fada00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.264344] >fff00000c3fada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.264451]                    ^
[   26.264483]  fff00000c3fadb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.264820]  fff00000c3fadb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.264975] ==================================================================
[   26.258157] ==================================================================
[   26.258298] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   26.258374] Write of size 1 at addr fff00000c3fada78 by task kunit_try_catch/148
[   26.258464] 
[   26.258539] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.258837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.258864] Hardware name: linux,dummy-virt (DT)
[   26.258961] Call trace:
[   26.258995]  show_stack+0x20/0x38 (C)
[   26.259042]  dump_stack_lvl+0x8c/0xd0
[   26.259262]  print_report+0x118/0x608
[   26.259482]  kasan_report+0xdc/0x128
[   26.259542]  __asan_report_store1_noabort+0x20/0x30
[   26.259592]  kmalloc_oob_right+0x538/0x660
[   26.259639]  kunit_try_run_case+0x170/0x3f0
[   26.259727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.259780]  kthread+0x328/0x630
[   26.260248]  ret_from_fork+0x10/0x20
[   26.260315] 
[   26.260334] Allocated by task 148:
[   26.260361]  kasan_save_stack+0x3c/0x68
[   26.260412]  kasan_save_track+0x20/0x40
[   26.260448]  kasan_save_alloc_info+0x40/0x58
[   26.260483]  __kasan_kmalloc+0xd4/0xd8
[   26.260519]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.260558]  kmalloc_oob_right+0xb0/0x660
[   26.260594]  kunit_try_run_case+0x170/0x3f0
[   26.260631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.260674]  kthread+0x328/0x630
[   26.260706]  ret_from_fork+0x10/0x20
[   26.260744] 
[   26.260763] The buggy address belongs to the object at fff00000c3fada00
[   26.260763]  which belongs to the cache kmalloc-128 of size 128
[   26.260818] The buggy address is located 5 bytes to the right of
[   26.260818]  allocated 115-byte region [fff00000c3fada00, fff00000c3fada73)
[   26.260879] 
[   26.260899] The buggy address belongs to the physical page:
[   26.260928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad
[   26.260977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.261023] page_type: f5(slab)
[   26.261059] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.261106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.261145] page dumped because: kasan: bad access detected
[   26.261174] 
[   26.261190] Memory state around the buggy address:
[   26.261219]  fff00000c3fad900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.261260]  fff00000c3fad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.261300] >fff00000c3fada00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.261335]                                                                 ^
[   26.261372]  fff00000c3fada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.261422]  fff00000c3fadb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.261457] ==================================================================
[   26.251341] ==================================================================
[   26.251702] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   26.252609] Write of size 1 at addr fff00000c3fada73 by task kunit_try_catch/148
[   26.252716] 
[   26.253475] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.253621] Tainted: [N]=TEST
[   26.253655] Hardware name: linux,dummy-virt (DT)
[   26.253870] Call trace:
[   26.254043]  show_stack+0x20/0x38 (C)
[   26.254184]  dump_stack_lvl+0x8c/0xd0
[   26.254238]  print_report+0x118/0x608
[   26.254286]  kasan_report+0xdc/0x128
[   26.254331]  __asan_report_store1_noabort+0x20/0x30
[   26.254378]  kmalloc_oob_right+0x5a4/0x660
[   26.254436]  kunit_try_run_case+0x170/0x3f0
[   26.254487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.254539]  kthread+0x328/0x630
[   26.254582]  ret_from_fork+0x10/0x20
[   26.254741] 
[   26.254779] Allocated by task 148:
[   26.254892]  kasan_save_stack+0x3c/0x68
[   26.254948]  kasan_save_track+0x20/0x40
[   26.254986]  kasan_save_alloc_info+0x40/0x58
[   26.255022]  __kasan_kmalloc+0xd4/0xd8
[   26.255058]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.255098]  kmalloc_oob_right+0xb0/0x660
[   26.255134]  kunit_try_run_case+0x170/0x3f0
[   26.255170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.255213]  kthread+0x328/0x630
[   26.255243]  ret_from_fork+0x10/0x20
[   26.255295] 
[   26.255352] The buggy address belongs to the object at fff00000c3fada00
[   26.255352]  which belongs to the cache kmalloc-128 of size 128
[   26.255453] The buggy address is located 0 bytes to the right of
[   26.255453]  allocated 115-byte region [fff00000c3fada00, fff00000c3fada73)
[   26.255518] 
[   26.255597] The buggy address belongs to the physical page:
[   26.255793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad
[   26.256116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.256421] page_type: f5(slab)
[   26.256708] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.256770] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.256873] page dumped because: kasan: bad access detected
[   26.256912] 
[   26.256938] Memory state around the buggy address:
[   26.257149]  fff00000c3fad900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.257211]  fff00000c3fad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.257263] >fff00000c3fada00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.257315]                                                              ^
[   26.257407]  fff00000c3fada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.257448]  fff00000c3fadb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.257509] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   26.381502] ==================================================================
[   26.381588] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   26.381654] Free of addr fff00000c7820001 by task kunit_try_catch/162
[   26.381934] 
[   26.382038] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.382636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.382780] Hardware name: linux,dummy-virt (DT)
[   26.382878] Call trace:
[   26.382902]  show_stack+0x20/0x38 (C)
[   26.383145]  dump_stack_lvl+0x8c/0xd0
[   26.383209]  print_report+0x118/0x608
[   26.383312]  kasan_report_invalid_free+0xc0/0xe8
[   26.383361]  __kasan_kfree_large+0x5c/0xa8
[   26.383711]  free_large_kmalloc+0x68/0x150
[   26.383796]  kfree+0x270/0x3c8
[   26.383882]  kmalloc_large_invalid_free+0x108/0x270
[   26.384027]  kunit_try_run_case+0x170/0x3f0
[   26.384093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.384306]  kthread+0x328/0x630
[   26.384377]  ret_from_fork+0x10/0x20
[   26.384543] 
[   26.384638] The buggy address belongs to the physical page:
[   26.384671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107820
[   26.384723] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.384799] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.384966] page_type: f8(unknown)
[   26.385038] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.385559] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.385803] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.385945] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.386045] head: 0bfffe0000000002 ffffc1ffc31e0801 00000000ffffffff 00000000ffffffff
[   26.386715] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.387054] page dumped because: kasan: bad access detected
[   26.387119] 
[   26.387138] Memory state around the buggy address:
[   26.387173]  fff00000c781ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.387216]  fff00000c781ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.387258] >fff00000c7820000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.387294]                    ^
[   26.387322]  fff00000c7820080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.388517]  fff00000c7820100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.389083] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   26.367225] ==================================================================
[   26.367357] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   26.367647] Read of size 1 at addr fff00000c7820000 by task kunit_try_catch/160
[   26.367854] 
[   26.367948] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.368182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.368214] Hardware name: linux,dummy-virt (DT)
[   26.368246] Call trace:
[   26.368563]  show_stack+0x20/0x38 (C)
[   26.368620]  dump_stack_lvl+0x8c/0xd0
[   26.368867]  print_report+0x118/0x608
[   26.368927]  kasan_report+0xdc/0x128
[   26.369097]  __asan_report_load1_noabort+0x20/0x30
[   26.369147]  kmalloc_large_uaf+0x2cc/0x2f8
[   26.369191]  kunit_try_run_case+0x170/0x3f0
[   26.369241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.369293]  kthread+0x328/0x630
[   26.369334]  ret_from_fork+0x10/0x20
[   26.369380] 
[   26.369422] The buggy address belongs to the physical page:
[   26.369453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107820
[   26.369678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.370033] raw: 0bfffe0000000000 ffffc1ffc31e0908 fff00000da488c80 0000000000000000
[   26.370087] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   26.370130] page dumped because: kasan: bad access detected
[   26.370160] 
[   26.370179] Memory state around the buggy address:
[   26.370573]  fff00000c781ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.370618]  fff00000c781ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.370659] >fff00000c7820000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.370695]                    ^
[   26.370997]  fff00000c7820080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.371109]  fff00000c7820100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.371146] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   26.353754] ==================================================================
[   26.353945] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   26.354119] Write of size 1 at addr fff00000c667600a by task kunit_try_catch/158
[   26.354186] 
[   26.354248] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.354334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.354666] Hardware name: linux,dummy-virt (DT)
[   26.354708] Call trace:
[   26.354802]  show_stack+0x20/0x38 (C)
[   26.354852]  dump_stack_lvl+0x8c/0xd0
[   26.354899]  print_report+0x118/0x608
[   26.354945]  kasan_report+0xdc/0x128
[   26.354989]  __asan_report_store1_noabort+0x20/0x30
[   26.355035]  kmalloc_large_oob_right+0x278/0x2b8
[   26.355080]  kunit_try_run_case+0x170/0x3f0
[   26.355129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.355180]  kthread+0x328/0x630
[   26.355220]  ret_from_fork+0x10/0x20
[   26.355273] 
[   26.355480] The buggy address belongs to the physical page:
[   26.355655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106674
[   26.355733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.355956] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.356017] page_type: f8(unknown)
[   26.356484] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.356733] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.356786] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.356832] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.356878] head: 0bfffe0000000002 ffffc1ffc3199d01 00000000ffffffff 00000000ffffffff
[   26.356925] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.356963] page dumped because: kasan: bad access detected
[   26.356993] 
[   26.357411] Memory state around the buggy address:
[   26.357538]  fff00000c6675f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.357646]  fff00000c6675f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.357716] >fff00000c6676000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.357752]                       ^
[   26.357780]  fff00000c6676080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.357821]  fff00000c6676100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.358012] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   26.335272] ==================================================================
[   26.335583] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   26.335755] Write of size 1 at addr fff00000c7931f00 by task kunit_try_catch/156
[   26.335805] 
[   26.335839] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.335932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.336009] Hardware name: linux,dummy-virt (DT)
[   26.336247] Call trace:
[   26.336274]  show_stack+0x20/0x38 (C)
[   26.336354]  dump_stack_lvl+0x8c/0xd0
[   26.336414]  print_report+0x118/0x608
[   26.336602]  kasan_report+0xdc/0x128
[   26.336827]  __asan_report_store1_noabort+0x20/0x30
[   26.336882]  kmalloc_big_oob_right+0x2a4/0x2f0
[   26.337040]  kunit_try_run_case+0x170/0x3f0
[   26.337087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.337172]  kthread+0x328/0x630
[   26.337246]  ret_from_fork+0x10/0x20
[   26.337307] 
[   26.337392] Allocated by task 156:
[   26.337429]  kasan_save_stack+0x3c/0x68
[   26.337469]  kasan_save_track+0x20/0x40
[   26.337657]  kasan_save_alloc_info+0x40/0x58
[   26.337931]  __kasan_kmalloc+0xd4/0xd8
[   26.337977]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.338019]  kmalloc_big_oob_right+0xb8/0x2f0
[   26.338070]  kunit_try_run_case+0x170/0x3f0
[   26.338113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.338157]  kthread+0x328/0x630
[   26.338480]  ret_from_fork+0x10/0x20
[   26.338622] 
[   26.338668] The buggy address belongs to the object at fff00000c7930000
[   26.338668]  which belongs to the cache kmalloc-8k of size 8192
[   26.338725] The buggy address is located 0 bytes to the right of
[   26.338725]  allocated 7936-byte region [fff00000c7930000, fff00000c7931f00)
[   26.338985] 
[   26.339097] The buggy address belongs to the physical page:
[   26.339137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107930
[   26.339199] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.339388] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.339631] page_type: f5(slab)
[   26.339753] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   26.340019] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   26.340232] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   26.340286] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   26.340332] head: 0bfffe0000000003 ffffc1ffc31e4c01 00000000ffffffff 00000000ffffffff
[   26.340378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   26.340427] page dumped because: kasan: bad access detected
[   26.340458] 
[   26.340477] Memory state around the buggy address:
[   26.340509]  fff00000c7931e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.340571]  fff00000c7931e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.340613] >fff00000c7931f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.340649]                    ^
[   26.340814]  fff00000c7931f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.341108]  fff00000c7932000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.341148] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   26.322123] ==================================================================
[   26.322503] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   26.322791] Write of size 1 at addr fff00000c3fadc78 by task kunit_try_catch/154
[   26.322985] 
[   26.323015] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.323326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.323416] Hardware name: linux,dummy-virt (DT)
[   26.323445] Call trace:
[   26.323466]  show_stack+0x20/0x38 (C)
[   26.323706]  dump_stack_lvl+0x8c/0xd0
[   26.323982]  print_report+0x118/0x608
[   26.324041]  kasan_report+0xdc/0x128
[   26.324086]  __asan_report_store1_noabort+0x20/0x30
[   26.324133]  kmalloc_track_caller_oob_right+0x418/0x488
[   26.324182]  kunit_try_run_case+0x170/0x3f0
[   26.324231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.324282]  kthread+0x328/0x630
[   26.324323]  ret_from_fork+0x10/0x20
[   26.324369] 
[   26.324422] Allocated by task 154:
[   26.324451]  kasan_save_stack+0x3c/0x68
[   26.324758]  kasan_save_track+0x20/0x40
[   26.324824]  kasan_save_alloc_info+0x40/0x58
[   26.324860]  __kasan_kmalloc+0xd4/0xd8
[   26.324895]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   26.325108]  kmalloc_track_caller_oob_right+0x184/0x488
[   26.325209]  kunit_try_run_case+0x170/0x3f0
[   26.325253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.325295]  kthread+0x328/0x630
[   26.325325]  ret_from_fork+0x10/0x20
[   26.325370] 
[   26.325470] The buggy address belongs to the object at fff00000c3fadc00
[   26.325470]  which belongs to the cache kmalloc-128 of size 128
[   26.325527] The buggy address is located 0 bytes to the right of
[   26.325527]  allocated 120-byte region [fff00000c3fadc00, fff00000c3fadc78)
[   26.325587] 
[   26.325607] The buggy address belongs to the physical page:
[   26.325698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad
[   26.325749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.325794] page_type: f5(slab)
[   26.325830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.325878] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.325917] page dumped because: kasan: bad access detected
[   26.325955] 
[   26.325972] Memory state around the buggy address:
[   26.326001]  fff00000c3fadb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.326441]  fff00000c3fadb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.326558] >fff00000c3fadc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.326594]                                                                 ^
[   26.326632]  fff00000c3fadc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.326852]  fff00000c3fadd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.326929] ==================================================================
[   26.314764] ==================================================================
[   26.314940] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   26.315215] Write of size 1 at addr fff00000c3fadb78 by task kunit_try_catch/154
[   26.315297] 
[   26.315334] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.315910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.316119] Hardware name: linux,dummy-virt (DT)
[   26.316368] Call trace:
[   26.316405]  show_stack+0x20/0x38 (C)
[   26.316460]  dump_stack_lvl+0x8c/0xd0
[   26.316674]  print_report+0x118/0x608
[   26.316781]  kasan_report+0xdc/0x128
[   26.316827]  __asan_report_store1_noabort+0x20/0x30
[   26.316940]  kmalloc_track_caller_oob_right+0x40c/0x488
[   26.317089]  kunit_try_run_case+0x170/0x3f0
[   26.317586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.317676]  kthread+0x328/0x630
[   26.317746]  ret_from_fork+0x10/0x20
[   26.317944] 
[   26.317963] Allocated by task 154:
[   26.317993]  kasan_save_stack+0x3c/0x68
[   26.318033]  kasan_save_track+0x20/0x40
[   26.318069]  kasan_save_alloc_info+0x40/0x58
[   26.318114]  __kasan_kmalloc+0xd4/0xd8
[   26.318160]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   26.318204]  kmalloc_track_caller_oob_right+0xa8/0x488
[   26.318602]  kunit_try_run_case+0x170/0x3f0
[   26.318737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.318837]  kthread+0x328/0x630
[   26.318878]  ret_from_fork+0x10/0x20
[   26.318988] 
[   26.319007] The buggy address belongs to the object at fff00000c3fadb00
[   26.319007]  which belongs to the cache kmalloc-128 of size 128
[   26.319064] The buggy address is located 0 bytes to the right of
[   26.319064]  allocated 120-byte region [fff00000c3fadb00, fff00000c3fadb78)
[   26.319124] 
[   26.319144] The buggy address belongs to the physical page:
[   26.319175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad
[   26.319235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.319282] page_type: f5(slab)
[   26.319574] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.319837] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.320014] page dumped because: kasan: bad access detected
[   26.320045] 
[   26.320101] Memory state around the buggy address:
[   26.320161]  fff00000c3fada00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.320202]  fff00000c3fada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.320243] >fff00000c3fadb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.320278]                                                                 ^
[   26.320500]  fff00000c3fadb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.320565]  fff00000c3fadc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.320601] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   26.295751] ==================================================================
[   26.295823] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   26.296241] Read of size 1 at addr fff00000c7901000 by task kunit_try_catch/152
[   26.296550] 
[   26.296611] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.296730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.296758] Hardware name: linux,dummy-virt (DT)
[   26.296788] Call trace:
[   26.296811]  show_stack+0x20/0x38 (C)
[   26.296862]  dump_stack_lvl+0x8c/0xd0
[   26.297479]  print_report+0x118/0x608
[   26.297560]  kasan_report+0xdc/0x128
[   26.297794]  __asan_report_load1_noabort+0x20/0x30
[   26.297976]  kmalloc_node_oob_right+0x2f4/0x330
[   26.298108]  kunit_try_run_case+0x170/0x3f0
[   26.298160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.298239]  kthread+0x328/0x630
[   26.298281]  ret_from_fork+0x10/0x20
[   26.298629] 
[   26.299165] Allocated by task 152:
[   26.299411]  kasan_save_stack+0x3c/0x68
[   26.299627]  kasan_save_track+0x20/0x40
[   26.299704]  kasan_save_alloc_info+0x40/0x58
[   26.299775]  __kasan_kmalloc+0xd4/0xd8
[   26.299811]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   26.299853]  kmalloc_node_oob_right+0xbc/0x330
[   26.299953]  kunit_try_run_case+0x170/0x3f0
[   26.300239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.300283]  kthread+0x328/0x630
[   26.300313]  ret_from_fork+0x10/0x20
[   26.300464] 
[   26.300641] The buggy address belongs to the object at fff00000c7900000
[   26.300641]  which belongs to the cache kmalloc-4k of size 4096
[   26.300729] The buggy address is located 0 bytes to the right of
[   26.300729]  allocated 4096-byte region [fff00000c7900000, fff00000c7901000)
[   26.300904] 
[   26.300932] The buggy address belongs to the physical page:
[   26.301005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   26.301254] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.301528] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.301630] page_type: f5(slab)
[   26.301670] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   26.301717] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   26.301772] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   26.301818] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   26.301865] head: 0bfffe0000000003 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff
[   26.301911] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   26.301997] page dumped because: kasan: bad access detected
[   26.302027] 
[   26.302045] Memory state around the buggy address:
[   26.302082]  fff00000c7900f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.302240]  fff00000c7900f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.302320] >fff00000c7901000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.302368]                    ^
[   26.302403]  fff00000c7901080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.302443]  fff00000c7901100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.302479] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  105.306310] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/670
[  105.307251] Modules linked in:
[  105.307499] CPU: 0 UID: 0 PID: 670 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[  105.308649] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  105.308962] Hardware name: linux,dummy-virt (DT)
[  105.309712] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  105.310465] pc : intlog10+0x38/0x48
[  105.310809] lr : intlog10_test+0xe4/0x200
[  105.311013] sp : ffff8000824c7c10
[  105.311171] x29: ffff8000824c7c90 x28: 0000000000000000 x27: 0000000000000000
[  105.311544] x26: 1ffe000018c3ad21 x25: 0000000000000000 x24: ffff8000824c7ce0
[  105.312409] x23: ffff8000824c7d00 x22: 0000000000000000 x21: 1ffff00010498f82
[  105.312970] x20: ffff9ec8af9fcae0 x19: ffff800080087990 x18: 000000003af64f93
[  105.313411] x17: 00000000cc1cefff x16: 0000000074f35340 x15: 00000000bc0dbbac
[  105.313851] x14: 0000000090b3b1a1 x13: 00000000c4a44370 x12: ffff73d916712189
[  105.314216] x11: 1ffff3d916712188 x10: ffff73d916712188 x9 : ffff9ec8ad03e094
[  105.314673] x8 : ffff9ec8b3890c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  105.315091] x5 : ffff700010498f82 x4 : 1ffff00010010f3b x3 : 1ffff3d915f3f95c
[  105.315508] x2 : 1ffff3d915f3f95c x1 : 0000000000000003 x0 : 0000000000000000
[  105.315923] Call trace:
[  105.316273]  intlog10+0x38/0x48 (P)
[  105.316500]  kunit_try_run_case+0x170/0x3f0
[  105.316763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  105.317067]  kthread+0x328/0x630
[  105.317262]  ret_from_fork+0x10/0x20
[  105.317506] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  105.257924] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/652
[  105.263113] Modules linked in:
[  105.263903] CPU: 1 UID: 0 PID: 652 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[  105.264850] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  105.265179] Hardware name: linux,dummy-virt (DT)
[  105.265612] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  105.266204] pc : intlog2+0xd8/0xf8
[  105.266622] lr : intlog2_test+0xe4/0x200
[  105.267006] sp : ffff8000824b7c10
[  105.267332] x29: ffff8000824b7c90 x28: 0000000000000000 x27: 0000000000000000
[  105.268137] x26: 1ffe0000187e6d41 x25: 0000000000000000 x24: ffff8000824b7ce0
[  105.268850] x23: ffff8000824b7d00 x22: 0000000000000000 x21: 1ffff00010496f82
[  105.269445] x20: ffff9ec8af9fc9e0 x19: ffff800080087990 x18: 000000002ed1ac3e
[  105.269837] x17: 000000009bf7ebab x16: fff00000c613143c x15: fff00000ff616b08
[  105.270320] x14: 0000000000018fff x13: 1ffe00001b48c5cd x12: ffff73d916712189
[  105.270772] x11: 1ffff3d916712188 x10: ffff73d916712188 x9 : ffff9ec8ad03e294
[  105.271227] x8 : ffff9ec8b3890c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  105.271679] x5 : ffff700010496f82 x4 : 1ffff00010010f3b x3 : 1ffff3d915f3f93c
[  105.272228] x2 : 1ffff3d915f3f93c x1 : 0000000000000003 x0 : 0000000000000000
[  105.272788] Call trace:
[  105.272968]  intlog2+0xd8/0xf8 (P)
[  105.273224]  kunit_try_run_case+0x170/0x3f0
[  105.273501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  105.273818]  kthread+0x328/0x630
[  105.274053]  ret_from_fork+0x10/0x20
[  105.274336] ---[ end trace 0000000000000000 ]---