Hay
Date
June 26, 2025, 9:10 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   29.389999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   29.579256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   29.567637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   29.401323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   29.473754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   29.309249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   29.481941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   29.587365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   29.463394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   29.247757] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   29.272834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   29.204662] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   61.740813] ==================================================================
[   61.740868] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   61.740868] 
[   61.740945] Use-after-free read at 0x00000000175f0895 (in kfence-#164):
[   61.740997]  test_krealloc+0x51c/0x830
[   61.741040]  kunit_try_run_case+0x170/0x3f0
[   61.741101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.741147]  kthread+0x328/0x630
[   61.741184]  ret_from_fork+0x10/0x20
[   61.741225] 
[   61.741247] kfence-#164: 0x00000000175f0895-0x000000008358d7e8, size=32, cache=kmalloc-32
[   61.741247] 
[   61.741302] allocated by task 349 on cpu 1 at 61.740240s (0.001059s ago):
[   61.741372]  test_alloc+0x29c/0x628
[   61.741413]  test_krealloc+0xc0/0x830
[   61.741453]  kunit_try_run_case+0x170/0x3f0
[   61.741493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.741537]  kthread+0x328/0x630
[   61.741572]  ret_from_fork+0x10/0x20
[   61.741611] 
[   61.741634] freed by task 349 on cpu 1 at 61.740441s (0.001190s ago):
[   61.741696]  krealloc_noprof+0x148/0x360
[   61.741736]  test_krealloc+0x1dc/0x830
[   61.741775]  kunit_try_run_case+0x170/0x3f0
[   61.741815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.741857]  kthread+0x328/0x630
[   61.741893]  ret_from_fork+0x10/0x20
[   61.741930] 
[   61.741970] CPU: 1 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   61.742049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.742090] Hardware name: linux,dummy-virt (DT)
[   61.742124] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   32.712472] ==================================================================
[   32.712564] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   32.712564] 
[   32.712623] Invalid free of 0x0000000005fd3809 (in kfence-#102):
[   32.712676]  test_double_free+0x100/0x238
[   32.712723]  kunit_try_run_case+0x170/0x3f0
[   32.712768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.712810]  kthread+0x328/0x630
[   32.712850]  ret_from_fork+0x10/0x20
[   32.712888] 
[   32.712911] kfence-#102: 0x0000000005fd3809-0x00000000aa42abcf, size=32, cache=test
[   32.712911] 
[   32.712964] allocated by task 317 on cpu 1 at 32.712246s (0.000714s ago):
[   32.713026]  test_alloc+0x230/0x628
[   32.713082]  test_double_free+0xd4/0x238
[   32.713123]  kunit_try_run_case+0x170/0x3f0
[   32.713162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.713206]  kthread+0x328/0x630
[   32.713241]  ret_from_fork+0x10/0x20
[   32.713285] 
[   32.713309] freed by task 317 on cpu 1 at 32.712310s (0.000996s ago):
[   32.713373]  test_double_free+0xf0/0x238
[   32.713415]  kunit_try_run_case+0x170/0x3f0
[   32.713454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.713501]  kthread+0x328/0x630
[   32.713537]  ret_from_fork+0x10/0x20
[   32.713575] 
[   32.713617] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   32.713702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.713731] Hardware name: linux,dummy-virt (DT)
[   32.713764] ==================================================================
[   32.608523] ==================================================================
[   32.608638] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   32.608638] 
[   32.608707] Invalid free of 0x000000005a8da5eb (in kfence-#101):
[   32.608772]  test_double_free+0x1bc/0x238
[   32.608819]  kunit_try_run_case+0x170/0x3f0
[   32.608864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.608908]  kthread+0x328/0x630
[   32.608948]  ret_from_fork+0x10/0x20
[   32.608988] 
[   32.609011] kfence-#101: 0x000000005a8da5eb-0x000000008d5feff4, size=32, cache=kmalloc-32
[   32.609011] 
[   32.609083] allocated by task 315 on cpu 0 at 32.608208s (0.000871s ago):
[   32.609147]  test_alloc+0x29c/0x628
[   32.609190]  test_double_free+0xd4/0x238
[   32.609232]  kunit_try_run_case+0x170/0x3f0
[   32.609273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.609318]  kthread+0x328/0x630
[   32.609352]  ret_from_fork+0x10/0x20
[   32.609392] 
[   32.609417] freed by task 315 on cpu 0 at 32.608285s (0.001128s ago):
[   32.609478]  test_double_free+0x1ac/0x238
[   32.609521]  kunit_try_run_case+0x170/0x3f0
[   32.609562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.609605]  kthread+0x328/0x630
[   32.609642]  ret_from_fork+0x10/0x20
[   32.609682] 
[   32.609726] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   32.609809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.609837] Hardware name: linux,dummy-virt (DT)
[   32.609869] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   61.668224] ==================================================================
[   61.668323] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   61.668323] 
[   61.668423] Use-after-free read at 0x0000000018296a5c (in kfence-#163):
[   61.668477]  test_memcache_typesafe_by_rcu+0x280/0x560
[   61.668527]  kunit_try_run_case+0x170/0x3f0
[   61.668574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.668619]  kthread+0x328/0x630
[   61.668659]  ret_from_fork+0x10/0x20
[   61.668700] 
[   61.668724] kfence-#163: 0x0000000018296a5c-0x00000000e4053b35, size=32, cache=test
[   61.668724] 
[   61.668777] allocated by task 347 on cpu 0 at 61.636300s (0.032473s ago):
[   61.668849]  test_alloc+0x230/0x628
[   61.668891]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   61.668936]  kunit_try_run_case+0x170/0x3f0
[   61.668975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.669019]  kthread+0x328/0x630
[   61.669067]  ret_from_fork+0x10/0x20
[   61.669108] 
[   61.669131] freed by task 347 on cpu 0 at 61.636412s (0.032715s ago):
[   61.669189]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   61.669234]  kunit_try_run_case+0x170/0x3f0
[   61.669274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.669317]  kthread+0x328/0x630
[   61.669353]  ret_from_fork+0x10/0x20
[   61.669392] 
[   61.669438] CPU: 0 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   61.669523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.669554] Hardware name: linux,dummy-virt (DT)
[   61.669588] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   38.663691] ==================================================================
[   38.665274] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   38.665274] 
[   38.665401] Invalid read at 0x00000000a9a798b9:
[   38.665467]  test_invalid_access+0xdc/0x1f0
[   38.665522]  kunit_try_run_case+0x170/0x3f0
[   38.665575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.665626]  kthread+0x328/0x630
[   38.665670]  ret_from_fork+0x10/0x20
[   38.665741] 
[   38.665793] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   38.665884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.665919] Hardware name: linux,dummy-virt (DT)
[   38.665958] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   38.432392] ==================================================================
[   38.432481] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   38.432481] 
[   38.432543] Corrupted memory at 0x00000000d786a0e4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#157):
[   38.432851]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   38.432899]  kunit_try_run_case+0x170/0x3f0
[   38.432943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.432990]  kthread+0x328/0x630
[   38.433028]  ret_from_fork+0x10/0x20
[   38.433083] 
[   38.433106] kfence-#157: 0x000000008b039654-0x0000000001a1429f, size=73, cache=kmalloc-96
[   38.433106] 
[   38.433162] allocated by task 337 on cpu 1 at 38.432163s (0.000996s ago):
[   38.433224]  test_alloc+0x29c/0x628
[   38.433264]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   38.433309]  kunit_try_run_case+0x170/0x3f0
[   38.433350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.433394]  kthread+0x328/0x630
[   38.433431]  ret_from_fork+0x10/0x20
[   38.433470] 
[   38.433495] freed by task 337 on cpu 1 at 38.432305s (0.001186s ago):
[   38.433559]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   38.433603]  kunit_try_run_case+0x170/0x3f0
[   38.433643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.433688]  kthread+0x328/0x630
[   38.433723]  ret_from_fork+0x10/0x20
[   38.433762] 
[   38.433803] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   38.433891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.433921] Hardware name: linux,dummy-virt (DT)
[   38.433955] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   38.328359] ==================================================================
[   38.328424] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   38.328424] 
[   38.328514] Out-of-bounds read at 0x000000004f555c9f (105B right of kfence-#156):
[   38.328572]  test_kmalloc_aligned_oob_read+0x238/0x468
[   38.328624]  kunit_try_run_case+0x170/0x3f0
[   38.328671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.328718]  kthread+0x328/0x630
[   38.328756]  ret_from_fork+0x10/0x20
[   38.328795] 
[   38.328819] kfence-#156: 0x000000008bee5ba7-0x00000000e3476c33, size=73, cache=kmalloc-96
[   38.328819] 
[   38.328871] allocated by task 335 on cpu 1 at 38.328131s (0.000736s ago):
[   38.328942]  test_alloc+0x29c/0x628
[   38.328981]  test_kmalloc_aligned_oob_read+0x100/0x468
[   38.329025]  kunit_try_run_case+0x170/0x3f0
[   38.329078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.329123]  kthread+0x328/0x630
[   38.329159]  ret_from_fork+0x10/0x20
[   38.329199] 
[   38.329243] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   38.329326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.329355] Hardware name: linux,dummy-virt (DT)
[   38.329391] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   33.752378] ==================================================================
[   33.752471] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   33.752471] 
[   33.752533] Corrupted memory at 0x000000008b925bc2 [ ! ] (in kfence-#112):
[   33.752645]  test_corruption+0x1d8/0x378
[   33.752691]  kunit_try_run_case+0x170/0x3f0
[   33.752732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.752779]  kthread+0x328/0x630
[   33.752815]  ret_from_fork+0x10/0x20
[   33.752855] 
[   33.752878] kfence-#112: 0x000000009f6a8af5-0x000000003ddd049e, size=32, cache=test
[   33.752878] 
[   33.752932] allocated by task 325 on cpu 1 at 33.752231s (0.000697s ago):
[   33.752994]  test_alloc+0x230/0x628
[   33.753035]  test_corruption+0x198/0x378
[   33.753088]  kunit_try_run_case+0x170/0x3f0
[   33.753129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.753173]  kthread+0x328/0x630
[   33.753209]  ret_from_fork+0x10/0x20
[   33.753248] 
[   33.753271] freed by task 325 on cpu 1 at 33.752290s (0.000977s ago):
[   33.753333]  test_corruption+0x1d8/0x378
[   33.753373]  kunit_try_run_case+0x170/0x3f0
[   33.753411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.753456]  kthread+0x328/0x630
[   33.753492]  ret_from_fork+0x10/0x20
[   33.753531] 
[   33.753572] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   33.753653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.753682] Hardware name: linux,dummy-virt (DT)
[   33.753716] ==================================================================
[   33.232505] ==================================================================
[   33.232597] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   33.232597] 
[   33.232657] Corrupted memory at 0x00000000749fc7dc [ ! ] (in kfence-#107):
[   33.232783]  test_corruption+0x284/0x378
[   33.232829]  kunit_try_run_case+0x170/0x3f0
[   33.232875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.232921]  kthread+0x328/0x630
[   33.232959]  ret_from_fork+0x10/0x20
[   33.232998] 
[   33.233022] kfence-#107: 0x00000000b325253e-0x00000000f4551a42, size=32, cache=kmalloc-32
[   33.233022] 
[   33.233093] allocated by task 323 on cpu 1 at 33.232232s (0.000858s ago):
[   33.233154]  test_alloc+0x29c/0x628
[   33.233195]  test_corruption+0x198/0x378
[   33.233234]  kunit_try_run_case+0x170/0x3f0
[   33.233274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.233319]  kthread+0x328/0x630
[   33.233354]  ret_from_fork+0x10/0x20
[   33.233392] 
[   33.233415] freed by task 323 on cpu 1 at 33.232336s (0.001075s ago):
[   33.233477]  test_corruption+0x284/0x378
[   33.233517]  kunit_try_run_case+0x170/0x3f0
[   33.233558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.233603]  kthread+0x328/0x630
[   33.233640]  ret_from_fork+0x10/0x20
[   33.233678] 
[   33.233719] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   33.233800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.233830] Hardware name: linux,dummy-virt (DT)
[   33.233863] ==================================================================
[   33.544361] ==================================================================
[   33.544452] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   33.544452] 
[   33.544514] Corrupted memory at 0x00000000ec56ab1d [ ! . . . . . . . . . . . . . . . ] (in kfence-#110):
[   33.544822]  test_corruption+0x120/0x378
[   33.544868]  kunit_try_run_case+0x170/0x3f0
[   33.544912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.544957]  kthread+0x328/0x630
[   33.544994]  ret_from_fork+0x10/0x20
[   33.545033] 
[   33.545070] kfence-#110: 0x000000003bea5582-0x00000000329a65a1, size=32, cache=test
[   33.545070] 
[   33.545124] allocated by task 325 on cpu 1 at 33.544217s (0.000903s ago):
[   33.545186]  test_alloc+0x230/0x628
[   33.545225]  test_corruption+0xdc/0x378
[   33.545265]  kunit_try_run_case+0x170/0x3f0
[   33.545304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.545348]  kthread+0x328/0x630
[   33.545384]  ret_from_fork+0x10/0x20
[   33.545424] 
[   33.545447] freed by task 325 on cpu 1 at 33.544275s (0.001168s ago):
[   33.545508]  test_corruption+0x120/0x378
[   33.545546]  kunit_try_run_case+0x170/0x3f0
[   33.545586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.545630]  kthread+0x328/0x630
[   33.545667]  ret_from_fork+0x10/0x20
[   33.545706] 
[   33.545747] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   33.545828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.545863] Hardware name: linux,dummy-virt (DT)
[   33.545897] ==================================================================
[   33.024485] ==================================================================
[   33.024593] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   33.024593] 
[   33.024660] Corrupted memory at 0x00000000eeff6def [ ! . . . . . . . . . . . . . . . ] (in kfence-#105):
[   33.025768]  test_corruption+0x278/0x378
[   33.025820]  kunit_try_run_case+0x170/0x3f0
[   33.025866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.025912]  kthread+0x328/0x630
[   33.025951]  ret_from_fork+0x10/0x20
[   33.025990] 
[   33.026015] kfence-#105: 0x000000009e13af56-0x00000000556e2783, size=32, cache=kmalloc-32
[   33.026015] 
[   33.026084] allocated by task 323 on cpu 1 at 33.024207s (0.001873s ago):
[   33.026148]  test_alloc+0x29c/0x628
[   33.026194]  test_corruption+0xdc/0x378
[   33.026236]  kunit_try_run_case+0x170/0x3f0
[   33.026276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.026321]  kthread+0x328/0x630
[   33.026355]  ret_from_fork+0x10/0x20
[   33.026393] 
[   33.026416] freed by task 323 on cpu 1 at 33.024310s (0.002102s ago):
[   33.026476]  test_corruption+0x278/0x378
[   33.026515]  kunit_try_run_case+0x170/0x3f0
[   33.026556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.026600]  kthread+0x328/0x630
[   33.026634]  ret_from_fork+0x10/0x20
[   33.026671] 
[   33.026716] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   33.026796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.026825] Hardware name: linux,dummy-virt (DT)
[   33.026858] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   32.920288] ==================================================================
[   32.920380] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   32.920380] 
[   32.920440] Invalid free of 0x0000000064b0d3d9 (in kfence-#104):
[   32.920493]  test_invalid_addr_free+0xec/0x238
[   32.920538]  kunit_try_run_case+0x170/0x3f0
[   32.920582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.920627]  kthread+0x328/0x630
[   32.920666]  ret_from_fork+0x10/0x20
[   32.920707] 
[   32.920730] kfence-#104: 0x000000009ab57773-0x000000008a2d4367, size=32, cache=test
[   32.920730] 
[   32.920784] allocated by task 321 on cpu 0 at 32.920164s (0.000617s ago):
[   32.920846]  test_alloc+0x230/0x628
[   32.920888]  test_invalid_addr_free+0xd4/0x238
[   32.920930]  kunit_try_run_case+0x170/0x3f0
[   32.920971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.921014]  kthread+0x328/0x630
[   32.921051]  ret_from_fork+0x10/0x20
[   32.921102] 
[   32.921144] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   32.921226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.921256] Hardware name: linux,dummy-virt (DT)
[   32.921290] ==================================================================
[   32.816320] ==================================================================
[   32.816410] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   32.816410] 
[   32.816471] Invalid free of 0x00000000ad389971 (in kfence-#103):
[   32.816525]  test_invalid_addr_free+0x1ac/0x238
[   32.816573]  kunit_try_run_case+0x170/0x3f0
[   32.816618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.816664]  kthread+0x328/0x630
[   32.816702]  ret_from_fork+0x10/0x20
[   32.816743] 
[   32.816768] kfence-#103: 0x00000000453b4d46-0x00000000c193db95, size=32, cache=kmalloc-32
[   32.816768] 
[   32.816823] allocated by task 319 on cpu 0 at 32.816182s (0.000637s ago):
[   32.816886]  test_alloc+0x29c/0x628
[   32.816927]  test_invalid_addr_free+0xd4/0x238
[   32.816969]  kunit_try_run_case+0x170/0x3f0
[   32.817011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.817067]  kthread+0x328/0x630
[   32.817103]  ret_from_fork+0x10/0x20
[   32.817143] 
[   32.817185] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   32.817267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.817297] Hardware name: linux,dummy-virt (DT)
[   32.817330] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   32.296335] ==================================================================
[   32.296434] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   32.296434] 
[   32.296527] Use-after-free read at 0x000000005ec7a20b (in kfence-#98):
[   32.296578]  test_use_after_free_read+0x114/0x248
[   32.296626]  kunit_try_run_case+0x170/0x3f0
[   32.296670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.296716]  kthread+0x328/0x630
[   32.296756]  ret_from_fork+0x10/0x20
[   32.296795] 
[   32.296819] kfence-#98: 0x000000005ec7a20b-0x0000000003bf2e4f, size=32, cache=test
[   32.296819] 
[   32.296869] allocated by task 309 on cpu 0 at 32.296148s (0.000718s ago):
[   32.296939]  test_alloc+0x230/0x628
[   32.296981]  test_use_after_free_read+0xd0/0x248
[   32.297022]  kunit_try_run_case+0x170/0x3f0
[   32.297077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.297121]  kthread+0x328/0x630
[   32.297156]  ret_from_fork+0x10/0x20
[   32.297196] 
[   32.297219] freed by task 309 on cpu 0 at 32.296210s (0.001005s ago):
[   32.297322]  test_use_after_free_read+0xf0/0x248
[   32.297366]  kunit_try_run_case+0x170/0x3f0
[   32.297405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.297449]  kthread+0x328/0x630
[   32.297486]  ret_from_fork+0x10/0x20
[   32.297526] 
[   32.297567] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   32.297650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.297679] Hardware name: linux,dummy-virt (DT)
[   32.297712] ==================================================================
[   32.192482] ==================================================================
[   32.192578] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   32.192578] 
[   32.192675] Use-after-free read at 0x00000000a7b6b200 (in kfence-#97):
[   32.192726]  test_use_after_free_read+0x114/0x248
[   32.192774]  kunit_try_run_case+0x170/0x3f0
[   32.192817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.192861]  kthread+0x328/0x630
[   32.192900]  ret_from_fork+0x10/0x20
[   32.192939] 
[   32.192964] kfence-#97: 0x00000000a7b6b200-0x000000001cb8b366, size=32, cache=kmalloc-32
[   32.192964] 
[   32.193016] allocated by task 307 on cpu 0 at 32.192219s (0.000794s ago):
[   32.193105]  test_alloc+0x29c/0x628
[   32.193145]  test_use_after_free_read+0xd0/0x248
[   32.193188]  kunit_try_run_case+0x170/0x3f0
[   32.193227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.193271]  kthread+0x328/0x630
[   32.193307]  ret_from_fork+0x10/0x20
[   32.193348] 
[   32.193373] freed by task 307 on cpu 0 at 32.192296s (0.001073s ago):
[   32.193434]  test_use_after_free_read+0x1c0/0x248
[   32.193477]  kunit_try_run_case+0x170/0x3f0
[   32.193517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.193562]  kthread+0x328/0x630
[   32.193598]  ret_from_fork+0x10/0x20
[   32.193639] 
[   32.193686] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   32.193771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.193800] Hardware name: linux,dummy-virt (DT)
[   32.193834] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   31.776488] ==================================================================
[   31.776598] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   31.776598] 
[   31.776698] Out-of-bounds write at 0x00000000fdaf747a (1B left of kfence-#93):
[   31.776756]  test_out_of_bounds_write+0x100/0x240
[   31.776805]  kunit_try_run_case+0x170/0x3f0
[   31.776850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.776896]  kthread+0x328/0x630
[   31.776936]  ret_from_fork+0x10/0x20
[   31.776978] 
[   31.777002] kfence-#93: 0x00000000d7853093-0x00000000cb85a1e6, size=32, cache=kmalloc-32
[   31.777002] 
[   31.777069] allocated by task 303 on cpu 1 at 31.776317s (0.000734s ago):
[   31.777143]  test_alloc+0x29c/0x628
[   31.777183]  test_out_of_bounds_write+0xc8/0x240
[   31.777226]  kunit_try_run_case+0x170/0x3f0
[   31.777268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.777311]  kthread+0x328/0x630
[   31.777347]  ret_from_fork+0x10/0x20
[   31.777388] 
[   31.777433] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   31.777516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.777546] Hardware name: linux,dummy-virt (DT)
[   31.777581] ==================================================================
[   32.088299] ==================================================================
[   32.088398] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   32.088398] 
[   32.088489] Out-of-bounds write at 0x000000001f397e69 (1B left of kfence-#96):
[   32.088546]  test_out_of_bounds_write+0x100/0x240
[   32.088595]  kunit_try_run_case+0x170/0x3f0
[   32.088638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.088683]  kthread+0x328/0x630
[   32.088722]  ret_from_fork+0x10/0x20
[   32.088762] 
[   32.088787] kfence-#96: 0x0000000070491222-0x000000000b4d4949, size=32, cache=test
[   32.088787] 
[   32.088838] allocated by task 305 on cpu 1 at 32.088218s (0.000616s ago):
[   32.088910]  test_alloc+0x230/0x628
[   32.088950]  test_out_of_bounds_write+0xc8/0x240
[   32.088991]  kunit_try_run_case+0x170/0x3f0
[   32.089032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.089087]  kthread+0x328/0x630
[   32.089122]  ret_from_fork+0x10/0x20
[   32.089162] 
[   32.089204] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   32.089287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.089316] Hardware name: linux,dummy-virt (DT)
[   32.089350] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   31.361256] ==================================================================
[   31.361467] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   31.361467] 
[   31.361559] Out-of-bounds read at 0x0000000044a8d6d1 (1B left of kfence-#89):
[   31.361794]  test_out_of_bounds_read+0x114/0x3e0
[   31.361857]  kunit_try_run_case+0x170/0x3f0
[   31.361900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.362222]  kthread+0x328/0x630
[   31.362354]  ret_from_fork+0x10/0x20
[   31.362397] 
[   31.362460] kfence-#89: 0x00000000b19f61c8-0x0000000097623cb4, size=32, cache=test
[   31.362460] 
[   31.362642] allocated by task 301 on cpu 0 at 31.361019s (0.001615s ago):
[   31.362915]  test_alloc+0x230/0x628
[   31.363225]  test_out_of_bounds_read+0xdc/0x3e0
[   31.363285]  kunit_try_run_case+0x170/0x3f0
[   31.363440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.363554]  kthread+0x328/0x630
[   31.363716]  ret_from_fork+0x10/0x20
[   31.363772] 
[   31.364040] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   31.364147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.364542] Hardware name: linux,dummy-virt (DT)
[   31.364680] ==================================================================
[   31.464974] ==================================================================
[   31.465599] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   31.465599] 
[   31.465753] Out-of-bounds read at 0x00000000363d35d5 (32B right of kfence-#90):
[   31.465846]  test_out_of_bounds_read+0x1c8/0x3e0
[   31.465950]  kunit_try_run_case+0x170/0x3f0
[   31.465997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.466148]  kthread+0x328/0x630
[   31.466624]  ret_from_fork+0x10/0x20
[   31.466692] 
[   31.466718] kfence-#90: 0x000000006426b791-0x00000000ae1296bb, size=32, cache=test
[   31.466718] 
[   31.466782] allocated by task 301 on cpu 0 at 31.464875s (0.001903s ago):
[   31.466896]  test_alloc+0x230/0x628
[   31.466948]  test_out_of_bounds_read+0x198/0x3e0
[   31.466989]  kunit_try_run_case+0x170/0x3f0
[   31.467029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.467093]  kthread+0x328/0x630
[   31.467128]  ret_from_fork+0x10/0x20
[   31.467174] 
[   31.467215] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   31.467297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.467324] Hardware name: linux,dummy-virt (DT)
[   31.467359] ==================================================================
[   30.217685] ==================================================================
[   30.217791] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   30.217791] 
[   30.217960] Out-of-bounds read at 0x00000000cd83b21f (1B left of kfence-#78):
[   30.218270]  test_out_of_bounds_read+0x114/0x3e0
[   30.218372]  kunit_try_run_case+0x170/0x3f0
[   30.218419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.218464]  kthread+0x328/0x630
[   30.218512]  ret_from_fork+0x10/0x20
[   30.218554] 
[   30.218578] kfence-#78: 0x00000000759e344e-0x00000000f3b8c259, size=32, cache=kmalloc-32
[   30.218578] 
[   30.218641] allocated by task 299 on cpu 0 at 30.217151s (0.001475s ago):
[   30.218714]  test_alloc+0x29c/0x628
[   30.218758]  test_out_of_bounds_read+0xdc/0x3e0
[   30.218799]  kunit_try_run_case+0x170/0x3f0
[   30.218847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.218898]  kthread+0x328/0x630
[   30.218934]  ret_from_fork+0x10/0x20
[   30.218990] 
[   30.219039] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.219137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.219166] Hardware name: linux,dummy-virt (DT)
[   30.219201] ==================================================================
[   30.737741] ==================================================================
[   30.737828] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   30.737828] 
[   30.738172] Out-of-bounds read at 0x00000000c7368ccb (32B right of kfence-#83):
[   30.738296]  test_out_of_bounds_read+0x1c8/0x3e0
[   30.738476]  kunit_try_run_case+0x170/0x3f0
[   30.738522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.738566]  kthread+0x328/0x630
[   30.738603]  ret_from_fork+0x10/0x20
[   30.738688] 
[   30.738714] kfence-#83: 0x00000000a0315d10-0x0000000033a9e7f9, size=32, cache=kmalloc-32
[   30.738714] 
[   30.738830] allocated by task 299 on cpu 0 at 30.737324s (0.001485s ago):
[   30.738937]  test_alloc+0x29c/0x628
[   30.739160]  test_out_of_bounds_read+0x198/0x3e0
[   30.739225]  kunit_try_run_case+0x170/0x3f0
[   30.739268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.739320]  kthread+0x328/0x630
[   30.739357]  ret_from_fork+0x10/0x20
[   30.739520] 
[   30.739573] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.739773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.740082] Hardware name: linux,dummy-virt (DT)
[   30.740158] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-kmalloc_uaf2
[   26.968567] ==================================================================
[   26.968657] BUG: KFENCE: use-after-free read in kmalloc_uaf2+0x1dc/0x468
[   26.968657] 
[   26.968970] Use-after-free read at 0x00000000953835b2 (in kfence-#57):
[   26.969456]  kmalloc_uaf2+0x1dc/0x468
[   26.969594]  kunit_try_run_case+0x170/0x3f0
[   26.969768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.969872]  kthread+0x328/0x630
[   26.969917]  ret_from_fork+0x10/0x20
[   26.970141] 
[   26.970378] kfence-#57: 0x000000007e8cec2b-0x00000000582a89c3, size=43, cache=kmalloc-64
[   26.970378] 
[   26.970823] allocated by task 200 on cpu 0 at 26.962661s (0.008092s ago):
[   26.971708]  kmalloc_uaf2+0xc4/0x468
[   26.971960]  kunit_try_run_case+0x170/0x3f0
[   26.972206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.972263]  kthread+0x328/0x630
[   26.972297]  ret_from_fork+0x10/0x20
[   26.972384] 
[   26.972900] freed by task 200 on cpu 0 at 26.962728s (0.009696s ago):
[   26.973468]  kmalloc_uaf2+0x134/0x468
[   26.973517]  kunit_try_run_case+0x170/0x3f0
[   26.973555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.973853]  kthread+0x328/0x630
[   26.973912]  ret_from_fork+0x10/0x20
[   26.974007] 
[   26.974385] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.974484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.974512] Hardware name: linux,dummy-virt (DT)
[   26.975071] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   30.089091] ==================================================================
[   30.089283] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   30.089463] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.089621] 
[   30.089661] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.089751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.089780] Hardware name: linux,dummy-virt (DT)
[   30.089841] Call trace:
[   30.089867]  show_stack+0x20/0x38 (C)
[   30.089918]  dump_stack_lvl+0x8c/0xd0
[   30.089995]  print_report+0x118/0x608
[   30.090046]  kasan_report+0xdc/0x128
[   30.090105]  kasan_check_range+0x100/0x1a8
[   30.090163]  __kasan_check_write+0x20/0x30
[   30.090210]  strncpy_from_user+0x3c/0x2a0
[   30.090258]  copy_user_test_oob+0x5c0/0xec8
[   30.090309]  kunit_try_run_case+0x170/0x3f0
[   30.090361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.090425]  kthread+0x328/0x630
[   30.090471]  ret_from_fork+0x10/0x20
[   30.090530] 
[   30.090550] Allocated by task 297:
[   30.090579]  kasan_save_stack+0x3c/0x68
[   30.090632]  kasan_save_track+0x20/0x40
[   30.090679]  kasan_save_alloc_info+0x40/0x58
[   30.090716]  __kasan_kmalloc+0xd4/0xd8
[   30.090762]  __kmalloc_noprof+0x198/0x4c8
[   30.090810]  kunit_kmalloc_array+0x34/0x88
[   30.090859]  copy_user_test_oob+0xac/0xec8
[   30.090899]  kunit_try_run_case+0x170/0x3f0
[   30.090938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.090984]  kthread+0x328/0x630
[   30.091017]  ret_from_fork+0x10/0x20
[   30.091366] 
[   30.091424] The buggy address belongs to the object at fff00000c5773e00
[   30.091424]  which belongs to the cache kmalloc-128 of size 128
[   30.091756] The buggy address is located 0 bytes inside of
[   30.091756]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.091864] 
[   30.091914] The buggy address belongs to the physical page:
[   30.092164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.092240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.092549] page_type: f5(slab)
[   30.092676] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.093017] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.093695] page dumped because: kasan: bad access detected
[   30.094150] 
[   30.094218] Memory state around the buggy address:
[   30.094255]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.094309]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.094512] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.094845]                                                                 ^
[   30.095159]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.095499]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.095585] ==================================================================
[   30.096977] ==================================================================
[   30.097155] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   30.097217] Write of size 1 at addr fff00000c5773e78 by task kunit_try_catch/297
[   30.097270] 
[   30.097334] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.097454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.097482] Hardware name: linux,dummy-virt (DT)
[   30.097514] Call trace:
[   30.097538]  show_stack+0x20/0x38 (C)
[   30.097588]  dump_stack_lvl+0x8c/0xd0
[   30.097635]  print_report+0x118/0x608
[   30.097684]  kasan_report+0xdc/0x128
[   30.097754]  __asan_report_store1_noabort+0x20/0x30
[   30.097814]  strncpy_from_user+0x270/0x2a0
[   30.097863]  copy_user_test_oob+0x5c0/0xec8
[   30.097920]  kunit_try_run_case+0x170/0x3f0
[   30.097970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.098025]  kthread+0x328/0x630
[   30.098526]  ret_from_fork+0x10/0x20
[   30.098888] 
[   30.098925] Allocated by task 297:
[   30.098956]  kasan_save_stack+0x3c/0x68
[   30.099009]  kasan_save_track+0x20/0x40
[   30.099546]  kasan_save_alloc_info+0x40/0x58
[   30.099612]  __kasan_kmalloc+0xd4/0xd8
[   30.099844]  __kmalloc_noprof+0x198/0x4c8
[   30.099928]  kunit_kmalloc_array+0x34/0x88
[   30.099981]  copy_user_test_oob+0xac/0xec8
[   30.100034]  kunit_try_run_case+0x170/0x3f0
[   30.100246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.100382]  kthread+0x328/0x630
[   30.100587]  ret_from_fork+0x10/0x20
[   30.100779] 
[   30.100969] The buggy address belongs to the object at fff00000c5773e00
[   30.100969]  which belongs to the cache kmalloc-128 of size 128
[   30.101094] The buggy address is located 0 bytes to the right of
[   30.101094]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.101344] 
[   30.101776] The buggy address belongs to the physical page:
[   30.101814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.102209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.102390] page_type: f5(slab)
[   30.102501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.102653] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.102883] page dumped because: kasan: bad access detected
[   30.102990] 
[   30.103410] Memory state around the buggy address:
[   30.103812]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.104031]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.104183] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.104352]                                                                 ^
[   30.104443]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.104577]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.104781] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   30.070853] ==================================================================
[   30.071014] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   30.071080] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.071362] 
[   30.071428] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.071523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.071553] Hardware name: linux,dummy-virt (DT)
[   30.071841] Call trace:
[   30.071904]  show_stack+0x20/0x38 (C)
[   30.072064]  dump_stack_lvl+0x8c/0xd0
[   30.072138]  print_report+0x118/0x608
[   30.072278]  kasan_report+0xdc/0x128
[   30.072373]  kasan_check_range+0x100/0x1a8
[   30.072442]  __kasan_check_write+0x20/0x30
[   30.072489]  copy_user_test_oob+0x434/0xec8
[   30.072542]  kunit_try_run_case+0x170/0x3f0
[   30.072902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.073017]  kthread+0x328/0x630
[   30.073352]  ret_from_fork+0x10/0x20
[   30.073525] 
[   30.073605] Allocated by task 297:
[   30.073729]  kasan_save_stack+0x3c/0x68
[   30.073818]  kasan_save_track+0x20/0x40
[   30.074161]  kasan_save_alloc_info+0x40/0x58
[   30.074283]  __kasan_kmalloc+0xd4/0xd8
[   30.074654]  __kmalloc_noprof+0x198/0x4c8
[   30.074981]  kunit_kmalloc_array+0x34/0x88
[   30.075102]  copy_user_test_oob+0xac/0xec8
[   30.075492]  kunit_try_run_case+0x170/0x3f0
[   30.075591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.075667]  kthread+0x328/0x630
[   30.075964]  ret_from_fork+0x10/0x20
[   30.076303] 
[   30.076447] The buggy address belongs to the object at fff00000c5773e00
[   30.076447]  which belongs to the cache kmalloc-128 of size 128
[   30.076611] The buggy address is located 0 bytes inside of
[   30.076611]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.076680] 
[   30.076727] The buggy address belongs to the physical page:
[   30.076768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.077112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.077173] page_type: f5(slab)
[   30.077265] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.077338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.077381] page dumped because: kasan: bad access detected
[   30.077421] 
[   30.077448] Memory state around the buggy address:
[   30.077491]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.077538]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.077580] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.077629]                                                                 ^
[   30.077681]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.077726]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.077767] ==================================================================
[   30.037884] ==================================================================
[   30.037990] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   30.038381] Read of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.038451] 
[   30.038594] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.038699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.038934] Hardware name: linux,dummy-virt (DT)
[   30.039070] Call trace:
[   30.039096]  show_stack+0x20/0x38 (C)
[   30.039151]  dump_stack_lvl+0x8c/0xd0
[   30.039216]  print_report+0x118/0x608
[   30.039320]  kasan_report+0xdc/0x128
[   30.039670]  kasan_check_range+0x100/0x1a8
[   30.039745]  __kasan_check_read+0x20/0x30
[   30.040127]  copy_user_test_oob+0x728/0xec8
[   30.040278]  kunit_try_run_case+0x170/0x3f0
[   30.040351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.040562]  kthread+0x328/0x630
[   30.040714]  ret_from_fork+0x10/0x20
[   30.040915] 
[   30.041201] Allocated by task 297:
[   30.041389]  kasan_save_stack+0x3c/0x68
[   30.041497]  kasan_save_track+0x20/0x40
[   30.041570]  kasan_save_alloc_info+0x40/0x58
[   30.041607]  __kasan_kmalloc+0xd4/0xd8
[   30.041888]  __kmalloc_noprof+0x198/0x4c8
[   30.042025]  kunit_kmalloc_array+0x34/0x88
[   30.042114]  copy_user_test_oob+0xac/0xec8
[   30.042413]  kunit_try_run_case+0x170/0x3f0
[   30.042486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.042633]  kthread+0x328/0x630
[   30.042683]  ret_from_fork+0x10/0x20
[   30.042733] 
[   30.042763] The buggy address belongs to the object at fff00000c5773e00
[   30.042763]  which belongs to the cache kmalloc-128 of size 128
[   30.043086] The buggy address is located 0 bytes inside of
[   30.043086]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.043246] 
[   30.043315] The buggy address belongs to the physical page:
[   30.043369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.043599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.043751] page_type: f5(slab)
[   30.044088] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.044211] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.044285] page dumped because: kasan: bad access detected
[   30.044360] 
[   30.044383] Memory state around the buggy address:
[   30.044418]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.044466]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.044519] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.044697]                                                                 ^
[   30.044888]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.045207]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.045275] ==================================================================
[   30.021808] ==================================================================
[   30.021927] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   30.022271] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.022396] 
[   30.022548] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.022710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.022779] Hardware name: linux,dummy-virt (DT)
[   30.022843] Call trace:
[   30.023136]  show_stack+0x20/0x38 (C)
[   30.023207]  dump_stack_lvl+0x8c/0xd0
[   30.023356]  print_report+0x118/0x608
[   30.023418]  kasan_report+0xdc/0x128
[   30.023493]  kasan_check_range+0x100/0x1a8
[   30.023638]  __kasan_check_write+0x20/0x30
[   30.023701]  copy_user_test_oob+0x234/0xec8
[   30.023985]  kunit_try_run_case+0x170/0x3f0
[   30.024267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.024340]  kthread+0x328/0x630
[   30.024650]  ret_from_fork+0x10/0x20
[   30.024808] 
[   30.024899] Allocated by task 297:
[   30.024978]  kasan_save_stack+0x3c/0x68
[   30.025123]  kasan_save_track+0x20/0x40
[   30.025221]  kasan_save_alloc_info+0x40/0x58
[   30.025411]  __kasan_kmalloc+0xd4/0xd8
[   30.025450]  __kmalloc_noprof+0x198/0x4c8
[   30.025516]  kunit_kmalloc_array+0x34/0x88
[   30.025839]  copy_user_test_oob+0xac/0xec8
[   30.025923]  kunit_try_run_case+0x170/0x3f0
[   30.026099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.026255]  kthread+0x328/0x630
[   30.026355]  ret_from_fork+0x10/0x20
[   30.026747] 
[   30.026797] The buggy address belongs to the object at fff00000c5773e00
[   30.026797]  which belongs to the cache kmalloc-128 of size 128
[   30.026940] The buggy address is located 0 bytes inside of
[   30.026940]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.027044] 
[   30.027164] The buggy address belongs to the physical page:
[   30.027224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.027309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.027773] page_type: f5(slab)
[   30.027852] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.028135] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.028402] page dumped because: kasan: bad access detected
[   30.028474] 
[   30.028623] Memory state around the buggy address:
[   30.028709]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.028809]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.028961] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.029144]                                                                 ^
[   30.029243]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.029303]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.029631] ==================================================================
[   30.063113] ==================================================================
[   30.063176] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   30.063229] Read of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.063549] 
[   30.063601] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.063774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.063846] Hardware name: linux,dummy-virt (DT)
[   30.063904] Call trace:
[   30.064025]  show_stack+0x20/0x38 (C)
[   30.064141]  dump_stack_lvl+0x8c/0xd0
[   30.064361]  print_report+0x118/0x608
[   30.064544]  kasan_report+0xdc/0x128
[   30.064676]  kasan_check_range+0x100/0x1a8
[   30.064793]  __kasan_check_read+0x20/0x30
[   30.065038]  copy_user_test_oob+0x3c8/0xec8
[   30.065193]  kunit_try_run_case+0x170/0x3f0
[   30.065341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.065411]  kthread+0x328/0x630
[   30.065746]  ret_from_fork+0x10/0x20
[   30.066076] 
[   30.066128] Allocated by task 297:
[   30.066208]  kasan_save_stack+0x3c/0x68
[   30.066359]  kasan_save_track+0x20/0x40
[   30.066530]  kasan_save_alloc_info+0x40/0x58
[   30.066746]  __kasan_kmalloc+0xd4/0xd8
[   30.066812]  __kmalloc_noprof+0x198/0x4c8
[   30.067108]  kunit_kmalloc_array+0x34/0x88
[   30.067209]  copy_user_test_oob+0xac/0xec8
[   30.067635]  kunit_try_run_case+0x170/0x3f0
[   30.067738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.067794]  kthread+0x328/0x630
[   30.067829]  ret_from_fork+0x10/0x20
[   30.068165] 
[   30.068255] The buggy address belongs to the object at fff00000c5773e00
[   30.068255]  which belongs to the cache kmalloc-128 of size 128
[   30.068409] The buggy address is located 0 bytes inside of
[   30.068409]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.068634] 
[   30.068663] The buggy address belongs to the physical page:
[   30.068709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.068766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.068827] page_type: f5(slab)
[   30.068898] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.068953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.069012] page dumped because: kasan: bad access detected
[   30.069069] 
[   30.069098] Memory state around the buggy address:
[   30.069143]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.069188]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.069233] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.069271]                                                                 ^
[   30.069312]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.069365]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.069416] ==================================================================
[   30.078605] ==================================================================
[   30.078659] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   30.079033] Read of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.079112] 
[   30.079167] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.079286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.079331] Hardware name: linux,dummy-virt (DT)
[   30.079363] Call trace:
[   30.079388]  show_stack+0x20/0x38 (C)
[   30.079644]  dump_stack_lvl+0x8c/0xd0
[   30.079727]  print_report+0x118/0x608
[   30.079782]  kasan_report+0xdc/0x128
[   30.080048]  kasan_check_range+0x100/0x1a8
[   30.080241]  __kasan_check_read+0x20/0x30
[   30.080394]  copy_user_test_oob+0x4a0/0xec8
[   30.080513]  kunit_try_run_case+0x170/0x3f0
[   30.080726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.080787]  kthread+0x328/0x630
[   30.080835]  ret_from_fork+0x10/0x20
[   30.081220] 
[   30.081260] Allocated by task 297:
[   30.081336]  kasan_save_stack+0x3c/0x68
[   30.081429]  kasan_save_track+0x20/0x40
[   30.081608]  kasan_save_alloc_info+0x40/0x58
[   30.081789]  __kasan_kmalloc+0xd4/0xd8
[   30.081859]  __kmalloc_noprof+0x198/0x4c8
[   30.082317]  kunit_kmalloc_array+0x34/0x88
[   30.082374]  copy_user_test_oob+0xac/0xec8
[   30.082761]  kunit_try_run_case+0x170/0x3f0
[   30.082887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.083123]  kthread+0x328/0x630
[   30.083334]  ret_from_fork+0x10/0x20
[   30.083392] 
[   30.083746] The buggy address belongs to the object at fff00000c5773e00
[   30.083746]  which belongs to the cache kmalloc-128 of size 128
[   30.083826] The buggy address is located 0 bytes inside of
[   30.083826]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.084160] 
[   30.084365] The buggy address belongs to the physical page:
[   30.084413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.084630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.084931] page_type: f5(slab)
[   30.084983] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.085258] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.085304] page dumped because: kasan: bad access detected
[   30.085520] 
[   30.085598] Memory state around the buggy address:
[   30.085700]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.086070]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.086313] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.086414]                                                                 ^
[   30.086568]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.086772]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.087089] ==================================================================
[   30.055186] ==================================================================
[   30.055291] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   30.055366] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.055715] 
[   30.055773] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.055998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.056142] Hardware name: linux,dummy-virt (DT)
[   30.056243] Call trace:
[   30.056341]  show_stack+0x20/0x38 (C)
[   30.056436]  dump_stack_lvl+0x8c/0xd0
[   30.056493]  print_report+0x118/0x608
[   30.056541]  kasan_report+0xdc/0x128
[   30.056588]  kasan_check_range+0x100/0x1a8
[   30.056639]  __kasan_check_write+0x20/0x30
[   30.056886]  copy_user_test_oob+0x35c/0xec8
[   30.057139]  kunit_try_run_case+0x170/0x3f0
[   30.057259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.057426]  kthread+0x328/0x630
[   30.057519]  ret_from_fork+0x10/0x20
[   30.058173] 
[   30.058487] Allocated by task 297:
[   30.058561]  kasan_save_stack+0x3c/0x68
[   30.058664]  kasan_save_track+0x20/0x40
[   30.058705]  kasan_save_alloc_info+0x40/0x58
[   30.058777]  __kasan_kmalloc+0xd4/0xd8
[   30.058858]  __kmalloc_noprof+0x198/0x4c8
[   30.058933]  kunit_kmalloc_array+0x34/0x88
[   30.059282]  copy_user_test_oob+0xac/0xec8
[   30.059378]  kunit_try_run_case+0x170/0x3f0
[   30.059485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.059602]  kthread+0x328/0x630
[   30.059764]  ret_from_fork+0x10/0x20
[   30.059900] 
[   30.059952] The buggy address belongs to the object at fff00000c5773e00
[   30.059952]  which belongs to the cache kmalloc-128 of size 128
[   30.060037] The buggy address is located 0 bytes inside of
[   30.060037]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.060393] 
[   30.060435] The buggy address belongs to the physical page:
[   30.060506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.060580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.060634] page_type: f5(slab)
[   30.060683] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.060738] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.060781] page dumped because: kasan: bad access detected
[   30.060815] 
[   30.060836] Memory state around the buggy address:
[   30.060909]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.060967]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061019] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.061075]                                                                 ^
[   30.061127]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061174]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061216] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   29.978857] ==================================================================
[   29.978921] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   29.978987] Write of size 8 at addr fff00000c5773d78 by task kunit_try_catch/293
[   29.979041] 
[   29.979342] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.979512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.979547] Hardware name: linux,dummy-virt (DT)
[   29.979606] Call trace:
[   29.979656]  show_stack+0x20/0x38 (C)
[   29.979717]  dump_stack_lvl+0x8c/0xd0
[   29.979917]  print_report+0x118/0x608
[   29.980108]  kasan_report+0xdc/0x128
[   29.980241]  kasan_check_range+0x100/0x1a8
[   29.980376]  __kasan_check_write+0x20/0x30
[   29.980525]  copy_to_kernel_nofault+0x8c/0x250
[   29.980657]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   29.980818]  kunit_try_run_case+0x170/0x3f0
[   29.981034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.981212]  kthread+0x328/0x630
[   29.981299]  ret_from_fork+0x10/0x20
[   29.981487] 
[   29.981509] Allocated by task 293:
[   29.981541]  kasan_save_stack+0x3c/0x68
[   29.981899]  kasan_save_track+0x20/0x40
[   29.982328]  kasan_save_alloc_info+0x40/0x58
[   29.982457]  __kasan_kmalloc+0xd4/0xd8
[   29.982523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.982668]  copy_to_kernel_nofault_oob+0xc8/0x418
[   29.982819]  kunit_try_run_case+0x170/0x3f0
[   29.982864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.982973]  kthread+0x328/0x630
[   29.983325]  ret_from_fork+0x10/0x20
[   29.983399] 
[   29.983448] The buggy address belongs to the object at fff00000c5773d00
[   29.983448]  which belongs to the cache kmalloc-128 of size 128
[   29.983511] The buggy address is located 0 bytes to the right of
[   29.983511]  allocated 120-byte region [fff00000c5773d00, fff00000c5773d78)
[   29.983979] 
[   29.984293] The buggy address belongs to the physical page:
[   29.984627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   29.984703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.984756] page_type: f5(slab)
[   29.984798] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.984850] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.984893] page dumped because: kasan: bad access detected
[   29.984928] 
[   29.984947] Memory state around the buggy address:
[   29.984980]  fff00000c5773c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.985026]  fff00000c5773c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.985081] >fff00000c5773d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.985121]                                                                 ^
[   29.985163]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.985207]  fff00000c5773e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.985246] ==================================================================
[   29.970806] ==================================================================
[   29.970900] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   29.971245] Read of size 8 at addr fff00000c5773d78 by task kunit_try_catch/293
[   29.971361] 
[   29.971399] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.971508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.971596] Hardware name: linux,dummy-virt (DT)
[   29.971700] Call trace:
[   29.971813]  show_stack+0x20/0x38 (C)
[   29.972121]  dump_stack_lvl+0x8c/0xd0
[   29.972205]  print_report+0x118/0x608
[   29.972381]  kasan_report+0xdc/0x128
[   29.972509]  __asan_report_load8_noabort+0x20/0x30
[   29.972709]  copy_to_kernel_nofault+0x204/0x250
[   29.972848]  copy_to_kernel_nofault_oob+0x158/0x418
[   29.973282]  kunit_try_run_case+0x170/0x3f0
[   29.973529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.973654]  kthread+0x328/0x630
[   29.973787]  ret_from_fork+0x10/0x20
[   29.973886] 
[   29.973982] Allocated by task 293:
[   29.974374]  kasan_save_stack+0x3c/0x68
[   29.974444]  kasan_save_track+0x20/0x40
[   29.974509]  kasan_save_alloc_info+0x40/0x58
[   29.974661]  __kasan_kmalloc+0xd4/0xd8
[   29.974757]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.975069]  copy_to_kernel_nofault_oob+0xc8/0x418
[   29.975161]  kunit_try_run_case+0x170/0x3f0
[   29.975331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.975401]  kthread+0x328/0x630
[   29.975751]  ret_from_fork+0x10/0x20
[   29.975985] 
[   29.976143] The buggy address belongs to the object at fff00000c5773d00
[   29.976143]  which belongs to the cache kmalloc-128 of size 128
[   29.976287] The buggy address is located 0 bytes to the right of
[   29.976287]  allocated 120-byte region [fff00000c5773d00, fff00000c5773d78)
[   29.976424] 
[   29.976449] The buggy address belongs to the physical page:
[   29.976483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   29.976835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.976920] page_type: f5(slab)
[   29.976970] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.977098] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.977153] page dumped because: kasan: bad access detected
[   29.977202] 
[   29.977224] Memory state around the buggy address:
[   29.977258]  fff00000c5773c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.977303]  fff00000c5773c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.977357] >fff00000c5773d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.977406]                                                                 ^
[   29.977447]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.977502]  fff00000c5773e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.977558] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   29.041195] ==================================================================
[   29.041271] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   29.041328] Read of size 1 at addr ffff800080b17b5f by task kunit_try_catch/263
[   29.041618] 
[   29.041660] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.041775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.041804] Hardware name: linux,dummy-virt (DT)
[   29.041885] Call trace:
[   29.041911]  show_stack+0x20/0x38 (C)
[   29.041962]  dump_stack_lvl+0x8c/0xd0
[   29.042014]  print_report+0x310/0x608
[   29.042195]  kasan_report+0xdc/0x128
[   29.042250]  __asan_report_load1_noabort+0x20/0x30
[   29.042299]  kasan_alloca_oob_left+0x2b8/0x310
[   29.042494]  kunit_try_run_case+0x170/0x3f0
[   29.042613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.042698]  kthread+0x328/0x630
[   29.042753]  ret_from_fork+0x10/0x20
[   29.042804] 
[   29.042826] The buggy address belongs to stack of task kunit_try_catch/263
[   29.042937] 
[   29.043028] The buggy address belongs to the virtual mapping at
[   29.043028]  [ffff800080b10000, ffff800080b19000) created by:
[   29.043028]  kernel_clone+0x150/0x7a8
[   29.043160] 
[   29.043182] The buggy address belongs to the physical page:
[   29.043239] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105785
[   29.043294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.043582] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.043669] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.043748] page dumped because: kasan: bad access detected
[   29.043789] 
[   29.043905] Memory state around the buggy address:
[   29.044042]  ffff800080b17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.044137]  ffff800080b17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.044261] >ffff800080b17b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   29.044436]                                                     ^
[   29.044539]  ffff800080b17b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   29.044585]  ffff800080b17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   29.044801] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   29.923553] ==================================================================
[   29.923603] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   29.924189] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/281
[   29.924321] 
[   29.924521] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.924768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.924937] Hardware name: linux,dummy-virt (DT)
[   29.925027] Call trace:
[   29.925189]  show_stack+0x20/0x38 (C)
[   29.925293]  dump_stack_lvl+0x8c/0xd0
[   29.925344]  print_report+0x310/0x608
[   29.925710]  kasan_report+0xdc/0x128
[   29.925907]  __asan_report_load1_noabort+0x20/0x30
[   29.926109]  vmalloc_oob+0x51c/0x5d0
[   29.926168]  kunit_try_run_case+0x170/0x3f0
[   29.926218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.926273]  kthread+0x328/0x630
[   29.926316]  ret_from_fork+0x10/0x20
[   29.926367] 
[   29.926457] The buggy address belongs to the virtual mapping at
[   29.926457]  [ffff8000800fe000, ffff800080100000) created by:
[   29.926457]  vmalloc_oob+0x98/0x5d0
[   29.926558] 
[   29.926587] The buggy address belongs to the physical page:
[   29.926621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105783
[   29.926686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.926754] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.926817] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.926870] page dumped because: kasan: bad access detected
[   29.926911] 
[   29.926942] Memory state around the buggy address:
[   29.926977]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.927030]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.927087] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   29.927126]                                                                 ^
[   29.927169]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.927223]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.927264] ==================================================================
[   29.915731] ==================================================================
[   29.916043] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   29.916128] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/281
[   29.916430] 
[   29.916538] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.916684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.916794] Hardware name: linux,dummy-virt (DT)
[   29.916931] Call trace:
[   29.917007]  show_stack+0x20/0x38 (C)
[   29.917375]  dump_stack_lvl+0x8c/0xd0
[   29.917592]  print_report+0x310/0x608
[   29.917806]  kasan_report+0xdc/0x128
[   29.917879]  __asan_report_load1_noabort+0x20/0x30
[   29.918106]  vmalloc_oob+0x578/0x5d0
[   29.918303]  kunit_try_run_case+0x170/0x3f0
[   29.918816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.918983]  kthread+0x328/0x630
[   29.919350]  ret_from_fork+0x10/0x20
[   29.919514] 
[   29.919614] The buggy address belongs to the virtual mapping at
[   29.919614]  [ffff8000800fe000, ffff800080100000) created by:
[   29.919614]  vmalloc_oob+0x98/0x5d0
[   29.919696] 
[   29.919727] The buggy address belongs to the physical page:
[   29.920013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105783
[   29.920255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.920399] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.920677] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.920997] page dumped because: kasan: bad access detected
[   29.921108] 
[   29.921170] Memory state around the buggy address:
[   29.921282]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.921468]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.921691] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   29.921738]                                                              ^
[   29.921962]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.922268]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.922448] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   29.816823] ==================================================================
[   29.816870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   29.816919] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.816981] 
[   29.817012] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.817114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.817142] Hardware name: linux,dummy-virt (DT)
[   29.817283] Call trace:
[   29.817317]  show_stack+0x20/0x38 (C)
[   29.817371]  dump_stack_lvl+0x8c/0xd0
[   29.818073]  print_report+0x118/0x608
[   29.818163]  kasan_report+0xdc/0x128
[   29.818672]  kasan_check_range+0x100/0x1a8
[   29.818733]  __kasan_check_write+0x20/0x30
[   29.818807]  kasan_atomics_helper+0x15b4/0x4858
[   29.818873]  kasan_atomics+0x198/0x2e0
[   29.818930]  kunit_try_run_case+0x170/0x3f0
[   29.819136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.819224]  kthread+0x328/0x630
[   29.819270]  ret_from_fork+0x10/0x20
[   29.819346] 
[   29.819377] Allocated by task 277:
[   29.819750]  kasan_save_stack+0x3c/0x68
[   29.820030]  kasan_save_track+0x20/0x40
[   29.820229]  kasan_save_alloc_info+0x40/0x58
[   29.820288]  __kasan_kmalloc+0xd4/0xd8
[   29.820328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.820375]  kasan_atomics+0xb8/0x2e0
[   29.820415]  kunit_try_run_case+0x170/0x3f0
[   29.820627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.820984]  kthread+0x328/0x630
[   29.821241]  ret_from_fork+0x10/0x20
[   29.821479] 
[   29.821816] The buggy address belongs to the object at fff00000c451ca00
[   29.821816]  which belongs to the cache kmalloc-64 of size 64
[   29.821890] The buggy address is located 0 bytes to the right of
[   29.821890]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.822310] 
[   29.822463] The buggy address belongs to the physical page:
[   29.822709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.822820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.823073] page_type: f5(slab)
[   29.823173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.823433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.823478] page dumped because: kasan: bad access detected
[   29.823557] 
[   29.823968] Memory state around the buggy address:
[   29.824031]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.824357]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.824671] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.824725]                                      ^
[   29.825065]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.825500]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.825736] ==================================================================
[   29.843464] ==================================================================
[   29.843604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   29.843841] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.843976] 
[   29.844026] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.844298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.844497] Hardware name: linux,dummy-virt (DT)
[   29.844553] Call trace:
[   29.845143]  show_stack+0x20/0x38 (C)
[   29.845300]  dump_stack_lvl+0x8c/0xd0
[   29.845413]  print_report+0x118/0x608
[   29.845462]  kasan_report+0xdc/0x128
[   29.845698]  __asan_report_load8_noabort+0x20/0x30
[   29.845777]  kasan_atomics_helper+0x3df4/0x4858
[   29.846832]  kasan_atomics+0x198/0x2e0
[   29.846925]  kunit_try_run_case+0x170/0x3f0
[   29.846979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.847067]  kthread+0x328/0x630
[   29.847162]  ret_from_fork+0x10/0x20
[   29.847262] 
[   29.847438] Allocated by task 277:
[   29.847807]  kasan_save_stack+0x3c/0x68
[   29.848264]  kasan_save_track+0x20/0x40
[   29.848534]  kasan_save_alloc_info+0x40/0x58
[   29.848683]  __kasan_kmalloc+0xd4/0xd8
[   29.848729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.848771]  kasan_atomics+0xb8/0x2e0
[   29.849047]  kunit_try_run_case+0x170/0x3f0
[   29.849507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.849759]  kthread+0x328/0x630
[   29.849804]  ret_from_fork+0x10/0x20
[   29.849954] 
[   29.850178] The buggy address belongs to the object at fff00000c451ca00
[   29.850178]  which belongs to the cache kmalloc-64 of size 64
[   29.850345] The buggy address is located 0 bytes to the right of
[   29.850345]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.850561] 
[   29.850602] The buggy address belongs to the physical page:
[   29.850636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.850719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.850770] page_type: f5(slab)
[   29.850809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.850870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.850912] page dumped because: kasan: bad access detected
[   29.850955] 
[   29.850980] Memory state around the buggy address:
[   29.851011]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.851066]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.851111] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.851161]                                      ^
[   29.851197]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.851242]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.851292] ==================================================================
[   29.598943] ==================================================================
[   29.598996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.599253] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.599329] 
[   29.599362] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.599564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.599663] Hardware name: linux,dummy-virt (DT)
[   29.599729] Call trace:
[   29.599756]  show_stack+0x20/0x38 (C)
[   29.600119]  dump_stack_lvl+0x8c/0xd0
[   29.600180]  print_report+0x118/0x608
[   29.600230]  kasan_report+0xdc/0x128
[   29.600425]  __asan_report_load4_noabort+0x20/0x30
[   29.600531]  kasan_atomics_helper+0x3dd8/0x4858
[   29.600981]  kasan_atomics+0x198/0x2e0
[   29.601593]  kunit_try_run_case+0x170/0x3f0
[   29.601811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.601958]  kthread+0x328/0x630
[   29.602295]  ret_from_fork+0x10/0x20
[   29.602698] 
[   29.602784] Allocated by task 277:
[   29.602846]  kasan_save_stack+0x3c/0x68
[   29.602904]  kasan_save_track+0x20/0x40
[   29.602951]  kasan_save_alloc_info+0x40/0x58
[   29.603000]  __kasan_kmalloc+0xd4/0xd8
[   29.603040]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.603091]  kasan_atomics+0xb8/0x2e0
[   29.603139]  kunit_try_run_case+0x170/0x3f0
[   29.603184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.603233]  kthread+0x328/0x630
[   29.603287]  ret_from_fork+0x10/0x20
[   29.603323] 
[   29.603345] The buggy address belongs to the object at fff00000c451ca00
[   29.603345]  which belongs to the cache kmalloc-64 of size 64
[   29.603404] The buggy address is located 0 bytes to the right of
[   29.603404]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.603469] 
[   29.603500] The buggy address belongs to the physical page:
[   29.603553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.603608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.603658] page_type: f5(slab)
[   29.603718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.603799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.603841] page dumped because: kasan: bad access detected
[   29.603874] 
[   29.603909] Memory state around the buggy address:
[   29.603943]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.603997]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.604042] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.604120]                                      ^
[   29.604260]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605228]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605513] ==================================================================
[   29.792773] ==================================================================
[   29.792920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   29.793144] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.793270] 
[   29.793304] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.793394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.793604] Hardware name: linux,dummy-virt (DT)
[   29.793645] Call trace:
[   29.793668]  show_stack+0x20/0x38 (C)
[   29.793722]  dump_stack_lvl+0x8c/0xd0
[   29.793770]  print_report+0x118/0x608
[   29.793961]  kasan_report+0xdc/0x128
[   29.794026]  kasan_check_range+0x100/0x1a8
[   29.794098]  __kasan_check_write+0x20/0x30
[   29.794147]  kasan_atomics_helper+0x147c/0x4858
[   29.794202]  kasan_atomics+0x198/0x2e0
[   29.794260]  kunit_try_run_case+0x170/0x3f0
[   29.794311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.794365]  kthread+0x328/0x630
[   29.794409]  ret_from_fork+0x10/0x20
[   29.794468] 
[   29.794497] Allocated by task 277:
[   29.794528]  kasan_save_stack+0x3c/0x68
[   29.794571]  kasan_save_track+0x20/0x40
[   29.794618]  kasan_save_alloc_info+0x40/0x58
[   29.794659]  __kasan_kmalloc+0xd4/0xd8
[   29.794698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.794747]  kasan_atomics+0xb8/0x2e0
[   29.794799]  kunit_try_run_case+0x170/0x3f0
[   29.794840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.794896]  kthread+0x328/0x630
[   29.794934]  ret_from_fork+0x10/0x20
[   29.794972] 
[   29.794993] The buggy address belongs to the object at fff00000c451ca00
[   29.794993]  which belongs to the cache kmalloc-64 of size 64
[   29.795062] The buggy address is located 0 bytes to the right of
[   29.795062]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.795839] 
[   29.795887] The buggy address belongs to the physical page:
[   29.795922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.795977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.796027] page_type: f5(slab)
[   29.796418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.796670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.797205] page dumped because: kasan: bad access detected
[   29.797390] 
[   29.797415] Memory state around the buggy address:
[   29.797626]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.797878]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.797954] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.798219]                                      ^
[   29.798437]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.798775]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.798825] ==================================================================
[   29.711766] ==================================================================
[   29.711835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.711919] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.711990] 
[   29.712068] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.712158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.712199] Hardware name: linux,dummy-virt (DT)
[   29.712383] Call trace:
[   29.712444]  show_stack+0x20/0x38 (C)
[   29.712572]  dump_stack_lvl+0x8c/0xd0
[   29.712715]  print_report+0x118/0x608
[   29.713008]  kasan_report+0xdc/0x128
[   29.713125]  kasan_check_range+0x100/0x1a8
[   29.713308]  __kasan_check_write+0x20/0x30
[   29.713405]  kasan_atomics_helper+0x10c0/0x4858
[   29.713464]  kasan_atomics+0x198/0x2e0
[   29.714187]  kunit_try_run_case+0x170/0x3f0
[   29.714277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.714336]  kthread+0x328/0x630
[   29.714681]  ret_from_fork+0x10/0x20
[   29.715132] 
[   29.715212] Allocated by task 277:
[   29.715318]  kasan_save_stack+0x3c/0x68
[   29.715506]  kasan_save_track+0x20/0x40
[   29.715755]  kasan_save_alloc_info+0x40/0x58
[   29.716028]  __kasan_kmalloc+0xd4/0xd8
[   29.716194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.716395]  kasan_atomics+0xb8/0x2e0
[   29.716444]  kunit_try_run_case+0x170/0x3f0
[   29.716609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.716860]  kthread+0x328/0x630
[   29.717071]  ret_from_fork+0x10/0x20
[   29.717237] 
[   29.717267] The buggy address belongs to the object at fff00000c451ca00
[   29.717267]  which belongs to the cache kmalloc-64 of size 64
[   29.717481] The buggy address is located 0 bytes to the right of
[   29.717481]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.717724] 
[   29.717763] The buggy address belongs to the physical page:
[   29.717928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.718185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.718244] page_type: f5(slab)
[   29.718516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.718804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.718853] page dumped because: kasan: bad access detected
[   29.719080] 
[   29.719220] Memory state around the buggy address:
[   29.719608]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.719674]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.719866] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.720141]                                      ^
[   29.720188]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720375]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720469] ==================================================================
[   29.811518] ==================================================================
[   29.811753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   29.811817] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.811867] 
[   29.811909] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.812140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.812435] Hardware name: linux,dummy-virt (DT)
[   29.812647] Call trace:
[   29.812891]  show_stack+0x20/0x38 (C)
[   29.812976]  dump_stack_lvl+0x8c/0xd0
[   29.813114]  print_report+0x118/0x608
[   29.813404]  kasan_report+0xdc/0x128
[   29.813695]  kasan_check_range+0x100/0x1a8
[   29.813912]  __kasan_check_write+0x20/0x30
[   29.814330]  kasan_atomics_helper+0x154c/0x4858
[   29.814584]  kasan_atomics+0x198/0x2e0
[   29.814711]  kunit_try_run_case+0x170/0x3f0
[   29.814831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.814937]  kthread+0x328/0x630
[   29.815116]  ret_from_fork+0x10/0x20
[   29.815193] 
[   29.815220] Allocated by task 277:
[   29.815265]  kasan_save_stack+0x3c/0x68
[   29.815309]  kasan_save_track+0x20/0x40
[   29.815350]  kasan_save_alloc_info+0x40/0x58
[   29.815388]  __kasan_kmalloc+0xd4/0xd8
[   29.815428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.815477]  kasan_atomics+0xb8/0x2e0
[   29.815517]  kunit_try_run_case+0x170/0x3f0
[   29.815557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.815619]  kthread+0x328/0x630
[   29.815663]  ret_from_fork+0x10/0x20
[   29.815702] 
[   29.815722] The buggy address belongs to the object at fff00000c451ca00
[   29.815722]  which belongs to the cache kmalloc-64 of size 64
[   29.815781] The buggy address is located 0 bytes to the right of
[   29.815781]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.815847] 
[   29.815888] The buggy address belongs to the physical page:
[   29.815939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.815994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.816051] page_type: f5(slab)
[   29.816100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.816152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.816194] page dumped because: kasan: bad access detected
[   29.816226] 
[   29.816247] Memory state around the buggy address:
[   29.816284]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.816329]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.816379] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.816442]                                      ^
[   29.816499]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.816542]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.816590] ==================================================================
[   29.730174] ==================================================================
[   29.730230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.730283] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.730341] 
[   29.730517] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.730776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.730980] Hardware name: linux,dummy-virt (DT)
[   29.731025] Call trace:
[   29.731092]  show_stack+0x20/0x38 (C)
[   29.731302]  dump_stack_lvl+0x8c/0xd0
[   29.731440]  print_report+0x118/0x608
[   29.731494]  kasan_report+0xdc/0x128
[   29.731541]  kasan_check_range+0x100/0x1a8
[   29.731592]  __kasan_check_write+0x20/0x30
[   29.731638]  kasan_atomics_helper+0x1190/0x4858
[   29.731688]  kasan_atomics+0x198/0x2e0
[   29.732049]  kunit_try_run_case+0x170/0x3f0
[   29.732291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.732472]  kthread+0x328/0x630
[   29.732718]  ret_from_fork+0x10/0x20
[   29.733161] 
[   29.733186] Allocated by task 277:
[   29.733255]  kasan_save_stack+0x3c/0x68
[   29.733475]  kasan_save_track+0x20/0x40
[   29.733551]  kasan_save_alloc_info+0x40/0x58
[   29.733724]  __kasan_kmalloc+0xd4/0xd8
[   29.733948]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.734000]  kasan_atomics+0xb8/0x2e0
[   29.734326]  kunit_try_run_case+0x170/0x3f0
[   29.734488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.734689]  kthread+0x328/0x630
[   29.734741]  ret_from_fork+0x10/0x20
[   29.734780] 
[   29.734801] The buggy address belongs to the object at fff00000c451ca00
[   29.734801]  which belongs to the cache kmalloc-64 of size 64
[   29.735030] The buggy address is located 0 bytes to the right of
[   29.735030]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.735156] 
[   29.735197] The buggy address belongs to the physical page:
[   29.735233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.735287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.735334] page_type: f5(slab)
[   29.735376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.735435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.735487] page dumped because: kasan: bad access detected
[   29.735530] 
[   29.735549] Memory state around the buggy address:
[   29.735582]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.735634]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.735677] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.735726]                                      ^
[   29.735793]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.736072]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.736156] ==================================================================
[   29.747747] ==================================================================
[   29.747871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   29.747981] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.748032] 
[   29.748073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.748400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.748462] Hardware name: linux,dummy-virt (DT)
[   29.748589] Call trace:
[   29.748648]  show_stack+0x20/0x38 (C)
[   29.748847]  dump_stack_lvl+0x8c/0xd0
[   29.749083]  print_report+0x118/0x608
[   29.749260]  kasan_report+0xdc/0x128
[   29.749403]  kasan_check_range+0x100/0x1a8
[   29.749510]  __kasan_check_write+0x20/0x30
[   29.749712]  kasan_atomics_helper+0x126c/0x4858
[   29.749906]  kasan_atomics+0x198/0x2e0
[   29.750221]  kunit_try_run_case+0x170/0x3f0
[   29.750296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.750352]  kthread+0x328/0x630
[   29.750516]  ret_from_fork+0x10/0x20
[   29.750589] 
[   29.750622] Allocated by task 277:
[   29.750660]  kasan_save_stack+0x3c/0x68
[   29.750712]  kasan_save_track+0x20/0x40
[   29.750760]  kasan_save_alloc_info+0x40/0x58
[   29.750800]  __kasan_kmalloc+0xd4/0xd8
[   29.750839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.750880]  kasan_atomics+0xb8/0x2e0
[   29.750916]  kunit_try_run_case+0x170/0x3f0
[   29.750967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.751014]  kthread+0x328/0x630
[   29.751333]  ret_from_fork+0x10/0x20
[   29.751653] 
[   29.751715] The buggy address belongs to the object at fff00000c451ca00
[   29.751715]  which belongs to the cache kmalloc-64 of size 64
[   29.752149] The buggy address is located 0 bytes to the right of
[   29.752149]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.752406] 
[   29.752432] The buggy address belongs to the physical page:
[   29.752467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.752522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.752571] page_type: f5(slab)
[   29.752610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.753241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.753580] page dumped because: kasan: bad access detected
[   29.753819] 
[   29.753867] Memory state around the buggy address:
[   29.754229]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.754491]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.754750] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.754801]                                      ^
[   29.754839]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.755071]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.755318] ==================================================================
[   29.774088] ==================================================================
[   29.774441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   29.774785] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.774964] 
[   29.775073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.775500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.775710] Hardware name: linux,dummy-virt (DT)
[   29.775803] Call trace:
[   29.775828]  show_stack+0x20/0x38 (C)
[   29.775884]  dump_stack_lvl+0x8c/0xd0
[   29.776003]  print_report+0x118/0x608
[   29.776070]  kasan_report+0xdc/0x128
[   29.776118]  __asan_report_load8_noabort+0x20/0x30
[   29.776167]  kasan_atomics_helper+0x3f04/0x4858
[   29.776219]  kasan_atomics+0x198/0x2e0
[   29.776266]  kunit_try_run_case+0x170/0x3f0
[   29.776318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.776384]  kthread+0x328/0x630
[   29.776430]  ret_from_fork+0x10/0x20
[   29.776482] 
[   29.776511] Allocated by task 277:
[   29.776551]  kasan_save_stack+0x3c/0x68
[   29.776605]  kasan_save_track+0x20/0x40
[   29.776650]  kasan_save_alloc_info+0x40/0x58
[   29.776689]  __kasan_kmalloc+0xd4/0xd8
[   29.776728]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.776769]  kasan_atomics+0xb8/0x2e0
[   29.776808]  kunit_try_run_case+0x170/0x3f0
[   29.776862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.776909]  kthread+0x328/0x630
[   29.776949]  ret_from_fork+0x10/0x20
[   29.776997] 
[   29.777017] The buggy address belongs to the object at fff00000c451ca00
[   29.777017]  which belongs to the cache kmalloc-64 of size 64
[   29.777398] The buggy address is located 0 bytes to the right of
[   29.777398]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.777807] 
[   29.777863] The buggy address belongs to the physical page:
[   29.777915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.777987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.778463] page_type: f5(slab)
[   29.778797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.778993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.779120] page dumped because: kasan: bad access detected
[   29.779201] 
[   29.779595] Memory state around the buggy address:
[   29.779711]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.779959]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.780035] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.780142]                                      ^
[   29.780447]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.780503]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.780940] ==================================================================
[   29.525954] ==================================================================
[   29.526038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.526114] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.526173] 
[   29.526204] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.526291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.526320] Hardware name: linux,dummy-virt (DT)
[   29.526468] Call trace:
[   29.526501]  show_stack+0x20/0x38 (C)
[   29.526554]  dump_stack_lvl+0x8c/0xd0
[   29.526603]  print_report+0x118/0x608
[   29.526653]  kasan_report+0xdc/0x128
[   29.526700]  kasan_check_range+0x100/0x1a8
[   29.526751]  __kasan_check_write+0x20/0x30
[   29.526823]  kasan_atomics_helper+0xa6c/0x4858
[   29.526874]  kasan_atomics+0x198/0x2e0
[   29.526930]  kunit_try_run_case+0x170/0x3f0
[   29.526978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.527032]  kthread+0x328/0x630
[   29.527661]  ret_from_fork+0x10/0x20
[   29.527722] 
[   29.527742] Allocated by task 277:
[   29.527806]  kasan_save_stack+0x3c/0x68
[   29.527930]  kasan_save_track+0x20/0x40
[   29.528120]  kasan_save_alloc_info+0x40/0x58
[   29.528239]  __kasan_kmalloc+0xd4/0xd8
[   29.528462]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.528776]  kasan_atomics+0xb8/0x2e0
[   29.528922]  kunit_try_run_case+0x170/0x3f0
[   29.529068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.529180]  kthread+0x328/0x630
[   29.529692]  ret_from_fork+0x10/0x20
[   29.529902] 
[   29.529946] The buggy address belongs to the object at fff00000c451ca00
[   29.529946]  which belongs to the cache kmalloc-64 of size 64
[   29.530041] The buggy address is located 0 bytes to the right of
[   29.530041]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.530151] 
[   29.530346] The buggy address belongs to the physical page:
[   29.530521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.530776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.531022] page_type: f5(slab)
[   29.531123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.531285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.531420] page dumped because: kasan: bad access detected
[   29.531460] 
[   29.531501] Memory state around the buggy address:
[   29.531999]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.532156]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.532325] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.532614]                                      ^
[   29.532763]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.532837]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.533031] ==================================================================
[   29.781485] ==================================================================
[   29.781746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   29.782076] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.782450] 
[   29.782525] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.782624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.782831] Hardware name: linux,dummy-virt (DT)
[   29.782877] Call trace:
[   29.782907]  show_stack+0x20/0x38 (C)
[   29.782960]  dump_stack_lvl+0x8c/0xd0
[   29.783435]  print_report+0x118/0x608
[   29.783520]  kasan_report+0xdc/0x128
[   29.783574]  kasan_check_range+0x100/0x1a8
[   29.783802]  __kasan_check_write+0x20/0x30
[   29.783871]  kasan_atomics_helper+0x1414/0x4858
[   29.783923]  kasan_atomics+0x198/0x2e0
[   29.783970]  kunit_try_run_case+0x170/0x3f0
[   29.784019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.784460]  kthread+0x328/0x630
[   29.784729]  ret_from_fork+0x10/0x20
[   29.784888] 
[   29.784996] Allocated by task 277:
[   29.785597]  kasan_save_stack+0x3c/0x68
[   29.785752]  kasan_save_track+0x20/0x40
[   29.786066]  kasan_save_alloc_info+0x40/0x58
[   29.786464]  __kasan_kmalloc+0xd4/0xd8
[   29.786645]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.786986]  kasan_atomics+0xb8/0x2e0
[   29.787353]  kunit_try_run_case+0x170/0x3f0
[   29.787570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.787637]  kthread+0x328/0x630
[   29.787672]  ret_from_fork+0x10/0x20
[   29.788073] 
[   29.788117] The buggy address belongs to the object at fff00000c451ca00
[   29.788117]  which belongs to the cache kmalloc-64 of size 64
[   29.788343] The buggy address is located 0 bytes to the right of
[   29.788343]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.788461] 
[   29.788486] The buggy address belongs to the physical page:
[   29.788520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.788780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.789037] page_type: f5(slab)
[   29.789421] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.789616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.789718] page dumped because: kasan: bad access detected
[   29.789783] 
[   29.789990] Memory state around the buggy address:
[   29.790191]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.790284]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.790540] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.790727]                                      ^
[   29.790933]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.790987]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.791205] ==================================================================
[   29.800997] ==================================================================
[   29.801050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   29.801589] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.801744] 
[   29.801778] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.802090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.802231] Hardware name: linux,dummy-virt (DT)
[   29.802474] Call trace:
[   29.802500]  show_stack+0x20/0x38 (C)
[   29.802662]  dump_stack_lvl+0x8c/0xd0
[   29.802876]  print_report+0x118/0x608
[   29.802937]  kasan_report+0xdc/0x128
[   29.802991]  kasan_check_range+0x100/0x1a8
[   29.803040]  __kasan_check_write+0x20/0x30
[   29.803098]  kasan_atomics_helper+0x14e4/0x4858
[   29.803448]  kasan_atomics+0x198/0x2e0
[   29.803826]  kunit_try_run_case+0x170/0x3f0
[   29.803954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.804161]  kthread+0x328/0x630
[   29.804355]  ret_from_fork+0x10/0x20
[   29.804578] 
[   29.804640] Allocated by task 277:
[   29.805027]  kasan_save_stack+0x3c/0x68
[   29.805601]  kasan_save_track+0x20/0x40
[   29.805668]  kasan_save_alloc_info+0x40/0x58
[   29.806022]  __kasan_kmalloc+0xd4/0xd8
[   29.806219]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.806375]  kasan_atomics+0xb8/0x2e0
[   29.806685]  kunit_try_run_case+0x170/0x3f0
[   29.806833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.807013]  kthread+0x328/0x630
[   29.807254]  ret_from_fork+0x10/0x20
[   29.807657] 
[   29.807687] The buggy address belongs to the object at fff00000c451ca00
[   29.807687]  which belongs to the cache kmalloc-64 of size 64
[   29.807763] The buggy address is located 0 bytes to the right of
[   29.807763]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.808010] 
[   29.808285] The buggy address belongs to the physical page:
[   29.808405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.808684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.808744] page_type: f5(slab)
[   29.809005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.809306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.809536] page dumped because: kasan: bad access detected
[   29.809731] 
[   29.809774] Memory state around the buggy address:
[   29.809925]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.809996]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.810047] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.810233]                                      ^
[   29.810441]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.810734]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.810848] ==================================================================
[   29.737786] ==================================================================
[   29.737846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   29.737900] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.738066] 
[   29.738101] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.738198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.738431] Hardware name: linux,dummy-virt (DT)
[   29.738797] Call trace:
[   29.738840]  show_stack+0x20/0x38 (C)
[   29.738893]  dump_stack_lvl+0x8c/0xd0
[   29.739095]  print_report+0x118/0x608
[   29.739169]  kasan_report+0xdc/0x128
[   29.739303]  kasan_check_range+0x100/0x1a8
[   29.739353]  __kasan_check_write+0x20/0x30
[   29.739415]  kasan_atomics_helper+0x11f8/0x4858
[   29.739604]  kasan_atomics+0x198/0x2e0
[   29.739668]  kunit_try_run_case+0x170/0x3f0
[   29.739719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.740433]  kthread+0x328/0x630
[   29.740762]  ret_from_fork+0x10/0x20
[   29.740859] 
[   29.740926] Allocated by task 277:
[   29.740990]  kasan_save_stack+0x3c/0x68
[   29.741088]  kasan_save_track+0x20/0x40
[   29.741163]  kasan_save_alloc_info+0x40/0x58
[   29.741217]  __kasan_kmalloc+0xd4/0xd8
[   29.741257]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.741467]  kasan_atomics+0xb8/0x2e0
[   29.741617]  kunit_try_run_case+0x170/0x3f0
[   29.742002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.742199]  kthread+0x328/0x630
[   29.742397]  ret_from_fork+0x10/0x20
[   29.742932] 
[   29.743116] The buggy address belongs to the object at fff00000c451ca00
[   29.743116]  which belongs to the cache kmalloc-64 of size 64
[   29.743365] The buggy address is located 0 bytes to the right of
[   29.743365]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.743589] 
[   29.743812] The buggy address belongs to the physical page:
[   29.744044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.744297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.744546] page_type: f5(slab)
[   29.744631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.744936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.745087] page dumped because: kasan: bad access detected
[   29.745193] 
[   29.745271] Memory state around the buggy address:
[   29.745358]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.745547]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.745755] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.745826]                                      ^
[   29.745923]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.746081]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.746183] ==================================================================
[   29.654434] ==================================================================
[   29.654488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.654541] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.654592] 
[   29.654623] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.654712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.655661] Hardware name: linux,dummy-virt (DT)
[   29.655751] Call trace:
[   29.655897]  show_stack+0x20/0x38 (C)
[   29.656109]  dump_stack_lvl+0x8c/0xd0
[   29.656398]  print_report+0x118/0x608
[   29.656544]  kasan_report+0xdc/0x128
[   29.656818]  __asan_report_store8_noabort+0x20/0x30
[   29.657222]  kasan_atomics_helper+0x3e5c/0x4858
[   29.657426]  kasan_atomics+0x198/0x2e0
[   29.657508]  kunit_try_run_case+0x170/0x3f0
[   29.657640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.657722]  kthread+0x328/0x630
[   29.657776]  ret_from_fork+0x10/0x20
[   29.657835] 
[   29.657862] Allocated by task 277:
[   29.657899]  kasan_save_stack+0x3c/0x68
[   29.657945]  kasan_save_track+0x20/0x40
[   29.657985]  kasan_save_alloc_info+0x40/0x58
[   29.658023]  __kasan_kmalloc+0xd4/0xd8
[   29.658073]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.658114]  kasan_atomics+0xb8/0x2e0
[   29.658166]  kunit_try_run_case+0x170/0x3f0
[   29.658215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.658261]  kthread+0x328/0x630
[   29.658304]  ret_from_fork+0x10/0x20
[   29.658352] 
[   29.658387] The buggy address belongs to the object at fff00000c451ca00
[   29.658387]  which belongs to the cache kmalloc-64 of size 64
[   29.658446] The buggy address is located 0 bytes to the right of
[   29.658446]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.658511] 
[   29.658534] The buggy address belongs to the physical page:
[   29.658589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.658657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.658706] page_type: f5(slab)
[   29.658746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.658797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.658839] page dumped because: kasan: bad access detected
[   29.658881] 
[   29.658904] Memory state around the buggy address:
[   29.658946]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.659001]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.659045] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.659771]                                      ^
[   29.659839]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.659887]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.660294] ==================================================================
[   29.835498] ==================================================================
[   29.835551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   29.835605] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.835803] 
[   29.835838] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.835927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.836369] Hardware name: linux,dummy-virt (DT)
[   29.836460] Call trace:
[   29.836597]  show_stack+0x20/0x38 (C)
[   29.836759]  dump_stack_lvl+0x8c/0xd0
[   29.836884]  print_report+0x118/0x608
[   29.836931]  kasan_report+0xdc/0x128
[   29.836988]  kasan_check_range+0x100/0x1a8
[   29.837203]  __kasan_check_write+0x20/0x30
[   29.837289]  kasan_atomics_helper+0x1644/0x4858
[   29.837467]  kasan_atomics+0x198/0x2e0
[   29.837703]  kunit_try_run_case+0x170/0x3f0
[   29.837873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.838171]  kthread+0x328/0x630
[   29.838373]  ret_from_fork+0x10/0x20
[   29.838449] 
[   29.838470] Allocated by task 277:
[   29.838511]  kasan_save_stack+0x3c/0x68
[   29.838555]  kasan_save_track+0x20/0x40
[   29.838595]  kasan_save_alloc_info+0x40/0x58
[   29.838652]  __kasan_kmalloc+0xd4/0xd8
[   29.838693]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.838735]  kasan_atomics+0xb8/0x2e0
[   29.838772]  kunit_try_run_case+0x170/0x3f0
[   29.838813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.838868]  kthread+0x328/0x630
[   29.838904]  ret_from_fork+0x10/0x20
[   29.838957] 
[   29.838987] The buggy address belongs to the object at fff00000c451ca00
[   29.838987]  which belongs to the cache kmalloc-64 of size 64
[   29.839047] The buggy address is located 0 bytes to the right of
[   29.839047]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.839423] 
[   29.839793] The buggy address belongs to the physical page:
[   29.839864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.840196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.840593] page_type: f5(slab)
[   29.840744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.841160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.841692] page dumped because: kasan: bad access detected
[   29.841752] 
[   29.841806] Memory state around the buggy address:
[   29.841868]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.842051]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.842439] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.842568]                                      ^
[   29.842614]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.842695]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.842738] ==================================================================
[   29.851560] ==================================================================
[   29.851609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   29.851657] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.851708] 
[   29.851738] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.852354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.852471] Hardware name: linux,dummy-virt (DT)
[   29.852514] Call trace:
[   29.852539]  show_stack+0x20/0x38 (C)
[   29.852592]  dump_stack_lvl+0x8c/0xd0
[   29.852944]  print_report+0x118/0x608
[   29.853226]  kasan_report+0xdc/0x128
[   29.853539]  kasan_check_range+0x100/0x1a8
[   29.853658]  __kasan_check_write+0x20/0x30
[   29.853835]  kasan_atomics_helper+0x16d0/0x4858
[   29.854224]  kasan_atomics+0x198/0x2e0
[   29.854315]  kunit_try_run_case+0x170/0x3f0
[   29.854498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.854714]  kthread+0x328/0x630
[   29.854767]  ret_from_fork+0x10/0x20
[   29.855066] 
[   29.855247] Allocated by task 277:
[   29.855585]  kasan_save_stack+0x3c/0x68
[   29.855844]  kasan_save_track+0x20/0x40
[   29.855953]  kasan_save_alloc_info+0x40/0x58
[   29.856446]  __kasan_kmalloc+0xd4/0xd8
[   29.856591]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.856660]  kasan_atomics+0xb8/0x2e0
[   29.856729]  kunit_try_run_case+0x170/0x3f0
[   29.856771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.857101]  kthread+0x328/0x630
[   29.857346]  ret_from_fork+0x10/0x20
[   29.857558] 
[   29.857616] The buggy address belongs to the object at fff00000c451ca00
[   29.857616]  which belongs to the cache kmalloc-64 of size 64
[   29.857914] The buggy address is located 0 bytes to the right of
[   29.857914]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.858377] 
[   29.858580] The buggy address belongs to the physical page:
[   29.858644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.858738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.858996] page_type: f5(slab)
[   29.859167] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.859579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.859712] page dumped because: kasan: bad access detected
[   29.859838] 
[   29.859905] Memory state around the buggy address:
[   29.859987]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.860364]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.860494] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.860700]                                      ^
[   29.860744]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.860915]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.861142] ==================================================================
[   29.662791] ==================================================================
[   29.662916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.663227] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.663281] 
[   29.663314] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.663536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.663787] Hardware name: linux,dummy-virt (DT)
[   29.663947] Call trace:
[   29.664203]  show_stack+0x20/0x38 (C)
[   29.664605]  dump_stack_lvl+0x8c/0xd0
[   29.664733]  print_report+0x118/0x608
[   29.664955]  kasan_report+0xdc/0x128
[   29.665395]  kasan_check_range+0x100/0x1a8
[   29.665589]  __kasan_check_write+0x20/0x30
[   29.666121]  kasan_atomics_helper+0xeb8/0x4858
[   29.666446]  kasan_atomics+0x198/0x2e0
[   29.666568]  kunit_try_run_case+0x170/0x3f0
[   29.666722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.666934]  kthread+0x328/0x630
[   29.667029]  ret_from_fork+0x10/0x20
[   29.667619] 
[   29.667730] Allocated by task 277:
[   29.667840]  kasan_save_stack+0x3c/0x68
[   29.667895]  kasan_save_track+0x20/0x40
[   29.667936]  kasan_save_alloc_info+0x40/0x58
[   29.667974]  __kasan_kmalloc+0xd4/0xd8
[   29.668271]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.668501]  kasan_atomics+0xb8/0x2e0
[   29.668971]  kunit_try_run_case+0x170/0x3f0
[   29.669156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.669398]  kthread+0x328/0x630
[   29.669486]  ret_from_fork+0x10/0x20
[   29.669666] 
[   29.669729] The buggy address belongs to the object at fff00000c451ca00
[   29.669729]  which belongs to the cache kmalloc-64 of size 64
[   29.669792] The buggy address is located 0 bytes to the right of
[   29.669792]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.670006] 
[   29.670127] The buggy address belongs to the physical page:
[   29.670545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.670646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.670826] page_type: f5(slab)
[   29.671024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.671407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.671534] page dumped because: kasan: bad access detected
[   29.671637] 
[   29.671686] Memory state around the buggy address:
[   29.671722]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.672041]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.672281] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.672516]                                      ^
[   29.672740]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.672826]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.672939] ==================================================================
[   29.764693] ==================================================================
[   29.764746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   29.764798] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.764866] 
[   29.764897] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.765356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.765548] Hardware name: linux,dummy-virt (DT)
[   29.765725] Call trace:
[   29.765766]  show_stack+0x20/0x38 (C)
[   29.765820]  dump_stack_lvl+0x8c/0xd0
[   29.765930]  print_report+0x118/0x608
[   29.766019]  kasan_report+0xdc/0x128
[   29.766085]  kasan_check_range+0x100/0x1a8
[   29.766304]  __kasan_check_write+0x20/0x30
[   29.766368]  kasan_atomics_helper+0x1384/0x4858
[   29.766698]  kasan_atomics+0x198/0x2e0
[   29.766812]  kunit_try_run_case+0x170/0x3f0
[   29.767338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.767417]  kthread+0x328/0x630
[   29.767465]  ret_from_fork+0x10/0x20
[   29.767801] 
[   29.767849] Allocated by task 277:
[   29.767883]  kasan_save_stack+0x3c/0x68
[   29.767929]  kasan_save_track+0x20/0x40
[   29.767970]  kasan_save_alloc_info+0x40/0x58
[   29.768009]  __kasan_kmalloc+0xd4/0xd8
[   29.768580]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.769004]  kasan_atomics+0xb8/0x2e0
[   29.769240]  kunit_try_run_case+0x170/0x3f0
[   29.769327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.769685]  kthread+0x328/0x630
[   29.769747]  ret_from_fork+0x10/0x20
[   29.769908] 
[   29.770157] The buggy address belongs to the object at fff00000c451ca00
[   29.770157]  which belongs to the cache kmalloc-64 of size 64
[   29.770363] The buggy address is located 0 bytes to the right of
[   29.770363]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.770582] 
[   29.770752] The buggy address belongs to the physical page:
[   29.770985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.771204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.771412] page_type: f5(slab)
[   29.771494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.771548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.771780] page dumped because: kasan: bad access detected
[   29.772166] 
[   29.772345] Memory state around the buggy address:
[   29.772419]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.772569]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.772616] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.772670]                                      ^
[   29.772714]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.773287]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.773554] ==================================================================
[   29.674148] ==================================================================
[   29.674382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.674460] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.674663] 
[   29.674875] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.675012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.675069] Hardware name: linux,dummy-virt (DT)
[   29.675105] Call trace:
[   29.675588]  show_stack+0x20/0x38 (C)
[   29.675701]  dump_stack_lvl+0x8c/0xd0
[   29.675772]  print_report+0x118/0x608
[   29.676156]  kasan_report+0xdc/0x128
[   29.676278]  kasan_check_range+0x100/0x1a8
[   29.676532]  __kasan_check_write+0x20/0x30
[   29.676612]  kasan_atomics_helper+0xf20/0x4858
[   29.676667]  kasan_atomics+0x198/0x2e0
[   29.676995]  kunit_try_run_case+0x170/0x3f0
[   29.677160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.677535]  kthread+0x328/0x630
[   29.677800]  ret_from_fork+0x10/0x20
[   29.678018] 
[   29.678127] Allocated by task 277:
[   29.678326]  kasan_save_stack+0x3c/0x68
[   29.678629]  kasan_save_track+0x20/0x40
[   29.678865]  kasan_save_alloc_info+0x40/0x58
[   29.678917]  __kasan_kmalloc+0xd4/0xd8
[   29.678957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.679304]  kasan_atomics+0xb8/0x2e0
[   29.679771]  kunit_try_run_case+0x170/0x3f0
[   29.680076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.680259]  kthread+0x328/0x630
[   29.680301]  ret_from_fork+0x10/0x20
[   29.680340] 
[   29.680363] The buggy address belongs to the object at fff00000c451ca00
[   29.680363]  which belongs to the cache kmalloc-64 of size 64
[   29.680428] The buggy address is located 0 bytes to the right of
[   29.680428]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.680492] 
[   29.680523] The buggy address belongs to the physical page:
[   29.680553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.680626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.680683] page_type: f5(slab)
[   29.680732] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.680792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.680840] page dumped because: kasan: bad access detected
[   29.680873] 
[   29.680892] Memory state around the buggy address:
[   29.680933]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.680979]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.681028] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.681079]                                      ^
[   29.681127]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.681186]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.681235] ==================================================================
[   29.607019] ==================================================================
[   29.607389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.607488] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.607543] 
[   29.607574] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.607662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.607916] Hardware name: linux,dummy-virt (DT)
[   29.608307] Call trace:
[   29.608409]  show_stack+0x20/0x38 (C)
[   29.608494]  dump_stack_lvl+0x8c/0xd0
[   29.608626]  print_report+0x118/0x608
[   29.608681]  kasan_report+0xdc/0x128
[   29.608878]  kasan_check_range+0x100/0x1a8
[   29.609325]  __kasan_check_write+0x20/0x30
[   29.609546]  kasan_atomics_helper+0xd3c/0x4858
[   29.609787]  kasan_atomics+0x198/0x2e0
[   29.610011]  kunit_try_run_case+0x170/0x3f0
[   29.610274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.610493]  kthread+0x328/0x630
[   29.610556]  ret_from_fork+0x10/0x20
[   29.610672] 
[   29.610850] Allocated by task 277:
[   29.611000]  kasan_save_stack+0x3c/0x68
[   29.611230]  kasan_save_track+0x20/0x40
[   29.611463]  kasan_save_alloc_info+0x40/0x58
[   29.611597]  __kasan_kmalloc+0xd4/0xd8
[   29.611638]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.611755]  kasan_atomics+0xb8/0x2e0
[   29.612208]  kunit_try_run_case+0x170/0x3f0
[   29.612439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.612544]  kthread+0x328/0x630
[   29.612595]  ret_from_fork+0x10/0x20
[   29.612838] 
[   29.612936] The buggy address belongs to the object at fff00000c451ca00
[   29.612936]  which belongs to the cache kmalloc-64 of size 64
[   29.613228] The buggy address is located 0 bytes to the right of
[   29.613228]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.613400] 
[   29.613479] The buggy address belongs to the physical page:
[   29.613529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.613847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.614205] page_type: f5(slab)
[   29.614396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.614650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.614790] page dumped because: kasan: bad access detected
[   29.614891] 
[   29.615000] Memory state around the buggy address:
[   29.615033]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.615246]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.615720] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.615936]                                      ^
[   29.616026]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.616207]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.616286] ==================================================================
[   29.826232] ==================================================================
[   29.826302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   29.826355] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.826595] 
[   29.826638] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.826729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.827026] Hardware name: linux,dummy-virt (DT)
[   29.827323] Call trace:
[   29.827416]  show_stack+0x20/0x38 (C)
[   29.827478]  dump_stack_lvl+0x8c/0xd0
[   29.827689]  print_report+0x118/0x608
[   29.827892]  kasan_report+0xdc/0x128
[   29.827963]  __asan_report_load8_noabort+0x20/0x30
[   29.828153]  kasan_atomics_helper+0x3db0/0x4858
[   29.828260]  kasan_atomics+0x198/0x2e0
[   29.828410]  kunit_try_run_case+0x170/0x3f0
[   29.828469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.828524]  kthread+0x328/0x630
[   29.828569]  ret_from_fork+0x10/0x20
[   29.828920] 
[   29.829257] Allocated by task 277:
[   29.829314]  kasan_save_stack+0x3c/0x68
[   29.829431]  kasan_save_track+0x20/0x40
[   29.829647]  kasan_save_alloc_info+0x40/0x58
[   29.830163]  __kasan_kmalloc+0xd4/0xd8
[   29.830329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.830520]  kasan_atomics+0xb8/0x2e0
[   29.830726]  kunit_try_run_case+0x170/0x3f0
[   29.830792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.831348]  kthread+0x328/0x630
[   29.831427]  ret_from_fork+0x10/0x20
[   29.831603] 
[   29.831641] The buggy address belongs to the object at fff00000c451ca00
[   29.831641]  which belongs to the cache kmalloc-64 of size 64
[   29.831839] The buggy address is located 0 bytes to the right of
[   29.831839]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.832076] 
[   29.832103] The buggy address belongs to the physical page:
[   29.832138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.832194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.832243] page_type: f5(slab)
[   29.832578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.832906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.833093] page dumped because: kasan: bad access detected
[   29.833222] 
[   29.833396] Memory state around the buggy address:
[   29.833565]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.833746]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.833848] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.833946]                                      ^
[   29.834121]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.834205]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.834253] ==================================================================
[   29.626710] ==================================================================
[   29.626773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.626826] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.626901] 
[   29.626938] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.627239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.627283] Hardware name: linux,dummy-virt (DT)
[   29.627607] Call trace:
[   29.627706]  show_stack+0x20/0x38 (C)
[   29.627768]  dump_stack_lvl+0x8c/0xd0
[   29.628145]  print_report+0x118/0x608
[   29.628262]  kasan_report+0xdc/0x128
[   29.628628]  kasan_check_range+0x100/0x1a8
[   29.628789]  __kasan_check_read+0x20/0x30
[   29.628845]  kasan_atomics_helper+0xdd4/0x4858
[   29.629156]  kasan_atomics+0x198/0x2e0
[   29.629724]  kunit_try_run_case+0x170/0x3f0
[   29.630205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.630402]  kthread+0x328/0x630
[   29.630496]  ret_from_fork+0x10/0x20
[   29.630655] 
[   29.630797] Allocated by task 277:
[   29.631107]  kasan_save_stack+0x3c/0x68
[   29.631328]  kasan_save_track+0x20/0x40
[   29.631497]  kasan_save_alloc_info+0x40/0x58
[   29.631545]  __kasan_kmalloc+0xd4/0xd8
[   29.631585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.631787]  kasan_atomics+0xb8/0x2e0
[   29.631964]  kunit_try_run_case+0x170/0x3f0
[   29.632259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.632317]  kthread+0x328/0x630
[   29.632473]  ret_from_fork+0x10/0x20
[   29.632546] 
[   29.632585] The buggy address belongs to the object at fff00000c451ca00
[   29.632585]  which belongs to the cache kmalloc-64 of size 64
[   29.632654] The buggy address is located 0 bytes to the right of
[   29.632654]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.632720] 
[   29.632758] The buggy address belongs to the physical page:
[   29.632797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.632852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.633264] page_type: f5(slab)
[   29.633389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.633792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.633870] page dumped because: kasan: bad access detected
[   29.634077] 
[   29.634303] Memory state around the buggy address:
[   29.634513]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.634585]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.634712] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.634813]                                      ^
[   29.634906]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.634950]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.635124] ==================================================================
[   29.887450] ==================================================================
[   29.887534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   29.887588] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.887784] 
[   29.887880] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.888097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.888243] Hardware name: linux,dummy-virt (DT)
[   29.888287] Call trace:
[   29.888311]  show_stack+0x20/0x38 (C)
[   29.888364]  dump_stack_lvl+0x8c/0xd0
[   29.888577]  print_report+0x118/0x608
[   29.889079]  kasan_report+0xdc/0x128
[   29.889238]  kasan_check_range+0x100/0x1a8
[   29.889363]  __kasan_check_write+0x20/0x30
[   29.889505]  kasan_atomics_helper+0x17ec/0x4858
[   29.889639]  kasan_atomics+0x198/0x2e0
[   29.889697]  kunit_try_run_case+0x170/0x3f0
[   29.889934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.890098]  kthread+0x328/0x630
[   29.890374]  ret_from_fork+0x10/0x20
[   29.890499] 
[   29.890696] Allocated by task 277:
[   29.890872]  kasan_save_stack+0x3c/0x68
[   29.891273]  kasan_save_track+0x20/0x40
[   29.891349]  kasan_save_alloc_info+0x40/0x58
[   29.891480]  __kasan_kmalloc+0xd4/0xd8
[   29.891690]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.891833]  kasan_atomics+0xb8/0x2e0
[   29.892216]  kunit_try_run_case+0x170/0x3f0
[   29.892270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.892317]  kthread+0x328/0x630
[   29.892353]  ret_from_fork+0x10/0x20
[   29.892391] 
[   29.892413] The buggy address belongs to the object at fff00000c451ca00
[   29.892413]  which belongs to the cache kmalloc-64 of size 64
[   29.892943] The buggy address is located 0 bytes to the right of
[   29.892943]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.893498] 
[   29.893879] The buggy address belongs to the physical page:
[   29.894169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.894254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.894307] page_type: f5(slab)
[   29.894359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.894410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.894453] page dumped because: kasan: bad access detected
[   29.894593] 
[   29.894621] Memory state around the buggy address:
[   29.894656]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.894702]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.894768] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.894809]                                      ^
[   29.894853]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.894904]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.894951] ==================================================================
[   29.862394] ==================================================================
[   29.862468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   29.862531] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.862673] 
[   29.862707] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.862803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.862957] Hardware name: linux,dummy-virt (DT)
[   29.863040] Call trace:
[   29.863095]  show_stack+0x20/0x38 (C)
[   29.863159]  dump_stack_lvl+0x8c/0xd0
[   29.863529]  print_report+0x118/0x608
[   29.863616]  kasan_report+0xdc/0x128
[   29.863726]  __asan_report_load8_noabort+0x20/0x30
[   29.863793]  kasan_atomics_helper+0x3e10/0x4858
[   29.863844]  kasan_atomics+0x198/0x2e0
[   29.864179]  kunit_try_run_case+0x170/0x3f0
[   29.864260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.864430]  kthread+0x328/0x630
[   29.864644]  ret_from_fork+0x10/0x20
[   29.864916] 
[   29.864940] Allocated by task 277:
[   29.864973]  kasan_save_stack+0x3c/0x68
[   29.865157]  kasan_save_track+0x20/0x40
[   29.865208]  kasan_save_alloc_info+0x40/0x58
[   29.865247]  __kasan_kmalloc+0xd4/0xd8
[   29.865470]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.865524]  kasan_atomics+0xb8/0x2e0
[   29.865591]  kunit_try_run_case+0x170/0x3f0
[   29.865633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.865678]  kthread+0x328/0x630
[   29.865724]  ret_from_fork+0x10/0x20
[   29.865764] 
[   29.865785] The buggy address belongs to the object at fff00000c451ca00
[   29.865785]  which belongs to the cache kmalloc-64 of size 64
[   29.865855] The buggy address is located 0 bytes to the right of
[   29.865855]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.865922] 
[   29.865942] The buggy address belongs to the physical page:
[   29.865984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.866044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.866125] page_type: f5(slab)
[   29.866170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.866234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.866276] page dumped because: kasan: bad access detected
[   29.866318] 
[   29.866344] Memory state around the buggy address:
[   29.866383]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.866427]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.866471] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.866509]                                      ^
[   29.866555]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.866611]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.866662] ==================================================================
[   29.534338] ==================================================================
[   29.534391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   29.534446] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.534499] 
[   29.535112] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.535477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.535529] Hardware name: linux,dummy-virt (DT)
[   29.535619] Call trace:
[   29.535646]  show_stack+0x20/0x38 (C)
[   29.535919]  dump_stack_lvl+0x8c/0xd0
[   29.535994]  print_report+0x118/0x608
[   29.536503]  kasan_report+0xdc/0x128
[   29.536693]  kasan_check_range+0x100/0x1a8
[   29.536851]  __kasan_check_write+0x20/0x30
[   29.537498]  kunit_try_run_case+0x170/0x3f0
[   29.539178] 
[   29.539366] The buggy address belongs to the physical page:
[   29.539451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.539501] page_type: f5(slab)
[   29.539549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.539601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.539643] page dumped because: kasan: bad access detected
[   29.539675] 
[   29.539705] Memory state around the buggy address:
[   29.539738]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.540042]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.540340] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.540423]                                      ^
[   29.540740]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540896]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.541075] ==================================================================
[   29.695907] ==================================================================
[   29.695965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.696042] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.696107] 
[   29.696139] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.696226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.696253] Hardware name: linux,dummy-virt (DT)
[   29.696299] Call trace:
[   29.696323]  show_stack+0x20/0x38 (C)
[   29.696372]  dump_stack_lvl+0x8c/0xd0
[   29.696421]  print_report+0x118/0x608
[   29.696468]  kasan_report+0xdc/0x128
[   29.696525]  kasan_check_range+0x100/0x1a8
[   29.696577]  __kasan_check_write+0x20/0x30
[   29.696638]  kasan_atomics_helper+0xff0/0x4858
[   29.696688]  kasan_atomics+0x198/0x2e0
[   29.696735]  kunit_try_run_case+0x170/0x3f0
[   29.696784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.696839]  kthread+0x328/0x630
[   29.696882]  ret_from_fork+0x10/0x20
[   29.696931] 
[   29.696951] Allocated by task 277:
[   29.696980]  kasan_save_stack+0x3c/0x68
[   29.697022]  kasan_save_track+0x20/0x40
[   29.697328]  kasan_save_alloc_info+0x40/0x58
[   29.697673]  __kasan_kmalloc+0xd4/0xd8
[   29.698105]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.698194]  kasan_atomics+0xb8/0x2e0
[   29.698273]  kunit_try_run_case+0x170/0x3f0
[   29.698518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.698682]  kthread+0x328/0x630
[   29.698864]  ret_from_fork+0x10/0x20
[   29.698946] 
[   29.699268] The buggy address belongs to the object at fff00000c451ca00
[   29.699268]  which belongs to the cache kmalloc-64 of size 64
[   29.699623] The buggy address is located 0 bytes to the right of
[   29.699623]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.700184] 
[   29.700245] The buggy address belongs to the physical page:
[   29.700278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.700332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.700546] page_type: f5(slab)
[   29.700967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.701484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.701542] page dumped because: kasan: bad access detected
[   29.701703] 
[   29.702139] Memory state around the buggy address:
[   29.702457]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.702605]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.702908] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.703301]                                      ^
[   29.703475]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.703602]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.703854] ==================================================================
[   29.756284] ==================================================================
[   29.756336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   29.756793] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.756864] 
[   29.757108] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.757211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.757248] Hardware name: linux,dummy-virt (DT)
[   29.757279] Call trace:
[   29.757303]  show_stack+0x20/0x38 (C)
[   29.757355]  dump_stack_lvl+0x8c/0xd0
[   29.757636]  print_report+0x118/0x608
[   29.757714]  kasan_report+0xdc/0x128
[   29.758038]  kasan_check_range+0x100/0x1a8
[   29.758193]  __kasan_check_write+0x20/0x30
[   29.758246]  kasan_atomics_helper+0x12d8/0x4858
[   29.758419]  kasan_atomics+0x198/0x2e0
[   29.758489]  kunit_try_run_case+0x170/0x3f0
[   29.758543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.758801]  kthread+0x328/0x630
[   29.758979]  ret_from_fork+0x10/0x20
[   29.759231] 
[   29.759279] Allocated by task 277:
[   29.759329]  kasan_save_stack+0x3c/0x68
[   29.759376]  kasan_save_track+0x20/0x40
[   29.759948]  kasan_save_alloc_info+0x40/0x58
[   29.760163]  __kasan_kmalloc+0xd4/0xd8
[   29.760247]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.760290]  kasan_atomics+0xb8/0x2e0
[   29.760327]  kunit_try_run_case+0x170/0x3f0
[   29.760369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.760417]  kthread+0x328/0x630
[   29.760454]  ret_from_fork+0x10/0x20
[   29.761140] 
[   29.761256] The buggy address belongs to the object at fff00000c451ca00
[   29.761256]  which belongs to the cache kmalloc-64 of size 64
[   29.761323] The buggy address is located 0 bytes to the right of
[   29.761323]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.761953] 
[   29.761995] The buggy address belongs to the physical page:
[   29.762031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.762096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.762203] page_type: f5(slab)
[   29.762246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.762316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.762360] page dumped because: kasan: bad access detected
[   29.762393] 
[   29.762424] Memory state around the buggy address:
[   29.762457]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.762502]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.762555] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.762596]                                      ^
[   29.762636]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.762681]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.762736] ==================================================================
[   29.878320] ==================================================================
[   29.878536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   29.878685] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.878761] 
[   29.878820] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.878981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.879037] Hardware name: linux,dummy-virt (DT)
[   29.879220] Call trace:
[   29.879247]  show_stack+0x20/0x38 (C)
[   29.879453]  dump_stack_lvl+0x8c/0xd0
[   29.879515]  print_report+0x118/0x608
[   29.879803]  kasan_report+0xdc/0x128
[   29.880298]  __asan_report_load8_noabort+0x20/0x30
[   29.880388]  kasan_atomics_helper+0x3e20/0x4858
[   29.880443]  kasan_atomics+0x198/0x2e0
[   29.880491]  kunit_try_run_case+0x170/0x3f0
[   29.880690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.881202]  kthread+0x328/0x630
[   29.881335]  ret_from_fork+0x10/0x20
[   29.881438] 
[   29.881476] Allocated by task 277:
[   29.881653]  kasan_save_stack+0x3c/0x68
[   29.881868]  kasan_save_track+0x20/0x40
[   29.882098]  kasan_save_alloc_info+0x40/0x58
[   29.882271]  __kasan_kmalloc+0xd4/0xd8
[   29.882322]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.882566]  kasan_atomics+0xb8/0x2e0
[   29.882740]  kunit_try_run_case+0x170/0x3f0
[   29.883103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.883260]  kthread+0x328/0x630
[   29.883299]  ret_from_fork+0x10/0x20
[   29.883497] 
[   29.883708] The buggy address belongs to the object at fff00000c451ca00
[   29.883708]  which belongs to the cache kmalloc-64 of size 64
[   29.883904] The buggy address is located 0 bytes to the right of
[   29.883904]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.884111] 
[   29.884137] The buggy address belongs to the physical page:
[   29.884322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.884588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.884723] page_type: f5(slab)
[   29.885110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.885250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.885355] page dumped because: kasan: bad access detected
[   29.885389] 
[   29.885556] Memory state around the buggy address:
[   29.885739]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.885790]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.885834] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.885875]                                      ^
[   29.885943]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.885987]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.886028] ==================================================================
[   29.617917] ==================================================================
[   29.617969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.618032] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.618519] 
[   29.618598] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.618693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.618723] Hardware name: linux,dummy-virt (DT)
[   29.618755] Call trace:
[   29.618778]  show_stack+0x20/0x38 (C)
[   29.618832]  dump_stack_lvl+0x8c/0xd0
[   29.618883]  print_report+0x118/0x608
[   29.618932]  kasan_report+0xdc/0x128
[   29.619002]  __asan_report_load4_noabort+0x20/0x30
[   29.619068]  kasan_atomics_helper+0x3e04/0x4858
[   29.619136]  kasan_atomics+0x198/0x2e0
[   29.619193]  kunit_try_run_case+0x170/0x3f0
[   29.619251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.619311]  kthread+0x328/0x630
[   29.619355]  ret_from_fork+0x10/0x20
[   29.619415] 
[   29.619444] Allocated by task 277:
[   29.619475]  kasan_save_stack+0x3c/0x68
[   29.619518]  kasan_save_track+0x20/0x40
[   29.619573]  kasan_save_alloc_info+0x40/0x58
[   29.619622]  __kasan_kmalloc+0xd4/0xd8
[   29.619663]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.619707]  kasan_atomics+0xb8/0x2e0
[   29.619744]  kunit_try_run_case+0x170/0x3f0
[   29.620532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.620592]  kthread+0x328/0x630
[   29.621025]  ret_from_fork+0x10/0x20
[   29.621274] 
[   29.621329] The buggy address belongs to the object at fff00000c451ca00
[   29.621329]  which belongs to the cache kmalloc-64 of size 64
[   29.621525] The buggy address is located 0 bytes to the right of
[   29.621525]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.621778] 
[   29.621819] The buggy address belongs to the physical page:
[   29.621870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.622205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.622387] page_type: f5(slab)
[   29.622499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.622578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.622974] page dumped because: kasan: bad access detected
[   29.623214] 
[   29.623418] Memory state around the buggy address:
[   29.623494]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.623637]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.623751] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.623940]                                      ^
[   29.623982]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.624121]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.624348] ==================================================================
[   29.705377] ==================================================================
[   29.705441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.705706] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.705786] 
[   29.706073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.706290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.706506] Hardware name: linux,dummy-virt (DT)
[   29.706669] Call trace:
[   29.706841]  show_stack+0x20/0x38 (C)
[   29.707027]  dump_stack_lvl+0x8c/0xd0
[   29.707359]  print_report+0x118/0x608
[   29.707533]  kasan_report+0xdc/0x128
[   29.707596]  kasan_check_range+0x100/0x1a8
[   29.707935]  __kasan_check_write+0x20/0x30
[   29.708148]  kasan_atomics_helper+0x1058/0x4858
[   29.708282]  kasan_atomics+0x198/0x2e0
[   29.708336]  kunit_try_run_case+0x170/0x3f0
[   29.708393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.708594]  kthread+0x328/0x630
[   29.708836]  ret_from_fork+0x10/0x20
[   29.709006] 
[   29.709040] Allocated by task 277:
[   29.709085]  kasan_save_stack+0x3c/0x68
[   29.709143]  kasan_save_track+0x20/0x40
[   29.709184]  kasan_save_alloc_info+0x40/0x58
[   29.709221]  __kasan_kmalloc+0xd4/0xd8
[   29.709262]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.709314]  kasan_atomics+0xb8/0x2e0
[   29.709371]  kunit_try_run_case+0x170/0x3f0
[   29.709413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.709477]  kthread+0x328/0x630
[   29.709527]  ret_from_fork+0x10/0x20
[   29.709565] 
[   29.709593] The buggy address belongs to the object at fff00000c451ca00
[   29.709593]  which belongs to the cache kmalloc-64 of size 64
[   29.709675] The buggy address is located 0 bytes to the right of
[   29.709675]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.709750] 
[   29.709787] The buggy address belongs to the physical page:
[   29.709827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.709889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.709951] page_type: f5(slab)
[   29.709992] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.710044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.710094] page dumped because: kasan: bad access detected
[   29.710127] 
[   29.710165] Memory state around the buggy address:
[   29.710198]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.710256]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.710307] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.710356]                                      ^
[   29.710400]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710451]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710500] ==================================================================
[   29.490137] ==================================================================
[   29.490204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   29.490258] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.490318] 
[   29.490351] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.490441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.490478] Hardware name: linux,dummy-virt (DT)
[   29.490511] Call trace:
[   29.490544]  show_stack+0x20/0x38 (C)
[   29.490595]  dump_stack_lvl+0x8c/0xd0
[   29.490644]  print_report+0x118/0x608
[   29.490701]  kasan_report+0xdc/0x128
[   29.490750]  __asan_report_load4_noabort+0x20/0x30
[   29.490801]  kasan_atomics_helper+0x42d8/0x4858
[   29.490863]  kasan_atomics+0x198/0x2e0
[   29.490912]  kunit_try_run_case+0x170/0x3f0
[   29.490968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.491023]  kthread+0x328/0x630
[   29.491466]  ret_from_fork+0x10/0x20
[   29.491527] 
[   29.491594] Allocated by task 277:
[   29.491628]  kasan_save_stack+0x3c/0x68
[   29.492294]  kasan_save_track+0x20/0x40
[   29.492375]  kasan_save_alloc_info+0x40/0x58
[   29.492416]  __kasan_kmalloc+0xd4/0xd8
[   29.492456]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.492497]  kasan_atomics+0xb8/0x2e0
[   29.492537]  kunit_try_run_case+0x170/0x3f0
[   29.492940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.493509]  kthread+0x328/0x630
[   29.493614]  ret_from_fork+0x10/0x20
[   29.493709] 
[   29.493773] The buggy address belongs to the object at fff00000c451ca00
[   29.493773]  which belongs to the cache kmalloc-64 of size 64
[   29.494174] The buggy address is located 0 bytes to the right of
[   29.494174]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.494312] 
[   29.494337] The buggy address belongs to the physical page:
[   29.494779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.494856] page_type: f5(slab)
[   29.495203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.496341] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.499377] ==================================================================
[   29.721382] ==================================================================
[   29.721571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.721752] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.721815] 
[   29.721849] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.721941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.722136] Hardware name: linux,dummy-virt (DT)
[   29.722346] Call trace:
[   29.722393]  show_stack+0x20/0x38 (C)
[   29.722449]  dump_stack_lvl+0x8c/0xd0
[   29.722659]  print_report+0x118/0x608
[   29.722756]  kasan_report+0xdc/0x128
[   29.723091]  kasan_check_range+0x100/0x1a8
[   29.723172]  __kasan_check_write+0x20/0x30
[   29.723391]  kasan_atomics_helper+0x1128/0x4858
[   29.723456]  kasan_atomics+0x198/0x2e0
[   29.723603]  kunit_try_run_case+0x170/0x3f0
[   29.723659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.723715]  kthread+0x328/0x630
[   29.724073]  ret_from_fork+0x10/0x20
[   29.724486] 
[   29.724586] Allocated by task 277:
[   29.724624]  kasan_save_stack+0x3c/0x68
[   29.724672]  kasan_save_track+0x20/0x40
[   29.724712]  kasan_save_alloc_info+0x40/0x58
[   29.724759]  __kasan_kmalloc+0xd4/0xd8
[   29.724921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.725136]  kasan_atomics+0xb8/0x2e0
[   29.725219]  kunit_try_run_case+0x170/0x3f0
[   29.725583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.725936]  kthread+0x328/0x630
[   29.726193]  ret_from_fork+0x10/0x20
[   29.726244] 
[   29.726266] The buggy address belongs to the object at fff00000c451ca00
[   29.726266]  which belongs to the cache kmalloc-64 of size 64
[   29.726432] The buggy address is located 0 bytes to the right of
[   29.726432]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.726946] 
[   29.726983] The buggy address belongs to the physical page:
[   29.727036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.727102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.727153] page_type: f5(slab)
[   29.727388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.727677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.727925] page dumped because: kasan: bad access detected
[   29.728197] 
[   29.728248] Memory state around the buggy address:
[   29.728450]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.728681]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.728733] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.728773]                                      ^
[   29.728841]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.728886]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.728942] ==================================================================
[   29.868490] ==================================================================
[   29.868702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   29.869014] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.869095] 
[   29.869144] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.869321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.869390] Hardware name: linux,dummy-virt (DT)
[   29.869425] Call trace:
[   29.869449]  show_stack+0x20/0x38 (C)
[   29.869682]  dump_stack_lvl+0x8c/0xd0
[   29.869754]  print_report+0x118/0x608
[   29.869896]  kasan_report+0xdc/0x128
[   29.870147]  kasan_check_range+0x100/0x1a8
[   29.870703]  __kasan_check_write+0x20/0x30
[   29.870781]  kasan_atomics_helper+0x175c/0x4858
[   29.870833]  kasan_atomics+0x198/0x2e0
[   29.870880]  kunit_try_run_case+0x170/0x3f0
[   29.871031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.871151]  kthread+0x328/0x630
[   29.871214]  ret_from_fork+0x10/0x20
[   29.871554] 
[   29.871590] Allocated by task 277:
[   29.871893]  kasan_save_stack+0x3c/0x68
[   29.872274]  kasan_save_track+0x20/0x40
[   29.872364]  kasan_save_alloc_info+0x40/0x58
[   29.872420]  __kasan_kmalloc+0xd4/0xd8
[   29.872460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.872502]  kasan_atomics+0xb8/0x2e0
[   29.872540]  kunit_try_run_case+0x170/0x3f0
[   29.873014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.873321]  kthread+0x328/0x630
[   29.873452]  ret_from_fork+0x10/0x20
[   29.873581] 
[   29.873639] The buggy address belongs to the object at fff00000c451ca00
[   29.873639]  which belongs to the cache kmalloc-64 of size 64
[   29.873947] The buggy address is located 0 bytes to the right of
[   29.873947]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.874362] 
[   29.874881] The buggy address belongs to the physical page:
[   29.875043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.875241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.875560] page_type: f5(slab)
[   29.875609] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.876036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.876234] page dumped because: kasan: bad access detected
[   29.876456] 
[   29.876504] Memory state around the buggy address:
[   29.876661]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.876772]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.877152] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.877242]                                      ^
[   29.877323]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.877449]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.877561] ==================================================================
[   29.683045] ==================================================================
[   29.683559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.683633] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.683685] 
[   29.683715] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.683802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.684290] Hardware name: linux,dummy-virt (DT)
[   29.684618] Call trace:
[   29.684770]  show_stack+0x20/0x38 (C)
[   29.684849]  dump_stack_lvl+0x8c/0xd0
[   29.684920]  print_report+0x118/0x608
[   29.685281]  kasan_report+0xdc/0x128
[   29.685370]  kasan_check_range+0x100/0x1a8
[   29.685478]  __kasan_check_write+0x20/0x30
[   29.685541]  kasan_atomics_helper+0xf88/0x4858
[   29.685749]  kasan_atomics+0x198/0x2e0
[   29.685954]  kunit_try_run_case+0x170/0x3f0
[   29.686188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.686309]  kthread+0x328/0x630
[   29.686357]  ret_from_fork+0x10/0x20
[   29.686663] 
[   29.686995] Allocated by task 277:
[   29.687150]  kasan_save_stack+0x3c/0x68
[   29.687393]  kasan_save_track+0x20/0x40
[   29.688196]  kasan_save_alloc_info+0x40/0x58
[   29.688259]  __kasan_kmalloc+0xd4/0xd8
[   29.688301]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.688493]  kasan_atomics+0xb8/0x2e0
[   29.688896]  kunit_try_run_case+0x170/0x3f0
[   29.689241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.689449]  kthread+0x328/0x630
[   29.689518]  ret_from_fork+0x10/0x20
[   29.689690] 
[   29.690222] The buggy address belongs to the object at fff00000c451ca00
[   29.690222]  which belongs to the cache kmalloc-64 of size 64
[   29.690291] The buggy address is located 0 bytes to the right of
[   29.690291]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.690488] 
[   29.690823] The buggy address belongs to the physical page:
[   29.690865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.691181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.691709] page_type: f5(slab)
[   29.691785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.691859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.691915] page dumped because: kasan: bad access detected
[   29.691947] 
[   29.691968] Memory state around the buggy address:
[   29.692456]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.692666]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.692845] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.692945]                                      ^
[   29.693180]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.693830]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.693972] ==================================================================
[   29.508792] ==================================================================
[   29.508978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   29.509188] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.509253] 
[   29.509415] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.509517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.509725] Hardware name: linux,dummy-virt (DT)
[   29.509770] Call trace:
[   29.509796]  show_stack+0x20/0x38 (C)
[   29.509960]  dump_stack_lvl+0x8c/0xd0
[   29.510022]  print_report+0x118/0x608
[   29.510166]  kasan_report+0xdc/0x128
[   29.510284]  kasan_check_range+0x100/0x1a8
[   29.510402]  __kasan_check_write+0x20/0x30
[   29.510451]  kasan_atomics_helper+0x99c/0x4858
[   29.510502]  kasan_atomics+0x198/0x2e0
[   29.510547]  kunit_try_run_case+0x170/0x3f0
[   29.511020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.511122]  kthread+0x328/0x630
[   29.511327]  ret_from_fork+0x10/0x20
[   29.511394] 
[   29.511414] Allocated by task 277:
[   29.511642]  kasan_save_stack+0x3c/0x68
[   29.511796]  kasan_save_track+0x20/0x40
[   29.512028]  kasan_save_alloc_info+0x40/0x58
[   29.512089]  __kasan_kmalloc+0xd4/0xd8
[   29.512129]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.512365]  kasan_atomics+0xb8/0x2e0
[   29.512597]  kunit_try_run_case+0x170/0x3f0
[   29.512709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.512907]  kthread+0x328/0x630
[   29.512948]  ret_from_fork+0x10/0x20
[   29.513021] 
[   29.513232] The buggy address belongs to the object at fff00000c451ca00
[   29.513232]  which belongs to the cache kmalloc-64 of size 64
[   29.513331] The buggy address is located 0 bytes to the right of
[   29.513331]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.513540] 
[   29.513567] The buggy address belongs to the physical page:
[   29.513601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.513656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.513734] page_type: f5(slab)
[   29.513774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.513839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.513881] page dumped because: kasan: bad access detected
[   29.513923] 
[   29.513944] Memory state around the buggy address:
[   29.513984]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.514038]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.514095] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.514152]                                      ^
[   29.514249]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.515894] 
[   29.516292] Call trace:
[   29.517317]  kasan_check_range+0x100/0x1a8
[   29.521837] 
[   29.521939] The buggy address belongs to the physical page:
[   29.522045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.522162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.522350] page_type: f5(slab)
[   29.522424] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.522799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.523039] page dumped because: kasan: bad access detected
[   29.523192] 
[   29.523252] Memory state around the buggy address:
[   29.523424]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.523655]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.523867] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.524044]                                      ^
[   29.524143]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.524192]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.524233] ==================================================================
[   29.636385] ==================================================================
[   29.636437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.636653] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.637065] 
[   29.637192] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.637289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.637320] Hardware name: linux,dummy-virt (DT)
[   29.637479] Call trace:
[   29.637506]  show_stack+0x20/0x38 (C)
[   29.637562]  dump_stack_lvl+0x8c/0xd0
[   29.637645]  print_report+0x118/0x608
[   29.637978]  kasan_report+0xdc/0x128
[   29.638068]  __asan_report_load8_noabort+0x20/0x30
[   29.638176]  kasan_atomics_helper+0x3f58/0x4858
[   29.638270]  kasan_atomics+0x198/0x2e0
[   29.638668]  kunit_try_run_case+0x170/0x3f0
[   29.638747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.639087]  kthread+0x328/0x630
[   29.639329]  ret_from_fork+0x10/0x20
[   29.639480] 
[   29.639508] Allocated by task 277:
[   29.639740]  kasan_save_stack+0x3c/0x68
[   29.639813]  kasan_save_track+0x20/0x40
[   29.639855]  kasan_save_alloc_info+0x40/0x58
[   29.640134]  __kasan_kmalloc+0xd4/0xd8
[   29.640178]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.640227]  kasan_atomics+0xb8/0x2e0
[   29.640266]  kunit_try_run_case+0x170/0x3f0
[   29.640582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.640821]  kthread+0x328/0x630
[   29.641038]  ret_from_fork+0x10/0x20
[   29.641092] 
[   29.641168] The buggy address belongs to the object at fff00000c451ca00
[   29.641168]  which belongs to the cache kmalloc-64 of size 64
[   29.641232] The buggy address is located 0 bytes to the right of
[   29.641232]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.641297] 
[   29.641338] The buggy address belongs to the physical page:
[   29.641369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.641436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.641497] page_type: f5(slab)
[   29.641544] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.641597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.641673] page dumped because: kasan: bad access detected
[   29.641716] 
[   29.641750] Memory state around the buggy address:
[   29.641782]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.641828]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.641881] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.641932]                                      ^
[   29.641976]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.642030]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.642079] ==================================================================
[   29.643522] ==================================================================
[   29.643575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.643631] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.644110] 
[   29.644187] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.644960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.645022] Hardware name: linux,dummy-virt (DT)
[   29.645131] Call trace:
[   29.645159]  show_stack+0x20/0x38 (C)
[   29.645233]  dump_stack_lvl+0x8c/0xd0
[   29.645609]  print_report+0x118/0x608
[   29.645688]  kasan_report+0xdc/0x128
[   29.645869]  kasan_check_range+0x100/0x1a8
[   29.646105]  __kasan_check_write+0x20/0x30
[   29.646184]  kasan_atomics_helper+0xe44/0x4858
[   29.646373]  kasan_atomics+0x198/0x2e0
[   29.646617]  kunit_try_run_case+0x170/0x3f0
[   29.646814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.647010]  kthread+0x328/0x630
[   29.647089]  ret_from_fork+0x10/0x20
[   29.647593] 
[   29.647676] Allocated by task 277:
[   29.647829]  kasan_save_stack+0x3c/0x68
[   29.648021]  kasan_save_track+0x20/0x40
[   29.648247]  kasan_save_alloc_info+0x40/0x58
[   29.648386]  __kasan_kmalloc+0xd4/0xd8
[   29.648530]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.648897]  kasan_atomics+0xb8/0x2e0
[   29.648975]  kunit_try_run_case+0x170/0x3f0
[   29.649017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.649331]  kthread+0x328/0x630
[   29.649615]  ret_from_fork+0x10/0x20
[   29.649795] 
[   29.649920] The buggy address belongs to the object at fff00000c451ca00
[   29.649920]  which belongs to the cache kmalloc-64 of size 64
[   29.650380] The buggy address is located 0 bytes to the right of
[   29.650380]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.650615] 
[   29.650710] The buggy address belongs to the physical page:
[   29.650984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.651182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.651480] page_type: f5(slab)
[   29.651555] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.651742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.651797] page dumped because: kasan: bad access detected
[   29.651958] 
[   29.652254] Memory state around the buggy address:
[   29.652298]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.652344]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.652521] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.652752]                                      ^
[   29.652797]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.653112]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.653207] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   29.238800] ==================================================================
[   29.238852] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   29.238964] 
[   29.239184] Call trace:
[   29.239318]  print_report+0x118/0x608
[   29.239474]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   29.239647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.241569]  __kasan_kmalloc+0xd4/0xd8
[   29.242106]  kunit_try_run_case+0x170/0x3f0
[   29.243455] The buggy address is located 8 bytes inside of
[   29.243455]  allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9)
[   29.245147]  fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.247696] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   29.119433] ==================================================================
[   29.119826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   29.119907] Write of size 8 at addr fff00000c16b9cc8 by task kunit_try_catch/273
[   29.119960] 
[   29.119995] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.120473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.120667] Hardware name: linux,dummy-virt (DT)
[   29.120731] Call trace:
[   29.120791]  show_stack+0x20/0x38 (C)
[   29.120949]  dump_stack_lvl+0x8c/0xd0
[   29.121343]  print_report+0x118/0x608
[   29.121415]  kasan_report+0xdc/0x128
[   29.121831]  kasan_check_range+0x100/0x1a8
[   29.121992]  __kasan_check_write+0x20/0x30
[   29.122105]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   29.122351]  kasan_bitops_generic+0x110/0x1c8
[   29.122630]  kunit_try_run_case+0x170/0x3f0
[   29.122705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.122910]  kthread+0x328/0x630
[   29.123114]  ret_from_fork+0x10/0x20
[   29.123293] 
[   29.123609] Allocated by task 273:
[   29.123839]  kasan_save_stack+0x3c/0x68
[   29.124039]  kasan_save_track+0x20/0x40
[   29.124097]  kasan_save_alloc_info+0x40/0x58
[   29.124477]  __kasan_kmalloc+0xd4/0xd8
[   29.124740]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.124963]  kasan_bitops_generic+0xa0/0x1c8
[   29.125022]  kunit_try_run_case+0x170/0x3f0
[   29.125224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.125279]  kthread+0x328/0x630
[   29.125533]  ret_from_fork+0x10/0x20
[   29.125734] 
[   29.125853] The buggy address belongs to the object at fff00000c16b9cc0
[   29.125853]  which belongs to the cache kmalloc-16 of size 16
[   29.126250] The buggy address is located 8 bytes inside of
[   29.126250]  allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9)
[   29.126426] 
[   29.126468] The buggy address belongs to the physical page:
[   29.126509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9
[   29.126580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.126642] page_type: f5(slab)
[   29.126683] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.126737] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000
[   29.126790] page dumped because: kasan: bad access detected
[   29.126824] 
[   29.126853] Memory state around the buggy address:
[   29.126887]  fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.126939]  fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.126985] >fff00000c16b9c80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   29.127040]                                               ^
[   29.127090]  fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.127152]  fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.127192] ==================================================================
[   29.132673] ==================================================================
[   29.133132] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   29.133354] Read of size 8 at addr fff00000c16b9cc8 by task kunit_try_catch/273
[   29.133541] 
[   29.133585] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.133767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.133801] Hardware name: linux,dummy-virt (DT)
[   29.133870] Call trace:
[   29.133897]  show_stack+0x20/0x38 (C)
[   29.134014]  dump_stack_lvl+0x8c/0xd0
[   29.134078]  print_report+0x118/0x608
[   29.134274]  kasan_report+0xdc/0x128
[   29.134534]  __asan_report_load8_noabort+0x20/0x30
[   29.134605]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   29.134858]  kasan_bitops_generic+0x110/0x1c8
[   29.135018]  kunit_try_run_case+0x170/0x3f0
[   29.135276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.135494]  kthread+0x328/0x630
[   29.135611]  ret_from_fork+0x10/0x20
[   29.135675] 
[   29.135696] Allocated by task 273:
[   29.135729]  kasan_save_stack+0x3c/0x68
[   29.135783]  kasan_save_track+0x20/0x40
[   29.135990]  kasan_save_alloc_info+0x40/0x58
[   29.136124]  __kasan_kmalloc+0xd4/0xd8
[   29.136428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.136594]  kasan_bitops_generic+0xa0/0x1c8
[   29.136694]  kunit_try_run_case+0x170/0x3f0
[   29.136735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.136801]  kthread+0x328/0x630
[   29.137015]  ret_from_fork+0x10/0x20
[   29.137220] 
[   29.137398] The buggy address belongs to the object at fff00000c16b9cc0
[   29.137398]  which belongs to the cache kmalloc-16 of size 16
[   29.137535] The buggy address is located 8 bytes inside of
[   29.137535]  allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9)
[   29.137640] 
[   29.137662] The buggy address belongs to the physical page:
[   29.137743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9
[   29.137959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.138080] page_type: f5(slab)
[   29.138237] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.138695] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000
[   29.138781] page dumped because: kasan: bad access detected
[   29.138914] 
[   29.138957] Memory state around the buggy address:
[   29.139192]  fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.139415]  fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.139526] >fff00000c16b9c80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   29.139656]                                               ^
[   29.139713]  fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.139892]  fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.139981] ==================================================================
[   29.141753] ==================================================================
[   29.141809] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   29.141865] Write of size 8 at addr fff00000c16b9cc8 by task kunit_try_catch/273
[   29.141918] 
[   29.142309] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.142519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.142553] Hardware name: linux,dummy-virt (DT)
[   29.142633] Call trace:
[   29.142661]  show_stack+0x20/0x38 (C)
[   29.142982]  dump_stack_lvl+0x8c/0xd0
[   29.143043]  print_report+0x118/0x608
[   29.143103]  kasan_report+0xdc/0x128
[   29.143151]  kasan_check_range+0x100/0x1a8
[   29.143201]  __kasan_check_write+0x20/0x30
[   29.143268]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   29.143323]  kasan_bitops_generic+0x110/0x1c8
[   29.144584]  kasan_bitops_generic+0xa0/0x1c8
[   29.145344] 
[   29.145949] The buggy address belongs to the physical page:
[   29.148153]  fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.150463] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   29.151411] Call trace:
[   29.151662]  __asan_report_load8_noabort+0x20/0x30
[   29.151939]  kthread+0x328/0x630
[   29.152985]  kasan_save_alloc_info+0x40/0x58
[   29.153813]  kunit_try_run_case+0x170/0x3f0
[   29.154484] 
[   29.154993] 
[   29.155199] The buggy address belongs to the physical page:
[   29.155352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.155497] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000
[   29.156154]  fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.158597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.159476]  kasan_report+0xdc/0x128
[   29.159674]  kasan_check_range+0x100/0x1a8
[   29.159877]  __kasan_check_write+0x20/0x30
[   29.160764]  ret_from_fork+0x10/0x20
[   29.161658]  kasan_save_alloc_info+0x40/0x58
[   29.161867]  kunit_try_run_case+0x170/0x3f0
[   29.162015]  ret_from_fork+0x10/0x20
[   29.162249] 
[   29.162284] The buggy address belongs to the physical page:
[   29.162435] page_type: f5(slab)
[   29.162709]  fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.165980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.166260]  dump_stack_lvl+0x8c/0xd0
[   29.166615]  print_report+0x118/0x608
[   29.166731]  kasan_report+0xdc/0x128
[   29.167093]  kasan_bitops_generic+0x110/0x1c8
[   29.168153]  kasan_save_stack+0x3c/0x68
[   29.168540]  kasan_save_alloc_info+0x40/0x58
[   29.169814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.170919] The buggy address is located 8 bytes inside of
[   29.170919]  allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9)
[   29.172122] page_type: f5(slab)
[   29.173221]  fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.174167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   29.104601] ==================================================================
[   29.104652] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   29.104810] Read of size 1 at addr fff00000c5770790 by task kunit_try_catch/271
[   29.104901] 
[   29.104933] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.105241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.105315] Hardware name: linux,dummy-virt (DT)
[   29.105411] Call trace:
[   29.105437]  show_stack+0x20/0x38 (C)
[   29.105506]  dump_stack_lvl+0x8c/0xd0
[   29.105603]  print_report+0x118/0x608
[   29.105719]  kasan_report+0xdc/0x128
[   29.105772]  __asan_report_load1_noabort+0x20/0x30
[   29.105829]  strnlen+0x80/0x88
[   29.106086]  kasan_strings+0x478/0xb00
[   29.106170]  kunit_try_run_case+0x170/0x3f0
[   29.106314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.106376]  kthread+0x328/0x630
[   29.106421]  ret_from_fork+0x10/0x20
[   29.106547] 
[   29.106575] Allocated by task 271:
[   29.106623]  kasan_save_stack+0x3c/0x68
[   29.106676]  kasan_save_track+0x20/0x40
[   29.106778]  kasan_save_alloc_info+0x40/0x58
[   29.106822]  __kasan_kmalloc+0xd4/0xd8
[   29.106900]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.107219]  kasan_strings+0xc8/0xb00
[   29.107323]  kunit_try_run_case+0x170/0x3f0
[   29.107400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.107567]  kthread+0x328/0x630
[   29.107613]  ret_from_fork+0x10/0x20
[   29.107680] 
[   29.107759] Freed by task 271:
[   29.108046]  kasan_save_stack+0x3c/0x68
[   29.108168]  kasan_save_track+0x20/0x40
[   29.108218]  kasan_save_free_info+0x4c/0x78
[   29.108258]  __kasan_slab_free+0x6c/0x98
[   29.108297]  kfree+0x214/0x3c8
[   29.108338]  kasan_strings+0x24c/0xb00
[   29.108377]  kunit_try_run_case+0x170/0x3f0
[   29.108417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.108463]  kthread+0x328/0x630
[   29.108496]  ret_from_fork+0x10/0x20
[   29.108729] 
[   29.108881] The buggy address belongs to the object at fff00000c5770780
[   29.108881]  which belongs to the cache kmalloc-32 of size 32
[   29.108966] The buggy address is located 16 bytes inside of
[   29.108966]  freed 32-byte region [fff00000c5770780, fff00000c57707a0)
[   29.109211] 
[   29.109467] The buggy address belongs to the physical page:
[   29.109622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770
[   29.109788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.109919] page_type: f5(slab)
[   29.110026] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.110111] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.110322] page dumped because: kasan: bad access detected
[   29.110419] 
[   29.110459] Memory state around the buggy address:
[   29.110604]  fff00000c5770680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.110679]  fff00000c5770700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.110840] >fff00000c5770780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.110996]                          ^
[   29.111069]  fff00000c5770800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.111242]  fff00000c5770880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.111356] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   29.096831] ==================================================================
[   29.097162] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   29.097303] Read of size 1 at addr fff00000c5770790 by task kunit_try_catch/271
[   29.097399] 
[   29.097506] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.097628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.097675] Hardware name: linux,dummy-virt (DT)
[   29.097710] Call trace:
[   29.097732]  show_stack+0x20/0x38 (C)
[   29.097946]  dump_stack_lvl+0x8c/0xd0
[   29.098043]  print_report+0x118/0x608
[   29.098200]  kasan_report+0xdc/0x128
[   29.098267]  __asan_report_load1_noabort+0x20/0x30
[   29.098321]  strlen+0xa8/0xb0
[   29.098363]  kasan_strings+0x418/0xb00
[   29.098411]  kunit_try_run_case+0x170/0x3f0
[   29.098642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.098846]  kthread+0x328/0x630
[   29.098906]  ret_from_fork+0x10/0x20
[   29.098959] 
[   29.099018] Allocated by task 271:
[   29.099052]  kasan_save_stack+0x3c/0x68
[   29.099127]  kasan_save_track+0x20/0x40
[   29.099168]  kasan_save_alloc_info+0x40/0x58
[   29.099206]  __kasan_kmalloc+0xd4/0xd8
[   29.099254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.099296]  kasan_strings+0xc8/0xb00
[   29.099333]  kunit_try_run_case+0x170/0x3f0
[   29.099382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.099428]  kthread+0x328/0x630
[   29.099462]  ret_from_fork+0x10/0x20
[   29.099500] 
[   29.099528] Freed by task 271:
[   29.099557]  kasan_save_stack+0x3c/0x68
[   29.099598]  kasan_save_track+0x20/0x40
[   29.099635]  kasan_save_free_info+0x4c/0x78
[   29.099672]  __kasan_slab_free+0x6c/0x98
[   29.099722]  kfree+0x214/0x3c8
[   29.099756]  kasan_strings+0x24c/0xb00
[   29.099823]  kunit_try_run_case+0x170/0x3f0
[   29.099867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.100163]  kthread+0x328/0x630
[   29.100443]  ret_from_fork+0x10/0x20
[   29.100620] 
[   29.100678] The buggy address belongs to the object at fff00000c5770780
[   29.100678]  which belongs to the cache kmalloc-32 of size 32
[   29.100894] The buggy address is located 16 bytes inside of
[   29.100894]  freed 32-byte region [fff00000c5770780, fff00000c57707a0)
[   29.101115] 
[   29.101183] The buggy address belongs to the physical page:
[   29.101287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770
[   29.101412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.101562] page_type: f5(slab)
[   29.101646] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.101749] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.101848] page dumped because: kasan: bad access detected
[   29.101975] 
[   29.102093] Memory state around the buggy address:
[   29.102344]  fff00000c5770680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.102501]  fff00000c5770700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.102597] >fff00000c5770780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.102712]                          ^
[   29.102899]  fff00000c5770800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.102986]  fff00000c5770880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.103026] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   26.616485] ==================================================================
[   26.616540] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   26.616621] Read of size 1 at addr fff00000c64e0000 by task kunit_try_catch/166
[   26.616675] 
[   26.616740] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.616846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.616872] Hardware name: linux,dummy-virt (DT)
[   26.616901] Call trace:
[   26.616921]  show_stack+0x20/0x38 (C)
[   26.616970]  dump_stack_lvl+0x8c/0xd0
[   26.617016]  print_report+0x118/0x608
[   26.617073]  kasan_report+0xdc/0x128
[   26.617118]  __asan_report_load1_noabort+0x20/0x30
[   26.617166]  page_alloc_uaf+0x328/0x350
[   26.617211]  kunit_try_run_case+0x170/0x3f0
[   26.617365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.617419]  kthread+0x328/0x630
[   26.617462]  ret_from_fork+0x10/0x20
[   26.617563] 
[   26.617612] The buggy address belongs to the physical page:
[   26.617647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e0
[   26.617775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.617889] page_type: f0(buddy)
[   26.617985] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000
[   26.618033] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   26.618081] page dumped because: kasan: bad access detected
[   26.618170] 
[   26.618190] Memory state around the buggy address:
[   26.618222]  fff00000c64dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.618264]  fff00000c64dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.618304] >fff00000c64e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.618358]                    ^
[   26.618507]  fff00000c64e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.618681]  fff00000c64e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.618762] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   29.089264] ==================================================================
[   29.089317] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   29.089553] Read of size 1 at addr fff00000c5770790 by task kunit_try_catch/271
[   29.089623] 
[   29.089703] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.089794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.089822] Hardware name: linux,dummy-virt (DT)
[   29.089967] Call trace:
[   29.090147]  show_stack+0x20/0x38 (C)
[   29.090240]  dump_stack_lvl+0x8c/0xd0
[   29.090292]  print_report+0x118/0x608
[   29.090365]  kasan_report+0xdc/0x128
[   29.090439]  __asan_report_load1_noabort+0x20/0x30
[   29.090514]  kasan_strings+0x95c/0xb00
[   29.090561]  kunit_try_run_case+0x170/0x3f0
[   29.090846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.090953]  kthread+0x328/0x630
[   29.091026]  ret_from_fork+0x10/0x20
[   29.091089] 
[   29.091376] Allocated by task 271:
[   29.091461]  kasan_save_stack+0x3c/0x68
[   29.091526]  kasan_save_track+0x20/0x40
[   29.091593]  kasan_save_alloc_info+0x40/0x58
[   29.091653]  __kasan_kmalloc+0xd4/0xd8
[   29.091693]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.091734]  kasan_strings+0xc8/0xb00
[   29.091770]  kunit_try_run_case+0x170/0x3f0
[   29.091840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.091890]  kthread+0x328/0x630
[   29.092080]  ret_from_fork+0x10/0x20
[   29.092229] 
[   29.092306] Freed by task 271:
[   29.092337]  kasan_save_stack+0x3c/0x68
[   29.092377]  kasan_save_track+0x20/0x40
[   29.092417]  kasan_save_free_info+0x4c/0x78
[   29.092755]  __kasan_slab_free+0x6c/0x98
[   29.092870]  kfree+0x214/0x3c8
[   29.092983]  kasan_strings+0x24c/0xb00
[   29.093080]  kunit_try_run_case+0x170/0x3f0
[   29.093121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.093446]  kthread+0x328/0x630
[   29.093534]  ret_from_fork+0x10/0x20
[   29.093648] 
[   29.093727] The buggy address belongs to the object at fff00000c5770780
[   29.093727]  which belongs to the cache kmalloc-32 of size 32
[   29.093837] The buggy address is located 16 bytes inside of
[   29.093837]  freed 32-byte region [fff00000c5770780, fff00000c57707a0)
[   29.093942] 
[   29.094202] The buggy address belongs to the physical page:
[   29.094256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770
[   29.094371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.094424] page_type: f5(slab)
[   29.094462] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.094514] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.094555] page dumped because: kasan: bad access detected
[   29.094589] 
[   29.095105] Memory state around the buggy address:
[   29.095169]  fff00000c5770680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.095317]  fff00000c5770700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.095428] >fff00000c5770780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.095588]                          ^
[   29.095684]  fff00000c5770800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.095754]  fff00000c5770880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.095871] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   29.079585] ==================================================================
[   29.079648] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   29.079986] Read of size 1 at addr fff00000c5770790 by task kunit_try_catch/271
[   29.080110] 
[   29.080231] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.080347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.080452] Hardware name: linux,dummy-virt (DT)
[   29.080539] Call trace:
[   29.080614]  show_stack+0x20/0x38 (C)
[   29.080735]  dump_stack_lvl+0x8c/0xd0
[   29.080829]  print_report+0x118/0x608
[   29.080879]  kasan_report+0xdc/0x128
[   29.080927]  __asan_report_load1_noabort+0x20/0x30
[   29.080976]  strcmp+0xc0/0xc8
[   29.081431]  kasan_strings+0x340/0xb00
[   29.081573]  kunit_try_run_case+0x170/0x3f0
[   29.081681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.081843]  kthread+0x328/0x630
[   29.081986]  ret_from_fork+0x10/0x20
[   29.082191] 
[   29.082242] Allocated by task 271:
[   29.082273]  kasan_save_stack+0x3c/0x68
[   29.082347]  kasan_save_track+0x20/0x40
[   29.082784]  kasan_save_alloc_info+0x40/0x58
[   29.082910]  __kasan_kmalloc+0xd4/0xd8
[   29.083017]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.083166]  kasan_strings+0xc8/0xb00
[   29.083253]  kunit_try_run_case+0x170/0x3f0
[   29.083348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.083451]  kthread+0x328/0x630
[   29.083486]  ret_from_fork+0x10/0x20
[   29.083551] 
[   29.083738] Freed by task 271:
[   29.083903]  kasan_save_stack+0x3c/0x68
[   29.084158]  kasan_save_track+0x20/0x40
[   29.084244]  kasan_save_free_info+0x4c/0x78
[   29.084306]  __kasan_slab_free+0x6c/0x98
[   29.084375]  kfree+0x214/0x3c8
[   29.084439]  kasan_strings+0x24c/0xb00
[   29.084481]  kunit_try_run_case+0x170/0x3f0
[   29.084523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.084748]  kthread+0x328/0x630
[   29.084875]  ret_from_fork+0x10/0x20
[   29.084998] 
[   29.085151] The buggy address belongs to the object at fff00000c5770780
[   29.085151]  which belongs to the cache kmalloc-32 of size 32
[   29.085284] The buggy address is located 16 bytes inside of
[   29.085284]  freed 32-byte region [fff00000c5770780, fff00000c57707a0)
[   29.085423] 
[   29.085502] The buggy address belongs to the physical page:
[   29.085570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770
[   29.085631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.085689] page_type: f5(slab)
[   29.085750] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.085802] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.085842] page dumped because: kasan: bad access detected
[   29.085875] 
[   29.085903] Memory state around the buggy address:
[   29.085937]  fff00000c5770680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.085982]  fff00000c5770700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.086038] >fff00000c5770780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.086089]                          ^
[   29.086121]  fff00000c5770800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.086180]  fff00000c5770880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.086230] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   29.066360] ==================================================================
[   29.066422] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   29.066478] Read of size 1 at addr fff00000c5770618 by task kunit_try_catch/269
[   29.066531] 
[   29.066565] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.066669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.066698] Hardware name: linux,dummy-virt (DT)
[   29.066741] Call trace:
[   29.066765]  show_stack+0x20/0x38 (C)
[   29.067159]  dump_stack_lvl+0x8c/0xd0
[   29.067339]  print_report+0x118/0x608
[   29.067393]  kasan_report+0xdc/0x128
[   29.067448]  __asan_report_load1_noabort+0x20/0x30
[   29.067573]  memcmp+0x198/0x1d8
[   29.067668]  kasan_memcmp+0x16c/0x300
[   29.067739]  kunit_try_run_case+0x170/0x3f0
[   29.067853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.067927]  kthread+0x328/0x630
[   29.067976]  ret_from_fork+0x10/0x20
[   29.068026] 
[   29.068048] Allocated by task 269:
[   29.068352]  kasan_save_stack+0x3c/0x68
[   29.068596]  kasan_save_track+0x20/0x40
[   29.068672]  kasan_save_alloc_info+0x40/0x58
[   29.068812]  __kasan_kmalloc+0xd4/0xd8
[   29.068924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.069035]  kasan_memcmp+0xbc/0x300
[   29.069131]  kunit_try_run_case+0x170/0x3f0
[   29.069297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.069343]  kthread+0x328/0x630
[   29.069716]  ret_from_fork+0x10/0x20
[   29.069878] 
[   29.069948] The buggy address belongs to the object at fff00000c5770600
[   29.069948]  which belongs to the cache kmalloc-32 of size 32
[   29.070131] The buggy address is located 0 bytes to the right of
[   29.070131]  allocated 24-byte region [fff00000c5770600, fff00000c5770618)
[   29.070260] 
[   29.070367] The buggy address belongs to the physical page:
[   29.070437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770
[   29.070534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.070853] page_type: f5(slab)
[   29.071042] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.071218] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.071316] page dumped because: kasan: bad access detected
[   29.071368] 
[   29.071495] Memory state around the buggy address:
[   29.071619]  fff00000c5770500: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.071765]  fff00000c5770580: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.071822] >fff00000c5770600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.071863]                             ^
[   29.072047]  fff00000c5770680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.072207]  fff00000c5770700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.072373] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   29.050008] ==================================================================
[   29.050243] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   29.050308] Read of size 1 at addr ffff800080987b4a by task kunit_try_catch/265
[   29.050360] 
[   29.050390] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.050766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.050812] Hardware name: linux,dummy-virt (DT)
[   29.050850] Call trace:
[   29.050921]  show_stack+0x20/0x38 (C)
[   29.050985]  dump_stack_lvl+0x8c/0xd0
[   29.051035]  print_report+0x310/0x608
[   29.051103]  kasan_report+0xdc/0x128
[   29.051153]  __asan_report_load1_noabort+0x20/0x30
[   29.051203]  kasan_alloca_oob_right+0x2dc/0x340
[   29.051442]  kunit_try_run_case+0x170/0x3f0
[   29.051494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.051549]  kthread+0x328/0x630
[   29.051594]  ret_from_fork+0x10/0x20
[   29.051767] 
[   29.051792] The buggy address belongs to stack of task kunit_try_catch/265
[   29.051898] 
[   29.052050] The buggy address belongs to the virtual mapping at
[   29.052050]  [ffff800080980000, ffff800080989000) created by:
[   29.052050]  kernel_clone+0x150/0x7a8
[   29.052216] 
[   29.052240] The buggy address belongs to the physical page:
[   29.052293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b3
[   29.052413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.052542] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.052634] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.052768] page dumped because: kasan: bad access detected
[   29.052839] 
[   29.052879] Memory state around the buggy address:
[   29.052918]  ffff800080987a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.052964]  ffff800080987a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.053033] >ffff800080987b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   29.053080]                                               ^
[   29.053135]  ffff800080987b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   29.053178]  ffff800080987c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   29.053218] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   29.031773] ==================================================================
[   29.031851] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   29.031909] Read of size 1 at addr ffff800080b17c2a by task kunit_try_catch/261
[   29.031972] 
[   29.032001] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.032103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.032130] Hardware name: linux,dummy-virt (DT)
[   29.032158] Call trace:
[   29.032445]  show_stack+0x20/0x38 (C)
[   29.032592]  dump_stack_lvl+0x8c/0xd0
[   29.032714]  print_report+0x310/0x608
[   29.032849]  kasan_report+0xdc/0x128
[   29.033014]  __asan_report_load1_noabort+0x20/0x30
[   29.033124]  kasan_stack_oob+0x238/0x270
[   29.033209]  kunit_try_run_case+0x170/0x3f0
[   29.033257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.033465]  kthread+0x328/0x630
[   29.033601]  ret_from_fork+0x10/0x20
[   29.033656] 
[   29.033748] The buggy address belongs to stack of task kunit_try_catch/261
[   29.033892]  and is located at offset 138 in frame:
[   29.033960]  kasan_stack_oob+0x0/0x270
[   29.034168] 
[   29.034221] This frame has 4 objects:
[   29.034332]  [48, 49) '__assertion'
[   29.034371]  [64, 72) 'array'
[   29.034423]  [96, 112) '__assertion'
[   29.034479]  [128, 138) 'stack_array'
[   29.034532] 
[   29.034565] The buggy address belongs to the virtual mapping at
[   29.034565]  [ffff800080b10000, ffff800080b19000) created by:
[   29.034565]  kernel_clone+0x150/0x7a8
[   29.034646] 
[   29.034676] The buggy address belongs to the physical page:
[   29.034720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105785
[   29.034774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.034845] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.034909] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.034961] page dumped because: kasan: bad access detected
[   29.035000] 
[   29.035027] Memory state around the buggy address:
[   29.035071]  ffff800080b17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.035115]  ffff800080b17b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   29.035160] >ffff800080b17c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   29.035239]                                   ^
[   29.035276]  ffff800080b17c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   29.035650]  ffff800080b17d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   29.035833] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   29.015526] ==================================================================
[   29.015594] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   29.015667] Read of size 1 at addr ffff90e9b76c768d by task kunit_try_catch/257
[   29.015717] 
[   29.015752] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.015870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.015897] Hardware name: linux,dummy-virt (DT)
[   29.015974] Call trace:
[   29.016010]  show_stack+0x20/0x38 (C)
[   29.016297]  dump_stack_lvl+0x8c/0xd0
[   29.016357]  print_report+0x310/0x608
[   29.016404]  kasan_report+0xdc/0x128
[   29.016512]  __asan_report_load1_noabort+0x20/0x30
[   29.016607]  kasan_global_oob_right+0x230/0x270
[   29.016684]  kunit_try_run_case+0x170/0x3f0
[   29.016809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.017178]  kthread+0x328/0x630
[   29.017279]  ret_from_fork+0x10/0x20
[   29.017460] 
[   29.017889] The buggy address belongs to the variable:
[   29.017967]  global_array+0xd/0x40
[   29.018038] 
[   29.018570] The buggy address belongs to the virtual mapping at
[   29.018570]  [ffff90e9b5860000, ffff90e9b7781000) created by:
[   29.018570]  paging_init+0x66c/0x7d0
[   29.018716] 
[   29.019334] The buggy address belongs to the physical page:
[   29.019389] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47cc7
[   29.019445] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   29.019523] raw: 03fffe0000002000 ffffc1ffc01f31c8 ffffc1ffc01f31c8 0000000000000000
[   29.019573] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.019622] page dumped because: kasan: bad access detected
[   29.019654] 
[   29.019672] Memory state around the buggy address:
[   29.019713]  ffff90e9b76c7580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.019755]  ffff90e9b76c7600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   29.019797] >ffff90e9b76c7680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   29.019843]                       ^
[   29.019878]  ffff90e9b76c7700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   29.019930]  ffff90e9b76c7780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.019970] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   28.993425] ==================================================================
[   28.993508] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.993765] Free of addr fff00000c5773901 by task kunit_try_catch/253
[   28.994230] 
[   28.994386] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.994546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.994627] Hardware name: linux,dummy-virt (DT)
[   28.994732] Call trace:
[   28.994791]  show_stack+0x20/0x38 (C)
[   28.994874]  dump_stack_lvl+0x8c/0xd0
[   28.995136]  print_report+0x118/0x608
[   28.995203]  kasan_report_invalid_free+0xc0/0xe8
[   28.995256]  check_slab_allocation+0xfc/0x108
[   28.995312]  __kasan_mempool_poison_object+0x78/0x150
[   28.995367]  mempool_free+0x28c/0x328
[   28.995414]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.995467]  mempool_kmalloc_invalid_free+0xc0/0x118
[   28.995515]  kunit_try_run_case+0x170/0x3f0
[   28.995578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.995633]  kthread+0x328/0x630
[   28.995676]  ret_from_fork+0x10/0x20
[   28.995729] 
[   28.995747] Allocated by task 253:
[   28.996113]  kasan_save_stack+0x3c/0x68
[   28.996275]  kasan_save_track+0x20/0x40
[   28.996381]  kasan_save_alloc_info+0x40/0x58
[   28.996437]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.996480]  remove_element+0x130/0x1f8
[   28.996548]  mempool_alloc_preallocated+0x58/0xc0
[   28.996613]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   28.996656]  mempool_kmalloc_invalid_free+0xc0/0x118
[   28.996695]  kunit_try_run_case+0x170/0x3f0
[   28.996843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.996906]  kthread+0x328/0x630
[   28.996996]  ret_from_fork+0x10/0x20
[   28.997076] 
[   28.997146] The buggy address belongs to the object at fff00000c5773900
[   28.997146]  which belongs to the cache kmalloc-128 of size 128
[   28.997256] The buggy address is located 1 bytes inside of
[   28.997256]  128-byte region [fff00000c5773900, fff00000c5773980)
[   28.997512] 
[   28.997596] The buggy address belongs to the physical page:
[   28.997660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   28.997753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.997910] page_type: f5(slab)
[   28.997948] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.998014] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.998362] page dumped because: kasan: bad access detected
[   28.998509] 
[   28.998590] Memory state around the buggy address:
[   28.998685]  fff00000c5773800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.998745]  fff00000c5773880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.998788] >fff00000c5773900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.998938]                    ^
[   28.999087]  fff00000c5773980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.999252]  fff00000c5773a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.999364] ==================================================================
[   29.005719] ==================================================================
[   29.005813] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   29.005876] Free of addr fff00000c6554001 by task kunit_try_catch/255
[   29.005920] 
[   29.005970] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.006080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.006107] Hardware name: linux,dummy-virt (DT)
[   29.006192] Call trace:
[   29.006215]  show_stack+0x20/0x38 (C)
[   29.006264]  dump_stack_lvl+0x8c/0xd0
[   29.006443]  print_report+0x118/0x608
[   29.006499]  kasan_report_invalid_free+0xc0/0xe8
[   29.006737]  __kasan_mempool_poison_object+0xfc/0x150
[   29.006812]  mempool_free+0x28c/0x328
[   29.006886]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   29.006941]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   29.006993]  kunit_try_run_case+0x170/0x3f0
[   29.007039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.007105]  kthread+0x328/0x630
[   29.007330]  ret_from_fork+0x10/0x20
[   29.007386] 
[   29.007424] The buggy address belongs to the physical page:
[   29.007471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554
[   29.007544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.007609] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.007661] page_type: f8(unknown)
[   29.007702] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.007752] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.007801] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.007861] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.007910] head: 0bfffe0000000002 ffffc1ffc3195501 00000000ffffffff 00000000ffffffff
[   29.008089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.008168] page dumped because: kasan: bad access detected
[   29.008213] 
[   29.008237] Memory state around the buggy address:
[   29.008269]  fff00000c6553f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.008319]  fff00000c6553f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.008388] >fff00000c6554000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.008423]                    ^
[   29.008451]  fff00000c6554080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.008492]  fff00000c6554100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.008562] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   28.963159] ==================================================================
[   28.963245] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.963305] Free of addr fff00000c5773500 by task kunit_try_catch/247
[   28.963392] 
[   28.963429] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.963544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.963592] Hardware name: linux,dummy-virt (DT)
[   28.963645] Call trace:
[   28.963679]  show_stack+0x20/0x38 (C)
[   28.963763]  dump_stack_lvl+0x8c/0xd0
[   28.963884]  print_report+0x118/0x608
[   28.964027]  kasan_report_invalid_free+0xc0/0xe8
[   28.964187]  check_slab_allocation+0xd4/0x108
[   28.964244]  __kasan_mempool_poison_object+0x78/0x150
[   28.964297]  mempool_free+0x28c/0x328
[   28.964573]  mempool_double_free_helper+0x150/0x2e8
[   28.964629]  mempool_kmalloc_double_free+0xc0/0x118
[   28.964766]  kunit_try_run_case+0x170/0x3f0
[   28.964860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.964967]  kthread+0x328/0x630
[   28.965023]  ret_from_fork+0x10/0x20
[   28.965194] 
[   28.965231] Allocated by task 247:
[   28.965261]  kasan_save_stack+0x3c/0x68
[   28.965571]  kasan_save_track+0x20/0x40
[   28.965681]  kasan_save_alloc_info+0x40/0x58
[   28.965719]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.965773]  remove_element+0x130/0x1f8
[   28.965816]  mempool_alloc_preallocated+0x58/0xc0
[   28.965855]  mempool_double_free_helper+0x94/0x2e8
[   28.965909]  mempool_kmalloc_double_free+0xc0/0x118
[   28.965964]  kunit_try_run_case+0x170/0x3f0
[   28.966005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.966065]  kthread+0x328/0x630
[   28.966097]  ret_from_fork+0x10/0x20
[   28.966134] 
[   28.966165] Freed by task 247:
[   28.966209]  kasan_save_stack+0x3c/0x68
[   28.966251]  kasan_save_track+0x20/0x40
[   28.966288]  kasan_save_free_info+0x4c/0x78
[   28.966322]  __kasan_mempool_poison_object+0xc0/0x150
[   28.966364]  mempool_free+0x28c/0x328
[   28.966396]  mempool_double_free_helper+0x100/0x2e8
[   28.966446]  mempool_kmalloc_double_free+0xc0/0x118
[   28.966508]  kunit_try_run_case+0x170/0x3f0
[   28.966546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.966589]  kthread+0x328/0x630
[   28.966634]  ret_from_fork+0x10/0x20
[   28.966671] 
[   28.966697] The buggy address belongs to the object at fff00000c5773500
[   28.966697]  which belongs to the cache kmalloc-128 of size 128
[   28.966754] The buggy address is located 0 bytes inside of
[   28.966754]  128-byte region [fff00000c5773500, fff00000c5773580)
[   28.966814] 
[   28.966833] The buggy address belongs to the physical page:
[   28.966865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   28.966921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.966983] page_type: f5(slab)
[   28.967024] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.967083] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.967123] page dumped because: kasan: bad access detected
[   28.967154] 
[   28.967172] Memory state around the buggy address:
[   28.967206]  fff00000c5773400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.967249]  fff00000c5773480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.967290] >fff00000c5773500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.967748]                    ^
[   28.967842]  fff00000c5773580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.968008]  fff00000c5773600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.968128] ==================================================================
[   28.983790] ==================================================================
[   28.983848] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.984219] Free of addr fff00000c6550000 by task kunit_try_catch/251
[   28.984393] 
[   28.984500] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.984625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.984716] Hardware name: linux,dummy-virt (DT)
[   28.984748] Call trace:
[   28.984807]  show_stack+0x20/0x38 (C)
[   28.984874]  dump_stack_lvl+0x8c/0xd0
[   28.985046]  print_report+0x118/0x608
[   28.985176]  kasan_report_invalid_free+0xc0/0xe8
[   28.985256]  __kasan_mempool_poison_pages+0xe0/0xe8
[   28.985307]  mempool_free+0x24c/0x328
[   28.985352]  mempool_double_free_helper+0x150/0x2e8
[   28.985400]  mempool_page_alloc_double_free+0xbc/0x118
[   28.985600]  kunit_try_run_case+0x170/0x3f0
[   28.985781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.985998]  kthread+0x328/0x630
[   28.986075]  ret_from_fork+0x10/0x20
[   28.986174] 
[   28.986296] The buggy address belongs to the physical page:
[   28.986373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   28.986453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.986537] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.986596] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.986857] page dumped because: kasan: bad access detected
[   28.986905] 
[   28.986924] Memory state around the buggy address:
[   28.987006]  fff00000c654ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.987185]  fff00000c654ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.987294] >fff00000c6550000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.987382]                    ^
[   28.987472]  fff00000c6550080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.987613]  fff00000c6550100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.987713] ==================================================================
[   28.974745] ==================================================================
[   28.974805] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.974914] Free of addr fff00000c6550000 by task kunit_try_catch/249
[   28.974955] 
[   28.975009] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.975146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.975228] Hardware name: linux,dummy-virt (DT)
[   28.975287] Call trace:
[   28.975355]  show_stack+0x20/0x38 (C)
[   28.975435]  dump_stack_lvl+0x8c/0xd0
[   28.975520]  print_report+0x118/0x608
[   28.975591]  kasan_report_invalid_free+0xc0/0xe8
[   28.975654]  __kasan_mempool_poison_object+0x14c/0x150
[   28.975707]  mempool_free+0x28c/0x328
[   28.975750]  mempool_double_free_helper+0x150/0x2e8
[   28.975811]  mempool_kmalloc_large_double_free+0xc0/0x118
[   28.975863]  kunit_try_run_case+0x170/0x3f0
[   28.975909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.976144]  kthread+0x328/0x630
[   28.976231]  ret_from_fork+0x10/0x20
[   28.976353] 
[   28.976451] The buggy address belongs to the physical page:
[   28.976516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   28.976611] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.976686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.976810] page_type: f8(unknown)
[   28.976878] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.976961] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.977010] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.977258] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.977359] head: 0bfffe0000000002 ffffc1ffc3195401 00000000ffffffff 00000000ffffffff
[   28.977494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.977598] page dumped because: kasan: bad access detected
[   28.977669] 
[   28.977834] Memory state around the buggy address:
[   28.977941]  fff00000c654ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.978091]  fff00000c654ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.978350] >fff00000c6550000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.978389]                    ^
[   28.978645]  fff00000c6550080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.978751]  fff00000c6550100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.978835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   28.865813] ==================================================================
[   28.865884] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   28.865936] Read of size 1 at addr fff00000c654c000 by task kunit_try_catch/241
[   28.866173] 
[   28.866313] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.866406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.866433] Hardware name: linux,dummy-virt (DT)
[   28.866462] Call trace:
[   28.866645]  show_stack+0x20/0x38 (C)
[   28.866704]  dump_stack_lvl+0x8c/0xd0
[   28.866840]  print_report+0x118/0x608
[   28.866947]  kasan_report+0xdc/0x128
[   28.866993]  __asan_report_load1_noabort+0x20/0x30
[   28.867050]  mempool_uaf_helper+0x314/0x340
[   28.867106]  mempool_kmalloc_large_uaf+0xc4/0x120
[   28.867175]  kunit_try_run_case+0x170/0x3f0
[   28.867221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.867331]  kthread+0x328/0x630
[   28.867535]  ret_from_fork+0x10/0x20
[   28.867580] 
[   28.867647] The buggy address belongs to the physical page:
[   28.867817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10654c
[   28.868048] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.868123] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.868179] page_type: f8(unknown)
[   28.868218] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.868270] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.868872] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.869172] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.869367] head: 0bfffe0000000002 ffffc1ffc3195301 00000000ffffffff 00000000ffffffff
[   28.869618] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.869894] page dumped because: kasan: bad access detected
[   28.869941] 
[   28.870187] Memory state around the buggy address:
[   28.870234]  fff00000c654bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.870550]  fff00000c654bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.870596] >fff00000c654c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.870634]                    ^
[   28.871063]  fff00000c654c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.871436]  fff00000c654c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.871740] ==================================================================
[   28.946959] ==================================================================
[   28.947023] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   28.947101] Read of size 1 at addr fff00000c654c000 by task kunit_try_catch/245
[   28.947150] 
[   28.948859] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.948976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.949004] Hardware name: linux,dummy-virt (DT)
[   28.949035] Call trace:
[   28.949068]  show_stack+0x20/0x38 (C)
[   28.949123]  dump_stack_lvl+0x8c/0xd0
[   28.949171]  print_report+0x118/0x608
[   28.949220]  kasan_report+0xdc/0x128
[   28.949263]  __asan_report_load1_noabort+0x20/0x30
[   28.949311]  mempool_uaf_helper+0x314/0x340
[   28.949355]  mempool_page_alloc_uaf+0xc0/0x118
[   28.949403]  kunit_try_run_case+0x170/0x3f0
[   28.949453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.949590]  kthread+0x328/0x630
[   28.949644]  ret_from_fork+0x10/0x20
[   28.949693] 
[   28.949714] The buggy address belongs to the physical page:
[   28.949847] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10654c
[   28.949988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.950092] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.950174] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.950226] page dumped because: kasan: bad access detected
[   28.950259] 
[   28.950276] Memory state around the buggy address:
[   28.950308]  fff00000c654bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.950637]  fff00000c654bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.950685] >fff00000c654c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.950723]                    ^
[   28.950780]  fff00000c654c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.950879]  fff00000c654c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.951040] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   28.855027] ==================================================================
[   28.855128] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   28.855206] Read of size 1 at addr fff00000c5773100 by task kunit_try_catch/239
[   28.855265] 
[   28.855327] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.855443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.855480] Hardware name: linux,dummy-virt (DT)
[   28.855512] Call trace:
[   28.855545]  show_stack+0x20/0x38 (C)
[   28.855598]  dump_stack_lvl+0x8c/0xd0
[   28.855684]  print_report+0x118/0x608
[   28.855804]  kasan_report+0xdc/0x128
[   28.855877]  __asan_report_load1_noabort+0x20/0x30
[   28.856015]  mempool_uaf_helper+0x314/0x340
[   28.856155]  mempool_kmalloc_uaf+0xc4/0x120
[   28.856273]  kunit_try_run_case+0x170/0x3f0
[   28.856323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.856441]  kthread+0x328/0x630
[   28.856484]  ret_from_fork+0x10/0x20
[   28.856557] 
[   28.856577] Allocated by task 239:
[   28.856604]  kasan_save_stack+0x3c/0x68
[   28.856647]  kasan_save_track+0x20/0x40
[   28.856684]  kasan_save_alloc_info+0x40/0x58
[   28.856756]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.856801]  remove_element+0x130/0x1f8
[   28.856851]  mempool_alloc_preallocated+0x58/0xc0
[   28.856901]  mempool_uaf_helper+0xa4/0x340
[   28.856953]  mempool_kmalloc_uaf+0xc4/0x120
[   28.856992]  kunit_try_run_case+0x170/0x3f0
[   28.857030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.857116]  kthread+0x328/0x630
[   28.857147]  ret_from_fork+0x10/0x20
[   28.857264] 
[   28.857401] Freed by task 239:
[   28.857472]  kasan_save_stack+0x3c/0x68
[   28.857539]  kasan_save_track+0x20/0x40
[   28.857615]  kasan_save_free_info+0x4c/0x78
[   28.857687]  __kasan_mempool_poison_object+0xc0/0x150
[   28.857730]  mempool_free+0x28c/0x328
[   28.857765]  mempool_uaf_helper+0x104/0x340
[   28.857803]  mempool_kmalloc_uaf+0xc4/0x120
[   28.857873]  kunit_try_run_case+0x170/0x3f0
[   28.857912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.857968]  kthread+0x328/0x630
[   28.858012]  ret_from_fork+0x10/0x20
[   28.858110] 
[   28.858129] The buggy address belongs to the object at fff00000c5773100
[   28.858129]  which belongs to the cache kmalloc-128 of size 128
[   28.858203] The buggy address is located 0 bytes inside of
[   28.858203]  freed 128-byte region [fff00000c5773100, fff00000c5773180)
[   28.858525] 
[   28.858585] The buggy address belongs to the physical page:
[   28.858619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   28.858676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.858877] page_type: f5(slab)
[   28.858989] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.859066] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.859107] page dumped because: kasan: bad access detected
[   28.859138] 
[   28.859156] Memory state around the buggy address:
[   28.859208]  fff00000c5773000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.859251]  fff00000c5773080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.859304] >fff00000c5773100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.859375]                    ^
[   28.859402]  fff00000c5773180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.859453]  fff00000c5773200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.859491] ==================================================================
[   28.893579] ==================================================================
[   28.893648] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   28.893707] Read of size 1 at addr fff00000c5731240 by task kunit_try_catch/243
[   28.895603] 
[   28.895763] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.896240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.896282] Hardware name: linux,dummy-virt (DT)
[   28.896412] Call trace:
[   28.896595]  show_stack+0x20/0x38 (C)
[   28.896770]  dump_stack_lvl+0x8c/0xd0
[   28.896824]  print_report+0x118/0x608
[   28.896870]  kasan_report+0xdc/0x128
[   28.896916]  __asan_report_load1_noabort+0x20/0x30
[   28.896963]  mempool_uaf_helper+0x314/0x340
[   28.897207]  mempool_slab_uaf+0xc0/0x118
[   28.897701]  kunit_try_run_case+0x170/0x3f0
[   28.897758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.898091]  kthread+0x328/0x630
[   28.898165]  ret_from_fork+0x10/0x20
[   28.898216] 
[   28.898401] Allocated by task 243:
[   28.898509]  kasan_save_stack+0x3c/0x68
[   28.898957]  kasan_save_track+0x20/0x40
[   28.899142]  kasan_save_alloc_info+0x40/0x58
[   28.899178]  __kasan_mempool_unpoison_object+0xbc/0x180
[   28.899223]  remove_element+0x16c/0x1f8
[   28.899665]  mempool_alloc_preallocated+0x58/0xc0
[   28.899872]  mempool_uaf_helper+0xa4/0x340
[   28.899925]  mempool_slab_uaf+0xc0/0x118
[   28.899969]  kunit_try_run_case+0x170/0x3f0
[   28.900007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.900050]  kthread+0x328/0x630
[   28.900091]  ret_from_fork+0x10/0x20
[   28.900715] 
[   28.900743] Freed by task 243:
[   28.900771]  kasan_save_stack+0x3c/0x68
[   28.900940]  kasan_save_track+0x20/0x40
[   28.900985]  kasan_save_free_info+0x4c/0x78
[   28.901228]  __kasan_mempool_poison_object+0xc0/0x150
[   28.901421]  mempool_free+0x28c/0x328
[   28.901743]  mempool_uaf_helper+0x104/0x340
[   28.901784]  mempool_slab_uaf+0xc0/0x118
[   28.901821]  kunit_try_run_case+0x170/0x3f0
[   28.902220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.902642]  kthread+0x328/0x630
[   28.902947]  ret_from_fork+0x10/0x20
[   28.903299] 
[   28.903321] The buggy address belongs to the object at fff00000c5731240
[   28.903321]  which belongs to the cache test_cache of size 123
[   28.903710] The buggy address is located 0 bytes inside of
[   28.903710]  freed 123-byte region [fff00000c5731240, fff00000c57312bb)
[   28.904088] 
[   28.904262] The buggy address belongs to the physical page:
[   28.904473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105731
[   28.904715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.904882] page_type: f5(slab)
[   28.905142] raw: 0bfffe0000000000 fff00000c56d4780 dead000000000122 0000000000000000
[   28.905345] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   28.905427] page dumped because: kasan: bad access detected
[   28.905472] 
[   28.905490] Memory state around the buggy address:
[   28.905768]  fff00000c5731100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.905868]  fff00000c5731180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.905912] >fff00000c5731200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   28.906171]                                            ^
[   28.906489]  fff00000c5731280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.906543]  fff00000c5731300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.906774] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   28.793208] ==================================================================
[   28.793310] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   28.793398] Read of size 1 at addr fff00000c654a001 by task kunit_try_catch/235
[   28.793448] 
[   28.793522] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.793612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.793640] Hardware name: linux,dummy-virt (DT)
[   28.793672] Call trace:
[   28.793693]  show_stack+0x20/0x38 (C)
[   28.793759]  dump_stack_lvl+0x8c/0xd0
[   28.793809]  print_report+0x118/0x608
[   28.793857]  kasan_report+0xdc/0x128
[   28.793903]  __asan_report_load1_noabort+0x20/0x30
[   28.793960]  mempool_oob_right_helper+0x2ac/0x2f0
[   28.794010]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   28.794071]  kunit_try_run_case+0x170/0x3f0
[   28.794120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.794179]  kthread+0x328/0x630
[   28.794228]  ret_from_fork+0x10/0x20
[   28.794276] 
[   28.794297] The buggy address belongs to the physical page:
[   28.794331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106548
[   28.794384] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.794433] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.794487] page_type: f8(unknown)
[   28.794528] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.794575] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.794625] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.794682] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.794732] head: 0bfffe0000000002 ffffc1ffc3195201 00000000ffffffff 00000000ffffffff
[   28.794780] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.794819] page dumped because: kasan: bad access detected
[   28.794850] 
[   28.794910] Memory state around the buggy address:
[   28.794951]  fff00000c6549f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.795049]  fff00000c6549f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.795101] >fff00000c654a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.795138]                    ^
[   28.795164]  fff00000c654a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.795205]  fff00000c654a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.795242] ==================================================================
[   28.806368] ==================================================================
[   28.806433] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   28.807864] Read of size 1 at addr fff00000c57732bb by task kunit_try_catch/237
[   28.810076] 
[   28.810126] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.810258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.810288] Hardware name: linux,dummy-virt (DT)
[   28.810321] Call trace:
[   28.810343]  show_stack+0x20/0x38 (C)
[   28.810396]  dump_stack_lvl+0x8c/0xd0
[   28.810443]  print_report+0x118/0x608
[   28.810535]  kasan_report+0xdc/0x128
[   28.810631]  __asan_report_load1_noabort+0x20/0x30
[   28.811029]  mempool_oob_right_helper+0x2ac/0x2f0
[   28.811619]  mempool_slab_oob_right+0xc0/0x118
[   28.811806]  kunit_try_run_case+0x170/0x3f0
[   28.811961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.812229]  kthread+0x328/0x630
[   28.812330]  ret_from_fork+0x10/0x20
[   28.812697] 
[   28.812716] Allocated by task 237:
[   28.812745]  kasan_save_stack+0x3c/0x68
[   28.813170]  kasan_save_track+0x20/0x40
[   28.813210]  kasan_save_alloc_info+0x40/0x58
[   28.813485]  __kasan_mempool_unpoison_object+0xbc/0x180
[   28.813679]  remove_element+0x16c/0x1f8
[   28.813915]  mempool_alloc_preallocated+0x58/0xc0
[   28.814367]  mempool_oob_right_helper+0x98/0x2f0
[   28.814446]  mempool_slab_oob_right+0xc0/0x118
[   28.814487]  kunit_try_run_case+0x170/0x3f0
[   28.815064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.815122]  kthread+0x328/0x630
[   28.815158]  ret_from_fork+0x10/0x20
[   28.815195] 
[   28.815216] The buggy address belongs to the object at fff00000c5773240
[   28.815216]  which belongs to the cache test_cache of size 123
[   28.815613] The buggy address is located 0 bytes to the right of
[   28.815613]  allocated 123-byte region [fff00000c5773240, fff00000c57732bb)
[   28.815918] 
[   28.816117] The buggy address belongs to the physical page:
[   28.816243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   28.816303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.816356] page_type: f5(slab)
[   28.817111] raw: 0bfffe0000000000 fff00000c56d4640 dead000000000122 0000000000000000
[   28.817162] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   28.817697] page dumped because: kasan: bad access detected
[   28.817796] 
[   28.818013] Memory state around the buggy address:
[   28.818243]  fff00000c5773180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.818292]  fff00000c5773200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   28.818335] >fff00000c5773280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   28.818769]                                         ^
[   28.818846]  fff00000c5773300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.818966]  fff00000c5773380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.819170] ==================================================================
[   28.774450] ==================================================================
[   28.774522] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   28.774595] Read of size 1 at addr fff00000c643fd73 by task kunit_try_catch/233
[   28.774646] 
[   28.774686] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.774780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.774808] Hardware name: linux,dummy-virt (DT)
[   28.774841] Call trace:
[   28.774866]  show_stack+0x20/0x38 (C)
[   28.774918]  dump_stack_lvl+0x8c/0xd0
[   28.774969]  print_report+0x118/0x608
[   28.775017]  kasan_report+0xdc/0x128
[   28.775079]  __asan_report_load1_noabort+0x20/0x30
[   28.775128]  mempool_oob_right_helper+0x2ac/0x2f0
[   28.775177]  mempool_kmalloc_oob_right+0xc4/0x120
[   28.775226]  kunit_try_run_case+0x170/0x3f0
[   28.775275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.775328]  kthread+0x328/0x630
[   28.775372]  ret_from_fork+0x10/0x20
[   28.775421] 
[   28.775440] Allocated by task 233:
[   28.775469]  kasan_save_stack+0x3c/0x68
[   28.775510]  kasan_save_track+0x20/0x40
[   28.775546]  kasan_save_alloc_info+0x40/0x58
[   28.775583]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.775626]  remove_element+0x130/0x1f8
[   28.775667]  mempool_alloc_preallocated+0x58/0xc0
[   28.775706]  mempool_oob_right_helper+0x98/0x2f0
[   28.775746]  mempool_kmalloc_oob_right+0xc4/0x120
[   28.775920]  kunit_try_run_case+0x170/0x3f0
[   28.775970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.776013]  kthread+0x328/0x630
[   28.776046]  ret_from_fork+0x10/0x20
[   28.776095] 
[   28.776116] The buggy address belongs to the object at fff00000c643fd00
[   28.776116]  which belongs to the cache kmalloc-128 of size 128
[   28.776177] The buggy address is located 0 bytes to the right of
[   28.776177]  allocated 115-byte region [fff00000c643fd00, fff00000c643fd73)
[   28.776239] 
[   28.776259] The buggy address belongs to the physical page:
[   28.776292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   28.776346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.776398] page_type: f5(slab)
[   28.776438] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   28.776488] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.776530] page dumped because: kasan: bad access detected
[   28.776559] 
[   28.776578] Memory state around the buggy address:
[   28.776610]  fff00000c643fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.776652]  fff00000c643fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.776693] >fff00000c643fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.776731]                                                              ^
[   28.776769]  fff00000c643fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.776810]  fff00000c643fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.776850] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   28.219590] ==================================================================
[   28.219667] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   28.219738] Read of size 1 at addr fff00000c56c2a00 by task kunit_try_catch/227
[   28.219799] 
[   28.219836] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.219930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.219959] Hardware name: linux,dummy-virt (DT)
[   28.219992] Call trace:
[   28.220015]  show_stack+0x20/0x38 (C)
[   28.220133]  dump_stack_lvl+0x8c/0xd0
[   28.220187]  print_report+0x118/0x608
[   28.220234]  kasan_report+0xdc/0x128
[   28.220280]  __kasan_check_byte+0x54/0x70
[   28.220328]  kmem_cache_destroy+0x34/0x218
[   28.220375]  kmem_cache_double_destroy+0x174/0x300
[   28.220425]  kunit_try_run_case+0x170/0x3f0
[   28.220476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.220528]  kthread+0x328/0x630
[   28.220571]  ret_from_fork+0x10/0x20
[   28.220620] 
[   28.220638] Allocated by task 227:
[   28.220668]  kasan_save_stack+0x3c/0x68
[   28.220711]  kasan_save_track+0x20/0x40
[   28.220749]  kasan_save_alloc_info+0x40/0x58
[   28.220786]  __kasan_slab_alloc+0xa8/0xb0
[   28.220824]  kmem_cache_alloc_noprof+0x10c/0x398
[   28.220866]  __kmem_cache_create_args+0x178/0x280
[   28.220906]  kmem_cache_double_destroy+0xc0/0x300
[   28.220946]  kunit_try_run_case+0x170/0x3f0
[   28.220984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.221027]  kthread+0x328/0x630
[   28.221068]  ret_from_fork+0x10/0x20
[   28.221105] 
[   28.221123] Freed by task 227:
[   28.221147]  kasan_save_stack+0x3c/0x68
[   28.221184]  kasan_save_track+0x20/0x40
[   28.221222]  kasan_save_free_info+0x4c/0x78
[   28.221257]  __kasan_slab_free+0x6c/0x98
[   28.221295]  kmem_cache_free+0x260/0x468
[   28.221331]  slab_kmem_cache_release+0x38/0x50
[   28.221370]  kmem_cache_release+0x1c/0x30
[   28.221406]  kobject_put+0x17c/0x420
[   28.221442]  sysfs_slab_release+0x1c/0x30
[   28.221479]  kmem_cache_destroy+0x118/0x218
[   28.221518]  kmem_cache_double_destroy+0x128/0x300
[   28.221556]  kunit_try_run_case+0x170/0x3f0
[   28.221594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.221636]  kthread+0x328/0x630
[   28.221669]  ret_from_fork+0x10/0x20
[   28.221703] 
[   28.221722] The buggy address belongs to the object at fff00000c56c2a00
[   28.221722]  which belongs to the cache kmem_cache of size 208
[   28.221778] The buggy address is located 0 bytes inside of
[   28.221778]  freed 208-byte region [fff00000c56c2a00, fff00000c56c2ad0)
[   28.221837] 
[   28.221857] The buggy address belongs to the physical page:
[   28.221890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056c2
[   28.221944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.221995] page_type: f5(slab)
[   28.222036] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122
[   28.222094] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   28.222134] page dumped because: kasan: bad access detected
[   28.222171] 
[   28.222188] Memory state around the buggy address:
[   28.222221]  fff00000c56c2900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.222263]  fff00000c56c2980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.222305] >fff00000c56c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.222343]                    ^
[   28.222368]  fff00000c56c2a80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   28.222409]  fff00000c56c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.222448] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   28.172157] ==================================================================
[   28.172246] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   28.172324] Read of size 1 at addr fff00000c77fa000 by task kunit_try_catch/225
[   28.172375] 
[   28.172418] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.172509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.172537] Hardware name: linux,dummy-virt (DT)
[   28.172570] Call trace:
[   28.172596]  show_stack+0x20/0x38 (C)
[   28.172650]  dump_stack_lvl+0x8c/0xd0
[   28.172704]  print_report+0x118/0x608
[   28.172751]  kasan_report+0xdc/0x128
[   28.172797]  __asan_report_load1_noabort+0x20/0x30
[   28.172846]  kmem_cache_rcu_uaf+0x388/0x468
[   28.172896]  kunit_try_run_case+0x170/0x3f0
[   28.172948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.173000]  kthread+0x328/0x630
[   28.173046]  ret_from_fork+0x10/0x20
[   28.173110] 
[   28.173130] Allocated by task 225:
[   28.173159]  kasan_save_stack+0x3c/0x68
[   28.173201]  kasan_save_track+0x20/0x40
[   28.173240]  kasan_save_alloc_info+0x40/0x58
[   28.173277]  __kasan_slab_alloc+0xa8/0xb0
[   28.173315]  kmem_cache_alloc_noprof+0x10c/0x398
[   28.173356]  kmem_cache_rcu_uaf+0x12c/0x468
[   28.173394]  kunit_try_run_case+0x170/0x3f0
[   28.173431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.173475]  kthread+0x328/0x630
[   28.173506]  ret_from_fork+0x10/0x20
[   28.173541] 
[   28.173560] Freed by task 0:
[   28.173586]  kasan_save_stack+0x3c/0x68
[   28.173623]  kasan_save_track+0x20/0x40
[   28.173659]  kasan_save_free_info+0x4c/0x78
[   28.173696]  __kasan_slab_free+0x6c/0x98
[   28.173732]  slab_free_after_rcu_debug+0xd4/0x2f8
[   28.173773]  rcu_core+0x9f4/0x1e20
[   28.173810]  rcu_core_si+0x18/0x30
[   28.173844]  handle_softirqs+0x374/0xb28
[   28.173881]  __do_softirq+0x1c/0x28
[   28.173916] 
[   28.173935] Last potentially related work creation:
[   28.173962]  kasan_save_stack+0x3c/0x68
[   28.174001]  kasan_record_aux_stack+0xb4/0xc8
[   28.174038]  kmem_cache_free+0x120/0x468
[   28.174087]  kmem_cache_rcu_uaf+0x16c/0x468
[   28.174124]  kunit_try_run_case+0x170/0x3f0
[   28.174167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.174212]  kthread+0x328/0x630
[   28.174244]  ret_from_fork+0x10/0x20
[   28.174280] 
[   28.174298] The buggy address belongs to the object at fff00000c77fa000
[   28.174298]  which belongs to the cache test_cache of size 200
[   28.174357] The buggy address is located 0 bytes inside of
[   28.174357]  freed 200-byte region [fff00000c77fa000, fff00000c77fa0c8)
[   28.174417] 
[   28.174439] The buggy address belongs to the physical page:
[   28.174471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   28.174528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.174580] page_type: f5(slab)
[   28.174621] raw: 0bfffe0000000000 fff00000c56c28c0 dead000000000122 0000000000000000
[   28.174671] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   28.174713] page dumped because: kasan: bad access detected
[   28.174745] 
[   28.174762] Memory state around the buggy address:
[   28.174793]  fff00000c77f9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.174836]  fff00000c77f9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.174879] >fff00000c77fa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.174917]                    ^
[   28.174943]  fff00000c77fa080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   28.174985]  fff00000c77fa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.175025] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   27.793459] ==================================================================
[   27.793525] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   27.793589] Free of addr fff00000c5766001 by task kunit_try_catch/223
[   27.793631] 
[   27.793668] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.793757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.793813] Hardware name: linux,dummy-virt (DT)
[   27.793847] Call trace:
[   27.793885]  show_stack+0x20/0x38 (C)
[   27.793939]  dump_stack_lvl+0x8c/0xd0
[   27.793990]  print_report+0x118/0x608
[   27.794038]  kasan_report_invalid_free+0xc0/0xe8
[   27.794101]  check_slab_allocation+0xfc/0x108
[   27.794148]  __kasan_slab_pre_free+0x2c/0x48
[   27.794665]  kmem_cache_free+0xf0/0x468
[   27.794752]  kmem_cache_invalid_free+0x184/0x3c8
[   27.794828]  kunit_try_run_case+0x170/0x3f0
[   27.794883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.794938]  kthread+0x328/0x630
[   27.794982]  ret_from_fork+0x10/0x20
[   27.795048] 
[   27.795099] Allocated by task 223:
[   27.795156]  kasan_save_stack+0x3c/0x68
[   27.795199]  kasan_save_track+0x20/0x40
[   27.795236]  kasan_save_alloc_info+0x40/0x58
[   27.795438]  __kasan_slab_alloc+0xa8/0xb0
[   27.795490]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.795534]  kmem_cache_invalid_free+0x12c/0x3c8
[   27.795627]  kunit_try_run_case+0x170/0x3f0
[   27.795670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.795719]  kthread+0x328/0x630
[   27.795753]  ret_from_fork+0x10/0x20
[   27.795855] 
[   27.795875] The buggy address belongs to the object at fff00000c5766000
[   27.795875]  which belongs to the cache test_cache of size 200
[   27.795934] The buggy address is located 1 bytes inside of
[   27.795934]  200-byte region [fff00000c5766000, fff00000c57660c8)
[   27.795994] 
[   27.796015] The buggy address belongs to the physical page:
[   27.796047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105766
[   27.796114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.796430] page_type: f5(slab)
[   27.796491] raw: 0bfffe0000000000 fff00000c56d4500 dead000000000122 0000000000000000
[   27.796598] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   27.796660] page dumped because: kasan: bad access detected
[   27.796747] 
[   27.796764] Memory state around the buggy address:
[   27.796827]  fff00000c5765f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.797174]  fff00000c5765f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.797220] >fff00000c5766000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.797550]                    ^
[   27.797628]  fff00000c5766080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   27.797796]  fff00000c5766100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.797920] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   27.769993] ==================================================================
[   27.770113] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   27.770191] Free of addr fff00000c5764000 by task kunit_try_catch/221
[   27.770288] 
[   27.770350] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.770518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.770547] Hardware name: linux,dummy-virt (DT)
[   27.770580] Call trace:
[   27.770647]  show_stack+0x20/0x38 (C)
[   27.770909]  dump_stack_lvl+0x8c/0xd0
[   27.771023]  print_report+0x118/0x608
[   27.771122]  kasan_report_invalid_free+0xc0/0xe8
[   27.771252]  check_slab_allocation+0xd4/0x108
[   27.771316]  __kasan_slab_pre_free+0x2c/0x48
[   27.771367]  kmem_cache_free+0xf0/0x468
[   27.771432]  kmem_cache_double_free+0x190/0x3c8
[   27.771687]  kunit_try_run_case+0x170/0x3f0
[   27.771845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.771979]  kthread+0x328/0x630
[   27.772160]  ret_from_fork+0x10/0x20
[   27.772323] 
[   27.772414] Allocated by task 221:
[   27.772535]  kasan_save_stack+0x3c/0x68
[   27.772608]  kasan_save_track+0x20/0x40
[   27.772656]  kasan_save_alloc_info+0x40/0x58
[   27.772693]  __kasan_slab_alloc+0xa8/0xb0
[   27.772732]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.772772]  kmem_cache_double_free+0x12c/0x3c8
[   27.773118]  kunit_try_run_case+0x170/0x3f0
[   27.773304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.773416]  kthread+0x328/0x630
[   27.773573]  ret_from_fork+0x10/0x20
[   27.773622] 
[   27.773641] Freed by task 221:
[   27.773667]  kasan_save_stack+0x3c/0x68
[   27.773728]  kasan_save_track+0x20/0x40
[   27.773770]  kasan_save_free_info+0x4c/0x78
[   27.773808]  __kasan_slab_free+0x6c/0x98
[   27.773846]  kmem_cache_free+0x260/0x468
[   27.773883]  kmem_cache_double_free+0x140/0x3c8
[   27.773924]  kunit_try_run_case+0x170/0x3f0
[   27.773961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.774020]  kthread+0x328/0x630
[   27.774073]  ret_from_fork+0x10/0x20
[   27.774120] 
[   27.774138] The buggy address belongs to the object at fff00000c5764000
[   27.774138]  which belongs to the cache test_cache of size 200
[   27.774225] The buggy address is located 0 bytes inside of
[   27.774225]  200-byte region [fff00000c5764000, fff00000c57640c8)
[   27.774286] 
[   27.774312] The buggy address belongs to the physical page:
[   27.774355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105764
[   27.774421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.774476] page_type: f5(slab)
[   27.774516] raw: 0bfffe0000000000 fff00000c56d43c0 dead000000000122 0000000000000000
[   27.774566] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   27.774622] page dumped because: kasan: bad access detected
[   27.774653] 
[   27.774670] Memory state around the buggy address:
[   27.774721]  fff00000c5763f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.774769]  fff00000c5763f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.774826] >fff00000c5764000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.774863]                    ^
[   27.774907]  fff00000c5764080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   27.774948]  fff00000c5764100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.774993] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   27.506313] ==================================================================
[   27.506387] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   27.506452] Read of size 1 at addr fff00000c57620c8 by task kunit_try_catch/219
[   27.506502] 
[   27.506541] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.506808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.506845] Hardware name: linux,dummy-virt (DT)
[   27.506879] Call trace:
[   27.506930]  show_stack+0x20/0x38 (C)
[   27.507024]  dump_stack_lvl+0x8c/0xd0
[   27.507088]  print_report+0x118/0x608
[   27.507145]  kasan_report+0xdc/0x128
[   27.507192]  __asan_report_load1_noabort+0x20/0x30
[   27.507261]  kmem_cache_oob+0x344/0x430
[   27.507336]  kunit_try_run_case+0x170/0x3f0
[   27.507433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.507517]  kthread+0x328/0x630
[   27.507562]  ret_from_fork+0x10/0x20
[   27.507630] 
[   27.507649] Allocated by task 219:
[   27.507706]  kasan_save_stack+0x3c/0x68
[   27.507786]  kasan_save_track+0x20/0x40
[   27.507882]  kasan_save_alloc_info+0x40/0x58
[   27.507937]  __kasan_slab_alloc+0xa8/0xb0
[   27.507975]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.508186]  kmem_cache_oob+0x12c/0x430
[   27.508329]  kunit_try_run_case+0x170/0x3f0
[   27.508372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.508416]  kthread+0x328/0x630
[   27.508474]  ret_from_fork+0x10/0x20
[   27.508511] 
[   27.508530] The buggy address belongs to the object at fff00000c5762000
[   27.508530]  which belongs to the cache test_cache of size 200
[   27.508587] The buggy address is located 0 bytes to the right of
[   27.508587]  allocated 200-byte region [fff00000c5762000, fff00000c57620c8)
[   27.508650] 
[   27.508669] The buggy address belongs to the physical page:
[   27.508702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105762
[   27.508768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.508819] page_type: f5(slab)
[   27.508859] raw: 0bfffe0000000000 fff00000c56d4280 dead000000000122 0000000000000000
[   27.508919] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   27.508960] page dumped because: kasan: bad access detected
[   27.509006] 
[   27.509024] Memory state around the buggy address:
[   27.509070]  fff00000c5761f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.509112]  fff00000c5762000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.509293] >fff00000c5762080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   27.509526]                                               ^
[   27.509607]  fff00000c5762100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.509712]  fff00000c5762180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.509830] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   27.411456] ==================================================================
[   27.411530] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   27.411878] Read of size 8 at addr fff00000c575f080 by task kunit_try_catch/212
[   27.412265] 
[   27.412314] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.412408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.412442] Hardware name: linux,dummy-virt (DT)
[   27.412552] Call trace:
[   27.412864]  show_stack+0x20/0x38 (C)
[   27.413172]  dump_stack_lvl+0x8c/0xd0
[   27.413466]  print_report+0x118/0x608
[   27.413824]  kasan_report+0xdc/0x128
[   27.413878]  __asan_report_load8_noabort+0x20/0x30
[   27.414035]  workqueue_uaf+0x480/0x4a8
[   27.414092]  kunit_try_run_case+0x170/0x3f0
[   27.414269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.414540]  kthread+0x328/0x630
[   27.414591]  ret_from_fork+0x10/0x20
[   27.414856] 
[   27.414879] Allocated by task 212:
[   27.414907]  kasan_save_stack+0x3c/0x68
[   27.415087]  kasan_save_track+0x20/0x40
[   27.415279]  kasan_save_alloc_info+0x40/0x58
[   27.415327]  __kasan_kmalloc+0xd4/0xd8
[   27.415363]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.415717]  workqueue_uaf+0x13c/0x4a8
[   27.415762]  kunit_try_run_case+0x170/0x3f0
[   27.415801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.416201]  kthread+0x328/0x630
[   27.416248]  ret_from_fork+0x10/0x20
[   27.416285] 
[   27.416303] Freed by task 9:
[   27.416353]  kasan_save_stack+0x3c/0x68
[   27.416397]  kasan_save_track+0x20/0x40
[   27.416576]  kasan_save_free_info+0x4c/0x78
[   27.416641]  __kasan_slab_free+0x6c/0x98
[   27.416987]  kfree+0x214/0x3c8
[   27.417021]  workqueue_uaf_work+0x18/0x30
[   27.417472]  process_one_work+0x530/0xf98
[   27.417547]  worker_thread+0x618/0xf38
[   27.417743]  kthread+0x328/0x630
[   27.417784]  ret_from_fork+0x10/0x20
[   27.417821] 
[   27.417946] Last potentially related work creation:
[   27.418229]  kasan_save_stack+0x3c/0x68
[   27.418360]  kasan_record_aux_stack+0xb4/0xc8
[   27.418406]  __queue_work+0x65c/0xfe0
[   27.418442]  queue_work_on+0xbc/0xf8
[   27.418556]  workqueue_uaf+0x210/0x4a8
[   27.418613]  kunit_try_run_case+0x170/0x3f0
[   27.418652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.419177]  kthread+0x328/0x630
[   27.419222]  ret_from_fork+0x10/0x20
[   27.419260] 
[   27.419636] The buggy address belongs to the object at fff00000c575f080
[   27.419636]  which belongs to the cache kmalloc-32 of size 32
[   27.419844] The buggy address is located 0 bytes inside of
[   27.419844]  freed 32-byte region [fff00000c575f080, fff00000c575f0a0)
[   27.419917] 
[   27.420127] The buggy address belongs to the physical page:
[   27.420387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10575f
[   27.420718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.420791] page_type: f5(slab)
[   27.420831] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.421129] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   27.421176] page dumped because: kasan: bad access detected
[   27.421207] 
[   27.421224] Memory state around the buggy address:
[   27.421357]  fff00000c575ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.422001]  fff00000c575f000: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   27.422109] >fff00000c575f080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   27.422629]                    ^
[   27.422671]  fff00000c575f100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.422713]  fff00000c575f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.422751] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   27.366726] ==================================================================
[   27.367418] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   27.368460] Read of size 4 at addr fff00000c5752ec0 by task swapper/0/0
[   27.368719] 
[   27.369216] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.369660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.370243] Hardware name: linux,dummy-virt (DT)
[   27.370424] Call trace:
[   27.370456]  show_stack+0x20/0x38 (C)
[   27.370610]  dump_stack_lvl+0x8c/0xd0
[   27.371228]  print_report+0x118/0x608
[   27.371296]  kasan_report+0xdc/0x128
[   27.371815]  __asan_report_load4_noabort+0x20/0x30
[   27.371874]  rcu_uaf_reclaim+0x64/0x70
[   27.371928]  rcu_core+0x9f4/0x1e20
[   27.371975]  rcu_core_si+0x18/0x30
[   27.372019]  handle_softirqs+0x374/0xb28
[   27.372075]  __do_softirq+0x1c/0x28
[   27.372472]  ____do_softirq+0x18/0x30
[   27.372634]  call_on_irq_stack+0x24/0x30
[   27.372781]  do_softirq_own_stack+0x24/0x38
[   27.372830]  __irq_exit_rcu+0x1fc/0x318
[   27.373097]  irq_exit_rcu+0x1c/0x80
[   27.373327]  el1_interrupt+0x38/0x58
[   27.373598]  el1h_64_irq_handler+0x18/0x28
[   27.373827]  el1h_64_irq+0x6c/0x70
[   27.374549]  arch_local_irq_enable+0x4/0x8 (P)
[   27.374792]  do_idle+0x384/0x4e8
[   27.374978]  cpu_startup_entry+0x68/0x80
[   27.375041]  rest_init+0x160/0x188
[   27.375099]  start_kernel+0x30c/0x3d0
[   27.375665]  __primary_switched+0x8c/0xa0
[   27.375724] 
[   27.375742] Allocated by task 210:
[   27.375782]  kasan_save_stack+0x3c/0x68
[   27.375823]  kasan_save_track+0x20/0x40
[   27.376362]  kasan_save_alloc_info+0x40/0x58
[   27.376410]  __kasan_kmalloc+0xd4/0xd8
[   27.376573]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.376616]  rcu_uaf+0xb0/0x2d8
[   27.376649]  kunit_try_run_case+0x170/0x3f0
[   27.377135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.377183]  kthread+0x328/0x630
[   27.377222]  ret_from_fork+0x10/0x20
[   27.377717] 
[   27.377787] Freed by task 0:
[   27.378246]  kasan_save_stack+0x3c/0x68
[   27.378352]  kasan_save_track+0x20/0x40
[   27.378545]  kasan_save_free_info+0x4c/0x78
[   27.378585]  __kasan_slab_free+0x6c/0x98
[   27.378624]  kfree+0x214/0x3c8
[   27.379006]  rcu_uaf_reclaim+0x28/0x70
[   27.379196]  rcu_core+0x9f4/0x1e20
[   27.379240]  rcu_core_si+0x18/0x30
[   27.379276]  handle_softirqs+0x374/0xb28
[   27.379439]  __do_softirq+0x1c/0x28
[   27.379497] 
[   27.379751] Last potentially related work creation:
[   27.380036]  kasan_save_stack+0x3c/0x68
[   27.380109]  kasan_record_aux_stack+0xb4/0xc8
[   27.380265]  __call_rcu_common.constprop.0+0x74/0x8c8
[   27.380380]  call_rcu+0x18/0x30
[   27.380465]  rcu_uaf+0x14c/0x2d8
[   27.380631]  kunit_try_run_case+0x170/0x3f0
[   27.380755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.380801]  kthread+0x328/0x630
[   27.380833]  ret_from_fork+0x10/0x20
[   27.380879] 
[   27.381607] The buggy address belongs to the object at fff00000c5752ec0
[   27.381607]  which belongs to the cache kmalloc-32 of size 32
[   27.381772] The buggy address is located 0 bytes inside of
[   27.381772]  freed 32-byte region [fff00000c5752ec0, fff00000c5752ee0)
[   27.381841] 
[   27.381862] The buggy address belongs to the physical page:
[   27.382419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105752
[   27.382575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.382642] page_type: f5(slab)
[   27.382997] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.383063] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   27.383452] page dumped because: kasan: bad access detected
[   27.383763] 
[   27.383867] Memory state around the buggy address:
[   27.383903]  fff00000c5752d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   27.384220]  fff00000c5752e00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   27.384344] >fff00000c5752e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.384381]                                            ^
[   27.384418]  fff00000c5752f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.384460]  fff00000c5752f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.384497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   27.107209] ==================================================================
[   27.107319] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   27.107388] Read of size 1 at addr fff00000c643fa00 by task kunit_try_catch/208
[   27.107437] 
[   27.107467] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.107553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.108297] Hardware name: linux,dummy-virt (DT)
[   27.108350] Call trace:
[   27.108372]  show_stack+0x20/0x38 (C)
[   27.108424]  dump_stack_lvl+0x8c/0xd0
[   27.108472]  print_report+0x118/0x608
[   27.108845]  kasan_report+0xdc/0x128
[   27.108899]  __asan_report_load1_noabort+0x20/0x30
[   27.108956]  ksize_uaf+0x598/0x5f8
[   27.109339]  kunit_try_run_case+0x170/0x3f0
[   27.109396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.109739]  kthread+0x328/0x630
[   27.109944]  ret_from_fork+0x10/0x20
[   27.110335] 
[   27.110365] Allocated by task 208:
[   27.110397]  kasan_save_stack+0x3c/0x68
[   27.110668]  kasan_save_track+0x20/0x40
[   27.110732]  kasan_save_alloc_info+0x40/0x58
[   27.110768]  __kasan_kmalloc+0xd4/0xd8
[   27.110804]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.111380]  ksize_uaf+0xb8/0x5f8
[   27.111434]  kunit_try_run_case+0x170/0x3f0
[   27.111472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.111718]  kthread+0x328/0x630
[   27.111948]  ret_from_fork+0x10/0x20
[   27.111997] 
[   27.112016] Freed by task 208:
[   27.112052]  kasan_save_stack+0x3c/0x68
[   27.112189]  kasan_save_track+0x20/0x40
[   27.112461]  kasan_save_free_info+0x4c/0x78
[   27.112555]  __kasan_slab_free+0x6c/0x98
[   27.112592]  kfree+0x214/0x3c8
[   27.112624]  ksize_uaf+0x11c/0x5f8
[   27.112659]  kunit_try_run_case+0x170/0x3f0
[   27.112696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.112740]  kthread+0x328/0x630
[   27.112773]  ret_from_fork+0x10/0x20
[   27.112810] 
[   27.112829] The buggy address belongs to the object at fff00000c643fa00
[   27.112829]  which belongs to the cache kmalloc-128 of size 128
[   27.113912] The buggy address is located 0 bytes inside of
[   27.113912]  freed 128-byte region [fff00000c643fa00, fff00000c643fa80)
[   27.114325] 
[   27.114557] The buggy address belongs to the physical page:
[   27.114769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   27.114822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.114872] page_type: f5(slab)
[   27.115481] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   27.115537] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.115577] page dumped because: kasan: bad access detected
[   27.115608] 
[   27.115842] Memory state around the buggy address:
[   27.116272]  fff00000c643f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.116441]  fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.116490] >fff00000c643fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.116857]                    ^
[   27.116893]  fff00000c643fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.117234]  fff00000c643fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.117276] ==================================================================
[   27.097452] ==================================================================
[   27.097511] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   27.097562] Read of size 1 at addr fff00000c643fa00 by task kunit_try_catch/208
[   27.097610] 
[   27.097640] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.097726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.097753] Hardware name: linux,dummy-virt (DT)
[   27.097783] Call trace:
[   27.097805]  show_stack+0x20/0x38 (C)
[   27.097854]  dump_stack_lvl+0x8c/0xd0
[   27.097903]  print_report+0x118/0x608
[   27.097951]  kasan_report+0xdc/0x128
[   27.097997]  __kasan_check_byte+0x54/0x70
[   27.098043]  ksize+0x30/0x88
[   27.098670]  ksize_uaf+0x168/0x5f8
[   27.098719]  kunit_try_run_case+0x170/0x3f0
[   27.099328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.099410]  kthread+0x328/0x630
[   27.099457]  ret_from_fork+0x10/0x20
[   27.099506] 
[   27.099524] Allocated by task 208:
[   27.099552]  kasan_save_stack+0x3c/0x68
[   27.099594]  kasan_save_track+0x20/0x40
[   27.099632]  kasan_save_alloc_info+0x40/0x58
[   27.099669]  __kasan_kmalloc+0xd4/0xd8
[   27.099706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.099747]  ksize_uaf+0xb8/0x5f8
[   27.099791]  kunit_try_run_case+0x170/0x3f0
[   27.099829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.099872]  kthread+0x328/0x630
[   27.099905]  ret_from_fork+0x10/0x20
[   27.099941] 
[   27.099960] Freed by task 208:
[   27.099984]  kasan_save_stack+0x3c/0x68
[   27.100020]  kasan_save_track+0x20/0x40
[   27.100065]  kasan_save_free_info+0x4c/0x78
[   27.100101]  __kasan_slab_free+0x6c/0x98
[   27.101143]  kfree+0x214/0x3c8
[   27.101198]  ksize_uaf+0x11c/0x5f8
[   27.101287]  kunit_try_run_case+0x170/0x3f0
[   27.101324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.101368]  kthread+0x328/0x630
[   27.101517]  ret_from_fork+0x10/0x20
[   27.101827] 
[   27.101908] The buggy address belongs to the object at fff00000c643fa00
[   27.101908]  which belongs to the cache kmalloc-128 of size 128
[   27.102276] The buggy address is located 0 bytes inside of
[   27.102276]  freed 128-byte region [fff00000c643fa00, fff00000c643fa80)
[   27.102727] 
[   27.102994] The buggy address belongs to the physical page:
[   27.103128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   27.103519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.103579] page_type: f5(slab)
[   27.103624] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   27.103674] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.104049] page dumped because: kasan: bad access detected
[   27.104098] 
[   27.104118] Memory state around the buggy address:
[   27.104149]  fff00000c643f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.104658]  fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.104710] >fff00000c643fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.104958]                    ^
[   27.104990]  fff00000c643fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.105032]  fff00000c643fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.105095] ==================================================================
[   27.118633] ==================================================================
[   27.118683] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   27.118734] Read of size 1 at addr fff00000c643fa78 by task kunit_try_catch/208
[   27.118784] 
[   27.118813] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.118900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.118927] Hardware name: linux,dummy-virt (DT)
[   27.120230] Call trace:
[   27.120271]  show_stack+0x20/0x38 (C)
[   27.120391]  dump_stack_lvl+0x8c/0xd0
[   27.120441]  print_report+0x118/0x608
[   27.120488]  kasan_report+0xdc/0x128
[   27.120533]  __asan_report_load1_noabort+0x20/0x30
[   27.120676]  ksize_uaf+0x544/0x5f8
[   27.120949]  kunit_try_run_case+0x170/0x3f0
[   27.121386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.121512]  kthread+0x328/0x630
[   27.121763]  ret_from_fork+0x10/0x20
[   27.122125] 
[   27.122176] Allocated by task 208:
[   27.122239]  kasan_save_stack+0x3c/0x68
[   27.122284]  kasan_save_track+0x20/0x40
[   27.122321]  kasan_save_alloc_info+0x40/0x58
[   27.122358]  __kasan_kmalloc+0xd4/0xd8
[   27.122394]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.123317]  ksize_uaf+0xb8/0x5f8
[   27.123747]  kunit_try_run_case+0x170/0x3f0
[   27.123859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.123905]  kthread+0x328/0x630
[   27.123937]  ret_from_fork+0x10/0x20
[   27.124115] 
[   27.124483] Freed by task 208:
[   27.124728]  kasan_save_stack+0x3c/0x68
[   27.124778]  kasan_save_track+0x20/0x40
[   27.124816]  kasan_save_free_info+0x4c/0x78
[   27.124853]  __kasan_slab_free+0x6c/0x98
[   27.125690]  kfree+0x214/0x3c8
[   27.125736]  ksize_uaf+0x11c/0x5f8
[   27.125773]  kunit_try_run_case+0x170/0x3f0
[   27.125809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.126358]  kthread+0x328/0x630
[   27.126689]  ret_from_fork+0x10/0x20
[   27.126991] 
[   27.127114] The buggy address belongs to the object at fff00000c643fa00
[   27.127114]  which belongs to the cache kmalloc-128 of size 128
[   27.127416] The buggy address is located 120 bytes inside of
[   27.127416]  freed 128-byte region [fff00000c643fa00, fff00000c643fa80)
[   27.127522] 
[   27.127801] The buggy address belongs to the physical page:
[   27.127870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   27.127946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.128268] page_type: f5(slab)
[   27.128521] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   27.128702] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.128749] page dumped because: kasan: bad access detected
[   27.128782] 
[   27.128799] Memory state around the buggy address:
[   27.129118]  fff00000c643f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.129337]  fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.129654] >fff00000c643fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.129736]                                                                 ^
[   27.130097]  fff00000c643fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.130181]  fff00000c643fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.130220] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   27.077219] ==================================================================
[   27.077714] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   27.077815] Read of size 1 at addr fff00000c643f97f by task kunit_try_catch/206
[   27.077865] 
[   27.077896] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.078447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.078495] Hardware name: linux,dummy-virt (DT)
[   27.078700] Call trace:
[   27.078791]  show_stack+0x20/0x38 (C)
[   27.078844]  dump_stack_lvl+0x8c/0xd0
[   27.078893]  print_report+0x118/0x608
[   27.078941]  kasan_report+0xdc/0x128
[   27.078987]  __asan_report_load1_noabort+0x20/0x30
[   27.079036]  ksize_unpoisons_memory+0x690/0x740
[   27.079095]  kunit_try_run_case+0x170/0x3f0
[   27.079989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.080189]  kthread+0x328/0x630
[   27.080435]  ret_from_fork+0x10/0x20
[   27.080488] 
[   27.080698] Allocated by task 206:
[   27.080771]  kasan_save_stack+0x3c/0x68
[   27.080976]  kasan_save_track+0x20/0x40
[   27.081226]  kasan_save_alloc_info+0x40/0x58
[   27.081512]  __kasan_kmalloc+0xd4/0xd8
[   27.081563]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.081985]  ksize_unpoisons_memory+0xc0/0x740
[   27.082027]  kunit_try_run_case+0x170/0x3f0
[   27.082546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.082712]  kthread+0x328/0x630
[   27.082787]  ret_from_fork+0x10/0x20
[   27.083076] 
[   27.083099] The buggy address belongs to the object at fff00000c643f900
[   27.083099]  which belongs to the cache kmalloc-128 of size 128
[   27.083344] The buggy address is located 12 bytes to the right of
[   27.083344]  allocated 115-byte region [fff00000c643f900, fff00000c643f973)
[   27.083410] 
[   27.083429] The buggy address belongs to the physical page:
[   27.083847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   27.084119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.084468] page_type: f5(slab)
[   27.084781] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   27.085122] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.085415] page dumped because: kasan: bad access detected
[   27.085919] 
[   27.085995] Memory state around the buggy address:
[   27.086126]  fff00000c643f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.086184]  fff00000c643f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.086226] >fff00000c643f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.086494]                                                                 ^
[   27.086601]  fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.086747]  fff00000c643fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.087065] ==================================================================
[   27.051509] ==================================================================
[   27.051753] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   27.051981] Read of size 1 at addr fff00000c643f973 by task kunit_try_catch/206
[   27.052031] 
[   27.052078] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.052833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.053110] Hardware name: linux,dummy-virt (DT)
[   27.053321] Call trace:
[   27.053385]  show_stack+0x20/0x38 (C)
[   27.053443]  dump_stack_lvl+0x8c/0xd0
[   27.053492]  print_report+0x118/0x608
[   27.054105]  kasan_report+0xdc/0x128
[   27.054549]  __asan_report_load1_noabort+0x20/0x30
[   27.054697]  ksize_unpoisons_memory+0x628/0x740
[   27.054746]  kunit_try_run_case+0x170/0x3f0
[   27.055246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.055313]  kthread+0x328/0x630
[   27.055483]  ret_from_fork+0x10/0x20
[   27.055953] 
[   27.055973] Allocated by task 206:
[   27.056067]  kasan_save_stack+0x3c/0x68
[   27.056112]  kasan_save_track+0x20/0x40
[   27.056371]  kasan_save_alloc_info+0x40/0x58
[   27.056455]  __kasan_kmalloc+0xd4/0xd8
[   27.056493]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.056606]  ksize_unpoisons_memory+0xc0/0x740
[   27.056645]  kunit_try_run_case+0x170/0x3f0
[   27.057092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.057387]  kthread+0x328/0x630
[   27.057425]  ret_from_fork+0x10/0x20
[   27.057461] 
[   27.057481] The buggy address belongs to the object at fff00000c643f900
[   27.057481]  which belongs to the cache kmalloc-128 of size 128
[   27.057542] The buggy address is located 0 bytes to the right of
[   27.057542]  allocated 115-byte region [fff00000c643f900, fff00000c643f973)
[   27.058380] 
[   27.058729] The buggy address belongs to the physical page:
[   27.058816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   27.058926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.058979] page_type: f5(slab)
[   27.059617] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   27.059676] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.059718] page dumped because: kasan: bad access detected
[   27.059750] 
[   27.059768] Memory state around the buggy address:
[   27.059802]  fff00000c643f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.060202]  fff00000c643f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.060444] >fff00000c643f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.060776]                                                              ^
[   27.060853]  fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.060895]  fff00000c643fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.060933] ==================================================================
[   27.065783] ==================================================================
[   27.065832] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   27.065889] Read of size 1 at addr fff00000c643f978 by task kunit_try_catch/206
[   27.065936] 
[   27.065965] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.066049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.066086] Hardware name: linux,dummy-virt (DT)
[   27.067359] Call trace:
[   27.067439]  show_stack+0x20/0x38 (C)
[   27.067494]  dump_stack_lvl+0x8c/0xd0
[   27.067551]  print_report+0x118/0x608
[   27.067597]  kasan_report+0xdc/0x128
[   27.067642]  __asan_report_load1_noabort+0x20/0x30
[   27.068130]  ksize_unpoisons_memory+0x618/0x740
[   27.068341]  kunit_try_run_case+0x170/0x3f0
[   27.068395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.068923]  kthread+0x328/0x630
[   27.069104]  ret_from_fork+0x10/0x20
[   27.069695] 
[   27.069892] Allocated by task 206:
[   27.070111]  kasan_save_stack+0x3c/0x68
[   27.070165]  kasan_save_track+0x20/0x40
[   27.070318]  kasan_save_alloc_info+0x40/0x58
[   27.070483]  __kasan_kmalloc+0xd4/0xd8
[   27.070679]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.070726]  ksize_unpoisons_memory+0xc0/0x740
[   27.071106]  kunit_try_run_case+0x170/0x3f0
[   27.071163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.071382]  kthread+0x328/0x630
[   27.071443]  ret_from_fork+0x10/0x20
[   27.071669] 
[   27.071853] The buggy address belongs to the object at fff00000c643f900
[   27.071853]  which belongs to the cache kmalloc-128 of size 128
[   27.071968] The buggy address is located 5 bytes to the right of
[   27.071968]  allocated 115-byte region [fff00000c643f900, fff00000c643f973)
[   27.072218] 
[   27.072404] The buggy address belongs to the physical page:
[   27.072441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   27.072886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.072942] page_type: f5(slab)
[   27.073163] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   27.073388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.073432] page dumped because: kasan: bad access detected
[   27.073462] 
[   27.073481] Memory state around the buggy address:
[   27.073511]  fff00000c643f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.074297]  fff00000c643f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.074625] >fff00000c643f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.074825]                                                                 ^
[   27.074992]  fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.075118]  fff00000c643fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.075157] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   27.020930] ==================================================================
[   27.021002] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   27.021049] Free of addr fff00000c16b9ca0 by task kunit_try_catch/204
[   27.021105] 
[   27.021132] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.021219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.021247] Hardware name: linux,dummy-virt (DT)
[   27.021277] Call trace:
[   27.021298]  show_stack+0x20/0x38 (C)
[   27.021346]  dump_stack_lvl+0x8c/0xd0
[   27.021393]  print_report+0x118/0x608
[   27.021437]  kasan_report_invalid_free+0xc0/0xe8
[   27.023198]  check_slab_allocation+0xd4/0x108
[   27.023813]  __kasan_slab_pre_free+0x2c/0x48
[   27.024124]  kfree+0xe8/0x3c8
[   27.024394]  kfree_sensitive+0x3c/0xb0
[   27.024477]  kmalloc_double_kzfree+0x168/0x308
[   27.024529]  kunit_try_run_case+0x170/0x3f0
[   27.024574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.025220]  kthread+0x328/0x630
[   27.025404]  ret_from_fork+0x10/0x20
[   27.025692] 
[   27.025733] Allocated by task 204:
[   27.025763]  kasan_save_stack+0x3c/0x68
[   27.026200]  kasan_save_track+0x20/0x40
[   27.026291]  kasan_save_alloc_info+0x40/0x58
[   27.026485]  __kasan_kmalloc+0xd4/0xd8
[   27.026582]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.026928]  kmalloc_double_kzfree+0xb8/0x308
[   27.027091]  kunit_try_run_case+0x170/0x3f0
[   27.027133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.027179]  kthread+0x328/0x630
[   27.027710]  ret_from_fork+0x10/0x20
[   27.027798] 
[   27.028154] Freed by task 204:
[   27.028240]  kasan_save_stack+0x3c/0x68
[   27.028520]  kasan_save_track+0x20/0x40
[   27.028560]  kasan_save_free_info+0x4c/0x78
[   27.029152]  __kasan_slab_free+0x6c/0x98
[   27.029202]  kfree+0x214/0x3c8
[   27.029240]  kfree_sensitive+0x80/0xb0
[   27.029277]  kmalloc_double_kzfree+0x11c/0x308
[   27.029314]  kunit_try_run_case+0x170/0x3f0
[   27.029352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.029398]  kthread+0x328/0x630
[   27.029912]  ret_from_fork+0x10/0x20
[   27.029955] 
[   27.029974] The buggy address belongs to the object at fff00000c16b9ca0
[   27.029974]  which belongs to the cache kmalloc-16 of size 16
[   27.030723] The buggy address is located 0 bytes inside of
[   27.030723]  16-byte region [fff00000c16b9ca0, fff00000c16b9cb0)
[   27.031289] 
[   27.031472] The buggy address belongs to the physical page:
[   27.031632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9
[   27.031852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.031906] page_type: f5(slab)
[   27.031945] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.031995] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000
[   27.032036] page dumped because: kasan: bad access detected
[   27.032361] 
[   27.032388] Memory state around the buggy address:
[   27.032466]  fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.032567]  fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.033031] >fff00000c16b9c80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   27.033281]                                ^
[   27.033358]  fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.033779]  fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.034095] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   27.006257] ==================================================================
[   27.007276] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   27.007363] Read of size 1 at addr fff00000c16b9ca0 by task kunit_try_catch/204
[   27.007415] 
[   27.007563] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.008175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.008221] Hardware name: linux,dummy-virt (DT)
[   27.008252] Call trace:
[   27.008473]  show_stack+0x20/0x38 (C)
[   27.008854]  dump_stack_lvl+0x8c/0xd0
[   27.009149]  print_report+0x118/0x608
[   27.009205]  kasan_report+0xdc/0x128
[   27.009604]  __kasan_check_byte+0x54/0x70
[   27.009893]  kfree_sensitive+0x30/0xb0
[   27.010094]  kmalloc_double_kzfree+0x168/0x308
[   27.010602]  kunit_try_run_case+0x170/0x3f0
[   27.011048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.011146]  kthread+0x328/0x630
[   27.011191]  ret_from_fork+0x10/0x20
[   27.011246] 
[   27.011265] Allocated by task 204:
[   27.011295]  kasan_save_stack+0x3c/0x68
[   27.012162]  kasan_save_track+0x20/0x40
[   27.012392]  kasan_save_alloc_info+0x40/0x58
[   27.012452]  __kasan_kmalloc+0xd4/0xd8
[   27.012664]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.012785]  kmalloc_double_kzfree+0xb8/0x308
[   27.012827]  kunit_try_run_case+0x170/0x3f0
[   27.013097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.013308]  kthread+0x328/0x630
[   27.013620]  ret_from_fork+0x10/0x20
[   27.013846] 
[   27.013866] Freed by task 204:
[   27.013894]  kasan_save_stack+0x3c/0x68
[   27.014346]  kasan_save_track+0x20/0x40
[   27.014431]  kasan_save_free_info+0x4c/0x78
[   27.014700]  __kasan_slab_free+0x6c/0x98
[   27.014741]  kfree+0x214/0x3c8
[   27.014775]  kfree_sensitive+0x80/0xb0
[   27.014810]  kmalloc_double_kzfree+0x11c/0x308
[   27.015437]  kunit_try_run_case+0x170/0x3f0
[   27.015484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.015530]  kthread+0x328/0x630
[   27.015562]  ret_from_fork+0x10/0x20
[   27.015599] 
[   27.015618] The buggy address belongs to the object at fff00000c16b9ca0
[   27.015618]  which belongs to the cache kmalloc-16 of size 16
[   27.015678] The buggy address is located 0 bytes inside of
[   27.015678]  freed 16-byte region [fff00000c16b9ca0, fff00000c16b9cb0)
[   27.016524] 
[   27.016555] The buggy address belongs to the physical page:
[   27.016599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9
[   27.016684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.017221] page_type: f5(slab)
[   27.017265] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.017315] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000
[   27.017824] page dumped because: kasan: bad access detected
[   27.017894] 
[   27.017914] Memory state around the buggy address:
[   27.017950]  fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.018393]  fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.018621] >fff00000c16b9c80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   27.018665]                                ^
[   27.018696]  fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.018740]  fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.018779] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   26.941568] ==================================================================
[   26.941768] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   26.941884] Write of size 33 at addr fff00000c5753700 by task kunit_try_catch/198
[   26.942089] 
[   26.942236] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.942351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.942404] Hardware name: linux,dummy-virt (DT)
[   26.942550] Call trace:
[   26.942575]  show_stack+0x20/0x38 (C)
[   26.942625]  dump_stack_lvl+0x8c/0xd0
[   26.942726]  print_report+0x118/0x608
[   26.942776]  kasan_report+0xdc/0x128
[   26.942822]  kasan_check_range+0x100/0x1a8
[   26.942869]  __asan_memset+0x34/0x78
[   26.942919]  kmalloc_uaf_memset+0x170/0x310
[   26.943181]  kunit_try_run_case+0x170/0x3f0
[   26.943231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.943284]  kthread+0x328/0x630
[   26.943326]  ret_from_fork+0x10/0x20
[   26.943371] 
[   26.943390] Allocated by task 198:
[   26.943422]  kasan_save_stack+0x3c/0x68
[   26.943625]  kasan_save_track+0x20/0x40
[   26.944010]  kasan_save_alloc_info+0x40/0x58
[   26.944189]  __kasan_kmalloc+0xd4/0xd8
[   26.944659]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.945006]  kmalloc_uaf_memset+0xb8/0x310
[   26.945068]  kunit_try_run_case+0x170/0x3f0
[   26.945106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.945150]  kthread+0x328/0x630
[   26.945182]  ret_from_fork+0x10/0x20
[   26.945244] 
[   26.945264] Freed by task 198:
[   26.945319]  kasan_save_stack+0x3c/0x68
[   26.945455]  kasan_save_track+0x20/0x40
[   26.945641]  kasan_save_free_info+0x4c/0x78
[   26.945853]  __kasan_slab_free+0x6c/0x98
[   26.945981]  kfree+0x214/0x3c8
[   26.946015]  kmalloc_uaf_memset+0x11c/0x310
[   26.946072]  kunit_try_run_case+0x170/0x3f0
[   26.946133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.946216]  kthread+0x328/0x630
[   26.946400]  ret_from_fork+0x10/0x20
[   26.946582] 
[   26.946603] The buggy address belongs to the object at fff00000c5753700
[   26.946603]  which belongs to the cache kmalloc-64 of size 64
[   26.947164] The buggy address is located 0 bytes inside of
[   26.947164]  freed 64-byte region [fff00000c5753700, fff00000c5753740)
[   26.947280] 
[   26.947370] The buggy address belongs to the physical page:
[   26.947399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105753
[   26.947574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.947635] page_type: f5(slab)
[   26.947673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.947814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.947857] page dumped because: kasan: bad access detected
[   26.947889] 
[   26.948051] Memory state around the buggy address:
[   26.948261]  fff00000c5753600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.948315]  fff00000c5753680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.948379] >fff00000c5753700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.948656]                    ^
[   26.948719]  fff00000c5753780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.948790]  fff00000c5753800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.948884] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   26.928826] ==================================================================
[   26.928883] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   26.928969] Read of size 1 at addr fff00000c16b9c88 by task kunit_try_catch/196
[   26.929020] 
[   26.929047] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.929146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.929171] Hardware name: linux,dummy-virt (DT)
[   26.929210] Call trace:
[   26.929232]  show_stack+0x20/0x38 (C)
[   26.929281]  dump_stack_lvl+0x8c/0xd0
[   26.929327]  print_report+0x118/0x608
[   26.929373]  kasan_report+0xdc/0x128
[   26.929418]  __asan_report_load1_noabort+0x20/0x30
[   26.929538]  kmalloc_uaf+0x300/0x338
[   26.929581]  kunit_try_run_case+0x170/0x3f0
[   26.929628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.929679]  kthread+0x328/0x630
[   26.929730]  ret_from_fork+0x10/0x20
[   26.929778] 
[   26.929795] Allocated by task 196:
[   26.929820]  kasan_save_stack+0x3c/0x68
[   26.929861]  kasan_save_track+0x20/0x40
[   26.929896]  kasan_save_alloc_info+0x40/0x58
[   26.929934]  __kasan_kmalloc+0xd4/0xd8
[   26.929970]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.930162]  kmalloc_uaf+0xb8/0x338
[   26.930310]  kunit_try_run_case+0x170/0x3f0
[   26.930368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.930413]  kthread+0x328/0x630
[   26.930489]  ret_from_fork+0x10/0x20
[   26.930523] 
[   26.930542] Freed by task 196:
[   26.930567]  kasan_save_stack+0x3c/0x68
[   26.930604]  kasan_save_track+0x20/0x40
[   26.930639]  kasan_save_free_info+0x4c/0x78
[   26.930675]  __kasan_slab_free+0x6c/0x98
[   26.930713]  kfree+0x214/0x3c8
[   26.930786]  kmalloc_uaf+0x11c/0x338
[   26.930922]  kunit_try_run_case+0x170/0x3f0
[   26.930960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.931003]  kthread+0x328/0x630
[   26.931041]  ret_from_fork+0x10/0x20
[   26.931143] 
[   26.931161] The buggy address belongs to the object at fff00000c16b9c80
[   26.931161]  which belongs to the cache kmalloc-16 of size 16
[   26.931334] The buggy address is located 8 bytes inside of
[   26.931334]  freed 16-byte region [fff00000c16b9c80, fff00000c16b9c90)
[   26.931494] 
[   26.931549] The buggy address belongs to the physical page:
[   26.931663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9
[   26.931747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.931827] page_type: f5(slab)
[   26.931863] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.931913] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000
[   26.931952] page dumped because: kasan: bad access detected
[   26.931982] 
[   26.932001] Memory state around the buggy address:
[   26.932029]  fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.932080]  fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.932121] >fff00000c16b9c80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.932158]                       ^
[   26.932184]  fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.932226]  fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.932262] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   26.918604] ==================================================================
[   26.918659] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   26.918710] Read of size 64 at addr fff00000c5753404 by task kunit_try_catch/194
[   26.918759] 
[   26.918788] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.918881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.918908] Hardware name: linux,dummy-virt (DT)
[   26.918979] Call trace:
[   26.919006]  show_stack+0x20/0x38 (C)
[   26.919066]  dump_stack_lvl+0x8c/0xd0
[   26.919113]  print_report+0x118/0x608
[   26.919159]  kasan_report+0xdc/0x128
[   26.919202]  kasan_check_range+0x100/0x1a8
[   26.919260]  __asan_memmove+0x3c/0x98
[   26.919302]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   26.919352]  kunit_try_run_case+0x170/0x3f0
[   26.919397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.919448]  kthread+0x328/0x630
[   26.919489]  ret_from_fork+0x10/0x20
[   26.919585] 
[   26.919604] Allocated by task 194:
[   26.919632]  kasan_save_stack+0x3c/0x68
[   26.919674]  kasan_save_track+0x20/0x40
[   26.919712]  kasan_save_alloc_info+0x40/0x58
[   26.919748]  __kasan_kmalloc+0xd4/0xd8
[   26.920392]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.920438]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   26.920545]  kunit_try_run_case+0x170/0x3f0
[   26.920587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.920631]  kthread+0x328/0x630
[   26.920684]  ret_from_fork+0x10/0x20
[   26.920721] 
[   26.920739] The buggy address belongs to the object at fff00000c5753400
[   26.920739]  which belongs to the cache kmalloc-64 of size 64
[   26.920795] The buggy address is located 4 bytes inside of
[   26.920795]  allocated 64-byte region [fff00000c5753400, fff00000c5753440)
[   26.920855] 
[   26.920873] The buggy address belongs to the physical page:
[   26.920903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105753
[   26.920953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.920997] page_type: f5(slab)
[   26.921085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.921138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.921175] page dumped because: kasan: bad access detected
[   26.921206] 
[   26.921225] Memory state around the buggy address:
[   26.921253]  fff00000c5753300: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   26.921295]  fff00000c5753380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.921338] >fff00000c5753400: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.921375]                                            ^
[   26.921406]  fff00000c5753480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.921448]  fff00000c5753500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.921486] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   26.909899] ==================================================================
[   26.909977] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   26.910032] Read of size 18446744073709551614 at addr fff00000c5753204 by task kunit_try_catch/192
[   26.910126] 
[   26.910162] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.910262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.910288] Hardware name: linux,dummy-virt (DT)
[   26.910407] Call trace:
[   26.910458]  show_stack+0x20/0x38 (C)
[   26.910621]  dump_stack_lvl+0x8c/0xd0
[   26.910670]  print_report+0x118/0x608
[   26.910717]  kasan_report+0xdc/0x128
[   26.910761]  kasan_check_range+0x100/0x1a8
[   26.910808]  __asan_memmove+0x3c/0x98
[   26.910851]  kmalloc_memmove_negative_size+0x154/0x2e0
[   26.910902]  kunit_try_run_case+0x170/0x3f0
[   26.910948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.911001]  kthread+0x328/0x630
[   26.911042]  ret_from_fork+0x10/0x20
[   26.911098] 
[   26.911125] Allocated by task 192:
[   26.911153]  kasan_save_stack+0x3c/0x68
[   26.911191]  kasan_save_track+0x20/0x40
[   26.911229]  kasan_save_alloc_info+0x40/0x58
[   26.911266]  __kasan_kmalloc+0xd4/0xd8
[   26.911302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.911341]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   26.911418]  kunit_try_run_case+0x170/0x3f0
[   26.911530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.911653]  kthread+0x328/0x630
[   26.911752]  ret_from_fork+0x10/0x20
[   26.911840] 
[   26.911859] The buggy address belongs to the object at fff00000c5753200
[   26.911859]  which belongs to the cache kmalloc-64 of size 64
[   26.912185] The buggy address is located 4 bytes inside of
[   26.912185]  64-byte region [fff00000c5753200, fff00000c5753240)
[   26.912246] 
[   26.912272] The buggy address belongs to the physical page:
[   26.912302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105753
[   26.912386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.912479] page_type: f5(slab)
[   26.912521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.912606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.912763] page dumped because: kasan: bad access detected
[   26.912900] 
[   26.912918] Memory state around the buggy address:
[   26.913011]  fff00000c5753100: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   26.913134]  fff00000c5753180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.913175] >fff00000c5753200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.913214]                    ^
[   26.913245]  fff00000c5753280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.913421]  fff00000c5753300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.913458] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   26.900485] ==================================================================
[   26.900540] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   26.900588] Write of size 16 at addr fff00000c643f869 by task kunit_try_catch/190
[   26.900636] 
[   26.900663] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.900746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.901208] Hardware name: linux,dummy-virt (DT)
[   26.901253] Call trace:
[   26.901274]  show_stack+0x20/0x38 (C)
[   26.901322]  dump_stack_lvl+0x8c/0xd0
[   26.901367]  print_report+0x118/0x608
[   26.901411]  kasan_report+0xdc/0x128
[   26.901455]  kasan_check_range+0x100/0x1a8
[   26.901501]  __asan_memset+0x34/0x78
[   26.901542]  kmalloc_oob_memset_16+0x150/0x2f8
[   26.901587]  kunit_try_run_case+0x170/0x3f0
[   26.901632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.901682]  kthread+0x328/0x630
[   26.901723]  ret_from_fork+0x10/0x20
[   26.901768] 
[   26.901812] Allocated by task 190:
[   26.901839]  kasan_save_stack+0x3c/0x68
[   26.901878]  kasan_save_track+0x20/0x40
[   26.901914]  kasan_save_alloc_info+0x40/0x58
[   26.901949]  __kasan_kmalloc+0xd4/0xd8
[   26.901984]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.902022]  kmalloc_oob_memset_16+0xb0/0x2f8
[   26.902068]  kunit_try_run_case+0x170/0x3f0
[   26.902104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.902146]  kthread+0x328/0x630
[   26.902183]  ret_from_fork+0x10/0x20
[   26.902218] 
[   26.902235] The buggy address belongs to the object at fff00000c643f800
[   26.902235]  which belongs to the cache kmalloc-128 of size 128
[   26.902369] The buggy address is located 105 bytes inside of
[   26.902369]  allocated 120-byte region [fff00000c643f800, fff00000c643f878)
[   26.902525] 
[   26.902662] The buggy address belongs to the physical page:
[   26.902691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.902739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.902783] page_type: f5(slab)
[   26.902819] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.902866] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.902903] page dumped because: kasan: bad access detected
[   26.902941] 
[   26.902958] Memory state around the buggy address:
[   26.902986]  fff00000c643f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.903032]  fff00000c643f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.903082] >fff00000c643f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.903117]                                                                 ^
[   26.903156]  fff00000c643f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.903246]  fff00000c643f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.903368] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   26.891298] ==================================================================
[   26.891353] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   26.891402] Write of size 8 at addr fff00000c643f771 by task kunit_try_catch/188
[   26.891449] 
[   26.891477] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.891562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.891587] Hardware name: linux,dummy-virt (DT)
[   26.891880] Call trace:
[   26.891922]  show_stack+0x20/0x38 (C)
[   26.892006]  dump_stack_lvl+0x8c/0xd0
[   26.892085]  print_report+0x118/0x608
[   26.892156]  kasan_report+0xdc/0x128
[   26.892991]  kasan_check_range+0x100/0x1a8
[   26.893040]  __asan_memset+0x34/0x78
[   26.893119]  kmalloc_oob_memset_8+0x150/0x2f8
[   26.893164]  kunit_try_run_case+0x170/0x3f0
[   26.893210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.893261]  kthread+0x328/0x630
[   26.893302]  ret_from_fork+0x10/0x20
[   26.893357] 
[   26.893375] Allocated by task 188:
[   26.893400]  kasan_save_stack+0x3c/0x68
[   26.893440]  kasan_save_track+0x20/0x40
[   26.893476]  kasan_save_alloc_info+0x40/0x58
[   26.893512]  __kasan_kmalloc+0xd4/0xd8
[   26.893547]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.893585]  kmalloc_oob_memset_8+0xb0/0x2f8
[   26.893711]  kunit_try_run_case+0x170/0x3f0
[   26.893755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.893891]  kthread+0x328/0x630
[   26.893962]  ret_from_fork+0x10/0x20
[   26.894105] 
[   26.894123] The buggy address belongs to the object at fff00000c643f700
[   26.894123]  which belongs to the cache kmalloc-128 of size 128
[   26.894186] The buggy address is located 113 bytes inside of
[   26.894186]  allocated 120-byte region [fff00000c643f700, fff00000c643f778)
[   26.894376] 
[   26.894397] The buggy address belongs to the physical page:
[   26.894426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.894475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.894519] page_type: f5(slab)
[   26.894564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.894612] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.894649] page dumped because: kasan: bad access detected
[   26.894678] 
[   26.894695] Memory state around the buggy address:
[   26.894724]  fff00000c643f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.894764]  fff00000c643f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.894803] >fff00000c643f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.894839]                                                                 ^
[   26.894895]  fff00000c643f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.895042]  fff00000c643f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.895132] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   26.884354] ==================================================================
[   26.884413] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   26.884468] Write of size 4 at addr fff00000c643f675 by task kunit_try_catch/186
[   26.884515] 
[   26.884548] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.884633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.884658] Hardware name: linux,dummy-virt (DT)
[   26.884687] Call trace:
[   26.884709]  show_stack+0x20/0x38 (C)
[   26.884755]  dump_stack_lvl+0x8c/0xd0
[   26.884801]  print_report+0x118/0x608
[   26.884846]  kasan_report+0xdc/0x128
[   26.884892]  kasan_check_range+0x100/0x1a8
[   26.884939]  __asan_memset+0x34/0x78
[   26.884979]  kmalloc_oob_memset_4+0x150/0x300
[   26.885024]  kunit_try_run_case+0x170/0x3f0
[   26.885111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.885309]  kthread+0x328/0x630
[   26.885350]  ret_from_fork+0x10/0x20
[   26.885396] 
[   26.885413] Allocated by task 186:
[   26.885439]  kasan_save_stack+0x3c/0x68
[   26.885480]  kasan_save_track+0x20/0x40
[   26.885516]  kasan_save_alloc_info+0x40/0x58
[   26.885563]  __kasan_kmalloc+0xd4/0xd8
[   26.885736]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.885794]  kmalloc_oob_memset_4+0xb0/0x300
[   26.885861]  kunit_try_run_case+0x170/0x3f0
[   26.885948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.885990]  kthread+0x328/0x630
[   26.886051]  ret_from_fork+0x10/0x20
[   26.886219] 
[   26.886261] The buggy address belongs to the object at fff00000c643f600
[   26.886261]  which belongs to the cache kmalloc-128 of size 128
[   26.886318] The buggy address is located 117 bytes inside of
[   26.886318]  allocated 120-byte region [fff00000c643f600, fff00000c643f678)
[   26.886377] 
[   26.886396] The buggy address belongs to the physical page:
[   26.886426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.886477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.886523] page_type: f5(slab)
[   26.886560] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.886607] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.886645] page dumped because: kasan: bad access detected
[   26.886714] 
[   26.886816] Memory state around the buggy address:
[   26.886895]  fff00000c643f500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.886942]  fff00000c643f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.887061] >fff00000c643f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.887099]                                                                 ^
[   26.887137]  fff00000c643f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.887176]  fff00000c643f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.887214] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   26.864083] ==================================================================
[   26.864509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   26.864838] Write of size 2 at addr fff00000c643f577 by task kunit_try_catch/184
[   26.865000] 
[   26.865156] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.865500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.865557] Hardware name: linux,dummy-virt (DT)
[   26.865623] Call trace:
[   26.865749]  show_stack+0x20/0x38 (C)
[   26.865804]  dump_stack_lvl+0x8c/0xd0
[   26.866119]  print_report+0x118/0x608
[   26.866248]  kasan_report+0xdc/0x128
[   26.866652]  kasan_check_range+0x100/0x1a8
[   26.866787]  __asan_memset+0x34/0x78
[   26.866874]  kmalloc_oob_memset_2+0x150/0x2f8
[   26.866967]  kunit_try_run_case+0x170/0x3f0
[   26.867069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.867598]  kthread+0x328/0x630
[   26.867690]  ret_from_fork+0x10/0x20
[   26.867824] 
[   26.867873] Allocated by task 184:
[   26.867963]  kasan_save_stack+0x3c/0x68
[   26.868077]  kasan_save_track+0x20/0x40
[   26.868115]  kasan_save_alloc_info+0x40/0x58
[   26.868309]  __kasan_kmalloc+0xd4/0xd8
[   26.868463]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.868615]  kmalloc_oob_memset_2+0xb0/0x2f8
[   26.868730]  kunit_try_run_case+0x170/0x3f0
[   26.868911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.869104]  kthread+0x328/0x630
[   26.869241]  ret_from_fork+0x10/0x20
[   26.869320] 
[   26.869426] The buggy address belongs to the object at fff00000c643f500
[   26.869426]  which belongs to the cache kmalloc-128 of size 128
[   26.869499] The buggy address is located 119 bytes inside of
[   26.869499]  allocated 120-byte region [fff00000c643f500, fff00000c643f578)
[   26.869607] 
[   26.869634] The buggy address belongs to the physical page:
[   26.869677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.869733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.869795] page_type: f5(slab)
[   26.869843] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.869892] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.869937] page dumped because: kasan: bad access detected
[   26.869967] 
[   26.869993] Memory state around the buggy address:
[   26.870026]  fff00000c643f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.870234]  fff00000c643f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.870451] >fff00000c643f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.870745]                                                                 ^
[   26.870802]  fff00000c643f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.871289]  fff00000c643f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.871436] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   26.849242] ==================================================================
[   26.849338] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   26.849469] Write of size 128 at addr fff00000c643f400 by task kunit_try_catch/182
[   26.849527] 
[   26.849583] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.849984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.850081] Hardware name: linux,dummy-virt (DT)
[   26.850165] Call trace:
[   26.850215]  show_stack+0x20/0x38 (C)
[   26.850269]  dump_stack_lvl+0x8c/0xd0
[   26.850335]  print_report+0x118/0x608
[   26.850467]  kasan_report+0xdc/0x128
[   26.850533]  kasan_check_range+0x100/0x1a8
[   26.850581]  __asan_memset+0x34/0x78
[   26.850882]  kmalloc_oob_in_memset+0x144/0x2d0
[   26.851092]  kunit_try_run_case+0x170/0x3f0
[   26.851197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.851252]  kthread+0x328/0x630
[   26.851294]  ret_from_fork+0x10/0x20
[   26.851481] 
[   26.851499] Allocated by task 182:
[   26.851918]  kasan_save_stack+0x3c/0x68
[   26.852024]  kasan_save_track+0x20/0x40
[   26.852126]  kasan_save_alloc_info+0x40/0x58
[   26.852198]  __kasan_kmalloc+0xd4/0xd8
[   26.852490]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.852616]  kmalloc_oob_in_memset+0xb0/0x2d0
[   26.852658]  kunit_try_run_case+0x170/0x3f0
[   26.852695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.852796]  kthread+0x328/0x630
[   26.852845]  ret_from_fork+0x10/0x20
[   26.852880] 
[   26.852899] The buggy address belongs to the object at fff00000c643f400
[   26.852899]  which belongs to the cache kmalloc-128 of size 128
[   26.852976] The buggy address is located 0 bytes inside of
[   26.852976]  allocated 120-byte region [fff00000c643f400, fff00000c643f478)
[   26.853041] 
[   26.853078] The buggy address belongs to the physical page:
[   26.853109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.853182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.853232] page_type: f5(slab)
[   26.853269] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.853325] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.853363] page dumped because: kasan: bad access detected
[   26.853393] 
[   26.853410] Memory state around the buggy address:
[   26.853439]  fff00000c643f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.853479]  fff00000c643f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.853519] >fff00000c643f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.853571]                                                                 ^
[   26.853618]  fff00000c643f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.853672]  fff00000c643f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.853714] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   26.829812] ==================================================================
[   26.829866] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   26.829917] Read of size 16 at addr fff00000c16b9c60 by task kunit_try_catch/180
[   26.830221] 
[   26.830375] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.830709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.830745] Hardware name: linux,dummy-virt (DT)
[   26.830906] Call trace:
[   26.830983]  show_stack+0x20/0x38 (C)
[   26.831039]  dump_stack_lvl+0x8c/0xd0
[   26.831149]  print_report+0x118/0x608
[   26.831236]  kasan_report+0xdc/0x128
[   26.831285]  __asan_report_load16_noabort+0x20/0x30
[   26.831333]  kmalloc_uaf_16+0x3bc/0x438
[   26.831640]  kunit_try_run_case+0x170/0x3f0
[   26.831938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.832193]  kthread+0x328/0x630
[   26.832376]  ret_from_fork+0x10/0x20
[   26.832592] 
[   26.832761] Allocated by task 180:
[   26.832799]  kasan_save_stack+0x3c/0x68
[   26.832841]  kasan_save_track+0x20/0x40
[   26.832877]  kasan_save_alloc_info+0x40/0x58
[   26.832914]  __kasan_kmalloc+0xd4/0xd8
[   26.833296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.833404]  kmalloc_uaf_16+0x140/0x438
[   26.833538]  kunit_try_run_case+0x170/0x3f0
[   26.833617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.833797]  kthread+0x328/0x630
[   26.833843]  ret_from_fork+0x10/0x20
[   26.833898] 
[   26.834073] Freed by task 180:
[   26.834208]  kasan_save_stack+0x3c/0x68
[   26.834355]  kasan_save_track+0x20/0x40
[   26.834521]  kasan_save_free_info+0x4c/0x78
[   26.834626]  __kasan_slab_free+0x6c/0x98
[   26.834738]  kfree+0x214/0x3c8
[   26.834791]  kmalloc_uaf_16+0x190/0x438
[   26.834870]  kunit_try_run_case+0x170/0x3f0
[   26.835179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.835713]  kthread+0x328/0x630
[   26.836112]  ret_from_fork+0x10/0x20
[   26.836219] 
[   26.836294] The buggy address belongs to the object at fff00000c16b9c60
[   26.836294]  which belongs to the cache kmalloc-16 of size 16
[   26.836352] The buggy address is located 0 bytes inside of
[   26.836352]  freed 16-byte region [fff00000c16b9c60, fff00000c16b9c70)
[   26.836613] 
[   26.836740] The buggy address belongs to the physical page:
[   26.836805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9
[   26.836922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.837271] page_type: f5(slab)
[   26.837365] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.837585] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000
[   26.837662] page dumped because: kasan: bad access detected
[   26.837706] 
[   26.837723] Memory state around the buggy address:
[   26.837760]  fff00000c16b9b00: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.837811]  fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.837851] >fff00000c16b9c00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   26.837887]                                                        ^
[   26.837924]  fff00000c16b9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.837970]  fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.838006] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   26.814199] ==================================================================
[   26.814280] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   26.814839] Write of size 16 at addr fff00000c16b9c00 by task kunit_try_catch/178
[   26.815007] 
[   26.815090] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.815311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.815696] Hardware name: linux,dummy-virt (DT)
[   26.815753] Call trace:
[   26.816074]  show_stack+0x20/0x38 (C)
[   26.816346]  dump_stack_lvl+0x8c/0xd0
[   26.816777]  print_report+0x118/0x608
[   26.816889]  kasan_report+0xdc/0x128
[   26.817021]  __asan_report_store16_noabort+0x20/0x30
[   26.817388]  kmalloc_oob_16+0x3a0/0x3f8
[   26.817542]  kunit_try_run_case+0x170/0x3f0
[   26.817597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.817650]  kthread+0x328/0x630
[   26.817720]  ret_from_fork+0x10/0x20
[   26.817778] 
[   26.817802] Allocated by task 178:
[   26.817829]  kasan_save_stack+0x3c/0x68
[   26.817869]  kasan_save_track+0x20/0x40
[   26.817905]  kasan_save_alloc_info+0x40/0x58
[   26.817940]  __kasan_kmalloc+0xd4/0xd8
[   26.817976]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.818013]  kmalloc_oob_16+0xb4/0x3f8
[   26.818049]  kunit_try_run_case+0x170/0x3f0
[   26.818114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.818169]  kthread+0x328/0x630
[   26.818200]  ret_from_fork+0x10/0x20
[   26.818244] 
[   26.818262] The buggy address belongs to the object at fff00000c16b9c00
[   26.818262]  which belongs to the cache kmalloc-16 of size 16
[   26.818317] The buggy address is located 0 bytes inside of
[   26.818317]  allocated 13-byte region [fff00000c16b9c00, fff00000c16b9c0d)
[   26.818386] 
[   26.818405] The buggy address belongs to the physical page:
[   26.818436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9
[   26.818490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.818544] page_type: f5(slab)
[   26.818595] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.818654] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000
[   26.818707] page dumped because: kasan: bad access detected
[   26.818738] 
[   26.818763] Memory state around the buggy address:
[   26.818802]  fff00000c16b9b00: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.818858]  fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.818898] >fff00000c16b9c00: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.818934]                       ^
[   26.818962]  fff00000c16b9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.819010]  fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.819047] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   26.791479] ==================================================================
[   26.791533] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   26.791782] Read of size 1 at addr fff00000c1c40e00 by task kunit_try_catch/176
[   26.791907] 
[   26.792147] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.792357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.792383] Hardware name: linux,dummy-virt (DT)
[   26.792630] Call trace:
[   26.792799]  show_stack+0x20/0x38 (C)
[   26.792924]  dump_stack_lvl+0x8c/0xd0
[   26.793124]  print_report+0x118/0x608
[   26.793243]  kasan_report+0xdc/0x128
[   26.793300]  __asan_report_load1_noabort+0x20/0x30
[   26.793575]  krealloc_uaf+0x4c8/0x520
[   26.793916]  kunit_try_run_case+0x170/0x3f0
[   26.794087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.794207]  kthread+0x328/0x630
[   26.794267]  ret_from_fork+0x10/0x20
[   26.794601] 
[   26.794821] Allocated by task 176:
[   26.794910]  kasan_save_stack+0x3c/0x68
[   26.794988]  kasan_save_track+0x20/0x40
[   26.795199]  kasan_save_alloc_info+0x40/0x58
[   26.795266]  __kasan_kmalloc+0xd4/0xd8
[   26.795437]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.795692]  krealloc_uaf+0xc8/0x520
[   26.795759]  kunit_try_run_case+0x170/0x3f0
[   26.795940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.796039]  kthread+0x328/0x630
[   26.796217]  ret_from_fork+0x10/0x20
[   26.796255] 
[   26.796273] Freed by task 176:
[   26.796320]  kasan_save_stack+0x3c/0x68
[   26.796523]  kasan_save_track+0x20/0x40
[   26.796671]  kasan_save_free_info+0x4c/0x78
[   26.796856]  __kasan_slab_free+0x6c/0x98
[   26.796992]  kfree+0x214/0x3c8
[   26.797155]  krealloc_uaf+0x12c/0x520
[   26.797236]  kunit_try_run_case+0x170/0x3f0
[   26.797300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.797471]  kthread+0x328/0x630
[   26.797707]  ret_from_fork+0x10/0x20
[   26.797818] 
[   26.797910] The buggy address belongs to the object at fff00000c1c40e00
[   26.797910]  which belongs to the cache kmalloc-256 of size 256
[   26.797996] The buggy address is located 0 bytes inside of
[   26.797996]  freed 256-byte region [fff00000c1c40e00, fff00000c1c40f00)
[   26.798140] 
[   26.798244] The buggy address belongs to the physical page:
[   26.798275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40
[   26.798499] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.798674] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.798907] page_type: f5(slab)
[   26.798951] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.799073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.799568] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.799642] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.799804] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff
[   26.800012] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.800125] page dumped because: kasan: bad access detected
[   26.800263] 
[   26.800313] Memory state around the buggy address:
[   26.800376]  fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.800521]  fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.800604] >fff00000c1c40e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.800775]                    ^
[   26.800832]  fff00000c1c40e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.801043]  fff00000c1c40f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.801115] ==================================================================
[   26.783507] ==================================================================
[   26.783596] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   26.783861] Read of size 1 at addr fff00000c1c40e00 by task kunit_try_catch/176
[   26.783937] 
[   26.784012] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.784147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.784173] Hardware name: linux,dummy-virt (DT)
[   26.784223] Call trace:
[   26.784246]  show_stack+0x20/0x38 (C)
[   26.784296]  dump_stack_lvl+0x8c/0xd0
[   26.784496]  print_report+0x118/0x608
[   26.784629]  kasan_report+0xdc/0x128
[   26.784768]  __kasan_check_byte+0x54/0x70
[   26.784836]  krealloc_noprof+0x44/0x360
[   26.785138]  krealloc_uaf+0x180/0x520
[   26.785240]  kunit_try_run_case+0x170/0x3f0
[   26.785365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.785489]  kthread+0x328/0x630
[   26.785532]  ret_from_fork+0x10/0x20
[   26.785625] 
[   26.785850] Allocated by task 176:
[   26.785886]  kasan_save_stack+0x3c/0x68
[   26.786237]  kasan_save_track+0x20/0x40
[   26.786390]  kasan_save_alloc_info+0x40/0x58
[   26.786538]  __kasan_kmalloc+0xd4/0xd8
[   26.786691]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.786780]  krealloc_uaf+0xc8/0x520
[   26.786923]  kunit_try_run_case+0x170/0x3f0
[   26.787028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.787278]  kthread+0x328/0x630
[   26.787420]  ret_from_fork+0x10/0x20
[   26.787539] 
[   26.787621] Freed by task 176:
[   26.787756]  kasan_save_stack+0x3c/0x68
[   26.787836]  kasan_save_track+0x20/0x40
[   26.787873]  kasan_save_free_info+0x4c/0x78
[   26.787922]  __kasan_slab_free+0x6c/0x98
[   26.788262]  kfree+0x214/0x3c8
[   26.788330]  krealloc_uaf+0x12c/0x520
[   26.788368]  kunit_try_run_case+0x170/0x3f0
[   26.788404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.788447]  kthread+0x328/0x630
[   26.788496]  ret_from_fork+0x10/0x20
[   26.788579] 
[   26.788606] The buggy address belongs to the object at fff00000c1c40e00
[   26.788606]  which belongs to the cache kmalloc-256 of size 256
[   26.788772] The buggy address is located 0 bytes inside of
[   26.788772]  freed 256-byte region [fff00000c1c40e00, fff00000c1c40f00)
[   26.788856] 
[   26.788892] The buggy address belongs to the physical page:
[   26.788925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40
[   26.788975] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.789026] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.789090] page_type: f5(slab)
[   26.789127] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.789175] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.789232] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.789288] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.789336] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff
[   26.789391] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.789430] page dumped because: kasan: bad access detected
[   26.789459] 
[   26.789477] Memory state around the buggy address:
[   26.789507]  fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.789548]  fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.789594] >fff00000c1c40e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.789636]                    ^
[   26.789662]  fff00000c1c40e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.789717]  fff00000c1c40f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.789763] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   26.649709] ==================================================================
[   26.649914] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   26.649974] Write of size 1 at addr fff00000c1c40cd0 by task kunit_try_catch/170
[   26.650021] 
[   26.650048] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.650322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.650356] Hardware name: linux,dummy-virt (DT)
[   26.650384] Call trace:
[   26.650404]  show_stack+0x20/0x38 (C)
[   26.650453]  dump_stack_lvl+0x8c/0xd0
[   26.650499]  print_report+0x118/0x608
[   26.650546]  kasan_report+0xdc/0x128
[   26.651071]  __asan_report_store1_noabort+0x20/0x30
[   26.651201]  krealloc_less_oob_helper+0xb9c/0xc50
[   26.651252]  krealloc_less_oob+0x20/0x38
[   26.651307]  kunit_try_run_case+0x170/0x3f0
[   26.651516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.651569]  kthread+0x328/0x630
[   26.651609]  ret_from_fork+0x10/0x20
[   26.651655] 
[   26.651673] Allocated by task 170:
[   26.651698]  kasan_save_stack+0x3c/0x68
[   26.651744]  kasan_save_track+0x20/0x40
[   26.651898]  kasan_save_alloc_info+0x40/0x58
[   26.652091]  __kasan_krealloc+0x118/0x178
[   26.652279]  krealloc_noprof+0x128/0x360
[   26.652316]  krealloc_less_oob_helper+0x168/0xc50
[   26.652460]  krealloc_less_oob+0x20/0x38
[   26.652562]  kunit_try_run_case+0x170/0x3f0
[   26.652598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.652639]  kthread+0x328/0x630
[   26.652669]  ret_from_fork+0x10/0x20
[   26.652709] 
[   26.652795] The buggy address belongs to the object at fff00000c1c40c00
[   26.652795]  which belongs to the cache kmalloc-256 of size 256
[   26.652899] The buggy address is located 7 bytes to the right of
[   26.652899]  allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9)
[   26.652960] 
[   26.652979] The buggy address belongs to the physical page:
[   26.653010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40
[   26.653069] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.653113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.653163] page_type: f5(slab)
[   26.653626] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.653679] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.654076] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.654508] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.654689] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff
[   26.655117] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.655186] page dumped because: kasan: bad access detected
[   26.655217] 
[   26.655234] Memory state around the buggy address:
[   26.655264]  fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.655305]  fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.655345] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.655381]                                                  ^
[   26.655880]  fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.656033]  fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.656081] ==================================================================
[   26.768025] ==================================================================
[   26.768160] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   26.768285] Write of size 1 at addr fff00000c649e0da by task kunit_try_catch/174
[   26.768335] 
[   26.768362] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.768446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.768471] Hardware name: linux,dummy-virt (DT)
[   26.768500] Call trace:
[   26.768520]  show_stack+0x20/0x38 (C)
[   26.768568]  dump_stack_lvl+0x8c/0xd0
[   26.768614]  print_report+0x118/0x608
[   26.768782]  kasan_report+0xdc/0x128
[   26.769273]  __asan_report_store1_noabort+0x20/0x30
[   26.769679]  krealloc_less_oob_helper+0xa80/0xc50
[   26.769732]  krealloc_large_less_oob+0x20/0x38
[   26.769791]  kunit_try_run_case+0x170/0x3f0
[   26.769841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.769893]  kthread+0x328/0x630
[   26.769937]  ret_from_fork+0x10/0x20
[   26.769984] 
[   26.770003] The buggy address belongs to the physical page:
[   26.770032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c
[   26.770091] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.770136] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.770191] page_type: f8(unknown)
[   26.770229] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.770276] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.770324] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.770371] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.770418] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff
[   26.770464] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.770502] page dumped because: kasan: bad access detected
[   26.770531] 
[   26.770548] Memory state around the buggy address:
[   26.770577]  fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.770616]  fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.770656] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.770691]                                                     ^
[   26.770726]  fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.770765]  fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.770801] ==================================================================
[   26.641459] ==================================================================
[   26.641515] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   26.641644] Write of size 1 at addr fff00000c1c40cc9 by task kunit_try_catch/170
[   26.641696] 
[   26.641726] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.641809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.641835] Hardware name: linux,dummy-virt (DT)
[   26.641871] Call trace:
[   26.641958]  show_stack+0x20/0x38 (C)
[   26.642179]  dump_stack_lvl+0x8c/0xd0
[   26.642227]  print_report+0x118/0x608
[   26.642334]  kasan_report+0xdc/0x128
[   26.642379]  __asan_report_store1_noabort+0x20/0x30
[   26.642426]  krealloc_less_oob_helper+0xa48/0xc50
[   26.642474]  krealloc_less_oob+0x20/0x38
[   26.642524]  kunit_try_run_case+0x170/0x3f0
[   26.642762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.642857]  kthread+0x328/0x630
[   26.643472]  ret_from_fork+0x10/0x20
[   26.643626] 
[   26.643866] Allocated by task 170:
[   26.644155]  kasan_save_stack+0x3c/0x68
[   26.644206]  kasan_save_track+0x20/0x40
[   26.644242]  kasan_save_alloc_info+0x40/0x58
[   26.644277]  __kasan_krealloc+0x118/0x178
[   26.644314]  krealloc_noprof+0x128/0x360
[   26.644349]  krealloc_less_oob_helper+0x168/0xc50
[   26.644626]  krealloc_less_oob+0x20/0x38
[   26.644702]  kunit_try_run_case+0x170/0x3f0
[   26.644741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.644783]  kthread+0x328/0x630
[   26.644825]  ret_from_fork+0x10/0x20
[   26.645092] 
[   26.645159] The buggy address belongs to the object at fff00000c1c40c00
[   26.645159]  which belongs to the cache kmalloc-256 of size 256
[   26.645225] The buggy address is located 0 bytes to the right of
[   26.645225]  allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9)
[   26.645370] 
[   26.645389] The buggy address belongs to the physical page:
[   26.645419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40
[   26.645470] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.645797] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.645885] page_type: f5(slab)
[   26.645922] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.645970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.646074] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.646275] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.646364] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff
[   26.646749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.646793] page dumped because: kasan: bad access detected
[   26.646824] 
[   26.646842] Memory state around the buggy address:
[   26.646872]  fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.646996]  fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.647154] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.647202]                                               ^
[   26.647298]  fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.647428]  fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.647464] ==================================================================
[   26.753337] ==================================================================
[   26.753389] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   26.753437] Write of size 1 at addr fff00000c649e0d0 by task kunit_try_catch/174
[   26.754685] 
[   26.754821] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.755644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.755850] Hardware name: linux,dummy-virt (DT)
[   26.756016] Call trace:
[   26.756045]  show_stack+0x20/0x38 (C)
[   26.756600]  dump_stack_lvl+0x8c/0xd0
[   26.756884]  print_report+0x118/0x608
[   26.757015]  kasan_report+0xdc/0x128
[   26.757248]  __asan_report_store1_noabort+0x20/0x30
[   26.757302]  krealloc_less_oob_helper+0xb9c/0xc50
[   26.757571]  krealloc_large_less_oob+0x20/0x38
[   26.757650]  kunit_try_run_case+0x170/0x3f0
[   26.757697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.758299]  kthread+0x328/0x630
[   26.758399]  ret_from_fork+0x10/0x20
[   26.758558] 
[   26.759331] The buggy address belongs to the physical page:
[   26.759758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c
[   26.760100] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.760149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.760292] page_type: f8(unknown)
[   26.760533] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.760588] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.760957] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.761504] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.761749] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff
[   26.761798] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.761836] page dumped because: kasan: bad access detected
[   26.763019] 
[   26.763043] Memory state around the buggy address:
[   26.763478]  fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.763795]  fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.764231] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.764278]                                                  ^
[   26.764841]  fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.765006]  fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.765275] ==================================================================
[   26.657872] ==================================================================
[   26.658008] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   26.658207] Write of size 1 at addr fff00000c1c40cda by task kunit_try_catch/170
[   26.658261] 
[   26.658289] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.658823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.658963] Hardware name: linux,dummy-virt (DT)
[   26.658998] Call trace:
[   26.659084]  show_stack+0x20/0x38 (C)
[   26.659133]  dump_stack_lvl+0x8c/0xd0
[   26.659185]  print_report+0x118/0x608
[   26.659370]  kasan_report+0xdc/0x128
[   26.659489]  __asan_report_store1_noabort+0x20/0x30
[   26.659582]  krealloc_less_oob_helper+0xa80/0xc50
[   26.659713]  krealloc_less_oob+0x20/0x38
[   26.659763]  kunit_try_run_case+0x170/0x3f0
[   26.659818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.659871]  kthread+0x328/0x630
[   26.659911]  ret_from_fork+0x10/0x20
[   26.659957] 
[   26.659974] Allocated by task 170:
[   26.660000]  kasan_save_stack+0x3c/0x68
[   26.660480]  kasan_save_track+0x20/0x40
[   26.660544]  kasan_save_alloc_info+0x40/0x58
[   26.660832]  __kasan_krealloc+0x118/0x178
[   26.660958]  krealloc_noprof+0x128/0x360
[   26.660994]  krealloc_less_oob_helper+0x168/0xc50
[   26.661035]  krealloc_less_oob+0x20/0x38
[   26.661363]  kunit_try_run_case+0x170/0x3f0
[   26.661434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.661476]  kthread+0x328/0x630
[   26.661513]  ret_from_fork+0x10/0x20
[   26.661805] 
[   26.661824] The buggy address belongs to the object at fff00000c1c40c00
[   26.661824]  which belongs to the cache kmalloc-256 of size 256
[   26.662078] The buggy address is located 17 bytes to the right of
[   26.662078]  allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9)
[   26.662456] 
[   26.662481] The buggy address belongs to the physical page:
[   26.662623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40
[   26.662679] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.663113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.663175] page_type: f5(slab)
[   26.663212] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.663269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.663317] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.663589] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.663897] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff
[   26.663975] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.664030] page dumped because: kasan: bad access detected
[   26.664075] 
[   26.664092] Memory state around the buggy address:
[   26.664125]  fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.664413]  fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.664477] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.664513]                                                     ^
[   26.664610]  fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.664780]  fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.664815] ==================================================================
[   26.771360] ==================================================================
[   26.771402] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   26.771448] Write of size 1 at addr fff00000c649e0ea by task kunit_try_catch/174
[   26.771495] 
[   26.771523] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.771603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.771627] Hardware name: linux,dummy-virt (DT)
[   26.771655] Call trace:
[   26.771675]  show_stack+0x20/0x38 (C)
[   26.771720]  dump_stack_lvl+0x8c/0xd0
[   26.771765]  print_report+0x118/0x608
[   26.771817]  kasan_report+0xdc/0x128
[   26.771862]  __asan_report_store1_noabort+0x20/0x30
[   26.771909]  krealloc_less_oob_helper+0xae4/0xc50
[   26.771957]  krealloc_large_less_oob+0x20/0x38
[   26.772004]  kunit_try_run_case+0x170/0x3f0
[   26.772050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.772447]  kthread+0x328/0x630
[   26.772502]  ret_from_fork+0x10/0x20
[   26.772548] 
[   26.772567] The buggy address belongs to the physical page:
[   26.772596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c
[   26.772646] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.772690] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.772741] page_type: f8(unknown)
[   26.772779] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.772827] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.772875] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.772921] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.772967] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff
[   26.773014] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.773051] page dumped because: kasan: bad access detected
[   26.773093] 
[   26.773110] Memory state around the buggy address:
[   26.773138]  fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.773177]  fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.773256] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.773314]                                                           ^
[   26.773352]  fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.773422]  fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.773459] ==================================================================
[   26.774020] ==================================================================
[   26.774115] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   26.774169] Write of size 1 at addr fff00000c649e0eb by task kunit_try_catch/174
[   26.774250] 
[   26.774297] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.774395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.774447] Hardware name: linux,dummy-virt (DT)
[   26.774504] Call trace:
[   26.774542]  show_stack+0x20/0x38 (C)
[   26.774589]  dump_stack_lvl+0x8c/0xd0
[   26.774634]  print_report+0x118/0x608
[   26.774759]  kasan_report+0xdc/0x128
[   26.775012]  __asan_report_store1_noabort+0x20/0x30
[   26.775093]  krealloc_less_oob_helper+0xa58/0xc50
[   26.775195]  krealloc_large_less_oob+0x20/0x38
[   26.775271]  kunit_try_run_case+0x170/0x3f0
[   26.775350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.775404]  kthread+0x328/0x630
[   26.775517]  ret_from_fork+0x10/0x20
[   26.775699] 
[   26.775718] The buggy address belongs to the physical page:
[   26.775755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c
[   26.775805] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.775861] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.775910] page_type: f8(unknown)
[   26.775975] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.776029] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.776319] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.776403] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.776487] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff
[   26.776552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.776590] page dumped because: kasan: bad access detected
[   26.776620] 
[   26.776637] Memory state around the buggy address:
[   26.776665]  fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.776876]  fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.777182] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.777301]                                                           ^
[   26.777366]  fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.777406]  fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.777616] ==================================================================
[   26.665806] ==================================================================
[   26.665962] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   26.666293] Write of size 1 at addr fff00000c1c40cea by task kunit_try_catch/170
[   26.666859] 
[   26.666900] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.666994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.667099] Hardware name: linux,dummy-virt (DT)
[   26.667136] Call trace:
[   26.667159]  show_stack+0x20/0x38 (C)
[   26.667210]  dump_stack_lvl+0x8c/0xd0
[   26.667578]  print_report+0x118/0x608
[   26.667647]  kasan_report+0xdc/0x128
[   26.667695]  __asan_report_store1_noabort+0x20/0x30
[   26.667938]  krealloc_less_oob_helper+0xae4/0xc50
[   26.668288]  krealloc_less_oob+0x20/0x38
[   26.668335]  kunit_try_run_case+0x170/0x3f0
[   26.668381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.668564]  kthread+0x328/0x630
[   26.668610]  ret_from_fork+0x10/0x20
[   26.668681] 
[   26.668699] Allocated by task 170:
[   26.668967]  kasan_save_stack+0x3c/0x68
[   26.669013]  kasan_save_track+0x20/0x40
[   26.669049]  kasan_save_alloc_info+0x40/0x58
[   26.669095]  __kasan_krealloc+0x118/0x178
[   26.669131]  krealloc_noprof+0x128/0x360
[   26.669169]  krealloc_less_oob_helper+0x168/0xc50
[   26.669207]  krealloc_less_oob+0x20/0x38
[   26.669399]  kunit_try_run_case+0x170/0x3f0
[   26.669439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.669643]  kthread+0x328/0x630
[   26.669794]  ret_from_fork+0x10/0x20
[   26.669828] 
[   26.669846] The buggy address belongs to the object at fff00000c1c40c00
[   26.669846]  which belongs to the cache kmalloc-256 of size 256
[   26.669900] The buggy address is located 33 bytes to the right of
[   26.669900]  allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9)
[   26.669983] 
[   26.670040] The buggy address belongs to the physical page:
[   26.670078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40
[   26.670126] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.670174] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.670222] page_type: f5(slab)
[   26.670258] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.670306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.671258] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.671388] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.671785] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff
[   26.671926] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.671965] page dumped because: kasan: bad access detected
[   26.672017] 
[   26.672035] Memory state around the buggy address:
[   26.672074]  fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.672114]  fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.672154] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.672242]                                                           ^
[   26.672402]  fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.672526]  fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.672581] ==================================================================
[   26.736712] ==================================================================
[   26.736768] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   26.736827] Write of size 1 at addr fff00000c649e0c9 by task kunit_try_catch/174
[   26.736876] 
[   26.736911] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.736997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.737023] Hardware name: linux,dummy-virt (DT)
[   26.737066] Call trace:
[   26.737088]  show_stack+0x20/0x38 (C)
[   26.738676]  dump_stack_lvl+0x8c/0xd0
[   26.739267]  print_report+0x118/0x608
[   26.739351]  kasan_report+0xdc/0x128
[   26.739397]  __asan_report_store1_noabort+0x20/0x30
[   26.739936]  krealloc_less_oob_helper+0xa48/0xc50
[   26.740464]  krealloc_large_less_oob+0x20/0x38
[   26.741035]  kunit_try_run_case+0x170/0x3f0
[   26.741097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.741864]  kthread+0x328/0x630
[   26.742339]  ret_from_fork+0x10/0x20
[   26.742714] 
[   26.742745] The buggy address belongs to the physical page:
[   26.743086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c
[   26.743350] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.743842] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.744260] page_type: f8(unknown)
[   26.745261] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.745440] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.745744] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.746373] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.746487] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff
[   26.746534] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.746572] page dumped because: kasan: bad access detected
[   26.746602] 
[   26.746619] Memory state around the buggy address:
[   26.747829]  fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.747932]  fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.747974] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.748011]                                               ^
[   26.748188]  fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.748479]  fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.749001] ==================================================================
[   26.674110] ==================================================================
[   26.674270] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   26.674355] Write of size 1 at addr fff00000c1c40ceb by task kunit_try_catch/170
[   26.674403] 
[   26.674430] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.674511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.674536] Hardware name: linux,dummy-virt (DT)
[   26.674564] Call trace:
[   26.674584]  show_stack+0x20/0x38 (C)
[   26.674630]  dump_stack_lvl+0x8c/0xd0
[   26.674675]  print_report+0x118/0x608
[   26.674720]  kasan_report+0xdc/0x128
[   26.674775]  __asan_report_store1_noabort+0x20/0x30
[   26.674823]  krealloc_less_oob_helper+0xa58/0xc50
[   26.675001]  krealloc_less_oob+0x20/0x38
[   26.675045]  kunit_try_run_case+0x170/0x3f0
[   26.675100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.675291]  kthread+0x328/0x630
[   26.675335]  ret_from_fork+0x10/0x20
[   26.675582] 
[   26.675668] Allocated by task 170:
[   26.676089]  kasan_save_stack+0x3c/0x68
[   26.676697]  kasan_save_track+0x20/0x40
[   26.676748]  kasan_save_alloc_info+0x40/0x58
[   26.676784]  __kasan_krealloc+0x118/0x178
[   26.677462]  krealloc_noprof+0x128/0x360
[   26.677517]  krealloc_less_oob_helper+0x168/0xc50
[   26.678048]  krealloc_less_oob+0x20/0x38
[   26.678108]  kunit_try_run_case+0x170/0x3f0
[   26.678145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.678939]  kthread+0x328/0x630
[   26.679405]  ret_from_fork+0x10/0x20
[   26.679902] 
[   26.679942] The buggy address belongs to the object at fff00000c1c40c00
[   26.679942]  which belongs to the cache kmalloc-256 of size 256
[   26.680008] The buggy address is located 34 bytes to the right of
[   26.680008]  allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9)
[   26.681040] 
[   26.681091] The buggy address belongs to the physical page:
[   26.681121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40
[   26.681264] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.681489] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.681863] page_type: f5(slab)
[   26.681932] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.682039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.682171] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.682332] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.682380] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff
[   26.682506] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.682656] page dumped because: kasan: bad access detected
[   26.682705] 
[   26.682792] Memory state around the buggy address:
[   26.682864]  fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.682906]  fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.682965] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.683016]                                                           ^
[   26.683752]  fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.683837]  fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.683885] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   26.697825] ==================================================================
[   26.698094] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   26.698305] Write of size 1 at addr fff00000c649e0f0 by task kunit_try_catch/172
[   26.698402] 
[   26.698429] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.698509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.698533] Hardware name: linux,dummy-virt (DT)
[   26.698561] Call trace:
[   26.698731]  show_stack+0x20/0x38 (C)
[   26.698976]  dump_stack_lvl+0x8c/0xd0
[   26.699175]  print_report+0x118/0x608
[   26.699290]  kasan_report+0xdc/0x128
[   26.699368]  __asan_report_store1_noabort+0x20/0x30
[   26.699415]  krealloc_more_oob_helper+0x5c0/0x678
[   26.699469]  krealloc_large_more_oob+0x20/0x38
[   26.699554]  kunit_try_run_case+0x170/0x3f0
[   26.699817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.700856]  kthread+0x328/0x630
[   26.701184]  ret_from_fork+0x10/0x20
[   26.701361] 
[   26.701676] The buggy address belongs to the physical page:
[   26.701757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c
[   26.702485] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.702705] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.703390] page_type: f8(unknown)
[   26.703536] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.704023] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.704259] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.704306] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.705353] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff
[   26.705544] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.705633] page dumped because: kasan: bad access detected
[   26.705663] 
[   26.706177] Memory state around the buggy address:
[   26.706244]  fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.706791]  fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.707417] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   26.707767]                                                              ^
[   26.707813]  fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.708095]  fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.708133] ==================================================================
[   26.628468] ==================================================================
[   26.628514] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   26.628583] Write of size 1 at addr fff00000c1c40af0 by task kunit_try_catch/168
[   26.628828] 
[   26.628862] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.628943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.628968] Hardware name: linux,dummy-virt (DT)
[   26.628996] Call trace:
[   26.629026]  show_stack+0x20/0x38 (C)
[   26.629086]  dump_stack_lvl+0x8c/0xd0
[   26.629131]  print_report+0x118/0x608
[   26.629176]  kasan_report+0xdc/0x128
[   26.629220]  __asan_report_store1_noabort+0x20/0x30
[   26.629276]  krealloc_more_oob_helper+0x5c0/0x678
[   26.629408]  krealloc_more_oob+0x20/0x38
[   26.629453]  kunit_try_run_case+0x170/0x3f0
[   26.629498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.629549]  kthread+0x328/0x630
[   26.629589]  ret_from_fork+0x10/0x20
[   26.629643] 
[   26.629661] Allocated by task 168:
[   26.629686]  kasan_save_stack+0x3c/0x68
[   26.629724]  kasan_save_track+0x20/0x40
[   26.629760]  kasan_save_alloc_info+0x40/0x58
[   26.629794]  __kasan_krealloc+0x118/0x178
[   26.629830]  krealloc_noprof+0x128/0x360
[   26.629865]  krealloc_more_oob_helper+0x168/0x678
[   26.630013]  krealloc_more_oob+0x20/0x38
[   26.630048]  kunit_try_run_case+0x170/0x3f0
[   26.630134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.630255]  kthread+0x328/0x630
[   26.630339]  ret_from_fork+0x10/0x20
[   26.630536] 
[   26.630554] The buggy address belongs to the object at fff00000c1c40a00
[   26.630554]  which belongs to the cache kmalloc-256 of size 256
[   26.630613] The buggy address is located 5 bytes to the right of
[   26.630613]  allocated 235-byte region [fff00000c1c40a00, fff00000c1c40aeb)
[   26.630879] 
[   26.630898] The buggy address belongs to the physical page:
[   26.630926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40
[   26.630980] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.631579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.631741] page_type: f5(slab)
[   26.631865] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.631914] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.631961] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.632007] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.632061] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff
[   26.632107] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.632145] page dumped because: kasan: bad access detected
[   26.632173] 
[   26.632190] Memory state around the buggy address:
[   26.632218]  fff00000c1c40980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.632258]  fff00000c1c40a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.632297] >fff00000c1c40a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   26.632383]                                                              ^
[   26.632420]  fff00000c1c40b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.632461]  fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.632564] ==================================================================
[   26.693611] ==================================================================
[   26.693673] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   26.693856] Write of size 1 at addr fff00000c649e0eb by task kunit_try_catch/172
[   26.693919] 
[   26.694033] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.694204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.694229] Hardware name: linux,dummy-virt (DT)
[   26.694258] Call trace:
[   26.694279]  show_stack+0x20/0x38 (C)
[   26.694329]  dump_stack_lvl+0x8c/0xd0
[   26.694377]  print_report+0x118/0x608
[   26.694422]  kasan_report+0xdc/0x128
[   26.694476]  __asan_report_store1_noabort+0x20/0x30
[   26.694524]  krealloc_more_oob_helper+0x60c/0x678
[   26.694573]  krealloc_large_more_oob+0x20/0x38
[   26.694681]  kunit_try_run_case+0x170/0x3f0
[   26.695174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.695410]  kthread+0x328/0x630
[   26.695515]  ret_from_fork+0x10/0x20
[   26.695639] 
[   26.695659] The buggy address belongs to the physical page:
[   26.695689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c
[   26.695741] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.695793] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.695844] page_type: f8(unknown)
[   26.695882] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.695930] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.695977] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.696395] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.696446] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff
[   26.696493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.696546] page dumped because: kasan: bad access detected
[   26.696626] 
[   26.696673] Memory state around the buggy address:
[   26.696740]  fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.696865]  fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.696969] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   26.697140]                                                           ^
[   26.697273]  fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.697315]  fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.697649] ==================================================================
[   26.624607] ==================================================================
[   26.624665] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   26.624760] Write of size 1 at addr fff00000c1c40aeb by task kunit_try_catch/168
[   26.624938] 
[   26.624969] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.625064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.625089] Hardware name: linux,dummy-virt (DT)
[   26.625128] Call trace:
[   26.625149]  show_stack+0x20/0x38 (C)
[   26.625198]  dump_stack_lvl+0x8c/0xd0
[   26.625244]  print_report+0x118/0x608
[   26.625289]  kasan_report+0xdc/0x128
[   26.625334]  __asan_report_store1_noabort+0x20/0x30
[   26.625508]  krealloc_more_oob_helper+0x60c/0x678
[   26.625559]  krealloc_more_oob+0x20/0x38
[   26.625605]  kunit_try_run_case+0x170/0x3f0
[   26.625662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.625714]  kthread+0x328/0x630
[   26.625755]  ret_from_fork+0x10/0x20
[   26.625802] 
[   26.625819] Allocated by task 168:
[   26.625846]  kasan_save_stack+0x3c/0x68
[   26.625886]  kasan_save_track+0x20/0x40
[   26.625922]  kasan_save_alloc_info+0x40/0x58
[   26.626016]  __kasan_krealloc+0x118/0x178
[   26.626063]  krealloc_noprof+0x128/0x360
[   26.626139]  krealloc_more_oob_helper+0x168/0x678
[   26.626217]  krealloc_more_oob+0x20/0x38
[   26.626254]  kunit_try_run_case+0x170/0x3f0
[   26.626291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.626332]  kthread+0x328/0x630
[   26.626363]  ret_from_fork+0x10/0x20
[   26.626397] 
[   26.626415] The buggy address belongs to the object at fff00000c1c40a00
[   26.626415]  which belongs to the cache kmalloc-256 of size 256
[   26.626528] The buggy address is located 0 bytes to the right of
[   26.626528]  allocated 235-byte region [fff00000c1c40a00, fff00000c1c40aeb)
[   26.626688] 
[   26.626732] The buggy address belongs to the physical page:
[   26.626900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40
[   26.627079] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.627124] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.627174] page_type: f5(slab)
[   26.627211] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.627259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.627306] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.627353] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.627399] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff
[   26.627445] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.627483] page dumped because: kasan: bad access detected
[   26.627512] 
[   26.627529] Memory state around the buggy address:
[   26.627570]  fff00000c1c40980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.627611]  fff00000c1c40a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.627651] >fff00000c1c40a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   26.627733]                                                           ^
[   26.627836]  fff00000c1c40b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.627878]  fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.627949] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   26.602576] ==================================================================
[   26.602779] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   26.602930] Free of addr fff00000c6498001 by task kunit_try_catch/162
[   26.603038] 
[   26.603179] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.603289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.603320] Hardware name: linux,dummy-virt (DT)
[   26.603355] Call trace:
[   26.603375]  show_stack+0x20/0x38 (C)
[   26.603424]  dump_stack_lvl+0x8c/0xd0
[   26.603471]  print_report+0x118/0x608
[   26.603519]  kasan_report_invalid_free+0xc0/0xe8
[   26.603568]  __kasan_kfree_large+0x5c/0xa8
[   26.603614]  free_large_kmalloc+0x68/0x150
[   26.603670]  kfree+0x270/0x3c8
[   26.603842]  kmalloc_large_invalid_free+0x108/0x270
[   26.603912]  kunit_try_run_case+0x170/0x3f0
[   26.603958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.604075]  kthread+0x328/0x630
[   26.604138]  ret_from_fork+0x10/0x20
[   26.604235] 
[   26.604319] The buggy address belongs to the physical page:
[   26.604372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106498
[   26.604423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.604468] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.604518] page_type: f8(unknown)
[   26.604554] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.604602] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.604649] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.604695] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.604741] head: 0bfffe0000000002 ffffc1ffc3192601 00000000ffffffff 00000000ffffffff
[   26.604808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.604846] page dumped because: kasan: bad access detected
[   26.604875] 
[   26.604892] Memory state around the buggy address:
[   26.604935]  fff00000c6497f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.605044]  fff00000c6497f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.605138] >fff00000c6498000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.605173]                    ^
[   26.605300]  fff00000c6498080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.605347]  fff00000c6498100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.605564] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   26.596621] ==================================================================
[   26.596682] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   26.596730] Read of size 1 at addr fff00000c6498000 by task kunit_try_catch/160
[   26.596777] 
[   26.596804] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.596887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.596911] Hardware name: linux,dummy-virt (DT)
[   26.596940] Call trace:
[   26.596960]  show_stack+0x20/0x38 (C)
[   26.597018]  dump_stack_lvl+0x8c/0xd0
[   26.597078]  print_report+0x118/0x608
[   26.597122]  kasan_report+0xdc/0x128
[   26.597166]  __asan_report_load1_noabort+0x20/0x30
[   26.597211]  kmalloc_large_uaf+0x2cc/0x2f8
[   26.597255]  kunit_try_run_case+0x170/0x3f0
[   26.597455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.597507]  kthread+0x328/0x630
[   26.597547]  ret_from_fork+0x10/0x20
[   26.597592] 
[   26.597610] The buggy address belongs to the physical page:
[   26.597639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106498
[   26.597697] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.597754] raw: 0bfffe0000000000 ffffc1ffc3192708 fff00000da466c80 0000000000000000
[   26.597801] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   26.597838] page dumped because: kasan: bad access detected
[   26.597867] 
[   26.597884] Memory state around the buggy address:
[   26.597912]  fff00000c6497f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.598013]  fff00000c6497f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.598061] >fff00000c6498000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.598103]                    ^
[   26.598196]  fff00000c6498080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.598237]  fff00000c6498100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.598372] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   26.588297] ==================================================================
[   26.588388] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   26.588440] Write of size 1 at addr fff00000c649a00a by task kunit_try_catch/158
[   26.588486] 
[   26.588514] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.588597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.588622] Hardware name: linux,dummy-virt (DT)
[   26.588682] Call trace:
[   26.588703]  show_stack+0x20/0x38 (C)
[   26.588750]  dump_stack_lvl+0x8c/0xd0
[   26.588812]  print_report+0x118/0x608
[   26.588857]  kasan_report+0xdc/0x128
[   26.588901]  __asan_report_store1_noabort+0x20/0x30
[   26.588947]  kmalloc_large_oob_right+0x278/0x2b8
[   26.588993]  kunit_try_run_case+0x170/0x3f0
[   26.589038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.589100]  kthread+0x328/0x630
[   26.589142]  ret_from_fork+0x10/0x20
[   26.589210] 
[   26.589243] The buggy address belongs to the physical page:
[   26.589273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106498
[   26.589400] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.589470] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.589637] page_type: f8(unknown)
[   26.589697] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.589756] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.589803] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.590150] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.590397] head: 0bfffe0000000002 ffffc1ffc3192601 00000000ffffffff 00000000ffffffff
[   26.590478] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.590574] page dumped because: kasan: bad access detected
[   26.590637] 
[   26.590654] Memory state around the buggy address:
[   26.590683]  fff00000c6499f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.590723]  fff00000c6499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.590762] >fff00000c649a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.590797]                       ^
[   26.590824]  fff00000c649a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.590863]  fff00000c649a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.590898] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   26.580242] ==================================================================
[   26.580297] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   26.580343] Write of size 1 at addr fff00000c65d5f00 by task kunit_try_catch/156
[   26.580391] 
[   26.580418] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.580500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.580525] Hardware name: linux,dummy-virt (DT)
[   26.580554] Call trace:
[   26.580574]  show_stack+0x20/0x38 (C)
[   26.580620]  dump_stack_lvl+0x8c/0xd0
[   26.580664]  print_report+0x118/0x608
[   26.580709]  kasan_report+0xdc/0x128
[   26.580752]  __asan_report_store1_noabort+0x20/0x30
[   26.580798]  kmalloc_big_oob_right+0x2a4/0x2f0
[   26.580843]  kunit_try_run_case+0x170/0x3f0
[   26.580888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.580938]  kthread+0x328/0x630
[   26.580978]  ret_from_fork+0x10/0x20
[   26.581023] 
[   26.581040] Allocated by task 156:
[   26.581083]  kasan_save_stack+0x3c/0x68
[   26.581122]  kasan_save_track+0x20/0x40
[   26.581157]  kasan_save_alloc_info+0x40/0x58
[   26.581192]  __kasan_kmalloc+0xd4/0xd8
[   26.581227]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.581264]  kmalloc_big_oob_right+0xb8/0x2f0
[   26.581300]  kunit_try_run_case+0x170/0x3f0
[   26.581336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.581377]  kthread+0x328/0x630
[   26.581407]  ret_from_fork+0x10/0x20
[   26.581441] 
[   26.581458] The buggy address belongs to the object at fff00000c65d4000
[   26.581458]  which belongs to the cache kmalloc-8k of size 8192
[   26.581511] The buggy address is located 0 bytes to the right of
[   26.581511]  allocated 7936-byte region [fff00000c65d4000, fff00000c65d5f00)
[   26.581571] 
[   26.581589] The buggy address belongs to the physical page:
[   26.581618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0
[   26.581666] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.581709] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.581757] page_type: f5(slab)
[   26.581792] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   26.581839] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   26.581886] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   26.581931] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   26.581978] head: 0bfffe0000000003 ffffc1ffc3197401 00000000ffffffff 00000000ffffffff
[   26.582024] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   26.582150] page dumped because: kasan: bad access detected
[   26.582186] 
[   26.582203] Memory state around the buggy address:
[   26.582232]  fff00000c65d5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.582273]  fff00000c65d5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.582312] >fff00000c65d5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.582347]                    ^
[   26.582372]  fff00000c65d5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.582411]  fff00000c65d6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.582446] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   26.572844] ==================================================================
[   26.572971] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   26.573019] Write of size 1 at addr fff00000c643f378 by task kunit_try_catch/154
[   26.573077] 
[   26.573104] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.573185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.573210] Hardware name: linux,dummy-virt (DT)
[   26.573241] Call trace:
[   26.573262]  show_stack+0x20/0x38 (C)
[   26.573309]  dump_stack_lvl+0x8c/0xd0
[   26.573354]  print_report+0x118/0x608
[   26.573422]  kasan_report+0xdc/0x128
[   26.573469]  __asan_report_store1_noabort+0x20/0x30
[   26.573516]  kmalloc_track_caller_oob_right+0x418/0x488
[   26.573645]  kunit_try_run_case+0x170/0x3f0
[   26.573713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.573796]  kthread+0x328/0x630
[   26.573838]  ret_from_fork+0x10/0x20
[   26.573925] 
[   26.573943] Allocated by task 154:
[   26.573968]  kasan_save_stack+0x3c/0x68
[   26.574125]  kasan_save_track+0x20/0x40
[   26.574166]  kasan_save_alloc_info+0x40/0x58
[   26.574298]  __kasan_kmalloc+0xd4/0xd8
[   26.574334]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   26.574375]  kmalloc_track_caller_oob_right+0x184/0x488
[   26.574415]  kunit_try_run_case+0x170/0x3f0
[   26.574451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.574493]  kthread+0x328/0x630
[   26.574537]  ret_from_fork+0x10/0x20
[   26.574571] 
[   26.574588] The buggy address belongs to the object at fff00000c643f300
[   26.574588]  which belongs to the cache kmalloc-128 of size 128
[   26.574667] The buggy address is located 0 bytes to the right of
[   26.574667]  allocated 120-byte region [fff00000c643f300, fff00000c643f378)
[   26.574964] 
[   26.574982] The buggy address belongs to the physical page:
[   26.575022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.575088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.575227] page_type: f5(slab)
[   26.575339] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.575464] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.575520] page dumped because: kasan: bad access detected
[   26.575555] 
[   26.575648] Memory state around the buggy address:
[   26.575677]  fff00000c643f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.575717]  fff00000c643f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.575819] >fff00000c643f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.575855]                                                                 ^
[   26.575891]  fff00000c643f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.575930]  fff00000c643f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.575966] ==================================================================
[   26.569313] ==================================================================
[   26.569367] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   26.569419] Write of size 1 at addr fff00000c643f278 by task kunit_try_catch/154
[   26.569466] 
[   26.569495] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.569578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.569634] Hardware name: linux,dummy-virt (DT)
[   26.569671] Call trace:
[   26.569764]  show_stack+0x20/0x38 (C)
[   26.569812]  dump_stack_lvl+0x8c/0xd0
[   26.569859]  print_report+0x118/0x608
[   26.569905]  kasan_report+0xdc/0x128
[   26.569949]  __asan_report_store1_noabort+0x20/0x30
[   26.569996]  kmalloc_track_caller_oob_right+0x40c/0x488
[   26.570045]  kunit_try_run_case+0x170/0x3f0
[   26.570102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.570166]  kthread+0x328/0x630
[   26.570208]  ret_from_fork+0x10/0x20
[   26.570254] 
[   26.570271] Allocated by task 154:
[   26.570297]  kasan_save_stack+0x3c/0x68
[   26.570335]  kasan_save_track+0x20/0x40
[   26.570371]  kasan_save_alloc_info+0x40/0x58
[   26.570405]  __kasan_kmalloc+0xd4/0xd8
[   26.570439]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   26.570553]  kmalloc_track_caller_oob_right+0xa8/0x488
[   26.570684]  kunit_try_run_case+0x170/0x3f0
[   26.570721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.570762]  kthread+0x328/0x630
[   26.570798]  ret_from_fork+0x10/0x20
[   26.570925] 
[   26.570944] The buggy address belongs to the object at fff00000c643f200
[   26.570944]  which belongs to the cache kmalloc-128 of size 128
[   26.571005] The buggy address is located 0 bytes to the right of
[   26.571005]  allocated 120-byte region [fff00000c643f200, fff00000c643f278)
[   26.571112] 
[   26.571130] The buggy address belongs to the physical page:
[   26.571160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.571253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.571298] page_type: f5(slab)
[   26.571334] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.571462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.571545] page dumped because: kasan: bad access detected
[   26.571581] 
[   26.571668] Memory state around the buggy address:
[   26.571800]  fff00000c643f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.571841]  fff00000c643f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.571881] >fff00000c643f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.571916]                                                                 ^
[   26.571953]  fff00000c643f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.571992]  fff00000c643f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.572050] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   26.559365] ==================================================================
[   26.559424] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   26.559477] Read of size 1 at addr fff00000c65c5000 by task kunit_try_catch/152
[   26.559526] 
[   26.559842] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.559962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.560156] Hardware name: linux,dummy-virt (DT)
[   26.560189] Call trace:
[   26.560211]  show_stack+0x20/0x38 (C)
[   26.560278]  dump_stack_lvl+0x8c/0xd0
[   26.560326]  print_report+0x118/0x608
[   26.560373]  kasan_report+0xdc/0x128
[   26.560419]  __asan_report_load1_noabort+0x20/0x30
[   26.560467]  kmalloc_node_oob_right+0x2f4/0x330
[   26.560515]  kunit_try_run_case+0x170/0x3f0
[   26.560563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.560614]  kthread+0x328/0x630
[   26.560657]  ret_from_fork+0x10/0x20
[   26.560705] 
[   26.560722] Allocated by task 152:
[   26.560748]  kasan_save_stack+0x3c/0x68
[   26.560799]  kasan_save_track+0x20/0x40
[   26.560835]  kasan_save_alloc_info+0x40/0x58
[   26.560871]  __kasan_kmalloc+0xd4/0xd8
[   26.560906]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   26.560946]  kmalloc_node_oob_right+0xbc/0x330
[   26.560983]  kunit_try_run_case+0x170/0x3f0
[   26.561020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.561233]  kthread+0x328/0x630
[   26.561395]  ret_from_fork+0x10/0x20
[   26.561437] 
[   26.561455] The buggy address belongs to the object at fff00000c65c4000
[   26.561455]  which belongs to the cache kmalloc-4k of size 4096
[   26.561659] The buggy address is located 0 bytes to the right of
[   26.561659]  allocated 4096-byte region [fff00000c65c4000, fff00000c65c5000)
[   26.561811] 
[   26.561831] The buggy address belongs to the physical page:
[   26.561904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0
[   26.562690] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.562910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.563027] page_type: f5(slab)
[   26.563133] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   26.563216] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   26.563325] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   26.563372] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   26.563419] head: 0bfffe0000000003 ffffc1ffc3197001 00000000ffffffff 00000000ffffffff
[   26.563466] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   26.563507] page dumped because: kasan: bad access detected
[   26.563551] 
[   26.563568] Memory state around the buggy address:
[   26.563597]  fff00000c65c4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.563637]  fff00000c65c4f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.563677] >fff00000c65c5000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.563722]                    ^
[   26.563839]  fff00000c65c5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.563892]  fff00000c65c5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.563927] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   26.550614] ==================================================================
[   26.550671] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   26.550720] Read of size 1 at addr fff00000c16b9bdf by task kunit_try_catch/150
[   26.550768] 
[   26.550797] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.551045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.551090] Hardware name: linux,dummy-virt (DT)
[   26.551255] Call trace:
[   26.551277]  show_stack+0x20/0x38 (C)
[   26.551332]  dump_stack_lvl+0x8c/0xd0
[   26.551396]  print_report+0x118/0x608
[   26.551441]  kasan_report+0xdc/0x128
[   26.551487]  __asan_report_load1_noabort+0x20/0x30
[   26.551535]  kmalloc_oob_left+0x2ec/0x320
[   26.551579]  kunit_try_run_case+0x170/0x3f0
[   26.551674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.551884]  kthread+0x328/0x630
[   26.551990]  ret_from_fork+0x10/0x20
[   26.552038] 
[   26.552064] Allocated by task 12:
[   26.552113]  kasan_save_stack+0x3c/0x68
[   26.552154]  kasan_save_track+0x20/0x40
[   26.552190]  kasan_save_alloc_info+0x40/0x58
[   26.552224]  __kasan_kmalloc+0xd4/0xd8
[   26.552259]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   26.552301]  kvasprintf+0xe0/0x180
[   26.552335]  __kthread_create_on_node+0x16c/0x350
[   26.552372]  kthread_create_on_node+0xe4/0x130
[   26.552407]  create_worker+0x380/0x6b8
[   26.552441]  worker_thread+0x808/0xf38
[   26.552475]  kthread+0x328/0x630
[   26.552505]  ret_from_fork+0x10/0x20
[   26.552538] 
[   26.552556] The buggy address belongs to the object at fff00000c16b9bc0
[   26.552556]  which belongs to the cache kmalloc-16 of size 16
[   26.552609] The buggy address is located 19 bytes to the right of
[   26.552609]  allocated 12-byte region [fff00000c16b9bc0, fff00000c16b9bcc)
[   26.552670] 
[   26.552688] The buggy address belongs to the physical page:
[   26.552717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9
[   26.552771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.552817] page_type: f5(slab)
[   26.552852] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.552901] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000
[   26.552940] page dumped because: kasan: bad access detected
[   26.552968] 
[   26.552984] Memory state around the buggy address:
[   26.553013]  fff00000c16b9a80: 00 03 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   26.553062]  fff00000c16b9b00: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.553145] >fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc
[   26.553214]                                                     ^
[   26.553310]  fff00000c16b9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.553458]  fff00000c16b9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.553494] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   26.538628] ==================================================================
[   26.538665] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   26.538716] Write of size 1 at addr fff00000c643f078 by task kunit_try_catch/148
[   26.538763] 
[   26.538792] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.538875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.538900] Hardware name: linux,dummy-virt (DT)
[   26.538928] Call trace:
[   26.538949]  show_stack+0x20/0x38 (C)
[   26.538995]  dump_stack_lvl+0x8c/0xd0
[   26.539040]  print_report+0x118/0x608
[   26.539101]  kasan_report+0xdc/0x128
[   26.539147]  __asan_report_store1_noabort+0x20/0x30
[   26.539195]  kmalloc_oob_right+0x538/0x660
[   26.539240]  kunit_try_run_case+0x170/0x3f0
[   26.539286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.539338]  kthread+0x328/0x630
[   26.539378]  ret_from_fork+0x10/0x20
[   26.539424] 
[   26.539455] Allocated by task 148:
[   26.539482]  kasan_save_stack+0x3c/0x68
[   26.539523]  kasan_save_track+0x20/0x40
[   26.539560]  kasan_save_alloc_info+0x40/0x58
[   26.539595]  __kasan_kmalloc+0xd4/0xd8
[   26.539630]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.539667]  kmalloc_oob_right+0xb0/0x660
[   26.539703]  kunit_try_run_case+0x170/0x3f0
[   26.539739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.539780]  kthread+0x328/0x630
[   26.539811]  ret_from_fork+0x10/0x20
[   26.539870] 
[   26.539949] The buggy address belongs to the object at fff00000c643f000
[   26.539949]  which belongs to the cache kmalloc-128 of size 128
[   26.540140] The buggy address is located 5 bytes to the right of
[   26.540140]  allocated 115-byte region [fff00000c643f000, fff00000c643f073)
[   26.540202] 
[   26.540222] The buggy address belongs to the physical page:
[   26.540260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.540508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.540563] page_type: f5(slab)
[   26.540600] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.540648] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.540685] page dumped because: kasan: bad access detected
[   26.540714] 
[   26.540730] Memory state around the buggy address:
[   26.540760]  fff00000c643ef00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   26.540799]  fff00000c643ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.540839] >fff00000c643f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.540904]                                                                 ^
[   26.540943]  fff00000c643f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.540982]  fff00000c643f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.541017] ==================================================================
[   26.529794] ==================================================================
[   26.530431] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   26.531280] Write of size 1 at addr fff00000c643f073 by task kunit_try_catch/148
[   26.531386] 
[   26.532172] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.532320] Tainted: [N]=TEST
[   26.532352] Hardware name: linux,dummy-virt (DT)
[   26.532567] Call trace:
[   26.532734]  show_stack+0x20/0x38 (C)
[   26.532866]  dump_stack_lvl+0x8c/0xd0
[   26.532920]  print_report+0x118/0x608
[   26.532968]  kasan_report+0xdc/0x128
[   26.533013]  __asan_report_store1_noabort+0x20/0x30
[   26.533073]  kmalloc_oob_right+0x5a4/0x660
[   26.533119]  kunit_try_run_case+0x170/0x3f0
[   26.533169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.533222]  kthread+0x328/0x630
[   26.533266]  ret_from_fork+0x10/0x20
[   26.533422] 
[   26.533459] Allocated by task 148:
[   26.533579]  kasan_save_stack+0x3c/0x68
[   26.533634]  kasan_save_track+0x20/0x40
[   26.533671]  kasan_save_alloc_info+0x40/0x58
[   26.533706]  __kasan_kmalloc+0xd4/0xd8
[   26.533742]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.533782]  kmalloc_oob_right+0xb0/0x660
[   26.533817]  kunit_try_run_case+0x170/0x3f0
[   26.533854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.533896]  kthread+0x328/0x630
[   26.533927]  ret_from_fork+0x10/0x20
[   26.533979] 
[   26.534036] The buggy address belongs to the object at fff00000c643f000
[   26.534036]  which belongs to the cache kmalloc-128 of size 128
[   26.534138] The buggy address is located 0 bytes to the right of
[   26.534138]  allocated 115-byte region [fff00000c643f000, fff00000c643f073)
[   26.534207] 
[   26.534287] The buggy address belongs to the physical page:
[   26.534487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.534757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.535036] page_type: f5(slab)
[   26.535331] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.535392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.535496] page dumped because: kasan: bad access detected
[   26.535534] 
[   26.535558] Memory state around the buggy address:
[   26.535765]  fff00000c643ef00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   26.535827]  fff00000c643ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.535878] >fff00000c643f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.535930]                                                              ^
[   26.536010]  fff00000c643f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.536050]  fff00000c643f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.536124] ==================================================================
[   26.541340] ==================================================================
[   26.541411] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   26.541459] Read of size 1 at addr fff00000c643f080 by task kunit_try_catch/148
[   26.541512] 
[   26.541558] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.541960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.541992] Hardware name: linux,dummy-virt (DT)
[   26.542082] Call trace:
[   26.542108]  show_stack+0x20/0x38 (C)
[   26.542237]  dump_stack_lvl+0x8c/0xd0
[   26.542310]  print_report+0x118/0x608
[   26.542400]  kasan_report+0xdc/0x128
[   26.542451]  __asan_report_load1_noabort+0x20/0x30
[   26.542548]  kmalloc_oob_right+0x5d0/0x660
[   26.542686]  kunit_try_run_case+0x170/0x3f0
[   26.542732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.542789]  kthread+0x328/0x630
[   26.542854]  ret_from_fork+0x10/0x20
[   26.543045] 
[   26.543139] Allocated by task 148:
[   26.543193]  kasan_save_stack+0x3c/0x68
[   26.543231]  kasan_save_track+0x20/0x40
[   26.543272]  kasan_save_alloc_info+0x40/0x58
[   26.543455]  __kasan_kmalloc+0xd4/0xd8
[   26.543491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.543528]  kmalloc_oob_right+0xb0/0x660
[   26.543568]  kunit_try_run_case+0x170/0x3f0
[   26.543750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.544373]  kthread+0x328/0x630
[   26.544526]  ret_from_fork+0x10/0x20
[   26.544564] 
[   26.544582] The buggy address belongs to the object at fff00000c643f000
[   26.544582]  which belongs to the cache kmalloc-128 of size 128
[   26.544635] The buggy address is located 13 bytes to the right of
[   26.544635]  allocated 115-byte region [fff00000c643f000, fff00000c643f073)
[   26.544696] 
[   26.544714] The buggy address belongs to the physical page:
[   26.544742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.544790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.544834] page_type: f5(slab)
[   26.544870] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.544917] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.544954] page dumped because: kasan: bad access detected
[   26.544983] 
[   26.545000] Memory state around the buggy address:
[   26.545028]  fff00000c643ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.545078]  fff00000c643f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.545117] >fff00000c643f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.545152]                    ^
[   26.545177]  fff00000c643f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.545216]  fff00000c643f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.545252] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  106.191582] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/670
[  106.193000] Modules linked in:
[  106.193900] CPU: 0 UID: 0 PID: 670 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[  106.195308] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  106.196093] Hardware name: linux,dummy-virt (DT)
[  106.196781] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  106.197612] pc : intlog10+0x38/0x48
[  106.198141] lr : intlog10_test+0xe4/0x200
[  106.198749] sp : ffff8000823d7c10
[  106.199094] x29: ffff8000823d7c90 x28: 0000000000000000 x27: 0000000000000000
[  106.199460] x26: 1ffe000018f92da1 x25: 0000000000000000 x24: ffff8000823d7ce0
[  106.199979] x23: ffff8000823d7d00 x22: 0000000000000000 x21: 1ffff0001047af82
[  106.200960] x20: ffff90e9b37fcb60 x19: ffff800080087990 x18: 00000000f8dbd559
[  106.201939] x17: 000000003b105915 x16: fff00000c65bc83c x15: fff00000ff616b08
[  106.202918] x14: 0000000000018fff x13: 1ffe00001b4909cd x12: ffff721d36ed2389
[  106.203888] x11: 1ffff21d36ed2388 x10: ffff721d36ed2388 x9 : ffff90e9b0e3d25c
[  106.204862] x8 : ffff90e9b7691c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  106.205488] x5 : ffff70001047af82 x4 : 1ffff00010010f3b x3 : 1ffff21d366ff96c
[  106.205846] x2 : 1ffff21d366ff96c x1 : 0000000000000003 x0 : 0000000000000000
[  106.206661] Call trace:
[  106.207103]  intlog10+0x38/0x48 (P)
[  106.207682]  kunit_try_run_case+0x170/0x3f0
[  106.208517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  106.209306]  kthread+0x328/0x630
[  106.209836]  ret_from_fork+0x10/0x20
[  106.210414] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  106.143153] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/652
[  106.147307] Modules linked in:
[  106.148159] CPU: 0 UID: 0 PID: 652 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[  106.148966] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  106.149635] Hardware name: linux,dummy-virt (DT)
[  106.150432] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  106.151090] pc : intlog2+0xd8/0xf8
[  106.151556] lr : intlog2_test+0xe4/0x200
[  106.151761] sp : ffff8000822f7c10
[  106.152357] x29: ffff8000822f7c90 x28: 0000000000000000 x27: 0000000000000000
[  106.153558] x26: 1ffe000019407761 x25: 0000000000000000 x24: ffff8000822f7ce0
[  106.154332] x23: ffff8000822f7d00 x22: 0000000000000000 x21: 1ffff0001045ef82
[  106.154690] x20: ffff90e9b37fca60 x19: ffff800080087990 x18: 000000008bfb9596
[  106.155031] x17: 000000003000adfa x16: fff00000c65bc83c x15: fff00000ff616b08
[  106.155864] x14: 0000000000018fff x13: 1ffe00001b4909cd x12: ffff721d36ed2389
[  106.156425] x11: 1ffff21d36ed2388 x10: ffff721d36ed2388 x9 : ffff90e9b0e3d45c
[  106.156789] x8 : ffff90e9b7691c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  106.157150] x5 : ffff70001045ef82 x4 : 1ffff00010010f3b x3 : 1ffff21d366ff94c
[  106.157775] x2 : 1ffff21d366ff94c x1 : 0000000000000003 x0 : 0000000000000000
[  106.158276] Call trace:
[  106.158420]  intlog2+0xd8/0xf8 (P)
[  106.158610]  kunit_try_run_case+0x170/0x3f0
[  106.158818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  106.159084]  kthread+0x328/0x630
[  106.159744]  ret_from_fork+0x10/0x20
[  106.160367] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - internal-error-oops-oops-smp KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[  105.270271] Internal error: Oops: 0000000096000005 [#1]  SMP
[  105.278002] Modules linked in:
[  105.278512] CPU: 1 UID: 0 PID: 544 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[  105.279255] Tainted: [B]=BAD_PAGE, [N]=TEST
[  105.279440] Hardware name: linux,dummy-virt (DT)
[  105.279712] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  105.280585] pc : kunit_test_null_dereference+0x70/0x170
[  105.281192] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  105.281801] sp : ffff800082047d30
[  105.282214] x29: ffff800082047d90 x28: 0000000000000000 x27: 0000000000000000
[  105.283070] x26: 1ffe000018ae9fe1 x25: 0000000000000000 x24: 0000000000000004
[  105.283507] x23: fff00000c574ff0c x22: ffff90e9b0e29ce8 x21: fff00000c138bc08
[  105.283897] x20: 1ffff00010408fa6 x19: ffff800080087990 x18: 00000000a05527a6
[  105.284695] x17: 0000000000000001 x16: fff00000da484d28 x15: 000000004e62dc82
[  105.285045] x14: 000000005ded5061 x13: 1ffe00001b490989 x12: fffd800018f13b3c
[  105.285392] x11: 1ffe000018f13b3b x10: fffd800018f13b3b x9 : ffff90e9b0e21478
[  105.285774] x8 : ffff800082047c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  105.286122] x5 : ffff700010408fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  105.286465] x2 : dfff800000000000 x1 : fff00000c789d100 x0 : ffff800080087990
[  105.286832] Call trace:
[  105.286997]  kunit_test_null_dereference+0x70/0x170 (P)
[  105.287513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  105.287757]  kthread+0x328/0x630
[  105.288109]  ret_from_fork+0x10/0x20
[  105.288535] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  105.288994] ---[ end trace 0000000000000000 ]---