Hay
Date
July 8, 2025, 11:10 a.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   33.512729] ==================================================================
[   33.512783] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   33.512834] Read of size 1 at addr fff00000c9a662d0 by task kunit_try_catch/290
[   33.512885] 
[   33.513845] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.514094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.514257] Hardware name: linux,dummy-virt (DT)
[   33.514464] Call trace:
[   33.514524]  show_stack+0x20/0x38 (C)
[   33.514626]  dump_stack_lvl+0x8c/0xd0
[   33.514716]  print_report+0x118/0x5d0
[   33.515121]  kasan_report+0xdc/0x128
[   33.515262]  __asan_report_load1_noabort+0x20/0x30
[   33.515348]  strcmp+0xc0/0xc8
[   33.515503]  kasan_strings+0x340/0xb00
[   33.515567]  kunit_try_run_case+0x170/0x3f0
[   33.516034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.516154]  kthread+0x328/0x630
[   33.516377]  ret_from_fork+0x10/0x20
[   33.516583] 
[   33.516612] Allocated by task 290:
[   33.516680]  kasan_save_stack+0x3c/0x68
[   33.516728]  kasan_save_track+0x20/0x40
[   33.517021]  kasan_save_alloc_info+0x40/0x58
[   33.517173]  __kasan_kmalloc+0xd4/0xd8
[   33.517263]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.517486]  kasan_strings+0xc8/0xb00
[   33.517667]  kunit_try_run_case+0x170/0x3f0
[   33.517804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.517854]  kthread+0x328/0x630
[   33.517891]  ret_from_fork+0x10/0x20
[   33.518111] 
[   33.518178] Freed by task 290:
[   33.518353]  kasan_save_stack+0x3c/0x68
[   33.518446]  kasan_save_track+0x20/0x40
[   33.518709]  kasan_save_free_info+0x4c/0x78
[   33.518896]  __kasan_slab_free+0x6c/0x98
[   33.518977]  kfree+0x214/0x3c8
[   33.519061]  kasan_strings+0x24c/0xb00
[   33.519166]  kunit_try_run_case+0x170/0x3f0
[   33.519253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.519472]  kthread+0x328/0x630
[   33.519661]  ret_from_fork+0x10/0x20
[   33.519773] 
[   33.519850] The buggy address belongs to the object at fff00000c9a662c0
[   33.519850]  which belongs to the cache kmalloc-32 of size 32
[   33.520150] The buggy address is located 16 bytes inside of
[   33.520150]  freed 32-byte region [fff00000c9a662c0, fff00000c9a662e0)
[   33.520335] 
[   33.520377] The buggy address belongs to the physical page:
[   33.520425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a66
[   33.520566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.520664] page_type: f5(slab)
[   33.521036] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.521107] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.521731] >fff00000c9a66280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.524990] Hardware name: linux,dummy-virt (DT)
[   33.525824]  __kasan_kmalloc+0xd4/0xd8
[   33.527676]  kthread+0x328/0x630
[   33.528345] 
[   33.528880] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.529725]  fff00000c9a66300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.531523] Hardware name: linux,dummy-virt (DT)
[   33.534064]  kthread+0x328/0x630
[   33.534620]  kasan_save_track+0x20/0x40
[   33.536379] The buggy address is located 16 bytes inside of
[   33.536379]  freed 32-byte region [fff00000c9a662c0, fff00000c9a662e0)
[   33.538229] >fff00000c9a66280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.540252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.541902]  __kasan_kmalloc+0xd4/0xd8
[   33.542316]  kasan_save_stack+0x3c/0x68
[   33.542839] The buggy address belongs to the object at fff00000c9a662c0
[   33.542839]  which belongs to the cache kmalloc-32 of size 32
[   33.554870] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   33.556511]  kthread+0x328/0x630
[   33.557958]  kthread+0x328/0x630
[   33.558591] The buggy address belongs to the physical page:
[   33.559475]  fff00000c7981600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.562164] Call trace:
[   33.562870]  kasan_report+0xdc/0x128
[   33.563808] 
[   33.564106]  __kasan_kmalloc+0xd4/0xd8
[   33.564787]  ret_from_fork+0x10/0x20
[   33.565204] 
[   33.565847] page_type: f5(slab)
[   33.566906]                                                           ^
[   33.567440] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.799728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   33.639175] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   33.605909] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[  111.467950] Internal error: Oops: 0000000096000005 [#1]  SMP
[  111.473506] Modules linked in:
[  111.475180] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[  111.476302] Tainted: [B]=BAD_PAGE, [N]=TEST
[  111.476973] Hardware name: linux,dummy-virt (DT)
[  111.477812] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  111.478564] pc : kunit_test_null_dereference+0x70/0x170
[  111.479315] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  111.480044] sp : ffff800080f17d30
[  111.480610] x29: ffff800080f17d90 x28: 0000000000000000 x27: 0000000000000000
[  111.481674] x26: 1ffe0000193d1861 x25: 0000000000000000 x24: 0000000000000004
[  111.482477] x23: fff00000c9e8c30c x22: ffff92c7b5031a70 x21: fff00000c13a7908
[  111.483261] x20: 1ffff000101e2fa6 x19: ffff800080087990 x18: 0000000056d790fb
[  111.483861] x17: 0000000000000001 x16: fff00000da47ace8 x15: 0000000048789fa8
[  111.484220] x14: 000000002e4f09f3 x13: 1ffe00001b48f581 x12: fffd800018e0711c
[  111.484642] x11: 1ffe000018e0711b x10: fffd800018e0711b x9 : ffff92c7b5029200
[  111.485615] x8 : ffff800080f17c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  111.486404] x5 : ffff7000101e2fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  111.487144] x2 : dfff800000000000 x1 : fff00000c7038000 x0 : ffff800080087990
[  111.487931] Call trace:
[  111.488273]  kunit_test_null_dereference+0x70/0x170 (P)
[  111.488915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  111.489557]  kthread+0x328/0x630
[  111.489999]  ret_from_fork+0x10/0x20
[  111.490565] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  111.491409] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   64.365721] ==================================================================
[   64.365787] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   64.365787] 
[   64.365877] Use-after-free read at 0x00000000b92afe52 (in kfence-#200):
[   64.365929]  test_krealloc+0x51c/0x830
[   64.365975]  kunit_try_run_case+0x170/0x3f0
[   64.366021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.366067]  kthread+0x328/0x630
[   64.366107]  ret_from_fork+0x10/0x20
[   64.366148] 
[   64.366172] kfence-#200: 0x00000000b92afe52-0x000000000dc55975, size=32, cache=kmalloc-32
[   64.366172] 
[   64.366241] allocated by task 368 on cpu 1 at 64.364995s (0.001241s ago):
[   64.366311]  test_alloc+0x29c/0x628
[   64.366352]  test_krealloc+0xc0/0x830
[   64.366392]  kunit_try_run_case+0x170/0x3f0
[   64.366435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.366479]  kthread+0x328/0x630
[   64.366515]  ret_from_fork+0x10/0x20
[   64.366553] 
[   64.366578] freed by task 368 on cpu 1 at 64.365335s (0.001239s ago):
[   64.366639]  krealloc_noprof+0x148/0x360
[   64.366680]  test_krealloc+0x1dc/0x830
[   64.366720]  kunit_try_run_case+0x170/0x3f0
[   64.366761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.366805]  kthread+0x328/0x630
[   64.366843]  ret_from_fork+0x10/0x20
[   64.366881] 
[   64.366925] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   64.367006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.367035] Hardware name: linux,dummy-virt (DT)
[   64.367073] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   64.288996] ==================================================================
[   64.289097] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   64.289097] 
[   64.289203] Use-after-free read at 0x000000003def5459 (in kfence-#199):
[   64.289279]  test_memcache_typesafe_by_rcu+0x280/0x560
[   64.289331]  kunit_try_run_case+0x170/0x3f0
[   64.289378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.289425]  kthread+0x328/0x630
[   64.289465]  ret_from_fork+0x10/0x20
[   64.289507] 
[   64.289532] kfence-#199: 0x000000003def5459-0x000000005860e2b8, size=32, cache=test
[   64.289532] 
[   64.289584] allocated by task 366 on cpu 1 at 64.264932s (0.024647s ago):
[   64.289656]  test_alloc+0x230/0x628
[   64.289695]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   64.289738]  kunit_try_run_case+0x170/0x3f0
[   64.289779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.289823]  kthread+0x328/0x630
[   64.289858]  ret_from_fork+0x10/0x20
[   64.289897] 
[   64.289920] freed by task 366 on cpu 1 at 64.265048s (0.024868s ago):
[   64.289976]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   64.290020]  kunit_try_run_case+0x170/0x3f0
[   64.290061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.290103]  kthread+0x328/0x630
[   64.290139]  ret_from_fork+0x10/0x20
[   64.290177] 
[   64.290236] CPU: 1 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   64.290318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.290348] Hardware name: linux,dummy-virt (DT)
[   64.290382] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   42.025814] ==================================================================
[   42.025961] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   42.025961] 
[   42.026068] Invalid read at 0x000000005ebb45c0:
[   42.026136]  test_invalid_access+0xdc/0x1f0
[   42.026192]  kunit_try_run_case+0x170/0x3f0
[   42.026263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.026397]  kthread+0x328/0x630
[   42.026479]  ret_from_fork+0x10/0x20
[   42.027235] 
[   42.027458] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   42.027635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.027672] Hardware name: linux,dummy-virt (DT)
[   42.028301] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   41.793311] ==================================================================
[   41.793403] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.793403] 
[   41.793468] Corrupted memory at 0x0000000043cbc5af [ ! . . . . . . . . . . . . . . . ] (in kfence-#195):
[   41.793782]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.793830]  kunit_try_run_case+0x170/0x3f0
[   41.793877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.793923]  kthread+0x328/0x630
[   41.793961]  ret_from_fork+0x10/0x20
[   41.794001] 
[   41.794026] kfence-#195: 0x0000000023dc8c43-0x000000001b62b549, size=73, cache=kmalloc-96
[   41.794026] 
[   41.794083] allocated by task 356 on cpu 0 at 41.793049s (0.001030s ago):
[   41.794148]  test_alloc+0x29c/0x628
[   41.794188]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   41.794248]  kunit_try_run_case+0x170/0x3f0
[   41.794289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.794333]  kthread+0x328/0x630
[   41.794370]  ret_from_fork+0x10/0x20
[   41.794410] 
[   41.794434] freed by task 356 on cpu 0 at 41.793196s (0.001234s ago):
[   41.794498]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.794543]  kunit_try_run_case+0x170/0x3f0
[   41.794586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.794631]  kthread+0x328/0x630
[   41.794668]  ret_from_fork+0x10/0x20
[   41.794707] 
[   41.794753] CPU: 0 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   41.794835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.794864] Hardware name: linux,dummy-virt (DT)
[   41.794900] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   41.689136] ==================================================================
[   41.689245] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   41.689245] 
[   41.689344] Out-of-bounds read at 0x00000000def14830 (105B right of kfence-#194):
[   41.689407]  test_kmalloc_aligned_oob_read+0x238/0x468
[   41.689459]  kunit_try_run_case+0x170/0x3f0
[   41.689506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.689552]  kthread+0x328/0x630
[   41.689591]  ret_from_fork+0x10/0x20
[   41.689632] 
[   41.689658] kfence-#194: 0x000000001b9e6b4b-0x0000000018025a8f, size=73, cache=kmalloc-96
[   41.689658] 
[   41.689712] allocated by task 354 on cpu 0 at 41.688905s (0.000804s ago):
[   41.689784]  test_alloc+0x29c/0x628
[   41.689825]  test_kmalloc_aligned_oob_read+0x100/0x468
[   41.689868]  kunit_try_run_case+0x170/0x3f0
[   41.689909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.689955]  kthread+0x328/0x630
[   41.689992]  ret_from_fork+0x10/0x20
[   41.690030] 
[   41.690078] CPU: 0 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   41.690159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.690189] Hardware name: linux,dummy-virt (DT)
[   41.690236] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   37.109177] ==================================================================
[   37.109288] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   37.109288] 
[   37.109353] Corrupted memory at 0x000000002b61ffad [ ! ] (in kfence-#150):
[   37.109467]  test_corruption+0x1d8/0x378
[   37.109515]  kunit_try_run_case+0x170/0x3f0
[   37.109559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.109605]  kthread+0x328/0x630
[   37.109643]  ret_from_fork+0x10/0x20
[   37.109684] 
[   37.109707] kfence-#150: 0x000000003a6b315c-0x0000000010e08806, size=32, cache=test
[   37.109707] 
[   37.109762] allocated by task 344 on cpu 0 at 37.109020s (0.000738s ago):
[   37.109822]  test_alloc+0x230/0x628
[   37.109864]  test_corruption+0x198/0x378
[   37.109905]  kunit_try_run_case+0x170/0x3f0
[   37.109946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.109990]  kthread+0x328/0x630
[   37.110026]  ret_from_fork+0x10/0x20
[   37.110066] 
[   37.110092] freed by task 344 on cpu 0 at 37.109087s (0.001001s ago):
[   37.110154]  test_corruption+0x1d8/0x378
[   37.110195]  kunit_try_run_case+0x170/0x3f0
[   37.110249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.110294]  kthread+0x328/0x630
[   37.110330]  ret_from_fork+0x10/0x20
[   37.110369] 
[   37.110410] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   37.110489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.110519] Hardware name: linux,dummy-virt (DT)
[   37.110553] ==================================================================
[   37.005141] ==================================================================
[   37.005254] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   37.005254] 
[   37.005322] Corrupted memory at 0x000000003cf90ef2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#149):
[   37.005636]  test_corruption+0x120/0x378
[   37.005683]  kunit_try_run_case+0x170/0x3f0
[   37.005730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.005776]  kthread+0x328/0x630
[   37.005815]  ret_from_fork+0x10/0x20
[   37.005857] 
[   37.005881] kfence-#149: 0x00000000d975ab00-0x0000000061478567, size=32, cache=test
[   37.005881] 
[   37.005936] allocated by task 344 on cpu 0 at 37.004983s (0.000950s ago):
[   37.005996]  test_alloc+0x230/0x628
[   37.006038]  test_corruption+0xdc/0x378
[   37.006077]  kunit_try_run_case+0x170/0x3f0
[   37.006116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.006161]  kthread+0x328/0x630
[   37.006197]  ret_from_fork+0x10/0x20
[   37.006249] 
[   37.006273] freed by task 344 on cpu 0 at 37.005045s (0.001224s ago):
[   37.006337]  test_corruption+0x120/0x378
[   37.006380]  kunit_try_run_case+0x170/0x3f0
[   37.006421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.006464]  kthread+0x328/0x630
[   37.006499]  ret_from_fork+0x10/0x20
[   37.006539] 
[   37.006583] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   37.006664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.006694] Hardware name: linux,dummy-virt (DT)
[   37.006729] ==================================================================
[   36.797378] ==================================================================
[   36.797492] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   36.797492] 
[   36.797564] Corrupted memory at 0x00000000cad947eb [ ! . . . . . . . . . . . . . . . ] (in kfence-#147):
[   36.798684]  test_corruption+0x278/0x378
[   36.798741]  kunit_try_run_case+0x170/0x3f0
[   36.798789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.798836]  kthread+0x328/0x630
[   36.798876]  ret_from_fork+0x10/0x20
[   36.798918] 
[   36.798943] kfence-#147: 0x0000000077976b7d-0x000000000059992a, size=32, cache=kmalloc-32
[   36.798943] 
[   36.799002] allocated by task 342 on cpu 0 at 36.797029s (0.001970s ago):
[   36.799067]  test_alloc+0x29c/0x628
[   36.799108]  test_corruption+0xdc/0x378
[   36.799148]  kunit_try_run_case+0x170/0x3f0
[   36.799190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.799248]  kthread+0x328/0x630
[   36.799283]  ret_from_fork+0x10/0x20
[   36.799323] 
[   36.799349] freed by task 342 on cpu 0 at 36.797141s (0.002204s ago):
[   36.799411]  test_corruption+0x278/0x378
[   36.799451]  kunit_try_run_case+0x170/0x3f0
[   36.799490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.799535]  kthread+0x328/0x630
[   36.799570]  ret_from_fork+0x10/0x20
[   36.799607] 
[   36.799658] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   36.799738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.799769] Hardware name: linux,dummy-virt (DT)
[   36.799803] ==================================================================
[   36.901332] ==================================================================
[   36.901426] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   36.901426] 
[   36.901490] Corrupted memory at 0x00000000fa5cc97d [ ! ] (in kfence-#148):
[   36.901620]  test_corruption+0x284/0x378
[   36.901668]  kunit_try_run_case+0x170/0x3f0
[   36.901713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.901759]  kthread+0x328/0x630
[   36.901796]  ret_from_fork+0x10/0x20
[   36.901837] 
[   36.901860] kfence-#148: 0x00000000da5376bb-0x00000000af98cba4, size=32, cache=kmalloc-32
[   36.901860] 
[   36.901916] allocated by task 342 on cpu 0 at 36.901033s (0.000879s ago):
[   36.901978]  test_alloc+0x29c/0x628
[   36.902020]  test_corruption+0x198/0x378
[   36.902060]  kunit_try_run_case+0x170/0x3f0
[   36.902101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.902146]  kthread+0x328/0x630
[   36.902181]  ret_from_fork+0x10/0x20
[   36.902234] 
[   36.902258] freed by task 342 on cpu 0 at 36.901140s (0.001114s ago):
[   36.902321]  test_corruption+0x284/0x378
[   36.902362]  kunit_try_run_case+0x170/0x3f0
[   36.902401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.902446]  kthread+0x328/0x630
[   36.902480]  ret_from_fork+0x10/0x20
[   36.902519] 
[   36.902562] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   36.902642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.902671] Hardware name: linux,dummy-virt (DT)
[   36.902705] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   36.589157] ==================================================================
[   36.589267] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   36.589267] 
[   36.589335] Invalid free of 0x000000005f6241f1 (in kfence-#145):
[   36.589393]  test_invalid_addr_free+0x1ac/0x238
[   36.589442]  kunit_try_run_case+0x170/0x3f0
[   36.589487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.589534]  kthread+0x328/0x630
[   36.589574]  ret_from_fork+0x10/0x20
[   36.589616] 
[   36.589641] kfence-#145: 0x000000002b4736fa-0x00000000c27d130c, size=32, cache=kmalloc-32
[   36.589641] 
[   36.589696] allocated by task 338 on cpu 1 at 36.589000s (0.000692s ago):
[   36.589762]  test_alloc+0x29c/0x628
[   36.589802]  test_invalid_addr_free+0xd4/0x238
[   36.589846]  kunit_try_run_case+0x170/0x3f0
[   36.589887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.589932]  kthread+0x328/0x630
[   36.589968]  ret_from_fork+0x10/0x20
[   36.590008] 
[   36.590057] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   36.590138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.590167] Hardware name: linux,dummy-virt (DT)
[   36.590200] ==================================================================
[   36.693085] ==================================================================
[   36.693178] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   36.693178] 
[   36.693257] Invalid free of 0x00000000e2ab1308 (in kfence-#146):
[   36.693314]  test_invalid_addr_free+0xec/0x238
[   36.693361]  kunit_try_run_case+0x170/0x3f0
[   36.693407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.693453]  kthread+0x328/0x630
[   36.693490]  ret_from_fork+0x10/0x20
[   36.693529] 
[   36.693554] kfence-#146: 0x0000000096c8dce3-0x000000005554ee18, size=32, cache=test
[   36.693554] 
[   36.693606] allocated by task 340 on cpu 1 at 36.692940s (0.000662s ago):
[   36.693670]  test_alloc+0x230/0x628
[   36.693710]  test_invalid_addr_free+0xd4/0x238
[   36.693753]  kunit_try_run_case+0x170/0x3f0
[   36.693794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.693837]  kthread+0x328/0x630
[   36.693873]  ret_from_fork+0x10/0x20
[   36.693912] 
[   36.693954] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   36.694034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.694063] Hardware name: linux,dummy-virt (DT)
[   36.694097] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   33.646058] ==================================================================
[   33.646113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   33.646773]  kasan_report+0xdc/0x128
[   33.647270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.647741]  kunit_try_run_case+0x170/0x3f0
[   33.647990] The buggy address is located 8 bytes inside of
[   33.647990]  allocated 9-byte region [fff00000c79816e0, fff00000c79816e9)
[   33.649449] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   36.381311] ==================================================================
[   36.381429] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   36.381429] 
[   36.381502] Invalid free of 0x0000000027937c6a (in kfence-#143):
[   36.381569]  test_double_free+0x1bc/0x238
[   36.381616]  kunit_try_run_case+0x170/0x3f0
[   36.381664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.381711]  kthread+0x328/0x630
[   36.381752]  ret_from_fork+0x10/0x20
[   36.381794] 
[   36.381818] kfence-#143: 0x0000000027937c6a-0x0000000052bf6d9a, size=32, cache=kmalloc-32
[   36.381818] 
[   36.381873] allocated by task 334 on cpu 0 at 36.380989s (0.000881s ago):
[   36.381938]  test_alloc+0x29c/0x628
[   36.381980]  test_double_free+0xd4/0x238
[   36.382023]  kunit_try_run_case+0x170/0x3f0
[   36.382065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.382111]  kthread+0x328/0x630
[   36.382148]  ret_from_fork+0x10/0x20
[   36.382188] 
[   36.382227] freed by task 334 on cpu 0 at 36.381066s (0.001157s ago):
[   36.382291]  test_double_free+0x1ac/0x238
[   36.382333]  kunit_try_run_case+0x170/0x3f0
[   36.382385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.382431]  kthread+0x328/0x630
[   36.382467]  ret_from_fork+0x10/0x20
[   36.382507] 
[   36.382554] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   36.382637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.382667] Hardware name: linux,dummy-virt (DT)
[   36.382700] ==================================================================
[   36.485258] ==================================================================
[   36.485355] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   36.485355] 
[   36.485421] Invalid free of 0x00000000d97aa65a (in kfence-#144):
[   36.485475]  test_double_free+0x100/0x238
[   36.485522]  kunit_try_run_case+0x170/0x3f0
[   36.485570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.485616]  kthread+0x328/0x630
[   36.485656]  ret_from_fork+0x10/0x20
[   36.485696] 
[   36.485720] kfence-#144: 0x00000000d97aa65a-0x000000005e272f38, size=32, cache=test
[   36.485720] 
[   36.485774] allocated by task 336 on cpu 0 at 36.485000s (0.000771s ago):
[   36.485839]  test_alloc+0x230/0x628
[   36.485881]  test_double_free+0xd4/0x238
[   36.485922]  kunit_try_run_case+0x170/0x3f0
[   36.485965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.486011]  kthread+0x328/0x630
[   36.486047]  ret_from_fork+0x10/0x20
[   36.486087] 
[   36.486111] freed by task 336 on cpu 0 at 36.485071s (0.001036s ago):
[   36.486175]  test_double_free+0xf0/0x238
[   36.486227]  kunit_try_run_case+0x170/0x3f0
[   36.486269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.486314]  kthread+0x328/0x630
[   36.486349]  ret_from_fork+0x10/0x20
[   36.486389] 
[   36.486432] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   36.486515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.486543] Hardware name: linux,dummy-virt (DT)
[   36.486578] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   35.961647] ==================================================================
[   35.961813] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   35.961813] 
[   35.961978] Use-after-free read at 0x00000000e138ed8e (in kfence-#139):
[   35.962042]  test_use_after_free_read+0x114/0x248
[   35.962093]  kunit_try_run_case+0x170/0x3f0
[   35.962360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.962425]  kthread+0x328/0x630
[   35.962465]  ret_from_fork+0x10/0x20
[   35.962549] 
[   35.962576] kfence-#139: 0x00000000e138ed8e-0x0000000054847e1c, size=32, cache=kmalloc-32
[   35.962576] 
[   35.962632] allocated by task 326 on cpu 0 at 35.961259s (0.001370s ago):
[   35.962719]  test_alloc+0x29c/0x628
[   35.962763]  test_use_after_free_read+0xd0/0x248
[   35.962806]  kunit_try_run_case+0x170/0x3f0
[   35.962994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.963065]  kthread+0x328/0x630
[   35.963135]  ret_from_fork+0x10/0x20
[   35.963241] 
[   35.963620] freed by task 326 on cpu 0 at 35.961331s (0.001965s ago):
[   35.963831]  test_use_after_free_read+0x1c0/0x248
[   35.963916]  kunit_try_run_case+0x170/0x3f0
[   35.963978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.964060]  kthread+0x328/0x630
[   35.964146]  ret_from_fork+0x10/0x20
[   35.964251] 
[   35.964344] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   35.964455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.964486] Hardware name: linux,dummy-virt (DT)
[   35.964521] ==================================================================
[   36.071806] ==================================================================
[   36.071892] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   36.071892] 
[   36.071980] Use-after-free read at 0x00000000f6e68098 (in kfence-#140):
[   36.072035]  test_use_after_free_read+0x114/0x248
[   36.072085]  kunit_try_run_case+0x170/0x3f0
[   36.072963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.073080]  kthread+0x328/0x630
[   36.073129]  ret_from_fork+0x10/0x20
[   36.073170] 
[   36.073197] kfence-#140: 0x00000000f6e68098-0x00000000af6ba70e, size=32, cache=test
[   36.073197] 
[   36.073358] allocated by task 328 on cpu 0 at 36.071061s (0.002293s ago):
[   36.073460]  test_alloc+0x230/0x628
[   36.073590]  test_use_after_free_read+0xd0/0x248
[   36.073856]  kunit_try_run_case+0x170/0x3f0
[   36.074124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.074175]  kthread+0x328/0x630
[   36.074575]  ret_from_fork+0x10/0x20
[   36.074877] 
[   36.074905] freed by task 328 on cpu 0 at 36.071355s (0.003546s ago):
[   36.075515]  test_use_after_free_read+0xf0/0x248
[   36.075934]  kunit_try_run_case+0x170/0x3f0
[   36.076336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.076479]  kthread+0x328/0x630
[   36.076762]  ret_from_fork+0x10/0x20
[   36.076848] 
[   36.076927] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   36.077441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.077485] Hardware name: linux,dummy-virt (DT)
[   36.077519] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   35.857831] ==================================================================
[   35.857919] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   35.857919] 
[   35.858046] Out-of-bounds write at 0x000000004490a70a (1B left of kfence-#138):
[   35.858109]  test_out_of_bounds_write+0x100/0x240
[   35.858158]  kunit_try_run_case+0x170/0x3f0
[   35.858223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.858297]  kthread+0x328/0x630
[   35.858339]  ret_from_fork+0x10/0x20
[   35.858380] 
[   35.858403] kfence-#138: 0x00000000ebac7135-0x000000002c821f3d, size=32, cache=test
[   35.858403] 
[   35.858644] allocated by task 324 on cpu 0 at 35.857706s (0.000905s ago):
[   35.858726]  test_alloc+0x230/0x628
[   35.858799]  test_out_of_bounds_write+0xc8/0x240
[   35.858843]  kunit_try_run_case+0x170/0x3f0
[   35.858943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.859017]  kthread+0x328/0x630
[   35.859083]  ret_from_fork+0x10/0x20
[   35.859124] 
[   35.859169] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   35.859264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.859501] Hardware name: linux,dummy-virt (DT)
[   35.859553] ==================================================================
[   35.547590] ==================================================================
[   35.547760] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   35.547760] 
[   35.547856] Out-of-bounds write at 0x000000000f57d1be (1B left of kfence-#135):
[   35.547980]  test_out_of_bounds_write+0x100/0x240
[   35.548033]  kunit_try_run_case+0x170/0x3f0
[   35.548118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.548182]  kthread+0x328/0x630
[   35.548500]  ret_from_fork+0x10/0x20
[   35.548593] 
[   35.548634] kfence-#135: 0x00000000ee1d8197-0x000000000b031ad3, size=32, cache=kmalloc-32
[   35.548634] 
[   35.548785] allocated by task 322 on cpu 0 at 35.547346s (0.001428s ago):
[   35.548857]  test_alloc+0x29c/0x628
[   35.548946]  test_out_of_bounds_write+0xc8/0x240
[   35.549011]  kunit_try_run_case+0x170/0x3f0
[   35.549051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.549096]  kthread+0x328/0x630
[   35.549132]  ret_from_fork+0x10/0x20
[   35.549171] 
[   35.549230] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   35.549313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.549482] Hardware name: linux,dummy-virt (DT)
[   35.549581] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   35.338148] ==================================================================
[   35.338403] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   35.338403] 
[   35.338493] Out-of-bounds read at 0x00000000f878214a (1B left of kfence-#133):
[   35.338550]  test_out_of_bounds_read+0x114/0x3e0
[   35.338685]  kunit_try_run_case+0x170/0x3f0
[   35.338760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.338809]  kthread+0x328/0x630
[   35.338967]  ret_from_fork+0x10/0x20
[   35.339307] 
[   35.339404] kfence-#133: 0x0000000041b1f5e0-0x0000000095b4cd26, size=32, cache=test
[   35.339404] 
[   35.339515] allocated by task 320 on cpu 0 at 35.337970s (0.001524s ago):
[   35.339684]  test_alloc+0x230/0x628
[   35.339748]  test_out_of_bounds_read+0xdc/0x3e0
[   35.339807]  kunit_try_run_case+0x170/0x3f0
[   35.339850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.339895]  kthread+0x328/0x630
[   35.339951]  ret_from_fork+0x10/0x20
[   35.339991] 
[   35.340035] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   35.340198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.340245] Hardware name: linux,dummy-virt (DT)
[   35.340289] ==================================================================
[   35.129576] ==================================================================
[   35.129968] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   35.129968] 
[   35.130085] Out-of-bounds read at 0x000000004369ef9e (32B right of kfence-#131):
[   35.130146]  test_out_of_bounds_read+0x1c8/0x3e0
[   35.130219]  kunit_try_run_case+0x170/0x3f0
[   35.130267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.130396]  kthread+0x328/0x630
[   35.130439]  ret_from_fork+0x10/0x20
[   35.130493] 
[   35.130541] kfence-#131: 0x000000000ab37535-0x000000000e10db1f, size=32, cache=kmalloc-32
[   35.130541] 
[   35.130607] allocated by task 318 on cpu 0 at 35.129337s (0.001265s ago):
[   35.130678]  test_alloc+0x29c/0x628
[   35.130720]  test_out_of_bounds_read+0x198/0x3e0
[   35.130878]  kunit_try_run_case+0x170/0x3f0
[   35.130945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.131106]  kthread+0x328/0x630
[   35.131189]  ret_from_fork+0x10/0x20
[   35.131369] 
[   35.131415] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   35.131496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.131524] Hardware name: linux,dummy-virt (DT)
[   35.131558] ==================================================================
[   34.818395] ==================================================================
[   34.818672] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   34.818672] 
[   34.818850] Out-of-bounds read at 0x00000000dbc24fa3 (1B left of kfence-#128):
[   34.819131]  test_out_of_bounds_read+0x114/0x3e0
[   34.819188]  kunit_try_run_case+0x170/0x3f0
[   34.819408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.819615]  kthread+0x328/0x630
[   34.819658]  ret_from_fork+0x10/0x20
[   34.819754] 
[   34.820009] kfence-#128: 0x00000000bc053c43-0x00000000443fffbf, size=32, cache=kmalloc-32
[   34.820009] 
[   34.820434] allocated by task 318 on cpu 0 at 34.817418s (0.002894s ago):
[   34.821360]  test_alloc+0x29c/0x628
[   34.821570]  test_out_of_bounds_read+0xdc/0x3e0
[   34.821656]  kunit_try_run_case+0x170/0x3f0
[   34.821821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.822048]  kthread+0x328/0x630
[   34.822234]  ret_from_fork+0x10/0x20
[   34.822498] 
[   34.822938] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.823054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.823085] Hardware name: linux,dummy-virt (DT)
[   34.823457] ==================================================================
[   35.441848] ==================================================================
[   35.441928] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   35.441928] 
[   35.442014] Out-of-bounds read at 0x00000000d31506f3 (32B right of kfence-#134):
[   35.442072]  test_out_of_bounds_read+0x1c8/0x3e0
[   35.442122]  kunit_try_run_case+0x170/0x3f0
[   35.442342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.442411]  kthread+0x328/0x630
[   35.442454]  ret_from_fork+0x10/0x20
[   35.442512] 
[   35.442539] kfence-#134: 0x000000008e85b0fc-0x00000000666547d1, size=32, cache=test
[   35.442539] 
[   35.442638] allocated by task 320 on cpu 0 at 35.441766s (0.000841s ago):
[   35.442708]  test_alloc+0x230/0x628
[   35.442749]  test_out_of_bounds_read+0x198/0x3e0
[   35.442792]  kunit_try_run_case+0x170/0x3f0
[   35.442970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.443022]  kthread+0x328/0x630
[   35.443057]  ret_from_fork+0x10/0x20
[   35.443145] 
[   35.443228] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   35.443353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.443430] Hardware name: linux,dummy-virt (DT)
[   35.443467] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   34.454065] ==================================================================
[   34.454127] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   34.454184] Write of size 1 at addr fff00000c9adfc78 by task kunit_try_catch/316
[   34.454260] 
[   34.454293] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.454389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.454419] Hardware name: linux,dummy-virt (DT)
[   34.454452] Call trace:
[   34.454483]  show_stack+0x20/0x38 (C)
[   34.454737]  dump_stack_lvl+0x8c/0xd0
[   34.454801]  print_report+0x118/0x5d0
[   34.454894]  kasan_report+0xdc/0x128
[   34.454975]  __asan_report_store1_noabort+0x20/0x30
[   34.455033]  strncpy_from_user+0x270/0x2a0
[   34.455090]  copy_user_test_oob+0x5c0/0xec8
[   34.455155]  kunit_try_run_case+0x170/0x3f0
[   34.455274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.455410]  kthread+0x328/0x630
[   34.455490]  ret_from_fork+0x10/0x20
[   34.455572] 
[   34.455602] Allocated by task 316:
[   34.455640]  kasan_save_stack+0x3c/0x68
[   34.455686]  kasan_save_track+0x20/0x40
[   34.455742]  kasan_save_alloc_info+0x40/0x58
[   34.455803]  __kasan_kmalloc+0xd4/0xd8
[   34.455851]  __kmalloc_noprof+0x198/0x4c8
[   34.455899]  kunit_kmalloc_array+0x34/0x88
[   34.455946]  copy_user_test_oob+0xac/0xec8
[   34.455988]  kunit_try_run_case+0x170/0x3f0
[   34.456048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.456098]  kthread+0x328/0x630
[   34.456134]  ret_from_fork+0x10/0x20
[   34.456188] 
[   34.456342] The buggy address belongs to the object at fff00000c9adfc00
[   34.456342]  which belongs to the cache kmalloc-128 of size 128
[   34.456484] The buggy address is located 0 bytes to the right of
[   34.456484]  allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78)
[   34.456656] 
[   34.456716] The buggy address belongs to the physical page:
[   34.456765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.456992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.457164] page_type: f5(slab)
[   34.457291] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.457344] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.457386] page dumped because: kasan: bad access detected
[   34.457444] 
[   34.457466] Memory state around the buggy address:
[   34.457501]  fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.457772]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.457890] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.457995]                                                                 ^
[   34.458311]  fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.458441]  fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.458489] ==================================================================
[   34.448430] ==================================================================
[   34.448484] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   34.448538] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316
[   34.448605] 
[   34.448635] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.449175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.449240] Hardware name: linux,dummy-virt (DT)
[   34.449291] Call trace:
[   34.449317]  show_stack+0x20/0x38 (C)
[   34.449384]  dump_stack_lvl+0x8c/0xd0
[   34.449507]  print_report+0x118/0x5d0
[   34.449576]  kasan_report+0xdc/0x128
[   34.449645]  kasan_check_range+0x100/0x1a8
[   34.449735]  __kasan_check_write+0x20/0x30
[   34.449783]  strncpy_from_user+0x3c/0x2a0
[   34.449852]  copy_user_test_oob+0x5c0/0xec8
[   34.449901]  kunit_try_run_case+0x170/0x3f0
[   34.450089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.450192]  kthread+0x328/0x630
[   34.450285]  ret_from_fork+0x10/0x20
[   34.450369] 
[   34.450420] Allocated by task 316:
[   34.450532]  kasan_save_stack+0x3c/0x68
[   34.450638]  kasan_save_track+0x20/0x40
[   34.450905]  kasan_save_alloc_info+0x40/0x58
[   34.450989]  __kasan_kmalloc+0xd4/0xd8
[   34.451058]  __kmalloc_noprof+0x198/0x4c8
[   34.451142]  kunit_kmalloc_array+0x34/0x88
[   34.451200]  copy_user_test_oob+0xac/0xec8
[   34.451306]  kunit_try_run_case+0x170/0x3f0
[   34.451386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.451461]  kthread+0x328/0x630
[   34.451519]  ret_from_fork+0x10/0x20
[   34.451632] 
[   34.451687] The buggy address belongs to the object at fff00000c9adfc00
[   34.451687]  which belongs to the cache kmalloc-128 of size 128
[   34.451747] The buggy address is located 0 bytes inside of
[   34.451747]  allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78)
[   34.451811] 
[   34.451833] The buggy address belongs to the physical page:
[   34.451866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.452064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.452156] page_type: f5(slab)
[   34.452236] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.452313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.452373] page dumped because: kasan: bad access detected
[   34.452437] 
[   34.452767] Memory state around the buggy address:
[   34.452858]  fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.452965]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.453036] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.453097]                                                                 ^
[   34.453139]  fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.453219]  fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.453261] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   34.434842] ==================================================================
[   34.434896] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   34.434947] Read of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316
[   34.435241] 
[   34.435287] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.435388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.435427] Hardware name: linux,dummy-virt (DT)
[   34.435462] Call trace:
[   34.435493]  show_stack+0x20/0x38 (C)
[   34.435752]  dump_stack_lvl+0x8c/0xd0
[   34.435816]  print_report+0x118/0x5d0
[   34.435867]  kasan_report+0xdc/0x128
[   34.435914]  kasan_check_range+0x100/0x1a8
[   34.435961]  __kasan_check_read+0x20/0x30
[   34.436007]  copy_user_test_oob+0x3c8/0xec8
[   34.436056]  kunit_try_run_case+0x170/0x3f0
[   34.436124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.436188]  kthread+0x328/0x630
[   34.436247]  ret_from_fork+0x10/0x20
[   34.436303] 
[   34.436421] Allocated by task 316:
[   34.436453]  kasan_save_stack+0x3c/0x68
[   34.436499]  kasan_save_track+0x20/0x40
[   34.436705]  kasan_save_alloc_info+0x40/0x58
[   34.436917]  __kasan_kmalloc+0xd4/0xd8
[   34.437119]  __kmalloc_noprof+0x198/0x4c8
[   34.437188]  kunit_kmalloc_array+0x34/0x88
[   34.437265]  copy_user_test_oob+0xac/0xec8
[   34.437346]  kunit_try_run_case+0x170/0x3f0
[   34.437417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.437497]  kthread+0x328/0x630
[   34.437547]  ret_from_fork+0x10/0x20
[   34.437598] 
[   34.437623] The buggy address belongs to the object at fff00000c9adfc00
[   34.437623]  which belongs to the cache kmalloc-128 of size 128
[   34.437713] The buggy address is located 0 bytes inside of
[   34.437713]  allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78)
[   34.437904] 
[   34.437928] The buggy address belongs to the physical page:
[   34.438039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.438100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.438348] page_type: f5(slab)
[   34.438460] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.438540] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.438614] page dumped because: kasan: bad access detected
[   34.438705] 
[   34.438755] Memory state around the buggy address:
[   34.438820]  fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.438916]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.439002] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.439068]                                                                 ^
[   34.439138]  fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.439249]  fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.439308] ==================================================================
[   34.444979] ==================================================================
[   34.445060] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   34.445129] Read of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316
[   34.445183] 
[   34.445226] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.445352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.445480] Hardware name: linux,dummy-virt (DT)
[   34.445529] Call trace:
[   34.445554]  show_stack+0x20/0x38 (C)
[   34.445614]  dump_stack_lvl+0x8c/0xd0
[   34.445689]  print_report+0x118/0x5d0
[   34.445746]  kasan_report+0xdc/0x128
[   34.445804]  kasan_check_range+0x100/0x1a8
[   34.445855]  __kasan_check_read+0x20/0x30
[   34.445903]  copy_user_test_oob+0x4a0/0xec8
[   34.445951]  kunit_try_run_case+0x170/0x3f0
[   34.446009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.446065]  kthread+0x328/0x630
[   34.446120]  ret_from_fork+0x10/0x20
[   34.446170] 
[   34.446190] Allocated by task 316:
[   34.446483]  kasan_save_stack+0x3c/0x68
[   34.446553]  kasan_save_track+0x20/0x40
[   34.446614]  kasan_save_alloc_info+0x40/0x58
[   34.446663]  __kasan_kmalloc+0xd4/0xd8
[   34.446714]  __kmalloc_noprof+0x198/0x4c8
[   34.446762]  kunit_kmalloc_array+0x34/0x88
[   34.446805]  copy_user_test_oob+0xac/0xec8
[   34.447016]  kunit_try_run_case+0x170/0x3f0
[   34.447074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.447175]  kthread+0x328/0x630
[   34.447242]  ret_from_fork+0x10/0x20
[   34.447290] 
[   34.447319] The buggy address belongs to the object at fff00000c9adfc00
[   34.447319]  which belongs to the cache kmalloc-128 of size 128
[   34.447382] The buggy address is located 0 bytes inside of
[   34.447382]  allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78)
[   34.447453] 
[   34.447482] The buggy address belongs to the physical page:
[   34.447531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.447592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.447641] page_type: f5(slab)
[   34.447682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.447735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.447778] page dumped because: kasan: bad access detected
[   34.447811] 
[   34.447832] Memory state around the buggy address:
[   34.447874]  fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.447928]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.447981] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.448023]                                                                 ^
[   34.448063]  fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.448115]  fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.448163] ==================================================================
[   34.410174] ==================================================================
[   34.410341] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   34.410416] Read of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316
[   34.410514] 
[   34.410557] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.410736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.410764] Hardware name: linux,dummy-virt (DT)
[   34.410800] Call trace:
[   34.411137]  show_stack+0x20/0x38 (C)
[   34.411201]  dump_stack_lvl+0x8c/0xd0
[   34.411306]  print_report+0x118/0x5d0
[   34.411361]  kasan_report+0xdc/0x128
[   34.411410]  kasan_check_range+0x100/0x1a8
[   34.411456]  __kasan_check_read+0x20/0x30
[   34.411504]  copy_user_test_oob+0x728/0xec8
[   34.411552]  kunit_try_run_case+0x170/0x3f0
[   34.411603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.411658]  kthread+0x328/0x630
[   34.411701]  ret_from_fork+0x10/0x20
[   34.411753] 
[   34.411774] Allocated by task 316:
[   34.411805]  kasan_save_stack+0x3c/0x68
[   34.411850]  kasan_save_track+0x20/0x40
[   34.411891]  kasan_save_alloc_info+0x40/0x58
[   34.411930]  __kasan_kmalloc+0xd4/0xd8
[   34.411970]  __kmalloc_noprof+0x198/0x4c8
[   34.412011]  kunit_kmalloc_array+0x34/0x88
[   34.412052]  copy_user_test_oob+0xac/0xec8
[   34.412091]  kunit_try_run_case+0x170/0x3f0
[   34.412132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.412179]  kthread+0x328/0x630
[   34.412226]  ret_from_fork+0x10/0x20
[   34.412271] 
[   34.412293] The buggy address belongs to the object at fff00000c9adfc00
[   34.412293]  which belongs to the cache kmalloc-128 of size 128
[   34.412353] The buggy address is located 0 bytes inside of
[   34.412353]  allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78)
[   34.412419] 
[   34.412441] The buggy address belongs to the physical page:
[   34.412477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.412533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.412622] page_type: f5(slab)
[   34.413089] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.414692] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.414777] page dumped because: kasan: bad access detected
[   34.414815] 
[   34.414836] Memory state around the buggy address:
[   34.414877]  fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.414923]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.416007] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.416375]                                                                 ^
[   34.416884]  fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.417399]  fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.417473] ==================================================================
[   34.391662] ==================================================================
[   34.392677] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   34.393354] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316
[   34.393638] 
[   34.394117] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.394413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.394561] Hardware name: linux,dummy-virt (DT)
[   34.395172] Call trace:
[   34.395287]  show_stack+0x20/0x38 (C)
[   34.395348]  dump_stack_lvl+0x8c/0xd0
[   34.395409]  print_report+0x118/0x5d0
[   34.395556]  kasan_report+0xdc/0x128
[   34.395692]  kasan_check_range+0x100/0x1a8
[   34.396290]  __kasan_check_write+0x20/0x30
[   34.396624]  copy_user_test_oob+0x234/0xec8
[   34.396686]  kunit_try_run_case+0x170/0x3f0
[   34.396744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.396798]  kthread+0x328/0x630
[   34.396845]  ret_from_fork+0x10/0x20
[   34.396900] 
[   34.397833] Allocated by task 316:
[   34.397975]  kasan_save_stack+0x3c/0x68
[   34.398036]  kasan_save_track+0x20/0x40
[   34.398374]  kasan_save_alloc_info+0x40/0x58
[   34.398420]  __kasan_kmalloc+0xd4/0xd8
[   34.398878]  __kmalloc_noprof+0x198/0x4c8
[   34.399142]  kunit_kmalloc_array+0x34/0x88
[   34.399358]  copy_user_test_oob+0xac/0xec8
[   34.399408]  kunit_try_run_case+0x170/0x3f0
[   34.399730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.399793]  kthread+0x328/0x630
[   34.400184]  ret_from_fork+0x10/0x20
[   34.400237] 
[   34.400260] The buggy address belongs to the object at fff00000c9adfc00
[   34.400260]  which belongs to the cache kmalloc-128 of size 128
[   34.400698] The buggy address is located 0 bytes inside of
[   34.400698]  allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78)
[   34.401266] 
[   34.401298] The buggy address belongs to the physical page:
[   34.401336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.401411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.401470] page_type: f5(slab)
[   34.401518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.401571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.401716] page dumped because: kasan: bad access detected
[   34.401889] 
[   34.401911] Memory state around the buggy address:
[   34.401949]  fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.402002]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.402048] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.402088]                                                                 ^
[   34.402133]  fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.402179]  fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.402227] ==================================================================
[   34.439652] ==================================================================
[   34.439703] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   34.439763] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316
[   34.439936] 
[   34.439975] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.440063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.440091] Hardware name: linux,dummy-virt (DT)
[   34.440244] Call trace:
[   34.440293]  show_stack+0x20/0x38 (C)
[   34.440376]  dump_stack_lvl+0x8c/0xd0
[   34.440426]  print_report+0x118/0x5d0
[   34.440473]  kasan_report+0xdc/0x128
[   34.440532]  kasan_check_range+0x100/0x1a8
[   34.440755]  __kasan_check_write+0x20/0x30
[   34.440868]  copy_user_test_oob+0x434/0xec8
[   34.440962]  kunit_try_run_case+0x170/0x3f0
[   34.441065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.441122]  kthread+0x328/0x630
[   34.441176]  ret_from_fork+0x10/0x20
[   34.441236] 
[   34.441257] Allocated by task 316:
[   34.441288]  kasan_save_stack+0x3c/0x68
[   34.441356]  kasan_save_track+0x20/0x40
[   34.441399]  kasan_save_alloc_info+0x40/0x58
[   34.441441]  __kasan_kmalloc+0xd4/0xd8
[   34.441484]  __kmalloc_noprof+0x198/0x4c8
[   34.441674]  kunit_kmalloc_array+0x34/0x88
[   34.441755]  copy_user_test_oob+0xac/0xec8
[   34.441842]  kunit_try_run_case+0x170/0x3f0
[   34.441896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.441988]  kthread+0x328/0x630
[   34.442156]  ret_from_fork+0x10/0x20
[   34.442312] 
[   34.442402] The buggy address belongs to the object at fff00000c9adfc00
[   34.442402]  which belongs to the cache kmalloc-128 of size 128
[   34.442501] The buggy address is located 0 bytes inside of
[   34.442501]  allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78)
[   34.442586] 
[   34.442607] The buggy address belongs to the physical page:
[   34.442640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.442708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.442910] page_type: f5(slab)
[   34.443049] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.443145] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.443226] page dumped because: kasan: bad access detected
[   34.443281] 
[   34.443512] Memory state around the buggy address:
[   34.443587]  fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.443652]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.443697] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.443738]                                                                 ^
[   34.443825]  fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.443876]  fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.443919] ==================================================================
[   34.428241] ==================================================================
[   34.428438] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   34.428615] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316
[   34.428827] 
[   34.428978] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.429188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.429389] Hardware name: linux,dummy-virt (DT)
[   34.429694] Call trace:
[   34.429779]  show_stack+0x20/0x38 (C)
[   34.429852]  dump_stack_lvl+0x8c/0xd0
[   34.429953]  print_report+0x118/0x5d0
[   34.430041]  kasan_report+0xdc/0x128
[   34.430090]  kasan_check_range+0x100/0x1a8
[   34.430147]  __kasan_check_write+0x20/0x30
[   34.430195]  copy_user_test_oob+0x35c/0xec8
[   34.430655]  kunit_try_run_case+0x170/0x3f0
[   34.430832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.431023]  kthread+0x328/0x630
[   34.431131]  ret_from_fork+0x10/0x20
[   34.431182] 
[   34.431203] Allocated by task 316:
[   34.431248]  kasan_save_stack+0x3c/0x68
[   34.431294]  kasan_save_track+0x20/0x40
[   34.431552]  kasan_save_alloc_info+0x40/0x58
[   34.431643]  __kasan_kmalloc+0xd4/0xd8
[   34.431762]  __kmalloc_noprof+0x198/0x4c8
[   34.431915]  kunit_kmalloc_array+0x34/0x88
[   34.431962]  copy_user_test_oob+0xac/0xec8
[   34.432045]  kunit_try_run_case+0x170/0x3f0
[   34.432150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.432228]  kthread+0x328/0x630
[   34.432264]  ret_from_fork+0x10/0x20
[   34.432302] 
[   34.432364] The buggy address belongs to the object at fff00000c9adfc00
[   34.432364]  which belongs to the cache kmalloc-128 of size 128
[   34.432603] The buggy address is located 0 bytes inside of
[   34.432603]  allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78)
[   34.432670] 
[   34.432904] The buggy address belongs to the physical page:
[   34.432952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.433029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.433139] page_type: f5(slab)
[   34.433218] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.433272] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.433316] page dumped because: kasan: bad access detected
[   34.433496] 
[   34.433518] Memory state around the buggy address:
[   34.433555]  fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.433600]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.433951] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.434024]                                                                 ^
[   34.434082]  fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.434167]  fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.434265] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   34.318393] ==================================================================
[   34.318449] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   34.318505] Write of size 8 at addr fff00000c9adfb78 by task kunit_try_catch/312
[   34.318556] 
[   34.318591] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.318679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.319881] Hardware name: linux,dummy-virt (DT)
[   34.319936] Call trace:
[   34.319962]  show_stack+0x20/0x38 (C)
[   34.320018]  dump_stack_lvl+0x8c/0xd0
[   34.320066]  print_report+0x118/0x5d0
[   34.320115]  kasan_report+0xdc/0x128
[   34.320164]  kasan_check_range+0x100/0x1a8
[   34.320222]  __kasan_check_write+0x20/0x30
[   34.321200]  copy_to_kernel_nofault+0x8c/0x250
[   34.321442]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   34.321638]  kunit_try_run_case+0x170/0x3f0
[   34.322054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.322127]  kthread+0x328/0x630
[   34.322174]  ret_from_fork+0x10/0x20
[   34.322825] 
[   34.322905] Allocated by task 312:
[   34.322969]  kasan_save_stack+0x3c/0x68
[   34.323572]  kasan_save_track+0x20/0x40
[   34.323627]  kasan_save_alloc_info+0x40/0x58
[   34.323716]  __kasan_kmalloc+0xd4/0xd8
[   34.324139]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.324195]  copy_to_kernel_nofault_oob+0xc8/0x418
[   34.324687]  kunit_try_run_case+0x170/0x3f0
[   34.324982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.325108]  kthread+0x328/0x630
[   34.325149]  ret_from_fork+0x10/0x20
[   34.325349] 
[   34.325423] The buggy address belongs to the object at fff00000c9adfb00
[   34.325423]  which belongs to the cache kmalloc-128 of size 128
[   34.325485] The buggy address is located 0 bytes to the right of
[   34.325485]  allocated 120-byte region [fff00000c9adfb00, fff00000c9adfb78)
[   34.325550] 
[   34.325573] The buggy address belongs to the physical page:
[   34.326245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.326330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.326625] page_type: f5(slab)
[   34.326756] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.327118] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.327269] page dumped because: kasan: bad access detected
[   34.327304] 
[   34.327324] Memory state around the buggy address:
[   34.327775]  fff00000c9adfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.327853]  fff00000c9adfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.327905] >fff00000c9adfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.327945]                                                                 ^
[   34.327990]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.328035]  fff00000c9adfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.328076] ==================================================================
[   34.305887] ==================================================================
[   34.305958] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   34.306029] Read of size 8 at addr fff00000c9adfb78 by task kunit_try_catch/312
[   34.306079] 
[   34.306120] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.307174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.307585] Hardware name: linux,dummy-virt (DT)
[   34.307845] Call trace:
[   34.307874]  show_stack+0x20/0x38 (C)
[   34.308524]  dump_stack_lvl+0x8c/0xd0
[   34.308795]  print_report+0x118/0x5d0
[   34.308935]  kasan_report+0xdc/0x128
[   34.308985]  __asan_report_load8_noabort+0x20/0x30
[   34.309035]  copy_to_kernel_nofault+0x204/0x250
[   34.309789]  copy_to_kernel_nofault_oob+0x158/0x418
[   34.309856]  kunit_try_run_case+0x170/0x3f0
[   34.310327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.310519]  kthread+0x328/0x630
[   34.310706]  ret_from_fork+0x10/0x20
[   34.310760] 
[   34.311141] Allocated by task 312:
[   34.311182]  kasan_save_stack+0x3c/0x68
[   34.311561]  kasan_save_track+0x20/0x40
[   34.311943]  kasan_save_alloc_info+0x40/0x58
[   34.312181]  __kasan_kmalloc+0xd4/0xd8
[   34.312442]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.312497]  copy_to_kernel_nofault_oob+0xc8/0x418
[   34.312836]  kunit_try_run_case+0x170/0x3f0
[   34.312898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.312947]  kthread+0x328/0x630
[   34.313196]  ret_from_fork+0x10/0x20
[   34.313249] 
[   34.313272] The buggy address belongs to the object at fff00000c9adfb00
[   34.313272]  which belongs to the cache kmalloc-128 of size 128
[   34.313334] The buggy address is located 0 bytes to the right of
[   34.313334]  allocated 120-byte region [fff00000c9adfb00, fff00000c9adfb78)
[   34.313398] 
[   34.314051] The buggy address belongs to the physical page:
[   34.314116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.314255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.314328] page_type: f5(slab)
[   34.314373] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.314427] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.314470] page dumped because: kasan: bad access detected
[   34.314505] 
[   34.314526] Memory state around the buggy address:
[   34.314563]  fff00000c9adfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.314609]  fff00000c9adfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.315281] >fff00000c9adfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.315343]                                                                 ^
[   34.315867]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.316024]  fff00000c9adfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.316252] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   34.212424] ==================================================================
[   34.212500] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   34.213232] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300
[   34.213361] 
[   34.213402] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.213493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.213562] Hardware name: linux,dummy-virt (DT)
[   34.213626] Call trace:
[   34.213935]  show_stack+0x20/0x38 (C)
[   34.213995]  dump_stack_lvl+0x8c/0xd0
[   34.214045]  print_report+0x310/0x5d0
[   34.214096]  kasan_report+0xdc/0x128
[   34.214144]  __asan_report_load1_noabort+0x20/0x30
[   34.214599]  vmalloc_oob+0x578/0x5d0
[   34.215038]  kunit_try_run_case+0x170/0x3f0
[   34.215480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.215717]  kthread+0x328/0x630
[   34.215926]  ret_from_fork+0x10/0x20
[   34.215982] 
[   34.216305] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   34.216518] The buggy address belongs to the physical page:
[   34.216654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9
[   34.216847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.217159] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.217241] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.217689] page dumped because: kasan: bad access detected
[   34.218112] 
[   34.218139] Memory state around the buggy address:
[   34.218197]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.218397]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.218753] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   34.218965]                                                              ^
[   34.219270]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.219458]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.219744] ==================================================================
[   34.222202] ==================================================================
[   34.222271] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   34.222322] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300
[   34.222373] 
[   34.222404] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.222490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.222520] Hardware name: linux,dummy-virt (DT)
[   34.223166] Call trace:
[   34.223255]  show_stack+0x20/0x38 (C)
[   34.223311]  dump_stack_lvl+0x8c/0xd0
[   34.223656]  print_report+0x310/0x5d0
[   34.224089]  kasan_report+0xdc/0x128
[   34.224342]  __asan_report_load1_noabort+0x20/0x30
[   34.224395]  vmalloc_oob+0x51c/0x5d0
[   34.224441]  kunit_try_run_case+0x170/0x3f0
[   34.224491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.224960]  kthread+0x328/0x630
[   34.225079]  ret_from_fork+0x10/0x20
[   34.225530] 
[   34.225601] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   34.225678] The buggy address belongs to the physical page:
[   34.225726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9
[   34.225781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.226135] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.226436] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.226775] page dumped because: kasan: bad access detected
[   34.226955] 
[   34.226978] Memory state around the buggy address:
[   34.227272]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.227405]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.227688] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   34.227942]                                                                 ^
[   34.228415]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.228486]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.228712] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   34.015602] ==================================================================
[   34.015669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   34.015721] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.015772] 
[   34.015802] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.015888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.015917] Hardware name: linux,dummy-virt (DT)
[   34.015950] Call trace:
[   34.015974]  show_stack+0x20/0x38 (C)
[   34.016021]  dump_stack_lvl+0x8c/0xd0
[   34.016069]  print_report+0x118/0x5d0
[   34.016116]  kasan_report+0xdc/0x128
[   34.016166]  kasan_check_range+0x100/0x1a8
[   34.016223]  __kasan_check_write+0x20/0x30
[   34.016269]  kasan_atomics_helper+0x126c/0x4858
[   34.016320]  kasan_atomics+0x198/0x2e0
[   34.016369]  kunit_try_run_case+0x170/0x3f0
[   34.016419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.016477]  kthread+0x328/0x630
[   34.016925]  ret_from_fork+0x10/0x20
[   34.017076] 
[   34.017098] Allocated by task 296:
[   34.017130]  kasan_save_stack+0x3c/0x68
[   34.017176]  kasan_save_track+0x20/0x40
[   34.017367]  kasan_save_alloc_info+0x40/0x58
[   34.017426]  __kasan_kmalloc+0xd4/0xd8
[   34.017520]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.017563]  kasan_atomics+0xb8/0x2e0
[   34.017609]  kunit_try_run_case+0x170/0x3f0
[   34.017772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.017862]  kthread+0x328/0x630
[   34.017981]  ret_from_fork+0x10/0x20
[   34.018019] 
[   34.018043] The buggy address belongs to the object at fff00000c9a67800
[   34.018043]  which belongs to the cache kmalloc-64 of size 64
[   34.018103] The buggy address is located 0 bytes to the right of
[   34.018103]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.018170] 
[   34.018195] The buggy address belongs to the physical page:
[   34.018245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.018492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.018546] page_type: f5(slab)
[   34.018666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.018720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.018762] page dumped because: kasan: bad access detected
[   34.018837] 
[   34.018929] Memory state around the buggy address:
[   34.019035]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.019115]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.019160] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.019216]                                      ^
[   34.019253]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.019296]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.020073] ==================================================================
[   34.112574] ==================================================================
[   34.113406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   34.114126] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.114663] 
[   34.115276] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.116086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.116123] Hardware name: linux,dummy-virt (DT)
[   34.116833] Call trace:
[   34.116932]  show_stack+0x20/0x38 (C)
[   34.117463]  dump_stack_lvl+0x8c/0xd0
[   34.118049]  print_report+0x118/0x5d0
[   34.118107]  kasan_report+0xdc/0x128
[   34.118155]  kasan_check_range+0x100/0x1a8
[   34.118202]  __kasan_check_write+0x20/0x30
[   34.118260]  kasan_atomics_helper+0x15b4/0x4858
[   34.118312]  kasan_atomics+0x198/0x2e0
[   34.118360]  kunit_try_run_case+0x170/0x3f0
[   34.120442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.121245]  kthread+0x328/0x630
[   34.121422]  ret_from_fork+0x10/0x20
[   34.121648] 
[   34.121735] Allocated by task 296:
[   34.121767]  kasan_save_stack+0x3c/0x68
[   34.121830]  kasan_save_track+0x20/0x40
[   34.122307]  kasan_save_alloc_info+0x40/0x58
[   34.122659]  __kasan_kmalloc+0xd4/0xd8
[   34.122812]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.123011]  kasan_atomics+0xb8/0x2e0
[   34.123922]  kunit_try_run_case+0x170/0x3f0
[   34.124091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.124139]  kthread+0x328/0x630
[   34.124332]  ret_from_fork+0x10/0x20
[   34.124787] 
[   34.124815] The buggy address belongs to the object at fff00000c9a67800
[   34.124815]  which belongs to the cache kmalloc-64 of size 64
[   34.125052] The buggy address is located 0 bytes to the right of
[   34.125052]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.125219] 
[   34.125636] The buggy address belongs to the physical page:
[   34.125870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.126170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.126243] page_type: f5(slab)
[   34.126284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.126337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.126979] page dumped because: kasan: bad access detected
[   34.127021] 
[   34.127043] Memory state around the buggy address:
[   34.127077]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.127693]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.128059] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.128105]                                      ^
[   34.128143]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.128189]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.128761] ==================================================================
[   33.858004] ==================================================================
[   33.858191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   33.858494] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.858688] 
[   33.858829] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.859239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.859276] Hardware name: linux,dummy-virt (DT)
[   33.859313] Call trace:
[   33.859659]  show_stack+0x20/0x38 (C)
[   33.860008]  kasan_atomics+0x198/0x2e0
[   33.862689] The buggy address belongs to the object at fff00000c9a67800
[   33.862689]  which belongs to the cache kmalloc-64 of size 64
[   33.866582] ==================================================================
[   34.146069] ==================================================================
[   34.146119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   34.146171] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.146238] 
[   34.146270] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.146356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.146385] Hardware name: linux,dummy-virt (DT)
[   34.146418] Call trace:
[   34.146442]  show_stack+0x20/0x38 (C)
[   34.146490]  dump_stack_lvl+0x8c/0xd0
[   34.146540]  print_report+0x118/0x5d0
[   34.146588]  kasan_report+0xdc/0x128
[   34.146638]  __asan_report_load8_noabort+0x20/0x30
[   34.146688]  kasan_atomics_helper+0x3df4/0x4858
[   34.146737]  kasan_atomics+0x198/0x2e0
[   34.146786]  kunit_try_run_case+0x170/0x3f0
[   34.146837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.146893]  kthread+0x328/0x630
[   34.146938]  ret_from_fork+0x10/0x20
[   34.146987] 
[   34.147007] Allocated by task 296:
[   34.147037]  kasan_save_stack+0x3c/0x68
[   34.147081]  kasan_save_track+0x20/0x40
[   34.147122]  kasan_save_alloc_info+0x40/0x58
[   34.147161]  __kasan_kmalloc+0xd4/0xd8
[   34.147200]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.148180]  kasan_atomics+0xb8/0x2e0
[   34.148242]  kunit_try_run_case+0x170/0x3f0
[   34.148282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.148463]  kthread+0x328/0x630
[   34.148606]  ret_from_fork+0x10/0x20
[   34.148647] 
[   34.148670] The buggy address belongs to the object at fff00000c9a67800
[   34.148670]  which belongs to the cache kmalloc-64 of size 64
[   34.148730] The buggy address is located 0 bytes to the right of
[   34.148730]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.148800] 
[   34.148821] The buggy address belongs to the physical page:
[   34.148853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.149004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.149068] page_type: f5(slab)
[   34.149106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.149158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.149200] page dumped because: kasan: bad access detected
[   34.149643] 
[   34.149675] Memory state around the buggy address:
[   34.149712]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.149759]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.149806] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.149846]                                      ^
[   34.149880]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.149927]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.149968] ==================================================================
[   34.003955] ==================================================================
[   34.004031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   34.004082] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.004713] 
[   34.004748] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.005187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.005251] Hardware name: linux,dummy-virt (DT)
[   34.005307] Call trace:
[   34.005332]  show_stack+0x20/0x38 (C)
[   34.005386]  dump_stack_lvl+0x8c/0xd0
[   34.005509]  print_report+0x118/0x5d0
[   34.005689]  kasan_report+0xdc/0x128
[   34.005741]  kasan_check_range+0x100/0x1a8
[   34.005811]  __kasan_check_write+0x20/0x30
[   34.005957]  kasan_atomics_helper+0x1190/0x4858
[   34.006349]  kasan_atomics+0x198/0x2e0
[   34.006402]  kunit_try_run_case+0x170/0x3f0
[   34.006751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.006827]  kthread+0x328/0x630
[   34.006878]  ret_from_fork+0x10/0x20
[   34.006983] 
[   34.007003] Allocated by task 296:
[   34.007034]  kasan_save_stack+0x3c/0x68
[   34.007289]  kasan_save_track+0x20/0x40
[   34.007424]  kasan_save_alloc_info+0x40/0x58
[   34.007513]  __kasan_kmalloc+0xd4/0xd8
[   34.007554]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.007598]  kasan_atomics+0xb8/0x2e0
[   34.007642]  kunit_try_run_case+0x170/0x3f0
[   34.007793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.007842]  kthread+0x328/0x630
[   34.007876]  ret_from_fork+0x10/0x20
[   34.007966] 
[   34.008032] The buggy address belongs to the object at fff00000c9a67800
[   34.008032]  which belongs to the cache kmalloc-64 of size 64
[   34.008118] The buggy address is located 0 bytes to the right of
[   34.008118]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.008183] 
[   34.008217] The buggy address belongs to the physical page:
[   34.008249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.008303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.008349] page_type: f5(slab)
[   34.008389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.008438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.008481] page dumped because: kasan: bad access detected
[   34.008835] 
[   34.008863] Memory state around the buggy address:
[   34.008925]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.008972]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.009016] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.009056]                                      ^
[   34.009431]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.009483]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.009523] ==================================================================
[   33.914081] ==================================================================
[   33.914509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.914599] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.914825] 
[   33.914861] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.914948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.914977] Hardware name: linux,dummy-virt (DT)
[   33.915011] Call trace:
[   33.915304]  show_stack+0x20/0x38 (C)
[   33.915555]  dump_stack_lvl+0x8c/0xd0
[   33.915887]  print_report+0x118/0x5d0
[   33.916128]  kasan_report+0xdc/0x128
[   33.916568]  __asan_report_load4_noabort+0x20/0x30
[   33.916760]  kasan_atomics_helper+0x3e04/0x4858
[   33.917067]  kasan_atomics+0x198/0x2e0
[   33.917126]  kunit_try_run_case+0x170/0x3f0
[   33.917178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.917430]  kthread+0x328/0x630
[   33.917485]  ret_from_fork+0x10/0x20
[   33.917918] 
[   33.917946] Allocated by task 296:
[   33.918134]  kasan_save_stack+0x3c/0x68
[   33.918187]  kasan_save_track+0x20/0x40
[   33.918744]  kasan_save_alloc_info+0x40/0x58
[   33.918797]  __kasan_kmalloc+0xd4/0xd8
[   33.919158]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.919484]  kasan_atomics+0xb8/0x2e0
[   33.919763]  kunit_try_run_case+0x170/0x3f0
[   33.920078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.920314]  kthread+0x328/0x630
[   33.920456]  ret_from_fork+0x10/0x20
[   33.920908] 
[   33.920974] The buggy address belongs to the object at fff00000c9a67800
[   33.920974]  which belongs to the cache kmalloc-64 of size 64
[   33.921259] The buggy address is located 0 bytes to the right of
[   33.921259]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.921450] 
[   33.921518] The buggy address belongs to the physical page:
[   33.921763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.921822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.921955] page_type: f5(slab)
[   33.922050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.922158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.922202] page dumped because: kasan: bad access detected
[   33.922311] 
[   33.922332] Memory state around the buggy address:
[   33.922610]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.922914]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.923057] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.923175]                                      ^
[   33.923222]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.923266]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.923306] ==================================================================
[   33.951952] ==================================================================
[   33.952164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.952722] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.953029] 
[   33.953065] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.953174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.953252] Hardware name: linux,dummy-virt (DT)
[   33.953287] Call trace:
[   33.953314]  show_stack+0x20/0x38 (C)
[   33.953367]  dump_stack_lvl+0x8c/0xd0
[   33.953416]  print_report+0x118/0x5d0
[   33.953466]  kasan_report+0xdc/0x128
[   33.953790]  __asan_report_store8_noabort+0x20/0x30
[   33.953884]  kasan_atomics_helper+0x3e5c/0x4858
[   33.954176]  kasan_atomics+0x198/0x2e0
[   33.954243]  kunit_try_run_case+0x170/0x3f0
[   33.954295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.954352]  kthread+0x328/0x630
[   33.954396]  ret_from_fork+0x10/0x20
[   33.954508] 
[   33.954612] Allocated by task 296:
[   33.954643]  kasan_save_stack+0x3c/0x68
[   33.954689]  kasan_save_track+0x20/0x40
[   33.954735]  kasan_save_alloc_info+0x40/0x58
[   33.954847]  __kasan_kmalloc+0xd4/0xd8
[   33.954887]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.954985]  kasan_atomics+0xb8/0x2e0
[   33.955078]  kunit_try_run_case+0x170/0x3f0
[   33.955140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.955245]  kthread+0x328/0x630
[   33.955280]  ret_from_fork+0x10/0x20
[   33.955711] 
[   33.955735] The buggy address belongs to the object at fff00000c9a67800
[   33.955735]  which belongs to the cache kmalloc-64 of size 64
[   33.955795] The buggy address is located 0 bytes to the right of
[   33.955795]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.955860] 
[   33.955883] The buggy address belongs to the physical page:
[   33.955916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.956406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.956742] page_type: f5(slab)
[   33.956809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.957132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.957250] page dumped because: kasan: bad access detected
[   33.957285] 
[   33.957420] Memory state around the buggy address:
[   33.957466]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.957514]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.957558] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.957599]                                      ^
[   33.957874]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.957948]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.958160] ==================================================================
[   33.959904] ==================================================================
[   33.959970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.960188] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.960450] 
[   33.960490] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.960754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.961151] Hardware name: linux,dummy-virt (DT)
[   33.961187] Call trace:
[   33.961225]  show_stack+0x20/0x38 (C)
[   33.961279]  dump_stack_lvl+0x8c/0xd0
[   33.961352]  print_report+0x118/0x5d0
[   33.961404]  kasan_report+0xdc/0x128
[   33.961452]  kasan_check_range+0x100/0x1a8
[   33.961500]  __kasan_check_write+0x20/0x30
[   33.961593]  kasan_atomics_helper+0xeb8/0x4858
[   33.961761]  kasan_atomics+0x198/0x2e0
[   33.962171]  kunit_try_run_case+0x170/0x3f0
[   33.962299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.962356]  kthread+0x328/0x630
[   33.962401]  ret_from_fork+0x10/0x20
[   33.962535] 
[   33.962633] Allocated by task 296:
[   33.962727]  kasan_save_stack+0x3c/0x68
[   33.962773]  kasan_save_track+0x20/0x40
[   33.962814]  kasan_save_alloc_info+0x40/0x58
[   33.962855]  __kasan_kmalloc+0xd4/0xd8
[   33.962895]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.962979]  kasan_atomics+0xb8/0x2e0
[   33.963052]  kunit_try_run_case+0x170/0x3f0
[   33.963094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.963498]  kthread+0x328/0x630
[   33.963639]  ret_from_fork+0x10/0x20
[   33.964081] 
[   33.964106] The buggy address belongs to the object at fff00000c9a67800
[   33.964106]  which belongs to the cache kmalloc-64 of size 64
[   33.964419] The buggy address is located 0 bytes to the right of
[   33.964419]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.964891] 
[   33.964973] The buggy address belongs to the physical page:
[   33.965064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.965132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.965667] page_type: f5(slab)
[   33.965728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.965866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.965909] page dumped because: kasan: bad access detected
[   33.965950] 
[   33.965970] Memory state around the buggy address:
[   33.966005]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.966050]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.966119] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.966177]                                      ^
[   33.966223]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.966267]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.966307] ==================================================================
[   33.903591] ==================================================================
[   33.903844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.903946] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.904055] 
[   33.904287] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.904624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.904657] Hardware name: linux,dummy-virt (DT)
[   33.904691] Call trace:
[   33.904716]  show_stack+0x20/0x38 (C)
[   33.904768]  dump_stack_lvl+0x8c/0xd0
[   33.904817]  print_report+0x118/0x5d0
[   33.904866]  kasan_report+0xdc/0x128
[   33.904913]  kasan_check_range+0x100/0x1a8
[   33.904962]  __kasan_check_write+0x20/0x30
[   33.905140]  kasan_atomics_helper+0xd3c/0x4858
[   33.905225]  kasan_atomics+0x198/0x2e0
[   33.905719]  kunit_try_run_case+0x170/0x3f0
[   33.905796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.906400]  kthread+0x328/0x630
[   33.906694]  ret_from_fork+0x10/0x20
[   33.906870] 
[   33.907277] Allocated by task 296:
[   33.907438]  kasan_save_stack+0x3c/0x68
[   33.907487]  kasan_save_track+0x20/0x40
[   33.907867]  kasan_save_alloc_info+0x40/0x58
[   33.908109]  __kasan_kmalloc+0xd4/0xd8
[   33.908160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.908549]  kasan_atomics+0xb8/0x2e0
[   33.908912]  kunit_try_run_case+0x170/0x3f0
[   33.909005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.909298]  kthread+0x328/0x630
[   33.909548]  ret_from_fork+0x10/0x20
[   33.909705] 
[   33.909729] The buggy address belongs to the object at fff00000c9a67800
[   33.909729]  which belongs to the cache kmalloc-64 of size 64
[   33.909944] The buggy address is located 0 bytes to the right of
[   33.909944]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.910030] 
[   33.910216] The buggy address belongs to the physical page:
[   33.910350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.910404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.910455] page_type: f5(slab)
[   33.910494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.910915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.910971] page dumped because: kasan: bad access detected
[   33.911477] 
[   33.911569] Memory state around the buggy address:
[   33.911809]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.911975]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.912021] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.912060]                                      ^
[   33.912096]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.912140]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.912179] ==================================================================
[   34.032455] ==================================================================
[   34.032880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   34.032947] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.033154] 
[   34.033186] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.033332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.033404] Hardware name: linux,dummy-virt (DT)
[   34.033437] Call trace:
[   34.033461]  show_stack+0x20/0x38 (C)
[   34.033536]  dump_stack_lvl+0x8c/0xd0
[   34.033584]  print_report+0x118/0x5d0
[   34.033635]  kasan_report+0xdc/0x128
[   34.033682]  __asan_report_load8_noabort+0x20/0x30
[   34.034009]  kasan_atomics_helper+0x3f04/0x4858
[   34.034220]  kasan_atomics+0x198/0x2e0
[   34.034272]  kunit_try_run_case+0x170/0x3f0
[   34.034323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.034646]  kthread+0x328/0x630
[   34.034693]  ret_from_fork+0x10/0x20
[   34.034800] 
[   34.034851] Allocated by task 296:
[   34.034900]  kasan_save_stack+0x3c/0x68
[   34.034945]  kasan_save_track+0x20/0x40
[   34.034992]  kasan_save_alloc_info+0x40/0x58
[   34.035157]  __kasan_kmalloc+0xd4/0xd8
[   34.035263]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.035314]  kasan_atomics+0xb8/0x2e0
[   34.035464]  kunit_try_run_case+0x170/0x3f0
[   34.035533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.035583]  kthread+0x328/0x630
[   34.035643]  ret_from_fork+0x10/0x20
[   34.035681] 
[   34.035745] The buggy address belongs to the object at fff00000c9a67800
[   34.035745]  which belongs to the cache kmalloc-64 of size 64
[   34.035917] The buggy address is located 0 bytes to the right of
[   34.035917]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.035984] 
[   34.036005] The buggy address belongs to the physical page:
[   34.036037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.036092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.036139] page_type: f5(slab)
[   34.036205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.036266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.036308] page dumped because: kasan: bad access detected
[   34.036341] 
[   34.036418] Memory state around the buggy address:
[   34.036453]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.036498]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.037155] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.037203]                                      ^
[   34.037249]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.037295]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.037335] ==================================================================
[   33.848505] ==================================================================
[   33.848569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   33.848896] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.849091] 
[   33.849166] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.849654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.849720] Hardware name: linux,dummy-virt (DT)
[   33.849888] Call trace:
[   33.850036]  show_stack+0x20/0x38 (C)
[   33.850229]  dump_stack_lvl+0x8c/0xd0
[   33.850280]  print_report+0x118/0x5d0
[   33.850571]  kasan_report+0xdc/0x128
[   33.850664]  kasan_check_range+0x100/0x1a8
[   33.850893]  __kasan_check_write+0x20/0x30
[   33.851056]  kasan_atomics_helper+0xb70/0x4858
[   33.851136]  kasan_atomics+0x198/0x2e0
[   33.851448]  kunit_try_run_case+0x170/0x3f0
[   33.851587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.851645]  kthread+0x328/0x630
[   33.851688]  ret_from_fork+0x10/0x20
[   33.851747] 
[   33.851768] Allocated by task 296:
[   33.851799]  kasan_save_stack+0x3c/0x68
[   33.851852]  kasan_save_track+0x20/0x40
[   33.851892]  kasan_save_alloc_info+0x40/0x58
[   33.851933]  __kasan_kmalloc+0xd4/0xd8
[   33.851973]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.852049]  kasan_atomics+0xb8/0x2e0
[   33.852365]  kunit_try_run_case+0x170/0x3f0
[   33.852672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.852725]  kthread+0x328/0x630
[   33.852915]  ret_from_fork+0x10/0x20
[   33.852971] 
[   33.853047] The buggy address belongs to the object at fff00000c9a67800
[   33.853047]  which belongs to the cache kmalloc-64 of size 64
[   33.853187] The buggy address is located 0 bytes to the right of
[   33.853187]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.853322] 
[   33.853344] The buggy address belongs to the physical page:
[   33.853377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.853431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.853981] page_type: f5(slab)
[   33.854395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.854547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.854774] page dumped because: kasan: bad access detected
[   33.854812] 
[   33.855083] Memory state around the buggy address:
[   33.855313]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.855624]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.855732] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.856285]                                      ^
[   33.856338]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.856385]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.856426] ==================================================================
[   34.038536] ==================================================================
[   34.038622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   34.038674] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.038724] 
[   34.038788] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.038937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.038966] Hardware name: linux,dummy-virt (DT)
[   34.038998] Call trace:
[   34.039022]  show_stack+0x20/0x38 (C)
[   34.039070]  dump_stack_lvl+0x8c/0xd0
[   34.039568]  print_report+0x118/0x5d0
[   34.039944]  kasan_report+0xdc/0x128
[   34.040000]  kasan_check_range+0x100/0x1a8
[   34.040097]  __kasan_check_write+0x20/0x30
[   34.040230]  kasan_atomics_helper+0x1414/0x4858
[   34.040302]  kasan_atomics+0x198/0x2e0
[   34.040366]  kunit_try_run_case+0x170/0x3f0
[   34.040418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.040474]  kthread+0x328/0x630
[   34.040525]  ret_from_fork+0x10/0x20
[   34.040633] 
[   34.040653] Allocated by task 296:
[   34.040684]  kasan_save_stack+0x3c/0x68
[   34.041218]  kasan_save_track+0x20/0x40
[   34.041356]  kasan_save_alloc_info+0x40/0x58
[   34.041422]  __kasan_kmalloc+0xd4/0xd8
[   34.041464]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.041505]  kasan_atomics+0xb8/0x2e0
[   34.041544]  kunit_try_run_case+0x170/0x3f0
[   34.041586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.041634]  kthread+0x328/0x630
[   34.041890]  ret_from_fork+0x10/0x20
[   34.041961] 
[   34.042035] The buggy address belongs to the object at fff00000c9a67800
[   34.042035]  which belongs to the cache kmalloc-64 of size 64
[   34.042096] The buggy address is located 0 bytes to the right of
[   34.042096]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.042195] 
[   34.042272] The buggy address belongs to the physical page:
[   34.042305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.042357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.042412] page_type: f5(slab)
[   34.042579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.042820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.042899] page dumped because: kasan: bad access detected
[   34.043573] 
[   34.043702] Memory state around the buggy address:
[   34.043737]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.044232]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.044451] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.044957]                                      ^
[   34.045422]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.045799]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.046402] ==================================================================
[   34.092202] ==================================================================
[   34.093494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   34.094381] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.094798] 
[   34.095022] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.095828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.096021] Hardware name: linux,dummy-virt (DT)
[   34.096394] Call trace:
[   34.096839]  show_stack+0x20/0x38 (C)
[   34.096934]  dump_stack_lvl+0x8c/0xd0
[   34.096983]  print_report+0x118/0x5d0
[   34.097816]  kasan_report+0xdc/0x128
[   34.098094]  kasan_check_range+0x100/0x1a8
[   34.098143]  __kasan_check_write+0x20/0x30
[   34.098827]  kasan_atomics_helper+0x154c/0x4858
[   34.099125]  kasan_atomics+0x198/0x2e0
[   34.099183]  kunit_try_run_case+0x170/0x3f0
[   34.099245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.099302]  kthread+0x328/0x630
[   34.100346]  ret_from_fork+0x10/0x20
[   34.100412] 
[   34.100434] Allocated by task 296:
[   34.100466]  kasan_save_stack+0x3c/0x68
[   34.100512]  kasan_save_track+0x20/0x40
[   34.100561]  kasan_save_alloc_info+0x40/0x58
[   34.102137]  __kasan_kmalloc+0xd4/0xd8
[   34.102934]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.103120]  kasan_atomics+0xb8/0x2e0
[   34.103161]  kunit_try_run_case+0x170/0x3f0
[   34.103204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.104579]  kthread+0x328/0x630
[   34.104723]  ret_from_fork+0x10/0x20
[   34.104928] 
[   34.104955] The buggy address belongs to the object at fff00000c9a67800
[   34.104955]  which belongs to the cache kmalloc-64 of size 64
[   34.105024] The buggy address is located 0 bytes to the right of
[   34.105024]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.105090] 
[   34.105738] The buggy address belongs to the physical page:
[   34.105839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.106128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.106793] page_type: f5(slab)
[   34.106882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.106935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.106978] page dumped because: kasan: bad access detected
[   34.107010] 
[   34.108066] Memory state around the buggy address:
[   34.108278]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.108986]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.109316] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.109976]                                      ^
[   34.110107]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.110531]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.110864] ==================================================================
[   33.742587] ==================================================================
[   33.742654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   33.742707] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.742765] 
[   33.742955] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.743078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.743117] Hardware name: linux,dummy-virt (DT)
[   33.743151] Call trace:
[   33.743178]  show_stack+0x20/0x38 (C)
[   33.743374]  dump_stack_lvl+0x8c/0xd0
[   33.743518]  print_report+0x118/0x5d0
[   33.743575]  kasan_report+0xdc/0x128
[   33.743623]  kasan_check_range+0x100/0x1a8
[   33.743678]  __kasan_check_write+0x20/0x30
[   33.743727]  kasan_atomics_helper+0x3ac/0x4858
[   33.743779]  kasan_atomics+0x198/0x2e0
[   33.743827]  kunit_try_run_case+0x170/0x3f0
[   33.744005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.744106]  kthread+0x328/0x630
[   33.744189]  ret_from_fork+0x10/0x20
[   33.744272] 
[   33.744309] Allocated by task 296:
[   33.744558]  kasan_save_stack+0x3c/0x68
[   33.744687]  kasan_save_track+0x20/0x40
[   33.744763]  kasan_save_alloc_info+0x40/0x58
[   33.744831]  __kasan_kmalloc+0xd4/0xd8
[   33.744945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.744988]  kasan_atomics+0xb8/0x2e0
[   33.745051]  kunit_try_run_case+0x170/0x3f0
[   33.745236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.745469]  ret_from_fork+0x10/0x20
[   33.745597] 
[   33.745647] The buggy address belongs to the object at fff00000c9a67800
[   33.745647]  which belongs to the cache kmalloc-64 of size 64
[   33.745727] The buggy address is located 0 bytes to the right of
[   33.745727]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.746315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.746402] page_type: f5(slab)
[   33.746792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.747361]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.747493] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.747563]                                      ^
[   33.747618]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.747985] ==================================================================
[   33.997780] ==================================================================
[   33.997829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.998121] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.998321] 
[   33.998355] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.998686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.998720] Hardware name: linux,dummy-virt (DT)
[   33.998948] Call trace:
[   33.998981]  show_stack+0x20/0x38 (C)
[   33.999032]  dump_stack_lvl+0x8c/0xd0
[   33.999092]  print_report+0x118/0x5d0
[   33.999158]  kasan_report+0xdc/0x128
[   33.999217]  kasan_check_range+0x100/0x1a8
[   33.999264]  __kasan_check_write+0x20/0x30
[   33.999313]  kasan_atomics_helper+0x1128/0x4858
[   33.999707]  kasan_atomics+0x198/0x2e0
[   33.999762]  kunit_try_run_case+0x170/0x3f0
[   33.999982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.000123]  kthread+0x328/0x630
[   34.000170]  ret_from_fork+0x10/0x20
[   34.000231] 
[   34.000251] Allocated by task 296:
[   34.000282]  kasan_save_stack+0x3c/0x68
[   34.000328]  kasan_save_track+0x20/0x40
[   34.000370]  kasan_save_alloc_info+0x40/0x58
[   34.000410]  __kasan_kmalloc+0xd4/0xd8
[   34.000450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.000492]  kasan_atomics+0xb8/0x2e0
[   34.000581]  kunit_try_run_case+0x170/0x3f0
[   34.001105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.001561]  kthread+0x328/0x630
[   34.001652]  ret_from_fork+0x10/0x20
[   34.001706] 
[   34.001730] The buggy address belongs to the object at fff00000c9a67800
[   34.001730]  which belongs to the cache kmalloc-64 of size 64
[   34.001790] The buggy address is located 0 bytes to the right of
[   34.001790]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.001856] 
[   34.002172] The buggy address belongs to the physical page:
[   34.002225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.002316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.002366] page_type: f5(slab)
[   34.002406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.002457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.002691] page dumped because: kasan: bad access detected
[   34.002882] 
[   34.002905] Memory state around the buggy address:
[   34.002938]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.003276]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.003380] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.003462]                                      ^
[   34.003601]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.003664]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.003705] ==================================================================
[   33.978315] ==================================================================
[   33.978363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.978424] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.978575] 
[   33.978604] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.978740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.978770] Hardware name: linux,dummy-virt (DT)
[   33.978815] Call trace:
[   33.978840]  show_stack+0x20/0x38 (C)
[   33.978888]  dump_stack_lvl+0x8c/0xd0
[   33.979012]  print_report+0x118/0x5d0
[   33.979070]  kasan_report+0xdc/0x128
[   33.979118]  kasan_check_range+0x100/0x1a8
[   33.979172]  __kasan_check_write+0x20/0x30
[   33.979381]  kasan_atomics_helper+0xff0/0x4858
[   33.979547]  kasan_atomics+0x198/0x2e0
[   33.979596]  kunit_try_run_case+0x170/0x3f0
[   33.979704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.979759]  kthread+0x328/0x630
[   33.979804]  ret_from_fork+0x10/0x20
[   33.979851] 
[   33.979872] Allocated by task 296:
[   33.979903]  kasan_save_stack+0x3c/0x68
[   33.979947]  kasan_save_track+0x20/0x40
[   33.979988]  kasan_save_alloc_info+0x40/0x58
[   33.980027]  __kasan_kmalloc+0xd4/0xd8
[   33.980068]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.980111]  kasan_atomics+0xb8/0x2e0
[   33.980157]  kunit_try_run_case+0x170/0x3f0
[   33.980529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.980978]  kthread+0x328/0x630
[   33.981669]  ret_from_fork+0x10/0x20
[   33.981925] 
[   33.981949] The buggy address belongs to the object at fff00000c9a67800
[   33.981949]  which belongs to the cache kmalloc-64 of size 64
[   33.982029] The buggy address is located 0 bytes to the right of
[   33.982029]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.982096] 
[   33.982119] The buggy address belongs to the physical page:
[   33.982149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.982203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.982778] page_type: f5(slab)
[   33.982866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.983173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.983519] page dumped because: kasan: bad access detected
[   33.983558] 
[   33.983578] Memory state around the buggy address:
[   33.983614]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.983660]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.983704] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.983744]                                      ^
[   33.983794]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.983838]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.984171] ==================================================================
[   34.159106] ==================================================================
[   34.159154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   34.159203] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.159274] 
[   34.159304] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.159389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.159418] Hardware name: linux,dummy-virt (DT)
[   34.159452] Call trace:
[   34.159544]  show_stack+0x20/0x38 (C)
[   34.159638]  dump_stack_lvl+0x8c/0xd0
[   34.159688]  print_report+0x118/0x5d0
[   34.159735]  kasan_report+0xdc/0x128
[   34.159783]  kasan_check_range+0x100/0x1a8
[   34.159829]  __kasan_check_write+0x20/0x30
[   34.159888]  kasan_atomics_helper+0x175c/0x4858
[   34.160048]  kasan_atomics+0x198/0x2e0
[   34.160163]  kunit_try_run_case+0x170/0x3f0
[   34.160225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.160281]  kthread+0x328/0x630
[   34.160444]  ret_from_fork+0x10/0x20
[   34.160519] 
[   34.160638] Allocated by task 296:
[   34.160670]  kasan_save_stack+0x3c/0x68
[   34.160716]  kasan_save_track+0x20/0x40
[   34.160757]  kasan_save_alloc_info+0x40/0x58
[   34.160797]  __kasan_kmalloc+0xd4/0xd8
[   34.160847]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.160952]  kasan_atomics+0xb8/0x2e0
[   34.161010]  kunit_try_run_case+0x170/0x3f0
[   34.161052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.161099]  kthread+0x328/0x630
[   34.161179]  ret_from_fork+0x10/0x20
[   34.161251] 
[   34.161275] The buggy address belongs to the object at fff00000c9a67800
[   34.161275]  which belongs to the cache kmalloc-64 of size 64
[   34.161335] The buggy address is located 0 bytes to the right of
[   34.161335]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.161418] 
[   34.161439] The buggy address belongs to the physical page:
[   34.161472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.161636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.161727] page_type: f5(slab)
[   34.162032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.162083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.162123] page dumped because: kasan: bad access detected
[   34.162158] 
[   34.162177] Memory state around the buggy address:
[   34.162220]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.162271]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.162420] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.162461]                                      ^
[   34.162496]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.162593]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.162760] ==================================================================
[   34.129520] ==================================================================
[   34.129571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   34.130127] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.130564] 
[   34.130697] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.130890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.131094] Hardware name: linux,dummy-virt (DT)
[   34.131586] Call trace:
[   34.131617]  show_stack+0x20/0x38 (C)
[   34.131793]  dump_stack_lvl+0x8c/0xd0
[   34.131843]  print_report+0x118/0x5d0
[   34.131895]  kasan_report+0xdc/0x128
[   34.131943]  __asan_report_load8_noabort+0x20/0x30
[   34.131992]  kasan_atomics_helper+0x3db0/0x4858
[   34.132088]  kasan_atomics+0x198/0x2e0
[   34.132719]  kunit_try_run_case+0x170/0x3f0
[   34.132775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.133733]  kthread+0x328/0x630
[   34.133864]  ret_from_fork+0x10/0x20
[   34.134267] 
[   34.134346] Allocated by task 296:
[   34.134380]  kasan_save_stack+0x3c/0x68
[   34.134735]  kasan_save_track+0x20/0x40
[   34.135032]  kasan_save_alloc_info+0x40/0x58
[   34.135255]  __kasan_kmalloc+0xd4/0xd8
[   34.135712]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.135824]  kasan_atomics+0xb8/0x2e0
[   34.136160]  kunit_try_run_case+0x170/0x3f0
[   34.136222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.136502]  kthread+0x328/0x630
[   34.136927]  ret_from_fork+0x10/0x20
[   34.137101] 
[   34.137127] The buggy address belongs to the object at fff00000c9a67800
[   34.137127]  which belongs to the cache kmalloc-64 of size 64
[   34.137189] The buggy address is located 0 bytes to the right of
[   34.137189]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.137266] 
[   34.137288] The buggy address belongs to the physical page:
[   34.137321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.137378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.138062] page_type: f5(slab)
[   34.138127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.138178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.138534] page dumped because: kasan: bad access detected
[   34.138571] 
[   34.138591] Memory state around the buggy address:
[   34.138625]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.138670]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.138715] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.138756]                                      ^
[   34.138791]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.138836]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.138876] ==================================================================
[   33.837349] ==================================================================
[   33.837405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.837457] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.837509] 
[   33.837543] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.837927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.837989] Hardware name: linux,dummy-virt (DT)
[   33.838027] Call trace:
[   33.838053]  show_stack+0x20/0x38 (C)
[   33.838287]  dump_stack_lvl+0x8c/0xd0
[   33.838389]  print_report+0x118/0x5d0
[   33.838459]  kasan_report+0xdc/0x128
[   33.838520]  kasan_check_range+0x100/0x1a8
[   33.838633]  __kasan_check_write+0x20/0x30
[   33.838685]  kasan_atomics_helper+0xad4/0x4858
[   33.838737]  kasan_atomics+0x198/0x2e0
[   33.838791]  kunit_try_run_case+0x170/0x3f0
[   33.839000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.839078]  kthread+0x328/0x630
[   33.839134]  ret_from_fork+0x10/0x20
[   33.839347] 
[   33.839432] Allocated by task 296:
[   33.839484]  kasan_save_stack+0x3c/0x68
[   33.839530]  kasan_save_track+0x20/0x40
[   33.839584]  kasan_save_alloc_info+0x40/0x58
[   33.839633]  __kasan_kmalloc+0xd4/0xd8
[   33.839737]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.839787]  kasan_atomics+0xb8/0x2e0
[   33.839844]  kunit_try_run_case+0x170/0x3f0
[   33.839903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.840037]  kthread+0x328/0x630
[   33.840084]  ret_from_fork+0x10/0x20
[   33.840133] 
[   33.840162] The buggy address belongs to the object at fff00000c9a67800
[   33.840162]  which belongs to the cache kmalloc-64 of size 64
[   33.840476] The buggy address is located 0 bytes to the right of
[   33.840476]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.840590] 
[   33.840689] The buggy address belongs to the physical page:
[   33.840750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.840852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.840902] page_type: f5(slab)
[   33.840942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.840993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.841036] page dumped because: kasan: bad access detected
[   33.841258] 
[   33.841286] Memory state around the buggy address:
[   33.841329]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.841459]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.841528] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.841578]                                      ^
[   33.841796]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.841932]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.842002] ==================================================================
[   33.812291] ==================================================================
[   33.812516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   33.812711] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.812848] 
[   33.812907] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.813024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.813267] Hardware name: linux,dummy-virt (DT)
[   33.813340] Call trace:
[   33.813386]  show_stack+0x20/0x38 (C)
[   33.813516]  dump_stack_lvl+0x8c/0xd0
[   33.813595]  print_report+0x118/0x5d0
[   33.813722]  kasan_report+0xdc/0x128
[   33.813803]  kasan_check_range+0x100/0x1a8
[   33.813929]  __kasan_check_write+0x20/0x30
[   33.813982]  kasan_atomics_helper+0x934/0x4858
[   33.814036]  kasan_atomics+0x198/0x2e0
[   33.814392]  kunit_try_run_case+0x170/0x3f0
[   33.814456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.814539]  kthread+0x328/0x630
[   33.814702]  ret_from_fork+0x10/0x20
[   33.814969] 
[   33.815091]  kasan_save_stack+0x3c/0x68
[   33.815198]  kasan_save_track+0x20/0x40
[   33.815270]  kasan_save_alloc_info+0x40/0x58
[   33.815321]  __kasan_kmalloc+0xd4/0xd8
[   33.815566]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.815646]  kasan_atomics+0xb8/0x2e0
[   33.815713]  kunit_try_run_case+0x170/0x3f0
[   33.815842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.815920]  kthread+0x328/0x630
[   33.816051]  ret_from_fork+0x10/0x20
[   33.816119] 
[   33.816166] The buggy address belongs to the object at fff00000c9a67800
[   33.816166]  which belongs to the cache kmalloc-64 of size 64
[   33.816282] The buggy address is located 0 bytes to the right of
[   33.816282]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.816360] 
[   33.816384] The buggy address belongs to the physical page:
[   33.816422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.816507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.816781] page_type: f5(slab)
[   33.816913] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.816992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.817074] page dumped because: kasan: bad access detected
[   33.817159] 
[   33.817223] Memory state around the buggy address:
[   33.817260]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.817559]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.817643] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.817711]                                      ^
[   33.817801]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.817888]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.817935] ==================================================================
[   33.991384] ==================================================================
[   33.991471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.991522] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.991857] 
[   33.992029] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.992133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.992163] Hardware name: linux,dummy-virt (DT)
[   33.992195] Call trace:
[   33.992233]  show_stack+0x20/0x38 (C)
[   33.992283]  dump_stack_lvl+0x8c/0xd0
[   33.992342]  print_report+0x118/0x5d0
[   33.992393]  kasan_report+0xdc/0x128
[   33.992780]  kasan_check_range+0x100/0x1a8
[   33.992839]  __kasan_check_write+0x20/0x30
[   33.993077]  kasan_atomics_helper+0x10c0/0x4858
[   33.993232]  kasan_atomics+0x198/0x2e0
[   33.993639]  kunit_try_run_case+0x170/0x3f0
[   33.993784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.993924]  kthread+0x328/0x630
[   33.994090]  ret_from_fork+0x10/0x20
[   33.994170] 
[   33.994270] Allocated by task 296:
[   33.994319]  kasan_save_stack+0x3c/0x68
[   33.994364]  kasan_save_track+0x20/0x40
[   33.994405]  kasan_save_alloc_info+0x40/0x58
[   33.994445]  __kasan_kmalloc+0xd4/0xd8
[   33.994491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.994632]  kasan_atomics+0xb8/0x2e0
[   33.994700]  kunit_try_run_case+0x170/0x3f0
[   33.994779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.994886]  kthread+0x328/0x630
[   33.994922]  ret_from_fork+0x10/0x20
[   33.994960] 
[   33.994981] The buggy address belongs to the object at fff00000c9a67800
[   33.994981]  which belongs to the cache kmalloc-64 of size 64
[   33.995040] The buggy address is located 0 bytes to the right of
[   33.995040]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.995106] 
[   33.995128] The buggy address belongs to the physical page:
[   33.995168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.995259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.995308] page_type: f5(slab)
[   33.995381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.995434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.995475] page dumped because: kasan: bad access detected
[   33.995508] 
[   33.995842] Memory state around the buggy address:
[   33.996191]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.996253]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.996298] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.997231]                                      ^
[   33.997345]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.997513]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.997554] ==================================================================
[   34.170308] ==================================================================
[   34.170611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   34.170748] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.170962] 
[   34.170995] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.171082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.171109] Hardware name: linux,dummy-virt (DT)
[   34.171143] Call trace:
[   34.171167]  show_stack+0x20/0x38 (C)
[   34.171229]  dump_stack_lvl+0x8c/0xd0
[   34.171979]  print_report+0x118/0x5d0
[   34.172383]  kasan_report+0xdc/0x128
[   34.172507]  kasan_check_range+0x100/0x1a8
[   34.172898]  __kasan_check_write+0x20/0x30
[   34.173231]  kasan_atomics_helper+0x17ec/0x4858
[   34.173307]  kasan_atomics+0x198/0x2e0
[   34.173700]  kunit_try_run_case+0x170/0x3f0
[   34.173957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.174017]  kthread+0x328/0x630
[   34.174485]  ret_from_fork+0x10/0x20
[   34.174821] 
[   34.174844] Allocated by task 296:
[   34.175081]  kasan_save_stack+0x3c/0x68
[   34.175218]  kasan_save_track+0x20/0x40
[   34.175261]  kasan_save_alloc_info+0x40/0x58
[   34.175302]  __kasan_kmalloc+0xd4/0xd8
[   34.175342]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.175385]  kasan_atomics+0xb8/0x2e0
[   34.175963]  kunit_try_run_case+0x170/0x3f0
[   34.176056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.176107]  kthread+0x328/0x630
[   34.176144]  ret_from_fork+0x10/0x20
[   34.176183] 
[   34.176319] The buggy address belongs to the object at fff00000c9a67800
[   34.176319]  which belongs to the cache kmalloc-64 of size 64
[   34.176384] The buggy address is located 0 bytes to the right of
[   34.176384]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.176554] 
[   34.176820] The buggy address belongs to the physical page:
[   34.177118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.177192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.177254] page_type: f5(slab)
[   34.177296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.177911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.178392] page dumped because: kasan: bad access detected
[   34.178563] 
[   34.178586] Memory state around the buggy address:
[   34.178967]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.179015]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.179060] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.179101]                                      ^
[   34.179137]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.179754]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.180075] ==================================================================
[   33.831637] ==================================================================
[   33.831746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.831816] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.831930] 
[   33.831997] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.832094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.832124] Hardware name: linux,dummy-virt (DT)
[   33.832299] Call trace:
[   33.832391]  show_stack+0x20/0x38 (C)
[   33.832463]  dump_stack_lvl+0x8c/0xd0
[   33.832601]  print_report+0x118/0x5d0
[   33.832697]  kasan_report+0xdc/0x128
[   33.832752]  kasan_check_range+0x100/0x1a8
[   33.832835]  __kasan_check_write+0x20/0x30
[   33.832900]  kasan_atomics_helper+0xa6c/0x4858
[   33.832955]  kasan_atomics+0x198/0x2e0
[   33.833016]  kunit_try_run_case+0x170/0x3f0
[   33.833065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.833121]  kthread+0x328/0x630
[   33.833173]  ret_from_fork+0x10/0x20
[   33.833240] 
[   33.833262] Allocated by task 296:
[   33.833302]  kasan_save_stack+0x3c/0x68
[   33.833346]  kasan_save_track+0x20/0x40
[   33.833402]  kasan_save_alloc_info+0x40/0x58
[   33.833443]  __kasan_kmalloc+0xd4/0xd8
[   33.833482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.833529]  kasan_atomics+0xb8/0x2e0
[   33.833569]  kunit_try_run_case+0x170/0x3f0
[   33.833609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.833656]  kthread+0x328/0x630
[   33.833903]  ret_from_fork+0x10/0x20
[   33.834124] 
[   33.834165] The buggy address belongs to the object at fff00000c9a67800
[   33.834165]  which belongs to the cache kmalloc-64 of size 64
[   33.834400] The buggy address is located 0 bytes to the right of
[   33.834400]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.834620] 
[   33.834661] The buggy address belongs to the physical page:
[   33.834719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.834848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.834929] page_type: f5(slab)
[   33.835006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.835363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.835458] page dumped because: kasan: bad access detected
[   33.835610] 
[   33.835661] Memory state around the buggy address:
[   33.835718]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.836031]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.836100] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.836169]                                      ^
[   33.836227]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.836272]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.836314] ==================================================================
[   33.967826] ==================================================================
[   33.968265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.968389] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.968443] 
[   33.968474] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.968569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.968603] Hardware name: linux,dummy-virt (DT)
[   33.968634] Call trace:
[   33.968658]  show_stack+0x20/0x38 (C)
[   33.968708]  dump_stack_lvl+0x8c/0xd0
[   33.968758]  print_report+0x118/0x5d0
[   33.968808]  kasan_report+0xdc/0x128
[   33.968856]  kasan_check_range+0x100/0x1a8
[   33.969490]  __kasan_check_write+0x20/0x30
[   33.969594]  kasan_atomics_helper+0xf20/0x4858
[   33.969773]  kasan_atomics+0x198/0x2e0
[   33.969831]  kunit_try_run_case+0x170/0x3f0
[   33.969927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.970068]  kthread+0x328/0x630
[   33.970580]  ret_from_fork+0x10/0x20
[   33.970752] 
[   33.970773] Allocated by task 296:
[   33.970883]  kasan_save_stack+0x3c/0x68
[   33.971062]  kasan_save_track+0x20/0x40
[   33.971236]  kasan_save_alloc_info+0x40/0x58
[   33.971347]  __kasan_kmalloc+0xd4/0xd8
[   33.971443]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.971532]  kasan_atomics+0xb8/0x2e0
[   33.971571]  kunit_try_run_case+0x170/0x3f0
[   33.971619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.971778]  kthread+0x328/0x630
[   33.971814]  ret_from_fork+0x10/0x20
[   33.971854] 
[   33.971875] The buggy address belongs to the object at fff00000c9a67800
[   33.971875]  which belongs to the cache kmalloc-64 of size 64
[   33.971936] The buggy address is located 0 bytes to the right of
[   33.971936]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.972022] 
[   33.972101] The buggy address belongs to the physical page:
[   33.972134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.972225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.972275] page_type: f5(slab)
[   33.972346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.972399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.972441] page dumped because: kasan: bad access detected
[   33.972600] 
[   33.972624] Memory state around the buggy address:
[   33.972728]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.973080]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.973137] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.973200]                                      ^
[   33.973243]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.973286]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.973326] ==================================================================
[   33.974084] ==================================================================
[   33.974380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.974493] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.974545] 
[   33.974585] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.974780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.974851] Hardware name: linux,dummy-virt (DT)
[   33.974952] Call trace:
[   33.974989]  show_stack+0x20/0x38 (C)
[   33.975037]  dump_stack_lvl+0x8c/0xd0
[   33.975086]  print_report+0x118/0x5d0
[   33.975268]  kasan_report+0xdc/0x128
[   33.975326]  kasan_check_range+0x100/0x1a8
[   33.975425]  __kasan_check_write+0x20/0x30
[   33.975473]  kasan_atomics_helper+0xf88/0x4858
[   33.975564]  kasan_atomics+0x198/0x2e0
[   33.975613]  kunit_try_run_case+0x170/0x3f0
[   33.975735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.975938]  kthread+0x328/0x630
[   33.976007]  ret_from_fork+0x10/0x20
[   33.976055] 
[   33.976077] Allocated by task 296:
[   33.976107]  kasan_save_stack+0x3c/0x68
[   33.976150]  kasan_save_track+0x20/0x40
[   33.976191]  kasan_save_alloc_info+0x40/0x58
[   33.976241]  __kasan_kmalloc+0xd4/0xd8
[   33.976282]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.976325]  kasan_atomics+0xb8/0x2e0
[   33.976364]  kunit_try_run_case+0x170/0x3f0
[   33.976406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.976454]  kthread+0x328/0x630
[   33.976487]  ret_from_fork+0x10/0x20
[   33.976526] 
[   33.976843] The buggy address belongs to the object at fff00000c9a67800
[   33.976843]  which belongs to the cache kmalloc-64 of size 64
[   33.976929] The buggy address is located 0 bytes to the right of
[   33.976929]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.977041] 
[   33.977062] The buggy address belongs to the physical page:
[   33.977095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.977146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.977195] page_type: f5(slab)
[   33.977244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.977295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.977368] page dumped because: kasan: bad access detected
[   33.977405] 
[   33.977425] Memory state around the buggy address:
[   33.977458]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.977657]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.977702] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.977742]                                      ^
[   33.977777]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.977898]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.977973] ==================================================================
[   33.944415] ==================================================================
[   33.944741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.944795] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.944847] 
[   33.944879] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.944966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.944996] Hardware name: linux,dummy-virt (DT)
[   33.945030] Call trace:
[   33.945056]  show_stack+0x20/0x38 (C)
[   33.945463]  dump_stack_lvl+0x8c/0xd0
[   33.945554]  print_report+0x118/0x5d0
[   33.945605]  kasan_report+0xdc/0x128
[   33.945897]  kasan_check_range+0x100/0x1a8
[   33.946002]  __kasan_check_write+0x20/0x30
[   33.946051]  kasan_atomics_helper+0xe44/0x4858
[   33.946320]  kasan_atomics+0x198/0x2e0
[   33.946378]  kunit_try_run_case+0x170/0x3f0
[   33.946429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.946485]  kthread+0x328/0x630
[   33.946532]  ret_from_fork+0x10/0x20
[   33.946581] 
[   33.946623] Allocated by task 296:
[   33.946761]  kasan_save_stack+0x3c/0x68
[   33.946807]  kasan_save_track+0x20/0x40
[   33.946855]  kasan_save_alloc_info+0x40/0x58
[   33.946895]  __kasan_kmalloc+0xd4/0xd8
[   33.946970]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.947130]  kasan_atomics+0xb8/0x2e0
[   33.947171]  kunit_try_run_case+0x170/0x3f0
[   33.947545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.947612]  kthread+0x328/0x630
[   33.947819]  ret_from_fork+0x10/0x20
[   33.947863] 
[   33.948183] The buggy address belongs to the object at fff00000c9a67800
[   33.948183]  which belongs to the cache kmalloc-64 of size 64
[   33.948424] The buggy address is located 0 bytes to the right of
[   33.948424]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.948972] 
[   33.949140] The buggy address belongs to the physical page:
[   33.949223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.949373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.949423] page_type: f5(slab)
[   33.949462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.949521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.949669] page dumped because: kasan: bad access detected
[   33.949706] 
[   33.949729] Memory state around the buggy address:
[   33.949767]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.949823]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.949868] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.949908]                                      ^
[   33.949974]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.950017]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.950057] ==================================================================
[   33.893760] ==================================================================
[   33.893815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.893937] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.893998] 
[   33.894230] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.894533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.894700] Hardware name: linux,dummy-virt (DT)
[   33.894848] Call trace:
[   33.895048]  show_stack+0x20/0x38 (C)
[   33.895127]  dump_stack_lvl+0x8c/0xd0
[   33.895603]  print_report+0x118/0x5d0
[   33.895800]  kasan_report+0xdc/0x128
[   33.896108]  __asan_report_load4_noabort+0x20/0x30
[   33.896237]  kasan_atomics_helper+0x3dd8/0x4858
[   33.896404]  kasan_atomics+0x198/0x2e0
[   33.896461]  kunit_try_run_case+0x170/0x3f0
[   33.896657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.897014]  kthread+0x328/0x630
[   33.897100]  ret_from_fork+0x10/0x20
[   33.897386] 
[   33.897409] Allocated by task 296:
[   33.897489]  kasan_save_stack+0x3c/0x68
[   33.897536]  kasan_save_track+0x20/0x40
[   33.897760]  kasan_save_alloc_info+0x40/0x58
[   33.897817]  __kasan_kmalloc+0xd4/0xd8
[   33.898097]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.898275]  kasan_atomics+0xb8/0x2e0
[   33.898339]  kunit_try_run_case+0x170/0x3f0
[   33.898478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.898528]  kthread+0x328/0x630
[   33.898565]  ret_from_fork+0x10/0x20
[   33.898604] 
[   33.898628] The buggy address belongs to the object at fff00000c9a67800
[   33.898628]  which belongs to the cache kmalloc-64 of size 64
[   33.899284] The buggy address is located 0 bytes to the right of
[   33.899284]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.899602] 
[   33.899626] The buggy address belongs to the physical page:
[   33.899660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.900268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.900476] page_type: f5(slab)
[   33.900631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.900930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.900977] page dumped because: kasan: bad access detected
[   33.901011] 
[   33.901031] Memory state around the buggy address:
[   33.901065]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.901109]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.901155] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.901195]                                      ^
[   33.901656]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.901723]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.901778] ==================================================================
[   34.151067] ==================================================================
[   34.151119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   34.151171] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.151239] 
[   34.151271] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.151358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.151386] Hardware name: linux,dummy-virt (DT)
[   34.151419] Call trace:
[   34.151444]  show_stack+0x20/0x38 (C)
[   34.151493]  dump_stack_lvl+0x8c/0xd0
[   34.151540]  print_report+0x118/0x5d0
[   34.151588]  kasan_report+0xdc/0x128
[   34.151720]  kasan_check_range+0x100/0x1a8
[   34.151793]  __kasan_check_write+0x20/0x30
[   34.151839]  kasan_atomics_helper+0x16d0/0x4858
[   34.151889]  kasan_atomics+0x198/0x2e0
[   34.151937]  kunit_try_run_case+0x170/0x3f0
[   34.152031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.152195]  kthread+0x328/0x630
[   34.152264]  ret_from_fork+0x10/0x20
[   34.152352] 
[   34.152372] Allocated by task 296:
[   34.152402]  kasan_save_stack+0x3c/0x68
[   34.152524]  kasan_save_track+0x20/0x40
[   34.152758]  kasan_save_alloc_info+0x40/0x58
[   34.152811]  __kasan_kmalloc+0xd4/0xd8
[   34.152954]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.153010]  kasan_atomics+0xb8/0x2e0
[   34.153117]  kunit_try_run_case+0x170/0x3f0
[   34.153189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.153315]  kthread+0x328/0x630
[   34.153351]  ret_from_fork+0x10/0x20
[   34.153390] 
[   34.153413] The buggy address belongs to the object at fff00000c9a67800
[   34.153413]  which belongs to the cache kmalloc-64 of size 64
[   34.153520] The buggy address is located 0 bytes to the right of
[   34.153520]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.153657] 
[   34.153681] The buggy address belongs to the physical page:
[   34.153713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.153768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.153817] page_type: f5(slab)
[   34.153855] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.153935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.153977] page dumped because: kasan: bad access detected
[   34.154031] 
[   34.154127] Memory state around the buggy address:
[   34.154300]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.154473]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.154524] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.154670]                                      ^
[   34.154760]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.154850]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.154892] ==================================================================
[   33.842478] ==================================================================
[   33.842549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.842604] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.842655] 
[   33.842688] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.843075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.843111] Hardware name: linux,dummy-virt (DT)
[   33.843163] Call trace:
[   33.843189]  show_stack+0x20/0x38 (C)
[   33.843257]  dump_stack_lvl+0x8c/0xd0
[   33.843448]  print_report+0x118/0x5d0
[   33.843526]  kasan_report+0xdc/0x128
[   33.843674]  __asan_report_load4_noabort+0x20/0x30
[   33.843733]  kasan_atomics_helper+0x3dcc/0x4858
[   33.843785]  kasan_atomics+0x198/0x2e0
[   33.844025]  kunit_try_run_case+0x170/0x3f0
[   33.844164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.844235]  kthread+0x328/0x630
[   33.844279]  ret_from_fork+0x10/0x20
[   33.844337] 
[   33.844359] Allocated by task 296:
[   33.844388]  kasan_save_stack+0x3c/0x68
[   33.844431]  kasan_save_track+0x20/0x40
[   33.844472]  kasan_save_alloc_info+0x40/0x58
[   33.844512]  __kasan_kmalloc+0xd4/0xd8
[   33.844561]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.844608]  kasan_atomics+0xb8/0x2e0
[   33.844656]  kunit_try_run_case+0x170/0x3f0
[   33.845063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.845190]  kthread+0x328/0x630
[   33.845280]  ret_from_fork+0x10/0x20
[   33.845348] 
[   33.845410] The buggy address belongs to the object at fff00000c9a67800
[   33.845410]  which belongs to the cache kmalloc-64 of size 64
[   33.845607] The buggy address is located 0 bytes to the right of
[   33.845607]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.845696] 
[   33.845993] The buggy address belongs to the physical page:
[   33.846052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.846127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.846276] page_type: f5(slab)
[   33.846344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.846440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.846743] page dumped because: kasan: bad access detected
[   33.846878] 
[   33.846922] Memory state around the buggy address:
[   33.846971]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.847043]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.847174] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.847257]                                      ^
[   33.847293]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.847338]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.847639] ==================================================================
[   34.155067] ==================================================================
[   34.155263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   34.155329] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.155381] 
[   34.155419] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.155629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.155707] Hardware name: linux,dummy-virt (DT)
[   34.155740] Call trace:
[   34.155763]  show_stack+0x20/0x38 (C)
[   34.155813]  dump_stack_lvl+0x8c/0xd0
[   34.155861]  print_report+0x118/0x5d0
[   34.155959]  kasan_report+0xdc/0x128
[   34.156071]  __asan_report_load8_noabort+0x20/0x30
[   34.156124]  kasan_atomics_helper+0x3e10/0x4858
[   34.156174]  kasan_atomics+0x198/0x2e0
[   34.156231]  kunit_try_run_case+0x170/0x3f0
[   34.156282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.156339]  kthread+0x328/0x630
[   34.156392]  ret_from_fork+0x10/0x20
[   34.156442] 
[   34.156462] Allocated by task 296:
[   34.156627]  kasan_save_stack+0x3c/0x68
[   34.156726]  kasan_save_track+0x20/0x40
[   34.156770]  kasan_save_alloc_info+0x40/0x58
[   34.156845]  __kasan_kmalloc+0xd4/0xd8
[   34.156969]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.157078]  kasan_atomics+0xb8/0x2e0
[   34.157189]  kunit_try_run_case+0x170/0x3f0
[   34.157260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.157307]  kthread+0x328/0x630
[   34.157365]  ret_from_fork+0x10/0x20
[   34.157404] 
[   34.157427] The buggy address belongs to the object at fff00000c9a67800
[   34.157427]  which belongs to the cache kmalloc-64 of size 64
[   34.157519] The buggy address is located 0 bytes to the right of
[   34.157519]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.157587] 
[   34.157672] The buggy address belongs to the physical page:
[   34.157750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.157806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.157858] page_type: f5(slab)
[   34.157903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.158055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.158121] page dumped because: kasan: bad access detected
[   34.158155] 
[   34.158174] Memory state around the buggy address:
[   34.158216]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.158267]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.158416] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.158458]                                      ^
[   34.158545]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.158717]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.158843] ==================================================================
[   33.824350] ==================================================================
[   33.824413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   33.824526] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.824715] 
[   33.824875] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.824997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.825108] Hardware name: linux,dummy-virt (DT)
[   33.825169] Call trace:
[   33.825449]  show_stack+0x20/0x38 (C)
[   33.825525]  dump_stack_lvl+0x8c/0xd0
[   33.825605]  print_report+0x118/0x5d0
[   33.825894]  kasan_report+0xdc/0x128
[   33.825989]  kasan_check_range+0x100/0x1a8
[   33.826165]  __kasan_check_write+0x20/0x30
[   33.826257]  kasan_atomics_helper+0xa04/0x4858
[   33.826354]  kasan_atomics+0x198/0x2e0
[   33.826477]  kunit_try_run_case+0x170/0x3f0
[   33.826567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.826661]  kthread+0x328/0x630
[   33.826790]  ret_from_fork+0x10/0x20
[   33.826879] 
[   33.826983] Allocated by task 296:
[   33.827035]  kasan_save_stack+0x3c/0x68
[   33.827081]  kasan_save_track+0x20/0x40
[   33.827121]  kasan_save_alloc_info+0x40/0x58
[   33.827186]  __kasan_kmalloc+0xd4/0xd8
[   33.827480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.827557]  kasan_atomics+0xb8/0x2e0
[   33.827856]  kunit_try_run_case+0x170/0x3f0
[   33.827931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.828064]  kthread+0x328/0x630
[   33.828148]  ret_from_fork+0x10/0x20
[   33.828283] 
[   33.828333] The buggy address belongs to the object at fff00000c9a67800
[   33.828333]  which belongs to the cache kmalloc-64 of size 64
[   33.828447] The buggy address is located 0 bytes to the right of
[   33.828447]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.828669] 
[   33.828697] The buggy address belongs to the physical page:
[   33.828731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.828925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.829005] page_type: f5(slab)
[   33.829128] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.829257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.829338] page dumped because: kasan: bad access detected
[   33.829527] 
[   33.829548] Memory state around the buggy address:
[   33.829631]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.829695]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.829817] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.829901]                                      ^
[   33.829939]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.829984]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.830262] ==================================================================
[   34.139108] ==================================================================
[   34.139157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   34.139223] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.140420] 
[   34.140534] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.140657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.140751] Hardware name: linux,dummy-virt (DT)
[   34.140785] Call trace:
[   34.140809]  show_stack+0x20/0x38 (C)
[   34.140861]  dump_stack_lvl+0x8c/0xd0
[   34.140910]  print_report+0x118/0x5d0
[   34.140958]  kasan_report+0xdc/0x128
[   34.141010]  kasan_check_range+0x100/0x1a8
[   34.141057]  __kasan_check_write+0x20/0x30
[   34.141104]  kasan_atomics_helper+0x1644/0x4858
[   34.141155]  kasan_atomics+0x198/0x2e0
[   34.141204]  kunit_try_run_case+0x170/0x3f0
[   34.141274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.141330]  kthread+0x328/0x630
[   34.141374]  ret_from_fork+0x10/0x20
[   34.141423] 
[   34.141444] Allocated by task 296:
[   34.141474]  kasan_save_stack+0x3c/0x68
[   34.141518]  kasan_save_track+0x20/0x40
[   34.141559]  kasan_save_alloc_info+0x40/0x58
[   34.141599]  __kasan_kmalloc+0xd4/0xd8
[   34.141639]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.141682]  kasan_atomics+0xb8/0x2e0
[   34.141720]  kunit_try_run_case+0x170/0x3f0
[   34.141763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.141811]  kthread+0x328/0x630
[   34.141845]  ret_from_fork+0x10/0x20
[   34.141883] 
[   34.141905] The buggy address belongs to the object at fff00000c9a67800
[   34.141905]  which belongs to the cache kmalloc-64 of size 64
[   34.141964] The buggy address is located 0 bytes to the right of
[   34.141964]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.142030] 
[   34.142051] The buggy address belongs to the physical page:
[   34.142084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.142138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.143437] page_type: f5(slab)
[   34.143525] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.143577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.143621] page dumped because: kasan: bad access detected
[   34.143874] 
[   34.143901] Memory state around the buggy address:
[   34.144060]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.145534]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.145594] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.145635]                                      ^
[   34.145672]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.145717]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.145757] ==================================================================
[   34.163011] ==================================================================
[   34.163109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   34.163171] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.163232] 
[   34.163262] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.163484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.163515] Hardware name: linux,dummy-virt (DT)
[   34.163548] Call trace:
[   34.163578]  show_stack+0x20/0x38 (C)
[   34.163640]  dump_stack_lvl+0x8c/0xd0
[   34.163689]  print_report+0x118/0x5d0
[   34.163737]  kasan_report+0xdc/0x128
[   34.163787]  __asan_report_load8_noabort+0x20/0x30
[   34.164017]  kasan_atomics_helper+0x3e20/0x4858
[   34.164129]  kasan_atomics+0x198/0x2e0
[   34.164287]  kunit_try_run_case+0x170/0x3f0
[   34.164337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.164504]  kthread+0x328/0x630
[   34.164609]  ret_from_fork+0x10/0x20
[   34.164689] 
[   34.164710] Allocated by task 296:
[   34.164872]  kasan_save_stack+0x3c/0x68
[   34.164919]  kasan_save_track+0x20/0x40
[   34.164999]  kasan_save_alloc_info+0x40/0x58
[   34.165041]  __kasan_kmalloc+0xd4/0xd8
[   34.165082]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.165124]  kasan_atomics+0xb8/0x2e0
[   34.165256]  kunit_try_run_case+0x170/0x3f0
[   34.165298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.165345]  kthread+0x328/0x630
[   34.165381]  ret_from_fork+0x10/0x20
[   34.165459] 
[   34.165551] The buggy address belongs to the object at fff00000c9a67800
[   34.165551]  which belongs to the cache kmalloc-64 of size 64
[   34.165728] The buggy address is located 0 bytes to the right of
[   34.165728]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.165823] 
[   34.165921] The buggy address belongs to the physical page:
[   34.166255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.166402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.166623] page_type: f5(slab)
[   34.166766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.167097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.167144] page dumped because: kasan: bad access detected
[   34.167184] 
[   34.167480] Memory state around the buggy address:
[   34.167693]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.168172]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.168850] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.168901]                                      ^
[   34.168939]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.168982]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.169419] ==================================================================
[   33.805753] ==================================================================
[   33.805894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   33.805952] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.806023] 
[   33.806282] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.806427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.806456] Hardware name: linux,dummy-virt (DT)
[   33.806489] Call trace:
[   33.806530]  show_stack+0x20/0x38 (C)
[   33.806584]  dump_stack_lvl+0x8c/0xd0
[   33.806641]  print_report+0x118/0x5d0
[   33.806925]  kasan_report+0xdc/0x128
[   33.807049]  __asan_report_load4_noabort+0x20/0x30
[   33.807104]  kasan_atomics_helper+0x42d8/0x4858
[   33.807156]  kasan_atomics+0x198/0x2e0
[   33.807425]  kunit_try_run_case+0x170/0x3f0
[   33.807537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.807629]  kthread+0x328/0x630
[   33.807677]  ret_from_fork+0x10/0x20
[   33.807746] 
[   33.807991] Allocated by task 296:
[   33.808052]  kasan_save_stack+0x3c/0x68
[   33.808113]  kasan_save_track+0x20/0x40
[   33.808203]  kasan_save_alloc_info+0x40/0x58
[   33.808275]  __kasan_kmalloc+0xd4/0xd8
[   33.808383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.808441]  kasan_atomics+0xb8/0x2e0
[   33.808490]  kunit_try_run_case+0x170/0x3f0
[   33.808552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.808691]  kthread+0x328/0x630
[   33.808726]  ret_from_fork+0x10/0x20
[   33.809043] 
[   33.809105] The buggy address belongs to the object at fff00000c9a67800
[   33.809105]  which belongs to the cache kmalloc-64 of size 64
[   33.809263] The buggy address is located 0 bytes to the right of
[   33.809263]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.809416] 
[   33.809439] The buggy address belongs to the physical page:
[   33.809578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.809726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.809850] page_type: f5(slab)
[   33.809918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.810045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.810089] page dumped because: kasan: bad access detected
[   33.810330] 
[   33.810424] Memory state around the buggy address:
[   33.810459]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.810717]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.810841] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.810902]                                      ^
[   33.810973]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.811083]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.811143] ==================================================================
[   34.069856] ==================================================================
[   34.069909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   34.069962] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.071565] 
[   34.071692] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.071785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.071813] Hardware name: linux,dummy-virt (DT)
[   34.072956] Call trace:
[   34.073077]  show_stack+0x20/0x38 (C)
[   34.074116]  dump_stack_lvl+0x8c/0xd0
[   34.074339]  print_report+0x118/0x5d0
[   34.074866]  kasan_report+0xdc/0x128
[   34.075013]  kasan_check_range+0x100/0x1a8
[   34.075199]  __kasan_check_write+0x20/0x30
[   34.075519]  kasan_atomics_helper+0x14e4/0x4858
[   34.075577]  kasan_atomics+0x198/0x2e0
[   34.076204]  kunit_try_run_case+0x170/0x3f0
[   34.076276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.076334]  kthread+0x328/0x630
[   34.076379]  ret_from_fork+0x10/0x20
[   34.077246] 
[   34.077875] Allocated by task 296:
[   34.077928]  kasan_save_stack+0x3c/0x68
[   34.078414]  kasan_save_track+0x20/0x40
[   34.079204]  kasan_save_alloc_info+0x40/0x58
[   34.079347]  __kasan_kmalloc+0xd4/0xd8
[   34.079700]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.079805]  kasan_atomics+0xb8/0x2e0
[   34.080034]  kunit_try_run_case+0x170/0x3f0
[   34.080078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.080126]  kthread+0x328/0x630
[   34.080899]  ret_from_fork+0x10/0x20
[   34.081314] 
[   34.081781] The buggy address belongs to the object at fff00000c9a67800
[   34.081781]  which belongs to the cache kmalloc-64 of size 64
[   34.082634] The buggy address is located 0 bytes to the right of
[   34.082634]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.083570] 
[   34.083757] The buggy address belongs to the physical page:
[   34.083848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.084044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.084605] page_type: f5(slab)
[   34.085074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.085404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.085481] page dumped because: kasan: bad access detected
[   34.085515] 
[   34.085938] Memory state around the buggy address:
[   34.086218]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.086888]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.086939] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.086980]                                      ^
[   34.087017]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.087712]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.088251] ==================================================================
[   33.748379] ==================================================================
[   33.748431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   33.748647] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.748851] 
[   33.748907] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.749075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.749134] Hardware name: linux,dummy-virt (DT)
[   33.749190] Call trace:
[   33.749330]  show_stack+0x20/0x38 (C)
[   33.749390]  dump_stack_lvl+0x8c/0xd0
[   33.749524]  print_report+0x118/0x5d0
[   33.749580]  kasan_report+0xdc/0x128
[   33.749687]  kasan_check_range+0x100/0x1a8
[   33.749769]  __kasan_check_write+0x20/0x30
[   33.749970]  kasan_atomics_helper+0x414/0x4858
[   33.750116]  kasan_atomics+0x198/0x2e0
[   33.750186]  kunit_try_run_case+0x170/0x3f0
[   33.750314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.750404]  kthread+0x328/0x630
[   33.750456]  ret_from_fork+0x10/0x20
[   33.750700] 
[   33.750754] Allocated by task 296:
[   33.750785]  kasan_save_stack+0x3c/0x68
[   33.750929]  kasan_save_track+0x20/0x40
[   33.751013]  kasan_save_alloc_info+0x40/0x58
[   33.751063]  __kasan_kmalloc+0xd4/0xd8
[   33.751104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.751194]  kunit_try_run_case+0x170/0x3f0
[   33.751246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.751293]  kthread+0x328/0x630
[   33.751344]  ret_from_fork+0x10/0x20
[   33.751390] 
[   33.751480] The buggy address is located 0 bytes to the right of
[   33.751480]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.751716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.751765] page_type: f5(slab)
[   33.751806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.752087]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.752163] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.752205]                                      ^
[   33.752252]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.752294]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.752724] ==================================================================
[   34.048498] ==================================================================
[   34.048621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   34.048937] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.049524] 
[   34.050160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.050295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.051170] Hardware name: linux,dummy-virt (DT)
[   34.051502] Call trace:
[   34.051696]  show_stack+0x20/0x38 (C)
[   34.051784]  dump_stack_lvl+0x8c/0xd0
[   34.051834]  print_report+0x118/0x5d0
[   34.052725]  kasan_report+0xdc/0x128
[   34.053288]  kasan_check_range+0x100/0x1a8
[   34.053823]  __kasan_check_write+0x20/0x30
[   34.054187]  kasan_atomics_helper+0x147c/0x4858
[   34.054822]  kasan_atomics+0x198/0x2e0
[   34.055335]  kunit_try_run_case+0x170/0x3f0
[   34.055878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.056753]  kthread+0x328/0x630
[   34.056820]  ret_from_fork+0x10/0x20
[   34.057930] 
[   34.058044] Allocated by task 296:
[   34.058123]  kasan_save_stack+0x3c/0x68
[   34.058303]  kasan_save_track+0x20/0x40
[   34.058348]  kasan_save_alloc_info+0x40/0x58
[   34.058695]  __kasan_kmalloc+0xd4/0xd8
[   34.059131]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.059407]  kasan_atomics+0xb8/0x2e0
[   34.059848]  kunit_try_run_case+0x170/0x3f0
[   34.060873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.060975]  kthread+0x328/0x630
[   34.061010]  ret_from_fork+0x10/0x20
[   34.061050] 
[   34.061587] The buggy address belongs to the object at fff00000c9a67800
[   34.061587]  which belongs to the cache kmalloc-64 of size 64
[   34.062106] The buggy address is located 0 bytes to the right of
[   34.062106]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.062181] 
[   34.062877] The buggy address belongs to the physical page:
[   34.063656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.064109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.064361] page_type: f5(slab)
[   34.064884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.065204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.065261] page dumped because: kasan: bad access detected
[   34.065294] 
[   34.066054] Memory state around the buggy address:
[   34.066114]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.066394]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.067022] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.067131]                                      ^
[   34.067170]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.068039]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.068504] ==================================================================
[   33.759253] ==================================================================
[   33.759322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   33.759376] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.759446] 
[   33.759690] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.759796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.759824] Hardware name: linux,dummy-virt (DT)
[   33.759867] Call trace:
[   33.759936]  show_stack+0x20/0x38 (C)
[   33.759992]  dump_stack_lvl+0x8c/0xd0
[   33.760042]  print_report+0x118/0x5d0
[   33.760153]  kasan_report+0xdc/0x128
[   33.760218]  kasan_check_range+0x100/0x1a8
[   33.760277]  __kasan_check_write+0x20/0x30
[   33.760345]  kasan_atomics_helper+0x4e4/0x4858
[   33.760414]  kasan_atomics+0x198/0x2e0
[   33.760619]  kunit_try_run_case+0x170/0x3f0
[   33.760808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.760898]  kthread+0x328/0x630
[   33.761041]  ret_from_fork+0x10/0x20
[   33.761121] 
[   33.761291] Allocated by task 296:
[   33.761558]  kasan_save_track+0x20/0x40
[   33.762041]  kunit_try_run_case+0x170/0x3f0
[   33.762443] 
[   33.762972] The buggy address belongs to the physical page:
[   33.763473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.763701] Memory state around the buggy address:
[   33.764165]                                      ^
[   33.764392]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.765563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   33.765970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.766063]  show_stack+0x20/0x38 (C)
[   33.766222]  print_report+0x118/0x5d0
[   33.766378]  __kasan_check_write+0x20/0x30
[   33.766479]  kasan_atomics+0x198/0x2e0
[   33.766638]  kthread+0x328/0x630
[   33.766793]  kasan_save_stack+0x3c/0x68
[   33.767137]  kthread+0x328/0x630
[   33.767440] The buggy address is located 0 bytes to the right of
[   33.767440]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.769327] ==================================================================
[   34.010112] ==================================================================
[   34.010164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   34.010230] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.010281] 
[   34.010310] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.010396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.010425] Hardware name: linux,dummy-virt (DT)
[   34.010458] Call trace:
[   34.010481]  show_stack+0x20/0x38 (C)
[   34.010528]  dump_stack_lvl+0x8c/0xd0
[   34.010577]  print_report+0x118/0x5d0
[   34.010624]  kasan_report+0xdc/0x128
[   34.010674]  kasan_check_range+0x100/0x1a8
[   34.010721]  __kasan_check_write+0x20/0x30
[   34.010786]  kasan_atomics_helper+0x11f8/0x4858
[   34.010838]  kasan_atomics+0x198/0x2e0
[   34.010892]  kunit_try_run_case+0x170/0x3f0
[   34.011053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.011109]  kthread+0x328/0x630
[   34.011245]  ret_from_fork+0x10/0x20
[   34.011301] 
[   34.011385] Allocated by task 296:
[   34.011488]  kasan_save_stack+0x3c/0x68
[   34.011533]  kasan_save_track+0x20/0x40
[   34.011580]  kasan_save_alloc_info+0x40/0x58
[   34.011665]  __kasan_kmalloc+0xd4/0xd8
[   34.011721]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.011891]  kasan_atomics+0xb8/0x2e0
[   34.011930]  kunit_try_run_case+0x170/0x3f0
[   34.011972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.012020]  kthread+0x328/0x630
[   34.012060]  ret_from_fork+0x10/0x20
[   34.012579] 
[   34.012627] The buggy address belongs to the object at fff00000c9a67800
[   34.012627]  which belongs to the cache kmalloc-64 of size 64
[   34.012692] The buggy address is located 0 bytes to the right of
[   34.012692]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.012758] 
[   34.012780] The buggy address belongs to the physical page:
[   34.012814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.012868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.013828] page_type: f5(slab)
[   34.013947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.013997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.014050] page dumped because: kasan: bad access detected
[   34.014184] 
[   34.014642] Memory state around the buggy address:
[   34.014695]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.014742]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.014787] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.014838]                                      ^
[   34.014976]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.015133]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.015173] ==================================================================
[   33.753536] ==================================================================
[   33.753590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   33.753702] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.753760] 
[   33.753791] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.754055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.754098] Hardware name: linux,dummy-virt (DT)
[   33.754199] Call trace:
[   33.754239]  show_stack+0x20/0x38 (C)
[   33.754311]  dump_stack_lvl+0x8c/0xd0
[   33.754539]  print_report+0x118/0x5d0
[   33.754611]  kasan_report+0xdc/0x128
[   33.754696]  kasan_check_range+0x100/0x1a8
[   33.754755]  __kasan_check_write+0x20/0x30
[   33.754812]  kasan_atomics_helper+0x47c/0x4858
[   33.754916]  kasan_atomics+0x198/0x2e0
[   33.755186]  kunit_try_run_case+0x170/0x3f0
[   33.755302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.755382]  kthread+0x328/0x630
[   33.755428]  ret_from_fork+0x10/0x20
[   33.755483] 
[   33.755543] Allocated by task 296:
[   33.755583]  kasan_save_stack+0x3c/0x68
[   33.755629]  kasan_save_track+0x20/0x40
[   33.755678]  kasan_save_alloc_info+0x40/0x58
[   33.755773]  __kasan_kmalloc+0xd4/0xd8
[   33.755815]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.755857]  kasan_atomics+0xb8/0x2e0
[   33.756109]  kunit_try_run_case+0x170/0x3f0
[   33.756181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.756252]  kthread+0x328/0x630
[   33.756289]  ret_from_fork+0x10/0x20
[   33.756399] 
[   33.756424] The buggy address belongs to the object at fff00000c9a67800
[   33.756424]  which belongs to the cache kmalloc-64 of size 64
[   33.756485] The buggy address is located 0 bytes to the right of
[   33.756485]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.756821] The buggy address belongs to the physical page:
[   33.757081] page_type: f5(slab)
[   33.757121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.757174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.757548] 
[   33.757569] Memory state around the buggy address:
[   33.757969]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.758119]                                      ^
[   33.758263]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.758335]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.758443] ==================================================================
[   34.020815] ==================================================================
[   34.021031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   34.021149] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.021324] 
[   34.021390] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.021477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.021512] Hardware name: linux,dummy-virt (DT)
[   34.021648] Call trace:
[   34.021672]  show_stack+0x20/0x38 (C)
[   34.021740]  dump_stack_lvl+0x8c/0xd0
[   34.021790]  print_report+0x118/0x5d0
[   34.021843]  kasan_report+0xdc/0x128
[   34.022053]  kasan_check_range+0x100/0x1a8
[   34.022152]  __kasan_check_write+0x20/0x30
[   34.022197]  kasan_atomics_helper+0x12d8/0x4858
[   34.022261]  kasan_atomics+0x198/0x2e0
[   34.022310]  kunit_try_run_case+0x170/0x3f0
[   34.022361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.022423]  kthread+0x328/0x630
[   34.022496]  ret_from_fork+0x10/0x20
[   34.022586] 
[   34.022607] Allocated by task 296:
[   34.022639]  kasan_save_stack+0x3c/0x68
[   34.022684]  kasan_save_track+0x20/0x40
[   34.022725]  kasan_save_alloc_info+0x40/0x58
[   34.022765]  __kasan_kmalloc+0xd4/0xd8
[   34.022811]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.022978]  kasan_atomics+0xb8/0x2e0
[   34.023045]  kunit_try_run_case+0x170/0x3f0
[   34.023118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.023804]  kthread+0x328/0x630
[   34.024074]  ret_from_fork+0x10/0x20
[   34.024139] 
[   34.024163] The buggy address belongs to the object at fff00000c9a67800
[   34.024163]  which belongs to the cache kmalloc-64 of size 64
[   34.024234] The buggy address is located 0 bytes to the right of
[   34.024234]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.024300] 
[   34.024322] The buggy address belongs to the physical page:
[   34.024355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.024409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.024805] page_type: f5(slab)
[   34.025176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.025237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.025279] page dumped because: kasan: bad access detected
[   34.025314] 
[   34.025451] Memory state around the buggy address:
[   34.025489]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.025534]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.025748] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.025888]                                      ^
[   34.026325]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.026422]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.026462] ==================================================================
[   33.926375] ==================================================================
[   33.926430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.926983] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.927522] 
[   33.927561] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.927786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.928343] Hardware name: linux,dummy-virt (DT)
[   33.928466] Call trace:
[   33.928667]  show_stack+0x20/0x38 (C)
[   33.929001]  dump_stack_lvl+0x8c/0xd0
[   33.929252]  print_report+0x118/0x5d0
[   33.929469]  kasan_report+0xdc/0x128
[   33.929652]  kasan_check_range+0x100/0x1a8
[   33.929754]  __kasan_check_read+0x20/0x30
[   33.930098]  kasan_atomics_helper+0xdd4/0x4858
[   33.930234]  kasan_atomics+0x198/0x2e0
[   33.930559]  kunit_try_run_case+0x170/0x3f0
[   33.930612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.930669]  kthread+0x328/0x630
[   33.931306]  ret_from_fork+0x10/0x20
[   33.931463] 
[   33.931487] Allocated by task 296:
[   33.931519]  kasan_save_stack+0x3c/0x68
[   33.931712]  kasan_save_track+0x20/0x40
[   33.931758]  kasan_save_alloc_info+0x40/0x58
[   33.931805]  __kasan_kmalloc+0xd4/0xd8
[   33.931845]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.932291]  kasan_atomics+0xb8/0x2e0
[   33.932570]  kunit_try_run_case+0x170/0x3f0
[   33.933034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.933255]  kthread+0x328/0x630
[   33.933304]  ret_from_fork+0x10/0x20
[   33.933390] 
[   33.933436] The buggy address belongs to the object at fff00000c9a67800
[   33.933436]  which belongs to the cache kmalloc-64 of size 64
[   33.933763] The buggy address is located 0 bytes to the right of
[   33.933763]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.934236] 
[   33.934265] The buggy address belongs to the physical page:
[   33.934562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.934621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.934985] page_type: f5(slab)
[   33.935363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.935658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.935775] page dumped because: kasan: bad access detected
[   33.935816] 
[   33.936002] Memory state around the buggy address:
[   33.936314]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.936507]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.936629] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.936816]                                      ^
[   33.936955]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.937033]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.937075] ==================================================================
[   34.026886] ==================================================================
[   34.026936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   34.026987] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.027038] 
[   34.027070] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.027155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.027184] Hardware name: linux,dummy-virt (DT)
[   34.027241] Call trace:
[   34.027266]  show_stack+0x20/0x38 (C)
[   34.027315]  dump_stack_lvl+0x8c/0xd0
[   34.027364]  print_report+0x118/0x5d0
[   34.027824]  kasan_report+0xdc/0x128
[   34.027946]  kasan_check_range+0x100/0x1a8
[   34.027992]  __kasan_check_write+0x20/0x30
[   34.028038]  kasan_atomics_helper+0x1384/0x4858
[   34.028089]  kasan_atomics+0x198/0x2e0
[   34.028521]  kunit_try_run_case+0x170/0x3f0
[   34.028702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.028759]  kthread+0x328/0x630
[   34.029159]  ret_from_fork+0x10/0x20
[   34.029247] 
[   34.029268] Allocated by task 296:
[   34.029299]  kasan_save_stack+0x3c/0x68
[   34.029344]  kasan_save_track+0x20/0x40
[   34.029453]  kasan_save_alloc_info+0x40/0x58
[   34.029607]  __kasan_kmalloc+0xd4/0xd8
[   34.029648]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.029690]  kasan_atomics+0xb8/0x2e0
[   34.029731]  kunit_try_run_case+0x170/0x3f0
[   34.029777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.029827]  kthread+0x328/0x630
[   34.029861]  ret_from_fork+0x10/0x20
[   34.029901] 
[   34.029925] The buggy address belongs to the object at fff00000c9a67800
[   34.029925]  which belongs to the cache kmalloc-64 of size 64
[   34.029984] The buggy address is located 0 bytes to the right of
[   34.029984]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.030090] 
[   34.030159] The buggy address belongs to the physical page:
[   34.030191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.030254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.030303] page_type: f5(slab)
[   34.030341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.030678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.030972] page dumped because: kasan: bad access detected
[   34.031011] 
[   34.031034] Memory state around the buggy address:
[   34.031066]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.031169]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.031463] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.031566]                                      ^
[   34.031882]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.031937]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.032099] ==================================================================
[   33.818849] ==================================================================
[   33.819200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.819339] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.819402] 
[   33.819484] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.819573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.819610] Hardware name: linux,dummy-virt (DT)
[   33.819644] Call trace:
[   33.819669]  show_stack+0x20/0x38 (C)
[   33.819719]  dump_stack_lvl+0x8c/0xd0
[   33.819768]  print_report+0x118/0x5d0
[   33.819816]  kasan_report+0xdc/0x128
[   33.819864]  kasan_check_range+0x100/0x1a8
[   33.819910]  __kasan_check_write+0x20/0x30
[   33.819957]  kasan_atomics_helper+0x99c/0x4858
[   33.820008]  kasan_atomics+0x198/0x2e0
[   33.820054]  kunit_try_run_case+0x170/0x3f0
[   33.820104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.820158]  kthread+0x328/0x630
[   33.820201]  ret_from_fork+0x10/0x20
[   33.820260] 
[   33.820283] Allocated by task 296:
[   33.820311]  kasan_save_stack+0x3c/0x68
[   33.820355]  kasan_save_track+0x20/0x40
[   33.820405]  kasan_save_alloc_info+0x40/0x58
[   33.820445]  __kasan_kmalloc+0xd4/0xd8
[   33.820490]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.820533]  kasan_atomics+0xb8/0x2e0
[   33.820973]  kunit_try_run_case+0x170/0x3f0
[   33.821019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.821096]  kthread+0x328/0x630
[   33.821133]  ret_from_fork+0x10/0x20
[   33.821429] 
[   33.821485] The buggy address belongs to the object at fff00000c9a67800
[   33.821485]  which belongs to the cache kmalloc-64 of size 64
[   33.821627] The buggy address is located 0 bytes to the right of
[   33.821627]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.821725] 
[   33.821969] The buggy address belongs to the physical page:
[   33.822031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.822107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.822262] page_type: f5(slab)
[   33.822317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.822370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.822657] page dumped because: kasan: bad access detected
[   33.822734] 
[   33.822782] Memory state around the buggy address:
[   33.822891]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.823129]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.823217] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.823330]                                      ^
[   33.823386]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.823441]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.823703] ==================================================================
[   33.985065] ==================================================================
[   33.985134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.985191] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.985406] 
[   33.985445] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.985604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.985713] Hardware name: linux,dummy-virt (DT)
[   33.985753] Call trace:
[   33.985806]  show_stack+0x20/0x38 (C)
[   33.985856]  dump_stack_lvl+0x8c/0xd0
[   33.985949]  print_report+0x118/0x5d0
[   33.986057]  kasan_report+0xdc/0x128
[   33.986165]  kasan_check_range+0x100/0x1a8
[   33.986228]  __kasan_check_write+0x20/0x30
[   33.986417]  kasan_atomics_helper+0x1058/0x4858
[   33.986522]  kasan_atomics+0x198/0x2e0
[   33.986647]  kunit_try_run_case+0x170/0x3f0
[   33.986703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.986906]  kthread+0x328/0x630
[   33.986957]  ret_from_fork+0x10/0x20
[   33.987005] 
[   33.987025] Allocated by task 296:
[   33.987054]  kasan_save_stack+0x3c/0x68
[   33.987103]  kasan_save_track+0x20/0x40
[   33.987229]  kasan_save_alloc_info+0x40/0x58
[   33.987269]  __kasan_kmalloc+0xd4/0xd8
[   33.987310]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.987376]  kasan_atomics+0xb8/0x2e0
[   33.987417]  kunit_try_run_case+0x170/0x3f0
[   33.987834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.988095]  kthread+0x328/0x630
[   33.988139]  ret_from_fork+0x10/0x20
[   33.988178] 
[   33.988200] The buggy address belongs to the object at fff00000c9a67800
[   33.988200]  which belongs to the cache kmalloc-64 of size 64
[   33.988712] The buggy address is located 0 bytes to the right of
[   33.988712]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.989217] 
[   33.989246] The buggy address belongs to the physical page:
[   33.989280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.989334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.989384] page_type: f5(slab)
[   33.989424] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.989477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.989675] page dumped because: kasan: bad access detected
[   33.989835] 
[   33.989880] Memory state around the buggy address:
[   33.989916]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.989962]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.990160] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.990291]                                      ^
[   33.990501]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.990557]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.990631] ==================================================================
[   33.937967] ==================================================================
[   33.938019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.938082] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.938337] 
[   33.938372] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.938462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.938492] Hardware name: linux,dummy-virt (DT)
[   33.938533] Call trace:
[   33.938632]  show_stack+0x20/0x38 (C)
[   33.938790]  dump_stack_lvl+0x8c/0xd0
[   33.938840]  print_report+0x118/0x5d0
[   33.939007]  kasan_report+0xdc/0x128
[   33.939056]  __asan_report_load8_noabort+0x20/0x30
[   33.939110]  kasan_atomics_helper+0x3f58/0x4858
[   33.939162]  kasan_atomics+0x198/0x2e0
[   33.939704]  kunit_try_run_case+0x170/0x3f0
[   33.939901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.939992]  kthread+0x328/0x630
[   33.940156]  ret_from_fork+0x10/0x20
[   33.940511] 
[   33.940537] Allocated by task 296:
[   33.940569]  kasan_save_stack+0x3c/0x68
[   33.940624]  kasan_save_track+0x20/0x40
[   33.941027]  kasan_save_alloc_info+0x40/0x58
[   33.941074]  __kasan_kmalloc+0xd4/0xd8
[   33.941113]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.941155]  kasan_atomics+0xb8/0x2e0
[   33.941493]  kunit_try_run_case+0x170/0x3f0
[   33.941811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.941891]  kthread+0x328/0x630
[   33.941928]  ret_from_fork+0x10/0x20
[   33.941966] 
[   33.941988] The buggy address belongs to the object at fff00000c9a67800
[   33.941988]  which belongs to the cache kmalloc-64 of size 64
[   33.942218] The buggy address is located 0 bytes to the right of
[   33.942218]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.942748] 
[   33.942776] The buggy address belongs to the physical page:
[   33.942843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.942927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.942978] page_type: f5(slab)
[   33.943174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.943509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.943558] page dumped because: kasan: bad access detected
[   33.943605] 
[   33.943625] Memory state around the buggy address:
[   33.943688]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.943738]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.943783] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.943825]                                      ^
[   33.943860]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.943937]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.943995] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   33.495346] ==================================================================
[   33.495408] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   33.495464] Read of size 1 at addr fff00000c9a66118 by task kunit_try_catch/288
[   33.495590] 
[   33.495629] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.495725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.495756] Hardware name: linux,dummy-virt (DT)
[   33.495790] Call trace:
[   33.495827]  show_stack+0x20/0x38 (C)
[   33.495882]  dump_stack_lvl+0x8c/0xd0
[   33.495931]  print_report+0x118/0x5d0
[   33.495982]  kasan_report+0xdc/0x128
[   33.496031]  __asan_report_load1_noabort+0x20/0x30
[   33.496082]  memcmp+0x198/0x1d8
[   33.496127]  kasan_memcmp+0x16c/0x300
[   33.496174]  kunit_try_run_case+0x170/0x3f0
[   33.496239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.496306]  kthread+0x328/0x630
[   33.496352]  ret_from_fork+0x10/0x20
[   33.496402] 
[   33.496425] Allocated by task 288:
[   33.496456]  kasan_save_stack+0x3c/0x68
[   33.496499]  kasan_save_track+0x20/0x40
[   33.497150]  kasan_save_alloc_info+0x40/0x58
[   33.497262]  __kasan_kmalloc+0xd4/0xd8
[   33.497368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.497446]  kasan_memcmp+0xbc/0x300
[   33.497661]  kunit_try_run_case+0x170/0x3f0
[   33.497704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.497888]  kthread+0x328/0x630
[   33.498002]  ret_from_fork+0x10/0x20
[   33.498066] 
[   33.498163] The buggy address belongs to the object at fff00000c9a66100
[   33.498163]  which belongs to the cache kmalloc-32 of size 32
[   33.498285] The buggy address is located 0 bytes to the right of
[   33.498285]  allocated 24-byte region [fff00000c9a66100, fff00000c9a66118)
[   33.498425] 
[   33.498474] The buggy address belongs to the physical page:
[   33.498525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a66
[   33.498640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.498719] page_type: f5(slab)
[   33.498761] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.499064] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.499134] page dumped because: kasan: bad access detected
[   33.499190] 
[   33.499302] Memory state around the buggy address:
[   33.499352]  fff00000c9a66000: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   33.499446]  fff00000c9a66080: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.499575] >fff00000c9a66100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.499635]                             ^
[   33.499705]  fff00000c9a66180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.500004]  fff00000c9a66200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.500084] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   33.471187] ==================================================================
[   33.471399] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   33.471466] Read of size 1 at addr ffff800080b47b4a by task kunit_try_catch/284
[   33.471615] 
[   33.471651] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.471756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.472046] Hardware name: linux,dummy-virt (DT)
[   33.472108] Call trace:
[   33.472135]  show_stack+0x20/0x38 (C)
[   33.472190]  dump_stack_lvl+0x8c/0xd0
[   33.472325]  print_report+0x310/0x5d0
[   33.472380]  kasan_report+0xdc/0x128
[   33.472427]  __asan_report_load1_noabort+0x20/0x30
[   33.472498]  kasan_alloca_oob_right+0x2dc/0x340
[   33.472675]  kunit_try_run_case+0x170/0x3f0
[   33.472743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.472823]  kthread+0x328/0x630
[   33.472868]  ret_from_fork+0x10/0x20
[   33.473255] 
[   33.473294] The buggy address belongs to stack of task kunit_try_catch/284
[   33.473750] 
[   33.473790] The buggy address ffff800080b47b4a belongs to a vmalloc virtual mapping
[   33.473872] The buggy address belongs to the physical page:
[   33.473923] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd7
[   33.474087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.474189] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.474290] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.474622] page dumped because: kasan: bad access detected
[   33.474679] 
[   33.474740] Memory state around the buggy address:
[   33.474881]  ffff800080b47a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.474959]  ffff800080b47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.475027] >ffff800080b47b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   33.475161]                                               ^
[   33.475236]  ffff800080b47b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   33.475305]  ffff800080b47c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   33.475637] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   33.458026] ==================================================================
[   33.458106] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   33.458163] Read of size 1 at addr ffff800080b37b5f by task kunit_try_catch/282
[   33.458230] 
[   33.458881] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.458988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.459175] Hardware name: linux,dummy-virt (DT)
[   33.459238] Call trace:
[   33.459293]  show_stack+0x20/0x38 (C)
[   33.459356]  dump_stack_lvl+0x8c/0xd0
[   33.459430]  print_report+0x310/0x5d0
[   33.459480]  kasan_report+0xdc/0x128
[   33.459540]  __asan_report_load1_noabort+0x20/0x30
[   33.459912]  kasan_alloca_oob_left+0x2b8/0x310
[   33.460103]  kunit_try_run_case+0x170/0x3f0
[   33.460169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.460413]  kthread+0x328/0x630
[   33.460478]  ret_from_fork+0x10/0x20
[   33.460537] 
[   33.460710] The buggy address belongs to stack of task kunit_try_catch/282
[   33.461117] 
[   33.461167] The buggy address ffff800080b37b5f belongs to a vmalloc virtual mapping
[   33.461289] The buggy address belongs to the physical page:
[   33.461376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc9
[   33.461453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.461882] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.462087] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.462155] page dumped because: kasan: bad access detected
[   33.462296] 
[   33.462355] Memory state around the buggy address:
[   33.462416]  ffff800080b37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.462474]  ffff800080b37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.462725] >ffff800080b37b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   33.462930]                                                     ^
[   33.463044]  ffff800080b37b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   33.463149]  ffff800080b37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   33.463192] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   33.440315] ==================================================================
[   33.440411] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   33.440476] Read of size 1 at addr ffff800080b27c2a by task kunit_try_catch/280
[   33.440885] 
[   33.440977] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.441192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.441243] Hardware name: linux,dummy-virt (DT)
[   33.441280] Call trace:
[   33.441309]  show_stack+0x20/0x38 (C)
[   33.441527]  dump_stack_lvl+0x8c/0xd0
[   33.441648]  print_report+0x310/0x5d0
[   33.441794]  kasan_report+0xdc/0x128
[   33.441871]  __asan_report_load1_noabort+0x20/0x30
[   33.441930]  kasan_stack_oob+0x238/0x270
[   33.442095]  kunit_try_run_case+0x170/0x3f0
[   33.442276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.442429]  kthread+0x328/0x630
[   33.442507]  ret_from_fork+0x10/0x20
[   33.442583] 
[   33.442859] The buggy address belongs to stack of task kunit_try_catch/280
[   33.443134]  and is located at offset 138 in frame:
[   33.443250]  kasan_stack_oob+0x0/0x270
[   33.443755] 
[   33.443812] This frame has 4 objects:
[   33.443985]  [48, 49) '__assertion'
[   33.444040]  [64, 72) 'array'
[   33.444087]  [96, 112) '__assertion'
[   33.444132]  [128, 138) 'stack_array'
[   33.444190] 
[   33.444231] The buggy address ffff800080b27c2a belongs to a vmalloc virtual mapping
[   33.444275] The buggy address belongs to the physical page:
[   33.444309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad2
[   33.444401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.444469] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.444520] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.444912] page dumped because: kasan: bad access detected
[   33.445162] 
[   33.445229] Memory state around the buggy address:
[   33.445266]  ffff800080b27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.445599]  ffff800080b27b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   33.445664] >ffff800080b27c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   33.445795]                                   ^
[   33.445859]  ffff800080b27c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   33.446076]  ffff800080b27d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   33.446163] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   33.418431] ==================================================================
[   33.418509] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   33.418575] Read of size 1 at addr ffff92c7bb9126cd by task kunit_try_catch/276
[   33.418771] 
[   33.418970] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.419088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.419139] Hardware name: linux,dummy-virt (DT)
[   33.419175] Call trace:
[   33.419258]  show_stack+0x20/0x38 (C)
[   33.419336]  dump_stack_lvl+0x8c/0xd0
[   33.419551]  print_report+0x310/0x5d0
[   33.419718]  kasan_report+0xdc/0x128
[   33.419801]  __asan_report_load1_noabort+0x20/0x30
[   33.419856]  kasan_global_oob_right+0x230/0x270
[   33.419966]  kunit_try_run_case+0x170/0x3f0
[   33.420044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.420111]  kthread+0x328/0x630
[   33.420237]  ret_from_fork+0x10/0x20
[   33.420304] 
[   33.420362] The buggy address belongs to the variable:
[   33.420434]  global_array+0xd/0x40
[   33.420492] 
[   33.420920] The buggy address ffff92c7bb9126cd belongs to a vmalloc virtual mapping
[   33.421365] The buggy address belongs to the physical page:
[   33.421449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d12
[   33.421633] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   33.421865] raw: 03fffe0000002000 ffffc1ffc01f4488 ffffc1ffc01f4488 0000000000000000
[   33.421990] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.422061] page dumped because: kasan: bad access detected
[   33.422164] 
[   33.422236] Memory state around the buggy address:
[   33.422286]  ffff92c7bb912580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.422391]  ffff92c7bb912600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.422437] >ffff92c7bb912680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   33.422485]                                               ^
[   33.422549]  ffff92c7bb912700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   33.422594]  ffff92c7bb912780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   33.422635] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   33.389961] ==================================================================
[   33.390025] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.390279] Free of addr fff00000c9adf701 by task kunit_try_catch/272
[   33.390356] 
[   33.390478] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.390573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.390601] Hardware name: linux,dummy-virt (DT)
[   33.390700] Call trace:
[   33.390727]  show_stack+0x20/0x38 (C)
[   33.390809]  dump_stack_lvl+0x8c/0xd0
[   33.390975]  print_report+0x118/0x5d0
[   33.391031]  kasan_report_invalid_free+0xc0/0xe8
[   33.391134]  check_slab_allocation+0xfc/0x108
[   33.391185]  __kasan_mempool_poison_object+0x78/0x150
[   33.391256]  mempool_free+0x28c/0x328
[   33.391500]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.391717]  mempool_kmalloc_invalid_free+0xc0/0x118
[   33.391781]  kunit_try_run_case+0x170/0x3f0
[   33.391906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.391997]  kthread+0x328/0x630
[   33.392041]  ret_from_fork+0x10/0x20
[   33.392255] 
[   33.392273] Allocated by task 272:
[   33.392413]  kasan_save_stack+0x3c/0x68
[   33.392467]  kasan_save_track+0x20/0x40
[   33.392507]  kasan_save_alloc_info+0x40/0x58
[   33.392697]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.392799]  remove_element+0x130/0x1f8
[   33.393017]  mempool_alloc_preallocated+0x58/0xc0
[   33.393122]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   33.393195]  mempool_kmalloc_invalid_free+0xc0/0x118
[   33.393335]  kunit_try_run_case+0x170/0x3f0
[   33.393394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.393463]  kthread+0x328/0x630
[   33.393592]  ret_from_fork+0x10/0x20
[   33.393656] 
[   33.393805] The buggy address belongs to the object at fff00000c9adf700
[   33.393805]  which belongs to the cache kmalloc-128 of size 128
[   33.393966] The buggy address is located 1 bytes inside of
[   33.393966]  128-byte region [fff00000c9adf700, fff00000c9adf780)
[   33.394061] 
[   33.394082] The buggy address belongs to the physical page:
[   33.394227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   33.394291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.394343] page_type: f5(slab)
[   33.394450] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.394520] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.394561] page dumped because: kasan: bad access detected
[   33.394590] 
[   33.394618] Memory state around the buggy address:
[   33.394651]  fff00000c9adf600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.394695]  fff00000c9adf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.394753] >fff00000c9adf700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.394809]                    ^
[   33.394845]  fff00000c9adf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.394888]  fff00000c9adf800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.394936] ==================================================================
[   33.405163] ==================================================================
[   33.405273] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.405349] Free of addr fff00000c9b94001 by task kunit_try_catch/274
[   33.405470] 
[   33.405570] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.405709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.405778] Hardware name: linux,dummy-virt (DT)
[   33.405839] Call trace:
[   33.405871]  show_stack+0x20/0x38 (C)
[   33.406052]  dump_stack_lvl+0x8c/0xd0
[   33.406107]  print_report+0x118/0x5d0
[   33.406286]  kasan_report_invalid_free+0xc0/0xe8
[   33.406554]  __kasan_mempool_poison_object+0xfc/0x150
[   33.406660]  mempool_free+0x28c/0x328
[   33.406770]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.406858]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   33.407015]  kunit_try_run_case+0x170/0x3f0
[   33.407097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.407205]  kthread+0x328/0x630
[   33.407287]  ret_from_fork+0x10/0x20
[   33.407394] 
[   33.407444] The buggy address belongs to the physical page:
[   33.407515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b94
[   33.407613] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.407685] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.407821] page_type: f8(unknown)
[   33.407874] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.407950] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.408255] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.408324] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.408425] head: 0bfffe0000000002 ffffc1ffc326e501 00000000ffffffff 00000000ffffffff
[   33.408485] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.408525] page dumped because: kasan: bad access detected
[   33.408852] 
[   33.408899] Memory state around the buggy address:
[   33.409012]  fff00000c9b93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.409091]  fff00000c9b93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.409180] >fff00000c9b94000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.409254]                    ^
[   33.409311]  fff00000c9b94080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.409481]  fff00000c9b94100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.409574] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   33.347580] ==================================================================
[   33.347640] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.347695] Free of addr fff00000c9b90000 by task kunit_try_catch/268
[   33.347737] 
[   33.347770] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.347853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.347881] Hardware name: linux,dummy-virt (DT)
[   33.347915] Call trace:
[   33.347938]  show_stack+0x20/0x38 (C)
[   33.347988]  dump_stack_lvl+0x8c/0xd0
[   33.348033]  print_report+0x118/0x5d0
[   33.348081]  kasan_report_invalid_free+0xc0/0xe8
[   33.348131]  __kasan_mempool_poison_object+0x14c/0x150
[   33.348658]  mempool_free+0x28c/0x328
[   33.348714]  mempool_double_free_helper+0x150/0x2e8
[   33.348799]  mempool_kmalloc_large_double_free+0xc0/0x118
[   33.348855]  kunit_try_run_case+0x170/0x3f0
[   33.348906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.348960]  kthread+0x328/0x630
[   33.349002]  ret_from_fork+0x10/0x20
[   33.349050] 
[   33.349071] The buggy address belongs to the physical page:
[   33.349101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90
[   33.349156] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.349203] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.349267] page_type: f8(unknown)
[   33.349308] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.349439] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.349621] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.349788] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.349906] head: 0bfffe0000000002 ffffc1ffc326e401 00000000ffffffff 00000000ffffffff
[   33.349961] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.350067] page dumped because: kasan: bad access detected
[   33.350098] 
[   33.350160] Memory state around the buggy address:
[   33.350277]  fff00000c9b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.350321]  fff00000c9b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.350363] >fff00000c9b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.350429]                    ^
[   33.350464]  fff00000c9b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.350841]  fff00000c9b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.350889] ==================================================================
[   33.367757] ==================================================================
[   33.367826] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.367883] Free of addr fff00000c9b94000 by task kunit_try_catch/270
[   33.367925] 
[   33.367957] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.368044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.368069] Hardware name: linux,dummy-virt (DT)
[   33.368101] Call trace:
[   33.368124]  show_stack+0x20/0x38 (C)
[   33.368173]  dump_stack_lvl+0x8c/0xd0
[   33.368231]  print_report+0x118/0x5d0
[   33.368280]  kasan_report_invalid_free+0xc0/0xe8
[   33.368712]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.368787]  mempool_free+0x24c/0x328
[   33.368835]  mempool_double_free_helper+0x150/0x2e8
[   33.369335]  mempool_page_alloc_double_free+0xbc/0x118
[   33.369389]  kunit_try_run_case+0x170/0x3f0
[   33.369499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.369559]  kthread+0x328/0x630
[   33.369606]  ret_from_fork+0x10/0x20
[   33.370285] 
[   33.370394] The buggy address belongs to the physical page:
[   33.370428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b94
[   33.370483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.370547] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.370914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.370961] page dumped because: kasan: bad access detected
[   33.370991] 
[   33.371079] Memory state around the buggy address:
[   33.371113]  fff00000c9b93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.371336]  fff00000c9b93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.371384] >fff00000c9b94000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.371421]                    ^
[   33.371686]  fff00000c9b94080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.371829]  fff00000c9b94100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.371873] ==================================================================
[   33.335484] ==================================================================
[   33.335631] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.335790] Free of addr fff00000c9adf300 by task kunit_try_catch/266
[   33.335961] 
[   33.336042] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.336840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.336920] Hardware name: linux,dummy-virt (DT)
[   33.336952] Call trace:
[   33.336976]  show_stack+0x20/0x38 (C)
[   33.337095]  dump_stack_lvl+0x8c/0xd0
[   33.337200]  print_report+0x118/0x5d0
[   33.337497]  kasan_report_invalid_free+0xc0/0xe8
[   33.337566]  check_slab_allocation+0xd4/0x108
[   33.337663]  __kasan_mempool_poison_object+0x78/0x150
[   33.337715]  mempool_free+0x28c/0x328
[   33.337832]  mempool_double_free_helper+0x150/0x2e8
[   33.338035]  mempool_kmalloc_double_free+0xc0/0x118
[   33.338108]  kunit_try_run_case+0x170/0x3f0
[   33.338183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.338246]  kthread+0x328/0x630
[   33.338290]  ret_from_fork+0x10/0x20
[   33.338338] 
[   33.338356] Allocated by task 266:
[   33.338387]  kasan_save_stack+0x3c/0x68
[   33.338446]  kasan_save_track+0x20/0x40
[   33.338557]  kasan_save_alloc_info+0x40/0x58
[   33.338596]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.338668]  remove_element+0x130/0x1f8
[   33.338706]  mempool_alloc_preallocated+0x58/0xc0
[   33.338777]  mempool_double_free_helper+0x94/0x2e8
[   33.338818]  mempool_kmalloc_double_free+0xc0/0x118
[   33.338874]  kunit_try_run_case+0x170/0x3f0
[   33.338912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.338957]  kthread+0x328/0x630
[   33.338988]  ret_from_fork+0x10/0x20
[   33.339024] 
[   33.339041] Freed by task 266:
[   33.339066]  kasan_save_stack+0x3c/0x68
[   33.339105]  kasan_save_track+0x20/0x40
[   33.339143]  kasan_save_free_info+0x4c/0x78
[   33.339179]  __kasan_mempool_poison_object+0xc0/0x150
[   33.339266]  mempool_free+0x28c/0x328
[   33.339379]  mempool_double_free_helper+0x100/0x2e8
[   33.339475]  mempool_kmalloc_double_free+0xc0/0x118
[   33.339524]  kunit_try_run_case+0x170/0x3f0
[   33.339600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.339658]  kthread+0x328/0x630
[   33.339701]  ret_from_fork+0x10/0x20
[   33.339737] 
[   33.339756] The buggy address belongs to the object at fff00000c9adf300
[   33.339756]  which belongs to the cache kmalloc-128 of size 128
[   33.339815] The buggy address is located 0 bytes inside of
[   33.339815]  128-byte region [fff00000c9adf300, fff00000c9adf380)
[   33.339874] 
[   33.339893] The buggy address belongs to the physical page:
[   33.339923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   33.340073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.340120] page_type: f5(slab)
[   33.340164] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.340290] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.340331] page dumped because: kasan: bad access detected
[   33.340402] 
[   33.340419] Memory state around the buggy address:
[   33.340450]  fff00000c9adf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.340492]  fff00000c9adf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.340534] >fff00000c9adf300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.340579]                    ^
[   33.340610]  fff00000c9adf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.340688]  fff00000c9adf400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.341044] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   33.267172] ==================================================================
[   33.267251] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.267672] Read of size 1 at addr fff00000c9b90000 by task kunit_try_catch/260
[   33.267760] 
[   33.267797] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.267987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.268016] Hardware name: linux,dummy-virt (DT)
[   33.268057] Call trace:
[   33.268139]  show_stack+0x20/0x38 (C)
[   33.268192]  dump_stack_lvl+0x8c/0xd0
[   33.268388]  print_report+0x118/0x5d0
[   33.268610]  kasan_report+0xdc/0x128
[   33.268777]  __asan_report_load1_noabort+0x20/0x30
[   33.268865]  mempool_uaf_helper+0x314/0x340
[   33.268973]  mempool_kmalloc_large_uaf+0xc4/0x120
[   33.269021]  kunit_try_run_case+0x170/0x3f0
[   33.269238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.269417]  kthread+0x328/0x630
[   33.269509]  ret_from_fork+0x10/0x20
[   33.269585] 
[   33.269607] The buggy address belongs to the physical page:
[   33.269641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90
[   33.269711] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.269766] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.269828] page_type: f8(unknown)
[   33.269869] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.269918] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.269984] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.270032] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.270086] head: 0bfffe0000000002 ffffc1ffc326e401 00000000ffffffff 00000000ffffffff
[   33.270135] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.270174] page dumped because: kasan: bad access detected
[   33.270226] 
[   33.270251] Memory state around the buggy address:
[   33.270300]  fff00000c9b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.270352]  fff00000c9b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.270405] >fff00000c9b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.270453]                    ^
[   33.270499]  fff00000c9b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.270550]  fff00000c9b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.270587] ==================================================================
[   33.324105] ==================================================================
[   33.325238] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.325448] Read of size 1 at addr fff00000c9b90000 by task kunit_try_catch/264
[   33.325510] 
[   33.325547] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.325664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.325693] Hardware name: linux,dummy-virt (DT)
[   33.325725] Call trace:
[   33.325749]  show_stack+0x20/0x38 (C)
[   33.325800]  dump_stack_lvl+0x8c/0xd0
[   33.325849]  print_report+0x118/0x5d0
[   33.325897]  kasan_report+0xdc/0x128
[   33.325943]  __asan_report_load1_noabort+0x20/0x30
[   33.325990]  mempool_uaf_helper+0x314/0x340
[   33.326037]  mempool_page_alloc_uaf+0xc0/0x118
[   33.326085]  kunit_try_run_case+0x170/0x3f0
[   33.326296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.326436]  kthread+0x328/0x630
[   33.326603]  ret_from_fork+0x10/0x20
[   33.326657] 
[   33.326762] The buggy address belongs to the physical page:
[   33.326850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90
[   33.326903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.326966] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.327016] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.327055] page dumped because: kasan: bad access detected
[   33.327085] 
[   33.327105] Memory state around the buggy address:
[   33.327135]  fff00000c9b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.327178]  fff00000c9b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.327229] >fff00000c9b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.327318]                    ^
[   33.327379]  fff00000c9b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.327476]  fff00000c9b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.327580] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   33.286850] ==================================================================
[   33.286915] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   33.287004] Read of size 1 at addr fff00000c9bcb240 by task kunit_try_catch/262
[   33.287056] 
[   33.287089] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.287174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.287200] Hardware name: linux,dummy-virt (DT)
[   33.287245] Call trace:
[   33.287270]  show_stack+0x20/0x38 (C)
[   33.287328]  dump_stack_lvl+0x8c/0xd0
[   33.287376]  print_report+0x118/0x5d0
[   33.287424]  kasan_report+0xdc/0x128
[   33.287470]  __asan_report_load1_noabort+0x20/0x30
[   33.287518]  mempool_uaf_helper+0x314/0x340
[   33.287565]  mempool_slab_uaf+0xc0/0x118
[   33.287612]  kunit_try_run_case+0x170/0x3f0
[   33.287661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.287726]  kthread+0x328/0x630
[   33.287770]  ret_from_fork+0x10/0x20
[   33.287818] 
[   33.287839] Allocated by task 262:
[   33.287867]  kasan_save_stack+0x3c/0x68
[   33.287909]  kasan_save_track+0x20/0x40
[   33.287948]  kasan_save_alloc_info+0x40/0x58
[   33.287997]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.288044]  remove_element+0x16c/0x1f8
[   33.288083]  mempool_alloc_preallocated+0x58/0xc0
[   33.288123]  mempool_uaf_helper+0xa4/0x340
[   33.288161]  mempool_slab_uaf+0xc0/0x118
[   33.288215]  kunit_try_run_case+0x170/0x3f0
[   33.288442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.288782]  kthread+0x328/0x630
[   33.289060]  ret_from_fork+0x10/0x20
[   33.289383] 
[   33.289429] Freed by task 262:
[   33.289976]  kasan_save_stack+0x3c/0x68
[   33.290070]  kasan_save_track+0x20/0x40
[   33.290472]  kasan_save_free_info+0x4c/0x78
[   33.290559]  __kasan_mempool_poison_object+0xc0/0x150
[   33.290751]  mempool_free+0x28c/0x328
[   33.290803]  mempool_uaf_helper+0x104/0x340
[   33.291035]  mempool_slab_uaf+0xc0/0x118
[   33.291195]  kunit_try_run_case+0x170/0x3f0
[   33.291258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.291446]  kthread+0x328/0x630
[   33.291637]  ret_from_fork+0x10/0x20
[   33.291799] 
[   33.291944] The buggy address belongs to the object at fff00000c9bcb240
[   33.291944]  which belongs to the cache test_cache of size 123
[   33.292175] The buggy address is located 0 bytes inside of
[   33.292175]  freed 123-byte region [fff00000c9bcb240, fff00000c9bcb2bb)
[   33.292321] 
[   33.292346] The buggy address belongs to the physical page:
[   33.292518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bcb
[   33.292778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.292896] page_type: f5(slab)
[   33.292952] raw: 0bfffe0000000000 fff00000c9ad5500 dead000000000122 0000000000000000
[   33.293002] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   33.293349] page dumped because: kasan: bad access detected
[   33.293403] 
[   33.293438] Memory state around the buggy address:
[   33.293550]  fff00000c9bcb100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.293630]  fff00000c9bcb180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.293691] >fff00000c9bcb200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   33.293895]                                            ^
[   33.294047]  fff00000c9bcb280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.294260]  fff00000c9bcb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.294348] ==================================================================
[   33.246704] ==================================================================
[   33.246778] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   33.246847] Read of size 1 at addr fff00000c9a9cf00 by task kunit_try_catch/258
[   33.246926] 
[   33.246974] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.247238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.247288] Hardware name: linux,dummy-virt (DT)
[   33.247499] Call trace:
[   33.247538]  show_stack+0x20/0x38 (C)
[   33.247596]  dump_stack_lvl+0x8c/0xd0
[   33.247794]  print_report+0x118/0x5d0
[   33.247934]  kasan_report+0xdc/0x128
[   33.248101]  __asan_report_load1_noabort+0x20/0x30
[   33.248224]  mempool_uaf_helper+0x314/0x340
[   33.248296]  mempool_kmalloc_uaf+0xc4/0x120
[   33.248514]  kunit_try_run_case+0x170/0x3f0
[   33.248763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.248972]  kthread+0x328/0x630
[   33.249204]  ret_from_fork+0x10/0x20
[   33.249309] 
[   33.249328] Allocated by task 258:
[   33.249392]  kasan_save_stack+0x3c/0x68
[   33.249480]  kasan_save_track+0x20/0x40
[   33.249554]  kasan_save_alloc_info+0x40/0x58
[   33.249798]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.249854]  remove_element+0x130/0x1f8
[   33.250086]  mempool_alloc_preallocated+0x58/0xc0
[   33.250315]  mempool_uaf_helper+0xa4/0x340
[   33.250648]  mempool_kmalloc_uaf+0xc4/0x120
[   33.250815]  kunit_try_run_case+0x170/0x3f0
[   33.250865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.250941]  kthread+0x328/0x630
[   33.251260]  ret_from_fork+0x10/0x20
[   33.251395] 
[   33.251444] Freed by task 258:
[   33.251632]  kasan_save_stack+0x3c/0x68
[   33.251713]  kasan_save_track+0x20/0x40
[   33.251984]  kasan_save_free_info+0x4c/0x78
[   33.252108]  __kasan_mempool_poison_object+0xc0/0x150
[   33.252184]  mempool_free+0x28c/0x328
[   33.252257]  mempool_uaf_helper+0x104/0x340
[   33.252469]  mempool_kmalloc_uaf+0xc4/0x120
[   33.252611]  kunit_try_run_case+0x170/0x3f0
[   33.252900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.253249]  kthread+0x328/0x630
[   33.253359]  ret_from_fork+0x10/0x20
[   33.253440] 
[   33.253487] The buggy address belongs to the object at fff00000c9a9cf00
[   33.253487]  which belongs to the cache kmalloc-128 of size 128
[   33.253560] The buggy address is located 0 bytes inside of
[   33.253560]  freed 128-byte region [fff00000c9a9cf00, fff00000c9a9cf80)
[   33.253825] 
[   33.253939] The buggy address belongs to the physical page:
[   33.254001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   33.254130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.254272] page_type: f5(slab)
[   33.254318] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.254736] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   33.254794] page dumped because: kasan: bad access detected
[   33.254995] 
[   33.255362] Memory state around the buggy address:
[   33.255716]  fff00000c9a9ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.255919]  fff00000c9a9ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.255988] >fff00000c9a9cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.256029]                    ^
[   33.256077]  fff00000c9a9cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.256282]  fff00000c9a9d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.256362] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   33.180529] ==================================================================
[   33.180949] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.181022] Read of size 1 at addr fff00000c9b2e001 by task kunit_try_catch/254
[   33.181112] 
[   33.181146] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.181243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.181268] Hardware name: linux,dummy-virt (DT)
[   33.181301] Call trace:
[   33.181324]  show_stack+0x20/0x38 (C)
[   33.181372]  dump_stack_lvl+0x8c/0xd0
[   33.181418]  print_report+0x118/0x5d0
[   33.181641]  kasan_report+0xdc/0x128
[   33.181870]  __asan_report_load1_noabort+0x20/0x30
[   33.181924]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.181972]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   33.182404]  kunit_try_run_case+0x170/0x3f0
[   33.182485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.182760]  kthread+0x328/0x630
[   33.182989]  ret_from_fork+0x10/0x20
[   33.183315] 
[   33.183471] The buggy address belongs to the physical page:
[   33.183634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2c
[   33.183866] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.184340] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.184406] page_type: f8(unknown)
[   33.184493] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.184544] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.185013] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.185093] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.185145] head: 0bfffe0000000002 ffffc1ffc326cb01 00000000ffffffff 00000000ffffffff
[   33.185193] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.185242] page dumped because: kasan: bad access detected
[   33.185276] 
[   33.185295] Memory state around the buggy address:
[   33.185327]  fff00000c9b2df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.185774]  fff00000c9b2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.186038] >fff00000c9b2e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.186086]                    ^
[   33.186410]  fff00000c9b2e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.186473]  fff00000c9b2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.186511] ==================================================================
[   33.204005] ==================================================================
[   33.204091] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.204293] Read of size 1 at addr fff00000c9add2bb by task kunit_try_catch/256
[   33.204447] 
[   33.204487] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.204638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.204666] Hardware name: linux,dummy-virt (DT)
[   33.204860] Call trace:
[   33.205255]  show_stack+0x20/0x38 (C)
[   33.205352]  dump_stack_lvl+0x8c/0xd0
[   33.205596]  print_report+0x118/0x5d0
[   33.205778]  kasan_report+0xdc/0x128
[   33.206002]  __asan_report_load1_noabort+0x20/0x30
[   33.206117]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.206347]  mempool_slab_oob_right+0xc0/0x118
[   33.206445]  kunit_try_run_case+0x170/0x3f0
[   33.206529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.206803]  kthread+0x328/0x630
[   33.206967]  ret_from_fork+0x10/0x20
[   33.207084] 
[   33.207117] Allocated by task 256:
[   33.207154]  kasan_save_stack+0x3c/0x68
[   33.207233]  kasan_save_track+0x20/0x40
[   33.207273]  kasan_save_alloc_info+0x40/0x58
[   33.207311]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.207355]  remove_element+0x16c/0x1f8
[   33.207401]  mempool_alloc_preallocated+0x58/0xc0
[   33.207442]  mempool_oob_right_helper+0x98/0x2f0
[   33.207490]  mempool_slab_oob_right+0xc0/0x118
[   33.207532]  kunit_try_run_case+0x170/0x3f0
[   33.207579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.207632]  kthread+0x328/0x630
[   33.207671]  ret_from_fork+0x10/0x20
[   33.207717] 
[   33.207746] The buggy address belongs to the object at fff00000c9add240
[   33.207746]  which belongs to the cache test_cache of size 123
[   33.207814] The buggy address is located 0 bytes to the right of
[   33.207814]  allocated 123-byte region [fff00000c9add240, fff00000c9add2bb)
[   33.207877] 
[   33.207904] The buggy address belongs to the physical page:
[   33.207954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109add
[   33.208014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.208075] page_type: f5(slab)
[   33.208116] raw: 0bfffe0000000000 fff00000c9ad53c0 dead000000000122 0000000000000000
[   33.208171] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   33.208401] page dumped because: kasan: bad access detected
[   33.208493] 
[   33.208732] Memory state around the buggy address:
[   33.208945]  fff00000c9add180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.209096]  fff00000c9add200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   33.209167] >fff00000c9add280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   33.209372]                                         ^
[   33.209417]  fff00000c9add300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.209462]  fff00000c9add380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.209501] ==================================================================
[   33.171428] ==================================================================
[   33.171503] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.171578] Read of size 1 at addr fff00000c9a9cb73 by task kunit_try_catch/252
[   33.171629] 
[   33.171671] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.171760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.171786] Hardware name: linux,dummy-virt (DT)
[   33.171820] Call trace:
[   33.171846]  show_stack+0x20/0x38 (C)
[   33.171899]  dump_stack_lvl+0x8c/0xd0
[   33.171949]  print_report+0x118/0x5d0
[   33.171998]  kasan_report+0xdc/0x128
[   33.172045]  __asan_report_load1_noabort+0x20/0x30
[   33.172093]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.172142]  mempool_kmalloc_oob_right+0xc4/0x120
[   33.172192]  kunit_try_run_case+0x170/0x3f0
[   33.172261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.172315]  kthread+0x328/0x630
[   33.172358]  ret_from_fork+0x10/0x20
[   33.172408] 
[   33.172427] Allocated by task 252:
[   33.172458]  kasan_save_stack+0x3c/0x68
[   33.172500]  kasan_save_track+0x20/0x40
[   33.172548]  kasan_save_alloc_info+0x40/0x58
[   33.172616]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.172680]  remove_element+0x130/0x1f8
[   33.172721]  mempool_alloc_preallocated+0x58/0xc0
[   33.172762]  mempool_oob_right_helper+0x98/0x2f0
[   33.172801]  mempool_kmalloc_oob_right+0xc4/0x120
[   33.172843]  kunit_try_run_case+0x170/0x3f0
[   33.172881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.172927]  kthread+0x328/0x630
[   33.172970]  ret_from_fork+0x10/0x20
[   33.173006] 
[   33.173026] The buggy address belongs to the object at fff00000c9a9cb00
[   33.173026]  which belongs to the cache kmalloc-128 of size 128
[   33.173086] The buggy address is located 0 bytes to the right of
[   33.173086]  allocated 115-byte region [fff00000c9a9cb00, fff00000c9a9cb73)
[   33.173151] 
[   33.173174] The buggy address belongs to the physical page:
[   33.173219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   33.173277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.173329] page_type: f5(slab)
[   33.173372] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.173422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.173464] page dumped because: kasan: bad access detected
[   33.173495] 
[   33.173515] Memory state around the buggy address:
[   33.173547]  fff00000c9a9ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.173595]  fff00000c9a9ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.173641] >fff00000c9a9cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.173680]                                                              ^
[   33.173720]  fff00000c9a9cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.173763]  fff00000c9a9cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.173802] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   32.609958] ==================================================================
[   32.610038] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   32.610162] Read of size 1 at addr fff00000c9ad5000 by task kunit_try_catch/246
[   32.610299] 
[   32.610348] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   32.610441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.610470] Hardware name: linux,dummy-virt (DT)
[   32.610502] Call trace:
[   32.610528]  show_stack+0x20/0x38 (C)
[   32.610581]  dump_stack_lvl+0x8c/0xd0
[   32.610645]  print_report+0x118/0x5d0
[   32.610695]  kasan_report+0xdc/0x128
[   32.610740]  __kasan_check_byte+0x54/0x70
[   32.610787]  kmem_cache_destroy+0x34/0x218
[   32.610835]  kmem_cache_double_destroy+0x174/0x300
[   32.610884]  kunit_try_run_case+0x170/0x3f0
[   32.610937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.611001]  kthread+0x328/0x630
[   32.611047]  ret_from_fork+0x10/0x20
[   32.611096] 
[   32.611115] Allocated by task 246:
[   32.611144]  kasan_save_stack+0x3c/0x68
[   32.611187]  kasan_save_track+0x20/0x40
[   32.611666]  kasan_save_alloc_info+0x40/0x58
[   32.611730]  __kasan_slab_alloc+0xa8/0xb0
[   32.611770]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.611830]  __kmem_cache_create_args+0x178/0x280
[   32.611890]  kmem_cache_double_destroy+0xc0/0x300
[   32.611947]  kunit_try_run_case+0x170/0x3f0
[   32.611994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.612040]  kthread+0x328/0x630
[   32.612071]  ret_from_fork+0x10/0x20
[   32.612107] 
[   32.612127] Freed by task 246:
[   32.612153]  kasan_save_stack+0x3c/0x68
[   32.612192]  kasan_save_track+0x20/0x40
[   32.612310]  kasan_save_free_info+0x4c/0x78
[   32.612355]  __kasan_slab_free+0x6c/0x98
[   32.612392]  kmem_cache_free+0x260/0x468
[   32.612430]  slab_kmem_cache_release+0x38/0x50
[   32.612488]  kmem_cache_release+0x1c/0x30
[   32.612526]  kobject_put+0x17c/0x420
[   32.612656]  sysfs_slab_release+0x1c/0x30
[   32.612728]  kmem_cache_destroy+0x118/0x218
[   32.612798]  kmem_cache_double_destroy+0x128/0x300
[   32.612866]  kunit_try_run_case+0x170/0x3f0
[   32.612919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.612965]  kthread+0x328/0x630
[   32.612999]  ret_from_fork+0x10/0x20
[   32.613035] 
[   32.613055] The buggy address belongs to the object at fff00000c9ad5000
[   32.613055]  which belongs to the cache kmem_cache of size 208
[   32.613189] The buggy address is located 0 bytes inside of
[   32.613189]  freed 208-byte region [fff00000c9ad5000, fff00000c9ad50d0)
[   32.613267] 
[   32.613293] The buggy address belongs to the physical page:
[   32.613371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad5
[   32.613459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.613519] page_type: f5(slab)
[   32.613588] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   32.613689] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   32.613749] page dumped because: kasan: bad access detected
[   32.613821] 
[   32.613914] Memory state around the buggy address:
[   32.613960]  fff00000c9ad4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.614221]  fff00000c9ad4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.614310] >fff00000c9ad5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.614411]                    ^
[   32.614471]  fff00000c9ad5080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   32.614560]  fff00000c9ad5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.614651] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   32.206453] ==================================================================
[   32.206781] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   32.206899] Read of size 1 at addr fff00000c9ad4000 by task kunit_try_catch/244
[   32.206953] 
[   32.207000] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   32.207194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.207239] Hardware name: linux,dummy-virt (DT)
[   32.207292] Call trace:
[   32.207548]  show_stack+0x20/0x38 (C)
[   32.207701]  dump_stack_lvl+0x8c/0xd0
[   32.207793]  print_report+0x118/0x5d0
[   32.207869]  kasan_report+0xdc/0x128
[   32.207918]  __asan_report_load1_noabort+0x20/0x30
[   32.208157]  kmem_cache_rcu_uaf+0x388/0x468
[   32.208304]  kunit_try_run_case+0x170/0x3f0
[   32.208371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.208427]  kthread+0x328/0x630
[   32.208725]  ret_from_fork+0x10/0x20
[   32.208933] 
[   32.208995] Allocated by task 244:
[   32.209165]  kasan_save_stack+0x3c/0x68
[   32.209303]  kasan_save_track+0x20/0x40
[   32.209372]  kasan_save_alloc_info+0x40/0x58
[   32.209435]  __kasan_slab_alloc+0xa8/0xb0
[   32.209557]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.209638]  kmem_cache_rcu_uaf+0x12c/0x468
[   32.209745]  kunit_try_run_case+0x170/0x3f0
[   32.209858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.210077]  kthread+0x328/0x630
[   32.210177]  ret_from_fork+0x10/0x20
[   32.210350] 
[   32.210425] Freed by task 0:
[   32.210485]  kasan_save_stack+0x3c/0x68
[   32.210715]  kasan_save_track+0x20/0x40
[   32.210804]  kasan_save_free_info+0x4c/0x78
[   32.210953]  __kasan_slab_free+0x6c/0x98
[   32.211017]  slab_free_after_rcu_debug+0xd4/0x2f8
[   32.211147]  rcu_core+0x9f4/0x1e20
[   32.211250]  rcu_core_si+0x18/0x30
[   32.211338]  handle_softirqs+0x374/0xb28
[   32.211427]  __do_softirq+0x1c/0x28
[   32.211500] 
[   32.211789] Last potentially related work creation:
[   32.211844]  kasan_save_stack+0x3c/0x68
[   32.211907]  kasan_record_aux_stack+0xb4/0xc8
[   32.212037]  kmem_cache_free+0x120/0x468
[   32.212106]  kmem_cache_rcu_uaf+0x16c/0x468
[   32.212323]  kunit_try_run_case+0x170/0x3f0
[   32.212445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.212501]  kthread+0x328/0x630
[   32.212536]  ret_from_fork+0x10/0x20
[   32.212788] 
[   32.213026] The buggy address belongs to the object at fff00000c9ad4000
[   32.213026]  which belongs to the cache test_cache of size 200
[   32.213138] The buggy address is located 0 bytes inside of
[   32.213138]  freed 200-byte region [fff00000c9ad4000, fff00000c9ad40c8)
[   32.213300] 
[   32.213328] The buggy address belongs to the physical page:
[   32.213361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad4
[   32.213644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.213797] page_type: f5(slab)
[   32.213898] raw: 0bfffe0000000000 fff00000c5c50dc0 dead000000000122 0000000000000000
[   32.214015] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   32.214076] page dumped because: kasan: bad access detected
[   32.214196] 
[   32.214269] Memory state around the buggy address:
[   32.214329]  fff00000c9ad3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.214464]  fff00000c9ad3f80: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc
[   32.214519] >fff00000c9ad4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.214569]                    ^
[   32.214633]  fff00000c9ad4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.214818]  fff00000c9ad4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.214996] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.774822] ==================================================================
[   31.775341] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   31.775423] Free of addr fff00000c9a8a001 by task kunit_try_catch/242
[   31.775511] 
[   31.775561] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.775655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.775684] Hardware name: linux,dummy-virt (DT)
[   31.775738] Call trace:
[   31.775780]  show_stack+0x20/0x38 (C)
[   31.775862]  dump_stack_lvl+0x8c/0xd0
[   31.775931]  print_report+0x118/0x5d0
[   31.775990]  kasan_report_invalid_free+0xc0/0xe8
[   31.776042]  check_slab_allocation+0xfc/0x108
[   31.776109]  __kasan_slab_pre_free+0x2c/0x48
[   31.776167]  kmem_cache_free+0xf0/0x468
[   31.776227]  kmem_cache_invalid_free+0x184/0x3c8
[   31.776277]  kunit_try_run_case+0x170/0x3f0
[   31.776497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.776578]  kthread+0x328/0x630
[   31.776628]  ret_from_fork+0x10/0x20
[   31.776718] 
[   31.776773] Allocated by task 242:
[   31.776817]  kasan_save_stack+0x3c/0x68
[   31.776886]  kasan_save_track+0x20/0x40
[   31.776993]  kasan_save_alloc_info+0x40/0x58
[   31.777064]  __kasan_slab_alloc+0xa8/0xb0
[   31.777134]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.777251]  kmem_cache_invalid_free+0x12c/0x3c8
[   31.777319]  kunit_try_run_case+0x170/0x3f0
[   31.777432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.777537]  kthread+0x328/0x630
[   31.777594]  ret_from_fork+0x10/0x20
[   31.777694] 
[   31.777736] The buggy address belongs to the object at fff00000c9a8a000
[   31.777736]  which belongs to the cache test_cache of size 200
[   31.777813] The buggy address is located 1 bytes inside of
[   31.777813]  200-byte region [fff00000c9a8a000, fff00000c9a8a0c8)
[   31.777883] 
[   31.777903] The buggy address belongs to the physical page:
[   31.777935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8a
[   31.778247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.778311] page_type: f5(slab)
[   31.778354] raw: 0bfffe0000000000 fff00000c5c50c80 dead000000000122 0000000000000000
[   31.778405] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.778445] page dumped because: kasan: bad access detected
[   31.778476] 
[   31.778495] Memory state around the buggy address:
[   31.778525]  fff00000c9a89f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.778568]  fff00000c9a89f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.778610] >fff00000c9a8a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.778649]                    ^
[   31.778676]  fff00000c9a8a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.778718]  fff00000c9a8a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.778755] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   31.744375] ==================================================================
[   31.744445] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.744668] Free of addr fff00000c9a8c000 by task kunit_try_catch/240
[   31.744742] 
[   31.744787] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.744976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.745013] Hardware name: linux,dummy-virt (DT)
[   31.745098] Call trace:
[   31.745152]  show_stack+0x20/0x38 (C)
[   31.745280]  dump_stack_lvl+0x8c/0xd0
[   31.745359]  print_report+0x118/0x5d0
[   31.745408]  kasan_report_invalid_free+0xc0/0xe8
[   31.745460]  check_slab_allocation+0xd4/0x108
[   31.745510]  __kasan_slab_pre_free+0x2c/0x48
[   31.745559]  kmem_cache_free+0xf0/0x468
[   31.745609]  kmem_cache_double_free+0x190/0x3c8
[   31.745656]  kunit_try_run_case+0x170/0x3f0
[   31.745827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.745912]  kthread+0x328/0x630
[   31.745981]  ret_from_fork+0x10/0x20
[   31.746074] 
[   31.746138] Allocated by task 240:
[   31.746171]  kasan_save_stack+0x3c/0x68
[   31.746235]  kasan_save_track+0x20/0x40
[   31.746548]  kasan_save_alloc_info+0x40/0x58
[   31.746641]  __kasan_slab_alloc+0xa8/0xb0
[   31.746727]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.746803]  kmem_cache_double_free+0x12c/0x3c8
[   31.746855]  kunit_try_run_case+0x170/0x3f0
[   31.746893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.746937]  kthread+0x328/0x630
[   31.746979]  ret_from_fork+0x10/0x20
[   31.747015] 
[   31.747055] Freed by task 240:
[   31.747085]  kasan_save_stack+0x3c/0x68
[   31.747137]  kasan_save_track+0x20/0x40
[   31.747173]  kasan_save_free_info+0x4c/0x78
[   31.747219]  __kasan_slab_free+0x6c/0x98
[   31.747258]  kmem_cache_free+0x260/0x468
[   31.747296]  kmem_cache_double_free+0x140/0x3c8
[   31.747336]  kunit_try_run_case+0x170/0x3f0
[   31.747375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.747419]  kthread+0x328/0x630
[   31.747451]  ret_from_fork+0x10/0x20
[   31.747614] 
[   31.747658] The buggy address belongs to the object at fff00000c9a8c000
[   31.747658]  which belongs to the cache test_cache of size 200
[   31.747745] The buggy address is located 0 bytes inside of
[   31.747745]  200-byte region [fff00000c9a8c000, fff00000c9a8c0c8)
[   31.747858] 
[   31.747888] The buggy address belongs to the physical page:
[   31.747939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8c
[   31.748169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.748278] page_type: f5(slab)
[   31.748323] raw: 0bfffe0000000000 fff00000c5c50b40 dead000000000122 0000000000000000
[   31.748392] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.748486] page dumped because: kasan: bad access detected
[   31.748584] 
[   31.748631] Memory state around the buggy address:
[   31.748707]  fff00000c9a8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.748763]  fff00000c9a8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.748805] >fff00000c9a8c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.748842]                    ^
[   31.748887]  fff00000c9a8c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.749060]  fff00000c9a8c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.749200] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   31.490649] ==================================================================
[   31.490752] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   31.490816] Read of size 1 at addr fff00000c9a8f0c8 by task kunit_try_catch/238
[   31.490883] 
[   31.490920] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.491005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.491041] Hardware name: linux,dummy-virt (DT)
[   31.491079] Call trace:
[   31.491135]  show_stack+0x20/0x38 (C)
[   31.491186]  dump_stack_lvl+0x8c/0xd0
[   31.491263]  print_report+0x118/0x5d0
[   31.491544]  kasan_report+0xdc/0x128
[   31.491606]  __asan_report_load1_noabort+0x20/0x30
[   31.491701]  kmem_cache_oob+0x344/0x430
[   31.491793]  kunit_try_run_case+0x170/0x3f0
[   31.491847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.491903]  kthread+0x328/0x630
[   31.491945]  ret_from_fork+0x10/0x20
[   31.491993] 
[   31.492012] Allocated by task 238:
[   31.492040]  kasan_save_stack+0x3c/0x68
[   31.492092]  kasan_save_track+0x20/0x40
[   31.492130]  kasan_save_alloc_info+0x40/0x58
[   31.492169]  __kasan_slab_alloc+0xa8/0xb0
[   31.492219]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.492259]  kmem_cache_oob+0x12c/0x430
[   31.492296]  kunit_try_run_case+0x170/0x3f0
[   31.492454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.492542]  kthread+0x328/0x630
[   31.492578]  ret_from_fork+0x10/0x20
[   31.492648] 
[   31.492694] The buggy address belongs to the object at fff00000c9a8f000
[   31.492694]  which belongs to the cache test_cache of size 200
[   31.492777] The buggy address is located 0 bytes to the right of
[   31.492777]  allocated 200-byte region [fff00000c9a8f000, fff00000c9a8f0c8)
[   31.492866] 
[   31.492949] The buggy address belongs to the physical page:
[   31.492988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8f
[   31.493057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.493166] page_type: f5(slab)
[   31.493245] raw: 0bfffe0000000000 fff00000c5c50a00 dead000000000122 0000000000000000
[   31.493369] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.493438] page dumped because: kasan: bad access detected
[   31.493493] 
[   31.493564] Memory state around the buggy address:
[   31.493613]  fff00000c9a8ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.493657]  fff00000c9a8f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.493727] >fff00000c9a8f080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.493766]                                               ^
[   31.493802]  fff00000c9a8f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.493844]  fff00000c9a8f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.493920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   31.468260] ==================================================================
[   31.468424] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   31.468512] Read of size 8 at addr fff00000c9aa7940 by task kunit_try_catch/231
[   31.468564] 
[   31.468650] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.468740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.468794] Hardware name: linux,dummy-virt (DT)
[   31.468853] Call trace:
[   31.468932]  show_stack+0x20/0x38 (C)
[   31.469003]  dump_stack_lvl+0x8c/0xd0
[   31.469052]  print_report+0x118/0x5d0
[   31.469100]  kasan_report+0xdc/0x128
[   31.469146]  __asan_report_load8_noabort+0x20/0x30
[   31.469345]  workqueue_uaf+0x480/0x4a8
[   31.469394]  kunit_try_run_case+0x170/0x3f0
[   31.469446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.469501]  kthread+0x328/0x630
[   31.469543]  ret_from_fork+0x10/0x20
[   31.469590] 
[   31.469655] Allocated by task 231:
[   31.469716]  kasan_save_stack+0x3c/0x68
[   31.469826]  kasan_save_track+0x20/0x40
[   31.469911]  kasan_save_alloc_info+0x40/0x58
[   31.469978]  __kasan_kmalloc+0xd4/0xd8
[   31.470047]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.470140]  workqueue_uaf+0x13c/0x4a8
[   31.470179]  kunit_try_run_case+0x170/0x3f0
[   31.470252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.470299]  kthread+0x328/0x630
[   31.470625]  ret_from_fork+0x10/0x20
[   31.470716] 
[   31.470766] Freed by task 75:
[   31.470860]  kasan_save_stack+0x3c/0x68
[   31.470921]  kasan_save_track+0x20/0x40
[   31.470992]  kasan_save_free_info+0x4c/0x78
[   31.471053]  __kasan_slab_free+0x6c/0x98
[   31.471275]  kfree+0x214/0x3c8
[   31.471465]  workqueue_uaf_work+0x18/0x30
[   31.471557]  process_one_work+0x530/0xf98
[   31.471661]  worker_thread+0x618/0xf38
[   31.471721]  kthread+0x328/0x630
[   31.471796]  ret_from_fork+0x10/0x20
[   31.471878] 
[   31.471917] Last potentially related work creation:
[   31.471946]  kasan_save_stack+0x3c/0x68
[   31.472010]  kasan_record_aux_stack+0xb4/0xc8
[   31.472281]  __queue_work+0x65c/0xfe0
[   31.472352]  queue_work_on+0xbc/0xf8
[   31.472444]  workqueue_uaf+0x210/0x4a8
[   31.472517]  kunit_try_run_case+0x170/0x3f0
[   31.472645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.472721]  kthread+0x328/0x630
[   31.472753]  ret_from_fork+0x10/0x20
[   31.472790] 
[   31.472809] The buggy address belongs to the object at fff00000c9aa7940
[   31.472809]  which belongs to the cache kmalloc-32 of size 32
[   31.472869] The buggy address is located 0 bytes inside of
[   31.472869]  freed 32-byte region [fff00000c9aa7940, fff00000c9aa7960)
[   31.472968] 
[   31.472989] The buggy address belongs to the physical page:
[   31.473022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aa7
[   31.473076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.473280] page_type: f5(slab)
[   31.473380] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.473460] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.473527] page dumped because: kasan: bad access detected
[   31.473590] 
[   31.473640] Memory state around the buggy address:
[   31.473736]  fff00000c9aa7800: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.473791]  fff00000c9aa7880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.473843] >fff00000c9aa7900: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   31.473880]                                            ^
[   31.473915]  fff00000c9aa7980: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.474112]  fff00000c9aa7a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.474194] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   31.446519] ==================================================================
[   31.446657] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.446730] Read of size 4 at addr fff00000c9aa7740 by task swapper/0/0
[   31.446778] 
[   31.449411] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.451338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.451365] Hardware name: linux,dummy-virt (DT)
[   31.451401] Call trace:
[   31.451429]  show_stack+0x20/0x38 (C)
[   31.451487]  dump_stack_lvl+0x8c/0xd0
[   31.451536]  print_report+0x118/0x5d0
[   31.451584]  kasan_report+0xdc/0x128
[   31.451631]  __asan_report_load4_noabort+0x20/0x30
[   31.451678]  rcu_uaf_reclaim+0x64/0x70
[   31.451723]  rcu_core+0x9f4/0x1e20
[   31.451769]  rcu_core_si+0x18/0x30
[   31.451814]  handle_softirqs+0x374/0xb28
[   31.451861]  __do_softirq+0x1c/0x28
[   31.451903]  ____do_softirq+0x18/0x30
[   31.451948]  call_on_irq_stack+0x24/0x30
[   31.451992]  do_softirq_own_stack+0x24/0x38
[   31.452038]  __irq_exit_rcu+0x1fc/0x318
[   31.452085]  irq_exit_rcu+0x1c/0x80
[   31.452129]  el1_interrupt+0x38/0x58
[   31.452177]  el1h_64_irq_handler+0x18/0x28
[   31.452235]  el1h_64_irq+0x6c/0x70
[   31.452353]  arch_local_irq_enable+0x4/0x8 (P)
[   31.452447]  do_idle+0x384/0x4e8
[   31.452514]  cpu_startup_entry+0x64/0x80
[   31.452571]  rest_init+0x160/0x188
[   31.452634]  start_kernel+0x30c/0x3d0
[   31.452885]  __primary_switched+0x8c/0xa0
[   31.453147] 
[   31.453197] Allocated by task 229:
[   31.453275]  kasan_save_stack+0x3c/0x68
[   31.453334]  kasan_save_track+0x20/0x40
[   31.453374]  kasan_save_alloc_info+0x40/0x58
[   31.453422]  __kasan_kmalloc+0xd4/0xd8
[   31.453466]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.453510]  rcu_uaf+0xb0/0x2d8
[   31.453544]  kunit_try_run_case+0x170/0x3f0
[   31.453970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.454032]  kthread+0x328/0x630
[   31.454192]  ret_from_fork+0x10/0x20
[   31.454305] 
[   31.454348] Freed by task 0:
[   31.454390]  kasan_save_stack+0x3c/0x68
[   31.454461]  kasan_save_track+0x20/0x40
[   31.454531]  kasan_save_free_info+0x4c/0x78
[   31.454604]  __kasan_slab_free+0x6c/0x98
[   31.454684]  kfree+0x214/0x3c8
[   31.454753]  rcu_uaf_reclaim+0x28/0x70
[   31.454803]  rcu_core+0x9f4/0x1e20
[   31.454885]  rcu_core_si+0x18/0x30
[   31.454977]  handle_softirqs+0x374/0xb28
[   31.455043]  __do_softirq+0x1c/0x28
[   31.455079] 
[   31.455242] Last potentially related work creation:
[   31.455448]  kasan_save_stack+0x3c/0x68
[   31.455500]  kasan_record_aux_stack+0xb4/0xc8
[   31.455539]  __call_rcu_common.constprop.0+0x74/0x8c8
[   31.455582]  call_rcu+0x18/0x30
[   31.455615]  rcu_uaf+0x14c/0x2d8
[   31.455769]  kunit_try_run_case+0x170/0x3f0
[   31.455852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.455910]  kthread+0x328/0x630
[   31.455962]  ret_from_fork+0x10/0x20
[   31.456064] 
[   31.456149] The buggy address belongs to the object at fff00000c9aa7740
[   31.456149]  which belongs to the cache kmalloc-32 of size 32
[   31.456284] The buggy address is located 0 bytes inside of
[   31.456284]  freed 32-byte region [fff00000c9aa7740, fff00000c9aa7760)
[   31.456362] 
[   31.456416] The buggy address belongs to the physical page:
[   31.456473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aa7
[   31.456556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.456616] page_type: f5(slab)
[   31.456659] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.456714] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.456791] page dumped because: kasan: bad access detected
[   31.456845] 
[   31.456876] Memory state around the buggy address:
[   31.456962]  fff00000c9aa7600: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   31.457027]  fff00000c9aa7680: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.457070] >fff00000c9aa7700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.457109]                                            ^
[   31.457143]  fff00000c9aa7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.457238]  fff00000c9aa7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.457424] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   31.367364] ==================================================================
[   31.367423] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.367471] Read of size 1 at addr fff00000c9a9c800 by task kunit_try_catch/227
[   31.367519] 
[   31.367572] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.367667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.367694] Hardware name: linux,dummy-virt (DT)
[   31.367755] Call trace:
[   31.367797]  show_stack+0x20/0x38 (C)
[   31.367844]  dump_stack_lvl+0x8c/0xd0
[   31.367907]  print_report+0x118/0x5d0
[   31.367954]  kasan_report+0xdc/0x128
[   31.368001]  __kasan_check_byte+0x54/0x70
[   31.368049]  ksize+0x30/0x88
[   31.368143]  ksize_uaf+0x168/0x5f8
[   31.368187]  kunit_try_run_case+0x170/0x3f0
[   31.368269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.368333]  kthread+0x328/0x630
[   31.368383]  ret_from_fork+0x10/0x20
[   31.368430] 
[   31.368447] Allocated by task 227:
[   31.368483]  kasan_save_stack+0x3c/0x68
[   31.368534]  kasan_save_track+0x20/0x40
[   31.368600]  kasan_save_alloc_info+0x40/0x58
[   31.368673]  __kasan_kmalloc+0xd4/0xd8
[   31.368713]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.368780]  ksize_uaf+0xb8/0x5f8
[   31.368817]  kunit_try_run_case+0x170/0x3f0
[   31.369019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.369071]  kthread+0x328/0x630
[   31.369115]  ret_from_fork+0x10/0x20
[   31.369151] 
[   31.369171] Freed by task 227:
[   31.369196]  kasan_save_stack+0x3c/0x68
[   31.369248]  kasan_save_track+0x20/0x40
[   31.369353]  kasan_save_free_info+0x4c/0x78
[   31.369436]  __kasan_slab_free+0x6c/0x98
[   31.369550]  kfree+0x214/0x3c8
[   31.369610]  ksize_uaf+0x11c/0x5f8
[   31.369669]  kunit_try_run_case+0x170/0x3f0
[   31.369762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.369842]  kthread+0x328/0x630
[   31.369899]  ret_from_fork+0x10/0x20
[   31.370000] 
[   31.370050] The buggy address belongs to the object at fff00000c9a9c800
[   31.370050]  which belongs to the cache kmalloc-128 of size 128
[   31.370157] The buggy address is located 0 bytes inside of
[   31.370157]  freed 128-byte region [fff00000c9a9c800, fff00000c9a9c880)
[   31.370279] 
[   31.370343] The buggy address belongs to the physical page:
[   31.370419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.370510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.370559] page_type: f5(slab)
[   31.370612] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.370831] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.370878] page dumped because: kasan: bad access detected
[   31.370910] 
[   31.370927] Memory state around the buggy address:
[   31.371012]  fff00000c9a9c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.371078]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.371190] >fff00000c9a9c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.371263]                    ^
[   31.371324]  fff00000c9a9c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.371391]  fff00000c9a9c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.371526] ==================================================================
[   31.371991] ==================================================================
[   31.372039] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.372086] Read of size 1 at addr fff00000c9a9c800 by task kunit_try_catch/227
[   31.372133] 
[   31.372400] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.372491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.372559] Hardware name: linux,dummy-virt (DT)
[   31.372630] Call trace:
[   31.372724]  show_stack+0x20/0x38 (C)
[   31.372798]  dump_stack_lvl+0x8c/0xd0
[   31.372884]  print_report+0x118/0x5d0
[   31.372997]  kasan_report+0xdc/0x128
[   31.373076]  __asan_report_load1_noabort+0x20/0x30
[   31.373226]  ksize_uaf+0x598/0x5f8
[   31.373309]  kunit_try_run_case+0x170/0x3f0
[   31.373393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.373456]  kthread+0x328/0x630
[   31.373499]  ret_from_fork+0x10/0x20
[   31.373677] 
[   31.373696] Allocated by task 227:
[   31.373724]  kasan_save_stack+0x3c/0x68
[   31.373767]  kasan_save_track+0x20/0x40
[   31.373806]  kasan_save_alloc_info+0x40/0x58
[   31.373844]  __kasan_kmalloc+0xd4/0xd8
[   31.373971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.374069]  ksize_uaf+0xb8/0x5f8
[   31.374134]  kunit_try_run_case+0x170/0x3f0
[   31.374230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.374310]  kthread+0x328/0x630
[   31.374350]  ret_from_fork+0x10/0x20
[   31.374387] 
[   31.374411] Freed by task 227:
[   31.374442]  kasan_save_stack+0x3c/0x68
[   31.374481]  kasan_save_track+0x20/0x40
[   31.374520]  kasan_save_free_info+0x4c/0x78
[   31.374567]  __kasan_slab_free+0x6c/0x98
[   31.374611]  kfree+0x214/0x3c8
[   31.374655]  ksize_uaf+0x11c/0x5f8
[   31.374700]  kunit_try_run_case+0x170/0x3f0
[   31.374750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.374802]  kthread+0x328/0x630
[   31.374842]  ret_from_fork+0x10/0x20
[   31.374879] 
[   31.374897] The buggy address belongs to the object at fff00000c9a9c800
[   31.374897]  which belongs to the cache kmalloc-128 of size 128
[   31.374954] The buggy address is located 0 bytes inside of
[   31.374954]  freed 128-byte region [fff00000c9a9c800, fff00000c9a9c880)
[   31.375016] 
[   31.375035] The buggy address belongs to the physical page:
[   31.375066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.375116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.375174] page_type: f5(slab)
[   31.375220] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.375269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.375307] page dumped because: kasan: bad access detected
[   31.375339] 
[   31.375356] Memory state around the buggy address:
[   31.375387]  fff00000c9a9c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.375428]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.375512] >fff00000c9a9c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.375548]                    ^
[   31.375576]  fff00000c9a9c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.375618]  fff00000c9a9c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.375655] ==================================================================
[   31.376173] ==================================================================
[   31.376280] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   31.376328] Read of size 1 at addr fff00000c9a9c878 by task kunit_try_catch/227
[   31.376385] 
[   31.376464] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.376548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.376594] Hardware name: linux,dummy-virt (DT)
[   31.376623] Call trace:
[   31.376646]  show_stack+0x20/0x38 (C)
[   31.376694]  dump_stack_lvl+0x8c/0xd0
[   31.376886]  print_report+0x118/0x5d0
[   31.377005]  kasan_report+0xdc/0x128
[   31.377098]  __asan_report_load1_noabort+0x20/0x30
[   31.377246]  ksize_uaf+0x544/0x5f8
[   31.377309]  kunit_try_run_case+0x170/0x3f0
[   31.377366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.377444]  kthread+0x328/0x630
[   31.377579]  ret_from_fork+0x10/0x20
[   31.377657] 
[   31.377704] Allocated by task 227:
[   31.377732]  kasan_save_stack+0x3c/0x68
[   31.377813]  kasan_save_track+0x20/0x40
[   31.377885]  kasan_save_alloc_info+0x40/0x58
[   31.377924]  __kasan_kmalloc+0xd4/0xd8
[   31.377976]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.378050]  ksize_uaf+0xb8/0x5f8
[   31.378103]  kunit_try_run_case+0x170/0x3f0
[   31.378143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.378189]  kthread+0x328/0x630
[   31.378266]  ret_from_fork+0x10/0x20
[   31.378305] 
[   31.378323] Freed by task 227:
[   31.378349]  kasan_save_stack+0x3c/0x68
[   31.378389]  kasan_save_track+0x20/0x40
[   31.378427]  kasan_save_free_info+0x4c/0x78
[   31.378464]  __kasan_slab_free+0x6c/0x98
[   31.378509]  kfree+0x214/0x3c8
[   31.378648]  ksize_uaf+0x11c/0x5f8
[   31.378720]  kunit_try_run_case+0x170/0x3f0
[   31.378787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.378903]  kthread+0x328/0x630
[   31.378967]  ret_from_fork+0x10/0x20
[   31.379051] 
[   31.379109] The buggy address belongs to the object at fff00000c9a9c800
[   31.379109]  which belongs to the cache kmalloc-128 of size 128
[   31.379251] The buggy address is located 120 bytes inside of
[   31.379251]  freed 128-byte region [fff00000c9a9c800, fff00000c9a9c880)
[   31.379333] 
[   31.379443] The buggy address belongs to the physical page:
[   31.379490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.379560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.379623] page_type: f5(slab)
[   31.379659] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.379843] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.379883] page dumped because: kasan: bad access detected
[   31.379915] 
[   31.379932] Memory state around the buggy address:
[   31.380005]  fff00000c9a9c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.380130]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.380220] >fff00000c9a9c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.380287]                                                                 ^
[   31.380346]  fff00000c9a9c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.380444]  fff00000c9a9c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.380492] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   31.359464] ==================================================================
[   31.359878] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.360023] Read of size 1 at addr fff00000c9a9c77f by task kunit_try_catch/225
[   31.360073] 
[   31.360102] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.360229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.360257] Hardware name: linux,dummy-virt (DT)
[   31.360286] Call trace:
[   31.360309]  show_stack+0x20/0x38 (C)
[   31.360356]  dump_stack_lvl+0x8c/0xd0
[   31.360412]  print_report+0x118/0x5d0
[   31.360459]  kasan_report+0xdc/0x128
[   31.360506]  __asan_report_load1_noabort+0x20/0x30
[   31.360569]  ksize_unpoisons_memory+0x690/0x740
[   31.360662]  kunit_try_run_case+0x170/0x3f0
[   31.360756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.360862]  kthread+0x328/0x630
[   31.360954]  ret_from_fork+0x10/0x20
[   31.361051] 
[   31.361124] Allocated by task 225:
[   31.361229]  kasan_save_stack+0x3c/0x68
[   31.361297]  kasan_save_track+0x20/0x40
[   31.361389]  kasan_save_alloc_info+0x40/0x58
[   31.361458]  __kasan_kmalloc+0xd4/0xd8
[   31.361568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.361629]  ksize_unpoisons_memory+0xc0/0x740
[   31.361669]  kunit_try_run_case+0x170/0x3f0
[   31.361708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.361753]  kthread+0x328/0x630
[   31.361785]  ret_from_fork+0x10/0x20
[   31.361962] 
[   31.361982] The buggy address belongs to the object at fff00000c9a9c700
[   31.361982]  which belongs to the cache kmalloc-128 of size 128
[   31.362041] The buggy address is located 12 bytes to the right of
[   31.362041]  allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773)
[   31.362159] 
[   31.362235] The buggy address belongs to the physical page:
[   31.362277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.362340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.362420] page_type: f5(slab)
[   31.362520] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.362590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.362650] page dumped because: kasan: bad access detected
[   31.362679] 
[   31.362711] Memory state around the buggy address:
[   31.362760]  fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.362829]  fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.362912] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.362983]                                                                 ^
[   31.363082]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.363142]  fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.363180] ==================================================================
[   31.352273] ==================================================================
[   31.352594] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   31.352817] Read of size 1 at addr fff00000c9a9c773 by task kunit_try_catch/225
[   31.352893] 
[   31.352955] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.353068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.353117] Hardware name: linux,dummy-virt (DT)
[   31.353148] Call trace:
[   31.353172]  show_stack+0x20/0x38 (C)
[   31.353352]  dump_stack_lvl+0x8c/0xd0
[   31.353403]  print_report+0x118/0x5d0
[   31.353452]  kasan_report+0xdc/0x128
[   31.353498]  __asan_report_load1_noabort+0x20/0x30
[   31.353545]  ksize_unpoisons_memory+0x628/0x740
[   31.353644]  kunit_try_run_case+0x170/0x3f0
[   31.353774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.353829]  kthread+0x328/0x630
[   31.353871]  ret_from_fork+0x10/0x20
[   31.354063] 
[   31.354084] Allocated by task 225:
[   31.354113]  kasan_save_stack+0x3c/0x68
[   31.354173]  kasan_save_track+0x20/0x40
[   31.354313]  kasan_save_alloc_info+0x40/0x58
[   31.354382]  __kasan_kmalloc+0xd4/0xd8
[   31.354461]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.354560]  ksize_unpoisons_memory+0xc0/0x740
[   31.354630]  kunit_try_run_case+0x170/0x3f0
[   31.354738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.354807]  kthread+0x328/0x630
[   31.354885]  ret_from_fork+0x10/0x20
[   31.354988] 
[   31.355038] The buggy address belongs to the object at fff00000c9a9c700
[   31.355038]  which belongs to the cache kmalloc-128 of size 128
[   31.355273] The buggy address is located 0 bytes to the right of
[   31.355273]  allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773)
[   31.355339] 
[   31.355360] The buggy address belongs to the physical page:
[   31.355391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.355472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.355552] page_type: f5(slab)
[   31.355675] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.355756] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.355814] page dumped because: kasan: bad access detected
[   31.355875] 
[   31.355915] Memory state around the buggy address:
[   31.356023]  fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.356112]  fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.356250] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.356289]                                                              ^
[   31.356373]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.356541]  fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.356581] ==================================================================
[   31.357104] ==================================================================
[   31.357160] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   31.357224] Read of size 1 at addr fff00000c9a9c778 by task kunit_try_catch/225
[   31.357280] 
[   31.357318] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.357439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.357467] Hardware name: linux,dummy-virt (DT)
[   31.357515] Call trace:
[   31.357545]  show_stack+0x20/0x38 (C)
[   31.357595]  dump_stack_lvl+0x8c/0xd0
[   31.357654]  print_report+0x118/0x5d0
[   31.357712]  kasan_report+0xdc/0x128
[   31.357760]  __asan_report_load1_noabort+0x20/0x30
[   31.357818]  ksize_unpoisons_memory+0x618/0x740
[   31.357873]  kunit_try_run_case+0x170/0x3f0
[   31.357930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.357984]  kthread+0x328/0x630
[   31.358027]  ret_from_fork+0x10/0x20
[   31.358075] 
[   31.358092] Allocated by task 225:
[   31.358118]  kasan_save_stack+0x3c/0x68
[   31.358158]  kasan_save_track+0x20/0x40
[   31.358202]  kasan_save_alloc_info+0x40/0x58
[   31.358251]  __kasan_kmalloc+0xd4/0xd8
[   31.358294]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.358336]  ksize_unpoisons_memory+0xc0/0x740
[   31.358375]  kunit_try_run_case+0x170/0x3f0
[   31.358420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.358464]  kthread+0x328/0x630
[   31.358496]  ret_from_fork+0x10/0x20
[   31.358532] 
[   31.358563] The buggy address belongs to the object at fff00000c9a9c700
[   31.358563]  which belongs to the cache kmalloc-128 of size 128
[   31.358625] The buggy address is located 5 bytes to the right of
[   31.358625]  allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773)
[   31.358706] 
[   31.358738] The buggy address belongs to the physical page:
[   31.358769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.358831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.358878] page_type: f5(slab)
[   31.358916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.358966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.359006] page dumped because: kasan: bad access detected
[   31.359043] 
[   31.359067] Memory state around the buggy address:
[   31.359096]  fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.359140]  fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.359187] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.359233]                                                                 ^
[   31.359273]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.359314]  fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.359352] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   31.342184] ==================================================================
[   31.342299] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   31.342356] Free of addr fff00000c79816c0 by task kunit_try_catch/223
[   31.342398] 
[   31.342436] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.342523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.342551] Hardware name: linux,dummy-virt (DT)
[   31.342584] Call trace:
[   31.342610]  show_stack+0x20/0x38 (C)
[   31.342659]  dump_stack_lvl+0x8c/0xd0
[   31.342753]  print_report+0x118/0x5d0
[   31.342814]  kasan_report_invalid_free+0xc0/0xe8
[   31.342875]  check_slab_allocation+0xd4/0x108
[   31.342935]  __kasan_slab_pre_free+0x2c/0x48
[   31.342988]  kfree+0xe8/0x3c8
[   31.343198]  kfree_sensitive+0x3c/0xb0
[   31.343265]  kmalloc_double_kzfree+0x168/0x308
[   31.343346]  kunit_try_run_case+0x170/0x3f0
[   31.343399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.343518]  kthread+0x328/0x630
[   31.343572]  ret_from_fork+0x10/0x20
[   31.343631] 
[   31.343660] Allocated by task 223:
[   31.343692]  kasan_save_stack+0x3c/0x68
[   31.343750]  kasan_save_track+0x20/0x40
[   31.343801]  kasan_save_alloc_info+0x40/0x58
[   31.343862]  __kasan_kmalloc+0xd4/0xd8
[   31.343900]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.344052]  kmalloc_double_kzfree+0xb8/0x308
[   31.344140]  kunit_try_run_case+0x170/0x3f0
[   31.344202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.344260]  kthread+0x328/0x630
[   31.344294]  ret_from_fork+0x10/0x20
[   31.344330] 
[   31.344361] Freed by task 223:
[   31.344389]  kasan_save_stack+0x3c/0x68
[   31.344439]  kasan_save_track+0x20/0x40
[   31.344488]  kasan_save_free_info+0x4c/0x78
[   31.344527]  __kasan_slab_free+0x6c/0x98
[   31.344592]  kfree+0x214/0x3c8
[   31.344650]  kfree_sensitive+0x80/0xb0
[   31.344700]  kmalloc_double_kzfree+0x11c/0x308
[   31.344751]  kunit_try_run_case+0x170/0x3f0
[   31.344791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.344859]  kthread+0x328/0x630
[   31.344894]  ret_from_fork+0x10/0x20
[   31.344931] 
[   31.344952] The buggy address belongs to the object at fff00000c79816c0
[   31.344952]  which belongs to the cache kmalloc-16 of size 16
[   31.345010] The buggy address is located 0 bytes inside of
[   31.345010]  16-byte region [fff00000c79816c0, fff00000c79816d0)
[   31.345072] 
[   31.345300] The buggy address belongs to the physical page:
[   31.345346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981
[   31.345421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.345493] page_type: f5(slab)
[   31.345562] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.345685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.345763] page dumped because: kasan: bad access detected
[   31.345797] 
[   31.345827] Memory state around the buggy address:
[   31.345860]  fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.345926]  fff00000c7981600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.346099] >fff00000c7981680: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   31.346139]                                            ^
[   31.346175]  fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.346227]  fff00000c7981780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.346277] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   31.328572] ==================================================================
[   31.328668] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   31.328785] Read of size 1 at addr fff00000c79816c0 by task kunit_try_catch/223
[   31.328870] 
[   31.328910] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.329152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.329183] Hardware name: linux,dummy-virt (DT)
[   31.329229] Call trace:
[   31.329414]  show_stack+0x20/0x38 (C)
[   31.329553]  dump_stack_lvl+0x8c/0xd0
[   31.329605]  print_report+0x118/0x5d0
[   31.329652]  kasan_report+0xdc/0x128
[   31.329743]  __kasan_check_byte+0x54/0x70
[   31.329915]  kfree_sensitive+0x30/0xb0
[   31.329965]  kmalloc_double_kzfree+0x168/0x308
[   31.330425]  kunit_try_run_case+0x170/0x3f0
[   31.330591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.331111]  kthread+0x328/0x630
[   31.331726]  ret_from_fork+0x10/0x20
[   31.332237] 
[   31.332605] Allocated by task 223:
[   31.332757]  kasan_save_stack+0x3c/0x68
[   31.332854]  kasan_save_track+0x20/0x40
[   31.332918]  kasan_save_alloc_info+0x40/0x58
[   31.332982]  __kasan_kmalloc+0xd4/0xd8
[   31.333022]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.333071]  kmalloc_double_kzfree+0xb8/0x308
[   31.333236]  kunit_try_run_case+0x170/0x3f0
[   31.333508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.333554]  kthread+0x328/0x630
[   31.333588]  ret_from_fork+0x10/0x20
[   31.333625] 
[   31.333647] Freed by task 223:
[   31.333676]  kasan_save_stack+0x3c/0x68
[   31.334799]  kasan_save_track+0x20/0x40
[   31.335384]  kasan_save_free_info+0x4c/0x78
[   31.335831]  __kasan_slab_free+0x6c/0x98
[   31.336315]  kfree+0x214/0x3c8
[   31.336464]  kfree_sensitive+0x80/0xb0
[   31.336504]  kmalloc_double_kzfree+0x11c/0x308
[   31.336949]  kunit_try_run_case+0x170/0x3f0
[   31.337016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.337615]  kthread+0x328/0x630
[   31.338009]  ret_from_fork+0x10/0x20
[   31.338478] 
[   31.338519] The buggy address belongs to the object at fff00000c79816c0
[   31.338519]  which belongs to the cache kmalloc-16 of size 16
[   31.338811] The buggy address is located 0 bytes inside of
[   31.338811]  freed 16-byte region [fff00000c79816c0, fff00000c79816d0)
[   31.338879] 
[   31.338902] The buggy address belongs to the physical page:
[   31.339356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981
[   31.340109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.340905] page_type: f5(slab)
[   31.340962] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.341015] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.341056] page dumped because: kasan: bad access detected
[   31.341090] 
[   31.341110] Memory state around the buggy address:
[   31.341144]  fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.341188]  fff00000c7981600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.341245] >fff00000c7981680: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   31.341286]                                            ^
[   31.341321]  fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.341366]  fff00000c7981780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.341405] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   31.295112] ==================================================================
[   31.295489] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   31.295807] Read of size 1 at addr fff00000c9acb728 by task kunit_try_catch/219
[   31.295860] 
[   31.295899] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.295988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.296022] Hardware name: linux,dummy-virt (DT)
[   31.296159] Call trace:
[   31.296371]  show_stack+0x20/0x38 (C)
[   31.296711]  dump_stack_lvl+0x8c/0xd0
[   31.297104]  print_report+0x118/0x5d0
[   31.297164]  kasan_report+0xdc/0x128
[   31.297226]  __asan_report_load1_noabort+0x20/0x30
[   31.297277]  kmalloc_uaf2+0x3f4/0x468
[   31.297383]  kunit_try_run_case+0x170/0x3f0
[   31.297916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.297998]  kthread+0x328/0x630
[   31.298315]  ret_from_fork+0x10/0x20
[   31.298549] 
[   31.298720] Allocated by task 219:
[   31.298775]  kasan_save_stack+0x3c/0x68
[   31.298839]  kasan_save_track+0x20/0x40
[   31.298902]  kasan_save_alloc_info+0x40/0x58
[   31.298940]  __kasan_kmalloc+0xd4/0xd8
[   31.298976]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.299017]  kmalloc_uaf2+0xc4/0x468
[   31.299054]  kunit_try_run_case+0x170/0x3f0
[   31.299390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.299607]  kthread+0x328/0x630
[   31.299701]  ret_from_fork+0x10/0x20
[   31.299751] 
[   31.299811] Freed by task 219:
[   31.299838]  kasan_save_stack+0x3c/0x68
[   31.299907]  kasan_save_track+0x20/0x40
[   31.300047]  kasan_save_free_info+0x4c/0x78
[   31.300084]  __kasan_slab_free+0x6c/0x98
[   31.300123]  kfree+0x214/0x3c8
[   31.300198]  kmalloc_uaf2+0x134/0x468
[   31.300251]  kunit_try_run_case+0x170/0x3f0
[   31.300290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.300388]  kthread+0x328/0x630
[   31.300842]  ret_from_fork+0x10/0x20
[   31.300962] 
[   31.300992] The buggy address belongs to the object at fff00000c9acb700
[   31.300992]  which belongs to the cache kmalloc-64 of size 64
[   31.301071] The buggy address is located 40 bytes inside of
[   31.301071]  freed 64-byte region [fff00000c9acb700, fff00000c9acb740)
[   31.301524] 
[   31.301553] The buggy address belongs to the physical page:
[   31.301584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acb
[   31.301655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.301709] page_type: f5(slab)
[   31.302086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.302147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.302231] page dumped because: kasan: bad access detected
[   31.302264] 
[   31.302284] Memory state around the buggy address:
[   31.302480]  fff00000c9acb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.302758]  fff00000c9acb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.302803] >fff00000c9acb700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.302841]                                   ^
[   31.302874]  fff00000c9acb780: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   31.303004]  fff00000c9acb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.303266] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   31.267710] ==================================================================
[   31.267773] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   31.267832] Write of size 33 at addr fff00000c9acb580 by task kunit_try_catch/217
[   31.267882] 
[   31.267918] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.268336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.268376] Hardware name: linux,dummy-virt (DT)
[   31.268427] Call trace:
[   31.268452]  show_stack+0x20/0x38 (C)
[   31.268520]  dump_stack_lvl+0x8c/0xd0
[   31.268583]  print_report+0x118/0x5d0
[   31.268853]  kasan_report+0xdc/0x128
[   31.269067]  kasan_check_range+0x100/0x1a8
[   31.269117]  __asan_memset+0x34/0x78
[   31.269161]  kmalloc_uaf_memset+0x170/0x310
[   31.270394]  kunit_try_run_case+0x170/0x3f0
[   31.270487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.270544]  kthread+0x328/0x630
[   31.270588]  ret_from_fork+0x10/0x20
[   31.270777] 
[   31.270797] Allocated by task 217:
[   31.270861]  kasan_save_stack+0x3c/0x68
[   31.270905]  kasan_save_track+0x20/0x40
[   31.272329]  kasan_save_alloc_info+0x40/0x58
[   31.272807]  __kasan_kmalloc+0xd4/0xd8
[   31.273662]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.274448]  kmalloc_uaf_memset+0xb8/0x310
[   31.275649]  kunit_try_run_case+0x170/0x3f0
[   31.277201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.277742]  kthread+0x328/0x630
[   31.277777]  ret_from_fork+0x10/0x20
[   31.277815] 
[   31.277840] Freed by task 217:
[   31.278787]  kasan_save_stack+0x3c/0x68
[   31.279106]  kasan_save_track+0x20/0x40
[   31.279289]  kasan_save_free_info+0x4c/0x78
[   31.279329]  __kasan_slab_free+0x6c/0x98
[   31.279368]  kfree+0x214/0x3c8
[   31.279402]  kmalloc_uaf_memset+0x11c/0x310
[   31.279572]  kunit_try_run_case+0x170/0x3f0
[   31.279897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.280085]  kthread+0x328/0x630
[   31.280161]  ret_from_fork+0x10/0x20
[   31.280260] 
[   31.280280] The buggy address belongs to the object at fff00000c9acb580
[   31.280280]  which belongs to the cache kmalloc-64 of size 64
[   31.280340] The buggy address is located 0 bytes inside of
[   31.280340]  freed 64-byte region [fff00000c9acb580, fff00000c9acb5c0)
[   31.280402] 
[   31.280460] The buggy address belongs to the physical page:
[   31.280510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acb
[   31.280766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.281019] page_type: f5(slab)
[   31.281232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.281328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.281369] page dumped because: kasan: bad access detected
[   31.281402] 
[   31.281453] Memory state around the buggy address:
[   31.281486]  fff00000c9acb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.281529]  fff00000c9acb500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.281571] >fff00000c9acb580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.281609]                    ^
[   31.281637]  fff00000c9acb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.282036]  fff00000c9acb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.282127] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   31.248205] ==================================================================
[   31.248302] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   31.248547] Read of size 1 at addr fff00000c79816a8 by task kunit_try_catch/215
[   31.248604] 
[   31.248643] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.249088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.249122] Hardware name: linux,dummy-virt (DT)
[   31.249314] Call trace:
[   31.249437]  show_stack+0x20/0x38 (C)
[   31.249683]  dump_stack_lvl+0x8c/0xd0
[   31.249803]  print_report+0x118/0x5d0
[   31.249851]  kasan_report+0xdc/0x128
[   31.249942]  __asan_report_load1_noabort+0x20/0x30
[   31.250031]  kmalloc_uaf+0x300/0x338
[   31.250076]  kunit_try_run_case+0x170/0x3f0
[   31.250165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.250231]  kthread+0x328/0x630
[   31.250272]  ret_from_fork+0x10/0x20
[   31.250854] 
[   31.250887] Allocated by task 215:
[   31.250922]  kasan_save_stack+0x3c/0x68
[   31.250971]  kasan_save_track+0x20/0x40
[   31.251010]  kasan_save_alloc_info+0x40/0x58
[   31.251534]  __kasan_kmalloc+0xd4/0xd8
[   31.251637]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.251698]  kmalloc_uaf+0xb8/0x338
[   31.251734]  kunit_try_run_case+0x170/0x3f0
[   31.251775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.251826]  kthread+0x328/0x630
[   31.251929]  ret_from_fork+0x10/0x20
[   31.251966] 
[   31.251986] Freed by task 215:
[   31.252013]  kasan_save_stack+0x3c/0x68
[   31.252092]  kasan_save_track+0x20/0x40
[   31.252253]  kasan_save_free_info+0x4c/0x78
[   31.252303]  __kasan_slab_free+0x6c/0x98
[   31.252443]  kfree+0x214/0x3c8
[   31.252483]  kmalloc_uaf+0x11c/0x338
[   31.252866]  kunit_try_run_case+0x170/0x3f0
[   31.252916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.252968]  kthread+0x328/0x630
[   31.253001]  ret_from_fork+0x10/0x20
[   31.253416] 
[   31.253439] The buggy address belongs to the object at fff00000c79816a0
[   31.253439]  which belongs to the cache kmalloc-16 of size 16
[   31.253711] The buggy address is located 8 bytes inside of
[   31.253711]  freed 16-byte region [fff00000c79816a0, fff00000c79816b0)
[   31.253790] 
[   31.253813] The buggy address belongs to the physical page:
[   31.253846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981
[   31.253903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.253954] page_type: f5(slab)
[   31.253997] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.254047] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.254099] page dumped because: kasan: bad access detected
[   31.254131] 
[   31.254149] Memory state around the buggy address:
[   31.254542]  fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.254790]  fff00000c7981600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.254881] >fff00000c7981680: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   31.254954]                                   ^
[   31.255010]  fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.255051]  fff00000c7981780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.255111] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   31.221765] ==================================================================
[   31.221828] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   31.221885] Read of size 64 at addr fff00000c9acb284 by task kunit_try_catch/213
[   31.221952] 
[   31.221984] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.222546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.222578] Hardware name: linux,dummy-virt (DT)
[   31.222714] Call trace:
[   31.222741]  show_stack+0x20/0x38 (C)
[   31.222792]  dump_stack_lvl+0x8c/0xd0
[   31.222839]  print_report+0x118/0x5d0
[   31.222886]  kasan_report+0xdc/0x128
[   31.222931]  kasan_check_range+0x100/0x1a8
[   31.222983]  __asan_memmove+0x3c/0x98
[   31.223120]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   31.223222]  kunit_try_run_case+0x170/0x3f0
[   31.223273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.223573]  kthread+0x328/0x630
[   31.223941]  ret_from_fork+0x10/0x20
[   31.224205] 
[   31.224241] Allocated by task 213:
[   31.224272]  kasan_save_stack+0x3c/0x68
[   31.224315]  kasan_save_track+0x20/0x40
[   31.224553]  kasan_save_alloc_info+0x40/0x58
[   31.224744]  __kasan_kmalloc+0xd4/0xd8
[   31.224795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.224868]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   31.224911]  kunit_try_run_case+0x170/0x3f0
[   31.224950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.224995]  kthread+0x328/0x630
[   31.225038]  ret_from_fork+0x10/0x20
[   31.225147] 
[   31.225175] The buggy address belongs to the object at fff00000c9acb280
[   31.225175]  which belongs to the cache kmalloc-64 of size 64
[   31.225245] The buggy address is located 4 bytes inside of
[   31.225245]  allocated 64-byte region [fff00000c9acb280, fff00000c9acb2c0)
[   31.225423] 
[   31.225456] The buggy address belongs to the physical page:
[   31.225489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acb
[   31.225545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.225595] page_type: f5(slab)
[   31.225634] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.225684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.225726] page dumped because: kasan: bad access detected
[   31.225759] 
[   31.226404] Memory state around the buggy address:
[   31.226468]  fff00000c9acb180: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.226513]  fff00000c9acb200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.226991] >fff00000c9acb280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.227033]                                            ^
[   31.227100]  fff00000c9acb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.227154]  fff00000c9acb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.227459] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   31.204136] ==================================================================
[   31.204369] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   31.204438] Read of size 18446744073709551614 at addr fff00000c9acb084 by task kunit_try_catch/211
[   31.204969] 
[   31.205102] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.205190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.205235] Hardware name: linux,dummy-virt (DT)
[   31.205267] Call trace:
[   31.205311]  show_stack+0x20/0x38 (C)
[   31.205481]  dump_stack_lvl+0x8c/0xd0
[   31.205530]  print_report+0x118/0x5d0
[   31.205576]  kasan_report+0xdc/0x128
[   31.205623]  kasan_check_range+0x100/0x1a8
[   31.205669]  __asan_memmove+0x3c/0x98
[   31.205714]  kmalloc_memmove_negative_size+0x154/0x2e0
[   31.205769]  kunit_try_run_case+0x170/0x3f0
[   31.205973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.206092]  kthread+0x328/0x630
[   31.206445]  ret_from_fork+0x10/0x20
[   31.206857] 
[   31.206883] Allocated by task 211:
[   31.206963]  kasan_save_stack+0x3c/0x68
[   31.207304]  kasan_save_track+0x20/0x40
[   31.207404]  kasan_save_alloc_info+0x40/0x58
[   31.207443]  __kasan_kmalloc+0xd4/0xd8
[   31.207714]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.207819]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   31.207862]  kunit_try_run_case+0x170/0x3f0
[   31.207902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.207947]  kthread+0x328/0x630
[   31.208226]  ret_from_fork+0x10/0x20
[   31.208272] 
[   31.208292] The buggy address belongs to the object at fff00000c9acb080
[   31.208292]  which belongs to the cache kmalloc-64 of size 64
[   31.208613] The buggy address is located 4 bytes inside of
[   31.208613]  64-byte region [fff00000c9acb080, fff00000c9acb0c0)
[   31.208815] 
[   31.208837] The buggy address belongs to the physical page:
[   31.208932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acb
[   31.208988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.209036] page_type: f5(slab)
[   31.209099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.209201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.209508] page dumped because: kasan: bad access detected
[   31.209650] 
[   31.209726] Memory state around the buggy address:
[   31.209785]  fff00000c9acaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.209835]  fff00000c9acb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.209907] >fff00000c9acb080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.209945]                    ^
[   31.209972]  fff00000c9acb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.210014]  fff00000c9acb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.210076] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   31.189688] ==================================================================
[   31.189747] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   31.190329] Write of size 16 at addr fff00000c9a9c669 by task kunit_try_catch/209
[   31.190381] 
[   31.190413] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.190496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.190522] Hardware name: linux,dummy-virt (DT)
[   31.190559] Call trace:
[   31.190592]  show_stack+0x20/0x38 (C)
[   31.190642]  dump_stack_lvl+0x8c/0xd0
[   31.191049]  print_report+0x118/0x5d0
[   31.191101]  kasan_report+0xdc/0x128
[   31.191147]  kasan_check_range+0x100/0x1a8
[   31.191192]  __asan_memset+0x34/0x78
[   31.191247]  kmalloc_oob_memset_16+0x150/0x2f8
[   31.191295]  kunit_try_run_case+0x170/0x3f0
[   31.191347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.191398]  kthread+0x328/0x630
[   31.191452]  ret_from_fork+0x10/0x20
[   31.191502] 
[   31.191856] Allocated by task 209:
[   31.192084]  kasan_save_stack+0x3c/0x68
[   31.192133]  kasan_save_track+0x20/0x40
[   31.192177]  kasan_save_alloc_info+0x40/0x58
[   31.192272]  __kasan_kmalloc+0xd4/0xd8
[   31.192310]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.192350]  kmalloc_oob_memset_16+0xb0/0x2f8
[   31.192388]  kunit_try_run_case+0x170/0x3f0
[   31.192428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.192478]  kthread+0x328/0x630
[   31.192608]  ret_from_fork+0x10/0x20
[   31.192646] 
[   31.192666] The buggy address belongs to the object at fff00000c9a9c600
[   31.192666]  which belongs to the cache kmalloc-128 of size 128
[   31.193225] The buggy address is located 105 bytes inside of
[   31.193225]  allocated 120-byte region [fff00000c9a9c600, fff00000c9a9c678)
[   31.193424] 
[   31.193448] The buggy address belongs to the physical page:
[   31.193479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.193723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.193825] page_type: f5(slab)
[   31.193962] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.194012] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.194084] page dumped because: kasan: bad access detected
[   31.194164] 
[   31.194241] Memory state around the buggy address:
[   31.194274]  fff00000c9a9c500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.194316]  fff00000c9a9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.194358] >fff00000c9a9c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.194395]                                                                 ^
[   31.194434]  fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.194475]  fff00000c9a9c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.194514] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   31.174544] ==================================================================
[   31.174615] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   31.174668] Write of size 8 at addr fff00000c9a9c571 by task kunit_try_catch/207
[   31.174715] 
[   31.174747] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.174830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.174855] Hardware name: linux,dummy-virt (DT)
[   31.174900] Call trace:
[   31.174924]  show_stack+0x20/0x38 (C)
[   31.174971]  dump_stack_lvl+0x8c/0xd0
[   31.175043]  print_report+0x118/0x5d0
[   31.175090]  kasan_report+0xdc/0x128
[   31.175136]  kasan_check_range+0x100/0x1a8
[   31.175485]  __asan_memset+0x34/0x78
[   31.175858]  kmalloc_oob_memset_8+0x150/0x2f8
[   31.176015]  kunit_try_run_case+0x170/0x3f0
[   31.176157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.176350]  kthread+0x328/0x630
[   31.176454]  ret_from_fork+0x10/0x20
[   31.176502] 
[   31.176526] Allocated by task 207:
[   31.176630]  kasan_save_stack+0x3c/0x68
[   31.176675]  kasan_save_track+0x20/0x40
[   31.176734]  kasan_save_alloc_info+0x40/0x58
[   31.176773]  __kasan_kmalloc+0xd4/0xd8
[   31.176810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.176849]  kmalloc_oob_memset_8+0xb0/0x2f8
[   31.176886]  kunit_try_run_case+0x170/0x3f0
[   31.177330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.177447]  kthread+0x328/0x630
[   31.177489]  ret_from_fork+0x10/0x20
[   31.177621] 
[   31.177671] The buggy address belongs to the object at fff00000c9a9c500
[   31.177671]  which belongs to the cache kmalloc-128 of size 128
[   31.177728] The buggy address is located 113 bytes inside of
[   31.177728]  allocated 120-byte region [fff00000c9a9c500, fff00000c9a9c578)
[   31.177788] 
[   31.177862] The buggy address belongs to the physical page:
[   31.177963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.178014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.178061] page_type: f5(slab)
[   31.178105] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.178590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.178634] page dumped because: kasan: bad access detected
[   31.178907] 
[   31.179144] Memory state around the buggy address:
[   31.179179]  fff00000c9a9c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.179233]  fff00000c9a9c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.179272] >fff00000c9a9c500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.179481]                                                                 ^
[   31.179540]  fff00000c9a9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.179581]  fff00000c9a9c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.179616] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   31.165833] ==================================================================
[   31.165890] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   31.165944] Write of size 4 at addr fff00000c9a9c475 by task kunit_try_catch/205
[   31.166001] 
[   31.166040] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.166129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.166155] Hardware name: linux,dummy-virt (DT)
[   31.166185] Call trace:
[   31.166220]  show_stack+0x20/0x38 (C)
[   31.166267]  dump_stack_lvl+0x8c/0xd0
[   31.166314]  print_report+0x118/0x5d0
[   31.166366]  kasan_report+0xdc/0x128
[   31.166411]  kasan_check_range+0x100/0x1a8
[   31.166456]  __asan_memset+0x34/0x78
[   31.166502]  kmalloc_oob_memset_4+0x150/0x300
[   31.166741]  kunit_try_run_case+0x170/0x3f0
[   31.166799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.166854]  kthread+0x328/0x630
[   31.166909]  ret_from_fork+0x10/0x20
[   31.166957] 
[   31.166975] Allocated by task 205:
[   31.167002]  kasan_save_stack+0x3c/0x68
[   31.167052]  kasan_save_track+0x20/0x40
[   31.167090]  kasan_save_alloc_info+0x40/0x58
[   31.167127]  __kasan_kmalloc+0xd4/0xd8
[   31.167165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.167203]  kmalloc_oob_memset_4+0xb0/0x300
[   31.167334]  kunit_try_run_case+0x170/0x3f0
[   31.167374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.167531]  kthread+0x328/0x630
[   31.167576]  ret_from_fork+0x10/0x20
[   31.167629] 
[   31.167658] The buggy address belongs to the object at fff00000c9a9c400
[   31.167658]  which belongs to the cache kmalloc-128 of size 128
[   31.167740] The buggy address is located 117 bytes inside of
[   31.167740]  allocated 120-byte region [fff00000c9a9c400, fff00000c9a9c478)
[   31.167809] 
[   31.167838] The buggy address belongs to the physical page:
[   31.167876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.167927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.167973] page_type: f5(slab)
[   31.168009] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.168056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.168094] page dumped because: kasan: bad access detected
[   31.168132] 
[   31.168150] Memory state around the buggy address:
[   31.168224]  fff00000c9a9c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.168272]  fff00000c9a9c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.168328] >fff00000c9a9c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.168365]                                                                 ^
[   31.168410]  fff00000c9a9c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.168581]  fff00000c9a9c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.168807] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   31.158168] ==================================================================
[   31.158260] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   31.158317] Write of size 2 at addr fff00000c9a9c377 by task kunit_try_catch/203
[   31.158370] 
[   31.158400] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.158489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.158515] Hardware name: linux,dummy-virt (DT)
[   31.158544] Call trace:
[   31.158575]  show_stack+0x20/0x38 (C)
[   31.158630]  dump_stack_lvl+0x8c/0xd0
[   31.158677]  print_report+0x118/0x5d0
[   31.158723]  kasan_report+0xdc/0x128
[   31.158769]  kasan_check_range+0x100/0x1a8
[   31.158814]  __asan_memset+0x34/0x78
[   31.158856]  kmalloc_oob_memset_2+0x150/0x2f8
[   31.159084]  kunit_try_run_case+0x170/0x3f0
[   31.159142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.159217]  kthread+0x328/0x630
[   31.159261]  ret_from_fork+0x10/0x20
[   31.159329] 
[   31.159358] Allocated by task 203:
[   31.159386]  kasan_save_stack+0x3c/0x68
[   31.159428]  kasan_save_track+0x20/0x40
[   31.159484]  kasan_save_alloc_info+0x40/0x58
[   31.159521]  __kasan_kmalloc+0xd4/0xd8
[   31.159574]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.159633]  kmalloc_oob_memset_2+0xb0/0x2f8
[   31.159671]  kunit_try_run_case+0x170/0x3f0
[   31.159719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.159763]  kthread+0x328/0x630
[   31.159795]  ret_from_fork+0x10/0x20
[   31.159830] 
[   31.159848] The buggy address belongs to the object at fff00000c9a9c300
[   31.159848]  which belongs to the cache kmalloc-128 of size 128
[   31.159902] The buggy address is located 119 bytes inside of
[   31.159902]  allocated 120-byte region [fff00000c9a9c300, fff00000c9a9c378)
[   31.159963] 
[   31.159982] The buggy address belongs to the physical page:
[   31.160011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.160083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.160128] page_type: f5(slab)
[   31.160296] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.160376] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.160417] page dumped because: kasan: bad access detected
[   31.160449] 
[   31.160483] Memory state around the buggy address:
[   31.160521]  fff00000c9a9c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.160670]  fff00000c9a9c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.160712] >fff00000c9a9c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.160749]                                                                 ^
[   31.160788]  fff00000c9a9c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.160842]  fff00000c9a9c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.160904] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   31.150537] ==================================================================
[   31.150592] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   31.150641] Write of size 128 at addr fff00000c9a9c200 by task kunit_try_catch/201
[   31.150689] 
[   31.150720] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.150803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.150828] Hardware name: linux,dummy-virt (DT)
[   31.150858] Call trace:
[   31.150880]  show_stack+0x20/0x38 (C)
[   31.150926]  dump_stack_lvl+0x8c/0xd0
[   31.150971]  print_report+0x118/0x5d0
[   31.151016]  kasan_report+0xdc/0x128
[   31.151061]  kasan_check_range+0x100/0x1a8
[   31.151105]  __asan_memset+0x34/0x78
[   31.151147]  kmalloc_oob_in_memset+0x144/0x2d0
[   31.151193]  kunit_try_run_case+0x170/0x3f0
[   31.151284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.151354]  kthread+0x328/0x630
[   31.151402]  ret_from_fork+0x10/0x20
[   31.151475] 
[   31.151494] Allocated by task 201:
[   31.151521]  kasan_save_stack+0x3c/0x68
[   31.151561]  kasan_save_track+0x20/0x40
[   31.151599]  kasan_save_alloc_info+0x40/0x58
[   31.151635]  __kasan_kmalloc+0xd4/0xd8
[   31.151671]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.151711]  kmalloc_oob_in_memset+0xb0/0x2d0
[   31.151748]  kunit_try_run_case+0x170/0x3f0
[   31.151809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.151853]  kthread+0x328/0x630
[   31.151885]  ret_from_fork+0x10/0x20
[   31.151920] 
[   31.151939] The buggy address belongs to the object at fff00000c9a9c200
[   31.151939]  which belongs to the cache kmalloc-128 of size 128
[   31.151993] The buggy address is located 0 bytes inside of
[   31.151993]  allocated 120-byte region [fff00000c9a9c200, fff00000c9a9c278)
[   31.152051] 
[   31.152071] The buggy address belongs to the physical page:
[   31.152100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.152149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.152194] page_type: f5(slab)
[   31.152338] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.152442] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.152491] page dumped because: kasan: bad access detected
[   31.152529] 
[   31.152610] Memory state around the buggy address:
[   31.152651]  fff00000c9a9c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.152695]  fff00000c9a9c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.152736] >fff00000c9a9c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.152772]                                                                 ^
[   31.152812]  fff00000c9a9c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.152852]  fff00000c9a9c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.152888] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   31.140927] ==================================================================
[   31.141019] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   31.141109] Read of size 16 at addr fff00000c7981680 by task kunit_try_catch/199
[   31.141160] 
[   31.141196] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.141314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.141340] Hardware name: linux,dummy-virt (DT)
[   31.141372] Call trace:
[   31.141396]  show_stack+0x20/0x38 (C)
[   31.141445]  dump_stack_lvl+0x8c/0xd0
[   31.141493]  print_report+0x118/0x5d0
[   31.141540]  kasan_report+0xdc/0x128
[   31.141595]  __asan_report_load16_noabort+0x20/0x30
[   31.141679]  kmalloc_uaf_16+0x3bc/0x438
[   31.141726]  kunit_try_run_case+0x170/0x3f0
[   31.141782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.141964]  kthread+0x328/0x630
[   31.142008]  ret_from_fork+0x10/0x20
[   31.142216] 
[   31.142277] Allocated by task 199:
[   31.142593]  kasan_save_stack+0x3c/0x68
[   31.142654]  kasan_save_track+0x20/0x40
[   31.142692]  kasan_save_alloc_info+0x40/0x58
[   31.142947]  __kasan_kmalloc+0xd4/0xd8
[   31.143004]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.143065]  kmalloc_uaf_16+0x140/0x438
[   31.143136]  kunit_try_run_case+0x170/0x3f0
[   31.143194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.143282]  kthread+0x328/0x630
[   31.143364]  ret_from_fork+0x10/0x20
[   31.143416] 
[   31.143470] Freed by task 199:
[   31.143559]  kasan_save_stack+0x3c/0x68
[   31.143628]  kasan_save_track+0x20/0x40
[   31.143703]  kasan_save_free_info+0x4c/0x78
[   31.143739]  __kasan_slab_free+0x6c/0x98
[   31.143802]  kfree+0x214/0x3c8
[   31.144095]  kmalloc_uaf_16+0x190/0x438
[   31.144183]  kunit_try_run_case+0x170/0x3f0
[   31.144261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.144329]  kthread+0x328/0x630
[   31.144400]  ret_from_fork+0x10/0x20
[   31.144436] 
[   31.144455] The buggy address belongs to the object at fff00000c7981680
[   31.144455]  which belongs to the cache kmalloc-16 of size 16
[   31.144512] The buggy address is located 0 bytes inside of
[   31.144512]  freed 16-byte region [fff00000c7981680, fff00000c7981690)
[   31.144598] 
[   31.144667] The buggy address belongs to the physical page:
[   31.144778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981
[   31.144887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.144957] page_type: f5(slab)
[   31.145014] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.145112] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.145170] page dumped because: kasan: bad access detected
[   31.145201] 
[   31.145230] Memory state around the buggy address:
[   31.145285]  fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.145330]  fff00000c7981600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.145372] >fff00000c7981680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.145486]                    ^
[   31.145518]  fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.145559]  fff00000c7981780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.145595] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   31.098976] ==================================================================
[   31.100497] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   31.100918] Write of size 16 at addr fff00000c7981640 by task kunit_try_catch/197
[   31.100968] 
[   31.101616] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.102238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.102401] Hardware name: linux,dummy-virt (DT)
[   31.102921] Call trace:
[   31.103338]  show_stack+0x20/0x38 (C)
[   31.103583]  dump_stack_lvl+0x8c/0xd0
[   31.104256]  print_report+0x118/0x5d0
[   31.104327]  kasan_report+0xdc/0x128
[   31.104966]  __asan_report_store16_noabort+0x20/0x30
[   31.105414]  kmalloc_oob_16+0x3a0/0x3f8
[   31.105465]  kunit_try_run_case+0x170/0x3f0
[   31.105516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.106344]  kthread+0x328/0x630
[   31.106720]  ret_from_fork+0x10/0x20
[   31.106813] 
[   31.107332] Allocated by task 197:
[   31.108022]  kasan_save_stack+0x3c/0x68
[   31.108078]  kasan_save_track+0x20/0x40
[   31.108398]  kasan_save_alloc_info+0x40/0x58
[   31.108445]  __kasan_kmalloc+0xd4/0xd8
[   31.109062]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.109192]  kmalloc_oob_16+0xb4/0x3f8
[   31.109322]  kunit_try_run_case+0x170/0x3f0
[   31.109362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.110364]  kthread+0x328/0x630
[   31.110558]  ret_from_fork+0x10/0x20
[   31.110788] 
[   31.111303] The buggy address belongs to the object at fff00000c7981640
[   31.111303]  which belongs to the cache kmalloc-16 of size 16
[   31.111557] The buggy address is located 0 bytes inside of
[   31.111557]  allocated 13-byte region [fff00000c7981640, fff00000c798164d)
[   31.112110] 
[   31.112841] The buggy address belongs to the physical page:
[   31.113091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981
[   31.113150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.113200] page_type: f5(slab)
[   31.113250] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.113300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.114497] page dumped because: kasan: bad access detected
[   31.115024] 
[   31.115334] Memory state around the buggy address:
[   31.115555]  fff00000c7981500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.115975]  fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.116762] >fff00000c7981600: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   31.116820]                                               ^
[   31.116857]  fff00000c7981680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.116898]  fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.116935] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   31.075984] ==================================================================
[   31.076051] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   31.076105] Read of size 1 at addr fff00000c91e0600 by task kunit_try_catch/195
[   31.076153] 
[   31.076186] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.076286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.076311] Hardware name: linux,dummy-virt (DT)
[   31.076342] Call trace:
[   31.076378]  show_stack+0x20/0x38 (C)
[   31.076430]  dump_stack_lvl+0x8c/0xd0
[   31.076538]  print_report+0x118/0x5d0
[   31.076643]  kasan_report+0xdc/0x128
[   31.076691]  __kasan_check_byte+0x54/0x70
[   31.076782]  krealloc_noprof+0x44/0x360
[   31.076831]  krealloc_uaf+0x180/0x520
[   31.076887]  kunit_try_run_case+0x170/0x3f0
[   31.076937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.077088]  kthread+0x328/0x630
[   31.077180]  ret_from_fork+0x10/0x20
[   31.077287] 
[   31.077369] Allocated by task 195:
[   31.077400]  kasan_save_stack+0x3c/0x68
[   31.077443]  kasan_save_track+0x20/0x40
[   31.077481]  kasan_save_alloc_info+0x40/0x58
[   31.077517]  __kasan_kmalloc+0xd4/0xd8
[   31.077563]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.077602]  krealloc_uaf+0xc8/0x520
[   31.077638]  kunit_try_run_case+0x170/0x3f0
[   31.077717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.077771]  kthread+0x328/0x630
[   31.077803]  ret_from_fork+0x10/0x20
[   31.077838] 
[   31.077857] Freed by task 195:
[   31.077882]  kasan_save_stack+0x3c/0x68
[   31.077920]  kasan_save_track+0x20/0x40
[   31.077956]  kasan_save_free_info+0x4c/0x78
[   31.077992]  __kasan_slab_free+0x6c/0x98
[   31.078029]  kfree+0x214/0x3c8
[   31.078062]  krealloc_uaf+0x12c/0x520
[   31.078120]  kunit_try_run_case+0x170/0x3f0
[   31.078159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.078225]  kthread+0x328/0x630
[   31.078316]  ret_from_fork+0x10/0x20
[   31.078351] 
[   31.078370] The buggy address belongs to the object at fff00000c91e0600
[   31.078370]  which belongs to the cache kmalloc-256 of size 256
[   31.078473] The buggy address is located 0 bytes inside of
[   31.078473]  freed 256-byte region [fff00000c91e0600, fff00000c91e0700)
[   31.078535] 
[   31.078781] The buggy address belongs to the physical page:
[   31.078949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0
[   31.079015] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.079061] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.079202] page_type: f5(slab)
[   31.079402] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.079499] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   31.079548] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.079595] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   31.080008] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff
[   31.080126] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.080194] page dumped because: kasan: bad access detected
[   31.080276] 
[   31.080361] Memory state around the buggy address:
[   31.080393]  fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.080441]  fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.080482] >fff00000c91e0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.080519]                    ^
[   31.080547]  fff00000c91e0680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.080595]  fff00000c91e0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.080631] ==================================================================
[   31.081987] ==================================================================
[   31.082036] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   31.082084] Read of size 1 at addr fff00000c91e0600 by task kunit_try_catch/195
[   31.082136] 
[   31.082166] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.082278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.082305] Hardware name: linux,dummy-virt (DT)
[   31.082335] Call trace:
[   31.082424]  show_stack+0x20/0x38 (C)
[   31.082538]  dump_stack_lvl+0x8c/0xd0
[   31.082587]  print_report+0x118/0x5d0
[   31.083198]  kasan_report+0xdc/0x128
[   31.083417]  __asan_report_load1_noabort+0x20/0x30
[   31.083498]  krealloc_uaf+0x4c8/0x520
[   31.083737]  kunit_try_run_case+0x170/0x3f0
[   31.083786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.083846]  kthread+0x328/0x630
[   31.083976]  ret_from_fork+0x10/0x20
[   31.084070] 
[   31.084139] Allocated by task 195:
[   31.084224]  kasan_save_stack+0x3c/0x68
[   31.084266]  kasan_save_track+0x20/0x40
[   31.084303]  kasan_save_alloc_info+0x40/0x58
[   31.084339]  __kasan_kmalloc+0xd4/0xd8
[   31.084382]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.084532]  krealloc_uaf+0xc8/0x520
[   31.084892]  kunit_try_run_case+0x170/0x3f0
[   31.085227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.085278]  kthread+0x328/0x630
[   31.085310]  ret_from_fork+0x10/0x20
[   31.085345] 
[   31.085431] Freed by task 195:
[   31.085553]  kasan_save_stack+0x3c/0x68
[   31.085771]  kasan_save_track+0x20/0x40
[   31.085819]  kasan_save_free_info+0x4c/0x78
[   31.085854]  __kasan_slab_free+0x6c/0x98
[   31.085955]  kfree+0x214/0x3c8
[   31.085994]  krealloc_uaf+0x12c/0x520
[   31.086030]  kunit_try_run_case+0x170/0x3f0
[   31.086427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.086474]  kthread+0x328/0x630
[   31.086576]  ret_from_fork+0x10/0x20
[   31.086611] 
[   31.086630] The buggy address belongs to the object at fff00000c91e0600
[   31.086630]  which belongs to the cache kmalloc-256 of size 256
[   31.086945] The buggy address is located 0 bytes inside of
[   31.086945]  freed 256-byte region [fff00000c91e0600, fff00000c91e0700)
[   31.087039] 
[   31.087059] The buggy address belongs to the physical page:
[   31.087109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0
[   31.087279] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.087477] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.087629] page_type: f5(slab)
[   31.087667] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.087716] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   31.087770] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.087818] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   31.087904] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff
[   31.088220] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.088428] page dumped because: kasan: bad access detected
[   31.088459] 
[   31.088477] Memory state around the buggy address:
[   31.088554]  fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.088602]  fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.088644] >fff00000c91e0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.088835]                    ^
[   31.089041]  fff00000c91e0680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.089086]  fff00000c91e0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.089122] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   30.968921] ==================================================================
[   30.969023] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.969102] Write of size 1 at addr fff00000c91e04da by task kunit_try_catch/189
[   30.969181] 
[   30.969278] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.969373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.969422] Hardware name: linux,dummy-virt (DT)
[   30.969452] Call trace:
[   30.969475]  show_stack+0x20/0x38 (C)
[   30.969523]  dump_stack_lvl+0x8c/0xd0
[   30.969787]  print_report+0x118/0x5d0
[   30.969894]  kasan_report+0xdc/0x128
[   30.969995]  __asan_report_store1_noabort+0x20/0x30
[   30.970116]  krealloc_less_oob_helper+0xa80/0xc50
[   30.970194]  krealloc_less_oob+0x20/0x38
[   30.970273]  kunit_try_run_case+0x170/0x3f0
[   30.970531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.970618]  kthread+0x328/0x630
[   30.970677]  ret_from_fork+0x10/0x20
[   30.970754] 
[   30.970782] Allocated by task 189:
[   30.970810]  kasan_save_stack+0x3c/0x68
[   30.970851]  kasan_save_track+0x20/0x40
[   30.970906]  kasan_save_alloc_info+0x40/0x58
[   30.970943]  __kasan_krealloc+0x118/0x178
[   30.970982]  krealloc_noprof+0x128/0x360
[   30.971030]  krealloc_less_oob_helper+0x168/0xc50
[   30.971069]  krealloc_less_oob+0x20/0x38
[   30.971105]  kunit_try_run_case+0x170/0x3f0
[   30.971143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.971202]  kthread+0x328/0x630
[   30.971243]  ret_from_fork+0x10/0x20
[   30.971278] 
[   30.971296] The buggy address belongs to the object at fff00000c91e0400
[   30.971296]  which belongs to the cache kmalloc-256 of size 256
[   30.971351] The buggy address is located 17 bytes to the right of
[   30.971351]  allocated 201-byte region [fff00000c91e0400, fff00000c91e04c9)
[   30.971618] 
[   30.971670] The buggy address belongs to the physical page:
[   30.971711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0
[   30.971804] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.971926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.971995] page_type: f5(slab)
[   30.972032] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.972081] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.972130] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.972271] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.972334] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff
[   30.972459] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.972569] page dumped because: kasan: bad access detected
[   30.972640] 
[   30.972732] Memory state around the buggy address:
[   30.972763]  fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.972804]  fff00000c91e0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.972861] >fff00000c91e0480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.972900]                                                     ^
[   30.973099]  fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.973306]  fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.973416] ==================================================================
[   30.962791] ==================================================================
[   30.962994] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.963060] Write of size 1 at addr fff00000c91e04d0 by task kunit_try_catch/189
[   30.963118] 
[   30.963157] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.963266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.963293] Hardware name: linux,dummy-virt (DT)
[   30.963322] Call trace:
[   30.963353]  show_stack+0x20/0x38 (C)
[   30.963408]  dump_stack_lvl+0x8c/0xd0
[   30.963454]  print_report+0x118/0x5d0
[   30.963587]  kasan_report+0xdc/0x128
[   30.963786]  __asan_report_store1_noabort+0x20/0x30
[   30.963865]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.963924]  krealloc_less_oob+0x20/0x38
[   30.963971]  kunit_try_run_case+0x170/0x3f0
[   30.964045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.964101]  kthread+0x328/0x630
[   30.964142]  ret_from_fork+0x10/0x20
[   30.964189] 
[   30.964322] Allocated by task 189:
[   30.964359]  kasan_save_stack+0x3c/0x68
[   30.964494]  kasan_save_track+0x20/0x40
[   30.964551]  kasan_save_alloc_info+0x40/0x58
[   30.964591]  __kasan_krealloc+0x118/0x178
[   30.964629]  krealloc_noprof+0x128/0x360
[   30.964667]  krealloc_less_oob_helper+0x168/0xc50
[   30.964705]  krealloc_less_oob+0x20/0x38
[   30.964741]  kunit_try_run_case+0x170/0x3f0
[   30.964845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.964923]  kthread+0x328/0x630
[   30.964954]  ret_from_fork+0x10/0x20
[   30.964989] 
[   30.965032] The buggy address belongs to the object at fff00000c91e0400
[   30.965032]  which belongs to the cache kmalloc-256 of size 256
[   30.965091] The buggy address is located 7 bytes to the right of
[   30.965091]  allocated 201-byte region [fff00000c91e0400, fff00000c91e04c9)
[   30.965152] 
[   30.965170] The buggy address belongs to the physical page:
[   30.965200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0
[   30.965268] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.965314] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.965362] page_type: f5(slab)
[   30.965399] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.965585] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.965719] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.965788] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.965859] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff
[   30.965929] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.966019] page dumped because: kasan: bad access detected
[   30.966080] 
[   30.966131] Memory state around the buggy address:
[   30.966168]  fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.966246]  fff00000c91e0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.966287] >fff00000c91e0480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.966565]                                                  ^
[   30.966653]  fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.966738]  fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.966786] ==================================================================
[   31.010740] ==================================================================
[   31.010794] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   31.010846] Write of size 1 at addr fff00000c9a2a0c9 by task kunit_try_catch/193
[   31.010894] 
[   31.010926] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.011006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.011032] Hardware name: linux,dummy-virt (DT)
[   31.011063] Call trace:
[   31.011085]  show_stack+0x20/0x38 (C)
[   31.011133]  dump_stack_lvl+0x8c/0xd0
[   31.011180]  print_report+0x118/0x5d0
[   31.011254]  kasan_report+0xdc/0x128
[   31.011300]  __asan_report_store1_noabort+0x20/0x30
[   31.011348]  krealloc_less_oob_helper+0xa48/0xc50
[   31.011396]  krealloc_large_less_oob+0x20/0x38
[   31.011443]  kunit_try_run_case+0x170/0x3f0
[   31.011492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.011545]  kthread+0x328/0x630
[   31.011586]  ret_from_fork+0x10/0x20
[   31.013292] 
[   31.013328] The buggy address belongs to the physical page:
[   31.013361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28
[   31.013416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.013716] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.013771] page_type: f8(unknown)
[   31.014313] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.014364] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.014412] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.014459] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.014510] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff
[   31.014558] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.014597] page dumped because: kasan: bad access detected
[   31.014628] 
[   31.014646] Memory state around the buggy address:
[   31.014676]  fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.014718]  fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.014757] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.014793]                                               ^
[   31.014826]  fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.014866]  fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.014903] ==================================================================
[   31.021434] ==================================================================
[   31.021527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   31.021577] Write of size 1 at addr fff00000c9a2a0d0 by task kunit_try_catch/193
[   31.021625] 
[   31.022438] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.022619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.022647] Hardware name: linux,dummy-virt (DT)
[   31.023659] Call trace:
[   31.023876]  show_stack+0x20/0x38 (C)
[   31.024124]  dump_stack_lvl+0x8c/0xd0
[   31.024175]  print_report+0x118/0x5d0
[   31.024233]  kasan_report+0xdc/0x128
[   31.024280]  __asan_report_store1_noabort+0x20/0x30
[   31.025509]  krealloc_less_oob_helper+0xb9c/0xc50
[   31.025855]  krealloc_large_less_oob+0x20/0x38
[   31.026635]  kunit_try_run_case+0x170/0x3f0
[   31.026699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.027122]  kthread+0x328/0x630
[   31.027734]  ret_from_fork+0x10/0x20
[   31.028698] 
[   31.029060] The buggy address belongs to the physical page:
[   31.029228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28
[   31.029741] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.029978] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.030545] page_type: f8(unknown)
[   31.030781] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.031052] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.031519] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.031608] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.032101] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff
[   31.032160] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.032199] page dumped because: kasan: bad access detected
[   31.032241] 
[   31.032259] Memory state around the buggy address:
[   31.032290]  fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.032331]  fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.032377] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.032415]                                                  ^
[   31.032451]  fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.032491]  fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.032528] ==================================================================
[   31.035146] ==================================================================
[   31.035645] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   31.036518] Write of size 1 at addr fff00000c9a2a0da by task kunit_try_catch/193
[   31.037009] 
[   31.037231] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.037471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.037528] Hardware name: linux,dummy-virt (DT)
[   31.037560] Call trace:
[   31.037583]  show_stack+0x20/0x38 (C)
[   31.037750]  dump_stack_lvl+0x8c/0xd0
[   31.037822]  print_report+0x118/0x5d0
[   31.038268]  kasan_report+0xdc/0x128
[   31.038548]  __asan_report_store1_noabort+0x20/0x30
[   31.038739]  krealloc_less_oob_helper+0xa80/0xc50
[   31.038952]  krealloc_large_less_oob+0x20/0x38
[   31.039001]  kunit_try_run_case+0x170/0x3f0
[   31.039052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.039104]  kthread+0x328/0x630
[   31.039322]  ret_from_fork+0x10/0x20
[   31.039665] 
[   31.039689] The buggy address belongs to the physical page:
[   31.040036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28
[   31.040478] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.040593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.040908] page_type: f8(unknown)
[   31.040948] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.040997] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.041045] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.041479] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.041570] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff
[   31.041771] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.042067] page dumped because: kasan: bad access detected
[   31.042104] 
[   31.042251] Memory state around the buggy address:
[   31.042284]  fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.042538]  fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.042853] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.042893]                                                     ^
[   31.042930]  fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.042971]  fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.043007] ==================================================================
[   30.958390] ==================================================================
[   30.958444] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.958515] Write of size 1 at addr fff00000c91e04c9 by task kunit_try_catch/189
[   30.958581] 
[   30.958613] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.958804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.958838] Hardware name: linux,dummy-virt (DT)
[   30.959017] Call trace:
[   30.959100]  show_stack+0x20/0x38 (C)
[   30.959155]  dump_stack_lvl+0x8c/0xd0
[   30.959202]  print_report+0x118/0x5d0
[   30.959261]  kasan_report+0xdc/0x128
[   30.959306]  __asan_report_store1_noabort+0x20/0x30
[   30.959362]  krealloc_less_oob_helper+0xa48/0xc50
[   30.959420]  krealloc_less_oob+0x20/0x38
[   30.959467]  kunit_try_run_case+0x170/0x3f0
[   30.959525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.959578]  kthread+0x328/0x630
[   30.959619]  ret_from_fork+0x10/0x20
[   30.959672] 
[   30.959691] Allocated by task 189:
[   30.959718]  kasan_save_stack+0x3c/0x68
[   30.959759]  kasan_save_track+0x20/0x40
[   30.959804]  kasan_save_alloc_info+0x40/0x58
[   30.959841]  __kasan_krealloc+0x118/0x178
[   30.959884]  krealloc_noprof+0x128/0x360
[   30.959922]  krealloc_less_oob_helper+0x168/0xc50
[   30.959978]  krealloc_less_oob+0x20/0x38
[   30.960015]  kunit_try_run_case+0x170/0x3f0
[   30.960062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.960105]  kthread+0x328/0x630
[   30.960137]  ret_from_fork+0x10/0x20
[   30.960171] 
[   30.960190] The buggy address belongs to the object at fff00000c91e0400
[   30.960190]  which belongs to the cache kmalloc-256 of size 256
[   30.960665] The buggy address is located 0 bytes to the right of
[   30.960665]  allocated 201-byte region [fff00000c91e0400, fff00000c91e04c9)
[   30.960768] 
[   30.960790] The buggy address belongs to the physical page:
[   30.960859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0
[   30.960916] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.961066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.961194] page_type: f5(slab)
[   30.961244] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.961415] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.961517] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.961577] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.961639] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff
[   30.961688] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.961751] page dumped because: kasan: bad access detected
[   30.961781] 
[   30.961798] Memory state around the buggy address:
[   30.961829]  fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.961981]  fff00000c91e0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.962064] >fff00000c91e0480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.962127]                                               ^
[   30.962188]  fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.962263]  fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.962323] ==================================================================
[   30.978698] ==================================================================
[   30.978864] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.978920] Write of size 1 at addr fff00000c91e04eb by task kunit_try_catch/189
[   30.979122] 
[   30.979219] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.979313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.979410] Hardware name: linux,dummy-virt (DT)
[   30.979479] Call trace:
[   30.979508]  show_stack+0x20/0x38 (C)
[   30.979558]  dump_stack_lvl+0x8c/0xd0
[   30.979613]  print_report+0x118/0x5d0
[   30.979660]  kasan_report+0xdc/0x128
[   30.979714]  __asan_report_store1_noabort+0x20/0x30
[   30.979770]  krealloc_less_oob_helper+0xa58/0xc50
[   30.979904]  krealloc_less_oob+0x20/0x38
[   30.979958]  kunit_try_run_case+0x170/0x3f0
[   30.980006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.980120]  kthread+0x328/0x630
[   30.980182]  ret_from_fork+0x10/0x20
[   30.980305] 
[   30.980366] Allocated by task 189:
[   30.980396]  kasan_save_stack+0x3c/0x68
[   30.980569]  kasan_save_track+0x20/0x40
[   30.980735]  kasan_save_alloc_info+0x40/0x58
[   30.980891]  __kasan_krealloc+0x118/0x178
[   30.980972]  krealloc_noprof+0x128/0x360
[   30.981046]  krealloc_less_oob_helper+0x168/0xc50
[   30.981129]  krealloc_less_oob+0x20/0x38
[   30.981186]  kunit_try_run_case+0x170/0x3f0
[   30.981235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.981279]  kthread+0x328/0x630
[   30.981310]  ret_from_fork+0x10/0x20
[   30.981347] 
[   30.981366] The buggy address belongs to the object at fff00000c91e0400
[   30.981366]  which belongs to the cache kmalloc-256 of size 256
[   30.981422] The buggy address is located 34 bytes to the right of
[   30.981422]  allocated 201-byte region [fff00000c91e0400, fff00000c91e04c9)
[   30.981483] 
[   30.981503] The buggy address belongs to the physical page:
[   30.981532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0
[   30.981914] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.981983] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.982071] page_type: f5(slab)
[   30.982160] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.982235] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.982334] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.982381] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.982450] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff
[   30.982628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.982690] page dumped because: kasan: bad access detected
[   30.982787] 
[   30.982839] Memory state around the buggy address:
[   30.982972]  fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.983017]  fff00000c91e0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.983064] >fff00000c91e0480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.983122]                                                           ^
[   30.983361]  fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.983482]  fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.983585] ==================================================================
[   31.052816] ==================================================================
[   31.052861] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   31.053283] Write of size 1 at addr fff00000c9a2a0eb by task kunit_try_catch/193
[   31.053562] 
[   31.053802] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.054307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.054350] Hardware name: linux,dummy-virt (DT)
[   31.054381] Call trace:
[   31.054416]  show_stack+0x20/0x38 (C)
[   31.054568]  dump_stack_lvl+0x8c/0xd0
[   31.054842]  print_report+0x118/0x5d0
[   31.054899]  kasan_report+0xdc/0x128
[   31.055283]  __asan_report_store1_noabort+0x20/0x30
[   31.055379]  krealloc_less_oob_helper+0xa58/0xc50
[   31.055428]  krealloc_large_less_oob+0x20/0x38
[   31.055475]  kunit_try_run_case+0x170/0x3f0
[   31.055522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.055575]  kthread+0x328/0x630
[   31.055617]  ret_from_fork+0x10/0x20
[   31.055663] 
[   31.055682] The buggy address belongs to the physical page:
[   31.056494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28
[   31.056634] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.056907] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.057157] page_type: f8(unknown)
[   31.057201] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.057322] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.057370] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.057416] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.057463] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff
[   31.057549] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.057648] page dumped because: kasan: bad access detected
[   31.057679] 
[   31.057739] Memory state around the buggy address:
[   31.057800]  fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.058153]  fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.058482] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.058531]                                                           ^
[   31.058654]  fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.058946]  fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.058983] ==================================================================
[   31.044595] ==================================================================
[   31.044642] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   31.044690] Write of size 1 at addr fff00000c9a2a0ea by task kunit_try_catch/193
[   31.044739] 
[   31.044767] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.044848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.044873] Hardware name: linux,dummy-virt (DT)
[   31.045005] Call trace:
[   31.045176]  show_stack+0x20/0x38 (C)
[   31.045875]  dump_stack_lvl+0x8c/0xd0
[   31.046086]  print_report+0x118/0x5d0
[   31.046174]  kasan_report+0xdc/0x128
[   31.046231]  __asan_report_store1_noabort+0x20/0x30
[   31.046279]  krealloc_less_oob_helper+0xae4/0xc50
[   31.046568]  krealloc_large_less_oob+0x20/0x38
[   31.046739]  kunit_try_run_case+0x170/0x3f0
[   31.046909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.047309]  kthread+0x328/0x630
[   31.047622]  ret_from_fork+0x10/0x20
[   31.047948] 
[   31.047977] The buggy address belongs to the physical page:
[   31.048068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28
[   31.048397] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.048604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.049100] page_type: f8(unknown)
[   31.049152] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.049310] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.049362] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.049747] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.049911] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff
[   31.050007] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.050052] page dumped because: kasan: bad access detected
[   31.050083] 
[   31.050528] Memory state around the buggy address:
[   31.050579]  fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.050624]  fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.050665] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.050701]                                                           ^
[   31.051476]  fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.051754]  fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.052132] ==================================================================
[   30.974536] ==================================================================
[   30.974773] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.974831] Write of size 1 at addr fff00000c91e04ea by task kunit_try_catch/189
[   30.974899] 
[   30.974937] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.975029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.975056] Hardware name: linux,dummy-virt (DT)
[   30.975085] Call trace:
[   30.975115]  show_stack+0x20/0x38 (C)
[   30.975164]  dump_stack_lvl+0x8c/0xd0
[   30.975221]  print_report+0x118/0x5d0
[   30.975357]  kasan_report+0xdc/0x128
[   30.975510]  __asan_report_store1_noabort+0x20/0x30
[   30.975637]  krealloc_less_oob_helper+0xae4/0xc50
[   30.975707]  krealloc_less_oob+0x20/0x38
[   30.975754]  kunit_try_run_case+0x170/0x3f0
[   30.975819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.975873]  kthread+0x328/0x630
[   30.975923]  ret_from_fork+0x10/0x20
[   30.975970] 
[   30.975988] Allocated by task 189:
[   30.976021]  kasan_save_stack+0x3c/0x68
[   30.976143]  kasan_save_track+0x20/0x40
[   30.976188]  kasan_save_alloc_info+0x40/0x58
[   30.976235]  __kasan_krealloc+0x118/0x178
[   30.976273]  krealloc_noprof+0x128/0x360
[   30.976310]  krealloc_less_oob_helper+0x168/0xc50
[   30.976348]  krealloc_less_oob+0x20/0x38
[   30.976384]  kunit_try_run_case+0x170/0x3f0
[   30.976421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.976592]  kthread+0x328/0x630
[   30.976708]  ret_from_fork+0x10/0x20
[   30.976783] 
[   30.976848] The buggy address belongs to the object at fff00000c91e0400
[   30.976848]  which belongs to the cache kmalloc-256 of size 256
[   30.976928] The buggy address is located 33 bytes to the right of
[   30.976928]  allocated 201-byte region [fff00000c91e0400, fff00000c91e04c9)
[   30.977011] 
[   30.977031] The buggy address belongs to the physical page:
[   30.977061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0
[   30.977115] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.977161] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.977574] page_type: f5(slab)
[   30.977645] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.977729] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.977835] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.977882] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.977930] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff
[   30.977983] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.978041] page dumped because: kasan: bad access detected
[   30.978076] 
[   30.978118] Memory state around the buggy address:
[   30.978150]  fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.978199]  fff00000c91e0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.978250] >fff00000c91e0480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.978287]                                                           ^
[   30.978323]  fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.978373]  fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.978409] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   30.988344] ==================================================================
[   30.988461] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.988670] Write of size 1 at addr fff00000c9a2a0eb by task kunit_try_catch/191
[   30.988884] 
[   30.988944] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.989114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.989154] Hardware name: linux,dummy-virt (DT)
[   30.989186] Call trace:
[   30.989228]  show_stack+0x20/0x38 (C)
[   30.989298]  dump_stack_lvl+0x8c/0xd0
[   30.989387]  print_report+0x118/0x5d0
[   30.989511]  kasan_report+0xdc/0x128
[   30.989608]  __asan_report_store1_noabort+0x20/0x30
[   30.989664]  krealloc_more_oob_helper+0x60c/0x678
[   30.989861]  krealloc_large_more_oob+0x20/0x38
[   30.989915]  kunit_try_run_case+0x170/0x3f0
[   30.989965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.990624]  kthread+0x328/0x630
[   30.990676]  ret_from_fork+0x10/0x20
[   30.991130] 
[   30.991678] The buggy address belongs to the physical page:
[   30.991964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28
[   30.992347] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.992484] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.992545] page_type: f8(unknown)
[   30.992592] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.992644] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.993200] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.993911] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.994335] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff
[   30.994930] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.995010] page dumped because: kasan: bad access detected
[   30.995042] 
[   30.995366] Memory state around the buggy address:
[   30.995752]  fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.996180]  fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.996911] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.996961]                                                           ^
[   30.997381]  fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.997595]  fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.998076] ==================================================================
[   30.943607] ==================================================================
[   30.943662] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.943714] Write of size 1 at addr fff00000c91e02eb by task kunit_try_catch/187
[   30.944048] 
[   30.944137] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.944237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.944274] Hardware name: linux,dummy-virt (DT)
[   30.944304] Call trace:
[   30.944327]  show_stack+0x20/0x38 (C)
[   30.944385]  dump_stack_lvl+0x8c/0xd0
[   30.944432]  print_report+0x118/0x5d0
[   30.944478]  kasan_report+0xdc/0x128
[   30.944532]  __asan_report_store1_noabort+0x20/0x30
[   30.944619]  krealloc_more_oob_helper+0x60c/0x678
[   30.944683]  krealloc_more_oob+0x20/0x38
[   30.944729]  kunit_try_run_case+0x170/0x3f0
[   30.944779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.944832]  kthread+0x328/0x630
[   30.944873]  ret_from_fork+0x10/0x20
[   30.945049] 
[   30.945096] Allocated by task 187:
[   30.945246]  kasan_save_stack+0x3c/0x68
[   30.945317]  kasan_save_track+0x20/0x40
[   30.945365]  kasan_save_alloc_info+0x40/0x58
[   30.945418]  __kasan_krealloc+0x118/0x178
[   30.945489]  krealloc_noprof+0x128/0x360
[   30.945608]  krealloc_more_oob_helper+0x168/0x678
[   30.945679]  krealloc_more_oob+0x20/0x38
[   30.945745]  kunit_try_run_case+0x170/0x3f0
[   30.945783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.945839]  kthread+0x328/0x630
[   30.945900]  ret_from_fork+0x10/0x20
[   30.946033] 
[   30.946075] The buggy address belongs to the object at fff00000c91e0200
[   30.946075]  which belongs to the cache kmalloc-256 of size 256
[   30.946143] The buggy address is located 0 bytes to the right of
[   30.946143]  allocated 235-byte region [fff00000c91e0200, fff00000c91e02eb)
[   30.946404] 
[   30.946509] The buggy address belongs to the physical page:
[   30.946666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0
[   30.946788] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.946869] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.946948] page_type: f5(slab)
[   30.947065] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.947133] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.947227] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.947336] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.947413] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff
[   30.947461] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.947682] page dumped because: kasan: bad access detected
[   30.947849] 
[   30.947891] Memory state around the buggy address:
[   30.947997]  fff00000c91e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.948062]  fff00000c91e0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.948129] >fff00000c91e0280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.948165]                                                           ^
[   30.948494]  fff00000c91e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.948632]  fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.948774] ==================================================================
[   31.003890] ==================================================================
[   31.003943] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   31.003996] Write of size 1 at addr fff00000c9a2a0f0 by task kunit_try_catch/191
[   31.004046] 
[   31.004077] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.004157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.004183] Hardware name: linux,dummy-virt (DT)
[   31.004228] Call trace:
[   31.004250]  show_stack+0x20/0x38 (C)
[   31.004296]  dump_stack_lvl+0x8c/0xd0
[   31.004343]  print_report+0x118/0x5d0
[   31.004389]  kasan_report+0xdc/0x128
[   31.004435]  __asan_report_store1_noabort+0x20/0x30
[   31.004482]  krealloc_more_oob_helper+0x5c0/0x678
[   31.004530]  krealloc_large_more_oob+0x20/0x38
[   31.004592]  kunit_try_run_case+0x170/0x3f0
[   31.004640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.004693]  kthread+0x328/0x630
[   31.004733]  ret_from_fork+0x10/0x20
[   31.004780] 
[   31.004799] The buggy address belongs to the physical page:
[   31.004829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28
[   31.004880] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.004926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.004977] page_type: f8(unknown)
[   31.005014] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.005062] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.005109] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.005156] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.005203] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff
[   31.006436] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.006477] page dumped because: kasan: bad access detected
[   31.006508] 
[   31.006527] Memory state around the buggy address:
[   31.006558]  fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.006601]  fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.006732] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   31.007616]                                                              ^
[   31.007670]  fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.007715]  fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.007752] ==================================================================
[   30.949700] ==================================================================
[   30.949747] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.949794] Write of size 1 at addr fff00000c91e02f0 by task kunit_try_catch/187
[   30.949842] 
[   30.949870] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.950188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.950240] Hardware name: linux,dummy-virt (DT)
[   30.950289] Call trace:
[   30.950345]  show_stack+0x20/0x38 (C)
[   30.950413]  dump_stack_lvl+0x8c/0xd0
[   30.950504]  print_report+0x118/0x5d0
[   30.950551]  kasan_report+0xdc/0x128
[   30.950597]  __asan_report_store1_noabort+0x20/0x30
[   30.950644]  krealloc_more_oob_helper+0x5c0/0x678
[   30.950700]  krealloc_more_oob+0x20/0x38
[   30.950767]  kunit_try_run_case+0x170/0x3f0
[   30.950826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.950879]  kthread+0x328/0x630
[   30.950938]  ret_from_fork+0x10/0x20
[   30.951032] 
[   30.951050] Allocated by task 187:
[   30.951078]  kasan_save_stack+0x3c/0x68
[   30.951117]  kasan_save_track+0x20/0x40
[   30.951154]  kasan_save_alloc_info+0x40/0x58
[   30.951190]  __kasan_krealloc+0x118/0x178
[   30.951238]  krealloc_noprof+0x128/0x360
[   30.951380]  krealloc_more_oob_helper+0x168/0x678
[   30.951422]  krealloc_more_oob+0x20/0x38
[   30.951457]  kunit_try_run_case+0x170/0x3f0
[   30.951495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.951658]  kthread+0x328/0x630
[   30.951703]  ret_from_fork+0x10/0x20
[   30.951796] 
[   30.951825] The buggy address belongs to the object at fff00000c91e0200
[   30.951825]  which belongs to the cache kmalloc-256 of size 256
[   30.951883] The buggy address is located 5 bytes to the right of
[   30.951883]  allocated 235-byte region [fff00000c91e0200, fff00000c91e02eb)
[   30.951956] 
[   30.951975] The buggy address belongs to the physical page:
[   30.952005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0
[   30.952059] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.952105] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.952154] page_type: f5(slab)
[   30.952190] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.952249] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.952297] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.952344] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000
[   30.952391] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff
[   30.952437] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.952484] page dumped because: kasan: bad access detected
[   30.952522] 
[   30.952573] Memory state around the buggy address:
[   30.952608]  fff00000c91e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.952651]  fff00000c91e0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.952692] >fff00000c91e0280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.952727]                                                              ^
[   30.952984]  fff00000c91e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.953049]  fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.953104] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   30.935757] ==================================================================
[   30.935830] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   30.935888] Read of size 1 at addr fff00000c9ae0000 by task kunit_try_catch/185
[   30.935939] 
[   30.935979] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.936062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.936088] Hardware name: linux,dummy-virt (DT)
[   30.936429] Call trace:
[   30.936493]  show_stack+0x20/0x38 (C)
[   30.936601]  dump_stack_lvl+0x8c/0xd0
[   30.936680]  print_report+0x118/0x5d0
[   30.936761]  kasan_report+0xdc/0x128
[   30.936832]  __asan_report_load1_noabort+0x20/0x30
[   30.936907]  page_alloc_uaf+0x328/0x350
[   30.937005]  kunit_try_run_case+0x170/0x3f0
[   30.937095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.937181]  kthread+0x328/0x630
[   30.937260]  ret_from_fork+0x10/0x20
[   30.937352] 
[   30.937399] The buggy address belongs to the physical page:
[   30.937463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae0
[   30.937534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.937581] page_type: f0(buddy)
[   30.937618] raw: 0bfffe0000000000 fff00000ff616148 fff00000ff616148 0000000000000000
[   30.937666] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   30.937705] page dumped because: kasan: bad access detected
[   30.937734] 
[   30.937752] Memory state around the buggy address:
[   30.937997]  fff00000c9adff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.938053]  fff00000c9adff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.938112] >fff00000c9ae0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.938251]                    ^
[   30.938304]  fff00000c9ae0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.938397]  fff00000c9ae0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.938459] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   30.923440] ==================================================================
[   30.923525] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   30.923588] Free of addr fff00000c9a24001 by task kunit_try_catch/181
[   30.923631] 
[   30.923661] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.923783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.923943] Hardware name: linux,dummy-virt (DT)
[   30.923993] Call trace:
[   30.924045]  show_stack+0x20/0x38 (C)
[   30.924126]  dump_stack_lvl+0x8c/0xd0
[   30.924174]  print_report+0x118/0x5d0
[   30.924242]  kasan_report_invalid_free+0xc0/0xe8
[   30.924293]  __kasan_kfree_large+0x5c/0xa8
[   30.924340]  free_large_kmalloc+0x68/0x150
[   30.924386]  kfree+0x270/0x3c8
[   30.924428]  kmalloc_large_invalid_free+0x108/0x270
[   30.924476]  kunit_try_run_case+0x170/0x3f0
[   30.924525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.924595]  kthread+0x328/0x630
[   30.924637]  ret_from_fork+0x10/0x20
[   30.924787] 
[   30.924839] The buggy address belongs to the physical page:
[   30.924933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a24
[   30.925013] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.925127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.925223] page_type: f8(unknown)
[   30.925262] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.925335] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.925603] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.925658] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.925705] head: 0bfffe0000000002 ffffc1ffc3268901 00000000ffffffff 00000000ffffffff
[   30.925752] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.925790] page dumped because: kasan: bad access detected
[   30.925820] 
[   30.925837] Memory state around the buggy address:
[   30.925867]  fff00000c9a23f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.925943]  fff00000c9a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.926003] >fff00000c9a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.926071]                    ^
[   30.926099]  fff00000c9a24080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.926146]  fff00000c9a24100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.926235] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   30.915688] ==================================================================
[   30.915771] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   30.915823] Read of size 1 at addr fff00000c9a24000 by task kunit_try_catch/179
[   30.915870] 
[   30.915906] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.915988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.916024] Hardware name: linux,dummy-virt (DT)
[   30.916054] Call trace:
[   30.916077]  show_stack+0x20/0x38 (C)
[   30.916122]  dump_stack_lvl+0x8c/0xd0
[   30.916168]  print_report+0x118/0x5d0
[   30.916324]  kasan_report+0xdc/0x128
[   30.916381]  __asan_report_load1_noabort+0x20/0x30
[   30.916438]  kmalloc_large_uaf+0x2cc/0x2f8
[   30.916484]  kunit_try_run_case+0x170/0x3f0
[   30.916579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.916697]  kthread+0x328/0x630
[   30.916741]  ret_from_fork+0x10/0x20
[   30.916798] 
[   30.916825] The buggy address belongs to the physical page:
[   30.916855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a24
[   30.916905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.916964] raw: 0bfffe0000000000 ffffc1ffc3268a08 fff00000da45cc40 0000000000000000
[   30.917012] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   30.917050] page dumped because: kasan: bad access detected
[   30.917080] 
[   30.917098] Memory state around the buggy address:
[   30.917127]  fff00000c9a23f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.917168]  fff00000c9a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.917220] >fff00000c9a24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.917256]                    ^
[   30.917308]  fff00000c9a24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.917349]  fff00000c9a24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.917384] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   30.909359] ==================================================================
[   30.909434] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   30.909494] Write of size 1 at addr fff00000c9a2600a by task kunit_try_catch/177
[   30.909543] 
[   30.909583] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.909668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.909702] Hardware name: linux,dummy-virt (DT)
[   30.909740] Call trace:
[   30.909769]  show_stack+0x20/0x38 (C)
[   30.909816]  dump_stack_lvl+0x8c/0xd0
[   30.909868]  print_report+0x118/0x5d0
[   30.909925]  kasan_report+0xdc/0x128
[   30.909971]  __asan_report_store1_noabort+0x20/0x30
[   30.910032]  kmalloc_large_oob_right+0x278/0x2b8
[   30.910080]  kunit_try_run_case+0x170/0x3f0
[   30.910128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.910180]  kthread+0x328/0x630
[   30.910234]  ret_from_fork+0x10/0x20
[   30.910281] 
[   30.910314] The buggy address belongs to the physical page:
[   30.910345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a24
[   30.910395] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.910439] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.910494] page_type: f8(unknown)
[   30.910532] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.910579] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.910626] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.910817] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.910886] head: 0bfffe0000000002 ffffc1ffc3268901 00000000ffffffff 00000000ffffffff
[   30.910944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.910992] page dumped because: kasan: bad access detected
[   30.911047] 
[   30.911066] Memory state around the buggy address:
[   30.911107]  fff00000c9a25f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.911155]  fff00000c9a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.911196] >fff00000c9a26000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.911256]                       ^
[   30.911293]  fff00000c9a26080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.911333]  fff00000c9a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.911586] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   30.901870] ==================================================================
[   30.901929] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   30.901976] Write of size 1 at addr fff00000c6455f00 by task kunit_try_catch/175
[   30.902023] 
[   30.902065] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.902149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.902174] Hardware name: linux,dummy-virt (DT)
[   30.902203] Call trace:
[   30.902248]  show_stack+0x20/0x38 (C)
[   30.902295]  dump_stack_lvl+0x8c/0xd0
[   30.902341]  print_report+0x118/0x5d0
[   30.902386]  kasan_report+0xdc/0x128
[   30.902439]  __asan_report_store1_noabort+0x20/0x30
[   30.902487]  kmalloc_big_oob_right+0x2a4/0x2f0
[   30.902534]  kunit_try_run_case+0x170/0x3f0
[   30.902631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.902702]  kthread+0x328/0x630
[   30.902749]  ret_from_fork+0x10/0x20
[   30.902796] 
[   30.902813] Allocated by task 175:
[   30.902840]  kasan_save_stack+0x3c/0x68
[   30.902880]  kasan_save_track+0x20/0x40
[   30.902917]  kasan_save_alloc_info+0x40/0x58
[   30.902953]  __kasan_kmalloc+0xd4/0xd8
[   30.902990]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.903029]  kmalloc_big_oob_right+0xb8/0x2f0
[   30.903066]  kunit_try_run_case+0x170/0x3f0
[   30.903103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.903272]  kthread+0x328/0x630
[   30.903333]  ret_from_fork+0x10/0x20
[   30.903370] 
[   30.903389] The buggy address belongs to the object at fff00000c6454000
[   30.903389]  which belongs to the cache kmalloc-8k of size 8192
[   30.903467] The buggy address is located 0 bytes to the right of
[   30.903467]  allocated 7936-byte region [fff00000c6454000, fff00000c6455f00)
[   30.903538] 
[   30.903567] The buggy address belongs to the physical page:
[   30.903605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106450
[   30.903655] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.903700] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.903748] page_type: f5(slab)
[   30.903784] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.903840] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.903888] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.903935] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.903981] head: 0bfffe0000000003 ffffc1ffc3191401 00000000ffffffff 00000000ffffffff
[   30.904027] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.904064] page dumped because: kasan: bad access detected
[   30.904094] 
[   30.904112] Memory state around the buggy address:
[   30.904152]  fff00000c6455e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.904192]  fff00000c6455e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.904244] >fff00000c6455f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.904279]                    ^
[   30.904305]  fff00000c6455f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.904344]  fff00000c6456000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.904380] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   30.890889] ==================================================================
[   30.890936] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   30.893442] Write of size 1 at addr fff00000c9a9c178 by task kunit_try_catch/173
[   30.893544] 
[   30.893862] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.894261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.894322] Hardware name: linux,dummy-virt (DT)
[   30.894382] Call trace:
[   30.894432]  show_stack+0x20/0x38 (C)
[   30.894594]  dump_stack_lvl+0x8c/0xd0
[   30.894678]  print_report+0x118/0x5d0
[   30.895057]  kasan_report+0xdc/0x128
[   30.895150]  __asan_report_store1_noabort+0x20/0x30
[   30.895306]  kmalloc_track_caller_oob_right+0x418/0x488
[   30.895407]  kunit_try_run_case+0x170/0x3f0
[   30.895547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.895813]  kthread+0x328/0x630
[   30.895868]  ret_from_fork+0x10/0x20
[   30.896063] 
[   30.896103] Allocated by task 173:
[   30.896166]  kasan_save_stack+0x3c/0x68
[   30.896260]  kasan_save_track+0x20/0x40
[   30.896323]  kasan_save_alloc_info+0x40/0x58
[   30.896440]  __kasan_kmalloc+0xd4/0xd8
[   30.896501]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.896545]  kmalloc_track_caller_oob_right+0x184/0x488
[   30.896593]  kunit_try_run_case+0x170/0x3f0
[   30.896650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.896717]  kthread+0x328/0x630
[   30.896827]  ret_from_fork+0x10/0x20
[   30.896888] 
[   30.896930] The buggy address belongs to the object at fff00000c9a9c100
[   30.896930]  which belongs to the cache kmalloc-128 of size 128
[   30.897025] The buggy address is located 0 bytes to the right of
[   30.897025]  allocated 120-byte region [fff00000c9a9c100, fff00000c9a9c178)
[   30.897088] 
[   30.897119] The buggy address belongs to the physical page:
[   30.897152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   30.897202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.897257] page_type: f5(slab)
[   30.897294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.897343] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.897381] page dumped because: kasan: bad access detected
[   30.897411] 
[   30.897428] Memory state around the buggy address:
[   30.897458]  fff00000c9a9c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.897603]  fff00000c9a9c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.897647] >fff00000c9a9c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.897736]                                                                 ^
[   30.897806]  fff00000c9a9c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.897854]  fff00000c9a9c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.897954] ==================================================================
[   30.881002] ==================================================================
[   30.881192] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   30.881323] Write of size 1 at addr fff00000c9a9c078 by task kunit_try_catch/173
[   30.881440] 
[   30.881472] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.881557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.881583] Hardware name: linux,dummy-virt (DT)
[   30.881614] Call trace:
[   30.881644]  show_stack+0x20/0x38 (C)
[   30.881747]  dump_stack_lvl+0x8c/0xd0
[   30.881886]  print_report+0x118/0x5d0
[   30.881934]  kasan_report+0xdc/0x128
[   30.881980]  __asan_report_store1_noabort+0x20/0x30
[   30.882028]  kmalloc_track_caller_oob_right+0x40c/0x488
[   30.882084]  kunit_try_run_case+0x170/0x3f0
[   30.882292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.882346]  kthread+0x328/0x630
[   30.882387]  ret_from_fork+0x10/0x20
[   30.882434] 
[   30.882453] Allocated by task 173:
[   30.882479]  kasan_save_stack+0x3c/0x68
[   30.882519]  kasan_save_track+0x20/0x40
[   30.882560]  kasan_save_alloc_info+0x40/0x58
[   30.882599]  __kasan_kmalloc+0xd4/0xd8
[   30.882635]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.882678]  kmalloc_track_caller_oob_right+0xa8/0x488
[   30.882719]  kunit_try_run_case+0x170/0x3f0
[   30.882756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.882798]  kthread+0x328/0x630
[   30.882829]  ret_from_fork+0x10/0x20
[   30.882864] 
[   30.882882] The buggy address belongs to the object at fff00000c9a9c000
[   30.882882]  which belongs to the cache kmalloc-128 of size 128
[   30.882937] The buggy address is located 0 bytes to the right of
[   30.882937]  allocated 120-byte region [fff00000c9a9c000, fff00000c9a9c078)
[   30.882997] 
[   30.883020] The buggy address belongs to the physical page:
[   30.883048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   30.883106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.884498] page_type: f5(slab)
[   30.885350] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.886529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.886591] page dumped because: kasan: bad access detected
[   30.886712] 
[   30.886796] Memory state around the buggy address:
[   30.887506]  fff00000c9a9bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.887729]  fff00000c9a9bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.887771] >fff00000c9a9c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.888074]                                                                 ^
[   30.888291]  fff00000c9a9c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.888420]  fff00000c9a9c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.888472] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   30.867241] ==================================================================
[   30.867592] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   30.867834] Read of size 1 at addr fff00000c999f000 by task kunit_try_catch/171
[   30.867886] 
[   30.867919] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.868403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.868518] Hardware name: linux,dummy-virt (DT)
[   30.868711] Call trace:
[   30.868736]  show_stack+0x20/0x38 (C)
[   30.868787]  dump_stack_lvl+0x8c/0xd0
[   30.868833]  print_report+0x118/0x5d0
[   30.868903]  kasan_report+0xdc/0x128
[   30.868950]  __asan_report_load1_noabort+0x20/0x30
[   30.869023]  kmalloc_node_oob_right+0x2f4/0x330
[   30.869172]  kunit_try_run_case+0x170/0x3f0
[   30.869238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.869291]  kthread+0x328/0x630
[   30.869332]  ret_from_fork+0x10/0x20
[   30.869379] 
[   30.869397] Allocated by task 171:
[   30.869425]  kasan_save_stack+0x3c/0x68
[   30.869465]  kasan_save_track+0x20/0x40
[   30.869504]  kasan_save_alloc_info+0x40/0x58
[   30.869998]  __kasan_kmalloc+0xd4/0xd8
[   30.870123]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   30.870166]  kmalloc_node_oob_right+0xbc/0x330
[   30.870474]  kunit_try_run_case+0x170/0x3f0
[   30.870600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.870706]  kthread+0x328/0x630
[   30.870765]  ret_from_fork+0x10/0x20
[   30.870827] 
[   30.871283] The buggy address belongs to the object at fff00000c999e000
[   30.871283]  which belongs to the cache kmalloc-4k of size 4096
[   30.871450] The buggy address is located 0 bytes to the right of
[   30.871450]  allocated 4096-byte region [fff00000c999e000, fff00000c999f000)
[   30.871547] 
[   30.871567] The buggy address belongs to the physical page:
[   30.871675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109998
[   30.872196] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.872267] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.872334] page_type: f5(slab)
[   30.872372] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   30.872421] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.872475] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   30.872522] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.872659] head: 0bfffe0000000003 ffffc1ffc3266601 00000000ffffffff 00000000ffffffff
[   30.872708] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.872769] page dumped because: kasan: bad access detected
[   30.872801] 
[   30.872819] Memory state around the buggy address:
[   30.872850]  fff00000c999ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.872891]  fff00000c999ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.872931] >fff00000c999f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.873387]                    ^
[   30.873617]  fff00000c999f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.873983]  fff00000c999f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.874058] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   30.854076] ==================================================================
[   30.854174] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   30.854241] Read of size 1 at addr fff00000c798161f by task kunit_try_catch/169
[   30.854614] 
[   30.854713] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.855150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.855310] Hardware name: linux,dummy-virt (DT)
[   30.855493] Call trace:
[   30.855546]  show_stack+0x20/0x38 (C)
[   30.855680]  dump_stack_lvl+0x8c/0xd0
[   30.855771]  print_report+0x118/0x5d0
[   30.855818]  kasan_report+0xdc/0x128
[   30.855880]  __asan_report_load1_noabort+0x20/0x30
[   30.855927]  kmalloc_oob_left+0x2ec/0x320
[   30.856172]  kunit_try_run_case+0x170/0x3f0
[   30.856242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.856295]  kthread+0x328/0x630
[   30.856428]  ret_from_fork+0x10/0x20
[   30.856872] 
[   30.856904] Allocated by task 102:
[   30.856940]  kasan_save_stack+0x3c/0x68
[   30.856982]  kasan_save_track+0x20/0x40
[   30.857019]  kasan_save_alloc_info+0x40/0x58
[   30.857086]  __kasan_kmalloc+0xd4/0xd8
[   30.857123]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.857254]  kvasprintf+0xe0/0x180
[   30.857297]  kasprintf+0xd0/0x110
[   30.857331]  miscdev_test_can_open+0xac/0x2c8
[   30.857375]  miscdev_test_collision+0x2f0/0x560
[   30.857411]  kunit_try_run_case+0x170/0x3f0
[   30.857448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.857493]  kthread+0x328/0x630
[   30.857524]  ret_from_fork+0x10/0x20
[   30.857559] 
[   30.857591] Freed by task 102:
[   30.857630]  kasan_save_stack+0x3c/0x68
[   30.857668]  kasan_save_track+0x20/0x40
[   30.857705]  kasan_save_free_info+0x4c/0x78
[   30.857740]  __kasan_slab_free+0x6c/0x98
[   30.857777]  kfree+0x214/0x3c8
[   30.857810]  miscdev_test_can_open+0x138/0x2c8
[   30.857846]  miscdev_test_collision+0x2f0/0x560
[   30.857882]  kunit_try_run_case+0x170/0x3f0
[   30.858170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.858254]  kthread+0x328/0x630
[   30.858286]  ret_from_fork+0x10/0x20
[   30.858334] 
[   30.858411] The buggy address belongs to the object at fff00000c7981600
[   30.858411]  which belongs to the cache kmalloc-16 of size 16
[   30.858596] The buggy address is located 15 bytes to the right of
[   30.858596]  allocated 16-byte region [fff00000c7981600, fff00000c7981610)
[   30.858681] 
[   30.858713] The buggy address belongs to the physical page:
[   30.858779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981
[   30.858842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.858888] page_type: f5(slab)
[   30.858926] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.859126] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.859217] page dumped because: kasan: bad access detected
[   30.859247] 
[   30.859265] Memory state around the buggy address:
[   30.859295]  fff00000c7981500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.859336]  fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.859378] >fff00000c7981600: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   30.859782]                             ^
[   30.859853]  fff00000c7981680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.859940]  fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.859978] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   30.841720] ==================================================================
[   30.841899] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.841958] Write of size 1 at addr fff00000c56dcf78 by task kunit_try_catch/167
[   30.842016] 
[   30.842051] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.842147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.842173] Hardware name: linux,dummy-virt (DT)
[   30.842256] Call trace:
[   30.842297]  show_stack+0x20/0x38 (C)
[   30.842349]  dump_stack_lvl+0x8c/0xd0
[   30.842398]  print_report+0x118/0x5d0
[   30.842683]  kasan_report+0xdc/0x128
[   30.842770]  __asan_report_store1_noabort+0x20/0x30
[   30.842839]  kmalloc_oob_right+0x538/0x660
[   30.842892]  kunit_try_run_case+0x170/0x3f0
[   30.842946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.842999]  kthread+0x328/0x630
[   30.843041]  ret_from_fork+0x10/0x20
[   30.843087] 
[   30.843114] Allocated by task 167:
[   30.843142]  kasan_save_stack+0x3c/0x68
[   30.843182]  kasan_save_track+0x20/0x40
[   30.843432]  kasan_save_alloc_info+0x40/0x58
[   30.843478]  __kasan_kmalloc+0xd4/0xd8
[   30.843514]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.843553]  kmalloc_oob_right+0xb0/0x660
[   30.843589]  kunit_try_run_case+0x170/0x3f0
[   30.843628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.843670]  kthread+0x328/0x630
[   30.843702]  ret_from_fork+0x10/0x20
[   30.843736] 
[   30.843754] The buggy address belongs to the object at fff00000c56dcf00
[   30.843754]  which belongs to the cache kmalloc-128 of size 128
[   30.843809] The buggy address is located 5 bytes to the right of
[   30.843809]  allocated 115-byte region [fff00000c56dcf00, fff00000c56dcf73)
[   30.843965] 
[   30.843991] The buggy address belongs to the physical page:
[   30.844019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056dc
[   30.844078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.844135] page_type: f5(slab)
[   30.844182] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.844242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.844281] page dumped because: kasan: bad access detected
[   30.844310] 
[   30.844327] Memory state around the buggy address:
[   30.844357]  fff00000c56dce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.844414]  fff00000c56dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.844464] >fff00000c56dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.844500]                                                                 ^
[   30.844566]  fff00000c56dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.844623]  fff00000c56dd000: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[   30.844682] ==================================================================
[   30.827318] ==================================================================
[   30.827639] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.828732] Write of size 1 at addr fff00000c56dcf73 by task kunit_try_catch/167
[   30.828893] 
[   30.830951] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.831577] Tainted: [N]=TEST
[   30.831638] Hardware name: linux,dummy-virt (DT)
[   30.832766] Call trace:
[   30.832961]  show_stack+0x20/0x38 (C)
[   30.833433]  dump_stack_lvl+0x8c/0xd0
[   30.833548]  print_report+0x118/0x5d0
[   30.833636]  kasan_report+0xdc/0x128
[   30.833704]  __asan_report_store1_noabort+0x20/0x30
[   30.833806]  kmalloc_oob_right+0x5a4/0x660
[   30.833874]  kunit_try_run_case+0x170/0x3f0
[   30.833993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.834060]  kthread+0x328/0x630
[   30.834148]  ret_from_fork+0x10/0x20
[   30.834538] 
[   30.834650] Allocated by task 167:
[   30.835194]  kasan_save_stack+0x3c/0x68
[   30.835327]  kasan_save_track+0x20/0x40
[   30.835430]  kasan_save_alloc_info+0x40/0x58
[   30.835489]  __kasan_kmalloc+0xd4/0xd8
[   30.835551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.835646]  kmalloc_oob_right+0xb0/0x660
[   30.835706]  kunit_try_run_case+0x170/0x3f0
[   30.835786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.835844]  kthread+0x328/0x630
[   30.835905]  ret_from_fork+0x10/0x20
[   30.836018] 
[   30.836103] The buggy address belongs to the object at fff00000c56dcf00
[   30.836103]  which belongs to the cache kmalloc-128 of size 128
[   30.836200] The buggy address is located 0 bytes to the right of
[   30.836200]  allocated 115-byte region [fff00000c56dcf00, fff00000c56dcf73)
[   30.836289] 
[   30.836444] The buggy address belongs to the physical page:
[   30.836675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056dc
[   30.837424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.837746] page_type: f5(slab)
[   30.838132] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.838283] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.838483] page dumped because: kasan: bad access detected
[   30.838548] 
[   30.838893] Memory state around the buggy address:
[   30.839566]  fff00000c56dce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.839711]  fff00000c56dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.839805] >fff00000c56dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.839876]                                                              ^
[   30.839998]  fff00000c56dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.840317]  fff00000c56dd000: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[   30.840449] ==================================================================
[   30.845035] ==================================================================
[   30.845080] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.845125] Read of size 1 at addr fff00000c56dcf80 by task kunit_try_catch/167
[   30.845171] 
[   30.845232] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.845316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.845358] Hardware name: linux,dummy-virt (DT)
[   30.845396] Call trace:
[   30.845424]  show_stack+0x20/0x38 (C)
[   30.845472]  dump_stack_lvl+0x8c/0xd0
[   30.845519]  print_report+0x118/0x5d0
[   30.845565]  kasan_report+0xdc/0x128
[   30.845610]  __asan_report_load1_noabort+0x20/0x30
[   30.845658]  kmalloc_oob_right+0x5d0/0x660
[   30.845703]  kunit_try_run_case+0x170/0x3f0
[   30.845750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.845938]  kthread+0x328/0x630
[   30.845997]  ret_from_fork+0x10/0x20
[   30.846044] 
[   30.846061] Allocated by task 167:
[   30.846103]  kasan_save_stack+0x3c/0x68
[   30.846152]  kasan_save_track+0x20/0x40
[   30.846199]  kasan_save_alloc_info+0x40/0x58
[   30.846254]  __kasan_kmalloc+0xd4/0xd8
[   30.846302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.846341]  kmalloc_oob_right+0xb0/0x660
[   30.846377]  kunit_try_run_case+0x170/0x3f0
[   30.846516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.846686]  kthread+0x328/0x630
[   30.846732]  ret_from_fork+0x10/0x20
[   30.846767] 
[   30.846785] The buggy address belongs to the object at fff00000c56dcf00
[   30.846785]  which belongs to the cache kmalloc-128 of size 128
[   30.846847] The buggy address is located 13 bytes to the right of
[   30.846847]  allocated 115-byte region [fff00000c56dcf00, fff00000c56dcf73)
[   30.846909] 
[   30.846927] The buggy address belongs to the physical page:
[   30.846956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056dc
[   30.847018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.847063] page_type: f5(slab)
[   30.847100] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.847182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.847442] page dumped because: kasan: bad access detected
[   30.847486] 
[   30.847503] Memory state around the buggy address:
[   30.847533]  fff00000c56dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.847574]  fff00000c56dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.847616] >fff00000c56dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.847653]                    ^
[   30.847681]  fff00000c56dd000: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[   30.848025]  fff00000c56dd080: 00 06 fc fc 00 06 fc fc 00 00 fc fc 00 02 fc fc
[   30.848314] ==================================================================
Failure - log-parser-boot/exception-warning-libteststest_ratelimit-at-test_ratelimit_stress_child
------------[ cut here ]------------
[  183.653943] WARNING: lib/tests/test_ratelimit.c:87 at test_ratelimit_stress_child+0x160/0x1b8, CPU#0: test_ratelimit_/1661
[  183.655223] Modules linked in:
[  183.655475] CPU: 0 UID: 0 PID: 1661 Comm: test_ratelimit_ Tainted: G    B D W        N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[  183.655980] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  183.656318] Hardware name: linux,dummy-virt (DT)
[  183.656845] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  183.658012] pc : test_ratelimit_stress_child+0x160/0x1b8
[  183.658613] lr : test_ratelimit_stress_child+0x30/0x1b8
[  183.659151] sp : ffff8000894f7d90
[  183.659527] x29: ffff8000894f7d90 x28: 0000000000000000 x27: 0000000000000000
[  183.660398] x26: 1ffe00001903e981 x25: 0000000000000000 x24: 0000000000000004
[  183.661634] x23: fff00000c81f4c0c x22: fff00000cc4d67a8 x21: ffff92c7b5152a90
[  183.662093] x20: fff00000c81f4c00 x19: fff00000cc4d67a8 x18: 00000000d454799d
[  183.662519] x17: 0000000000000000 x16: fff00000c7b4c43c x15: fff00000ff616b48
[  183.662917] x14: 0000000000018fff x13: 1ffe00001b48f5c5 x12: fffd80001b48b041
[  183.663741] x11: 1ffe00001b48b040 x10: fffd80001b48b040 x9 : ffff92c7b7749ffc
[  183.664624] x8 : ffff8000894f7ae8 x7 : 0000000000000001 x6 : ffff8000894f7c00
[  183.665342] x5 : 0000000000000001 x4 : ffff92c7b9aa43e0 x3 : 0000000000000000
[  183.665758] x2 : 1ffe00001989acf9 x1 : 0000000000000000 x0 : 0000000000000000
[  183.666152] Call trace:
[  183.666328]  test_ratelimit_stress_child+0x160/0x1b8 (P)
[  183.666614]  kthread+0x328/0x630
[  183.666821]  ret_from_fork+0x10/0x20
[  183.667045] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  112.452503] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/689
[  112.454272] Modules linked in:
[  112.454619] CPU: 1 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[  112.455074] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  112.455340] Hardware name: linux,dummy-virt (DT)
[  112.455547] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  112.456131] pc : intlog10+0x38/0x48
[  112.456334] lr : intlog10_test+0xe4/0x200
[  112.456526] sp : ffff800082237c10
[  112.456854] x29: ffff800082237c90 x28: 0000000000000000 x27: 0000000000000000
[  112.457363] x26: 1ffe000018e78f21 x25: 0000000000000000 x24: ffff800082237ce0
[  112.458345] x23: ffff800082237d00 x22: 0000000000000000 x21: 1ffff00010446f82
[  112.459289] x20: ffff92c7b7a0e2c0 x19: ffff800080087990 x18: 00000000e6d2b0d9
[  112.460430] x17: 00000000e4ec9032 x16: fff00000c7b4c03c x15: fff00000ff616b48
[  112.461890] x14: 0000000000018fff x13: 1ffe00001b48b1c5 x12: ffff7258f771b989
[  112.462482] x11: 1ffff258f771b988 x10: ffff7258f771b988 x9 : ffff92c7b5044fe4
[  112.462845] x8 : ffff92c7bb8dcc43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  112.463183] x5 : ffff700010446f82 x4 : 1ffff00010010f3b x3 : 1ffff258f6f41c58
[  112.464406] x2 : 1ffff258f6f41c58 x1 : 0000000000000003 x0 : 0000000000000000
[  112.465348] Call trace:
[  112.465932]  intlog10+0x38/0x48 (P)
[  112.466807]  kunit_try_run_case+0x170/0x3f0
[  112.467428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.467928]  kthread+0x328/0x630
[  112.468112]  ret_from_fork+0x10/0x20
[  112.468432] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  112.406307] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671
[  112.408186] Modules linked in:
[  112.408813] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[  112.409819] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  112.410044] Hardware name: linux,dummy-virt (DT)
[  112.410266] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  112.410722] pc : intlog2+0xd8/0xf8
[  112.410942] lr : intlog2_test+0xe4/0x200
[  112.411191] sp : ffff800082197c10
[  112.411463] x29: ffff800082197c90 x28: 0000000000000000 x27: 0000000000000000
[  112.411942] x26: 1ffe0000194c8f41 x25: 0000000000000000 x24: ffff800082197ce0
[  112.412454] x23: ffff800082197d00 x22: 0000000000000000 x21: 1ffff00010432f82
[  112.413006] x20: ffff92c7b7a0e1c0 x19: ffff800080087990 x18: 00000000c1348750
[  112.413634] x17: 000000001a6a2a19 x16: fff00000c7b4c03c x15: fff00000ff616b48
[  112.414118] x14: 0000000000018fff x13: 1ffe00001b48b1c5 x12: ffff7258f771b989
[  112.414621] x11: 1ffff258f771b988 x10: ffff7258f771b988 x9 : ffff92c7b50451e4
[  112.415093] x8 : ffff92c7bb8dcc43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  112.415863] x5 : ffff700010432f82 x4 : 1ffff00010010f3b x3 : 1ffff258f6f41c38
[  112.416302] x2 : 1ffff258f6f41c38 x1 : 0000000000000003 x0 : 0000000000000000
[  112.417095] Call trace:
[  112.417648]  intlog2+0xd8/0xf8 (P)
[  112.418267]  kunit_try_run_case+0x170/0x3f0
[  112.418882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.419616]  kthread+0x328/0x630
[  112.420111]  ret_from_fork+0x10/0x20
[  112.420796] ---[ end trace 0000000000000000 ]---