Hay
Date
July 10, 2025, 9:07 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   31.966682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   32.011116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   31.961574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   31.953999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   31.975991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   32.026017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   31.948501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   31.828894] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   31.859924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-use-after-free-in-strlen
[   31.774505] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
Failure - log-parser-boot/internal-error-oops-oops-smp
[  107.281142] Internal error: Oops: 0000000096000005 [#1]  SMP
[  107.286454] Modules linked in:
[  107.287182] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[  107.287738] Tainted: [B]=BAD_PAGE, [N]=TEST
[  107.287966] Hardware name: linux,dummy-virt (DT)
[  107.288293] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  107.288702] pc : kunit_test_null_dereference+0x70/0x170
[  107.289054] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  107.289413] sp : ffff800080fc7d30
[  107.289664] x29: ffff800080fc7d90 x28: 0000000000000000 x27: 0000000000000000
[  107.290225] x26: 1ffe00001932caa1 x25: 0000000000000000 x24: 0000000000000004
[  107.290676] x23: fff00000c996550c x22: ffff909022035240 x21: fff00000c0b1dc08
[  107.291297] x20: 1ffff000101f8fa6 x19: ffff800080087990 x18: 000000006fe93ee9
[  107.291756] x17: 00000000e5a08e36 x16: 000000004c96fd91 x15: 000000003761388e
[  107.292232] x14: 00000000dbf038a3 x13: 1ffe00001b48ed99 x12: fffd8000197663a4
[  107.292673] x11: 1ffe0000197663a3 x10: fffd8000197663a3 x9 : ffff90902202c9d0
[  107.293194] x8 : ffff800080fc7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  107.293608] x5 : ffff7000101f8fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  107.294046] x2 : dfff800000000000 x1 : fff00000cbb31440 x0 : ffff800080087990
[  107.294513] Call trace:
[  107.294741]  kunit_test_null_dereference+0x70/0x170 (P)
[  107.295087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  107.295436]  kthread+0x328/0x630
[  107.295689]  ret_from_fork+0x10/0x20
[  107.296238] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  107.296921] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   63.151789] ==================================================================
[   63.151862] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   63.151862] 
[   63.151956] Use-after-free read at 0x00000000c6d2f91f (in kfence-#187):
[   63.152011]  test_krealloc+0x51c/0x830
[   63.152059]  kunit_try_run_case+0x170/0x3f0
[   63.152107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.152172]  kthread+0x328/0x630
[   63.152212]  ret_from_fork+0x10/0x20
[   63.152253] 
[   63.152278] kfence-#187: 0x00000000c6d2f91f-0x0000000099e89701, size=32, cache=kmalloc-32
[   63.152278] 
[   63.152334] allocated by task 368 on cpu 0 at 63.151092s (0.001239s ago):
[   63.152404]  test_alloc+0x29c/0x628
[   63.152446]  test_krealloc+0xc0/0x830
[   63.152489]  kunit_try_run_case+0x170/0x3f0
[   63.152530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.152578]  kthread+0x328/0x630
[   63.152615]  ret_from_fork+0x10/0x20
[   63.152653] 
[   63.152678] freed by task 368 on cpu 0 at 63.151379s (0.001296s ago):
[   63.152741]  krealloc_noprof+0x148/0x360
[   63.152783]  test_krealloc+0x1dc/0x830
[   63.152824]  kunit_try_run_case+0x170/0x3f0
[   63.152865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.152911]  kthread+0x328/0x630
[   63.152947]  ret_from_fork+0x10/0x20
[   63.152989] 
[   63.153036] CPU: 0 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   63.153116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.153156] Hardware name: linux,dummy-virt (DT)
[   63.153191] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   63.071660] ==================================================================
[   63.071769] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   63.071769] 
[   63.071874] Use-after-free read at 0x00000000f99fd16d (in kfence-#186):
[   63.071927]  test_memcache_typesafe_by_rcu+0x280/0x560
[   63.071980]  kunit_try_run_case+0x170/0x3f0
[   63.072028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.072074]  kthread+0x328/0x630
[   63.072113]  ret_from_fork+0x10/0x20
[   63.072169] 
[   63.072193] kfence-#186: 0x00000000f99fd16d-0x000000000c27551f, size=32, cache=test
[   63.072193] 
[   63.072247] allocated by task 366 on cpu 1 at 63.051116s (0.021127s ago):
[   63.072317]  test_alloc+0x230/0x628
[   63.072360]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   63.072406]  kunit_try_run_case+0x170/0x3f0
[   63.072446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.072492]  kthread+0x328/0x630
[   63.072529]  ret_from_fork+0x10/0x20
[   63.072567] 
[   63.072590] freed by task 366 on cpu 1 at 63.051252s (0.021335s ago):
[   63.072648]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   63.072692]  kunit_try_run_case+0x170/0x3f0
[   63.072732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.072777]  kthread+0x328/0x630
[   63.072813]  ret_from_fork+0x10/0x20
[   63.072852] 
[   63.072901] CPU: 1 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   63.072982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.073013] Hardware name: linux,dummy-virt (DT)
[   63.073048] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   40.291075] ==================================================================
[   40.292198] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   40.292198] 
[   40.292363] Invalid read at 0x000000007466e28a:
[   40.292472]  test_invalid_access+0xdc/0x1f0
[   40.292534]  kunit_try_run_case+0x170/0x3f0
[   40.292588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.292691]  kthread+0x328/0x630
[   40.292745]  ret_from_fork+0x10/0x20
[   40.292799] 
[   40.292851] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   40.292945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.292980] Hardware name: linux,dummy-virt (DT)
[   40.293021] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   40.059475] ==================================================================
[   40.059588] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.059588] 
[   40.059654] Corrupted memory at 0x00000000f514dc38 [ ! . . . . . . . . . . . . . . . ] (in kfence-#182):
[   40.059971]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.060022]  kunit_try_run_case+0x170/0x3f0
[   40.060069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.060115]  kthread+0x328/0x630
[   40.060167]  ret_from_fork+0x10/0x20
[   40.060208] 
[   40.060233] kfence-#182: 0x00000000933e4bdd-0x0000000086f2a264, size=73, cache=kmalloc-96
[   40.060233] 
[   40.060289] allocated by task 356 on cpu 0 at 40.059198s (0.001088s ago):
[   40.060356]  test_alloc+0x29c/0x628
[   40.060396]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   40.060441]  kunit_try_run_case+0x170/0x3f0
[   40.060481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.060527]  kthread+0x328/0x630
[   40.060562]  ret_from_fork+0x10/0x20
[   40.060601] 
[   40.060625] freed by task 356 on cpu 0 at 40.059372s (0.001249s ago):
[   40.060690]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.060734]  kunit_try_run_case+0x170/0x3f0
[   40.060775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.060821]  kthread+0x328/0x630
[   40.060857]  ret_from_fork+0x10/0x20
[   40.060896] 
[   40.060942] CPU: 0 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   40.061025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.061057] Hardware name: linux,dummy-virt (DT)
[   40.061091] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   39.851552] ==================================================================
[   39.851660] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   39.851660] 
[   39.851764] Out-of-bounds read at 0x000000008b323e30 (105B right of kfence-#180):
[   39.851825]  test_kmalloc_aligned_oob_read+0x238/0x468
[   39.851878]  kunit_try_run_case+0x170/0x3f0
[   39.851926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.851972]  kthread+0x328/0x630
[   39.852011]  ret_from_fork+0x10/0x20
[   39.852052] 
[   39.852077] kfence-#180: 0x000000007da4b9e2-0x00000000aa06dc4d, size=73, cache=kmalloc-96
[   39.852077] 
[   39.852146] allocated by task 354 on cpu 0 at 39.851255s (0.000887s ago):
[   39.852218]  test_alloc+0x29c/0x628
[   39.852261]  test_kmalloc_aligned_oob_read+0x100/0x468
[   39.852304]  kunit_try_run_case+0x170/0x3f0
[   39.852346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.852391]  kthread+0x328/0x630
[   39.852428]  ret_from_fork+0x10/0x20
[   39.852467] 
[   39.852516] CPU: 0 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   39.852599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.852629] Hardware name: linux,dummy-virt (DT)
[   39.852664] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   35.691290] ==================================================================
[   35.691385] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   35.691385] 
[   35.691446] Corrupted memory at 0x00000000d92b6c1f [ ! ] (in kfence-#140):
[   35.691569]  test_corruption+0x1d8/0x378
[   35.691618]  kunit_try_run_case+0x170/0x3f0
[   35.691663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.691710]  kthread+0x328/0x630
[   35.691747]  ret_from_fork+0x10/0x20
[   35.691788] 
[   35.691811] kfence-#140: 0x0000000086d4119b-0x00000000514a4734, size=32, cache=test
[   35.691811] 
[   35.691867] allocated by task 344 on cpu 0 at 35.691145s (0.000718s ago):
[   35.691928]  test_alloc+0x230/0x628
[   35.691970]  test_corruption+0x198/0x378
[   35.692012]  kunit_try_run_case+0x170/0x3f0
[   35.692053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.692099]  kthread+0x328/0x630
[   35.692146]  ret_from_fork+0x10/0x20
[   35.692187] 
[   35.692212] freed by task 344 on cpu 0 at 35.691201s (0.001007s ago):
[   35.692274]  test_corruption+0x1d8/0x378
[   35.692315]  kunit_try_run_case+0x170/0x3f0
[   35.692356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.692401]  kthread+0x328/0x630
[   35.692436]  ret_from_fork+0x10/0x20
[   35.692475] 
[   35.692517] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   35.692598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.692629] Hardware name: linux,dummy-virt (DT)
[   35.692664] ==================================================================
[   35.067600] ==================================================================
[   35.067693] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   35.067693] 
[   35.067757] Corrupted memory at 0x00000000103483ef [ ! ] (in kfence-#134):
[   35.067887]  test_corruption+0x284/0x378
[   35.067936]  kunit_try_run_case+0x170/0x3f0
[   35.067981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.068027]  kthread+0x328/0x630
[   35.068066]  ret_from_fork+0x10/0x20
[   35.068107] 
[   35.068144] kfence-#134: 0x000000000aeb8358-0x00000000ea64579f, size=32, cache=kmalloc-32
[   35.068144] 
[   35.068204] allocated by task 342 on cpu 0 at 35.067316s (0.000884s ago):
[   35.068265]  test_alloc+0x29c/0x628
[   35.068306]  test_corruption+0x198/0x378
[   35.068346]  kunit_try_run_case+0x170/0x3f0
[   35.068387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.068432]  kthread+0x328/0x630
[   35.068467]  ret_from_fork+0x10/0x20
[   35.068508] 
[   35.068531] freed by task 342 on cpu 0 at 35.067418s (0.001110s ago):
[   35.068593]  test_corruption+0x284/0x378
[   35.068633]  kunit_try_run_case+0x170/0x3f0
[   35.068674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.068720]  kthread+0x328/0x630
[   35.068757]  ret_from_fork+0x10/0x20
[   35.068794] 
[   35.068839] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   35.068918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.068953] Hardware name: linux,dummy-virt (DT)
[   35.068988] ==================================================================
[   35.379385] ==================================================================
[   35.379489] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   35.379489] 
[   35.379561] Corrupted memory at 0x00000000e3b904d3 [ ! . . . . . . . . . . . . . . . ] (in kfence-#137):
[   35.379877]  test_corruption+0x120/0x378
[   35.379926]  kunit_try_run_case+0x170/0x3f0
[   35.379972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.380018]  kthread+0x328/0x630
[   35.380058]  ret_from_fork+0x10/0x20
[   35.380099] 
[   35.380122] kfence-#137: 0x000000000298bc88-0x0000000048654aaf, size=32, cache=test
[   35.380122] 
[   35.380193] allocated by task 344 on cpu 0 at 35.379234s (0.000955s ago):
[   35.380256]  test_alloc+0x230/0x628
[   35.380295]  test_corruption+0xdc/0x378
[   35.380335]  kunit_try_run_case+0x170/0x3f0
[   35.380376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.380421]  kthread+0x328/0x630
[   35.380457]  ret_from_fork+0x10/0x20
[   35.380495] 
[   35.380518] freed by task 344 on cpu 0 at 35.379291s (0.001224s ago):
[   35.380580]  test_corruption+0x120/0x378
[   35.380620]  kunit_try_run_case+0x170/0x3f0
[   35.380661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.380706]  kthread+0x328/0x630
[   35.380740]  ret_from_fork+0x10/0x20
[   35.380778] 
[   35.380825] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   35.380905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.380936] Hardware name: linux,dummy-virt (DT)
[   35.380971] ==================================================================
[   34.963477] ==================================================================
[   34.963601] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   34.963601] 
[   34.963670] Corrupted memory at 0x0000000080cd3fd0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#133):
[   34.964810]  test_corruption+0x278/0x378
[   34.964864]  kunit_try_run_case+0x170/0x3f0
[   34.964912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.964958]  kthread+0x328/0x630
[   34.964998]  ret_from_fork+0x10/0x20
[   34.965039] 
[   34.965064] kfence-#133: 0x000000007a97edda-0x00000000c642fa10, size=32, cache=kmalloc-32
[   34.965064] 
[   34.965122] allocated by task 342 on cpu 0 at 34.963167s (0.001951s ago):
[   34.965200]  test_alloc+0x29c/0x628
[   34.965242]  test_corruption+0xdc/0x378
[   34.965283]  kunit_try_run_case+0x170/0x3f0
[   34.965324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.965368]  kthread+0x328/0x630
[   34.965403]  ret_from_fork+0x10/0x20
[   34.965443] 
[   34.965465] freed by task 342 on cpu 0 at 34.963277s (0.002185s ago):
[   34.965528]  test_corruption+0x278/0x378
[   34.965567]  kunit_try_run_case+0x170/0x3f0
[   34.965607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.965651]  kthread+0x328/0x630
[   34.965685]  ret_from_fork+0x10/0x20
[   34.965723] 
[   34.965771] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   34.965852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.965883] Hardware name: linux,dummy-virt (DT)
[   34.965916] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   34.651240] ==================================================================
[   34.651329] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   34.651329] 
[   34.651390] Invalid free of 0x00000000d9d4c869 (in kfence-#130):
[   34.651448]  test_invalid_addr_free+0x1ac/0x238
[   34.651498]  kunit_try_run_case+0x170/0x3f0
[   34.651553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.651599]  kthread+0x328/0x630
[   34.651640]  ret_from_fork+0x10/0x20
[   34.651681] 
[   34.651706] kfence-#130: 0x00000000fee7980e-0x000000007d810949, size=32, cache=kmalloc-32
[   34.651706] 
[   34.651763] allocated by task 338 on cpu 1 at 34.651077s (0.000682s ago):
[   34.651827]  test_alloc+0x29c/0x628
[   34.651869]  test_invalid_addr_free+0xd4/0x238
[   34.651915]  kunit_try_run_case+0x170/0x3f0
[   34.651957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.652003]  kthread+0x328/0x630
[   34.652040]  ret_from_fork+0x10/0x20
[   34.652080] 
[   34.652142] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   34.652224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.652255] Hardware name: linux,dummy-virt (DT)
[   34.652289] ==================================================================
[   34.755259] ==================================================================
[   34.755350] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   34.755350] 
[   34.755410] Invalid free of 0x00000000875a19a8 (in kfence-#131):
[   34.755464]  test_invalid_addr_free+0xec/0x238
[   34.755521]  kunit_try_run_case+0x170/0x3f0
[   34.755567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.755613]  kthread+0x328/0x630
[   34.755652]  ret_from_fork+0x10/0x20
[   34.755692] 
[   34.755716] kfence-#131: 0x000000000d481e21-0x000000009f59de09, size=32, cache=test
[   34.755716] 
[   34.755769] allocated by task 340 on cpu 1 at 34.755112s (0.000654s ago):
[   34.755832]  test_alloc+0x230/0x628
[   34.755873]  test_invalid_addr_free+0xd4/0x238
[   34.755914]  kunit_try_run_case+0x170/0x3f0
[   34.755956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.756000]  kthread+0x328/0x630
[   34.756036]  ret_from_fork+0x10/0x20
[   34.756074] 
[   34.756117] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   34.756239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.756282] Hardware name: linux,dummy-virt (DT)
[   34.756315] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   34.443838] ==================================================================
[   34.443957] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   34.443957] 
[   34.444022] Invalid free of 0x000000000009e916 (in kfence-#128):
[   34.444112]  test_double_free+0x1bc/0x238
[   34.444181]  kunit_try_run_case+0x170/0x3f0
[   34.444247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.444311]  kthread+0x328/0x630
[   34.444358]  ret_from_fork+0x10/0x20
[   34.444405] 
[   34.444451] kfence-#128: 0x000000000009e916-0x00000000b4ffe58d, size=32, cache=kmalloc-32
[   34.444451] 
[   34.444526] allocated by task 334 on cpu 0 at 34.443470s (0.001033s ago):
[   34.444594]  test_alloc+0x29c/0x628
[   34.444635]  test_double_free+0xd4/0x238
[   34.444676]  kunit_try_run_case+0x170/0x3f0
[   34.444858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.444911]  kthread+0x328/0x630
[   34.444948]  ret_from_fork+0x10/0x20
[   34.445014] 
[   34.445064] freed by task 334 on cpu 0 at 34.443587s (0.001466s ago):
[   34.445162]  test_double_free+0x1ac/0x238
[   34.445221]  kunit_try_run_case+0x170/0x3f0
[   34.445264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.445339]  kthread+0x328/0x630
[   34.445377]  ret_from_fork+0x10/0x20
[   34.445434] 
[   34.445508] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   34.445593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.445623] Hardware name: linux,dummy-virt (DT)
[   34.445763] ==================================================================
[   34.547327] ==================================================================
[   34.547426] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   34.547426] 
[   34.547489] Invalid free of 0x0000000067b1f047 (in kfence-#129):
[   34.547546]  test_double_free+0x100/0x238
[   34.547595]  kunit_try_run_case+0x170/0x3f0
[   34.547640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.547686]  kthread+0x328/0x630
[   34.547724]  ret_from_fork+0x10/0x20
[   34.547764] 
[   34.547787] kfence-#129: 0x0000000067b1f047-0x00000000bc62513f, size=32, cache=test
[   34.547787] 
[   34.547841] allocated by task 336 on cpu 0 at 34.547110s (0.000727s ago):
[   34.547903]  test_alloc+0x230/0x628
[   34.547945]  test_double_free+0xd4/0x238
[   34.547985]  kunit_try_run_case+0x170/0x3f0
[   34.548026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.548071]  kthread+0x328/0x630
[   34.548106]  ret_from_fork+0x10/0x20
[   34.548159] 
[   34.548181] freed by task 336 on cpu 0 at 34.547186s (0.000992s ago):
[   34.548245]  test_double_free+0xf0/0x238
[   34.548286]  kunit_try_run_case+0x170/0x3f0
[   34.548326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.548371]  kthread+0x328/0x630
[   34.548405]  ret_from_fork+0x10/0x20
[   34.548444] 
[   34.548488] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   34.548569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.548598] Hardware name: linux,dummy-virt (DT)
[   34.548631] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   34.019925] ==================================================================
[   34.020085] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   34.020085] 
[   34.020222] Use-after-free read at 0x000000001dbcaa5c (in kfence-#124):
[   34.020276]  test_use_after_free_read+0x114/0x248
[   34.020326]  kunit_try_run_case+0x170/0x3f0
[   34.020372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.020430]  kthread+0x328/0x630
[   34.020471]  ret_from_fork+0x10/0x20
[   34.020510] 
[   34.020533] kfence-#124: 0x000000001dbcaa5c-0x000000008672e5b9, size=32, cache=kmalloc-32
[   34.020533] 
[   34.020594] allocated by task 326 on cpu 0 at 34.019568s (0.001021s ago):
[   34.020664]  test_alloc+0x29c/0x628
[   34.020703]  test_use_after_free_read+0xd0/0x248
[   34.020745]  kunit_try_run_case+0x170/0x3f0
[   34.020796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.020842]  kthread+0x328/0x630
[   34.020877]  ret_from_fork+0x10/0x20
[   34.020938] 
[   34.021083] freed by task 326 on cpu 0 at 34.019656s (0.001340s ago):
[   34.021215]  test_use_after_free_read+0x1c0/0x248
[   34.021274]  kunit_try_run_case+0x170/0x3f0
[   34.021323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.021367]  kthread+0x328/0x630
[   34.021402]  ret_from_fork+0x10/0x20
[   34.021464] 
[   34.021515] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   34.021600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.021631] Hardware name: linux,dummy-virt (DT)
[   34.021664] ==================================================================
[   34.128139] ==================================================================
[   34.128220] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   34.128220] 
[   34.128514] Use-after-free read at 0x000000005ec5a4bc (in kfence-#125):
[   34.128836]  test_use_after_free_read+0x114/0x248
[   34.128959]  kunit_try_run_case+0x170/0x3f0
[   34.129014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.129060]  kthread+0x328/0x630
[   34.129477]  ret_from_fork+0x10/0x20
[   34.129707] 
[   34.129772] kfence-#125: 0x000000005ec5a4bc-0x000000002dc9fc65, size=32, cache=test
[   34.129772] 
[   34.129941] allocated by task 328 on cpu 0 at 34.127845s (0.002072s ago):
[   34.130271]  test_alloc+0x230/0x628
[   34.130395]  test_use_after_free_read+0xd0/0x248
[   34.130463]  kunit_try_run_case+0x170/0x3f0
[   34.130510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.130565]  kthread+0x328/0x630
[   34.130601]  ret_from_fork+0x10/0x20
[   34.130640] 
[   34.130913] freed by task 328 on cpu 0 at 34.127930s (0.002922s ago):
[   34.131219]  test_use_after_free_read+0xf0/0x248
[   34.131316]  kunit_try_run_case+0x170/0x3f0
[   34.131426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.131686]  kthread+0x328/0x630
[   34.131885]  ret_from_fork+0x10/0x20
[   34.132147] 
[   34.132203] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   34.132376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.132496] Hardware name: linux,dummy-virt (DT)
[   34.132567] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   33.915527] ==================================================================
[   33.915605] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   33.915605] 
[   33.915719] Out-of-bounds write at 0x0000000022b77cc3 (1B left of kfence-#123):
[   33.915878]  test_out_of_bounds_write+0x100/0x240
[   33.915952]  kunit_try_run_case+0x170/0x3f0
[   33.916002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.916048]  kthread+0x328/0x630
[   33.916094]  ret_from_fork+0x10/0x20
[   33.916148] 
[   33.916174] kfence-#123: 0x00000000d39a1f6e-0x00000000ff5f408a, size=32, cache=test
[   33.916174] 
[   33.916225] allocated by task 324 on cpu 0 at 33.915427s (0.000795s ago):
[   33.916310]  test_alloc+0x230/0x628
[   33.916360]  test_out_of_bounds_write+0xc8/0x240
[   33.916403]  kunit_try_run_case+0x170/0x3f0
[   33.916444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.916499]  kthread+0x328/0x630
[   33.916543]  ret_from_fork+0x10/0x20
[   33.916582] 
[   33.916636] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   33.916718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.916750] Hardware name: linux,dummy-virt (DT)
[   33.916784] ==================================================================
[   33.807657] ==================================================================
[   33.807719] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   33.807719] 
[   33.807807] Out-of-bounds write at 0x0000000041153f6e (1B left of kfence-#122):
[   33.807866]  test_out_of_bounds_write+0x100/0x240
[   33.807989]  kunit_try_run_case+0x170/0x3f0
[   33.808054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.808217]  kthread+0x328/0x630
[   33.808354]  ret_from_fork+0x10/0x20
[   33.808446] 
[   33.808549] kfence-#122: 0x0000000052eb9419-0x000000006e05797f, size=32, cache=kmalloc-32
[   33.808549] 
[   33.808653] allocated by task 322 on cpu 0 at 33.807514s (0.001129s ago):
[   33.808726]  test_alloc+0x29c/0x628
[   33.808789]  test_out_of_bounds_write+0xc8/0x240
[   33.808849]  kunit_try_run_case+0x170/0x3f0
[   33.808894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.808939]  kthread+0x328/0x630
[   33.808976]  ret_from_fork+0x10/0x20
[   33.809020] 
[   33.809067] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   33.809165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.809194] Hardware name: linux,dummy-virt (DT)
[   33.809226] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   33.275828] ==================================================================
[   33.275909] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   33.275909] 
[   33.275994] Out-of-bounds read at 0x000000003d6ecd6f (1B left of kfence-#117):
[   33.276062]  test_out_of_bounds_read+0x114/0x3e0
[   33.276114]  kunit_try_run_case+0x170/0x3f0
[   33.276181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.276239]  kthread+0x328/0x630
[   33.276279]  ret_from_fork+0x10/0x20
[   33.276326] 
[   33.276351] kfence-#117: 0x00000000ab014227-0x0000000016865d84, size=32, cache=test
[   33.276351] 
[   33.276402] allocated by task 320 on cpu 0 at 33.275743s (0.000656s ago):
[   33.276547]  test_alloc+0x230/0x628
[   33.276597]  test_out_of_bounds_read+0xdc/0x3e0
[   33.276640]  kunit_try_run_case+0x170/0x3f0
[   33.276681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.276726]  kthread+0x328/0x630
[   33.276762]  ret_from_fork+0x10/0x20
[   33.276801] 
[   33.276854] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   33.276937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.276969] Hardware name: linux,dummy-virt (DT)
[   33.277003] ==================================================================
[   32.754096] ==================================================================
[   32.754277] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   32.754277] 
[   32.754728] Out-of-bounds read at 0x00000000de9418c7 (1B left of kfence-#112):
[   32.755268]  test_out_of_bounds_read+0x114/0x3e0
[   32.755337]  kunit_try_run_case+0x170/0x3f0
[   32.755403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.755768]  kthread+0x328/0x630
[   32.755906]  ret_from_fork+0x10/0x20
[   32.755989] 
[   32.756289] kfence-#112: 0x00000000afe5589f-0x00000000ad1ce973, size=32, cache=kmalloc-32
[   32.756289] 
[   32.756530] allocated by task 318 on cpu 0 at 32.751964s (0.004495s ago):
[   32.756995]  test_alloc+0x29c/0x628
[   32.757092]  test_out_of_bounds_read+0xdc/0x3e0
[   32.757156]  kunit_try_run_case+0x170/0x3f0
[   32.757209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.757263]  kthread+0x328/0x630
[   32.757307]  ret_from_fork+0x10/0x20
[   32.757431] 
[   32.757527] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.757624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.757656] Hardware name: linux,dummy-virt (DT)
[   32.757718] ==================================================================
[   32.857445] ==================================================================
[   32.857588] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   32.857588] 
[   32.858345] Out-of-bounds read at 0x000000001843423f (32B right of kfence-#113):
[   32.858513]  test_out_of_bounds_read+0x1c8/0x3e0
[   32.858575]  kunit_try_run_case+0x170/0x3f0
[   32.858622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.859011]  kthread+0x328/0x630
[   32.859167]  ret_from_fork+0x10/0x20
[   32.859283] 
[   32.859322] kfence-#113: 0x00000000a0f380da-0x00000000f6024855, size=32, cache=kmalloc-32
[   32.859322] 
[   32.860377] allocated by task 318 on cpu 0 at 32.856721s (0.003639s ago):
[   32.860566]  test_alloc+0x29c/0x628
[   32.860963]  test_out_of_bounds_read+0x198/0x3e0
[   32.861051]  kunit_try_run_case+0x170/0x3f0
[   32.861196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.861668]  kthread+0x328/0x630
[   32.861870]  ret_from_fork+0x10/0x20
[   32.862085] 
[   32.862206] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.862551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.862919] Hardware name: linux,dummy-virt (DT)
[   32.862961] ==================================================================
[   33.700958] ==================================================================
[   33.701089] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   33.701089] 
[   33.701500] Out-of-bounds read at 0x00000000b9f602d4 (32B right of kfence-#121):
[   33.701686]  test_out_of_bounds_read+0x1c8/0x3e0
[   33.701762]  kunit_try_run_case+0x170/0x3f0
[   33.701829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.701882]  kthread+0x328/0x630
[   33.702200]  ret_from_fork+0x10/0x20
[   33.702339] 
[   33.702388] kfence-#121: 0x00000000214c07c9-0x000000001a2e1e6c, size=32, cache=test
[   33.702388] 
[   33.702464] allocated by task 320 on cpu 0 at 33.700856s (0.001586s ago):
[   33.702609]  test_alloc+0x230/0x628
[   33.702654]  test_out_of_bounds_read+0x198/0x3e0
[   33.702698]  kunit_try_run_case+0x170/0x3f0
[   33.703015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.703156]  kthread+0x328/0x630
[   33.703245]  ret_from_fork+0x10/0x20
[   33.703378] 
[   33.703446] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   33.703597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.703629] Hardware name: linux,dummy-virt (DT)
[   33.703681] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   32.632971] ==================================================================
[   32.633027] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   32.633080] Write of size 1 at addr fff00000c9bc2978 by task kunit_try_catch/316
[   32.633145] 
[   32.633453] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.633619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.633680] Hardware name: linux,dummy-virt (DT)
[   32.633728] Call trace:
[   32.633753]  show_stack+0x20/0x38 (C)
[   32.633808]  dump_stack_lvl+0x8c/0xd0
[   32.633910]  print_report+0x118/0x5d0
[   32.633964]  kasan_report+0xdc/0x128
[   32.634022]  __asan_report_store1_noabort+0x20/0x30
[   32.634078]  strncpy_from_user+0x270/0x2a0
[   32.634140]  copy_user_test_oob+0x5c0/0xec8
[   32.634190]  kunit_try_run_case+0x170/0x3f0
[   32.634240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.634295]  kthread+0x328/0x630
[   32.634337]  ret_from_fork+0x10/0x20
[   32.634386] 
[   32.634416] Allocated by task 316:
[   32.634446]  kasan_save_stack+0x3c/0x68
[   32.634493]  kasan_save_track+0x20/0x40
[   32.634533]  kasan_save_alloc_info+0x40/0x58
[   32.634576]  __kasan_kmalloc+0xd4/0xd8
[   32.634623]  __kmalloc_noprof+0x198/0x4c8
[   32.634664]  kunit_kmalloc_array+0x34/0x88
[   32.634943]  copy_user_test_oob+0xac/0xec8
[   32.635301]  kunit_try_run_case+0x170/0x3f0
[   32.635465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.635550]  kthread+0x328/0x630
[   32.635595]  ret_from_fork+0x10/0x20
[   32.635634] 
[   32.635883] The buggy address belongs to the object at fff00000c9bc2900
[   32.635883]  which belongs to the cache kmalloc-128 of size 128
[   32.636076] The buggy address is located 0 bytes to the right of
[   32.636076]  allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978)
[   32.636426] 
[   32.636602] The buggy address belongs to the physical page:
[   32.636680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.636908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.636970] page_type: f5(slab)
[   32.637047] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.637154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.637277] page dumped because: kasan: bad access detected
[   32.637441] 
[   32.637469] Memory state around the buggy address:
[   32.637533]  fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.637611]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.637768] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.637836]                                                                 ^
[   32.637886]  fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.638117]  fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.638321] ==================================================================
[   32.626496] ==================================================================
[   32.626581] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   32.626635] Write of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316
[   32.626688] 
[   32.626749] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.626837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.626868] Hardware name: linux,dummy-virt (DT)
[   32.626900] Call trace:
[   32.626924]  show_stack+0x20/0x38 (C)
[   32.626972]  dump_stack_lvl+0x8c/0xd0
[   32.627047]  print_report+0x118/0x5d0
[   32.627093]  kasan_report+0xdc/0x128
[   32.627245]  kasan_check_range+0x100/0x1a8
[   32.627333]  __kasan_check_write+0x20/0x30
[   32.627429]  strncpy_from_user+0x3c/0x2a0
[   32.627541]  copy_user_test_oob+0x5c0/0xec8
[   32.627757]  kunit_try_run_case+0x170/0x3f0
[   32.627924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.628006]  kthread+0x328/0x630
[   32.628073]  ret_from_fork+0x10/0x20
[   32.628275] 
[   32.628388] Allocated by task 316:
[   32.628467]  kasan_save_stack+0x3c/0x68
[   32.628533]  kasan_save_track+0x20/0x40
[   32.628620]  kasan_save_alloc_info+0x40/0x58
[   32.628661]  __kasan_kmalloc+0xd4/0xd8
[   32.628841]  __kmalloc_noprof+0x198/0x4c8
[   32.629124]  kunit_kmalloc_array+0x34/0x88
[   32.629248]  copy_user_test_oob+0xac/0xec8
[   32.629573]  kunit_try_run_case+0x170/0x3f0
[   32.629638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.629752]  kthread+0x328/0x630
[   32.629842]  ret_from_fork+0x10/0x20
[   32.629918] 
[   32.630063] The buggy address belongs to the object at fff00000c9bc2900
[   32.630063]  which belongs to the cache kmalloc-128 of size 128
[   32.630189] The buggy address is located 0 bytes inside of
[   32.630189]  allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978)
[   32.630361] 
[   32.630431] The buggy address belongs to the physical page:
[   32.630542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.630600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.630653] page_type: f5(slab)
[   32.630848] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.630939] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.630993] page dumped because: kasan: bad access detected
[   32.631039] 
[   32.631074] Memory state around the buggy address:
[   32.631275]  fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.631350]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.631432] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.631497]                                                                 ^
[   32.631642]  fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.631726]  fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.631778] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   32.580904] ==================================================================
[   32.580970] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   32.581031] Read of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316
[   32.581088] 
[   32.581123] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.581231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.581260] Hardware name: linux,dummy-virt (DT)
[   32.581293] Call trace:
[   32.581318]  show_stack+0x20/0x38 (C)
[   32.584989]  dump_stack_lvl+0x8c/0xd0
[   32.586117]  print_report+0x118/0x5d0
[   32.586620]  kasan_report+0xdc/0x128
[   32.587004]  kasan_check_range+0x100/0x1a8
[   32.587592]  __kasan_check_read+0x20/0x30
[   32.588330]  copy_user_test_oob+0x728/0xec8
[   32.588398]  kunit_try_run_case+0x170/0x3f0
[   32.588449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.588912]  kthread+0x328/0x630
[   32.589650]  ret_from_fork+0x10/0x20
[   32.589844] 
[   32.590348] Allocated by task 316:
[   32.590452]  kasan_save_stack+0x3c/0x68
[   32.591048]  kasan_save_track+0x20/0x40
[   32.591105]  kasan_save_alloc_info+0x40/0x58
[   32.591802]  __kasan_kmalloc+0xd4/0xd8
[   32.591856]  __kmalloc_noprof+0x198/0x4c8
[   32.591899]  kunit_kmalloc_array+0x34/0x88
[   32.592769]  copy_user_test_oob+0xac/0xec8
[   32.593366]  kunit_try_run_case+0x170/0x3f0
[   32.593945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.594389]  kthread+0x328/0x630
[   32.594481]  ret_from_fork+0x10/0x20
[   32.594597] 
[   32.594816] The buggy address belongs to the object at fff00000c9bc2900
[   32.594816]  which belongs to the cache kmalloc-128 of size 128
[   32.594896] The buggy address is located 0 bytes inside of
[   32.594896]  allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978)
[   32.595839] 
[   32.596022] The buggy address belongs to the physical page:
[   32.596224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.596865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.597079] page_type: f5(slab)
[   32.597231] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.598023] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.598322] page dumped because: kasan: bad access detected
[   32.598358] 
[   32.598885] Memory state around the buggy address:
[   32.598995]  fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.599060]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.599108] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.599159]                                                                 ^
[   32.599205]  fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.600009]  fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.600247] ==================================================================
[   32.622985] ==================================================================
[   32.623052] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   32.623103] Read of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316
[   32.623265] 
[   32.623313] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.623448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.623476] Hardware name: linux,dummy-virt (DT)
[   32.623533] Call trace:
[   32.623558]  show_stack+0x20/0x38 (C)
[   32.623627]  dump_stack_lvl+0x8c/0xd0
[   32.623691]  print_report+0x118/0x5d0
[   32.623763]  kasan_report+0xdc/0x128
[   32.623806]  kasan_check_range+0x100/0x1a8
[   32.623854]  __kasan_check_read+0x20/0x30
[   32.623916]  copy_user_test_oob+0x4a0/0xec8
[   32.624012]  kunit_try_run_case+0x170/0x3f0
[   32.624069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.624144]  kthread+0x328/0x630
[   32.624188]  ret_from_fork+0x10/0x20
[   32.624235] 
[   32.624255] Allocated by task 316:
[   32.624305]  kasan_save_stack+0x3c/0x68
[   32.624347]  kasan_save_track+0x20/0x40
[   32.624388]  kasan_save_alloc_info+0x40/0x58
[   32.624426]  __kasan_kmalloc+0xd4/0xd8
[   32.624466]  __kmalloc_noprof+0x198/0x4c8
[   32.624506]  kunit_kmalloc_array+0x34/0x88
[   32.624547]  copy_user_test_oob+0xac/0xec8
[   32.624588]  kunit_try_run_case+0x170/0x3f0
[   32.624835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.624890]  kthread+0x328/0x630
[   32.624968]  ret_from_fork+0x10/0x20
[   32.625016] 
[   32.625045] The buggy address belongs to the object at fff00000c9bc2900
[   32.625045]  which belongs to the cache kmalloc-128 of size 128
[   32.625112] The buggy address is located 0 bytes inside of
[   32.625112]  allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978)
[   32.625205] 
[   32.625245] The buggy address belongs to the physical page:
[   32.625280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.625342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.625542] page_type: f5(slab)
[   32.625590] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.625708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.625773] page dumped because: kasan: bad access detected
[   32.625809] 
[   32.625830] Memory state around the buggy address:
[   32.625863]  fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.625910]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.625966] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.626009]                                                                 ^
[   32.626051]  fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.626105]  fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.626193] ==================================================================
[   32.609807] ==================================================================
[   32.610042] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   32.610119] Write of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316
[   32.610228] 
[   32.610268] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.610523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.610555] Hardware name: linux,dummy-virt (DT)
[   32.610588] Call trace:
[   32.610615]  show_stack+0x20/0x38 (C)
[   32.610665]  dump_stack_lvl+0x8c/0xd0
[   32.610816]  print_report+0x118/0x5d0
[   32.610874]  kasan_report+0xdc/0x128
[   32.610917]  kasan_check_range+0x100/0x1a8
[   32.610964]  __kasan_check_write+0x20/0x30
[   32.611011]  copy_user_test_oob+0x35c/0xec8
[   32.611061]  kunit_try_run_case+0x170/0x3f0
[   32.611155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.611211]  kthread+0x328/0x630
[   32.611254]  ret_from_fork+0x10/0x20
[   32.611341] 
[   32.611405] Allocated by task 316:
[   32.611463]  kasan_save_stack+0x3c/0x68
[   32.611592]  kasan_save_track+0x20/0x40
[   32.611659]  kasan_save_alloc_info+0x40/0x58
[   32.611752]  __kasan_kmalloc+0xd4/0xd8
[   32.611831]  __kmalloc_noprof+0x198/0x4c8
[   32.611929]  kunit_kmalloc_array+0x34/0x88
[   32.612020]  copy_user_test_oob+0xac/0xec8
[   32.612073]  kunit_try_run_case+0x170/0x3f0
[   32.612142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.612191]  kthread+0x328/0x630
[   32.612226]  ret_from_fork+0x10/0x20
[   32.612263] 
[   32.612284] The buggy address belongs to the object at fff00000c9bc2900
[   32.612284]  which belongs to the cache kmalloc-128 of size 128
[   32.612347] The buggy address is located 0 bytes inside of
[   32.612347]  allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978)
[   32.612441] 
[   32.612463] The buggy address belongs to the physical page:
[   32.612538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.612636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.612724] page_type: f5(slab)
[   32.612834] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.612924] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.612996] page dumped because: kasan: bad access detected
[   32.613069] 
[   32.613153] Memory state around the buggy address:
[   32.613229]  fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.613324]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.613414] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.613540]                                                                 ^
[   32.613616]  fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.613663]  fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.613851] ==================================================================
[   32.543440] ==================================================================
[   32.543554] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   32.543654] Write of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316
[   32.543709] 
[   32.543756] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.543854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.543883] Hardware name: linux,dummy-virt (DT)
[   32.544471] Call trace:
[   32.545536]  show_stack+0x20/0x38 (C)
[   32.546014]  dump_stack_lvl+0x8c/0xd0
[   32.546073]  print_report+0x118/0x5d0
[   32.546121]  kasan_report+0xdc/0x128
[   32.546177]  kasan_check_range+0x100/0x1a8
[   32.546227]  __kasan_check_write+0x20/0x30
[   32.546276]  copy_user_test_oob+0x234/0xec8
[   32.546326]  kunit_try_run_case+0x170/0x3f0
[   32.546382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.546438]  kthread+0x328/0x630
[   32.546483]  ret_from_fork+0x10/0x20
[   32.546535] 
[   32.546556] Allocated by task 316:
[   32.546589]  kasan_save_stack+0x3c/0x68
[   32.549477]  kasan_save_track+0x20/0x40
[   32.549913]  kasan_save_alloc_info+0x40/0x58
[   32.550027]  __kasan_kmalloc+0xd4/0xd8
[   32.550099]  __kmalloc_noprof+0x198/0x4c8
[   32.550752]  kunit_kmalloc_array+0x34/0x88
[   32.550811]  copy_user_test_oob+0xac/0xec8
[   32.551582]  kunit_try_run_case+0x170/0x3f0
[   32.551697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.552036]  kthread+0x328/0x630
[   32.553264]  ret_from_fork+0x10/0x20
[   32.553314] 
[   32.553994] The buggy address belongs to the object at fff00000c9bc2900
[   32.553994]  which belongs to the cache kmalloc-128 of size 128
[   32.554233] The buggy address is located 0 bytes inside of
[   32.554233]  allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978)
[   32.554533] 
[   32.554560] The buggy address belongs to the physical page:
[   32.555221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.555348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.555408] page_type: f5(slab)
[   32.555454] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.556174] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.556948] page dumped because: kasan: bad access detected
[   32.556989] 
[   32.557011] Memory state around the buggy address:
[   32.557647]  fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.557765]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.557994] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.558189]                                                                 ^
[   32.558338]  fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.559653]  fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.560451] ==================================================================
[   32.614582] ==================================================================
[   32.614656] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   32.614874] Read of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316
[   32.614929] 
[   32.614960] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.615065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.615093] Hardware name: linux,dummy-virt (DT)
[   32.615181] Call trace:
[   32.615251]  show_stack+0x20/0x38 (C)
[   32.615373]  dump_stack_lvl+0x8c/0xd0
[   32.615450]  print_report+0x118/0x5d0
[   32.615510]  kasan_report+0xdc/0x128
[   32.615583]  kasan_check_range+0x100/0x1a8
[   32.615642]  __kasan_check_read+0x20/0x30
[   32.615709]  copy_user_test_oob+0x3c8/0xec8
[   32.615899]  kunit_try_run_case+0x170/0x3f0
[   32.616044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.616153]  kthread+0x328/0x630
[   32.616196]  ret_from_fork+0x10/0x20
[   32.616245] 
[   32.616274] Allocated by task 316:
[   32.616303]  kasan_save_stack+0x3c/0x68
[   32.616346]  kasan_save_track+0x20/0x40
[   32.616395]  kasan_save_alloc_info+0x40/0x58
[   32.616458]  __kasan_kmalloc+0xd4/0xd8
[   32.616516]  __kmalloc_noprof+0x198/0x4c8
[   32.616557]  kunit_kmalloc_array+0x34/0x88
[   32.616598]  copy_user_test_oob+0xac/0xec8
[   32.616644]  kunit_try_run_case+0x170/0x3f0
[   32.616685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.616732]  kthread+0x328/0x630
[   32.616766]  ret_from_fork+0x10/0x20
[   32.616803] 
[   32.616834] The buggy address belongs to the object at fff00000c9bc2900
[   32.616834]  which belongs to the cache kmalloc-128 of size 128
[   32.616896] The buggy address is located 0 bytes inside of
[   32.616896]  allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978)
[   32.616963] 
[   32.616987] The buggy address belongs to the physical page:
[   32.617022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.617085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.617152] page_type: f5(slab)
[   32.617192] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.617245] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.617291] page dumped because: kasan: bad access detected
[   32.617325] 
[   32.617366] Memory state around the buggy address:
[   32.617403]  fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.617450]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.617496] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.617538]                                                                 ^
[   32.617603]  fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.617647]  fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.617702] ==================================================================
[   32.618022] ==================================================================
[   32.618072] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   32.618148] Write of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316
[   32.618203] 
[   32.618258] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.618346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.618374] Hardware name: linux,dummy-virt (DT)
[   32.618408] Call trace:
[   32.618433]  show_stack+0x20/0x38 (C)
[   32.618481]  dump_stack_lvl+0x8c/0xd0
[   32.618527]  print_report+0x118/0x5d0
[   32.618571]  kasan_report+0xdc/0x128
[   32.618788]  kasan_check_range+0x100/0x1a8
[   32.618840]  __kasan_check_write+0x20/0x30
[   32.618888]  copy_user_test_oob+0x434/0xec8
[   32.618936]  kunit_try_run_case+0x170/0x3f0
[   32.618985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.619040]  kthread+0x328/0x630
[   32.619206]  ret_from_fork+0x10/0x20
[   32.619334] 
[   32.619437] Allocated by task 316:
[   32.619496]  kasan_save_stack+0x3c/0x68
[   32.619594]  kasan_save_track+0x20/0x40
[   32.619788]  kasan_save_alloc_info+0x40/0x58
[   32.619847]  __kasan_kmalloc+0xd4/0xd8
[   32.619887]  __kmalloc_noprof+0x198/0x4c8
[   32.619938]  kunit_kmalloc_array+0x34/0x88
[   32.620035]  copy_user_test_oob+0xac/0xec8
[   32.620113]  kunit_try_run_case+0x170/0x3f0
[   32.620237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.620325]  kthread+0x328/0x630
[   32.620390]  ret_from_fork+0x10/0x20
[   32.620512] 
[   32.620533] The buggy address belongs to the object at fff00000c9bc2900
[   32.620533]  which belongs to the cache kmalloc-128 of size 128
[   32.620596] The buggy address is located 0 bytes inside of
[   32.620596]  allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978)
[   32.620682] 
[   32.620703] The buggy address belongs to the physical page:
[   32.620964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.621083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.621227] page_type: f5(slab)
[   32.621295] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.621408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.621584] page dumped because: kasan: bad access detected
[   32.621642] 
[   32.621662] Memory state around the buggy address:
[   32.621697]  fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.621762]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.621848] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.621917]                                                                 ^
[   32.622045]  fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.622176]  fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.622300] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   32.494722] ==================================================================
[   32.494913] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   32.495067] Write of size 8 at addr fff00000c9bc2878 by task kunit_try_catch/312
[   32.495165] 
[   32.495254] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.495475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.495512] Hardware name: linux,dummy-virt (DT)
[   32.496151] Call trace:
[   32.496269]  show_stack+0x20/0x38 (C)
[   32.496377]  dump_stack_lvl+0x8c/0xd0
[   32.496454]  print_report+0x118/0x5d0
[   32.496557]  kasan_report+0xdc/0x128
[   32.496601]  kasan_check_range+0x100/0x1a8
[   32.496650]  __kasan_check_write+0x20/0x30
[   32.496739]  copy_to_kernel_nofault+0x8c/0x250
[   32.496981]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   32.497088]  kunit_try_run_case+0x170/0x3f0
[   32.497224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.497281]  kthread+0x328/0x630
[   32.497365]  ret_from_fork+0x10/0x20
[   32.497578] 
[   32.497672] Allocated by task 312:
[   32.497721]  kasan_save_stack+0x3c/0x68
[   32.497805]  kasan_save_track+0x20/0x40
[   32.497866]  kasan_save_alloc_info+0x40/0x58
[   32.497906]  __kasan_kmalloc+0xd4/0xd8
[   32.497945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.497987]  copy_to_kernel_nofault_oob+0xc8/0x418
[   32.498030]  kunit_try_run_case+0x170/0x3f0
[   32.498072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.498120]  kthread+0x328/0x630
[   32.498162]  ret_from_fork+0x10/0x20
[   32.498201] 
[   32.498222] The buggy address belongs to the object at fff00000c9bc2800
[   32.498222]  which belongs to the cache kmalloc-128 of size 128
[   32.498285] The buggy address is located 0 bytes to the right of
[   32.498285]  allocated 120-byte region [fff00000c9bc2800, fff00000c9bc2878)
[   32.498353] 
[   32.498423] The buggy address belongs to the physical page:
[   32.498702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.499011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.499365] page_type: f5(slab)
[   32.499602] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.499953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.500185] page dumped because: kasan: bad access detected
[   32.500418] 
[   32.500441] Memory state around the buggy address:
[   32.500487]  fff00000c9bc2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.500538]  fff00000c9bc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.500585] >fff00000c9bc2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.500877]                                                                 ^
[   32.500942]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.501125]  fff00000c9bc2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.501252] ==================================================================
[   32.487731] ==================================================================
[   32.487800] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   32.487870] Read of size 8 at addr fff00000c9bc2878 by task kunit_try_catch/312
[   32.488108] 
[   32.488263] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.488460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.488515] Hardware name: linux,dummy-virt (DT)
[   32.488672] Call trace:
[   32.488743]  show_stack+0x20/0x38 (C)
[   32.488796]  dump_stack_lvl+0x8c/0xd0
[   32.488843]  print_report+0x118/0x5d0
[   32.488888]  kasan_report+0xdc/0x128
[   32.488931]  __asan_report_load8_noabort+0x20/0x30
[   32.488981]  copy_to_kernel_nofault+0x204/0x250
[   32.489037]  copy_to_kernel_nofault_oob+0x158/0x418
[   32.489425]  kunit_try_run_case+0x170/0x3f0
[   32.489571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.489915]  kthread+0x328/0x630
[   32.489965]  ret_from_fork+0x10/0x20
[   32.490016] 
[   32.490523] Allocated by task 312:
[   32.490644]  kasan_save_stack+0x3c/0x68
[   32.490756]  kasan_save_track+0x20/0x40
[   32.490811]  kasan_save_alloc_info+0x40/0x58
[   32.490850]  __kasan_kmalloc+0xd4/0xd8
[   32.490891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.490933]  copy_to_kernel_nofault_oob+0xc8/0x418
[   32.490977]  kunit_try_run_case+0x170/0x3f0
[   32.491072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.491183]  kthread+0x328/0x630
[   32.491368]  ret_from_fork+0x10/0x20
[   32.491471] 
[   32.491530] The buggy address belongs to the object at fff00000c9bc2800
[   32.491530]  which belongs to the cache kmalloc-128 of size 128
[   32.491644] The buggy address is located 0 bytes to the right of
[   32.491644]  allocated 120-byte region [fff00000c9bc2800, fff00000c9bc2878)
[   32.491719] 
[   32.491742] The buggy address belongs to the physical page:
[   32.491781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.491838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.491893] page_type: f5(slab)
[   32.491948] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.492152] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.492437] page dumped because: kasan: bad access detected
[   32.492478] 
[   32.492500] Memory state around the buggy address:
[   32.492541]  fff00000c9bc2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.492603]  fff00000c9bc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.492650] >fff00000c9bc2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.493072]                                                                 ^
[   32.493238]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.493319]  fff00000c9bc2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.493362] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   32.429638] ==================================================================
[   32.430265] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   32.430330] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300
[   32.430384] 
[   32.430423] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.430521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.430660] Hardware name: linux,dummy-virt (DT)
[   32.430808] Call trace:
[   32.430937]  show_stack+0x20/0x38 (C)
[   32.431022]  dump_stack_lvl+0x8c/0xd0
[   32.431076]  print_report+0x310/0x5d0
[   32.431122]  kasan_report+0xdc/0x128
[   32.431175]  __asan_report_load1_noabort+0x20/0x30
[   32.431225]  vmalloc_oob+0x578/0x5d0
[   32.431271]  kunit_try_run_case+0x170/0x3f0
[   32.431717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.431779]  kthread+0x328/0x630
[   32.431825]  ret_from_fork+0x10/0x20
[   32.432312] 
[   32.432730] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   32.432863] The buggy address belongs to the physical page:
[   32.432901] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b09
[   32.433018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.433289] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.433610] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.433919] page dumped because: kasan: bad access detected
[   32.434066] 
[   32.434101] Memory state around the buggy address:
[   32.434152]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.434200]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.434246] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   32.434289]                                                              ^
[   32.434359]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.434693]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.435114] ==================================================================
[   32.436366] ==================================================================
[   32.436451] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   32.436500] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300
[   32.436561] 
[   32.436714] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.436920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.436950] Hardware name: linux,dummy-virt (DT)
[   32.436991] Call trace:
[   32.437101]  show_stack+0x20/0x38 (C)
[   32.437333]  dump_stack_lvl+0x8c/0xd0
[   32.437694]  print_report+0x310/0x5d0
[   32.437967]  kasan_report+0xdc/0x128
[   32.438065]  __asan_report_load1_noabort+0x20/0x30
[   32.438330]  vmalloc_oob+0x51c/0x5d0
[   32.438521]  kunit_try_run_case+0x170/0x3f0
[   32.438795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.439030]  kthread+0x328/0x630
[   32.439075]  ret_from_fork+0x10/0x20
[   32.439181] 
[   32.439220] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   32.439266] The buggy address belongs to the physical page:
[   32.439321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b09
[   32.439375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.439587] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.439749] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.439794] page dumped because: kasan: bad access detected
[   32.439840] 
[   32.439860] Memory state around the buggy address:
[   32.439896]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.440170]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.440219] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   32.440527]                                                                 ^
[   32.440741]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.441007]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.441054] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   32.264606] ==================================================================
[   32.265329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   32.265384] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.265526] 
[   32.265581] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.265790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.265827] Hardware name: linux,dummy-virt (DT)
[   32.266242] Call trace:
[   32.266272]  show_stack+0x20/0x38 (C)
[   32.266411]  dump_stack_lvl+0x8c/0xd0
[   32.266936]  print_report+0x118/0x5d0
[   32.267276]  kasan_report+0xdc/0x128
[   32.267337]  kasan_check_range+0x100/0x1a8
[   32.267387]  __kasan_check_write+0x20/0x30
[   32.267435]  kasan_atomics_helper+0xff0/0x4858
[   32.267842]  kasan_atomics+0x198/0x2e0
[   32.268183]  kunit_try_run_case+0x170/0x3f0
[   32.268283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.268689]  kthread+0x328/0x630
[   32.268742]  ret_from_fork+0x10/0x20
[   32.268793] 
[   32.269426] Allocated by task 296:
[   32.269610]  kasan_save_stack+0x3c/0x68
[   32.269863]  kasan_save_track+0x20/0x40
[   32.269909]  kasan_save_alloc_info+0x40/0x58
[   32.269952]  __kasan_kmalloc+0xd4/0xd8
[   32.270544]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.270601]  kasan_atomics+0xb8/0x2e0
[   32.271148]  kunit_try_run_case+0x170/0x3f0
[   32.271235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.271358]  kthread+0x328/0x630
[   32.271401]  ret_from_fork+0x10/0x20
[   32.271439] 
[   32.271464] The buggy address belongs to the object at fff00000c9bc6c80
[   32.271464]  which belongs to the cache kmalloc-64 of size 64
[   32.271725] The buggy address is located 0 bytes to the right of
[   32.271725]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.271804] 
[   32.271826] The buggy address belongs to the physical page:
[   32.271859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.271943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.272145] page_type: f5(slab)
[   32.272204] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.272386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.272430] page dumped because: kasan: bad access detected
[   32.272513] 
[   32.273034] Memory state around the buggy address:
[   32.273069]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.273116]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.273171] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.273214]                                      ^
[   32.273248]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.273344]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.273387] ==================================================================
[   32.288007] ==================================================================
[   32.288058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   32.288107] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.288170] 
[   32.288201] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.288481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.288532] Hardware name: linux,dummy-virt (DT)
[   32.288865] Call trace:
[   32.288915]  show_stack+0x20/0x38 (C)
[   32.288966]  dump_stack_lvl+0x8c/0xd0
[   32.289031]  print_report+0x118/0x5d0
[   32.289076]  kasan_report+0xdc/0x128
[   32.289122]  kasan_check_range+0x100/0x1a8
[   32.289180]  __kasan_check_write+0x20/0x30
[   32.289228]  kasan_atomics_helper+0x1190/0x4858
[   32.289283]  kasan_atomics+0x198/0x2e0
[   32.289334]  kunit_try_run_case+0x170/0x3f0
[   32.289387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.289447]  kthread+0x328/0x630
[   32.289491]  ret_from_fork+0x10/0x20
[   32.289540] 
[   32.289569] Allocated by task 296:
[   32.289700]  kasan_save_stack+0x3c/0x68
[   32.289816]  kasan_save_track+0x20/0x40
[   32.289878]  kasan_save_alloc_info+0x40/0x58
[   32.290076]  __kasan_kmalloc+0xd4/0xd8
[   32.290276]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.290322]  kasan_atomics+0xb8/0x2e0
[   32.290369]  kunit_try_run_case+0x170/0x3f0
[   32.290462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.290577]  kthread+0x328/0x630
[   32.291017]  ret_from_fork+0x10/0x20
[   32.291526] 
[   32.291554] The buggy address belongs to the object at fff00000c9bc6c80
[   32.291554]  which belongs to the cache kmalloc-64 of size 64
[   32.291687] The buggy address is located 0 bytes to the right of
[   32.291687]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.291849] 
[   32.291873] The buggy address belongs to the physical page:
[   32.291962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.292033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.292122] page_type: f5(slab)
[   32.292225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.292524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.292732] page dumped because: kasan: bad access detected
[   32.292773] 
[   32.292800] Memory state around the buggy address:
[   32.293095]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.293363]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.293418] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.293464]                                      ^
[   32.293661]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.293942]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.293994] ==================================================================
[   32.139954] ==================================================================
[   32.140161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   32.140370] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.140618] 
[   32.140675] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.140769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.140962] Hardware name: linux,dummy-virt (DT)
[   32.141251] Call trace:
[   32.141302]  show_stack+0x20/0x38 (C)
[   32.141359]  dump_stack_lvl+0x8c/0xd0
[   32.141408]  print_report+0x118/0x5d0
[   32.141453]  kasan_report+0xdc/0x128
[   32.141648]  kasan_check_range+0x100/0x1a8
[   32.141894]  __kasan_check_write+0x20/0x30
[   32.142220]  kasan_atomics_helper+0xb70/0x4858
[   32.142313]  kasan_atomics+0x198/0x2e0
[   32.142535]  kunit_try_run_case+0x170/0x3f0
[   32.142602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.142980]  kthread+0x328/0x630
[   32.143107]  ret_from_fork+0x10/0x20
[   32.143213] 
[   32.143349] Allocated by task 296:
[   32.143459]  kasan_save_stack+0x3c/0x68
[   32.143703]  kasan_save_track+0x20/0x40
[   32.143872]  kasan_save_alloc_info+0x40/0x58
[   32.144000]  __kasan_kmalloc+0xd4/0xd8
[   32.144079]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.144238]  kasan_atomics+0xb8/0x2e0
[   32.144327]  kunit_try_run_case+0x170/0x3f0
[   32.144372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.144424]  kthread+0x328/0x630
[   32.144676]  ret_from_fork+0x10/0x20
[   32.144732] 
[   32.144862] The buggy address belongs to the object at fff00000c9bc6c80
[   32.144862]  which belongs to the cache kmalloc-64 of size 64
[   32.144945] The buggy address is located 0 bytes to the right of
[   32.144945]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.145020] 
[   32.145061] The buggy address belongs to the physical page:
[   32.145096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.145312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.145459] page_type: f5(slab)
[   32.146220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.146716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.146771] page dumped because: kasan: bad access detected
[   32.147057] 
[   32.148317]                                      ^
[   32.150822]  kasan_atomics_helper+0x3dbc/0x4858
[   32.153050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.155387] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.161953]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.164687] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.166689]  kasan_save_track+0x20/0x40
[   32.169920] page_type: f5(slab)
[   32.170292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.171791]                                      ^
[   32.173896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   32.175306]  kasan_report+0xdc/0x128
[   32.177616] Allocated by task 296:
[   32.179762] 
[   32.180396] page_type: f5(slab)
[   32.180498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.180567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.180612] page dumped because: kasan: bad access detected
[   32.180792] 
[   32.181153] Memory state around the buggy address:
[   32.181225]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.181455]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.181535] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.181578]                                      ^
[   32.182024]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.182078]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.182120] ==================================================================
[   32.209251] ==================================================================
[   32.209358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   32.209485] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.209579] 
[   32.209773] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.210006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.210036] Hardware name: linux,dummy-virt (DT)
[   32.210069] Call trace:
[   32.210092]  show_stack+0x20/0x38 (C)
[   32.210157]  dump_stack_lvl+0x8c/0xd0
[   32.210204]  print_report+0x118/0x5d0
[   32.210250]  kasan_report+0xdc/0x128
[   32.211124]  kasan_check_range+0x100/0x1a8
[   32.211215]  __kasan_check_read+0x20/0x30
[   32.211416]  kasan_atomics_helper+0xdd4/0x4858
[   32.211717]  kasan_atomics+0x198/0x2e0
[   32.211778]  kunit_try_run_case+0x170/0x3f0
[   32.211829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.211894]  kthread+0x328/0x630
[   32.211938]  ret_from_fork+0x10/0x20
[   32.211988] 
[   32.212008] Allocated by task 296:
[   32.212039]  kasan_save_stack+0x3c/0x68
[   32.212084]  kasan_save_track+0x20/0x40
[   32.212466]  kasan_save_alloc_info+0x40/0x58
[   32.212509]  __kasan_kmalloc+0xd4/0xd8
[   32.212731]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.212972]  kasan_atomics+0xb8/0x2e0
[   32.213018]  kunit_try_run_case+0x170/0x3f0
[   32.213061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.213216]  kthread+0x328/0x630
[   32.213262]  ret_from_fork+0x10/0x20
[   32.213302] 
[   32.213803] The buggy address belongs to the object at fff00000c9bc6c80
[   32.213803]  which belongs to the cache kmalloc-64 of size 64
[   32.214275] The buggy address is located 0 bytes to the right of
[   32.214275]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.214467] 
[   32.214618] The buggy address belongs to the physical page:
[   32.214655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.214723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.215239] page_type: f5(slab)
[   32.215390] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.215446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.215490] page dumped because: kasan: bad access detected
[   32.215773] 
[   32.215798] Memory state around the buggy address:
[   32.215834]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.215881]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.215965] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.216007]                                      ^
[   32.216043]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.216271]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.216404] ==================================================================
[   32.192375] ==================================================================
[   32.192447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   32.192783] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.193104] 
[   32.193623] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.193949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.193985] Hardware name: linux,dummy-virt (DT)
[   32.194019] Call trace:
[   32.194313]  show_stack+0x20/0x38 (C)
[   32.194375]  dump_stack_lvl+0x8c/0xd0
[   32.194529]  print_report+0x118/0x5d0
[   32.194575]  kasan_report+0xdc/0x128
[   32.194812]  kasan_check_range+0x100/0x1a8
[   32.195027]  __kasan_check_write+0x20/0x30
[   32.195234]  kasan_atomics_helper+0xd3c/0x4858
[   32.195296]  kasan_atomics+0x198/0x2e0
[   32.195345]  kunit_try_run_case+0x170/0x3f0
[   32.195404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.195867]  kthread+0x328/0x630
[   32.196154]  ret_from_fork+0x10/0x20
[   32.196518] 
[   32.196545] Allocated by task 296:
[   32.196578]  kasan_save_stack+0x3c/0x68
[   32.196625]  kasan_save_track+0x20/0x40
[   32.196751]  kasan_save_alloc_info+0x40/0x58
[   32.196792]  __kasan_kmalloc+0xd4/0xd8
[   32.197054]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.197100]  kasan_atomics+0xb8/0x2e0
[   32.197150]  kunit_try_run_case+0x170/0x3f0
[   32.197455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.197681]  kthread+0x328/0x630
[   32.197717]  ret_from_fork+0x10/0x20
[   32.197754] 
[   32.197784] The buggy address belongs to the object at fff00000c9bc6c80
[   32.197784]  which belongs to the cache kmalloc-64 of size 64
[   32.197987] The buggy address is located 0 bytes to the right of
[   32.197987]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.198264] 
[   32.198288] The buggy address belongs to the physical page:
[   32.198322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.198565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.198772] page_type: f5(slab)
[   32.198970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.199031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.199076] page dumped because: kasan: bad access detected
[   32.199119] 
[   32.199166] Memory state around the buggy address:
[   32.199206]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.199253]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.199298] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.199606]                                      ^
[   32.199649]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.199695]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.199969] ==================================================================
[   32.325160] ==================================================================
[   32.325463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   32.325516] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.325576] 
[   32.325710] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.325904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.326036] Hardware name: linux,dummy-virt (DT)
[   32.326112] Call trace:
[   32.326186]  show_stack+0x20/0x38 (C)
[   32.326265]  dump_stack_lvl+0x8c/0xd0
[   32.326312]  print_report+0x118/0x5d0
[   32.326364]  kasan_report+0xdc/0x128
[   32.326545]  __asan_report_load8_noabort+0x20/0x30
[   32.326595]  kasan_atomics_helper+0x3f04/0x4858
[   32.327068]  kasan_atomics+0x198/0x2e0
[   32.327433]  kunit_try_run_case+0x170/0x3f0
[   32.327565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.327761]  kthread+0x328/0x630
[   32.327809]  ret_from_fork+0x10/0x20
[   32.327910] 
[   32.327934] Allocated by task 296:
[   32.328088]  kasan_save_stack+0x3c/0x68
[   32.328211]  kasan_save_track+0x20/0x40
[   32.328259]  kasan_save_alloc_info+0x40/0x58
[   32.328396]  __kasan_kmalloc+0xd4/0xd8
[   32.328826]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.328912]  kasan_atomics+0xb8/0x2e0
[   32.328952]  kunit_try_run_case+0x170/0x3f0
[   32.328994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.329043]  kthread+0x328/0x630
[   32.329156]  ret_from_fork+0x10/0x20
[   32.329197] 
[   32.329218] The buggy address belongs to the object at fff00000c9bc6c80
[   32.329218]  which belongs to the cache kmalloc-64 of size 64
[   32.329283] The buggy address is located 0 bytes to the right of
[   32.329283]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.329356] 
[   32.329378] The buggy address belongs to the physical page:
[   32.329412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.329468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.329518] page_type: f5(slab)
[   32.329558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.329610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.329655] page dumped because: kasan: bad access detected
[   32.329690] 
[   32.329711] Memory state around the buggy address:
[   32.329745]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.329791]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.329837] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.329877]                                      ^
[   32.329913]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.329959]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.330001] ==================================================================
[   32.096319] ==================================================================
[   32.096384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   32.096667] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.096747] 
[   32.096898] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.097276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.097337] Hardware name: linux,dummy-virt (DT)
[   32.097372] Call trace:
[   32.097398]  show_stack+0x20/0x38 (C)
[   32.097648]  dump_stack_lvl+0x8c/0xd0
[   32.097714]  print_report+0x118/0x5d0
[   32.097760]  kasan_report+0xdc/0x128
[   32.097806]  kasan_check_range+0x100/0x1a8
[   32.097993]  __kasan_check_write+0x20/0x30
[   32.098073]  kasan_atomics_helper+0x99c/0x4858
[   32.098565]  kasan_atomics+0x198/0x2e0
[   32.098736]  kunit_try_run_case+0x170/0x3f0
[   32.098832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.099021]  kthread+0x328/0x630
[   32.099069]  ret_from_fork+0x10/0x20
[   32.099118] 
[   32.099149] Allocated by task 296:
[   32.099179]  kasan_save_stack+0x3c/0x68
[   32.099225]  kasan_save_track+0x20/0x40
[   32.099374]  kasan_save_alloc_info+0x40/0x58
[   32.099573]  __kasan_kmalloc+0xd4/0xd8
[   32.099644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.099990]  kasan_atomics+0xb8/0x2e0
[   32.100205]  kunit_try_run_case+0x170/0x3f0
[   32.100260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.100310]  kthread+0x328/0x630
[   32.100698]  ret_from_fork+0x10/0x20
[   32.101045] 
[   32.101086] The buggy address belongs to the object at fff00000c9bc6c80
[   32.101086]  which belongs to the cache kmalloc-64 of size 64
[   32.101163] The buggy address is located 0 bytes to the right of
[   32.101163]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.101426] 
[   32.101559] The buggy address belongs to the physical page:
[   32.101923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.101987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.102038] page_type: f5(slab)
[   32.102078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.102220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.102280] page dumped because: kasan: bad access detected
[   32.102317] 
[   32.102348] Memory state around the buggy address:
[   32.102393]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.102450]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.102497] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.102539]                                      ^
[   32.102575]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.102622]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.102664] ==================================================================
[   32.183657] ==================================================================
[   32.183850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   32.183904] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.183958] 
[   32.184419] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.184576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.184606] Hardware name: linux,dummy-virt (DT)
[   32.184902] Call trace:
[   32.184931]  show_stack+0x20/0x38 (C)
[   32.184985]  dump_stack_lvl+0x8c/0xd0
[   32.185032]  print_report+0x118/0x5d0
[   32.185429]  kasan_report+0xdc/0x128
[   32.185493]  __asan_report_load4_noabort+0x20/0x30
[   32.185548]  kasan_atomics_helper+0x3dd8/0x4858
[   32.185611]  kasan_atomics+0x198/0x2e0
[   32.186079]  kunit_try_run_case+0x170/0x3f0
[   32.186162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.186377]  kthread+0x328/0x630
[   32.186435]  ret_from_fork+0x10/0x20
[   32.186487] 
[   32.186518] Allocated by task 296:
[   32.186748]  kasan_save_stack+0x3c/0x68
[   32.186822]  kasan_save_track+0x20/0x40
[   32.186960]  kasan_save_alloc_info+0x40/0x58
[   32.187000]  __kasan_kmalloc+0xd4/0xd8
[   32.187038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.187234]  kasan_atomics+0xb8/0x2e0
[   32.187286]  kunit_try_run_case+0x170/0x3f0
[   32.187328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.187415]  kthread+0x328/0x630
[   32.187592]  ret_from_fork+0x10/0x20
[   32.187890] 
[   32.187915] The buggy address belongs to the object at fff00000c9bc6c80
[   32.187915]  which belongs to the cache kmalloc-64 of size 64
[   32.187980] The buggy address is located 0 bytes to the right of
[   32.187980]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.188629] 
[   32.188780] The buggy address belongs to the physical page:
[   32.188816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.189173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.189244] page_type: f5(slab)
[   32.189290] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.189344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.189391] page dumped because: kasan: bad access detected
[   32.189423] 
[   32.189445] Memory state around the buggy address:
[   32.189985]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.190537]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.190620] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.190763]                                      ^
[   32.190958]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.191147]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.191192] ==================================================================
[   32.374313] ==================================================================
[   32.374365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   32.374417] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.374469] 
[   32.374499] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.374587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.374616] Hardware name: linux,dummy-virt (DT)
[   32.374649] Call trace:
[   32.374671]  show_stack+0x20/0x38 (C)
[   32.374790]  dump_stack_lvl+0x8c/0xd0
[   32.374840]  print_report+0x118/0x5d0
[   32.375248]  kasan_report+0xdc/0x128
[   32.375844]  __asan_report_load8_noabort+0x20/0x30
[   32.375911]  kasan_atomics_helper+0x3df4/0x4858
[   32.376216]  kasan_atomics+0x198/0x2e0
[   32.376311]  kunit_try_run_case+0x170/0x3f0
[   32.376363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.376421]  kthread+0x328/0x630
[   32.376499]  ret_from_fork+0x10/0x20
[   32.376549] 
[   32.376579] Allocated by task 296:
[   32.376634]  kasan_save_stack+0x3c/0x68
[   32.376678]  kasan_save_track+0x20/0x40
[   32.376718]  kasan_save_alloc_info+0x40/0x58
[   32.376759]  __kasan_kmalloc+0xd4/0xd8
[   32.376819]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.377011]  kasan_atomics+0xb8/0x2e0
[   32.377057]  kunit_try_run_case+0x170/0x3f0
[   32.377517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.377936]  kthread+0x328/0x630
[   32.377973]  ret_from_fork+0x10/0x20
[   32.378162] 
[   32.378191] The buggy address belongs to the object at fff00000c9bc6c80
[   32.378191]  which belongs to the cache kmalloc-64 of size 64
[   32.378256] The buggy address is located 0 bytes to the right of
[   32.378256]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.378326] 
[   32.378348] The buggy address belongs to the physical page:
[   32.378638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.378809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.379243] page_type: f5(slab)
[   32.379288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.379614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.379663] page dumped because: kasan: bad access detected
[   32.379697] 
[   32.379717] Memory state around the buggy address:
[   32.379750]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.379796]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.379890] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.379933]                                      ^
[   32.380203]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.380314]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.380391] ==================================================================
[   32.408050] ==================================================================
[   32.408274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   32.408325] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.408377] 
[   32.408407] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.408568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.408603] Hardware name: linux,dummy-virt (DT)
[   32.408755] Call trace:
[   32.408788]  show_stack+0x20/0x38 (C)
[   32.408902]  dump_stack_lvl+0x8c/0xd0
[   32.408949]  print_report+0x118/0x5d0
[   32.408992]  kasan_report+0xdc/0x128
[   32.409037]  kasan_check_range+0x100/0x1a8
[   32.411145]  __kasan_check_write+0x20/0x30
[   32.411498]  kasan_atomics_helper+0x17ec/0x4858
[   32.411557]  kasan_atomics+0x198/0x2e0
[   32.411613]  kunit_try_run_case+0x170/0x3f0
[   32.411664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.411722]  kthread+0x328/0x630
[   32.411766]  ret_from_fork+0x10/0x20
[   32.411815] 
[   32.411837] Allocated by task 296:
[   32.411868]  kasan_save_stack+0x3c/0x68
[   32.411913]  kasan_save_track+0x20/0x40
[   32.411954]  kasan_save_alloc_info+0x40/0x58
[   32.411994]  __kasan_kmalloc+0xd4/0xd8
[   32.412033]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.412075]  kasan_atomics+0xb8/0x2e0
[   32.412114]  kunit_try_run_case+0x170/0x3f0
[   32.412170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.412218]  kthread+0x328/0x630
[   32.412254]  ret_from_fork+0x10/0x20
[   32.412292] 
[   32.412315] The buggy address belongs to the object at fff00000c9bc6c80
[   32.412315]  which belongs to the cache kmalloc-64 of size 64
[   32.412377] The buggy address is located 0 bytes to the right of
[   32.412377]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.412445] 
[   32.412468] The buggy address belongs to the physical page:
[   32.412501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.412555] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.412606] page_type: f5(slab)
[   32.412645] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.412696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.412741] page dumped because: kasan: bad access detected
[   32.412775] 
[   32.412796] Memory state around the buggy address:
[   32.412830]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.412874]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.412921] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.412962]                                      ^
[   32.412997]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.413042]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.413084] ==================================================================
[   32.217501] ==================================================================
[   32.217555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   32.217607] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.217661] 
[   32.217695] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.217785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.217816] Hardware name: linux,dummy-virt (DT)
[   32.217850] Call trace:
[   32.217873]  show_stack+0x20/0x38 (C)
[   32.217923]  dump_stack_lvl+0x8c/0xd0
[   32.217971]  print_report+0x118/0x5d0
[   32.218016]  kasan_report+0xdc/0x128
[   32.218060]  __asan_report_load8_noabort+0x20/0x30
[   32.218111]  kasan_atomics_helper+0x3f58/0x4858
[   32.218178]  kasan_atomics+0x198/0x2e0
[   32.218227]  kunit_try_run_case+0x170/0x3f0
[   32.218278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.218334]  kthread+0x328/0x630
[   32.218750]  ret_from_fork+0x10/0x20
[   32.218818] 
[   32.218841] Allocated by task 296:
[   32.218872]  kasan_save_stack+0x3c/0x68
[   32.219542]  kasan_save_track+0x20/0x40
[   32.219591]  kasan_save_alloc_info+0x40/0x58
[   32.219633]  __kasan_kmalloc+0xd4/0xd8
[   32.219681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.219724]  kasan_atomics+0xb8/0x2e0
[   32.219914]  kunit_try_run_case+0x170/0x3f0
[   32.219967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.220014]  kthread+0x328/0x630
[   32.220047]  ret_from_fork+0x10/0x20
[   32.220095] 
[   32.220117] The buggy address belongs to the object at fff00000c9bc6c80
[   32.220117]  which belongs to the cache kmalloc-64 of size 64
[   32.220191] The buggy address is located 0 bytes to the right of
[   32.220191]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.220931] 
[   32.220972] The buggy address belongs to the physical page:
[   32.221139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.221269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.221494] page_type: f5(slab)
[   32.221643] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.221699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.222003] page dumped because: kasan: bad access detected
[   32.222273] 
[   32.222343] Memory state around the buggy address:
[   32.222489]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.222537]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.222583] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.222625]                                      ^
[   32.223458]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.223769]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.224057] ==================================================================
[   32.224488] ==================================================================
[   32.224592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   32.224666] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.224719] 
[   32.224753] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.224844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.224874] Hardware name: linux,dummy-virt (DT)
[   32.225354] Call trace:
[   32.225392]  show_stack+0x20/0x38 (C)
[   32.225445]  dump_stack_lvl+0x8c/0xd0
[   32.225491]  print_report+0x118/0x5d0
[   32.225751]  kasan_report+0xdc/0x128
[   32.225807]  kasan_check_range+0x100/0x1a8
[   32.225855]  __kasan_check_write+0x20/0x30
[   32.225903]  kasan_atomics_helper+0xe44/0x4858
[   32.225952]  kasan_atomics+0x198/0x2e0
[   32.226416]  kunit_try_run_case+0x170/0x3f0
[   32.226488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.226546]  kthread+0x328/0x630
[   32.226662]  ret_from_fork+0x10/0x20
[   32.226807] 
[   32.227196] Allocated by task 296:
[   32.227426]  kasan_save_stack+0x3c/0x68
[   32.227482]  kasan_save_track+0x20/0x40
[   32.227528]  kasan_save_alloc_info+0x40/0x58
[   32.227578]  __kasan_kmalloc+0xd4/0xd8
[   32.227641]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.227684]  kasan_atomics+0xb8/0x2e0
[   32.228103]  kunit_try_run_case+0x170/0x3f0
[   32.228260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.228725]  kthread+0x328/0x630
[   32.228985]  ret_from_fork+0x10/0x20
[   32.229200] 
[   32.229227] The buggy address belongs to the object at fff00000c9bc6c80
[   32.229227]  which belongs to the cache kmalloc-64 of size 64
[   32.229291] The buggy address is located 0 bytes to the right of
[   32.229291]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.229359] 
[   32.229380] The buggy address belongs to the physical page:
[   32.229414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.229890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.229947] page_type: f5(slab)
[   32.229987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.230198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.230245] page dumped because: kasan: bad access detected
[   32.230732] 
[   32.231061] Memory state around the buggy address:
[   32.231108]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.231169]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.231238] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.231285]                                      ^
[   32.231321]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.231367]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.231409] ==================================================================
[   32.303267] ==================================================================
[   32.303322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   32.303642] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.303989] 
[   32.304026] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.304234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.304270] Hardware name: linux,dummy-virt (DT)
[   32.304333] Call trace:
[   32.304356]  show_stack+0x20/0x38 (C)
[   32.304463]  dump_stack_lvl+0x8c/0xd0
[   32.304803]  print_report+0x118/0x5d0
[   32.304851]  kasan_report+0xdc/0x128
[   32.305111]  kasan_check_range+0x100/0x1a8
[   32.305255]  __kasan_check_write+0x20/0x30
[   32.305306]  kasan_atomics_helper+0x126c/0x4858
[   32.305661]  kasan_atomics+0x198/0x2e0
[   32.305808]  kunit_try_run_case+0x170/0x3f0
[   32.305859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.305915]  kthread+0x328/0x630
[   32.305958]  ret_from_fork+0x10/0x20
[   32.306457] 
[   32.306573] Allocated by task 296:
[   32.306604]  kasan_save_stack+0x3c/0x68
[   32.307030]  kasan_save_track+0x20/0x40
[   32.307078]  kasan_save_alloc_info+0x40/0x58
[   32.307143]  __kasan_kmalloc+0xd4/0xd8
[   32.307185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.307227]  kasan_atomics+0xb8/0x2e0
[   32.307307]  kunit_try_run_case+0x170/0x3f0
[   32.307433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.307507]  kthread+0x328/0x630
[   32.307683]  ret_from_fork+0x10/0x20
[   32.307742] 
[   32.307832] The buggy address belongs to the object at fff00000c9bc6c80
[   32.307832]  which belongs to the cache kmalloc-64 of size 64
[   32.307895] The buggy address is located 0 bytes to the right of
[   32.307895]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.308012] 
[   32.308059] The buggy address belongs to the physical page:
[   32.308117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.308499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.308564] page_type: f5(slab)
[   32.308821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.309007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.309319] page dumped because: kasan: bad access detected
[   32.309361] 
[   32.309381] Memory state around the buggy address:
[   32.309464]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.309996]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.310143] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.310187]                                      ^
[   32.310224]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.310418]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.310521] ==================================================================
[   32.387752] ==================================================================
[   32.387858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   32.388008] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.388067] 
[   32.388098] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.388212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.388307] Hardware name: linux,dummy-virt (DT)
[   32.388580] Call trace:
[   32.388722]  show_stack+0x20/0x38 (C)
[   32.388775]  dump_stack_lvl+0x8c/0xd0
[   32.388823]  print_report+0x118/0x5d0
[   32.389066]  kasan_report+0xdc/0x128
[   32.389189]  __asan_report_load8_noabort+0x20/0x30
[   32.389243]  kasan_atomics_helper+0x3e10/0x4858
[   32.389300]  kasan_atomics+0x198/0x2e0
[   32.389458]  kunit_try_run_case+0x170/0x3f0
[   32.389572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.389706]  kthread+0x328/0x630
[   32.389851]  ret_from_fork+0x10/0x20
[   32.389900] 
[   32.389928] Allocated by task 296:
[   32.390053]  kasan_save_stack+0x3c/0x68
[   32.390097]  kasan_save_track+0x20/0x40
[   32.390157]  kasan_save_alloc_info+0x40/0x58
[   32.390197]  __kasan_kmalloc+0xd4/0xd8
[   32.390236]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.390278]  kasan_atomics+0xb8/0x2e0
[   32.390601]  kunit_try_run_case+0x170/0x3f0
[   32.390645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.390692]  kthread+0x328/0x630
[   32.391985]  ret_from_fork+0x10/0x20
[   32.392043] 
[   32.392100] The buggy address belongs to the object at fff00000c9bc6c80
[   32.392100]  which belongs to the cache kmalloc-64 of size 64
[   32.392307] The buggy address is located 0 bytes to the right of
[   32.392307]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.392391] 
[   32.392416] The buggy address belongs to the physical page:
[   32.392450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.392512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.392945] page_type: f5(slab)
[   32.393333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.393543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.393589] page dumped because: kasan: bad access detected
[   32.393626] 
[   32.393646] Memory state around the buggy address:
[   32.393680]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.393771]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.393985] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.394172]                                      ^
[   32.394270]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.394365]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.394408] ==================================================================
[   32.311520] ==================================================================
[   32.311687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   32.311739] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.311791] 
[   32.311821] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.311911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.311939] Hardware name: linux,dummy-virt (DT)
[   32.311971] Call trace:
[   32.312005]  show_stack+0x20/0x38 (C)
[   32.312054]  dump_stack_lvl+0x8c/0xd0
[   32.312313]  print_report+0x118/0x5d0
[   32.312715]  kasan_report+0xdc/0x128
[   32.312978]  kasan_check_range+0x100/0x1a8
[   32.313065]  __kasan_check_write+0x20/0x30
[   32.313112]  kasan_atomics_helper+0x12d8/0x4858
[   32.313173]  kasan_atomics+0x198/0x2e0
[   32.313222]  kunit_try_run_case+0x170/0x3f0
[   32.313273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.313329]  kthread+0x328/0x630
[   32.313373]  ret_from_fork+0x10/0x20
[   32.313421] 
[   32.313451] Allocated by task 296:
[   32.313588]  kasan_save_stack+0x3c/0x68
[   32.313646]  kasan_save_track+0x20/0x40
[   32.313752]  kasan_save_alloc_info+0x40/0x58
[   32.313935]  __kasan_kmalloc+0xd4/0xd8
[   32.314120]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.314171]  kasan_atomics+0xb8/0x2e0
[   32.314210]  kunit_try_run_case+0x170/0x3f0
[   32.314276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.314325]  kthread+0x328/0x630
[   32.314360]  ret_from_fork+0x10/0x20
[   32.314739] 
[   32.314761] The buggy address belongs to the object at fff00000c9bc6c80
[   32.314761]  which belongs to the cache kmalloc-64 of size 64
[   32.315140] The buggy address is located 0 bytes to the right of
[   32.315140]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.315217] 
[   32.315542] The buggy address belongs to the physical page:
[   32.315582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.315639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.315741] page_type: f5(slab)
[   32.315885] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.315993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.316052] page dumped because: kasan: bad access detected
[   32.316095] 
[   32.316115] Memory state around the buggy address:
[   32.316222]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.316276]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.316321] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.316434]                                      ^
[   32.316752]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.316927]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.317022] ==================================================================
[   32.361928] ==================================================================
[   32.362011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   32.362062] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.362114] 
[   32.362156] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.362254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.362285] Hardware name: linux,dummy-virt (DT)
[   32.362316] Call trace:
[   32.362527]  show_stack+0x20/0x38 (C)
[   32.362581]  dump_stack_lvl+0x8c/0xd0
[   32.362973]  print_report+0x118/0x5d0
[   32.363029]  kasan_report+0xdc/0x128
[   32.363073]  __asan_report_load8_noabort+0x20/0x30
[   32.363123]  kasan_atomics_helper+0x3db0/0x4858
[   32.363185]  kasan_atomics+0x198/0x2e0
[   32.363240]  kunit_try_run_case+0x170/0x3f0
[   32.363480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.363744]  kthread+0x328/0x630
[   32.363866]  ret_from_fork+0x10/0x20
[   32.363938] 
[   32.363959] Allocated by task 296:
[   32.363988]  kasan_save_stack+0x3c/0x68
[   32.364031]  kasan_save_track+0x20/0x40
[   32.364078]  kasan_save_alloc_info+0x40/0x58
[   32.364165]  __kasan_kmalloc+0xd4/0xd8
[   32.364205]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.364246]  kasan_atomics+0xb8/0x2e0
[   32.364335]  kunit_try_run_case+0x170/0x3f0
[   32.364811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.364872]  kthread+0x328/0x630
[   32.364908]  ret_from_fork+0x10/0x20
[   32.364946] 
[   32.365162] The buggy address belongs to the object at fff00000c9bc6c80
[   32.365162]  which belongs to the cache kmalloc-64 of size 64
[   32.365429] The buggy address is located 0 bytes to the right of
[   32.365429]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.365567] 
[   32.365634] The buggy address belongs to the physical page:
[   32.365669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.365725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.365773] page_type: f5(slab)
[   32.366038] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.366170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.366216] page dumped because: kasan: bad access detected
[   32.366251] 
[   32.366270] Memory state around the buggy address:
[   32.366304]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.366725]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.366779] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.366820]                                      ^
[   32.367103]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.367166]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.367208] ==================================================================
[   32.367458] ==================================================================
[   32.367515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   32.367566] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.367618] 
[   32.367649] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.367737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.367765] Hardware name: linux,dummy-virt (DT)
[   32.367798] Call trace:
[   32.367821]  show_stack+0x20/0x38 (C)
[   32.368275]  dump_stack_lvl+0x8c/0xd0
[   32.368767]  print_report+0x118/0x5d0
[   32.368818]  kasan_report+0xdc/0x128
[   32.369426]  kasan_check_range+0x100/0x1a8
[   32.369654]  __kasan_check_write+0x20/0x30
[   32.369803]  kasan_atomics_helper+0x1644/0x4858
[   32.369909]  kasan_atomics+0x198/0x2e0
[   32.369957]  kunit_try_run_case+0x170/0x3f0
[   32.370008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.370064]  kthread+0x328/0x630
[   32.370118]  ret_from_fork+0x10/0x20
[   32.370369] 
[   32.370392] Allocated by task 296:
[   32.370421]  kasan_save_stack+0x3c/0x68
[   32.370465]  kasan_save_track+0x20/0x40
[   32.370506]  kasan_save_alloc_info+0x40/0x58
[   32.370546]  __kasan_kmalloc+0xd4/0xd8
[   32.370586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.370630]  kasan_atomics+0xb8/0x2e0
[   32.370672]  kunit_try_run_case+0x170/0x3f0
[   32.370727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.370777]  kthread+0x328/0x630
[   32.371259]  ret_from_fork+0x10/0x20
[   32.371309] 
[   32.371528] The buggy address belongs to the object at fff00000c9bc6c80
[   32.371528]  which belongs to the cache kmalloc-64 of size 64
[   32.371619] The buggy address is located 0 bytes to the right of
[   32.371619]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.371713] 
[   32.371735] The buggy address belongs to the physical page:
[   32.371770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.371824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.371873] page_type: f5(slab)
[   32.371913] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.371966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.372365] page dumped because: kasan: bad access detected
[   32.372406] 
[   32.372447] Memory state around the buggy address:
[   32.372718]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.372877]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.372924] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.373045]                                      ^
[   32.373083]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.373142]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.373730] ==================================================================
[   32.201815] ==================================================================
[   32.201931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   32.201983] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.202037] 
[   32.202069] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.202487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.202537] Hardware name: linux,dummy-virt (DT)
[   32.202585] Call trace:
[   32.202617]  show_stack+0x20/0x38 (C)
[   32.203194]  dump_stack_lvl+0x8c/0xd0
[   32.203265]  print_report+0x118/0x5d0
[   32.203674]  kasan_report+0xdc/0x128
[   32.203742]  __asan_report_load4_noabort+0x20/0x30
[   32.203840]  kasan_atomics_helper+0x3e04/0x4858
[   32.203894]  kasan_atomics+0x198/0x2e0
[   32.203943]  kunit_try_run_case+0x170/0x3f0
[   32.203994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.204146]  kthread+0x328/0x630
[   32.204192]  ret_from_fork+0x10/0x20
[   32.204556] 
[   32.204579] Allocated by task 296:
[   32.204609]  kasan_save_stack+0x3c/0x68
[   32.205000]  kasan_save_track+0x20/0x40
[   32.205052]  kasan_save_alloc_info+0x40/0x58
[   32.205092]  __kasan_kmalloc+0xd4/0xd8
[   32.205277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.205320]  kasan_atomics+0xb8/0x2e0
[   32.205358]  kunit_try_run_case+0x170/0x3f0
[   32.205513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.205563]  kthread+0x328/0x630
[   32.205850]  ret_from_fork+0x10/0x20
[   32.205897] 
[   32.205919] The buggy address belongs to the object at fff00000c9bc6c80
[   32.205919]  which belongs to the cache kmalloc-64 of size 64
[   32.205989] The buggy address is located 0 bytes to the right of
[   32.205989]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.206117] 
[   32.206320] The buggy address belongs to the physical page:
[   32.206355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.206411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.206828] page_type: f5(slab)
[   32.206874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.206928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.206980] page dumped because: kasan: bad access detected
[   32.207084] 
[   32.207105] Memory state around the buggy address:
[   32.207148]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.207310]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.207373] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.207414]                                      ^
[   32.207451]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.207605]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.207648] ==================================================================
[   32.394661] ==================================================================
[   32.394904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   32.394967] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.395021] 
[   32.395053] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.395153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.395181] Hardware name: linux,dummy-virt (DT)
[   32.395214] Call trace:
[   32.395237]  show_stack+0x20/0x38 (C)
[   32.395287]  dump_stack_lvl+0x8c/0xd0
[   32.395784]  print_report+0x118/0x5d0
[   32.395841]  kasan_report+0xdc/0x128
[   32.395886]  kasan_check_range+0x100/0x1a8
[   32.396145]  __kasan_check_write+0x20/0x30
[   32.396250]  kasan_atomics_helper+0x175c/0x4858
[   32.396379]  kasan_atomics+0x198/0x2e0
[   32.396427]  kunit_try_run_case+0x170/0x3f0
[   32.396477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.396532]  kthread+0x328/0x630
[   32.396576]  ret_from_fork+0x10/0x20
[   32.396631] 
[   32.396743] Allocated by task 296:
[   32.396817]  kasan_save_stack+0x3c/0x68
[   32.396936]  kasan_save_track+0x20/0x40
[   32.397027]  kasan_save_alloc_info+0x40/0x58
[   32.397101]  __kasan_kmalloc+0xd4/0xd8
[   32.397151]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.397193]  kasan_atomics+0xb8/0x2e0
[   32.397233]  kunit_try_run_case+0x170/0x3f0
[   32.397274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.397699]  kthread+0x328/0x630
[   32.397752]  ret_from_fork+0x10/0x20
[   32.398276] 
[   32.398335] The buggy address belongs to the object at fff00000c9bc6c80
[   32.398335]  which belongs to the cache kmalloc-64 of size 64
[   32.398402] The buggy address is located 0 bytes to the right of
[   32.398402]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.398474] 
[   32.398497] The buggy address belongs to the physical page:
[   32.398735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.398822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.399370] page_type: f5(slab)
[   32.399410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.399702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.399883] page dumped because: kasan: bad access detected
[   32.399921] 
[   32.400003] Memory state around the buggy address:
[   32.400222]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.400269]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.400316] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.400358]                                      ^
[   32.400393]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.400438]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.400480] ==================================================================
[   32.240677] ==================================================================
[   32.240763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   32.240814] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.240869] 
[   32.240902] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.240993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.241022] Hardware name: linux,dummy-virt (DT)
[   32.241055] Call trace:
[   32.241078]  show_stack+0x20/0x38 (C)
[   32.241138]  dump_stack_lvl+0x8c/0xd0
[   32.241556]  print_report+0x118/0x5d0
[   32.241620]  kasan_report+0xdc/0x128
[   32.241751]  kasan_check_range+0x100/0x1a8
[   32.242085]  __kasan_check_write+0x20/0x30
[   32.242281]  kasan_atomics_helper+0xeb8/0x4858
[   32.242501]  kasan_atomics+0x198/0x2e0
[   32.242551]  kunit_try_run_case+0x170/0x3f0
[   32.242601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.242657]  kthread+0x328/0x630
[   32.242701]  ret_from_fork+0x10/0x20
[   32.243170] 
[   32.243197] Allocated by task 296:
[   32.243230]  kasan_save_stack+0x3c/0x68
[   32.243277]  kasan_save_track+0x20/0x40
[   32.243325]  kasan_save_alloc_info+0x40/0x58
[   32.243427]  __kasan_kmalloc+0xd4/0xd8
[   32.243527]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.243634]  kasan_atomics+0xb8/0x2e0
[   32.243696]  kunit_try_run_case+0x170/0x3f0
[   32.243860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.244153]  kthread+0x328/0x630
[   32.244384]  ret_from_fork+0x10/0x20
[   32.244458] 
[   32.244587] The buggy address belongs to the object at fff00000c9bc6c80
[   32.244587]  which belongs to the cache kmalloc-64 of size 64
[   32.244668] The buggy address is located 0 bytes to the right of
[   32.244668]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.244735] 
[   32.245255] The buggy address belongs to the physical page:
[   32.245304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.245360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.245422] page_type: f5(slab)
[   32.245464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.245552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.245620] page dumped because: kasan: bad access detected
[   32.245957] 
[   32.246066] Memory state around the buggy address:
[   32.246105]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.246162]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.246305] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.246589]                                      ^
[   32.246638]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.246684]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.246726] ==================================================================
[   32.279284] ==================================================================
[   32.279334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   32.279481] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.279556] 
[   32.279592] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.279841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.279869] Hardware name: linux,dummy-virt (DT)
[   32.279902] Call trace:
[   32.279925]  show_stack+0x20/0x38 (C)
[   32.279973]  dump_stack_lvl+0x8c/0xd0
[   32.280119]  print_report+0x118/0x5d0
[   32.280173]  kasan_report+0xdc/0x128
[   32.280223]  kasan_check_range+0x100/0x1a8
[   32.280355]  __kasan_check_write+0x20/0x30
[   32.280449]  kasan_atomics_helper+0x10c0/0x4858
[   32.280643]  kasan_atomics+0x198/0x2e0
[   32.280691]  kunit_try_run_case+0x170/0x3f0
[   32.280742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.280798]  kthread+0x328/0x630
[   32.280840]  ret_from_fork+0x10/0x20
[   32.280889] 
[   32.280909] Allocated by task 296:
[   32.280937]  kasan_save_stack+0x3c/0x68
[   32.280980]  kasan_save_track+0x20/0x40
[   32.281021]  kasan_save_alloc_info+0x40/0x58
[   32.281060]  __kasan_kmalloc+0xd4/0xd8
[   32.281099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.281150]  kasan_atomics+0xb8/0x2e0
[   32.281189]  kunit_try_run_case+0x170/0x3f0
[   32.281232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.281279]  kthread+0x328/0x630
[   32.281339]  ret_from_fork+0x10/0x20
[   32.281378] 
[   32.281398] The buggy address belongs to the object at fff00000c9bc6c80
[   32.281398]  which belongs to the cache kmalloc-64 of size 64
[   32.281460] The buggy address is located 0 bytes to the right of
[   32.281460]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.281530] 
[   32.281550] The buggy address belongs to the physical page:
[   32.281584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.281635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.281979] page_type: f5(slab)
[   32.282124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.282188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.282337] page dumped because: kasan: bad access detected
[   32.282422] 
[   32.282442] Memory state around the buggy address:
[   32.282476]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.282521]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.282567] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.282608]                                      ^
[   32.282643]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.282688]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.282739] ==================================================================
[   32.121027] ==================================================================
[   32.121081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   32.121351] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.121722] 
[   32.121900] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.122209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.122254] Hardware name: linux,dummy-virt (DT)
[   32.122421] Call trace:
[   32.122457]  show_stack+0x20/0x38 (C)
[   32.122692]  dump_stack_lvl+0x8c/0xd0
[   32.122760]  print_report+0x118/0x5d0
[   32.123161]  kasan_report+0xdc/0x128
[   32.123266]  kasan_check_range+0x100/0x1a8
[   32.123323]  __kasan_check_write+0x20/0x30
[   32.123655]  kasan_atomics_helper+0xad4/0x4858
[   32.123752]  kasan_atomics+0x198/0x2e0
[   32.124106]  kunit_try_run_case+0x170/0x3f0
[   32.124221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.124383]  kthread+0x328/0x630
[   32.124470]  ret_from_fork+0x10/0x20
[   32.124782] 
[   32.124931] Allocated by task 296:
[   32.125021]  kasan_save_stack+0x3c/0x68
[   32.125148]  kasan_save_track+0x20/0x40
[   32.125207]  kasan_save_alloc_info+0x40/0x58
[   32.125320]  __kasan_kmalloc+0xd4/0xd8
[   32.125362]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.125435]  kasan_atomics+0xb8/0x2e0
[   32.125627]  kunit_try_run_case+0x170/0x3f0
[   32.125994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.126210]  kthread+0x328/0x630
[   32.126280]  ret_from_fork+0x10/0x20
[   32.126380] 
[   32.126460] The buggy address belongs to the object at fff00000c9bc6c80
[   32.126460]  which belongs to the cache kmalloc-64 of size 64
[   32.126537] The buggy address is located 0 bytes to the right of
[   32.126537]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.126901] 
[   32.126954] The buggy address belongs to the physical page:
[   32.127284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.127380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.127484] page_type: f5(slab)
[   32.127580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.127695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.127744] page dumped because: kasan: bad access detected
[   32.127778] 
[   32.127800] Memory state around the buggy address:
[   32.127835]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.127880]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.128187] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.128519]                                      ^
[   32.128706]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.128821]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.128865] ==================================================================
[   32.077640] ==================================================================
[   32.077863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   32.077958] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.078110] 
[   32.078157] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.078246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.078277] Hardware name: linux,dummy-virt (DT)
[   32.078311] Call trace:
[   32.078563]  show_stack+0x20/0x38 (C)
[   32.079178]  dump_stack_lvl+0x8c/0xd0
[   32.079343]  print_report+0x118/0x5d0
[   32.079430]  kasan_report+0xdc/0x128
[   32.079675]  __asan_report_load4_noabort+0x20/0x30
[   32.079892]  kasan_atomics_helper+0x42d8/0x4858
[   32.079980]  kasan_atomics+0x198/0x2e0
[   32.080104]  kunit_try_run_case+0x170/0x3f0
[   32.080170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.080379]  kthread+0x328/0x630
[   32.081213]  kasan_save_stack+0x3c/0x68
[   32.082418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.083591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.083691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.084426] page dumped because: kasan: bad access detected
[   32.084628] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.087208] 
[   32.088013]  __kasan_check_write+0x20/0x30
[   32.089593] 
[   32.089688]  kasan_save_stack+0x3c/0x68
[   32.090022]  kasan_save_track+0x20/0x40
[   32.090078]  kasan_save_alloc_info+0x40/0x58
[   32.090245]  __kasan_kmalloc+0xd4/0xd8
[   32.090460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.090725]  kasan_atomics+0xb8/0x2e0
[   32.090870]  kunit_try_run_case+0x170/0x3f0
[   32.090918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.091068]  kthread+0x328/0x630
[   32.091110]  ret_from_fork+0x10/0x20
[   32.091162] 
[   32.091404] The buggy address belongs to the object at fff00000c9bc6c80
[   32.091404]  which belongs to the cache kmalloc-64 of size 64
[   32.091779] The buggy address is located 0 bytes to the right of
[   32.091779]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.091960] 
[   32.092009] The buggy address belongs to the physical page:
[   32.092044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.092419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.092507] page_type: f5(slab)
[   32.092969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.093186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.093461] page dumped because: kasan: bad access detected
[   32.093559] 
[   32.093629] Memory state around the buggy address:
[   32.093875]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.094076]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.094140] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.094182]                                      ^
[   32.094220]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.094516]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.094804] ==================================================================
[   32.282933] ==================================================================
[   32.283006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   32.283172] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.283242] 
[   32.283293] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.283567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.283608] Hardware name: linux,dummy-virt (DT)
[   32.283641] Call trace:
[   32.283698]  show_stack+0x20/0x38 (C)
[   32.283791]  dump_stack_lvl+0x8c/0xd0
[   32.283995]  print_report+0x118/0x5d0
[   32.284145]  kasan_report+0xdc/0x128
[   32.284189]  kasan_check_range+0x100/0x1a8
[   32.284500]  __kasan_check_write+0x20/0x30
[   32.284705]  kasan_atomics_helper+0x1128/0x4858
[   32.284883]  kasan_atomics+0x198/0x2e0
[   32.284931]  kunit_try_run_case+0x170/0x3f0
[   32.284982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.285045]  kthread+0x328/0x630
[   32.285295]  ret_from_fork+0x10/0x20
[   32.285357] 
[   32.285385] Allocated by task 296:
[   32.285521]  kasan_save_stack+0x3c/0x68
[   32.285573]  kasan_save_track+0x20/0x40
[   32.285742]  kasan_save_alloc_info+0x40/0x58
[   32.285844]  __kasan_kmalloc+0xd4/0xd8
[   32.285960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.286110]  kasan_atomics+0xb8/0x2e0
[   32.286158]  kunit_try_run_case+0x170/0x3f0
[   32.286199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.286246]  kthread+0x328/0x630
[   32.286282]  ret_from_fork+0x10/0x20
[   32.286320] 
[   32.286341] The buggy address belongs to the object at fff00000c9bc6c80
[   32.286341]  which belongs to the cache kmalloc-64 of size 64
[   32.286599] The buggy address is located 0 bytes to the right of
[   32.286599]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.286676] 
[   32.286720] The buggy address belongs to the physical page:
[   32.286756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.286904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.287095] page_type: f5(slab)
[   32.287144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.287197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.287254] page dumped because: kasan: bad access detected
[   32.287301] 
[   32.287357] Memory state around the buggy address:
[   32.287390]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.287437]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.287591] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.287633]                                      ^
[   32.287668]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.287714]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.287755] ==================================================================
[   32.247560] ==================================================================
[   32.247615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   32.247885] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.247959] 
[   32.248351] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.248673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.248704] Hardware name: linux,dummy-virt (DT)
[   32.248738] Call trace:
[   32.248764]  show_stack+0x20/0x38 (C)
[   32.249102]  dump_stack_lvl+0x8c/0xd0
[   32.249390]  print_report+0x118/0x5d0
[   32.249452]  kasan_report+0xdc/0x128
[   32.249499]  kasan_check_range+0x100/0x1a8
[   32.249597]  __kasan_check_write+0x20/0x30
[   32.249696]  kasan_atomics_helper+0xf20/0x4858
[   32.250046]  kasan_atomics+0x198/0x2e0
[   32.250110]  kunit_try_run_case+0x170/0x3f0
[   32.250171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.250487]  kthread+0x328/0x630
[   32.250788]  ret_from_fork+0x10/0x20
[   32.250839] 
[   32.251043] Allocated by task 296:
[   32.251074]  kasan_save_stack+0x3c/0x68
[   32.251212]  kasan_save_track+0x20/0x40
[   32.251272]  kasan_save_alloc_info+0x40/0x58
[   32.251313]  __kasan_kmalloc+0xd4/0xd8
[   32.251353]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.251827]  kasan_atomics+0xb8/0x2e0
[   32.251898]  kunit_try_run_case+0x170/0x3f0
[   32.251943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.252649]  kthread+0x328/0x630
[   32.252708]  ret_from_fork+0x10/0x20
[   32.252749] 
[   32.252771] The buggy address belongs to the object at fff00000c9bc6c80
[   32.252771]  which belongs to the cache kmalloc-64 of size 64
[   32.252838] The buggy address is located 0 bytes to the right of
[   32.252838]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.253348] 
[   32.253376] The buggy address belongs to the physical page:
[   32.253409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.253467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.253791] page_type: f5(slab)
[   32.253832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.253888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.253934] page dumped because: kasan: bad access detected
[   32.254511] 
[   32.254536] Memory state around the buggy address:
[   32.254573]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.254621]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.254676] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.254794]                                      ^
[   32.255022]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.255069]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.255111] ==================================================================
[   32.400735] ==================================================================
[   32.400983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   32.401644] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.401704] 
[   32.401906] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.402000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.402035] Hardware name: linux,dummy-virt (DT)
[   32.402199] Call trace:
[   32.402223]  show_stack+0x20/0x38 (C)
[   32.402274]  dump_stack_lvl+0x8c/0xd0
[   32.402320]  print_report+0x118/0x5d0
[   32.402366]  kasan_report+0xdc/0x128
[   32.402409]  __asan_report_load8_noabort+0x20/0x30
[   32.402461]  kasan_atomics_helper+0x3e20/0x4858
[   32.402511]  kasan_atomics+0x198/0x2e0
[   32.402558]  kunit_try_run_case+0x170/0x3f0
[   32.402615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.403018]  kthread+0x328/0x630
[   32.403618]  ret_from_fork+0x10/0x20
[   32.403679] 
[   32.403705] Allocated by task 296:
[   32.403736]  kasan_save_stack+0x3c/0x68
[   32.403780]  kasan_save_track+0x20/0x40
[   32.403821]  kasan_save_alloc_info+0x40/0x58
[   32.403862]  __kasan_kmalloc+0xd4/0xd8
[   32.403904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.403947]  kasan_atomics+0xb8/0x2e0
[   32.404139]  kunit_try_run_case+0x170/0x3f0
[   32.404494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.404582]  kthread+0x328/0x630
[   32.404618]  ret_from_fork+0x10/0x20
[   32.404656] 
[   32.404678] The buggy address belongs to the object at fff00000c9bc6c80
[   32.404678]  which belongs to the cache kmalloc-64 of size 64
[   32.405057] The buggy address is located 0 bytes to the right of
[   32.405057]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.405145] 
[   32.405168] The buggy address belongs to the physical page:
[   32.405208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.405459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.405833] page_type: f5(slab)
[   32.405873] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.405926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.405997] page dumped because: kasan: bad access detected
[   32.406562] 
[   32.406748] Memory state around the buggy address:
[   32.406786]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.406920]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.407077] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.407286]                                      ^
[   32.407341]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.407387]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.407430] ==================================================================
[   32.273664] ==================================================================
[   32.273715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   32.273764] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.273816] 
[   32.273848] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.274211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.274350] Hardware name: linux,dummy-virt (DT)
[   32.274390] Call trace:
[   32.274624]  show_stack+0x20/0x38 (C)
[   32.274863]  dump_stack_lvl+0x8c/0xd0
[   32.274922]  print_report+0x118/0x5d0
[   32.275101]  kasan_report+0xdc/0x128
[   32.275225]  kasan_check_range+0x100/0x1a8
[   32.275294]  __kasan_check_write+0x20/0x30
[   32.275433]  kasan_atomics_helper+0x1058/0x4858
[   32.275767]  kasan_atomics+0x198/0x2e0
[   32.275823]  kunit_try_run_case+0x170/0x3f0
[   32.275874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.275933]  kthread+0x328/0x630
[   32.276016]  ret_from_fork+0x10/0x20
[   32.276065] 
[   32.276088] Allocated by task 296:
[   32.276119]  kasan_save_stack+0x3c/0x68
[   32.276173]  kasan_save_track+0x20/0x40
[   32.276214]  kasan_save_alloc_info+0x40/0x58
[   32.276262]  __kasan_kmalloc+0xd4/0xd8
[   32.276304]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.276346]  kasan_atomics+0xb8/0x2e0
[   32.276438]  kunit_try_run_case+0x170/0x3f0
[   32.276488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.276660]  kthread+0x328/0x630
[   32.276825]  ret_from_fork+0x10/0x20
[   32.276993] 
[   32.277014] The buggy address belongs to the object at fff00000c9bc6c80
[   32.277014]  which belongs to the cache kmalloc-64 of size 64
[   32.277077] The buggy address is located 0 bytes to the right of
[   32.277077]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.277299] 
[   32.277349] The buggy address belongs to the physical page:
[   32.277919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.278047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.278108] page_type: f5(slab)
[   32.278191] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.278273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.278317] page dumped because: kasan: bad access detected
[   32.278350] 
[   32.278371] Memory state around the buggy address:
[   32.278404]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.278450]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.278745] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.278790]                                      ^
[   32.278864]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.278909]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.279008] ==================================================================
[   32.232008] ==================================================================
[   32.232355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   32.232408] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.232461] 
[   32.232492] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.233254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.233521] Hardware name: linux,dummy-virt (DT)
[   32.233633] Call trace:
[   32.233757]  show_stack+0x20/0x38 (C)
[   32.233811]  dump_stack_lvl+0x8c/0xd0
[   32.234032]  print_report+0x118/0x5d0
[   32.234083]  kasan_report+0xdc/0x128
[   32.234141]  __asan_report_store8_noabort+0x20/0x30
[   32.234431]  kasan_atomics_helper+0x3e5c/0x4858
[   32.234646]  kasan_atomics+0x198/0x2e0
[   32.234696]  kunit_try_run_case+0x170/0x3f0
[   32.234782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.235067]  kthread+0x328/0x630
[   32.235402]  ret_from_fork+0x10/0x20
[   32.235490] 
[   32.235515] Allocated by task 296:
[   32.235834]  kasan_save_stack+0x3c/0x68
[   32.235929]  kasan_save_track+0x20/0x40
[   32.235979]  kasan_save_alloc_info+0x40/0x58
[   32.236019]  __kasan_kmalloc+0xd4/0xd8
[   32.236356]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.236774]  kasan_atomics+0xb8/0x2e0
[   32.236818]  kunit_try_run_case+0x170/0x3f0
[   32.236860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.237057]  kthread+0x328/0x630
[   32.237101]  ret_from_fork+0x10/0x20
[   32.237410] 
[   32.237436] The buggy address belongs to the object at fff00000c9bc6c80
[   32.237436]  which belongs to the cache kmalloc-64 of size 64
[   32.237654] The buggy address is located 0 bytes to the right of
[   32.237654]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.237730] 
[   32.237832] The buggy address belongs to the physical page:
[   32.238089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.238202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.238363] page_type: f5(slab)
[   32.238470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.238525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.238787] page dumped because: kasan: bad access detected
[   32.238826] 
[   32.238847] Memory state around the buggy address:
[   32.238882]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.238994]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.239193] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.239335]                                      ^
[   32.239376]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.239422]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.239471] ==================================================================
[   32.334233] ==================================================================
[   32.334283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   32.334330] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.334381] 
[   32.334411] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.334499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.334529] Hardware name: linux,dummy-virt (DT)
[   32.334560] Call trace:
[   32.334585]  show_stack+0x20/0x38 (C)
[   32.334632]  dump_stack_lvl+0x8c/0xd0
[   32.334678]  print_report+0x118/0x5d0
[   32.334734]  kasan_report+0xdc/0x128
[   32.334777]  kasan_check_range+0x100/0x1a8
[   32.334823]  __kasan_check_write+0x20/0x30
[   32.334938]  kasan_atomics_helper+0x147c/0x4858
[   32.335707]  kasan_atomics+0x198/0x2e0
[   32.335976]  kunit_try_run_case+0x170/0x3f0
[   32.336274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.336801]  kthread+0x328/0x630
[   32.336862]  ret_from_fork+0x10/0x20
[   32.336918] 
[   32.337339] Allocated by task 296:
[   32.337560]  kasan_save_stack+0x3c/0x68
[   32.337680]  kasan_save_track+0x20/0x40
[   32.337760]  kasan_save_alloc_info+0x40/0x58
[   32.337806]  __kasan_kmalloc+0xd4/0xd8
[   32.337886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.337980]  kasan_atomics+0xb8/0x2e0
[   32.338040]  kunit_try_run_case+0x170/0x3f0
[   32.338599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.338737]  kthread+0x328/0x630
[   32.338918]  ret_from_fork+0x10/0x20
[   32.338962] 
[   32.339110] The buggy address belongs to the object at fff00000c9bc6c80
[   32.339110]  which belongs to the cache kmalloc-64 of size 64
[   32.339195] The buggy address is located 0 bytes to the right of
[   32.339195]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.339433] 
[   32.339562] The buggy address belongs to the physical page:
[   32.339603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.339658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.339709] page_type: f5(slab)
[   32.339798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.340012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.340082] page dumped because: kasan: bad access detected
[   32.340147] 
[   32.340167] Memory state around the buggy address:
[   32.340210]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.340293]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.340372] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.340414]                                      ^
[   32.340566]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.340820]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.340865] ==================================================================
[   32.112536] ==================================================================
[   32.112590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   32.112639] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.112694] 
[   32.112727] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.112828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.112857] Hardware name: linux,dummy-virt (DT)
[   32.112888] Call trace:
[   32.112921]  show_stack+0x20/0x38 (C)
[   32.112980]  dump_stack_lvl+0x8c/0xd0
[   32.113027]  print_report+0x118/0x5d0
[   32.113071]  kasan_report+0xdc/0x128
[   32.113114]  kasan_check_range+0x100/0x1a8
[   32.113582]  __kasan_check_write+0x20/0x30
[   32.114001]  kasan_atomics_helper+0xa6c/0x4858
[   32.114068]  kasan_atomics+0x198/0x2e0
[   32.114146]  kunit_try_run_case+0x170/0x3f0
[   32.114199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.114256]  kthread+0x328/0x630
[   32.114306]  ret_from_fork+0x10/0x20
[   32.114781] 
[   32.114843] Allocated by task 296:
[   32.114897]  kasan_save_stack+0x3c/0x68
[   32.115008]  kasan_save_track+0x20/0x40
[   32.115074]  kasan_save_alloc_info+0x40/0x58
[   32.115201]  __kasan_kmalloc+0xd4/0xd8
[   32.115290]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.115560]  kasan_atomics+0xb8/0x2e0
[   32.115720]  kunit_try_run_case+0x170/0x3f0
[   32.115826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.115948]  kthread+0x328/0x630
[   32.116027]  ret_from_fork+0x10/0x20
[   32.116360] 
[   32.116435] The buggy address belongs to the object at fff00000c9bc6c80
[   32.116435]  which belongs to the cache kmalloc-64 of size 64
[   32.116592] The buggy address is located 0 bytes to the right of
[   32.116592]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.116678] 
[   32.116700] The buggy address belongs to the physical page:
[   32.116735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.117323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.117439] page_type: f5(slab)
[   32.117533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.117716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.117955] page dumped because: kasan: bad access detected
[   32.118019] 
[   32.118385] Memory state around the buggy address:
[   32.118485]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.118553]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.118710] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.118926]                                      ^
[   32.119180]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.119349]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.119693] ==================================================================
[   32.380939] ==================================================================
[   32.380994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   32.381045] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.381382] 
[   32.381433] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.381609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.381729] Hardware name: linux,dummy-virt (DT)
[   32.381762] Call trace:
[   32.381794]  show_stack+0x20/0x38 (C)
[   32.381977]  dump_stack_lvl+0x8c/0xd0
[   32.382051]  print_report+0x118/0x5d0
[   32.382095]  kasan_report+0xdc/0x128
[   32.382151]  kasan_check_range+0x100/0x1a8
[   32.382198]  __kasan_check_write+0x20/0x30
[   32.382244]  kasan_atomics_helper+0x16d0/0x4858
[   32.382294]  kasan_atomics+0x198/0x2e0
[   32.382340]  kunit_try_run_case+0x170/0x3f0
[   32.382390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.382446]  kthread+0x328/0x630
[   32.382489]  ret_from_fork+0x10/0x20
[   32.382537] 
[   32.382559] Allocated by task 296:
[   32.382588]  kasan_save_stack+0x3c/0x68
[   32.382630]  kasan_save_track+0x20/0x40
[   32.382679]  kasan_save_alloc_info+0x40/0x58
[   32.384816]  __kasan_kmalloc+0xd4/0xd8
[   32.384956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.384999]  kasan_atomics+0xb8/0x2e0
[   32.385039]  kunit_try_run_case+0x170/0x3f0
[   32.385081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.385138]  kthread+0x328/0x630
[   32.385526]  ret_from_fork+0x10/0x20
[   32.385576] 
[   32.385600] The buggy address belongs to the object at fff00000c9bc6c80
[   32.385600]  which belongs to the cache kmalloc-64 of size 64
[   32.385663] The buggy address is located 0 bytes to the right of
[   32.385663]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.385745] 
[   32.385767] The buggy address belongs to the physical page:
[   32.385802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.386157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.386218] page_type: f5(slab)
[   32.386257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.386310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.386356] page dumped because: kasan: bad access detected
[   32.386629] 
[   32.386663] Memory state around the buggy address:
[   32.386803]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.386963]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.387008] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.387050]                                      ^
[   32.387085]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.387470]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.387574] ==================================================================
[   32.354790] ==================================================================
[   32.354996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   32.355047] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.355100] 
[   32.355144] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.355233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.355274] Hardware name: linux,dummy-virt (DT)
[   32.355306] Call trace:
[   32.355331]  show_stack+0x20/0x38 (C)
[   32.356029]  dump_stack_lvl+0x8c/0xd0
[   32.356203]  print_report+0x118/0x5d0
[   32.356257]  kasan_report+0xdc/0x128
[   32.356312]  kasan_check_range+0x100/0x1a8
[   32.356545]  __kasan_check_write+0x20/0x30
[   32.356607]  kasan_atomics_helper+0x15b4/0x4858
[   32.356659]  kasan_atomics+0x198/0x2e0
[   32.356708]  kunit_try_run_case+0x170/0x3f0
[   32.356758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.357040]  kthread+0x328/0x630
[   32.357289]  ret_from_fork+0x10/0x20
[   32.357339] 
[   32.357571] Allocated by task 296:
[   32.357686]  kasan_save_stack+0x3c/0x68
[   32.357740]  kasan_save_track+0x20/0x40
[   32.357782]  kasan_save_alloc_info+0x40/0x58
[   32.357861]  __kasan_kmalloc+0xd4/0xd8
[   32.357921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.358095]  kasan_atomics+0xb8/0x2e0
[   32.358783]  kunit_try_run_case+0x170/0x3f0
[   32.359041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.359095]  kthread+0x328/0x630
[   32.359143]  ret_from_fork+0x10/0x20
[   32.359239] 
[   32.359263] The buggy address belongs to the object at fff00000c9bc6c80
[   32.359263]  which belongs to the cache kmalloc-64 of size 64
[   32.359333] The buggy address is located 0 bytes to the right of
[   32.359333]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.359402] 
[   32.359531] The buggy address belongs to the physical page:
[   32.359817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.359876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.359926] page_type: f5(slab)
[   32.359970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.360486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.360539] page dumped because: kasan: bad access detected
[   32.360803] 
[   32.360850] Memory state around the buggy address:
[   32.360914]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.361027]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.361073] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.361114]                                      ^
[   32.361163]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.361208]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.361250] ==================================================================
[   32.130091] ==================================================================
[   32.130162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   32.130234] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.130291] 
[   32.130323] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.130413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.130442] Hardware name: linux,dummy-virt (DT)
[   32.130476] Call trace:
[   32.130510]  show_stack+0x20/0x38 (C)
[   32.130570]  dump_stack_lvl+0x8c/0xd0
[   32.130619]  print_report+0x118/0x5d0
[   32.130678]  kasan_report+0xdc/0x128
[   32.130998]  __asan_report_load4_noabort+0x20/0x30
[   32.131429]  kasan_atomics_helper+0x3dcc/0x4858
[   32.131523]  kasan_atomics+0x198/0x2e0
[   32.131595]  kunit_try_run_case+0x170/0x3f0
[   32.132019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.132279]  kthread+0x328/0x630
[   32.132457]  ret_from_fork+0x10/0x20
[   32.132874] 
[   32.132915] Allocated by task 296:
[   32.133073]  kasan_save_stack+0x3c/0x68
[   32.133181]  kasan_save_track+0x20/0x40
[   32.133486]  kasan_save_alloc_info+0x40/0x58
[   32.133653]  __kasan_kmalloc+0xd4/0xd8
[   32.133722]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.134135]  kasan_atomics+0xb8/0x2e0
[   32.134248]  kunit_try_run_case+0x170/0x3f0
[   32.134359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.134446]  kthread+0x328/0x630
[   32.134651]  ret_from_fork+0x10/0x20
[   32.134847] 
[   32.134904] The buggy address belongs to the object at fff00000c9bc6c80
[   32.134904]  which belongs to the cache kmalloc-64 of size 64
[   32.135207] The buggy address is located 0 bytes to the right of
[   32.135207]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.135582] 
[   32.135919] The buggy address belongs to the physical page:
[   32.136103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.136221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.136362] page_type: f5(slab)
[   32.136433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.136515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.136560] page dumped because: kasan: bad access detected
[   32.136749] 
[   32.136942] Memory state around the buggy address:
[   32.137184]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.137425]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.137509] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.137612]                                      ^
[   32.137721]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.137788]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.137832] ==================================================================
[   32.348690] ==================================================================
[   32.348743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   32.348793] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.349535] 
[   32.349640] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.349813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.349844] Hardware name: linux,dummy-virt (DT)
[   32.349876] Call trace:
[   32.349907]  show_stack+0x20/0x38 (C)
[   32.350140]  dump_stack_lvl+0x8c/0xd0
[   32.350188]  print_report+0x118/0x5d0
[   32.350234]  kasan_report+0xdc/0x128
[   32.350755]  kasan_check_range+0x100/0x1a8
[   32.350961]  __kasan_check_write+0x20/0x30
[   32.351075]  kasan_atomics_helper+0x154c/0x4858
[   32.351208]  kasan_atomics+0x198/0x2e0
[   32.351259]  kunit_try_run_case+0x170/0x3f0
[   32.351310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.351367]  kthread+0x328/0x630
[   32.351411]  ret_from_fork+0x10/0x20
[   32.351482] 
[   32.351509] Allocated by task 296:
[   32.351540]  kasan_save_stack+0x3c/0x68
[   32.351588]  kasan_save_track+0x20/0x40
[   32.351657]  kasan_save_alloc_info+0x40/0x58
[   32.351698]  __kasan_kmalloc+0xd4/0xd8
[   32.351779]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.351983]  kasan_atomics+0xb8/0x2e0
[   32.352034]  kunit_try_run_case+0x170/0x3f0
[   32.352077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.352135]  kthread+0x328/0x630
[   32.352170]  ret_from_fork+0x10/0x20
[   32.352209] 
[   32.352230] The buggy address belongs to the object at fff00000c9bc6c80
[   32.352230]  which belongs to the cache kmalloc-64 of size 64
[   32.352745] The buggy address is located 0 bytes to the right of
[   32.352745]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.352822] 
[   32.352896] The buggy address belongs to the physical page:
[   32.353058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.353173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.353223] page_type: f5(slab)
[   32.353261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.353315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.353361] page dumped because: kasan: bad access detected
[   32.353395] 
[   32.353418] Memory state around the buggy address:
[   32.353453]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.353500]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.353547] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.353588]                                      ^
[   32.353624]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.353669]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.353712] ==================================================================
[   32.255968] ==================================================================
[   32.256162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   32.256215] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.256599] 
[   32.256667] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.256971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.257014] Hardware name: linux,dummy-virt (DT)
[   32.257225] Call trace:
[   32.257400]  show_stack+0x20/0x38 (C)
[   32.257456]  dump_stack_lvl+0x8c/0xd0
[   32.257504]  print_report+0x118/0x5d0
[   32.257548]  kasan_report+0xdc/0x128
[   32.257594]  kasan_check_range+0x100/0x1a8
[   32.257641]  __kasan_check_write+0x20/0x30
[   32.258300]  kasan_atomics_helper+0xf88/0x4858
[   32.258371]  kasan_atomics+0x198/0x2e0
[   32.258420]  kunit_try_run_case+0x170/0x3f0
[   32.258715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.258835]  kthread+0x328/0x630
[   32.259012]  ret_from_fork+0x10/0x20
[   32.259187] 
[   32.259676] Allocated by task 296:
[   32.260112]  kasan_save_stack+0x3c/0x68
[   32.260258]  kasan_save_track+0x20/0x40
[   32.260526]  kasan_save_alloc_info+0x40/0x58
[   32.260693]  __kasan_kmalloc+0xd4/0xd8
[   32.260735]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.260992]  kasan_atomics+0xb8/0x2e0
[   32.261121]  kunit_try_run_case+0x170/0x3f0
[   32.261193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.261542]  kthread+0x328/0x630
[   32.261583]  ret_from_fork+0x10/0x20
[   32.261972] 
[   32.262038] The buggy address belongs to the object at fff00000c9bc6c80
[   32.262038]  which belongs to the cache kmalloc-64 of size 64
[   32.262615] The buggy address is located 0 bytes to the right of
[   32.262615]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.262821] 
[   32.262853] The buggy address belongs to the physical page:
[   32.262938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.262995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.263053] page_type: f5(slab)
[   32.263092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.263700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.263876] page dumped because: kasan: bad access detected
[   32.263924] 
[   32.263999] Memory state around the buggy address:
[   32.264032]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.264204]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.264252] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.264293]                                      ^
[   32.264327]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.264373]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.264414] ==================================================================
[   32.317679] ==================================================================
[   32.318049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   32.318172] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.318346] 
[   32.318416] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.318506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.318540] Hardware name: linux,dummy-virt (DT)
[   32.318691] Call trace:
[   32.318728]  show_stack+0x20/0x38 (C)
[   32.318778]  dump_stack_lvl+0x8c/0xd0
[   32.318824]  print_report+0x118/0x5d0
[   32.318960]  kasan_report+0xdc/0x128
[   32.319493]  kasan_check_range+0x100/0x1a8
[   32.319604]  __kasan_check_write+0x20/0x30
[   32.319686]  kasan_atomics_helper+0x1384/0x4858
[   32.319738]  kasan_atomics+0x198/0x2e0
[   32.319786]  kunit_try_run_case+0x170/0x3f0
[   32.319968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.320027]  kthread+0x328/0x630
[   32.320293]  ret_from_fork+0x10/0x20
[   32.320460] 
[   32.320485] Allocated by task 296:
[   32.320514]  kasan_save_stack+0x3c/0x68
[   32.320559]  kasan_save_track+0x20/0x40
[   32.320773]  kasan_save_alloc_info+0x40/0x58
[   32.320940]  __kasan_kmalloc+0xd4/0xd8
[   32.320982]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.321025]  kasan_atomics+0xb8/0x2e0
[   32.321443]  kunit_try_run_case+0x170/0x3f0
[   32.321496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.321564]  kthread+0x328/0x630
[   32.321668]  ret_from_fork+0x10/0x20
[   32.321706] 
[   32.321728] The buggy address belongs to the object at fff00000c9bc6c80
[   32.321728]  which belongs to the cache kmalloc-64 of size 64
[   32.321963] The buggy address is located 0 bytes to the right of
[   32.321963]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.322033] 
[   32.322054] The buggy address belongs to the physical page:
[   32.322095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.322453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.322509] page_type: f5(slab)
[   32.322547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.322601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.323105] page dumped because: kasan: bad access detected
[   32.323156] 
[   32.323177] Memory state around the buggy address:
[   32.323486]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.323670]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.323741] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.323796]                                      ^
[   32.323895]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.323940]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.323982] ==================================================================
[   32.341181] ==================================================================
[   32.341254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   32.341304] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.341538] 
[   32.341954] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.342247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.342277] Hardware name: linux,dummy-virt (DT)
[   32.342309] Call trace:
[   32.342334]  show_stack+0x20/0x38 (C)
[   32.342384]  dump_stack_lvl+0x8c/0xd0
[   32.342432]  print_report+0x118/0x5d0
[   32.342477]  kasan_report+0xdc/0x128
[   32.342520]  kasan_check_range+0x100/0x1a8
[   32.342565]  __kasan_check_write+0x20/0x30
[   32.342613]  kasan_atomics_helper+0x14e4/0x4858
[   32.342664]  kasan_atomics+0x198/0x2e0
[   32.342713]  kunit_try_run_case+0x170/0x3f0
[   32.342770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.342970]  kthread+0x328/0x630
[   32.343014]  ret_from_fork+0x10/0x20
[   32.343399] 
[   32.343532] Allocated by task 296:
[   32.343565]  kasan_save_stack+0x3c/0x68
[   32.343952]  kasan_save_track+0x20/0x40
[   32.344120]  kasan_save_alloc_info+0x40/0x58
[   32.344346]  __kasan_kmalloc+0xd4/0xd8
[   32.344393]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.344436]  kasan_atomics+0xb8/0x2e0
[   32.344477]  kunit_try_run_case+0x170/0x3f0
[   32.344520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.344567]  kthread+0x328/0x630
[   32.344893]  ret_from_fork+0x10/0x20
[   32.345406] 
[   32.345548] The buggy address belongs to the object at fff00000c9bc6c80
[   32.345548]  which belongs to the cache kmalloc-64 of size 64
[   32.345614] The buggy address is located 0 bytes to the right of
[   32.345614]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.345684] 
[   32.345712] The buggy address belongs to the physical page:
[   32.345866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.346099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.346175] page_type: f5(slab)
[   32.346215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.346363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.346462] page dumped because: kasan: bad access detected
[   32.346574] 
[   32.346594] Memory state around the buggy address:
[   32.346629]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.346675]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.346721] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.346762]                                      ^
[   32.346799]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.346975]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.347325] ==================================================================
[   32.330860] ==================================================================
[   32.330987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   32.331053] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.331106] 
[   32.331158] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.331384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.331444] Hardware name: linux,dummy-virt (DT)
[   32.331489] Call trace:
[   32.331517]  show_stack+0x20/0x38 (C)
[   32.331569]  dump_stack_lvl+0x8c/0xd0
[   32.331614]  print_report+0x118/0x5d0
[   32.331660]  kasan_report+0xdc/0x128
[   32.331704]  kasan_check_range+0x100/0x1a8
[   32.331750]  __kasan_check_write+0x20/0x30
[   32.331796]  kasan_atomics_helper+0x1414/0x4858
[   32.331847]  kasan_atomics+0x198/0x2e0
[   32.331895]  kunit_try_run_case+0x170/0x3f0
[   32.331946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.332001]  kthread+0x328/0x630
[   32.332045]  ret_from_fork+0x10/0x20
[   32.332093] 
[   32.332114] Allocated by task 296:
[   32.332151]  kasan_save_stack+0x3c/0x68
[   32.332195]  kasan_save_track+0x20/0x40
[   32.332272]  kasan_save_alloc_info+0x40/0x58
[   32.332353]  __kasan_kmalloc+0xd4/0xd8
[   32.332472]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.332515]  kasan_atomics+0xb8/0x2e0
[   32.332554]  kunit_try_run_case+0x170/0x3f0
[   32.332866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.332946]  kthread+0x328/0x630
[   32.332984]  ret_from_fork+0x10/0x20
[   32.333022] 
[   32.333044] The buggy address belongs to the object at fff00000c9bc6c80
[   32.333044]  which belongs to the cache kmalloc-64 of size 64
[   32.333106] The buggy address is located 0 bytes to the right of
[   32.333106]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.333187] 
[   32.333209] The buggy address belongs to the physical page:
[   32.333243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.333296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.333346] page_type: f5(slab)
[   32.333385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.333439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.333483] page dumped because: kasan: bad access detected
[   32.333517] 
[   32.333536] Memory state around the buggy address:
[   32.333570]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.333615]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.333660] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.333702]                                      ^
[   32.333737]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.333783]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.333824] ==================================================================
[   32.294206] ==================================================================
[   32.294456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   32.294846] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.295340] 
[   32.295376] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.295634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.295668] Hardware name: linux,dummy-virt (DT)
[   32.295884] Call trace:
[   32.296013]  show_stack+0x20/0x38 (C)
[   32.296305]  dump_stack_lvl+0x8c/0xd0
[   32.296410]  print_report+0x118/0x5d0
[   32.296564]  kasan_report+0xdc/0x128
[   32.296635]  kasan_check_range+0x100/0x1a8
[   32.296684]  __kasan_check_write+0x20/0x30
[   32.296822]  kasan_atomics_helper+0x11f8/0x4858
[   32.296904]  kasan_atomics+0x198/0x2e0
[   32.296954]  kunit_try_run_case+0x170/0x3f0
[   32.297007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.297068]  kthread+0x328/0x630
[   32.297399]  ret_from_fork+0x10/0x20
[   32.297465] 
[   32.297488] Allocated by task 296:
[   32.298157]  kasan_save_stack+0x3c/0x68
[   32.298499]  kasan_save_track+0x20/0x40
[   32.298544]  kasan_save_alloc_info+0x40/0x58
[   32.298719]  __kasan_kmalloc+0xd4/0xd8
[   32.298903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.299001]  kasan_atomics+0xb8/0x2e0
[   32.299045]  kunit_try_run_case+0x170/0x3f0
[   32.299089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.299239]  kthread+0x328/0x630
[   32.299445]  ret_from_fork+0x10/0x20
[   32.299585] 
[   32.299608] The buggy address belongs to the object at fff00000c9bc6c80
[   32.299608]  which belongs to the cache kmalloc-64 of size 64
[   32.299677] The buggy address is located 0 bytes to the right of
[   32.299677]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.299746] 
[   32.299768] The buggy address belongs to the physical page:
[   32.299988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.300490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.300549] page_type: f5(slab)
[   32.300770] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.301300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.301434] page dumped because: kasan: bad access detected
[   32.301479] 
[   32.301592] Memory state around the buggy address:
[   32.301629]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.301677]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.301912] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.302267]                                      ^
[   32.302347]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.302396]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.302437] ==================================================================
[   32.103789] ==================================================================
[   32.104211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   32.104384] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296
[   32.104709] 
[   32.104761] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.106207]  kasan_atomics_helper+0xa04/0x4858
[   32.107167]  ret_from_fork+0x10/0x20
[   32.109901] The buggy address is located 0 bytes to the right of
[   32.109901]  allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0)
[   32.110004] 
[   32.110058] The buggy address belongs to the physical page:
[   32.110094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6
[   32.110353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.110855] page_type: f5(slab)
[   32.110934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.111066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.111114] page dumped because: kasan: bad access detected
[   32.111261] 
[   32.111287] Memory state around the buggy address:
[   32.111363]  fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.111610]  fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.111688] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.111757]                                      ^
[   32.111796]  fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.111854]  fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.111896] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   31.725527] ==================================================================
[   31.725592] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   31.725647] Read of size 1 at addr ffff800080b17b4a by task kunit_try_catch/284
[   31.725867] 
[   31.725992] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.726106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.726154] Hardware name: linux,dummy-virt (DT)
[   31.726188] Call trace:
[   31.726375]  show_stack+0x20/0x38 (C)
[   31.726524]  dump_stack_lvl+0x8c/0xd0
[   31.726576]  print_report+0x310/0x5d0
[   31.726747]  kasan_report+0xdc/0x128
[   31.726920]  __asan_report_load1_noabort+0x20/0x30
[   31.727005]  kasan_alloca_oob_right+0x2dc/0x340
[   31.727155]  kunit_try_run_case+0x170/0x3f0
[   31.727211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.727385]  kthread+0x328/0x630
[   31.727576]  ret_from_fork+0x10/0x20
[   31.727671] 
[   31.727760] The buggy address belongs to stack of task kunit_try_catch/284
[   31.727837] 
[   31.727878] The buggy address ffff800080b17b4a belongs to a vmalloc virtual mapping
[   31.728111] The buggy address belongs to the physical page:
[   31.728271] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b00
[   31.728436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.728525] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.728708] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.728812] page dumped because: kasan: bad access detected
[   31.728963] 
[   31.729023] Memory state around the buggy address:
[   31.729153]  ffff800080b17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.729220]  ffff800080b17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.729326] >ffff800080b17b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   31.729368]                                               ^
[   31.729575]  ffff800080b17b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   31.729794]  ffff800080b17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   31.745513] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   31.713487] ==================================================================
[   31.713757] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   31.713831] Read of size 1 at addr ffff800080b37b5f by task kunit_try_catch/282
[   31.713931] 
[   31.713967] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.714378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.714439] Hardware name: linux,dummy-virt (DT)
[   31.714488] Call trace:
[   31.714551]  show_stack+0x20/0x38 (C)
[   31.714626]  dump_stack_lvl+0x8c/0xd0
[   31.714674]  print_report+0x310/0x5d0
[   31.715017]  kasan_report+0xdc/0x128
[   31.715312]  __asan_report_load1_noabort+0x20/0x30
[   31.715535]  kasan_alloca_oob_left+0x2b8/0x310
[   31.715613]  kunit_try_run_case+0x170/0x3f0
[   31.715723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.715821]  kthread+0x328/0x630
[   31.715952]  ret_from_fork+0x10/0x20
[   31.716153] 
[   31.716242] The buggy address belongs to stack of task kunit_try_catch/282
[   31.716322] 
[   31.716350] The buggy address ffff800080b37b5f belongs to a vmalloc virtual mapping
[   31.716399] The buggy address belongs to the physical page:
[   31.716433] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd1
[   31.716540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.716638] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.716945] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.717022] page dumped because: kasan: bad access detected
[   31.717075] 
[   31.717138] Memory state around the buggy address:
[   31.717186]  ffff800080b37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.717233]  ffff800080b37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.717296] >ffff800080b37b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   31.717339]                                                     ^
[   31.717380]  ffff800080b37b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   31.717428]  ffff800080b37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   31.717470] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   31.701466] ==================================================================
[   31.701557] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   31.701614] Read of size 1 at addr ffff800080a97c2a by task kunit_try_catch/280
[   31.701669] 
[   31.701701] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.701792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.701822] Hardware name: linux,dummy-virt (DT)
[   31.701855] Call trace:
[   31.701881]  show_stack+0x20/0x38 (C)
[   31.701931]  dump_stack_lvl+0x8c/0xd0
[   31.701979]  print_report+0x310/0x5d0
[   31.702033]  kasan_report+0xdc/0x128
[   31.702092]  __asan_report_load1_noabort+0x20/0x30
[   31.702170]  kasan_stack_oob+0x238/0x270
[   31.702229]  kunit_try_run_case+0x170/0x3f0
[   31.702281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.702337]  kthread+0x328/0x630
[   31.702390]  ret_from_fork+0x10/0x20
[   31.702447] 
[   31.702508] The buggy address belongs to stack of task kunit_try_catch/280
[   31.702614]  and is located at offset 138 in frame:
[   31.702652]  kasan_stack_oob+0x0/0x270
[   31.703081] 
[   31.703536] This frame has 4 objects:
[   31.703865]  [48, 49) '__assertion'
[   31.704006]  [64, 72) 'array'
[   31.704075]  [96, 112) '__assertion'
[   31.704120]  [128, 138) 'stack_array'
[   31.704454] 
[   31.704528] The buggy address ffff800080a97c2a belongs to a vmalloc virtual mapping
[   31.704595] The buggy address belongs to the physical page:
[   31.704692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xfff00000c3f530c8 pfn:0x103f53
[   31.704781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.704944] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.705022] raw: fff00000c3f530c8 0000000000000000 00000001ffffffff 0000000000000000
[   31.705154] page dumped because: kasan: bad access detected
[   31.705191] 
[   31.705429] Memory state around the buggy address:
[   31.705595]  ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.705685]  ffff800080a97b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   31.705830] >ffff800080a97c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   31.705908]                                   ^
[   31.706032]  ffff800080a97c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   31.706198]  ffff800080a97d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   31.706244] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   31.684970] ==================================================================
[   31.685034] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   31.685268] Read of size 1 at addr ffff90902893b6cd by task kunit_try_catch/276
[   31.685402] 
[   31.685447] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.685536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.685728] Hardware name: linux,dummy-virt (DT)
[   31.685855] Call trace:
[   31.685888]  show_stack+0x20/0x38 (C)
[   31.685941]  dump_stack_lvl+0x8c/0xd0
[   31.685986]  print_report+0x310/0x5d0
[   31.686065]  kasan_report+0xdc/0x128
[   31.686112]  __asan_report_load1_noabort+0x20/0x30
[   31.686171]  kasan_global_oob_right+0x230/0x270
[   31.686363]  kunit_try_run_case+0x170/0x3f0
[   31.686494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.686558]  kthread+0x328/0x630
[   31.686607]  ret_from_fork+0x10/0x20
[   31.686710] 
[   31.686794] The buggy address belongs to the variable:
[   31.686842]  global_array+0xd/0x40
[   31.687026] 
[   31.687088] The buggy address ffff90902893b6cd belongs to a vmalloc virtual mapping
[   31.687566] The buggy address belongs to the physical page:
[   31.687693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d3b
[   31.687963] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   31.688103] raw: 03fffe0000002000 ffffc1ffc01f4ec8 ffffc1ffc01f4ec8 0000000000000000
[   31.688250] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.688349] page dumped because: kasan: bad access detected
[   31.688422] 
[   31.688722] Memory state around the buggy address:
[   31.688862]  ffff90902893b580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.688930]  ffff90902893b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.689046] >ffff90902893b680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   31.689126]                                               ^
[   31.689268]  ffff90902893b700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   31.689315]  ffff90902893b780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   31.689531] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   31.673442] ==================================================================
[   31.673779] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.673862] Free of addr fff00000c9b8c001 by task kunit_try_catch/274
[   31.673908] 
[   31.673949] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.674037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.674065] Hardware name: linux,dummy-virt (DT)
[   31.674193] Call trace:
[   31.674219]  show_stack+0x20/0x38 (C)
[   31.674299]  dump_stack_lvl+0x8c/0xd0
[   31.674462]  print_report+0x118/0x5d0
[   31.674508]  kasan_report_invalid_free+0xc0/0xe8
[   31.674583]  __kasan_mempool_poison_object+0xfc/0x150
[   31.674859]  mempool_free+0x28c/0x328
[   31.674942]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.675013]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   31.675173]  kunit_try_run_case+0x170/0x3f0
[   31.675271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.675463]  kthread+0x328/0x630
[   31.675630]  ret_from_fork+0x10/0x20
[   31.675720] 
[   31.675740] The buggy address belongs to the physical page:
[   31.675780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c
[   31.675834] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.676488] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.676704] page_type: f8(unknown)
[   31.676829] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.676886] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.677078] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.677260] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.677339] head: 0bfffe0000000002 ffffc1ffc326e301 00000000ffffffff 00000000ffffffff
[   31.677471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.677561] page dumped because: kasan: bad access detected
[   31.677671] 
[   31.677732] Memory state around the buggy address:
[   31.677790]  fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.677889]  fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.677935] >fff00000c9b8c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.678155]                    ^
[   31.678279]  fff00000c9b8c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.678399]  fff00000c9b8c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.678491] ==================================================================
[   31.661570] ==================================================================
[   31.661628] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.661680] Free of addr fff00000c9bc2401 by task kunit_try_catch/272
[   31.661939] 
[   31.661980] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.662264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.662293] Hardware name: linux,dummy-virt (DT)
[   31.662341] Call trace:
[   31.662436]  show_stack+0x20/0x38 (C)
[   31.662490]  dump_stack_lvl+0x8c/0xd0
[   31.662535]  print_report+0x118/0x5d0
[   31.662633]  kasan_report_invalid_free+0xc0/0xe8
[   31.662681]  check_slab_allocation+0xfc/0x108
[   31.662880]  __kasan_mempool_poison_object+0x78/0x150
[   31.662943]  mempool_free+0x28c/0x328
[   31.663042]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.663099]  mempool_kmalloc_invalid_free+0xc0/0x118
[   31.663497]  kunit_try_run_case+0x170/0x3f0
[   31.663587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.663686]  kthread+0x328/0x630
[   31.663830]  ret_from_fork+0x10/0x20
[   31.663918] 
[   31.664051] Allocated by task 272:
[   31.664083]  kasan_save_stack+0x3c/0x68
[   31.664502]  kasan_save_track+0x20/0x40
[   31.664583]  kasan_save_alloc_info+0x40/0x58
[   31.664647]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.664806]  remove_element+0x130/0x1f8
[   31.664894]  mempool_alloc_preallocated+0x58/0xc0
[   31.665055]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   31.665197]  mempool_kmalloc_invalid_free+0xc0/0x118
[   31.665289]  kunit_try_run_case+0x170/0x3f0
[   31.665330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.665666]  kthread+0x328/0x630
[   31.665740]  ret_from_fork+0x10/0x20
[   31.665818] 
[   31.665872] The buggy address belongs to the object at fff00000c9bc2400
[   31.665872]  which belongs to the cache kmalloc-128 of size 128
[   31.665979] The buggy address is located 1 bytes inside of
[   31.665979]  128-byte region [fff00000c9bc2400, fff00000c9bc2480)
[   31.666108] 
[   31.666158] The buggy address belongs to the physical page:
[   31.666229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   31.666432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.666526] page_type: f5(slab)
[   31.666588] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.666728] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.666793] page dumped because: kasan: bad access detected
[   31.666979] 
[   31.667002] Memory state around the buggy address:
[   31.667037]  fff00000c9bc2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.667083]  fff00000c9bc2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.667197] >fff00000c9bc2400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.667263]                    ^
[   31.667328]  fff00000c9bc2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.667429]  fff00000c9bc2500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.667554] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   31.630504] ==================================================================
[   31.630564] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.630617] Free of addr fff00000c9b8c000 by task kunit_try_catch/268
[   31.630660] 
[   31.630692] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.633909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.633941] Hardware name: linux,dummy-virt (DT)
[   31.634532] Call trace:
[   31.634562]  show_stack+0x20/0x38 (C)
[   31.634786]  dump_stack_lvl+0x8c/0xd0
[   31.635238]  print_report+0x118/0x5d0
[   31.635296]  kasan_report_invalid_free+0xc0/0xe8
[   31.635345]  __kasan_mempool_poison_object+0x14c/0x150
[   31.635399]  mempool_free+0x28c/0x328
[   31.635448]  mempool_double_free_helper+0x150/0x2e8
[   31.635506]  mempool_kmalloc_large_double_free+0xc0/0x118
[   31.635559]  kunit_try_run_case+0x170/0x3f0
[   31.635607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.635661]  kthread+0x328/0x630
[   31.635701]  ret_from_fork+0x10/0x20
[   31.635749] 
[   31.635772] The buggy address belongs to the physical page:
[   31.635805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c
[   31.635860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.635909] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.635963] page_type: f8(unknown)
[   31.636004] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.636056] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.636106] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.636167] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.636218] head: 0bfffe0000000002 ffffc1ffc326e301 00000000ffffffff 00000000ffffffff
[   31.636308] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.636350] page dumped because: kasan: bad access detected
[   31.636383] 
[   31.636442] Memory state around the buggy address:
[   31.636547]  fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.636593]  fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.636674] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.636856]                    ^
[   31.636923]  fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.636972]  fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.637012] ==================================================================
[   31.651355] ==================================================================
[   31.651546] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.651671] Free of addr fff00000c9b8c000 by task kunit_try_catch/270
[   31.651994] 
[   31.652046] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.652295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.652404] Hardware name: linux,dummy-virt (DT)
[   31.652606] Call trace:
[   31.652655]  show_stack+0x20/0x38 (C)
[   31.652923]  dump_stack_lvl+0x8c/0xd0
[   31.653049]  print_report+0x118/0x5d0
[   31.653422]  kasan_report_invalid_free+0xc0/0xe8
[   31.653661]  __kasan_mempool_poison_pages+0xe0/0xe8
[   31.653725]  mempool_free+0x24c/0x328
[   31.653779]  mempool_double_free_helper+0x150/0x2e8
[   31.653855]  mempool_page_alloc_double_free+0xbc/0x118
[   31.653908]  kunit_try_run_case+0x170/0x3f0
[   31.653976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.654503]  kthread+0x328/0x630
[   31.654737]  ret_from_fork+0x10/0x20
[   31.654829] 
[   31.654850] The buggy address belongs to the physical page:
[   31.655180] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c
[   31.655260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.655591] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.655666] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.655710] page dumped because: kasan: bad access detected
[   31.655742] 
[   31.655761] Memory state around the buggy address:
[   31.655808]  fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.655857]  fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.655901] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.656216]                    ^
[   31.656260]  fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.656306]  fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.656356] ==================================================================
[   31.615828] ==================================================================
[   31.615950] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.616039] Free of addr fff00000c9bc2000 by task kunit_try_catch/266
[   31.618196] 
[   31.618232] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.618320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.618346] Hardware name: linux,dummy-virt (DT)
[   31.618378] Call trace:
[   31.618399]  show_stack+0x20/0x38 (C)
[   31.618451]  dump_stack_lvl+0x8c/0xd0
[   31.618495]  print_report+0x118/0x5d0
[   31.618539]  kasan_report_invalid_free+0xc0/0xe8
[   31.618585]  check_slab_allocation+0xd4/0x108
[   31.618634]  __kasan_mempool_poison_object+0x78/0x150
[   31.618687]  mempool_free+0x28c/0x328
[   31.618740]  mempool_double_free_helper+0x150/0x2e8
[   31.618790]  mempool_kmalloc_double_free+0xc0/0x118
[   31.618839]  kunit_try_run_case+0x170/0x3f0
[   31.618889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.618943]  kthread+0x328/0x630
[   31.618984]  ret_from_fork+0x10/0x20
[   31.619029] 
[   31.619047] Allocated by task 266:
[   31.619076]  kasan_save_stack+0x3c/0x68
[   31.619116]  kasan_save_track+0x20/0x40
[   31.619200]  kasan_save_alloc_info+0x40/0x58
[   31.619279]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.619325]  remove_element+0x130/0x1f8
[   31.619483]  mempool_alloc_preallocated+0x58/0xc0
[   31.619528]  mempool_double_free_helper+0x94/0x2e8
[   31.619568]  mempool_kmalloc_double_free+0xc0/0x118
[   31.619609]  kunit_try_run_case+0x170/0x3f0
[   31.619858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.622194]  kthread+0x328/0x630
[   31.622228]  ret_from_fork+0x10/0x20
[   31.622263] 
[   31.622282] Freed by task 266:
[   31.622312]  kasan_save_stack+0x3c/0x68
[   31.622352]  kasan_save_track+0x20/0x40
[   31.622388]  kasan_save_free_info+0x4c/0x78
[   31.622425]  __kasan_mempool_poison_object+0xc0/0x150
[   31.622466]  mempool_free+0x28c/0x328
[   31.622502]  mempool_double_free_helper+0x100/0x2e8
[   31.622543]  mempool_kmalloc_double_free+0xc0/0x118
[   31.622582]  kunit_try_run_case+0x170/0x3f0
[   31.622621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.622665]  kthread+0x328/0x630
[   31.622703]  ret_from_fork+0x10/0x20
[   31.622739] 
[   31.622757] The buggy address belongs to the object at fff00000c9bc2000
[   31.622757]  which belongs to the cache kmalloc-128 of size 128
[   31.622817] The buggy address is located 0 bytes inside of
[   31.622817]  128-byte region [fff00000c9bc2000, fff00000c9bc2080)
[   31.622879] 
[   31.622899] The buggy address belongs to the physical page:
[   31.622930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   31.622983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.623033] page_type: f5(slab)
[   31.623069] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.623120] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.623173] page dumped because: kasan: bad access detected
[   31.623205] 
[   31.623222] Memory state around the buggy address:
[   31.623254]  fff00000c9bc1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.623297]  fff00000c9bc1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.623341] >fff00000c9bc2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.623382]                    ^
[   31.623410]  fff00000c9bc2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.623453]  fff00000c9bc2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.623492] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   31.608829] ==================================================================
[   31.608912] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   31.609092] Read of size 1 at addr fff00000c9b88000 by task kunit_try_catch/264
[   31.609156] 
[   31.609210] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.609301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.609359] Hardware name: linux,dummy-virt (DT)
[   31.609397] Call trace:
[   31.609437]  show_stack+0x20/0x38 (C)
[   31.609490]  dump_stack_lvl+0x8c/0xd0
[   31.609535]  print_report+0x118/0x5d0
[   31.609577]  kasan_report+0xdc/0x128
[   31.609635]  __asan_report_load1_noabort+0x20/0x30
[   31.609685]  mempool_uaf_helper+0x314/0x340
[   31.609732]  mempool_page_alloc_uaf+0xc0/0x118
[   31.609780]  kunit_try_run_case+0x170/0x3f0
[   31.609830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.609884]  kthread+0x328/0x630
[   31.609926]  ret_from_fork+0x10/0x20
[   31.609973] 
[   31.610012] The buggy address belongs to the physical page:
[   31.610047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b88
[   31.610119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.610192] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.610261] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.610334] page dumped because: kasan: bad access detected
[   31.610384] 
[   31.610423] Memory state around the buggy address:
[   31.610472]  fff00000c9b87f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.610516]  fff00000c9b87f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.610578] >fff00000c9b88000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.610635]                    ^
[   31.610662]  fff00000c9b88080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.610767]  fff00000c9b88100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.610889] ==================================================================
[   31.575942] ==================================================================
[   31.576008] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   31.576061] Read of size 1 at addr fff00000c9b88000 by task kunit_try_catch/260
[   31.576113] 
[   31.576185] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.576276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.576303] Hardware name: linux,dummy-virt (DT)
[   31.576376] Call trace:
[   31.576402]  show_stack+0x20/0x38 (C)
[   31.576470]  dump_stack_lvl+0x8c/0xd0
[   31.576568]  print_report+0x118/0x5d0
[   31.576613]  kasan_report+0xdc/0x128
[   31.576661]  __asan_report_load1_noabort+0x20/0x30
[   31.576733]  mempool_uaf_helper+0x314/0x340
[   31.576800]  mempool_kmalloc_large_uaf+0xc4/0x120
[   31.576857]  kunit_try_run_case+0x170/0x3f0
[   31.576906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.576960]  kthread+0x328/0x630
[   31.577205]  ret_from_fork+0x10/0x20
[   31.577294] 
[   31.577334] The buggy address belongs to the physical page:
[   31.577368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b88
[   31.577423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.577511] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.577563] page_type: f8(unknown)
[   31.577602] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.577675] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.577763] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.577830] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.577886] head: 0bfffe0000000002 ffffc1ffc326e201 00000000ffffffff 00000000ffffffff
[   31.577937] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.578014] page dumped because: kasan: bad access detected
[   31.578063] 
[   31.578091] Memory state around the buggy address:
[   31.578124]  fff00000c9b87f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.578181]  fff00000c9b87f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.578390] >fff00000c9b88000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.578452]                    ^
[   31.578481]  fff00000c9b88080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.578530]  fff00000c9b88100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.578587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   31.567240] ==================================================================
[   31.567413] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   31.567476] Read of size 1 at addr fff00000c9af0c00 by task kunit_try_catch/258
[   31.567563] 
[   31.567601] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.567692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.567737] Hardware name: linux,dummy-virt (DT)
[   31.567797] Call trace:
[   31.567885]  show_stack+0x20/0x38 (C)
[   31.567954]  dump_stack_lvl+0x8c/0xd0
[   31.568019]  print_report+0x118/0x5d0
[   31.568061]  kasan_report+0xdc/0x128
[   31.568122]  __asan_report_load1_noabort+0x20/0x30
[   31.568185]  mempool_uaf_helper+0x314/0x340
[   31.568231]  mempool_kmalloc_uaf+0xc4/0x120
[   31.568278]  kunit_try_run_case+0x170/0x3f0
[   31.568345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.568437]  kthread+0x328/0x630
[   31.568496]  ret_from_fork+0x10/0x20
[   31.568552] 
[   31.568626] Allocated by task 258:
[   31.568655]  kasan_save_stack+0x3c/0x68
[   31.568696]  kasan_save_track+0x20/0x40
[   31.568744]  kasan_save_alloc_info+0x40/0x58
[   31.568783]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.568829]  remove_element+0x130/0x1f8
[   31.568869]  mempool_alloc_preallocated+0x58/0xc0
[   31.568907]  mempool_uaf_helper+0xa4/0x340
[   31.568945]  mempool_kmalloc_uaf+0xc4/0x120
[   31.569090]  kunit_try_run_case+0x170/0x3f0
[   31.569167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.569234]  kthread+0x328/0x630
[   31.569269]  ret_from_fork+0x10/0x20
[   31.569325] 
[   31.569386] Freed by task 258:
[   31.569415]  kasan_save_stack+0x3c/0x68
[   31.569471]  kasan_save_track+0x20/0x40
[   31.569528]  kasan_save_free_info+0x4c/0x78
[   31.569613]  __kasan_mempool_poison_object+0xc0/0x150
[   31.569657]  mempool_free+0x28c/0x328
[   31.569694]  mempool_uaf_helper+0x104/0x340
[   31.569733]  mempool_kmalloc_uaf+0xc4/0x120
[   31.569778]  kunit_try_run_case+0x170/0x3f0
[   31.569836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.569902]  kthread+0x328/0x630
[   31.569934]  ret_from_fork+0x10/0x20
[   31.569968] 
[   31.570000] The buggy address belongs to the object at fff00000c9af0c00
[   31.570000]  which belongs to the cache kmalloc-128 of size 128
[   31.570245] The buggy address is located 0 bytes inside of
[   31.570245]  freed 128-byte region [fff00000c9af0c00, fff00000c9af0c80)
[   31.570344] 
[   31.570384] The buggy address belongs to the physical page:
[   31.570434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   31.570508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.570565] page_type: f5(slab)
[   31.570622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.570689] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.570819] page dumped because: kasan: bad access detected
[   31.570879] 
[   31.570932] Memory state around the buggy address:
[   31.570964]  fff00000c9af0b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.571008]  fff00000c9af0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.571072] >fff00000c9af0c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.571111]                    ^
[   31.571147]  fff00000c9af0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.571190]  fff00000c9af0d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.571230] ==================================================================
[   31.585869] ==================================================================
[   31.585934] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   31.586002] Read of size 1 at addr fff00000c9bc0240 by task kunit_try_catch/262
[   31.586054] 
[   31.586301] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.586412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.586439] Hardware name: linux,dummy-virt (DT)
[   31.586491] Call trace:
[   31.586530]  show_stack+0x20/0x38 (C)
[   31.586610]  dump_stack_lvl+0x8c/0xd0
[   31.586662]  print_report+0x118/0x5d0
[   31.586802]  kasan_report+0xdc/0x128
[   31.586848]  __asan_report_load1_noabort+0x20/0x30
[   31.586895]  mempool_uaf_helper+0x314/0x340
[   31.586942]  mempool_slab_uaf+0xc0/0x118
[   31.586988]  kunit_try_run_case+0x170/0x3f0
[   31.587037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.587198]  kthread+0x328/0x630
[   31.587245]  ret_from_fork+0x10/0x20
[   31.587292] 
[   31.587311] Allocated by task 262:
[   31.587339]  kasan_save_stack+0x3c/0x68
[   31.587383]  kasan_save_track+0x20/0x40
[   31.587442]  kasan_save_alloc_info+0x40/0x58
[   31.587536]  __kasan_mempool_unpoison_object+0xbc/0x180
[   31.587630]  remove_element+0x16c/0x1f8
[   31.587709]  mempool_alloc_preallocated+0x58/0xc0
[   31.587806]  mempool_uaf_helper+0xa4/0x340
[   31.587886]  mempool_slab_uaf+0xc0/0x118
[   31.587973]  kunit_try_run_case+0x170/0x3f0
[   31.588060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.588108]  kthread+0x328/0x630
[   31.588150]  ret_from_fork+0x10/0x20
[   31.588186] 
[   31.588206] Freed by task 262:
[   31.588232]  kasan_save_stack+0x3c/0x68
[   31.588388]  kasan_save_track+0x20/0x40
[   31.588449]  kasan_save_free_info+0x4c/0x78
[   31.588528]  __kasan_mempool_poison_object+0xc0/0x150
[   31.588595]  mempool_free+0x28c/0x328
[   31.588667]  mempool_uaf_helper+0x104/0x340
[   31.588707]  mempool_slab_uaf+0xc0/0x118
[   31.588939]  kunit_try_run_case+0x170/0x3f0
[   31.589029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.589145]  kthread+0x328/0x630
[   31.589215]  ret_from_fork+0x10/0x20
[   31.589318] 
[   31.589368] The buggy address belongs to the object at fff00000c9bc0240
[   31.589368]  which belongs to the cache test_cache of size 123
[   31.589450] The buggy address is located 0 bytes inside of
[   31.589450]  freed 123-byte region [fff00000c9bc0240, fff00000c9bc02bb)
[   31.589711] 
[   31.589771] The buggy address belongs to the physical page:
[   31.589809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc0
[   31.589869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.589933] page_type: f5(slab)
[   31.589972] raw: 0bfffe0000000000 fff00000ffed2f00 dead000000000122 0000000000000000
[   31.590023] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   31.590075] page dumped because: kasan: bad access detected
[   31.590116] 
[   31.590155] Memory state around the buggy address:
[   31.590204]  fff00000c9bc0100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.590248]  fff00000c9bc0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.590301] >fff00000c9bc0200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   31.590351]                                            ^
[   31.590397]  fff00000c9bc0280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.590458]  fff00000c9bc0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.590499] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   31.543025] ==================================================================
[   31.544086] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.544675] Read of size 1 at addr fff00000c9b022bb by task kunit_try_catch/256
[   31.545169] 
[   31.545208] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.545428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.545684] Hardware name: linux,dummy-virt (DT)
[   31.545724] Call trace:
[   31.545749]  show_stack+0x20/0x38 (C)
[   31.545977]  dump_stack_lvl+0x8c/0xd0
[   31.546255]  print_report+0x118/0x5d0
[   31.546312]  kasan_report+0xdc/0x128
[   31.546592]  __asan_report_load1_noabort+0x20/0x30
[   31.546740]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.547025]  mempool_slab_oob_right+0xc0/0x118
[   31.547241]  kunit_try_run_case+0x170/0x3f0
[   31.547315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.548237]  kthread+0x328/0x630
[   31.548298]  ret_from_fork+0x10/0x20
[   31.548921] 
[   31.549355] Allocated by task 256:
[   31.549396]  kasan_save_stack+0x3c/0x68
[   31.549474]  kasan_save_track+0x20/0x40
[   31.549892]  kasan_save_alloc_info+0x40/0x58
[   31.549992]  __kasan_mempool_unpoison_object+0xbc/0x180
[   31.550313]  remove_element+0x16c/0x1f8
[   31.550735]  mempool_alloc_preallocated+0x58/0xc0
[   31.550792]  mempool_oob_right_helper+0x98/0x2f0
[   31.550833]  mempool_slab_oob_right+0xc0/0x118
[   31.550874]  kunit_try_run_case+0x170/0x3f0
[   31.550912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.550959]  kthread+0x328/0x630
[   31.550991]  ret_from_fork+0x10/0x20
[   31.551027] 
[   31.551050] The buggy address belongs to the object at fff00000c9b02240
[   31.551050]  which belongs to the cache test_cache of size 123
[   31.551113] The buggy address is located 0 bytes to the right of
[   31.551113]  allocated 123-byte region [fff00000c9b02240, fff00000c9b022bb)
[   31.551274] 
[   31.551298] The buggy address belongs to the physical page:
[   31.551329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b02
[   31.551384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.551435] page_type: f5(slab)
[   31.551476] raw: 0bfffe0000000000 fff00000c582fa00 dead000000000122 0000000000000000
[   31.551533] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   31.551575] page dumped because: kasan: bad access detected
[   31.551607] 
[   31.551626] Memory state around the buggy address:
[   31.551658]  fff00000c9b02180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.551702]  fff00000c9b02200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   31.551745] >fff00000c9b02280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   31.551784]                                         ^
[   31.551818]  fff00000c9b02300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.551861]  fff00000c9b02380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.551903] ==================================================================
[   31.508684] ==================================================================
[   31.508755] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.508828] Read of size 1 at addr fff00000c9af0873 by task kunit_try_catch/252
[   31.508880] 
[   31.508924] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.509016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.509046] Hardware name: linux,dummy-virt (DT)
[   31.509080] Call trace:
[   31.509106]  show_stack+0x20/0x38 (C)
[   31.509173]  dump_stack_lvl+0x8c/0xd0
[   31.509222]  print_report+0x118/0x5d0
[   31.509266]  kasan_report+0xdc/0x128
[   31.509307]  __asan_report_load1_noabort+0x20/0x30
[   31.509356]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.509404]  mempool_kmalloc_oob_right+0xc4/0x120
[   31.509453]  kunit_try_run_case+0x170/0x3f0
[   31.509505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.509558]  kthread+0x328/0x630
[   31.509602]  ret_from_fork+0x10/0x20
[   31.509651] 
[   31.509671] Allocated by task 252:
[   31.509701]  kasan_save_stack+0x3c/0x68
[   31.509744]  kasan_save_track+0x20/0x40
[   31.509782]  kasan_save_alloc_info+0x40/0x58
[   31.509820]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.509865]  remove_element+0x130/0x1f8
[   31.509903]  mempool_alloc_preallocated+0x58/0xc0
[   31.509944]  mempool_oob_right_helper+0x98/0x2f0
[   31.509983]  mempool_kmalloc_oob_right+0xc4/0x120
[   31.510025]  kunit_try_run_case+0x170/0x3f0
[   31.510063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.510108]  kthread+0x328/0x630
[   31.510151]  ret_from_fork+0x10/0x20
[   31.510186] 
[   31.510206] The buggy address belongs to the object at fff00000c9af0800
[   31.510206]  which belongs to the cache kmalloc-128 of size 128
[   31.510267] The buggy address is located 0 bytes to the right of
[   31.510267]  allocated 115-byte region [fff00000c9af0800, fff00000c9af0873)
[   31.510336] 
[   31.510358] The buggy address belongs to the physical page:
[   31.510394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   31.510449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.510502] page_type: f5(slab)
[   31.510545] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.510599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.510642] page dumped because: kasan: bad access detected
[   31.510674] 
[   31.510692] Memory state around the buggy address:
[   31.510743]  fff00000c9af0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.510789]  fff00000c9af0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.510834] >fff00000c9af0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.510876]                                                              ^
[   31.510918]  fff00000c9af0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.510962]  fff00000c9af0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.511003] ==================================================================
[   31.525774] ==================================================================
[   31.525836] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.526816] Read of size 1 at addr fff00000c9b56001 by task kunit_try_catch/254
[   31.526940] 
[   31.526974] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   31.527063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.527244] Hardware name: linux,dummy-virt (DT)
[   31.527765] Call trace:
[   31.527831]  show_stack+0x20/0x38 (C)
[   31.527900]  dump_stack_lvl+0x8c/0xd0
[   31.528109]  print_report+0x118/0x5d0
[   31.528200]  kasan_report+0xdc/0x128
[   31.528263]  __asan_report_load1_noabort+0x20/0x30
[   31.528421]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.528754]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   31.529053]  kunit_try_run_case+0x170/0x3f0
[   31.529259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.529394]  kthread+0x328/0x630
[   31.529767]  ret_from_fork+0x10/0x20
[   31.529967] 
[   31.530474] The buggy address belongs to the physical page:
[   31.530742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b54
[   31.530815] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.530871] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.530928] page_type: f8(unknown)
[   31.530969] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.531666] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.531892] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.532183] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.532240] head: 0bfffe0000000002 ffffc1ffc326d501 00000000ffffffff 00000000ffffffff
[   31.532337] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.532658] page dumped because: kasan: bad access detected
[   31.532924] 
[   31.533601] Memory state around the buggy address:
[   31.533640]  fff00000c9b55f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.533687]  fff00000c9b55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.533731] >fff00000c9b56000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.533772]                    ^
[   31.533800]  fff00000c9b56080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.533844]  fff00000c9b56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.533885] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   30.937961] ==================================================================
[   30.938038] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   30.938116] Read of size 1 at addr fff00000c3e37640 by task kunit_try_catch/246
[   30.938182] 
[   30.938228] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   30.938322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.938350] Hardware name: linux,dummy-virt (DT)
[   30.939203] Call trace:
[   30.939257]  show_stack+0x20/0x38 (C)
[   30.939380]  dump_stack_lvl+0x8c/0xd0
[   30.939443]  print_report+0x118/0x5d0
[   30.939503]  kasan_report+0xdc/0x128
[   30.939670]  __kasan_check_byte+0x54/0x70
[   30.940173]  kmem_cache_destroy+0x34/0x218
[   30.940449]  kmem_cache_double_destroy+0x174/0x300
[   30.940586]  kunit_try_run_case+0x170/0x3f0
[   30.940671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.940944]  kthread+0x328/0x630
[   30.941017]  ret_from_fork+0x10/0x20
[   30.941097] 
[   30.941116] Allocated by task 246:
[   30.941156]  kasan_save_stack+0x3c/0x68
[   30.941202]  kasan_save_track+0x20/0x40
[   30.941267]  kasan_save_alloc_info+0x40/0x58
[   30.941316]  __kasan_slab_alloc+0xa8/0xb0
[   30.941360]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.941403]  __kmem_cache_create_args+0x178/0x280
[   30.941444]  kmem_cache_double_destroy+0xc0/0x300
[   30.941494]  kunit_try_run_case+0x170/0x3f0
[   30.941541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.941587]  kthread+0x328/0x630
[   30.941620]  ret_from_fork+0x10/0x20
[   30.941656] 
[   30.941692] Freed by task 246:
[   30.941726]  kasan_save_stack+0x3c/0x68
[   30.941767]  kasan_save_track+0x20/0x40
[   30.941805]  kasan_save_free_info+0x4c/0x78
[   30.941864]  __kasan_slab_free+0x6c/0x98
[   30.941912]  kmem_cache_free+0x260/0x468
[   30.941951]  slab_kmem_cache_release+0x38/0x50
[   30.941991]  kmem_cache_release+0x1c/0x30
[   30.942038]  kobject_put+0x17c/0x420
[   30.942075]  sysfs_slab_release+0x1c/0x30
[   30.942125]  kmem_cache_destroy+0x118/0x218
[   30.942196]  kmem_cache_double_destroy+0x128/0x300
[   30.942237]  kunit_try_run_case+0x170/0x3f0
[   30.942276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.942321]  kthread+0x328/0x630
[   30.942363]  ret_from_fork+0x10/0x20
[   30.942397] 
[   30.942426] The buggy address belongs to the object at fff00000c3e37640
[   30.942426]  which belongs to the cache kmem_cache of size 208
[   30.942495] The buggy address is located 0 bytes inside of
[   30.942495]  freed 208-byte region [fff00000c3e37640, fff00000c3e37710)
[   30.942559] 
[   30.942583] The buggy address belongs to the physical page:
[   30.942627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e37
[   30.942841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.943333] page_type: f5(slab)
[   30.943570] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122
[   30.943726] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   30.943811] page dumped because: kasan: bad access detected
[   30.943882] 
[   30.944023] Memory state around the buggy address:
[   30.944062]  fff00000c3e37500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.944119]  fff00000c3e37580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   30.944419] >fff00000c3e37600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   30.944537]                                            ^
[   30.944607]  fff00000c3e37680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.944690]  fff00000c3e37700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.944833] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   30.672209] ==================================================================
[   30.672328] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   30.672410] Read of size 1 at addr fff00000c9974000 by task kunit_try_catch/244
[   30.672475] 
[   30.672521] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   30.672638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.672671] Hardware name: linux,dummy-virt (DT)
[   30.672711] Call trace:
[   30.672737]  show_stack+0x20/0x38 (C)
[   30.672793]  dump_stack_lvl+0x8c/0xd0
[   30.672846]  print_report+0x118/0x5d0
[   30.672893]  kasan_report+0xdc/0x128
[   30.672937]  __asan_report_load1_noabort+0x20/0x30
[   30.672993]  kmem_cache_rcu_uaf+0x388/0x468
[   30.673044]  kunit_try_run_case+0x170/0x3f0
[   30.673102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.673176]  kthread+0x328/0x630
[   30.673222]  ret_from_fork+0x10/0x20
[   30.673275] 
[   30.673294] Allocated by task 244:
[   30.673327]  kasan_save_stack+0x3c/0x68
[   30.673375]  kasan_save_track+0x20/0x40
[   30.673416]  kasan_save_alloc_info+0x40/0x58
[   30.673454]  __kasan_slab_alloc+0xa8/0xb0
[   30.673493]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.673537]  kmem_cache_rcu_uaf+0x12c/0x468
[   30.673576]  kunit_try_run_case+0x170/0x3f0
[   30.673614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.673659]  kthread+0x328/0x630
[   30.673690]  ret_from_fork+0x10/0x20
[   30.673726] 
[   30.673745] Freed by task 0:
[   30.673771]  kasan_save_stack+0x3c/0x68
[   30.673807]  kasan_save_track+0x20/0x40
[   30.673845]  kasan_save_free_info+0x4c/0x78
[   30.673880]  __kasan_slab_free+0x6c/0x98
[   30.673918]  slab_free_after_rcu_debug+0xd4/0x2f8
[   30.673960]  rcu_core+0x9f4/0x1e20
[   30.673997]  rcu_core_si+0x18/0x30
[   30.674032]  handle_softirqs+0x374/0xb28
[   30.674069]  __do_softirq+0x1c/0x28
[   30.674103] 
[   30.674121] Last potentially related work creation:
[   30.674340]  kasan_save_stack+0x3c/0x68
[   30.674447]  kasan_record_aux_stack+0xb4/0xc8
[   30.674499]  kmem_cache_free+0x120/0x468
[   30.674538]  kmem_cache_rcu_uaf+0x16c/0x468
[   30.674575]  kunit_try_run_case+0x170/0x3f0
[   30.674614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.674660]  kthread+0x328/0x630
[   30.674693]  ret_from_fork+0x10/0x20
[   30.675199] 
[   30.675220] The buggy address belongs to the object at fff00000c9974000
[   30.675220]  which belongs to the cache test_cache of size 200
[   30.675285] The buggy address is located 0 bytes inside of
[   30.675285]  freed 200-byte region [fff00000c9974000, fff00000c99740c8)
[   30.675349] 
[   30.675371] The buggy address belongs to the physical page:
[   30.675407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109974
[   30.675465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.675527] page_type: f5(slab)
[   30.675572] raw: 0bfffe0000000000 fff00000c3e37500 dead000000000122 0000000000000000
[   30.675626] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.675672] page dumped because: kasan: bad access detected
[   30.675705] 
[   30.675724] Memory state around the buggy address:
[   30.675758]  fff00000c9973f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.675804]  fff00000c9973f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.675849] >fff00000c9974000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.675890]                    ^
[   30.675918]  fff00000c9974080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   30.675962]  fff00000c9974100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.676003] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   30.288574] ==================================================================
[   30.288665] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   30.288738] Free of addr fff00000c9978001 by task kunit_try_catch/242
[   30.288792] 
[   30.288832] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   30.288948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.288979] Hardware name: linux,dummy-virt (DT)
[   30.289021] Call trace:
[   30.289046]  show_stack+0x20/0x38 (C)
[   30.289101]  dump_stack_lvl+0x8c/0xd0
[   30.289169]  print_report+0x118/0x5d0
[   30.289216]  kasan_report_invalid_free+0xc0/0xe8
[   30.289310]  check_slab_allocation+0xfc/0x108
[   30.289395]  __kasan_slab_pre_free+0x2c/0x48
[   30.289919]  kmem_cache_free+0xf0/0x468
[   30.290007]  kmem_cache_invalid_free+0x184/0x3c8
[   30.290066]  kunit_try_run_case+0x170/0x3f0
[   30.290161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.290227]  kthread+0x328/0x630
[   30.290272]  ret_from_fork+0x10/0x20
[   30.290325] 
[   30.290343] Allocated by task 242:
[   30.290375]  kasan_save_stack+0x3c/0x68
[   30.290422]  kasan_save_track+0x20/0x40
[   30.290602]  kasan_save_alloc_info+0x40/0x58
[   30.290654]  __kasan_slab_alloc+0xa8/0xb0
[   30.290708]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.290794]  kmem_cache_invalid_free+0x12c/0x3c8
[   30.290879]  kunit_try_run_case+0x170/0x3f0
[   30.290946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.291011]  kthread+0x328/0x630
[   30.291070]  ret_from_fork+0x10/0x20
[   30.291117] 
[   30.291147] The buggy address belongs to the object at fff00000c9978000
[   30.291147]  which belongs to the cache test_cache of size 200
[   30.291350] The buggy address is located 1 bytes inside of
[   30.291350]  200-byte region [fff00000c9978000, fff00000c99780c8)
[   30.291436] 
[   30.291458] The buggy address belongs to the physical page:
[   30.291506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109978
[   30.291579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.291642] page_type: f5(slab)
[   30.291742] raw: 0bfffe0000000000 fff00000c3e373c0 dead000000000122 0000000000000000
[   30.291872] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.291983] page dumped because: kasan: bad access detected
[   30.292094] 
[   30.292162] Memory state around the buggy address:
[   30.292271]  fff00000c9977f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.292329]  fff00000c9977f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.292634] >fff00000c9978000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.292748]                    ^
[   30.292849]  fff00000c9978080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   30.292939]  fff00000c9978100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.293044] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   30.241616] ==================================================================
[   30.241885] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   30.242622] Free of addr fff00000c99aa000 by task kunit_try_catch/240
[   30.242670] 
[   30.243108] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   30.243716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.243760] Hardware name: linux,dummy-virt (DT)
[   30.243883] Call trace:
[   30.244007]  show_stack+0x20/0x38 (C)
[   30.244347]  dump_stack_lvl+0x8c/0xd0
[   30.244538]  print_report+0x118/0x5d0
[   30.244593]  kasan_report_invalid_free+0xc0/0xe8
[   30.245060]  check_slab_allocation+0xd4/0x108
[   30.245285]  __kasan_slab_pre_free+0x2c/0x48
[   30.245344]  kmem_cache_free+0xf0/0x468
[   30.245715]  kmem_cache_double_free+0x190/0x3c8
[   30.246097]  kunit_try_run_case+0x170/0x3f0
[   30.246432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.246731]  kthread+0x328/0x630
[   30.246787]  ret_from_fork+0x10/0x20
[   30.247142] 
[   30.247174] Allocated by task 240:
[   30.247324]  kasan_save_stack+0x3c/0x68
[   30.247377]  kasan_save_track+0x20/0x40
[   30.247441]  kasan_save_alloc_info+0x40/0x58
[   30.247647]  __kasan_slab_alloc+0xa8/0xb0
[   30.247820]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.248052]  kmem_cache_double_free+0x12c/0x3c8
[   30.248095]  kunit_try_run_case+0x170/0x3f0
[   30.248439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.248623]  kthread+0x328/0x630
[   30.248661]  ret_from_fork+0x10/0x20
[   30.248698] 
[   30.248914] Freed by task 240:
[   30.249194]  kasan_save_stack+0x3c/0x68
[   30.249259]  kasan_save_track+0x20/0x40
[   30.249448]  kasan_save_free_info+0x4c/0x78
[   30.249487]  __kasan_slab_free+0x6c/0x98
[   30.249694]  kmem_cache_free+0x260/0x468
[   30.249842]  kmem_cache_double_free+0x140/0x3c8
[   30.250249]  kunit_try_run_case+0x170/0x3f0
[   30.250301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.250357]  kthread+0x328/0x630
[   30.250389]  ret_from_fork+0x10/0x20
[   30.250426] 
[   30.250445] The buggy address belongs to the object at fff00000c99aa000
[   30.250445]  which belongs to the cache test_cache of size 200
[   30.251161] The buggy address is located 0 bytes inside of
[   30.251161]  200-byte region [fff00000c99aa000, fff00000c99aa0c8)
[   30.251233] 
[   30.251264] The buggy address belongs to the physical page:
[   30.251309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099aa
[   30.251469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.251548] page_type: f5(slab)
[   30.251591] raw: 0bfffe0000000000 fff00000c582f8c0 dead000000000122 0000000000000000
[   30.251990] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.252102] page dumped because: kasan: bad access detected
[   30.252386] 
[   30.252693] Memory state around the buggy address:
[   30.252729]  fff00000c99a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.253052]  fff00000c99a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.253119] >fff00000c99aa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.253323]                    ^
[   30.253455]  fff00000c99aa080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   30.253559]  fff00000c99aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.253613] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   29.949051] ==================================================================
[   29.949143] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   29.949219] Read of size 1 at addr fff00000c99ac0c8 by task kunit_try_catch/238
[   29.949311] 
[   29.949358] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.949447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.949494] Hardware name: linux,dummy-virt (DT)
[   29.949711] Call trace:
[   29.949759]  show_stack+0x20/0x38 (C)
[   29.949815]  dump_stack_lvl+0x8c/0xd0
[   29.949860]  print_report+0x118/0x5d0
[   29.949925]  kasan_report+0xdc/0x128
[   29.949973]  __asan_report_load1_noabort+0x20/0x30
[   29.950033]  kmem_cache_oob+0x344/0x430
[   29.950080]  kunit_try_run_case+0x170/0x3f0
[   29.950144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.950217]  kthread+0x328/0x630
[   29.950283]  ret_from_fork+0x10/0x20
[   29.950488] 
[   29.950515] Allocated by task 238:
[   29.950548]  kasan_save_stack+0x3c/0x68
[   29.950610]  kasan_save_track+0x20/0x40
[   29.950765]  kasan_save_alloc_info+0x40/0x58
[   29.950808]  __kasan_slab_alloc+0xa8/0xb0
[   29.950846]  kmem_cache_alloc_noprof+0x10c/0x398
[   29.950963]  kmem_cache_oob+0x12c/0x430
[   29.951023]  kunit_try_run_case+0x170/0x3f0
[   29.951118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.951271]  kthread+0x328/0x630
[   29.951353]  ret_from_fork+0x10/0x20
[   29.951424] 
[   29.951470] The buggy address belongs to the object at fff00000c99ac000
[   29.951470]  which belongs to the cache test_cache of size 200
[   29.951536] The buggy address is located 0 bytes to the right of
[   29.951536]  allocated 200-byte region [fff00000c99ac000, fff00000c99ac0c8)
[   29.951624] 
[   29.951644] The buggy address belongs to the physical page:
[   29.951676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099ac
[   29.951829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.951887] page_type: f5(slab)
[   29.951926] raw: 0bfffe0000000000 fff00000c582f780 dead000000000122 0000000000000000
[   29.951978] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   29.952062] page dumped because: kasan: bad access detected
[   29.952144] 
[   29.952186] Memory state around the buggy address:
[   29.952230]  fff00000c99abf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.952302]  fff00000c99ac000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.952377] >fff00000c99ac080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   29.952416]                                               ^
[   29.952480]  fff00000c99ac100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.952571]  fff00000c99ac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.952646] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   29.926630] ==================================================================
[   29.926727] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   29.926811] Read of size 8 at addr fff00000c999de80 by task kunit_try_catch/231
[   29.926932] 
[   29.926991] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.927182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.927244] Hardware name: linux,dummy-virt (DT)
[   29.927322] Call trace:
[   29.927380]  show_stack+0x20/0x38 (C)
[   29.927433]  dump_stack_lvl+0x8c/0xd0
[   29.927479]  print_report+0x118/0x5d0
[   29.927528]  kasan_report+0xdc/0x128
[   29.927571]  __asan_report_load8_noabort+0x20/0x30
[   29.927878]  workqueue_uaf+0x480/0x4a8
[   29.928008]  kunit_try_run_case+0x170/0x3f0
[   29.928106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.928252]  kthread+0x328/0x630
[   29.928320]  ret_from_fork+0x10/0x20
[   29.928416] 
[   29.928523] Allocated by task 231:
[   29.928601]  kasan_save_stack+0x3c/0x68
[   29.928699]  kasan_save_track+0x20/0x40
[   29.928793]  kasan_save_alloc_info+0x40/0x58
[   29.928869]  __kasan_kmalloc+0xd4/0xd8
[   29.928910]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.929169]  workqueue_uaf+0x13c/0x4a8
[   29.929292]  kunit_try_run_case+0x170/0x3f0
[   29.929384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.929507]  kthread+0x328/0x630
[   29.929577]  ret_from_fork+0x10/0x20
[   29.929616] 
[   29.929637] Freed by task 75:
[   29.929673]  kasan_save_stack+0x3c/0x68
[   29.929713]  kasan_save_track+0x20/0x40
[   29.929751]  kasan_save_free_info+0x4c/0x78
[   29.929789]  __kasan_slab_free+0x6c/0x98
[   29.929826]  kfree+0x214/0x3c8
[   29.929861]  workqueue_uaf_work+0x18/0x30
[   29.929900]  process_one_work+0x530/0xf98
[   29.929939]  worker_thread+0x618/0xf38
[   29.929975]  kthread+0x328/0x630
[   29.930008]  ret_from_fork+0x10/0x20
[   29.930054] 
[   29.930073] Last potentially related work creation:
[   29.930101]  kasan_save_stack+0x3c/0x68
[   29.930160]  kasan_record_aux_stack+0xb4/0xc8
[   29.930209]  __queue_work+0x65c/0xfe0
[   29.930249]  queue_work_on+0xbc/0xf8
[   29.930285]  workqueue_uaf+0x210/0x4a8
[   29.930321]  kunit_try_run_case+0x170/0x3f0
[   29.930369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.930422]  kthread+0x328/0x630
[   29.930469]  ret_from_fork+0x10/0x20
[   29.930514] 
[   29.930533] The buggy address belongs to the object at fff00000c999de80
[   29.930533]  which belongs to the cache kmalloc-32 of size 32
[   29.930598] The buggy address is located 0 bytes inside of
[   29.930598]  freed 32-byte region [fff00000c999de80, fff00000c999dea0)
[   29.930681] 
[   29.930701] The buggy address belongs to the physical page:
[   29.930734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10999d
[   29.930785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.930833] page_type: f5(slab)
[   29.930877] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.930933] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.930981] page dumped because: kasan: bad access detected
[   29.931023] 
[   29.931043] Memory state around the buggy address:
[   29.931083]  fff00000c999dd80: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.931607]  fff00000c999de00: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   29.931666] >fff00000c999de80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.931706]                    ^
[   29.931735]  fff00000c999df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.931780]  fff00000c999df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.931820] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   29.911954] ==================================================================
[   29.912164] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   29.912237] Read of size 4 at addr fff00000c999dc80 by task ksoftirqd/0/15
[   29.912287] 
[   29.912328] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.912421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.912458] Hardware name: linux,dummy-virt (DT)
[   29.912493] Call trace:
[   29.912516]  show_stack+0x20/0x38 (C)
[   29.912568]  dump_stack_lvl+0x8c/0xd0
[   29.912620]  print_report+0x118/0x5d0
[   29.912669]  kasan_report+0xdc/0x128
[   29.912712]  __asan_report_load4_noabort+0x20/0x30
[   29.912759]  rcu_uaf_reclaim+0x64/0x70
[   29.912814]  rcu_core+0x9f4/0x1e20
[   29.912860]  rcu_core_si+0x18/0x30
[   29.912904]  handle_softirqs+0x374/0xb28
[   29.912950]  run_ksoftirqd+0x80/0xb0
[   29.913004]  smpboot_thread_fn+0x2e8/0x760
[   29.913052]  kthread+0x328/0x630
[   29.913100]  ret_from_fork+0x10/0x20
[   29.913171] 
[   29.913192] Allocated by task 229:
[   29.913221]  kasan_save_stack+0x3c/0x68
[   29.913263]  kasan_save_track+0x20/0x40
[   29.913311]  kasan_save_alloc_info+0x40/0x58
[   29.913350]  __kasan_kmalloc+0xd4/0xd8
[   29.913388]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.913429]  rcu_uaf+0xb0/0x2d8
[   29.913464]  kunit_try_run_case+0x170/0x3f0
[   29.913506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.913551]  kthread+0x328/0x630
[   29.913591]  ret_from_fork+0x10/0x20
[   29.913628] 
[   29.913647] Freed by task 15:
[   29.913684]  kasan_save_stack+0x3c/0x68
[   29.913723]  kasan_save_track+0x20/0x40
[   29.913763]  kasan_save_free_info+0x4c/0x78
[   29.913799]  __kasan_slab_free+0x6c/0x98
[   29.913838]  kfree+0x214/0x3c8
[   29.913872]  rcu_uaf_reclaim+0x28/0x70
[   29.913908]  rcu_core+0x9f4/0x1e20
[   29.913951]  rcu_core_si+0x18/0x30
[   29.913997]  handle_softirqs+0x374/0xb28
[   29.914035]  run_ksoftirqd+0x80/0xb0
[   29.914084]  smpboot_thread_fn+0x2e8/0x760
[   29.914125]  kthread+0x328/0x630
[   29.914691]  ret_from_fork+0x10/0x20
[   29.914742] 
[   29.914777] Last potentially related work creation:
[   29.914812]  kasan_save_stack+0x3c/0x68
[   29.914975]  kasan_record_aux_stack+0xb4/0xc8
[   29.915045]  __call_rcu_common.constprop.0+0x74/0x8c8
[   29.915121]  call_rcu+0x18/0x30
[   29.915167]  rcu_uaf+0x14c/0x2d8
[   29.915242]  kunit_try_run_case+0x170/0x3f0
[   29.915310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.915537]  kthread+0x328/0x630
[   29.915575]  ret_from_fork+0x10/0x20
[   29.915622] 
[   29.915690] The buggy address belongs to the object at fff00000c999dc80
[   29.915690]  which belongs to the cache kmalloc-32 of size 32
[   29.915795] The buggy address is located 0 bytes inside of
[   29.915795]  freed 32-byte region [fff00000c999dc80, fff00000c999dca0)
[   29.915926] 
[   29.915987] The buggy address belongs to the physical page:
[   29.916032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10999d
[   29.916105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.916204] page_type: f5(slab)
[   29.916257] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.916344] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.916407] page dumped because: kasan: bad access detected
[   29.916466] 
[   29.916516] Memory state around the buggy address:
[   29.916584]  fff00000c999db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.916646]  fff00000c999dc00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.916709] >fff00000c999dc80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   29.916773]                    ^
[   29.916802]  fff00000c999dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.916861]  fff00000c999dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.916900] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   29.711176] ==================================================================
[   29.711227] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   29.711272] Read of size 1 at addr fff00000c9af0500 by task kunit_try_catch/227
[   29.711321] 
[   29.711380] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.711469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.711494] Hardware name: linux,dummy-virt (DT)
[   29.711530] Call trace:
[   29.711551]  show_stack+0x20/0x38 (C)
[   29.711597]  dump_stack_lvl+0x8c/0xd0
[   29.711640]  print_report+0x118/0x5d0
[   29.711683]  kasan_report+0xdc/0x128
[   29.711725]  __asan_report_load1_noabort+0x20/0x30
[   29.711771]  ksize_uaf+0x598/0x5f8
[   29.711814]  kunit_try_run_case+0x170/0x3f0
[   29.711862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.711914]  kthread+0x328/0x630
[   29.711967]  ret_from_fork+0x10/0x20
[   29.712014] 
[   29.712031] Allocated by task 227:
[   29.712057]  kasan_save_stack+0x3c/0x68
[   29.712098]  kasan_save_track+0x20/0x40
[   29.712147]  kasan_save_alloc_info+0x40/0x58
[   29.712185]  __kasan_kmalloc+0xd4/0xd8
[   29.712271]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.712372]  ksize_uaf+0xb8/0x5f8
[   29.712406]  kunit_try_run_case+0x170/0x3f0
[   29.712643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.712692]  kthread+0x328/0x630
[   29.712725]  ret_from_fork+0x10/0x20
[   29.712761] 
[   29.712780] Freed by task 227:
[   29.712806]  kasan_save_stack+0x3c/0x68
[   29.712844]  kasan_save_track+0x20/0x40
[   29.712882]  kasan_save_free_info+0x4c/0x78
[   29.712919]  __kasan_slab_free+0x6c/0x98
[   29.712956]  kfree+0x214/0x3c8
[   29.712990]  ksize_uaf+0x11c/0x5f8
[   29.713034]  kunit_try_run_case+0x170/0x3f0
[   29.713223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.713424]  kthread+0x328/0x630
[   29.713536]  ret_from_fork+0x10/0x20
[   29.713572] 
[   29.713660] The buggy address belongs to the object at fff00000c9af0500
[   29.713660]  which belongs to the cache kmalloc-128 of size 128
[   29.713922] The buggy address is located 0 bytes inside of
[   29.713922]  freed 128-byte region [fff00000c9af0500, fff00000c9af0580)
[   29.715250] 
[   29.715281] The buggy address belongs to the physical page:
[   29.715315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.715367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.715416] page_type: f5(slab)
[   29.715454] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.715508] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.715550] page dumped because: kasan: bad access detected
[   29.715581] 
[   29.715600] Memory state around the buggy address:
[   29.715630]  fff00000c9af0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.715674]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.715718] >fff00000c9af0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.715758]                    ^
[   29.715783]  fff00000c9af0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.715826]  fff00000c9af0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.715866] ==================================================================
[   29.706215] ==================================================================
[   29.706272] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   29.706318] Read of size 1 at addr fff00000c9af0500 by task kunit_try_catch/227
[   29.706373] 
[   29.706401] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.706617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.706694] Hardware name: linux,dummy-virt (DT)
[   29.706861] Call trace:
[   29.706918]  show_stack+0x20/0x38 (C)
[   29.706985]  dump_stack_lvl+0x8c/0xd0
[   29.707029]  print_report+0x118/0x5d0
[   29.707124]  kasan_report+0xdc/0x128
[   29.707179]  __kasan_check_byte+0x54/0x70
[   29.707227]  ksize+0x30/0x88
[   29.707269]  ksize_uaf+0x168/0x5f8
[   29.707313]  kunit_try_run_case+0x170/0x3f0
[   29.707359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.707412]  kthread+0x328/0x630
[   29.707454]  ret_from_fork+0x10/0x20
[   29.707504] 
[   29.707522] Allocated by task 227:
[   29.707550]  kasan_save_stack+0x3c/0x68
[   29.707590]  kasan_save_track+0x20/0x40
[   29.707640]  kasan_save_alloc_info+0x40/0x58
[   29.707678]  __kasan_kmalloc+0xd4/0xd8
[   29.707716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.707755]  ksize_uaf+0xb8/0x5f8
[   29.707792]  kunit_try_run_case+0x170/0x3f0
[   29.707830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.707882]  kthread+0x328/0x630
[   29.708014]  ret_from_fork+0x10/0x20
[   29.708096] 
[   29.708153] Freed by task 227:
[   29.708181]  kasan_save_stack+0x3c/0x68
[   29.708325]  kasan_save_track+0x20/0x40
[   29.708364]  kasan_save_free_info+0x4c/0x78
[   29.708402]  __kasan_slab_free+0x6c/0x98
[   29.708439]  kfree+0x214/0x3c8
[   29.708472]  ksize_uaf+0x11c/0x5f8
[   29.708547]  kunit_try_run_case+0x170/0x3f0
[   29.708720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.708794]  kthread+0x328/0x630
[   29.708827]  ret_from_fork+0x10/0x20
[   29.708903] 
[   29.708992] The buggy address belongs to the object at fff00000c9af0500
[   29.708992]  which belongs to the cache kmalloc-128 of size 128
[   29.709053] The buggy address is located 0 bytes inside of
[   29.709053]  freed 128-byte region [fff00000c9af0500, fff00000c9af0580)
[   29.709550] 
[   29.709709] The buggy address belongs to the physical page:
[   29.709745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.709800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.709848] page_type: f5(slab)
[   29.709886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.709938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.709980] page dumped because: kasan: bad access detected
[   29.710012] 
[   29.710031] Memory state around the buggy address:
[   29.710062]  fff00000c9af0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.710107]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710169] >fff00000c9af0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.710289]                    ^
[   29.710349]  fff00000c9af0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710417]  fff00000c9af0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710476] ==================================================================
[   29.716100] ==================================================================
[   29.716161] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   29.716216] Read of size 1 at addr fff00000c9af0578 by task kunit_try_catch/227
[   29.716450] 
[   29.716478] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.716564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.716598] Hardware name: linux,dummy-virt (DT)
[   29.716735] Call trace:
[   29.716791]  show_stack+0x20/0x38 (C)
[   29.716885]  dump_stack_lvl+0x8c/0xd0
[   29.716994]  print_report+0x118/0x5d0
[   29.717138]  kasan_report+0xdc/0x128
[   29.717186]  __asan_report_load1_noabort+0x20/0x30
[   29.717234]  ksize_uaf+0x544/0x5f8
[   29.717277]  kunit_try_run_case+0x170/0x3f0
[   29.717325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.717379]  kthread+0x328/0x630
[   29.717420]  ret_from_fork+0x10/0x20
[   29.717464] 
[   29.717482] Allocated by task 227:
[   29.717507]  kasan_save_stack+0x3c/0x68
[   29.717549]  kasan_save_track+0x20/0x40
[   29.717588]  kasan_save_alloc_info+0x40/0x58
[   29.717626]  __kasan_kmalloc+0xd4/0xd8
[   29.717664]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.717705]  ksize_uaf+0xb8/0x5f8
[   29.717738]  kunit_try_run_case+0x170/0x3f0
[   29.717778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.717824]  kthread+0x328/0x630
[   29.717856]  ret_from_fork+0x10/0x20
[   29.717892] 
[   29.717910] Freed by task 227:
[   29.717935]  kasan_save_stack+0x3c/0x68
[   29.717973]  kasan_save_track+0x20/0x40
[   29.718017]  kasan_save_free_info+0x4c/0x78
[   29.718762]  __kasan_slab_free+0x6c/0x98
[   29.718957]  kfree+0x214/0x3c8
[   29.719022]  ksize_uaf+0x11c/0x5f8
[   29.719075]  kunit_try_run_case+0x170/0x3f0
[   29.719115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.719172]  kthread+0x328/0x630
[   29.719203]  ret_from_fork+0x10/0x20
[   29.719239] 
[   29.719258] The buggy address belongs to the object at fff00000c9af0500
[   29.719258]  which belongs to the cache kmalloc-128 of size 128
[   29.719343] The buggy address is located 120 bytes inside of
[   29.719343]  freed 128-byte region [fff00000c9af0500, fff00000c9af0580)
[   29.719409] 
[   29.719428] The buggy address belongs to the physical page:
[   29.719458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.719514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.719562] page_type: f5(slab)
[   29.719596] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.719771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.719872] page dumped because: kasan: bad access detected
[   29.719905] 
[   29.719922] Memory state around the buggy address:
[   29.719971]  fff00000c9af0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.720016]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720060] >fff00000c9af0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.720099]                                                                 ^
[   29.720151]  fff00000c9af0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720207]  fff00000c9af0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720248] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   29.692591] ==================================================================
[   29.692649] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   29.692800] Read of size 1 at addr fff00000c9af0478 by task kunit_try_catch/225
[   29.692886] 
[   29.692913] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.693002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.693027] Hardware name: linux,dummy-virt (DT)
[   29.693058] Call trace:
[   29.693080]  show_stack+0x20/0x38 (C)
[   29.693139]  dump_stack_lvl+0x8c/0xd0
[   29.693184]  print_report+0x118/0x5d0
[   29.693226]  kasan_report+0xdc/0x128
[   29.693269]  __asan_report_load1_noabort+0x20/0x30
[   29.693327]  ksize_unpoisons_memory+0x618/0x740
[   29.693375]  kunit_try_run_case+0x170/0x3f0
[   29.693424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.693478]  kthread+0x328/0x630
[   29.693518]  ret_from_fork+0x10/0x20
[   29.693564] 
[   29.693582] Allocated by task 225:
[   29.693608]  kasan_save_stack+0x3c/0x68
[   29.693648]  kasan_save_track+0x20/0x40
[   29.693686]  kasan_save_alloc_info+0x40/0x58
[   29.693764]  __kasan_kmalloc+0xd4/0xd8
[   29.693918]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.694114]  ksize_unpoisons_memory+0xc0/0x740
[   29.694165]  kunit_try_run_case+0x170/0x3f0
[   29.694513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.694718]  kthread+0x328/0x630
[   29.694755]  ret_from_fork+0x10/0x20
[   29.694797] 
[   29.694860] The buggy address belongs to the object at fff00000c9af0400
[   29.694860]  which belongs to the cache kmalloc-128 of size 128
[   29.695098] The buggy address is located 5 bytes to the right of
[   29.695098]  allocated 115-byte region [fff00000c9af0400, fff00000c9af0473)
[   29.695176] 
[   29.695196] The buggy address belongs to the physical page:
[   29.695227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.695282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.695330] page_type: f5(slab)
[   29.695373] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.695631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.695790] page dumped because: kasan: bad access detected
[   29.695822] 
[   29.695904] Memory state around the buggy address:
[   29.696059]  fff00000c9af0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.696554]  fff00000c9af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.696623] >fff00000c9af0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.696663]                                                                 ^
[   29.696705]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.696802]  fff00000c9af0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.696843] ==================================================================
[   29.686679] ==================================================================
[   29.686785] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   29.686839] Read of size 1 at addr fff00000c9af0473 by task kunit_try_catch/225
[   29.686891] 
[   29.687247] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.687335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.687407] Hardware name: linux,dummy-virt (DT)
[   29.687472] Call trace:
[   29.687603]  show_stack+0x20/0x38 (C)
[   29.687674]  dump_stack_lvl+0x8c/0xd0
[   29.687720]  print_report+0x118/0x5d0
[   29.687771]  kasan_report+0xdc/0x128
[   29.687873]  __asan_report_load1_noabort+0x20/0x30
[   29.687998]  ksize_unpoisons_memory+0x628/0x740
[   29.688458]  kunit_try_run_case+0x170/0x3f0
[   29.688539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.688595]  kthread+0x328/0x630
[   29.688638]  ret_from_fork+0x10/0x20
[   29.688685] 
[   29.688703] Allocated by task 225:
[   29.688732]  kasan_save_stack+0x3c/0x68
[   29.688775]  kasan_save_track+0x20/0x40
[   29.688817]  kasan_save_alloc_info+0x40/0x58
[   29.688854]  __kasan_kmalloc+0xd4/0xd8
[   29.688901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.689027]  ksize_unpoisons_memory+0xc0/0x740
[   29.689116]  kunit_try_run_case+0x170/0x3f0
[   29.689164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.689208]  kthread+0x328/0x630
[   29.689239]  ret_from_fork+0x10/0x20
[   29.689274] 
[   29.689292] The buggy address belongs to the object at fff00000c9af0400
[   29.689292]  which belongs to the cache kmalloc-128 of size 128
[   29.689351] The buggy address is located 0 bytes to the right of
[   29.689351]  allocated 115-byte region [fff00000c9af0400, fff00000c9af0473)
[   29.689418] 
[   29.689437] The buggy address belongs to the physical page:
[   29.689475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.689530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.689577] page_type: f5(slab)
[   29.689614] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.689665] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.689734] page dumped because: kasan: bad access detected
[   29.689813] 
[   29.689892] Memory state around the buggy address:
[   29.689949]  fff00000c9af0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.690048]  fff00000c9af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.690210] >fff00000c9af0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.690251]                                                              ^
[   29.690297]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.690498]  fff00000c9af0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.690682] ==================================================================
[   29.697298] ==================================================================
[   29.697347] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   29.697469] Read of size 1 at addr fff00000c9af047f by task kunit_try_catch/225
[   29.697582] 
[   29.697680] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.697789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.697816] Hardware name: linux,dummy-virt (DT)
[   29.697847] Call trace:
[   29.697867]  show_stack+0x20/0x38 (C)
[   29.697914]  dump_stack_lvl+0x8c/0xd0
[   29.697957]  print_report+0x118/0x5d0
[   29.697999]  kasan_report+0xdc/0x128
[   29.698068]  __asan_report_load1_noabort+0x20/0x30
[   29.698203]  ksize_unpoisons_memory+0x690/0x740
[   29.698411]  kunit_try_run_case+0x170/0x3f0
[   29.698463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.698518]  kthread+0x328/0x630
[   29.698559]  ret_from_fork+0x10/0x20
[   29.698606] 
[   29.698633] Allocated by task 225:
[   29.698710]  kasan_save_stack+0x3c/0x68
[   29.698809]  kasan_save_track+0x20/0x40
[   29.698848]  kasan_save_alloc_info+0x40/0x58
[   29.698884]  __kasan_kmalloc+0xd4/0xd8
[   29.698921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.698959]  ksize_unpoisons_memory+0xc0/0x740
[   29.698998]  kunit_try_run_case+0x170/0x3f0
[   29.699036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.699087]  kthread+0x328/0x630
[   29.699120]  ret_from_fork+0x10/0x20
[   29.699190] 
[   29.699210] The buggy address belongs to the object at fff00000c9af0400
[   29.699210]  which belongs to the cache kmalloc-128 of size 128
[   29.699268] The buggy address is located 12 bytes to the right of
[   29.699268]  allocated 115-byte region [fff00000c9af0400, fff00000c9af0473)
[   29.699453] 
[   29.699560] The buggy address belongs to the physical page:
[   29.699702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.699776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.699824] page_type: f5(slab)
[   29.699865] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.699962] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.700117] page dumped because: kasan: bad access detected
[   29.700162] 
[   29.700243] Memory state around the buggy address:
[   29.700278]  fff00000c9af0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.700324]  fff00000c9af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.700406] >fff00000c9af0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.700593]                                                                 ^
[   29.700636]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.700843]  fff00000c9af0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.700931] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   29.665584] ==================================================================
[   29.665669] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   29.665720] Free of addr fff00000c8686b20 by task kunit_try_catch/223
[   29.665762] 
[   29.665792] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.665881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.666708] Hardware name: linux,dummy-virt (DT)
[   29.667083] Call trace:
[   29.667110]  show_stack+0x20/0x38 (C)
[   29.667481]  dump_stack_lvl+0x8c/0xd0
[   29.667889]  print_report+0x118/0x5d0
[   29.667979]  kasan_report_invalid_free+0xc0/0xe8
[   29.668027]  check_slab_allocation+0xd4/0x108
[   29.668569]  __kasan_slab_pre_free+0x2c/0x48
[   29.668871]  kfree+0xe8/0x3c8
[   29.668923]  kfree_sensitive+0x3c/0xb0
[   29.669142]  kmalloc_double_kzfree+0x168/0x308
[   29.669225]  kunit_try_run_case+0x170/0x3f0
[   29.669272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.669327]  kthread+0x328/0x630
[   29.669369]  ret_from_fork+0x10/0x20
[   29.670350] 
[   29.670765] Allocated by task 223:
[   29.670801]  kasan_save_stack+0x3c/0x68
[   29.670849]  kasan_save_track+0x20/0x40
[   29.670889]  kasan_save_alloc_info+0x40/0x58
[   29.670996]  __kasan_kmalloc+0xd4/0xd8
[   29.671160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.671201]  kmalloc_double_kzfree+0xb8/0x308
[   29.671515]  kunit_try_run_case+0x170/0x3f0
[   29.671568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.672046]  kthread+0x328/0x630
[   29.672083]  ret_from_fork+0x10/0x20
[   29.672353] 
[   29.672375] Freed by task 223:
[   29.672790]  kasan_save_stack+0x3c/0x68
[   29.673091]  kasan_save_track+0x20/0x40
[   29.673225]  kasan_save_free_info+0x4c/0x78
[   29.673552]  __kasan_slab_free+0x6c/0x98
[   29.673598]  kfree+0x214/0x3c8
[   29.673631]  kfree_sensitive+0x80/0xb0
[   29.673669]  kmalloc_double_kzfree+0x11c/0x308
[   29.673712]  kunit_try_run_case+0x170/0x3f0
[   29.673796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.673845]  kthread+0x328/0x630
[   29.673877]  ret_from_fork+0x10/0x20
[   29.674047] 
[   29.674070] The buggy address belongs to the object at fff00000c8686b20
[   29.674070]  which belongs to the cache kmalloc-16 of size 16
[   29.674224] The buggy address is located 0 bytes inside of
[   29.674224]  16-byte region [fff00000c8686b20, fff00000c8686b30)
[   29.674314] 
[   29.674335] The buggy address belongs to the physical page:
[   29.674577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686
[   29.674834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.675182] page_type: f5(slab)
[   29.675354] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.675422] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000
[   29.675464] page dumped because: kasan: bad access detected
[   29.675497] 
[   29.675707] Memory state around the buggy address:
[   29.675994]  fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.676043]  fff00000c8686a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.676143] >fff00000c8686b00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   29.676184]                                ^
[   29.676264]  fff00000c8686b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.676509]  fff00000c8686c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.676551] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   29.656575] ==================================================================
[   29.656799] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   29.656978] Read of size 1 at addr fff00000c8686b20 by task kunit_try_catch/223
[   29.657685] 
[   29.657767] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.658057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.658085] Hardware name: linux,dummy-virt (DT)
[   29.658172] Call trace:
[   29.658196]  show_stack+0x20/0x38 (C)
[   29.658489]  dump_stack_lvl+0x8c/0xd0
[   29.658693]  print_report+0x118/0x5d0
[   29.658839]  kasan_report+0xdc/0x128
[   29.658994]  __kasan_check_byte+0x54/0x70
[   29.659111]  kfree_sensitive+0x30/0xb0
[   29.659228]  kmalloc_double_kzfree+0x168/0x308
[   29.659277]  kunit_try_run_case+0x170/0x3f0
[   29.659615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.659669]  kthread+0x328/0x630
[   29.659818]  ret_from_fork+0x10/0x20
[   29.659938] 
[   29.660002] Allocated by task 223:
[   29.660055]  kasan_save_stack+0x3c/0x68
[   29.660098]  kasan_save_track+0x20/0x40
[   29.660145]  kasan_save_alloc_info+0x40/0x58
[   29.660183]  __kasan_kmalloc+0xd4/0xd8
[   29.660220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.660261]  kmalloc_double_kzfree+0xb8/0x308
[   29.660299]  kunit_try_run_case+0x170/0x3f0
[   29.660339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.660416]  kthread+0x328/0x630
[   29.660450]  ret_from_fork+0x10/0x20
[   29.660498] 
[   29.660518] Freed by task 223:
[   29.660588]  kasan_save_stack+0x3c/0x68
[   29.660629]  kasan_save_track+0x20/0x40
[   29.660667]  kasan_save_free_info+0x4c/0x78
[   29.660705]  __kasan_slab_free+0x6c/0x98
[   29.660743]  kfree+0x214/0x3c8
[   29.660787]  kfree_sensitive+0x80/0xb0
[   29.660940]  kmalloc_double_kzfree+0x11c/0x308
[   29.661022]  kunit_try_run_case+0x170/0x3f0
[   29.661101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.661155]  kthread+0x328/0x630
[   29.661186]  ret_from_fork+0x10/0x20
[   29.661223] 
[   29.661241] The buggy address belongs to the object at fff00000c8686b20
[   29.661241]  which belongs to the cache kmalloc-16 of size 16
[   29.661301] The buggy address is located 0 bytes inside of
[   29.661301]  freed 16-byte region [fff00000c8686b20, fff00000c8686b30)
[   29.661365] 
[   29.661385] The buggy address belongs to the physical page:
[   29.661479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686
[   29.661743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.661981] page_type: f5(slab)
[   29.662110] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.662316] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000
[   29.662364] page dumped because: kasan: bad access detected
[   29.662634] 
[   29.662652] Memory state around the buggy address:
[   29.662686]  fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.662730]  fff00000c8686a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.662774] >fff00000c8686b00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   29.663002]                                ^
[   29.663043]  fff00000c8686b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.663089]  fff00000c8686c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.663196] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   29.626094] ==================================================================
[   29.626169] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   29.626221] Read of size 1 at addr fff00000c99b0ca8 by task kunit_try_catch/219
[   29.626272] 
[   29.626304] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.626390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.626419] Hardware name: linux,dummy-virt (DT)
[   29.626449] Call trace:
[   29.626473]  show_stack+0x20/0x38 (C)
[   29.626520]  dump_stack_lvl+0x8c/0xd0
[   29.626676]  print_report+0x118/0x5d0
[   29.626916]  kasan_report+0xdc/0x128
[   29.627356]  __asan_report_load1_noabort+0x20/0x30
[   29.627418]  kmalloc_uaf2+0x3f4/0x468
[   29.627463]  kunit_try_run_case+0x170/0x3f0
[   29.627526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.627581]  kthread+0x328/0x630
[   29.627623]  ret_from_fork+0x10/0x20
[   29.628437] 
[   29.628457] Allocated by task 219:
[   29.628486]  kasan_save_stack+0x3c/0x68
[   29.628627]  kasan_save_track+0x20/0x40
[   29.628989]  kasan_save_alloc_info+0x40/0x58
[   29.629251]  __kasan_kmalloc+0xd4/0xd8
[   29.629631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.629674]  kmalloc_uaf2+0xc4/0x468
[   29.629811]  kunit_try_run_case+0x170/0x3f0
[   29.629869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.630503]  kthread+0x328/0x630
[   29.630991]  ret_from_fork+0x10/0x20
[   29.631064] 
[   29.631083] Freed by task 219:
[   29.631111]  kasan_save_stack+0x3c/0x68
[   29.631165]  kasan_save_track+0x20/0x40
[   29.631202]  kasan_save_free_info+0x4c/0x78
[   29.631241]  __kasan_slab_free+0x6c/0x98
[   29.631280]  kfree+0x214/0x3c8
[   29.631313]  kmalloc_uaf2+0x134/0x468
[   29.631351]  kunit_try_run_case+0x170/0x3f0
[   29.632124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.632626]  kthread+0x328/0x630
[   29.632661]  ret_from_fork+0x10/0x20
[   29.632697] 
[   29.632716] The buggy address belongs to the object at fff00000c99b0c80
[   29.632716]  which belongs to the cache kmalloc-64 of size 64
[   29.633296] The buggy address is located 40 bytes inside of
[   29.633296]  freed 64-byte region [fff00000c99b0c80, fff00000c99b0cc0)
[   29.633481] 
[   29.633502] The buggy address belongs to the physical page:
[   29.633904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099b0
[   29.633977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.634140] page_type: f5(slab)
[   29.634261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.634524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.634724] page dumped because: kasan: bad access detected
[   29.634758] 
[   29.634777] Memory state around the buggy address:
[   29.634809]  fff00000c99b0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.635034]  fff00000c99b0c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.635082] >fff00000c99b0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.635388]                                   ^
[   29.635642]  fff00000c99b0d00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   29.635689]  fff00000c99b0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.636212] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   29.605399] ==================================================================
[   29.605863] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   29.605930] Write of size 33 at addr fff00000c99b0b00 by task kunit_try_catch/217
[   29.605994] 
[   29.606035] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.606402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.606642] Hardware name: linux,dummy-virt (DT)
[   29.606715] Call trace:
[   29.607027]  show_stack+0x20/0x38 (C)
[   29.607329]  dump_stack_lvl+0x8c/0xd0
[   29.607388]  print_report+0x118/0x5d0
[   29.607434]  kasan_report+0xdc/0x128
[   29.607518]  kasan_check_range+0x100/0x1a8
[   29.607566]  __asan_memset+0x34/0x78
[   29.607796]  kmalloc_uaf_memset+0x170/0x310
[   29.607846]  kunit_try_run_case+0x170/0x3f0
[   29.608213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.608520]  kthread+0x328/0x630
[   29.608669]  ret_from_fork+0x10/0x20
[   29.608719] 
[   29.608738] Allocated by task 217:
[   29.609199]  kasan_save_stack+0x3c/0x68
[   29.609252]  kasan_save_track+0x20/0x40
[   29.609292]  kasan_save_alloc_info+0x40/0x58
[   29.609328]  __kasan_kmalloc+0xd4/0xd8
[   29.609366]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.610055]  kmalloc_uaf_memset+0xb8/0x310
[   29.610108]  kunit_try_run_case+0x170/0x3f0
[   29.610159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.610206]  kthread+0x328/0x630
[   29.610749]  ret_from_fork+0x10/0x20
[   29.610797] 
[   29.610817] Freed by task 217:
[   29.610844]  kasan_save_stack+0x3c/0x68
[   29.610930]  kasan_save_track+0x20/0x40
[   29.610975]  kasan_save_free_info+0x4c/0x78
[   29.611024]  __kasan_slab_free+0x6c/0x98
[   29.611098]  kfree+0x214/0x3c8
[   29.611238]  kmalloc_uaf_memset+0x11c/0x310
[   29.611565]  kunit_try_run_case+0x170/0x3f0
[   29.611614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.611660]  kthread+0x328/0x630
[   29.611715]  ret_from_fork+0x10/0x20
[   29.611752] 
[   29.611837] The buggy address belongs to the object at fff00000c99b0b00
[   29.611837]  which belongs to the cache kmalloc-64 of size 64
[   29.612384] The buggy address is located 0 bytes inside of
[   29.612384]  freed 64-byte region [fff00000c99b0b00, fff00000c99b0b40)
[   29.612568] 
[   29.612589] The buggy address belongs to the physical page:
[   29.612869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099b0
[   29.613423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.613489] page_type: f5(slab)
[   29.613783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.613850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.614355] page dumped because: kasan: bad access detected
[   29.614393] 
[   29.614637] Memory state around the buggy address:
[   29.614688]  fff00000c99b0a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.614743]  fff00000c99b0a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.615102] >fff00000c99b0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.615155]                    ^
[   29.615185]  fff00000c99b0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.615229]  fff00000c99b0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.615269] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   29.583466] ==================================================================
[   29.583535] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   29.583682] Read of size 1 at addr fff00000c8686b08 by task kunit_try_catch/215
[   29.584159] 
[   29.584469] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.584566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.584593] Hardware name: linux,dummy-virt (DT)
[   29.584625] Call trace:
[   29.585343]  show_stack+0x20/0x38 (C)
[   29.585492]  dump_stack_lvl+0x8c/0xd0
[   29.585985]  print_report+0x118/0x5d0
[   29.586152]  kasan_report+0xdc/0x128
[   29.586199]  __asan_report_load1_noabort+0x20/0x30
[   29.586249]  kmalloc_uaf+0x300/0x338
[   29.586292]  kunit_try_run_case+0x170/0x3f0
[   29.586736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.586809]  kthread+0x328/0x630
[   29.586880]  ret_from_fork+0x10/0x20
[   29.587250] 
[   29.587269] Allocated by task 215:
[   29.587317]  kasan_save_stack+0x3c/0x68
[   29.587370]  kasan_save_track+0x20/0x40
[   29.587417]  kasan_save_alloc_info+0x40/0x58
[   29.587456]  __kasan_kmalloc+0xd4/0xd8
[   29.587904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.587946]  kmalloc_uaf+0xb8/0x338
[   29.588199]  kunit_try_run_case+0x170/0x3f0
[   29.588248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.588353]  kthread+0x328/0x630
[   29.588389]  ret_from_fork+0x10/0x20
[   29.588424] 
[   29.588818] Freed by task 215:
[   29.588846]  kasan_save_stack+0x3c/0x68
[   29.589328]  kasan_save_track+0x20/0x40
[   29.589481]  kasan_save_free_info+0x4c/0x78
[   29.589518]  __kasan_slab_free+0x6c/0x98
[   29.589846]  kfree+0x214/0x3c8
[   29.589888]  kmalloc_uaf+0x11c/0x338
[   29.590259]  kunit_try_run_case+0x170/0x3f0
[   29.590305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.590677]  kthread+0x328/0x630
[   29.590722]  ret_from_fork+0x10/0x20
[   29.590770] 
[   29.590825] The buggy address belongs to the object at fff00000c8686b00
[   29.590825]  which belongs to the cache kmalloc-16 of size 16
[   29.591026] The buggy address is located 8 bytes inside of
[   29.591026]  freed 16-byte region [fff00000c8686b00, fff00000c8686b10)
[   29.591091] 
[   29.591392] The buggy address belongs to the physical page:
[   29.591560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686
[   29.591621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.591672] page_type: f5(slab)
[   29.591711] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.591762] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000
[   29.591807] page dumped because: kasan: bad access detected
[   29.591840] 
[   29.592767] Memory state around the buggy address:
[   29.592995]  fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.593048]  fff00000c8686a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.593094] >fff00000c8686b00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.593210]                       ^
[   29.593243]  fff00000c8686b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.593288]  fff00000c8686c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.593644] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   29.556465] ==================================================================
[   29.556532] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   29.556590] Read of size 64 at addr fff00000c99b0884 by task kunit_try_catch/213
[   29.556641] 
[   29.556675] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.557748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.558158] Hardware name: linux,dummy-virt (DT)
[   29.558231] Call trace:
[   29.558253]  show_stack+0x20/0x38 (C)
[   29.558309]  dump_stack_lvl+0x8c/0xd0
[   29.558356]  print_report+0x118/0x5d0
[   29.558761]  kasan_report+0xdc/0x128
[   29.559040]  kasan_check_range+0x100/0x1a8
[   29.559507]  __asan_memmove+0x3c/0x98
[   29.559555]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   29.559791]  kunit_try_run_case+0x170/0x3f0
[   29.559849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.560025]  kthread+0x328/0x630
[   29.560192]  ret_from_fork+0x10/0x20
[   29.560278] 
[   29.560430] Allocated by task 213:
[   29.560459]  kasan_save_stack+0x3c/0x68
[   29.560759]  kasan_save_track+0x20/0x40
[   29.560806]  kasan_save_alloc_info+0x40/0x58
[   29.560860]  __kasan_kmalloc+0xd4/0xd8
[   29.560951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.561414]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   29.561528]  kunit_try_run_case+0x170/0x3f0
[   29.561747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.561798]  kthread+0x328/0x630
[   29.561832]  ret_from_fork+0x10/0x20
[   29.561869] 
[   29.561889] The buggy address belongs to the object at fff00000c99b0880
[   29.561889]  which belongs to the cache kmalloc-64 of size 64
[   29.562173] The buggy address is located 4 bytes inside of
[   29.562173]  allocated 64-byte region [fff00000c99b0880, fff00000c99b08c0)
[   29.562685] 
[   29.562710] The buggy address belongs to the physical page:
[   29.562745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099b0
[   29.563348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.563418] page_type: f5(slab)
[   29.563460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.563516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.563557] page dumped because: kasan: bad access detected
[   29.563590] 
[   29.563609] Memory state around the buggy address:
[   29.564544]  fff00000c99b0780: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   29.564819]  fff00000c99b0800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.564985] >fff00000c99b0880: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.565040]                                            ^
[   29.565078]  fff00000c99b0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.565396]  fff00000c99b0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.565441] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   29.537434] ==================================================================
[   29.537508] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   29.537846] Read of size 18446744073709551614 at addr fff00000c99b0684 by task kunit_try_catch/211
[   29.538051] 
[   29.538318] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.538757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.538788] Hardware name: linux,dummy-virt (DT)
[   29.538821] Call trace:
[   29.538844]  show_stack+0x20/0x38 (C)
[   29.538898]  dump_stack_lvl+0x8c/0xd0
[   29.538947]  print_report+0x118/0x5d0
[   29.538989]  kasan_report+0xdc/0x128
[   29.539377]  kasan_check_range+0x100/0x1a8
[   29.539424]  __asan_memmove+0x3c/0x98
[   29.539710]  kmalloc_memmove_negative_size+0x154/0x2e0
[   29.539779]  kunit_try_run_case+0x170/0x3f0
[   29.540066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.540415]  kthread+0x328/0x630
[   29.540467]  ret_from_fork+0x10/0x20
[   29.540516] 
[   29.540535] Allocated by task 211:
[   29.540983]  kasan_save_stack+0x3c/0x68
[   29.541097]  kasan_save_track+0x20/0x40
[   29.541153]  kasan_save_alloc_info+0x40/0x58
[   29.541469]  __kasan_kmalloc+0xd4/0xd8
[   29.541515]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.541555]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   29.542006]  kunit_try_run_case+0x170/0x3f0
[   29.542367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.542624]  kthread+0x328/0x630
[   29.542798]  ret_from_fork+0x10/0x20
[   29.542836] 
[   29.542857] The buggy address belongs to the object at fff00000c99b0680
[   29.542857]  which belongs to the cache kmalloc-64 of size 64
[   29.542918] The buggy address is located 4 bytes inside of
[   29.542918]  64-byte region [fff00000c99b0680, fff00000c99b06c0)
[   29.542981] 
[   29.543001] The buggy address belongs to the physical page:
[   29.543034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099b0
[   29.543172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.543228] page_type: f5(slab)
[   29.543582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.543853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.544332] page dumped because: kasan: bad access detected
[   29.544366] 
[   29.544385] Memory state around the buggy address:
[   29.544419]  fff00000c99b0580: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   29.544464]  fff00000c99b0600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.544508] >fff00000c99b0680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.544551]                    ^
[   29.544578]  fff00000c99b0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.544622]  fff00000c99b0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.544661] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   29.509211] ==================================================================
[   29.509293] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   29.509344] Write of size 16 at addr fff00000c9af0369 by task kunit_try_catch/209
[   29.509433] 
[   29.509476] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.509786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.509823] Hardware name: linux,dummy-virt (DT)
[   29.510096] Call trace:
[   29.510177]  show_stack+0x20/0x38 (C)
[   29.510432]  dump_stack_lvl+0x8c/0xd0
[   29.510523]  print_report+0x118/0x5d0
[   29.510565]  kasan_report+0xdc/0x128
[   29.510607]  kasan_check_range+0x100/0x1a8
[   29.510651]  __asan_memset+0x34/0x78
[   29.510693]  kmalloc_oob_memset_16+0x150/0x2f8
[   29.510903]  kunit_try_run_case+0x170/0x3f0
[   29.511002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.511070]  kthread+0x328/0x630
[   29.511111]  ret_from_fork+0x10/0x20
[   29.511568] 
[   29.511589] Allocated by task 209:
[   29.511896]  kasan_save_stack+0x3c/0x68
[   29.511978]  kasan_save_track+0x20/0x40
[   29.512499]  kasan_save_alloc_info+0x40/0x58
[   29.512884]  __kasan_kmalloc+0xd4/0xd8
[   29.513187]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.513245]  kmalloc_oob_memset_16+0xb0/0x2f8
[   29.513911]  kunit_try_run_case+0x170/0x3f0
[   29.514393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.514459]  kthread+0x328/0x630
[   29.514493]  ret_from_fork+0x10/0x20
[   29.514661] 
[   29.514749] The buggy address belongs to the object at fff00000c9af0300
[   29.514749]  which belongs to the cache kmalloc-128 of size 128
[   29.514814] The buggy address is located 105 bytes inside of
[   29.514814]  allocated 120-byte region [fff00000c9af0300, fff00000c9af0378)
[   29.514880] 
[   29.514900] The buggy address belongs to the physical page:
[   29.514933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.514987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.515034] page_type: f5(slab)
[   29.516043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.516374] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.516420] page dumped because: kasan: bad access detected
[   29.516843] 
[   29.517054] Memory state around the buggy address:
[   29.517337]  fff00000c9af0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.517602]  fff00000c9af0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.517697] >fff00000c9af0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.517738]                                                                 ^
[   29.518046]  fff00000c9af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.518373]  fff00000c9af0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.518425] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   29.496573] ==================================================================
[   29.496627] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   29.496673] Write of size 8 at addr fff00000c9af0271 by task kunit_try_catch/207
[   29.496731] 
[   29.496873] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.496958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.496984] Hardware name: linux,dummy-virt (DT)
[   29.497013] Call trace:
[   29.497035]  show_stack+0x20/0x38 (C)
[   29.497082]  dump_stack_lvl+0x8c/0xd0
[   29.497125]  print_report+0x118/0x5d0
[   29.497180]  kasan_report+0xdc/0x128
[   29.497221]  kasan_check_range+0x100/0x1a8
[   29.497265]  __asan_memset+0x34/0x78
[   29.497307]  kmalloc_oob_memset_8+0x150/0x2f8
[   29.497353]  kunit_try_run_case+0x170/0x3f0
[   29.497398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.497450]  kthread+0x328/0x630
[   29.497490]  ret_from_fork+0x10/0x20
[   29.497535] 
[   29.497553] Allocated by task 207:
[   29.497578]  kasan_save_stack+0x3c/0x68
[   29.497617]  kasan_save_track+0x20/0x40
[   29.497655]  kasan_save_alloc_info+0x40/0x58
[   29.497691]  __kasan_kmalloc+0xd4/0xd8
[   29.497727]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.497766]  kmalloc_oob_memset_8+0xb0/0x2f8
[   29.497804]  kunit_try_run_case+0x170/0x3f0
[   29.497860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.497905]  kthread+0x328/0x630
[   29.497949]  ret_from_fork+0x10/0x20
[   29.497993] 
[   29.498011] The buggy address belongs to the object at fff00000c9af0200
[   29.498011]  which belongs to the cache kmalloc-128 of size 128
[   29.498103] The buggy address is located 113 bytes inside of
[   29.498103]  allocated 120-byte region [fff00000c9af0200, fff00000c9af0278)
[   29.498175] 
[   29.498217] The buggy address belongs to the physical page:
[   29.498247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.498297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.498342] page_type: f5(slab)
[   29.498387] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.498447] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.498566] page dumped because: kasan: bad access detected
[   29.498668] 
[   29.498686] Memory state around the buggy address:
[   29.498722]  fff00000c9af0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.498824]  fff00000c9af0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.498903] >fff00000c9af0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.498941]                                                                 ^
[   29.498999]  fff00000c9af0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.499068]  fff00000c9af0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.499107] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   29.489394] ==================================================================
[   29.489467] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   29.489519] Write of size 4 at addr fff00000c9af0175 by task kunit_try_catch/205
[   29.489577] 
[   29.489608] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.489693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.489719] Hardware name: linux,dummy-virt (DT)
[   29.489748] Call trace:
[   29.489770]  show_stack+0x20/0x38 (C)
[   29.489817]  dump_stack_lvl+0x8c/0xd0
[   29.489931]  print_report+0x118/0x5d0
[   29.489975]  kasan_report+0xdc/0x128
[   29.490016]  kasan_check_range+0x100/0x1a8
[   29.490060]  __asan_memset+0x34/0x78
[   29.490101]  kmalloc_oob_memset_4+0x150/0x300
[   29.490158]  kunit_try_run_case+0x170/0x3f0
[   29.490205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.490257]  kthread+0x328/0x630
[   29.490297]  ret_from_fork+0x10/0x20
[   29.490342] 
[   29.490360] Allocated by task 205:
[   29.490395]  kasan_save_stack+0x3c/0x68
[   29.490435]  kasan_save_track+0x20/0x40
[   29.490472]  kasan_save_alloc_info+0x40/0x58
[   29.490509]  __kasan_kmalloc+0xd4/0xd8
[   29.490556]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.490608]  kmalloc_oob_memset_4+0xb0/0x300
[   29.490662]  kunit_try_run_case+0x170/0x3f0
[   29.490843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.490890]  kthread+0x328/0x630
[   29.490922]  ret_from_fork+0x10/0x20
[   29.490957] 
[   29.491020] The buggy address belongs to the object at fff00000c9af0100
[   29.491020]  which belongs to the cache kmalloc-128 of size 128
[   29.491079] The buggy address is located 117 bytes inside of
[   29.491079]  allocated 120-byte region [fff00000c9af0100, fff00000c9af0178)
[   29.491160] 
[   29.491180] The buggy address belongs to the physical page:
[   29.491210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.491272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.491319] page_type: f5(slab)
[   29.491355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.491419] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.491460] page dumped because: kasan: bad access detected
[   29.491521] 
[   29.491539] Memory state around the buggy address:
[   29.491569]  fff00000c9af0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.491612]  fff00000c9af0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.491711] >fff00000c9af0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.491889]                                                                 ^
[   29.491985]  fff00000c9af0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.492072]  fff00000c9af0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.492147] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   29.480198] ==================================================================
[   29.480362] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   29.480413] Write of size 2 at addr fff00000c9af0077 by task kunit_try_catch/203
[   29.480628] 
[   29.480711] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.480981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.481058] Hardware name: linux,dummy-virt (DT)
[   29.481089] Call trace:
[   29.481201]  show_stack+0x20/0x38 (C)
[   29.481282]  dump_stack_lvl+0x8c/0xd0
[   29.481381]  print_report+0x118/0x5d0
[   29.481424]  kasan_report+0xdc/0x128
[   29.481471]  kasan_check_range+0x100/0x1a8
[   29.481567]  __asan_memset+0x34/0x78
[   29.481699]  kmalloc_oob_memset_2+0x150/0x2f8
[   29.481897]  kunit_try_run_case+0x170/0x3f0
[   29.481944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.481997]  kthread+0x328/0x630
[   29.482037]  ret_from_fork+0x10/0x20
[   29.482082] 
[   29.482100] Allocated by task 203:
[   29.482835]  kasan_save_stack+0x3c/0x68
[   29.482908]  kasan_save_track+0x20/0x40
[   29.482978]  kasan_save_alloc_info+0x40/0x58
[   29.483015]  __kasan_kmalloc+0xd4/0xd8
[   29.483070]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.483110]  kmalloc_oob_memset_2+0xb0/0x2f8
[   29.483157]  kunit_try_run_case+0x170/0x3f0
[   29.483195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.483240]  kthread+0x328/0x630
[   29.483271]  ret_from_fork+0x10/0x20
[   29.483305] 
[   29.483324] The buggy address belongs to the object at fff00000c9af0000
[   29.483324]  which belongs to the cache kmalloc-128 of size 128
[   29.483381] The buggy address is located 119 bytes inside of
[   29.483381]  allocated 120-byte region [fff00000c9af0000, fff00000c9af0078)
[   29.483461] 
[   29.483568] The buggy address belongs to the physical page:
[   29.483623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.483711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.483842] page_type: f5(slab)
[   29.483880] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.483930] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.483983] page dumped because: kasan: bad access detected
[   29.484014] 
[   29.484031] Memory state around the buggy address:
[   29.484062]  fff00000c9aeff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.484105]  fff00000c9aeff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.484156] >fff00000c9af0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.484194]                                                                 ^
[   29.484288]  fff00000c9af0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.484337]  fff00000c9af0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.484375] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   29.470115] ==================================================================
[   29.470191] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   29.470243] Write of size 128 at addr fff00000c5a4df00 by task kunit_try_catch/201
[   29.470293] 
[   29.470403] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.470731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.470818] Hardware name: linux,dummy-virt (DT)
[   29.470854] Call trace:
[   29.470894]  show_stack+0x20/0x38 (C)
[   29.471002]  dump_stack_lvl+0x8c/0xd0
[   29.471047]  print_report+0x118/0x5d0
[   29.471088]  kasan_report+0xdc/0x128
[   29.471139]  kasan_check_range+0x100/0x1a8
[   29.471183]  __asan_memset+0x34/0x78
[   29.471235]  kmalloc_oob_in_memset+0x144/0x2d0
[   29.471292]  kunit_try_run_case+0x170/0x3f0
[   29.471340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.471409]  kthread+0x328/0x630
[   29.471449]  ret_from_fork+0x10/0x20
[   29.471497] 
[   29.471523] Allocated by task 201:
[   29.471550]  kasan_save_stack+0x3c/0x68
[   29.471684]  kasan_save_track+0x20/0x40
[   29.471724]  kasan_save_alloc_info+0x40/0x58
[   29.472152]  __kasan_kmalloc+0xd4/0xd8
[   29.472197]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.472236]  kmalloc_oob_in_memset+0xb0/0x2d0
[   29.472274]  kunit_try_run_case+0x170/0x3f0
[   29.472312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.472395]  kthread+0x328/0x630
[   29.472547]  ret_from_fork+0x10/0x20
[   29.472697] 
[   29.472718] The buggy address belongs to the object at fff00000c5a4df00
[   29.472718]  which belongs to the cache kmalloc-128 of size 128
[   29.472821] The buggy address is located 0 bytes inside of
[   29.472821]  allocated 120-byte region [fff00000c5a4df00, fff00000c5a4df78)
[   29.472991] 
[   29.473094] The buggy address belongs to the physical page:
[   29.473125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d
[   29.473187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.473235] page_type: f5(slab)
[   29.473273] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.473322] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.473373] page dumped because: kasan: bad access detected
[   29.473403] 
[   29.473422] Memory state around the buggy address:
[   29.473464]  fff00000c5a4de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.473507]  fff00000c5a4de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.473549] >fff00000c5a4df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.473587]                                                                 ^
[   29.473626]  fff00000c5a4df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.473678]  fff00000c5a4e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.473717] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   29.460815] ==================================================================
[   29.460873] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   29.460944] Read of size 16 at addr fff00000c8686ae0 by task kunit_try_catch/199
[   29.461173] 
[   29.461208] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.461295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.461320] Hardware name: linux,dummy-virt (DT)
[   29.461350] Call trace:
[   29.461371]  show_stack+0x20/0x38 (C)
[   29.461420]  dump_stack_lvl+0x8c/0xd0
[   29.461464]  print_report+0x118/0x5d0
[   29.461507]  kasan_report+0xdc/0x128
[   29.461551]  __asan_report_load16_noabort+0x20/0x30
[   29.461600]  kmalloc_uaf_16+0x3bc/0x438
[   29.461644]  kunit_try_run_case+0x170/0x3f0
[   29.461692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.461745]  kthread+0x328/0x630
[   29.461786]  ret_from_fork+0x10/0x20
[   29.461832] 
[   29.461849] Allocated by task 199:
[   29.461875]  kasan_save_stack+0x3c/0x68
[   29.461914]  kasan_save_track+0x20/0x40
[   29.461951]  kasan_save_alloc_info+0x40/0x58
[   29.461987]  __kasan_kmalloc+0xd4/0xd8
[   29.462023]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.462061]  kmalloc_uaf_16+0x140/0x438
[   29.462096]  kunit_try_run_case+0x170/0x3f0
[   29.462145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.462205]  kthread+0x328/0x630
[   29.462238]  ret_from_fork+0x10/0x20
[   29.462272] 
[   29.462290] Freed by task 199:
[   29.462314]  kasan_save_stack+0x3c/0x68
[   29.462351]  kasan_save_track+0x20/0x40
[   29.462394]  kasan_save_free_info+0x4c/0x78
[   29.462443]  __kasan_slab_free+0x6c/0x98
[   29.462537]  kfree+0x214/0x3c8
[   29.462575]  kmalloc_uaf_16+0x190/0x438
[   29.462617]  kunit_try_run_case+0x170/0x3f0
[   29.462724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.462767]  kthread+0x328/0x630
[   29.462798]  ret_from_fork+0x10/0x20
[   29.462832] 
[   29.462860] The buggy address belongs to the object at fff00000c8686ae0
[   29.462860]  which belongs to the cache kmalloc-16 of size 16
[   29.462928] The buggy address is located 0 bytes inside of
[   29.462928]  freed 16-byte region [fff00000c8686ae0, fff00000c8686af0)
[   29.462995] 
[   29.463015] The buggy address belongs to the physical page:
[   29.463116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686
[   29.463183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.463232] page_type: f5(slab)
[   29.463269] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.463360] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000
[   29.463419] page dumped because: kasan: bad access detected
[   29.463449] 
[   29.463466] Memory state around the buggy address:
[   29.463495]  fff00000c8686980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.463544]  fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.463586] >fff00000c8686a80: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   29.463624]                                                        ^
[   29.463671]  fff00000c8686b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.463727]  fff00000c8686b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.463781] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   29.449947] ==================================================================
[   29.450019] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   29.450110] Write of size 16 at addr fff00000c8686a80 by task kunit_try_catch/197
[   29.450280] 
[   29.450399] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.450675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.450740] Hardware name: linux,dummy-virt (DT)
[   29.450822] Call trace:
[   29.450843]  show_stack+0x20/0x38 (C)
[   29.450892]  dump_stack_lvl+0x8c/0xd0
[   29.451055]  print_report+0x118/0x5d0
[   29.451100]  kasan_report+0xdc/0x128
[   29.451162]  __asan_report_store16_noabort+0x20/0x30
[   29.451211]  kmalloc_oob_16+0x3a0/0x3f8
[   29.451364]  kunit_try_run_case+0x170/0x3f0
[   29.451508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.451562]  kthread+0x328/0x630
[   29.451648]  ret_from_fork+0x10/0x20
[   29.451704] 
[   29.451760] Allocated by task 197:
[   29.451788]  kasan_save_stack+0x3c/0x68
[   29.451855]  kasan_save_track+0x20/0x40
[   29.452034]  kasan_save_alloc_info+0x40/0x58
[   29.452164]  __kasan_kmalloc+0xd4/0xd8
[   29.452201]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.452240]  kmalloc_oob_16+0xb4/0x3f8
[   29.452275]  kunit_try_run_case+0x170/0x3f0
[   29.452322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.452366]  kthread+0x328/0x630
[   29.452483]  ret_from_fork+0x10/0x20
[   29.452519] 
[   29.452538] The buggy address belongs to the object at fff00000c8686a80
[   29.452538]  which belongs to the cache kmalloc-16 of size 16
[   29.452596] The buggy address is located 0 bytes inside of
[   29.452596]  allocated 13-byte region [fff00000c8686a80, fff00000c8686a8d)
[   29.452789] 
[   29.452812] The buggy address belongs to the physical page:
[   29.452843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686
[   29.452966] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.453015] page_type: f5(slab)
[   29.453054] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.453105] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000
[   29.453165] page dumped because: kasan: bad access detected
[   29.453280] 
[   29.453329] Memory state around the buggy address:
[   29.453359]  fff00000c8686980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.453520]  fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.453581] >fff00000c8686a80: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.453619]                       ^
[   29.453684]  fff00000c8686b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.453946]  fff00000c8686b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.453986] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   29.439652] ==================================================================
[   29.439702] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   29.439760] Read of size 1 at addr fff00000c83c9c00 by task kunit_try_catch/195
[   29.439857] 
[   29.439914] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.440039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.440079] Hardware name: linux,dummy-virt (DT)
[   29.440109] Call trace:
[   29.440151]  show_stack+0x20/0x38 (C)
[   29.440228]  dump_stack_lvl+0x8c/0xd0
[   29.440383]  print_report+0x118/0x5d0
[   29.440506]  kasan_report+0xdc/0x128
[   29.440548]  __asan_report_load1_noabort+0x20/0x30
[   29.440596]  krealloc_uaf+0x4c8/0x520
[   29.440642]  kunit_try_run_case+0x170/0x3f0
[   29.440689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.440742]  kthread+0x328/0x630
[   29.440791]  ret_from_fork+0x10/0x20
[   29.440838] 
[   29.440855] Allocated by task 195:
[   29.440882]  kasan_save_stack+0x3c/0x68
[   29.441077]  kasan_save_track+0x20/0x40
[   29.441116]  kasan_save_alloc_info+0x40/0x58
[   29.441162]  __kasan_kmalloc+0xd4/0xd8
[   29.441198]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.441236]  krealloc_uaf+0xc8/0x520
[   29.441271]  kunit_try_run_case+0x170/0x3f0
[   29.441318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.441362]  kthread+0x328/0x630
[   29.441412]  ret_from_fork+0x10/0x20
[   29.441446] 
[   29.441464] Freed by task 195:
[   29.441489]  kasan_save_stack+0x3c/0x68
[   29.441614]  kasan_save_track+0x20/0x40
[   29.441783]  kasan_save_free_info+0x4c/0x78
[   29.441964]  __kasan_slab_free+0x6c/0x98
[   29.442068]  kfree+0x214/0x3c8
[   29.442100]  krealloc_uaf+0x12c/0x520
[   29.442144]  kunit_try_run_case+0x170/0x3f0
[   29.442184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.442227]  kthread+0x328/0x630
[   29.442423]  ret_from_fork+0x10/0x20
[   29.442605] 
[   29.442624] The buggy address belongs to the object at fff00000c83c9c00
[   29.442624]  which belongs to the cache kmalloc-256 of size 256
[   29.442683] The buggy address is located 0 bytes inside of
[   29.442683]  freed 256-byte region [fff00000c83c9c00, fff00000c83c9d00)
[   29.442744] 
[   29.442762] The buggy address belongs to the physical page:
[   29.442793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8
[   29.442854] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.442901] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.442972] page_type: f5(slab)
[   29.443010] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.443068] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.443123] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.443184] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.443261] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff
[   29.443370] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.443478] page dumped because: kasan: bad access detected
[   29.443582] 
[   29.443599] Memory state around the buggy address:
[   29.443630]  fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.443672]  fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.443713] >fff00000c83c9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.443917]                    ^
[   29.443947]  fff00000c83c9c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.444085]  fff00000c83c9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.444135] ==================================================================
[   29.434557] ==================================================================
[   29.434619] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   29.434674] Read of size 1 at addr fff00000c83c9c00 by task kunit_try_catch/195
[   29.434756] 
[   29.434788] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.434899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.434925] Hardware name: linux,dummy-virt (DT)
[   29.434968] Call trace:
[   29.435021]  show_stack+0x20/0x38 (C)
[   29.435071]  dump_stack_lvl+0x8c/0xd0
[   29.435126]  print_report+0x118/0x5d0
[   29.435179]  kasan_report+0xdc/0x128
[   29.435220]  __kasan_check_byte+0x54/0x70
[   29.435266]  krealloc_noprof+0x44/0x360
[   29.435313]  krealloc_uaf+0x180/0x520
[   29.435357]  kunit_try_run_case+0x170/0x3f0
[   29.435424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.435476]  kthread+0x328/0x630
[   29.435603]  ret_from_fork+0x10/0x20
[   29.435682] 
[   29.435707] Allocated by task 195:
[   29.435734]  kasan_save_stack+0x3c/0x68
[   29.435776]  kasan_save_track+0x20/0x40
[   29.435823]  kasan_save_alloc_info+0x40/0x58
[   29.435860]  __kasan_kmalloc+0xd4/0xd8
[   29.435926]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.435968]  krealloc_uaf+0xc8/0x520
[   29.436014]  kunit_try_run_case+0x170/0x3f0
[   29.436158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.436228]  kthread+0x328/0x630
[   29.436259]  ret_from_fork+0x10/0x20
[   29.436294] 
[   29.436328] Freed by task 195:
[   29.436401]  kasan_save_stack+0x3c/0x68
[   29.436453]  kasan_save_track+0x20/0x40
[   29.436584]  kasan_save_free_info+0x4c/0x78
[   29.436730]  __kasan_slab_free+0x6c/0x98
[   29.436845]  kfree+0x214/0x3c8
[   29.436879]  krealloc_uaf+0x12c/0x520
[   29.436977]  kunit_try_run_case+0x170/0x3f0
[   29.437016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.437061]  kthread+0x328/0x630
[   29.437099]  ret_from_fork+0x10/0x20
[   29.437211] 
[   29.437278] The buggy address belongs to the object at fff00000c83c9c00
[   29.437278]  which belongs to the cache kmalloc-256 of size 256
[   29.437601] The buggy address is located 0 bytes inside of
[   29.437601]  freed 256-byte region [fff00000c83c9c00, fff00000c83c9d00)
[   29.437813] 
[   29.437840] The buggy address belongs to the physical page:
[   29.437960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8
[   29.438013] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.438104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.438184] page_type: f5(slab)
[   29.438222] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.438308] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.438395] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.438444] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.438504] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff
[   29.438552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.438592] page dumped because: kasan: bad access detected
[   29.438623] 
[   29.438642] Memory state around the buggy address:
[   29.438672]  fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.438742]  fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.438784] >fff00000c83c9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.438822]                    ^
[   29.438849]  fff00000c83c9c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.438890]  fff00000c83c9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.438928] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   29.373149] ==================================================================
[   29.373206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.373262] Write of size 1 at addr fff00000c83c9ac9 by task kunit_try_catch/189
[   29.373352] 
[   29.373395] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.373485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.373608] Hardware name: linux,dummy-virt (DT)
[   29.373751] Call trace:
[   29.373833]  show_stack+0x20/0x38 (C)
[   29.373880]  dump_stack_lvl+0x8c/0xd0
[   29.373929]  print_report+0x118/0x5d0
[   29.374145]  kasan_report+0xdc/0x128
[   29.374191]  __asan_report_store1_noabort+0x20/0x30
[   29.374245]  krealloc_less_oob_helper+0xa48/0xc50
[   29.374471]  krealloc_less_oob+0x20/0x38
[   29.374638]  kunit_try_run_case+0x170/0x3f0
[   29.374685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.374747]  kthread+0x328/0x630
[   29.374788]  ret_from_fork+0x10/0x20
[   29.374834] 
[   29.374852] Allocated by task 189:
[   29.374878]  kasan_save_stack+0x3c/0x68
[   29.374928]  kasan_save_track+0x20/0x40
[   29.374966]  kasan_save_alloc_info+0x40/0x58
[   29.375014]  __kasan_krealloc+0x118/0x178
[   29.375053]  krealloc_noprof+0x128/0x360
[   29.375089]  krealloc_less_oob_helper+0x168/0xc50
[   29.375139]  krealloc_less_oob+0x20/0x38
[   29.375175]  kunit_try_run_case+0x170/0x3f0
[   29.375281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.375424]  kthread+0x328/0x630
[   29.375455]  ret_from_fork+0x10/0x20
[   29.375490] 
[   29.375514] The buggy address belongs to the object at fff00000c83c9a00
[   29.375514]  which belongs to the cache kmalloc-256 of size 256
[   29.375572] The buggy address is located 0 bytes to the right of
[   29.375572]  allocated 201-byte region [fff00000c83c9a00, fff00000c83c9ac9)
[   29.375637] 
[   29.375656] The buggy address belongs to the physical page:
[   29.375687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8
[   29.375750] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.375807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.375857] page_type: f5(slab)
[   29.375894] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.375955] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.376078] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.376195] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.376365] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff
[   29.376487] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.376607] page dumped because: kasan: bad access detected
[   29.376677] 
[   29.376788] Memory state around the buggy address:
[   29.376818]  fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.376874]  fff00000c83c9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.376915] >fff00000c83c9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.376952]                                               ^
[   29.376987]  fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.377041]  fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.377079] ==================================================================
[   29.379314] ==================================================================
[   29.379419] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.379584] Write of size 1 at addr fff00000c83c9ad0 by task kunit_try_catch/189
[   29.379698] 
[   29.379767] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.379851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.379877] Hardware name: linux,dummy-virt (DT)
[   29.379917] Call trace:
[   29.379938]  show_stack+0x20/0x38 (C)
[   29.379997]  dump_stack_lvl+0x8c/0xd0
[   29.380041]  print_report+0x118/0x5d0
[   29.380083]  kasan_report+0xdc/0x128
[   29.380126]  __asan_report_store1_noabort+0x20/0x30
[   29.380182]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.380275]  krealloc_less_oob+0x20/0x38
[   29.380484]  kunit_try_run_case+0x170/0x3f0
[   29.380725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.380871]  kthread+0x328/0x630
[   29.380999]  ret_from_fork+0x10/0x20
[   29.381148] 
[   29.381167] Allocated by task 189:
[   29.381193]  kasan_save_stack+0x3c/0x68
[   29.381233]  kasan_save_track+0x20/0x40
[   29.381282]  kasan_save_alloc_info+0x40/0x58
[   29.381318]  __kasan_krealloc+0x118/0x178
[   29.381381]  krealloc_noprof+0x128/0x360
[   29.381420]  krealloc_less_oob_helper+0x168/0xc50
[   29.381517]  krealloc_less_oob+0x20/0x38
[   29.381608]  kunit_try_run_case+0x170/0x3f0
[   29.381681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.381800]  kthread+0x328/0x630
[   29.381856]  ret_from_fork+0x10/0x20
[   29.381924] 
[   29.381942] The buggy address belongs to the object at fff00000c83c9a00
[   29.381942]  which belongs to the cache kmalloc-256 of size 256
[   29.382011] The buggy address is located 7 bytes to the right of
[   29.382011]  allocated 201-byte region [fff00000c83c9a00, fff00000c83c9ac9)
[   29.382077] 
[   29.382096] The buggy address belongs to the physical page:
[   29.382141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8
[   29.382203] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.382306] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.382464] page_type: f5(slab)
[   29.382513] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.382575] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.382624] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.382672] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.382730] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff
[   29.382779] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.382818] page dumped because: kasan: bad access detected
[   29.382858] 
[   29.382875] Memory state around the buggy address:
[   29.382911]  fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.383082]  fff00000c83c9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.383199] >fff00000c83c9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.383238]                                                  ^
[   29.383274]  fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.383316]  fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.383428] ==================================================================
[   29.426795] ==================================================================
[   29.426837] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.426892] Write of size 1 at addr fff00000c9a560eb by task kunit_try_catch/193
[   29.426942] 
[   29.426969] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.427050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.427075] Hardware name: linux,dummy-virt (DT)
[   29.427105] Call trace:
[   29.427125]  show_stack+0x20/0x38 (C)
[   29.427182]  dump_stack_lvl+0x8c/0xd0
[   29.427303]  print_report+0x118/0x5d0
[   29.427400]  kasan_report+0xdc/0x128
[   29.427554]  __asan_report_store1_noabort+0x20/0x30
[   29.427711]  krealloc_less_oob_helper+0xa58/0xc50
[   29.427761]  krealloc_large_less_oob+0x20/0x38
[   29.427809]  kunit_try_run_case+0x170/0x3f0
[   29.427855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.427909]  kthread+0x328/0x630
[   29.427948]  ret_from_fork+0x10/0x20
[   29.427994] 
[   29.428012] The buggy address belongs to the physical page:
[   29.428051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54
[   29.428135] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.428224] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.428272] page_type: f8(unknown)
[   29.428331] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.428391] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.428512] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.428567] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.428701] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff
[   29.428820] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.428859] page dumped because: kasan: bad access detected
[   29.428889] 
[   29.428906] Memory state around the buggy address:
[   29.428967]  fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.429020]  fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.429062] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.429100]                                                           ^
[   29.429208]  fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.429319]  fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.429357] ==================================================================
[   29.384366] ==================================================================
[   29.384413] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.384459] Write of size 1 at addr fff00000c83c9ada by task kunit_try_catch/189
[   29.384508] 
[   29.384537] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.384620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.384656] Hardware name: linux,dummy-virt (DT)
[   29.384798] Call trace:
[   29.384892]  show_stack+0x20/0x38 (C)
[   29.385105]  dump_stack_lvl+0x8c/0xd0
[   29.385227]  print_report+0x118/0x5d0
[   29.385349]  kasan_report+0xdc/0x128
[   29.385542]  __asan_report_store1_noabort+0x20/0x30
[   29.385591]  krealloc_less_oob_helper+0xa80/0xc50
[   29.385639]  krealloc_less_oob+0x20/0x38
[   29.385684]  kunit_try_run_case+0x170/0x3f0
[   29.385731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.385784]  kthread+0x328/0x630
[   29.385831]  ret_from_fork+0x10/0x20
[   29.386038] 
[   29.386112] Allocated by task 189:
[   29.386148]  kasan_save_stack+0x3c/0x68
[   29.386188]  kasan_save_track+0x20/0x40
[   29.386225]  kasan_save_alloc_info+0x40/0x58
[   29.386261]  __kasan_krealloc+0x118/0x178
[   29.386298]  krealloc_noprof+0x128/0x360
[   29.386335]  krealloc_less_oob_helper+0x168/0xc50
[   29.386374]  krealloc_less_oob+0x20/0x38
[   29.386410]  kunit_try_run_case+0x170/0x3f0
[   29.386447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.386490]  kthread+0x328/0x630
[   29.386521]  ret_from_fork+0x10/0x20
[   29.386555] 
[   29.386572] The buggy address belongs to the object at fff00000c83c9a00
[   29.386572]  which belongs to the cache kmalloc-256 of size 256
[   29.386629] The buggy address is located 17 bytes to the right of
[   29.386629]  allocated 201-byte region [fff00000c83c9a00, fff00000c83c9ac9)
[   29.386694] 
[   29.386712] The buggy address belongs to the physical page:
[   29.386742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8
[   29.386792] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.386852] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.386902] page_type: f5(slab)
[   29.386950] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.386999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.387049] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.387105] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.387168] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff
[   29.387216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.387256] page dumped because: kasan: bad access detected
[   29.387286] 
[   29.387312] Memory state around the buggy address:
[   29.387342]  fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.387384]  fff00000c83c9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.387441] >fff00000c83c9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.387479]                                                     ^
[   29.387520]  fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.387562]  fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.387601] ==================================================================
[   29.392534] ==================================================================
[   29.392948] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.392998] Write of size 1 at addr fff00000c83c9aeb by task kunit_try_catch/189
[   29.393046] 
[   29.393075] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.393168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.393203] Hardware name: linux,dummy-virt (DT)
[   29.393234] Call trace:
[   29.393254]  show_stack+0x20/0x38 (C)
[   29.393304]  dump_stack_lvl+0x8c/0xd0
[   29.393349]  print_report+0x118/0x5d0
[   29.393393]  kasan_report+0xdc/0x128
[   29.393457]  __asan_report_store1_noabort+0x20/0x30
[   29.393617]  krealloc_less_oob_helper+0xa58/0xc50
[   29.393741]  krealloc_less_oob+0x20/0x38
[   29.393829]  kunit_try_run_case+0x170/0x3f0
[   29.393877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.393939]  kthread+0x328/0x630
[   29.393979]  ret_from_fork+0x10/0x20
[   29.394036] 
[   29.394053] Allocated by task 189:
[   29.394080]  kasan_save_stack+0x3c/0x68
[   29.394159]  kasan_save_track+0x20/0x40
[   29.394309]  kasan_save_alloc_info+0x40/0x58
[   29.394404]  __kasan_krealloc+0x118/0x178
[   29.394497]  krealloc_noprof+0x128/0x360
[   29.394545]  krealloc_less_oob_helper+0x168/0xc50
[   29.394631]  krealloc_less_oob+0x20/0x38
[   29.394899]  kunit_try_run_case+0x170/0x3f0
[   29.394960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.395044]  kthread+0x328/0x630
[   29.395182]  ret_from_fork+0x10/0x20
[   29.395252] 
[   29.395270] The buggy address belongs to the object at fff00000c83c9a00
[   29.395270]  which belongs to the cache kmalloc-256 of size 256
[   29.395329] The buggy address is located 34 bytes to the right of
[   29.395329]  allocated 201-byte region [fff00000c83c9a00, fff00000c83c9ac9)
[   29.395396] 
[   29.395415] The buggy address belongs to the physical page:
[   29.395446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8
[   29.395497] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.395549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.395626] page_type: f5(slab)
[   29.395661] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.395741] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.395791] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.395872] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.395984] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff
[   29.396081] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.396122] page dumped because: kasan: bad access detected
[   29.396163] 
[   29.396214] Memory state around the buggy address:
[   29.396243]  fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.396287]  fff00000c83c9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.396330] >fff00000c83c9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.396378]                                                           ^
[   29.396427]  fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.396537]  fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.396727] ==================================================================
[   29.417014] ==================================================================
[   29.417058] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.417103] Write of size 1 at addr fff00000c9a560d0 by task kunit_try_catch/193
[   29.417165] 
[   29.417201] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.417426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.417561] Hardware name: linux,dummy-virt (DT)
[   29.417592] Call trace:
[   29.417619]  show_stack+0x20/0x38 (C)
[   29.417819]  dump_stack_lvl+0x8c/0xd0
[   29.417863]  print_report+0x118/0x5d0
[   29.417905]  kasan_report+0xdc/0x128
[   29.417946]  __asan_report_store1_noabort+0x20/0x30
[   29.418000]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.418158]  krealloc_large_less_oob+0x20/0x38
[   29.418205]  kunit_try_run_case+0x170/0x3f0
[   29.418252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.418304]  kthread+0x328/0x630
[   29.418344]  ret_from_fork+0x10/0x20
[   29.418399] 
[   29.418418] The buggy address belongs to the physical page:
[   29.418448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54
[   29.418512] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.418557] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.418606] page_type: f8(unknown)
[   29.418661] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.418739] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.418839] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.418959] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.419017] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff
[   29.419107] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.419156] page dumped because: kasan: bad access detected
[   29.419187] 
[   29.419204] Memory state around the buggy address:
[   29.419235]  fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.419278]  fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.419322] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.419369]                                                  ^
[   29.419404]  fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.419460]  fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.419575] ==================================================================
[   29.414042] ==================================================================
[   29.414096] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.414161] Write of size 1 at addr fff00000c9a560c9 by task kunit_try_catch/193
[   29.414210] 
[   29.414239] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.414322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.414348] Hardware name: linux,dummy-virt (DT)
[   29.414398] Call trace:
[   29.414419]  show_stack+0x20/0x38 (C)
[   29.414487]  dump_stack_lvl+0x8c/0xd0
[   29.414531]  print_report+0x118/0x5d0
[   29.414584]  kasan_report+0xdc/0x128
[   29.414625]  __asan_report_store1_noabort+0x20/0x30
[   29.414673]  krealloc_less_oob_helper+0xa48/0xc50
[   29.414722]  krealloc_large_less_oob+0x20/0x38
[   29.414793]  kunit_try_run_case+0x170/0x3f0
[   29.414957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.415029]  kthread+0x328/0x630
[   29.415071]  ret_from_fork+0x10/0x20
[   29.415145] 
[   29.415165] The buggy address belongs to the physical page:
[   29.415221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54
[   29.415274] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.415320] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.415370] page_type: f8(unknown)
[   29.415414] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.415465] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.415522] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.415581] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.415641] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff
[   29.415690] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.415730] page dumped because: kasan: bad access detected
[   29.415760] 
[   29.415779] Memory state around the buggy address:
[   29.415809]  fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.415909]  fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.415953] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.415991]                                               ^
[   29.416064]  fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.416264]  fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.416302] ==================================================================
[   29.423965] ==================================================================
[   29.424001] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.424042] Write of size 1 at addr fff00000c9a560ea by task kunit_try_catch/193
[   29.424090] 
[   29.424118] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.424234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.424292] Hardware name: linux,dummy-virt (DT)
[   29.424363] Call trace:
[   29.424389]  show_stack+0x20/0x38 (C)
[   29.424520]  dump_stack_lvl+0x8c/0xd0
[   29.424610]  print_report+0x118/0x5d0
[   29.424652]  kasan_report+0xdc/0x128
[   29.424699]  __asan_report_store1_noabort+0x20/0x30
[   29.424810]  krealloc_less_oob_helper+0xae4/0xc50
[   29.424961]  krealloc_large_less_oob+0x20/0x38
[   29.425087]  kunit_try_run_case+0x170/0x3f0
[   29.425146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.425200]  kthread+0x328/0x630
[   29.425246]  ret_from_fork+0x10/0x20
[   29.425398] 
[   29.425417] The buggy address belongs to the physical page:
[   29.425519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54
[   29.425778] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.425824] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.425873] page_type: f8(unknown)
[   29.425909] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.425958] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.426007] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.426062] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.426165] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff
[   29.426213] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.426253] page dumped because: kasan: bad access detected
[   29.426283] 
[   29.426300] Memory state around the buggy address:
[   29.426329]  fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.426371]  fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.426472] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.426522]                                                           ^
[   29.426560]  fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.426602]  fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.426640] ==================================================================
[   29.420163] ==================================================================
[   29.420207] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.420493] Write of size 1 at addr fff00000c9a560da by task kunit_try_catch/193
[   29.420555] 
[   29.420631] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.420713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.420773] Hardware name: linux,dummy-virt (DT)
[   29.420803] Call trace:
[   29.420829]  show_stack+0x20/0x38 (C)
[   29.420968]  dump_stack_lvl+0x8c/0xd0
[   29.421011]  print_report+0x118/0x5d0
[   29.421053]  kasan_report+0xdc/0x128
[   29.421095]  __asan_report_store1_noabort+0x20/0x30
[   29.421152]  krealloc_less_oob_helper+0xa80/0xc50
[   29.421201]  krealloc_large_less_oob+0x20/0x38
[   29.421248]  kunit_try_run_case+0x170/0x3f0
[   29.421303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.421544]  kthread+0x328/0x630
[   29.421591]  ret_from_fork+0x10/0x20
[   29.421763] 
[   29.421781] The buggy address belongs to the physical page:
[   29.421811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54
[   29.421863] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.421914] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.422159] page_type: f8(unknown)
[   29.422338] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.422432] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.422608] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.422681] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.423489] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff
[   29.423557] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.423597] page dumped because: kasan: bad access detected
[   29.423628] 
[   29.423646] Memory state around the buggy address:
[   29.423676]  fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.423718]  fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.423760] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.423798]                                                     ^
[   29.423834]  fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.423876]  fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.423913] ==================================================================
[   29.388463] ==================================================================
[   29.388516] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.388726] Write of size 1 at addr fff00000c83c9aea by task kunit_try_catch/189
[   29.388974] 
[   29.389103] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.389231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.389257] Hardware name: linux,dummy-virt (DT)
[   29.389286] Call trace:
[   29.389306]  show_stack+0x20/0x38 (C)
[   29.389352]  dump_stack_lvl+0x8c/0xd0
[   29.389395]  print_report+0x118/0x5d0
[   29.389437]  kasan_report+0xdc/0x128
[   29.389479]  __asan_report_store1_noabort+0x20/0x30
[   29.389527]  krealloc_less_oob_helper+0xae4/0xc50
[   29.389583]  krealloc_less_oob+0x20/0x38
[   29.389791]  kunit_try_run_case+0x170/0x3f0
[   29.390010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.390070]  kthread+0x328/0x630
[   29.390143]  ret_from_fork+0x10/0x20
[   29.390188] 
[   29.390205] Allocated by task 189:
[   29.390232]  kasan_save_stack+0x3c/0x68
[   29.390271]  kasan_save_track+0x20/0x40
[   29.390308]  kasan_save_alloc_info+0x40/0x58
[   29.390344]  __kasan_krealloc+0x118/0x178
[   29.390381]  krealloc_noprof+0x128/0x360
[   29.390418]  krealloc_less_oob_helper+0x168/0xc50
[   29.390457]  krealloc_less_oob+0x20/0x38
[   29.390492]  kunit_try_run_case+0x170/0x3f0
[   29.390529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.390572]  kthread+0x328/0x630
[   29.390603]  ret_from_fork+0x10/0x20
[   29.390637] 
[   29.390654] The buggy address belongs to the object at fff00000c83c9a00
[   29.390654]  which belongs to the cache kmalloc-256 of size 256
[   29.390710] The buggy address is located 33 bytes to the right of
[   29.390710]  allocated 201-byte region [fff00000c83c9a00, fff00000c83c9ac9)
[   29.390787] 
[   29.390806] The buggy address belongs to the physical page:
[   29.390877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8
[   29.391083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.391138] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.391200] page_type: f5(slab)
[   29.391255] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.391308] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.391375] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.391423] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.391472] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff
[   29.391537] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.391577] page dumped because: kasan: bad access detected
[   29.391618] 
[   29.391636] Memory state around the buggy address:
[   29.391666]  fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.391715]  fff00000c83c9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.391769] >fff00000c83c9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.391885]                                                           ^
[   29.391924]  fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.391985]  fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.392024] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   29.363701] ==================================================================
[   29.363750] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.363797] Write of size 1 at addr fff00000c83c98f0 by task kunit_try_catch/187
[   29.363846] 
[   29.363875] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.363957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.363983] Hardware name: linux,dummy-virt (DT)
[   29.364012] Call trace:
[   29.364032]  show_stack+0x20/0x38 (C)
[   29.364077]  dump_stack_lvl+0x8c/0xd0
[   29.364121]  print_report+0x118/0x5d0
[   29.364176]  kasan_report+0xdc/0x128
[   29.364259]  __asan_report_store1_noabort+0x20/0x30
[   29.364369]  krealloc_more_oob_helper+0x5c0/0x678
[   29.364419]  krealloc_more_oob+0x20/0x38
[   29.364464]  kunit_try_run_case+0x170/0x3f0
[   29.364511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.364572]  kthread+0x328/0x630
[   29.364624]  ret_from_fork+0x10/0x20
[   29.364671] 
[   29.364688] Allocated by task 187:
[   29.364725]  kasan_save_stack+0x3c/0x68
[   29.364771]  kasan_save_track+0x20/0x40
[   29.364808]  kasan_save_alloc_info+0x40/0x58
[   29.364866]  __kasan_krealloc+0x118/0x178
[   29.364904]  krealloc_noprof+0x128/0x360
[   29.364947]  krealloc_more_oob_helper+0x168/0x678
[   29.365031]  krealloc_more_oob+0x20/0x38
[   29.365172]  kunit_try_run_case+0x170/0x3f0
[   29.365227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.365299]  kthread+0x328/0x630
[   29.365375]  ret_from_fork+0x10/0x20
[   29.365409] 
[   29.365427] The buggy address belongs to the object at fff00000c83c9800
[   29.365427]  which belongs to the cache kmalloc-256 of size 256
[   29.365483] The buggy address is located 5 bytes to the right of
[   29.365483]  allocated 235-byte region [fff00000c83c9800, fff00000c83c98eb)
[   29.365557] 
[   29.365587] The buggy address belongs to the physical page:
[   29.365617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8
[   29.365686] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.365874] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.365931] page_type: f5(slab)
[   29.366028] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.366110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.366268] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.366377] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.366427] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff
[   29.366476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.366515] page dumped because: kasan: bad access detected
[   29.366552] 
[   29.366626] Memory state around the buggy address:
[   29.366673]  fff00000c83c9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.366728]  fff00000c83c9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.366770] >fff00000c83c9880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.366808]                                                              ^
[   29.366846]  fff00000c83c9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.366888]  fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.366926] ==================================================================
[   29.405437] ==================================================================
[   29.405506] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.405556] Write of size 1 at addr fff00000c9a560f0 by task kunit_try_catch/191
[   29.405627] 
[   29.405655] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.405913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.405967] Hardware name: linux,dummy-virt (DT)
[   29.405997] Call trace:
[   29.406031]  show_stack+0x20/0x38 (C)
[   29.406084]  dump_stack_lvl+0x8c/0xd0
[   29.406185]  print_report+0x118/0x5d0
[   29.406319]  kasan_report+0xdc/0x128
[   29.406368]  __asan_report_store1_noabort+0x20/0x30
[   29.406417]  krealloc_more_oob_helper+0x5c0/0x678
[   29.406465]  krealloc_large_more_oob+0x20/0x38
[   29.406512]  kunit_try_run_case+0x170/0x3f0
[   29.406558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.406611]  kthread+0x328/0x630
[   29.406651]  ret_from_fork+0x10/0x20
[   29.406698] 
[   29.406726] The buggy address belongs to the physical page:
[   29.406757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54
[   29.406808] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.406854] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.406903] page_type: f8(unknown)
[   29.406949] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.406999] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.407059] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.407108] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.407168] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff
[   29.407263] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.407349] page dumped because: kasan: bad access detected
[   29.407385] 
[   29.407430] Memory state around the buggy address:
[   29.407523]  fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.407566]  fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.407608] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.407655]                                                              ^
[   29.407693]  fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.407735]  fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.407782] ==================================================================
[   29.401654] ==================================================================
[   29.401709] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.401765] Write of size 1 at addr fff00000c9a560eb by task kunit_try_catch/191
[   29.401816] 
[   29.401847] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.401933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.401959] Hardware name: linux,dummy-virt (DT)
[   29.401989] Call trace:
[   29.402019]  show_stack+0x20/0x38 (C)
[   29.402612]  dump_stack_lvl+0x8c/0xd0
[   29.402721]  print_report+0x118/0x5d0
[   29.402792]  kasan_report+0xdc/0x128
[   29.402833]  __asan_report_store1_noabort+0x20/0x30
[   29.402881]  krealloc_more_oob_helper+0x60c/0x678
[   29.402930]  krealloc_large_more_oob+0x20/0x38
[   29.402977]  kunit_try_run_case+0x170/0x3f0
[   29.403025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.403078]  kthread+0x328/0x630
[   29.403121]  ret_from_fork+0x10/0x20
[   29.403176] 
[   29.403195] The buggy address belongs to the physical page:
[   29.403226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54
[   29.403281] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.403345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.403551] page_type: f8(unknown)
[   29.403598] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.403784] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.403848] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.403980] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.404058] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff
[   29.404173] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.404214] page dumped because: kasan: bad access detected
[   29.404332] 
[   29.404349] Memory state around the buggy address:
[   29.404380]  fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.404461]  fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.404647] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.404691]                                                           ^
[   29.404842]  fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.404923]  fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.404962] ==================================================================
[   29.358363] ==================================================================
[   29.358417] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.358469] Write of size 1 at addr fff00000c83c98eb by task kunit_try_catch/187
[   29.358519] 
[   29.358547] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.358630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.358657] Hardware name: linux,dummy-virt (DT)
[   29.358711] Call trace:
[   29.358733]  show_stack+0x20/0x38 (C)
[   29.358795]  dump_stack_lvl+0x8c/0xd0
[   29.358863]  print_report+0x118/0x5d0
[   29.358906]  kasan_report+0xdc/0x128
[   29.359008]  __asan_report_store1_noabort+0x20/0x30
[   29.359056]  krealloc_more_oob_helper+0x60c/0x678
[   29.359105]  krealloc_more_oob+0x20/0x38
[   29.359160]  kunit_try_run_case+0x170/0x3f0
[   29.359216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.359269]  kthread+0x328/0x630
[   29.359310]  ret_from_fork+0x10/0x20
[   29.359366] 
[   29.359384] Allocated by task 187:
[   29.359423]  kasan_save_stack+0x3c/0x68
[   29.359465]  kasan_save_track+0x20/0x40
[   29.359511]  kasan_save_alloc_info+0x40/0x58
[   29.359549]  __kasan_krealloc+0x118/0x178
[   29.359588]  krealloc_noprof+0x128/0x360
[   29.359638]  krealloc_more_oob_helper+0x168/0x678
[   29.359759]  krealloc_more_oob+0x20/0x38
[   29.359797]  kunit_try_run_case+0x170/0x3f0
[   29.359835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.359887]  kthread+0x328/0x630
[   29.359965]  ret_from_fork+0x10/0x20
[   29.360000] 
[   29.360018] The buggy address belongs to the object at fff00000c83c9800
[   29.360018]  which belongs to the cache kmalloc-256 of size 256
[   29.360339] The buggy address is located 0 bytes to the right of
[   29.360339]  allocated 235-byte region [fff00000c83c9800, fff00000c83c98eb)
[   29.360409] 
[   29.360429] The buggy address belongs to the physical page:
[   29.360463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8
[   29.360568] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.360779] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.360860] page_type: f5(slab)
[   29.361039] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.361568] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.361629] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.361701] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.361750] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff
[   29.361799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.361849] page dumped because: kasan: bad access detected
[   29.361890] 
[   29.361962] Memory state around the buggy address:
[   29.362018]  fff00000c83c9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.362063]  fff00000c83c9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.362158] >fff00000c83c9880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.362215]                                                           ^
[   29.362284]  fff00000c83c9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.362474]  fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.362618] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   29.350058] ==================================================================
[   29.350117] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   29.350184] Read of size 1 at addr fff00000c9ac0000 by task kunit_try_catch/185
[   29.350240] 
[   29.350269] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.350605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.350634] Hardware name: linux,dummy-virt (DT)
[   29.350673] Call trace:
[   29.350710]  show_stack+0x20/0x38 (C)
[   29.350763]  dump_stack_lvl+0x8c/0xd0
[   29.350817]  print_report+0x118/0x5d0
[   29.351050]  kasan_report+0xdc/0x128
[   29.351097]  __asan_report_load1_noabort+0x20/0x30
[   29.351159]  page_alloc_uaf+0x328/0x350
[   29.351206]  kunit_try_run_case+0x170/0x3f0
[   29.351255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.351320]  kthread+0x328/0x630
[   29.351536]  ret_from_fork+0x10/0x20
[   29.351639] 
[   29.351672] The buggy address belongs to the physical page:
[   29.351828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ac0
[   29.352028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.352683] page_type: f0(buddy)
[   29.352774] raw: 0bfffe0000000000 fff00000ff6161b0 fff00000ff6161b0 0000000000000000
[   29.352825] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   29.352894] page dumped because: kasan: bad access detected
[   29.352935] 
[   29.352959] Memory state around the buggy address:
[   29.353048]  fff00000c9abff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.353091]  fff00000c9abff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.353141] >fff00000c9ac0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.353180]                    ^
[   29.353227]  fff00000c9ac0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.353271]  fff00000c9ac0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.353312] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   29.335662] ==================================================================
[   29.335750] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   29.335812] Free of addr fff00000c9a50001 by task kunit_try_catch/181
[   29.335960] 
[   29.336073] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.336218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.336247] Hardware name: linux,dummy-virt (DT)
[   29.336302] Call trace:
[   29.336361]  show_stack+0x20/0x38 (C)
[   29.336469]  dump_stack_lvl+0x8c/0xd0
[   29.336515]  print_report+0x118/0x5d0
[   29.336587]  kasan_report_invalid_free+0xc0/0xe8
[   29.336922]  __kasan_kfree_large+0x5c/0xa8
[   29.337067]  free_large_kmalloc+0x68/0x150
[   29.337193]  kfree+0x270/0x3c8
[   29.337270]  kmalloc_large_invalid_free+0x108/0x270
[   29.337322]  kunit_try_run_case+0x170/0x3f0
[   29.337371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.337428]  kthread+0x328/0x630
[   29.337471]  ret_from_fork+0x10/0x20
[   29.337529] 
[   29.337560] The buggy address belongs to the physical page:
[   29.337595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a50
[   29.337703] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.337755] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.337810] page_type: f8(unknown)
[   29.337848] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.337904] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.338121] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.338289] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.338457] head: 0bfffe0000000002 ffffc1ffc3269401 00000000ffffffff 00000000ffffffff
[   29.338551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.338637] page dumped because: kasan: bad access detected
[   29.338699] 
[   29.338716] Memory state around the buggy address:
[   29.338749]  fff00000c9a4ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.338814]  fff00000c9a4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.338863] >fff00000c9a50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.338906]                    ^
[   29.338965]  fff00000c9a50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.339013]  fff00000c9a50100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.339074] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   29.328615] ==================================================================
[   29.328792] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   29.328850] Read of size 1 at addr fff00000c9a50000 by task kunit_try_catch/179
[   29.328899] 
[   29.329153] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.329295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.329323] Hardware name: linux,dummy-virt (DT)
[   29.329371] Call trace:
[   29.329410]  show_stack+0x20/0x38 (C)
[   29.329475]  dump_stack_lvl+0x8c/0xd0
[   29.329520]  print_report+0x118/0x5d0
[   29.329581]  kasan_report+0xdc/0x128
[   29.329639]  __asan_report_load1_noabort+0x20/0x30
[   29.329692]  kmalloc_large_uaf+0x2cc/0x2f8
[   29.329748]  kunit_try_run_case+0x170/0x3f0
[   29.329813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.329866]  kthread+0x328/0x630
[   29.329923]  ret_from_fork+0x10/0x20
[   29.329969] 
[   29.330008] The buggy address belongs to the physical page:
[   29.330054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a50
[   29.330117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.330280] raw: 0bfffe0000000000 ffffc1ffc3269508 fff00000da458d00 0000000000000000
[   29.330385] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   29.330426] page dumped because: kasan: bad access detected
[   29.330464] 
[   29.330482] Memory state around the buggy address:
[   29.330531]  fff00000c9a4ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.330635]  fff00000c9a4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.330692] >fff00000c9a50000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.330790]                    ^
[   29.330892]  fff00000c9a50080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.330960]  fff00000c9a50100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.331035] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   29.320524] ==================================================================
[   29.320591] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   29.320708] Write of size 1 at addr fff00000c9a5200a by task kunit_try_catch/177
[   29.320871] 
[   29.320924] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.321021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.321057] Hardware name: linux,dummy-virt (DT)
[   29.321097] Call trace:
[   29.321120]  show_stack+0x20/0x38 (C)
[   29.321179]  dump_stack_lvl+0x8c/0xd0
[   29.321222]  print_report+0x118/0x5d0
[   29.321275]  kasan_report+0xdc/0x128
[   29.321320]  __asan_report_store1_noabort+0x20/0x30
[   29.321367]  kmalloc_large_oob_right+0x278/0x2b8
[   29.321414]  kunit_try_run_case+0x170/0x3f0
[   29.321461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.321513]  kthread+0x328/0x630
[   29.321554]  ret_from_fork+0x10/0x20
[   29.321606] 
[   29.321640] The buggy address belongs to the physical page:
[   29.321681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a50
[   29.321733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.321779] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.321834] page_type: f8(unknown)
[   29.321872] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.321921] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.321971] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.322019] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.322067] head: 0bfffe0000000002 ffffc1ffc3269401 00000000ffffffff 00000000ffffffff
[   29.322121] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.322710] page dumped because: kasan: bad access detected
[   29.322755] 
[   29.322818] Memory state around the buggy address:
[   29.322913]  fff00000c9a51f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.323002]  fff00000c9a51f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.323064] >fff00000c9a52000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.323160]                       ^
[   29.323208]  fff00000c9a52080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.323257]  fff00000c9a52100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.323296] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   29.312197] ==================================================================
[   29.312256] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   29.312306] Write of size 1 at addr fff00000c64a5f00 by task kunit_try_catch/175
[   29.312356] 
[   29.312385] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.312470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.312495] Hardware name: linux,dummy-virt (DT)
[   29.312525] Call trace:
[   29.312584]  show_stack+0x20/0x38 (C)
[   29.312649]  dump_stack_lvl+0x8c/0xd0
[   29.312928]  print_report+0x118/0x5d0
[   29.312972]  kasan_report+0xdc/0x128
[   29.313032]  __asan_report_store1_noabort+0x20/0x30
[   29.313088]  kmalloc_big_oob_right+0x2a4/0x2f0
[   29.313167]  kunit_try_run_case+0x170/0x3f0
[   29.313234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.313287]  kthread+0x328/0x630
[   29.313343]  ret_from_fork+0x10/0x20
[   29.313389] 
[   29.313407] Allocated by task 175:
[   29.313433]  kasan_save_stack+0x3c/0x68
[   29.313474]  kasan_save_track+0x20/0x40
[   29.313636]  kasan_save_alloc_info+0x40/0x58
[   29.313679]  __kasan_kmalloc+0xd4/0xd8
[   29.313771]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.313847]  kmalloc_big_oob_right+0xb8/0x2f0
[   29.313905]  kunit_try_run_case+0x170/0x3f0
[   29.313962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.314006]  kthread+0x328/0x630
[   29.314057]  ret_from_fork+0x10/0x20
[   29.314092] 
[   29.314110] The buggy address belongs to the object at fff00000c64a4000
[   29.314110]  which belongs to the cache kmalloc-8k of size 8192
[   29.314197] The buggy address is located 0 bytes to the right of
[   29.314197]  allocated 7936-byte region [fff00000c64a4000, fff00000c64a5f00)
[   29.314282] 
[   29.314321] The buggy address belongs to the physical page:
[   29.314368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064a0
[   29.314420] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.314663] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.314728] page_type: f5(slab)
[   29.314783] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   29.314870] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.314981] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   29.315074] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.315156] head: 0bfffe0000000003 ffffc1ffc3192801 00000000ffffffff 00000000ffffffff
[   29.315277] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   29.315329] page dumped because: kasan: bad access detected
[   29.315359] 
[   29.315377] Memory state around the buggy address:
[   29.315434]  fff00000c64a5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.315477]  fff00000c64a5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.315522] >fff00000c64a5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.315560]                    ^
[   29.315586]  fff00000c64a5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.315627]  fff00000c64a6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.315664] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   29.304094] ==================================================================
[   29.304153] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   29.304200] Write of size 1 at addr fff00000c5a4de78 by task kunit_try_catch/173
[   29.304268] 
[   29.304318] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.304421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.304448] Hardware name: linux,dummy-virt (DT)
[   29.304508] Call trace:
[   29.304547]  show_stack+0x20/0x38 (C)
[   29.304613]  dump_stack_lvl+0x8c/0xd0
[   29.304690]  print_report+0x118/0x5d0
[   29.304735]  kasan_report+0xdc/0x128
[   29.304794]  __asan_report_store1_noabort+0x20/0x30
[   29.304888]  kmalloc_track_caller_oob_right+0x418/0x488
[   29.304943]  kunit_try_run_case+0x170/0x3f0
[   29.304990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.305043]  kthread+0x328/0x630
[   29.305182]  ret_from_fork+0x10/0x20
[   29.305233] 
[   29.305349] Allocated by task 173:
[   29.305377]  kasan_save_stack+0x3c/0x68
[   29.305417]  kasan_save_track+0x20/0x40
[   29.305454]  kasan_save_alloc_info+0x40/0x58
[   29.305490]  __kasan_kmalloc+0xd4/0xd8
[   29.305526]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.305569]  kmalloc_track_caller_oob_right+0x184/0x488
[   29.305611]  kunit_try_run_case+0x170/0x3f0
[   29.305648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.305691]  kthread+0x328/0x630
[   29.305722]  ret_from_fork+0x10/0x20
[   29.305756] 
[   29.305774] The buggy address belongs to the object at fff00000c5a4de00
[   29.305774]  which belongs to the cache kmalloc-128 of size 128
[   29.305831] The buggy address is located 0 bytes to the right of
[   29.305831]  allocated 120-byte region [fff00000c5a4de00, fff00000c5a4de78)
[   29.305895] 
[   29.305914] The buggy address belongs to the physical page:
[   29.305943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d
[   29.305994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.306040] page_type: f5(slab)
[   29.306075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.306125] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.306177] page dumped because: kasan: bad access detected
[   29.306207] 
[   29.306267] Memory state around the buggy address:
[   29.306314]  fff00000c5a4dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.306358]  fff00000c5a4dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.306423] >fff00000c5a4de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.306462]                                                                 ^
[   29.306510]  fff00000c5a4de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.306569]  fff00000c5a4df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.306614] ==================================================================
[   29.298183] ==================================================================
[   29.298261] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   29.298314] Write of size 1 at addr fff00000c5a4dd78 by task kunit_try_catch/173
[   29.298382] 
[   29.298458] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.298563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.298590] Hardware name: linux,dummy-virt (DT)
[   29.298626] Call trace:
[   29.298664]  show_stack+0x20/0x38 (C)
[   29.298957]  dump_stack_lvl+0x8c/0xd0
[   29.299004]  print_report+0x118/0x5d0
[   29.299046]  kasan_report+0xdc/0x128
[   29.299117]  __asan_report_store1_noabort+0x20/0x30
[   29.299176]  kmalloc_track_caller_oob_right+0x40c/0x488
[   29.299229]  kunit_try_run_case+0x170/0x3f0
[   29.299276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.299391]  kthread+0x328/0x630
[   29.299458]  ret_from_fork+0x10/0x20
[   29.299529] 
[   29.299612] Allocated by task 173:
[   29.299672]  kasan_save_stack+0x3c/0x68
[   29.299779]  kasan_save_track+0x20/0x40
[   29.299924]  kasan_save_alloc_info+0x40/0x58
[   29.300010]  __kasan_kmalloc+0xd4/0xd8
[   29.300084]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.300195]  kmalloc_track_caller_oob_right+0xa8/0x488
[   29.300237]  kunit_try_run_case+0x170/0x3f0
[   29.300303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.300387]  kthread+0x328/0x630
[   29.300688]  ret_from_fork+0x10/0x20
[   29.300751] 
[   29.300848] The buggy address belongs to the object at fff00000c5a4dd00
[   29.300848]  which belongs to the cache kmalloc-128 of size 128
[   29.300945] The buggy address is located 0 bytes to the right of
[   29.300945]  allocated 120-byte region [fff00000c5a4dd00, fff00000c5a4dd78)
[   29.301103] 
[   29.301151] The buggy address belongs to the physical page:
[   29.301201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d
[   29.301286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.301411] page_type: f5(slab)
[   29.301488] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.301560] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.301743] page dumped because: kasan: bad access detected
[   29.301997] 
[   29.302069] Memory state around the buggy address:
[   29.302191]  fff00000c5a4dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.302265]  fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.302335] >fff00000c5a4dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.302457]                                                                 ^
[   29.302535]  fff00000c5a4dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.302601]  fff00000c5a4de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.302746] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   29.280144] ==================================================================
[   29.280207] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   29.280259] Read of size 1 at addr fff00000c9957000 by task kunit_try_catch/171
[   29.280311] 
[   29.280341] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.280425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.280451] Hardware name: linux,dummy-virt (DT)
[   29.280481] Call trace:
[   29.280501]  show_stack+0x20/0x38 (C)
[   29.280549]  dump_stack_lvl+0x8c/0xd0
[   29.280593]  print_report+0x118/0x5d0
[   29.280635]  kasan_report+0xdc/0x128
[   29.280722]  __asan_report_load1_noabort+0x20/0x30
[   29.280789]  kmalloc_node_oob_right+0x2f4/0x330
[   29.280846]  kunit_try_run_case+0x170/0x3f0
[   29.280895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.281082]  kthread+0x328/0x630
[   29.281243]  ret_from_fork+0x10/0x20
[   29.281293] 
[   29.281327] Allocated by task 171:
[   29.281386]  kasan_save_stack+0x3c/0x68
[   29.281445]  kasan_save_track+0x20/0x40
[   29.281503]  kasan_save_alloc_info+0x40/0x58
[   29.281557]  __kasan_kmalloc+0xd4/0xd8
[   29.281642]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   29.281700]  kmalloc_node_oob_right+0xbc/0x330
[   29.281757]  kunit_try_run_case+0x170/0x3f0
[   29.281801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.281883]  kthread+0x328/0x630
[   29.281922]  ret_from_fork+0x10/0x20
[   29.281956] 
[   29.281974] The buggy address belongs to the object at fff00000c9956000
[   29.281974]  which belongs to the cache kmalloc-4k of size 4096
[   29.282031] The buggy address is located 0 bytes to the right of
[   29.282031]  allocated 4096-byte region [fff00000c9956000, fff00000c9957000)
[   29.282213] 
[   29.282239] The buggy address belongs to the physical page:
[   29.282435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109950
[   29.282634] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.282695] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.282784] page_type: f5(slab)
[   29.282877] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   29.282975] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.283114] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   29.283216] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.283357] head: 0bfffe0000000003 ffffc1ffc3265401 00000000ffffffff 00000000ffffffff
[   29.283454] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   29.283551] page dumped because: kasan: bad access detected
[   29.283582] 
[   29.283600] Memory state around the buggy address:
[   29.283630]  fff00000c9956f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.283674]  fff00000c9956f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.283716] >fff00000c9957000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.284203]                    ^
[   29.285152]  fff00000c9957080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.286470]  fff00000c9957100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.289546] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   29.272478] ==================================================================
[   29.272591] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.272642] Read of size 1 at addr fff00000c8686a5f by task kunit_try_catch/169
[   29.272691] 
[   29.272721] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.272810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.272837] Hardware name: linux,dummy-virt (DT)
[   29.272868] Call trace:
[   29.272890]  show_stack+0x20/0x38 (C)
[   29.272936]  dump_stack_lvl+0x8c/0xd0
[   29.272990]  print_report+0x118/0x5d0
[   29.273034]  kasan_report+0xdc/0x128
[   29.273075]  __asan_report_load1_noabort+0x20/0x30
[   29.273122]  kmalloc_oob_left+0x2ec/0x320
[   29.273180]  kunit_try_run_case+0x170/0x3f0
[   29.273227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.273280]  kthread+0x328/0x630
[   29.273321]  ret_from_fork+0x10/0x20
[   29.273367] 
[   29.273384] Allocated by task 110:
[   29.273412]  kasan_save_stack+0x3c/0x68
[   29.273452]  kasan_save_track+0x20/0x40
[   29.273490]  kasan_save_alloc_info+0x40/0x58
[   29.273539]  __kasan_kmalloc+0xd4/0xd8
[   29.273582]  __kmalloc_noprof+0x198/0x4c8
[   29.273620]  kunit_kmalloc_array+0x34/0x88
[   29.273657]  test_readerwriter+0x3b0/0x948
[   29.273696]  kunit_try_run_case+0x170/0x3f0
[   29.273733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.273777]  kthread+0x328/0x630
[   29.273807]  ret_from_fork+0x10/0x20
[   29.273841] 
[   29.273859] The buggy address belongs to the object at fff00000c8686a40
[   29.273859]  which belongs to the cache kmalloc-16 of size 16
[   29.273916] The buggy address is located 15 bytes to the right of
[   29.273916]  allocated 16-byte region [fff00000c8686a40, fff00000c8686a50)
[   29.273981] 
[   29.274007] The buggy address belongs to the physical page:
[   29.274304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686
[   29.274363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.274427] page_type: f5(slab)
[   29.274464] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.274514] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000
[   29.274557] page dumped because: kasan: bad access detected
[   29.274588] 
[   29.274605] Memory state around the buggy address:
[   29.274635]  fff00000c8686900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.274677]  fff00000c8686980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.274718] >fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   29.274756]                                                     ^
[   29.274802]  fff00000c8686a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.274900]  fff00000c8686b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.274991] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   29.246113] ==================================================================
[   29.246459] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.247327] Write of size 1 at addr fff00000c5a4dc73 by task kunit_try_catch/167
[   29.247433] 
[   29.248465] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.248644] Tainted: [N]=TEST
[   29.248693] Hardware name: linux,dummy-virt (DT)
[   29.248964] Call trace:
[   29.249182]  show_stack+0x20/0x38 (C)
[   29.249547]  dump_stack_lvl+0x8c/0xd0
[   29.249643]  print_report+0x118/0x5d0
[   29.249718]  kasan_report+0xdc/0x128
[   29.249821]  __asan_report_store1_noabort+0x20/0x30
[   29.249883]  kmalloc_oob_right+0x5a4/0x660
[   29.249929]  kunit_try_run_case+0x170/0x3f0
[   29.250228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.250298]  kthread+0x328/0x630
[   29.250376]  ret_from_fork+0x10/0x20
[   29.251478] 
[   29.251609] Allocated by task 167:
[   29.252024]  kasan_save_stack+0x3c/0x68
[   29.252097]  kasan_save_track+0x20/0x40
[   29.252289]  kasan_save_alloc_info+0x40/0x58
[   29.252333]  __kasan_kmalloc+0xd4/0xd8
[   29.252370]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.252459]  kmalloc_oob_right+0xb0/0x660
[   29.252518]  kunit_try_run_case+0x170/0x3f0
[   29.252579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.252643]  kthread+0x328/0x630
[   29.252675]  ret_from_fork+0x10/0x20
[   29.252978] 
[   29.253233] The buggy address belongs to the object at fff00000c5a4dc00
[   29.253233]  which belongs to the cache kmalloc-128 of size 128
[   29.253406] The buggy address is located 0 bytes to the right of
[   29.253406]  allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73)
[   29.253512] 
[   29.253778] The buggy address belongs to the physical page:
[   29.254692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d
[   29.254993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.255590] page_type: f5(slab)
[   29.256140] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.256220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.256356] page dumped because: kasan: bad access detected
[   29.256488] 
[   29.256562] Memory state around the buggy address:
[   29.257288]  fff00000c5a4db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.257373]  fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.257446] >fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.257502]                                                              ^
[   29.257637]  fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.257688]  fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.257767] ==================================================================
[   29.258269] ==================================================================
[   29.258349] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.258430] Write of size 1 at addr fff00000c5a4dc78 by task kunit_try_catch/167
[   29.258500] 
[   29.258570] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.258662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.258688] Hardware name: linux,dummy-virt (DT)
[   29.258930] Call trace:
[   29.258953]  show_stack+0x20/0x38 (C)
[   29.259007]  dump_stack_lvl+0x8c/0xd0
[   29.259051]  print_report+0x118/0x5d0
[   29.259099]  kasan_report+0xdc/0x128
[   29.259153]  __asan_report_store1_noabort+0x20/0x30
[   29.259243]  kmalloc_oob_right+0x538/0x660
[   29.259330]  kunit_try_run_case+0x170/0x3f0
[   29.259435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.259544]  kthread+0x328/0x630
[   29.259676]  ret_from_fork+0x10/0x20
[   29.259736] 
[   29.259754] Allocated by task 167:
[   29.259780]  kasan_save_stack+0x3c/0x68
[   29.259819]  kasan_save_track+0x20/0x40
[   29.259857]  kasan_save_alloc_info+0x40/0x58
[   29.259893]  __kasan_kmalloc+0xd4/0xd8
[   29.259929]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.259968]  kmalloc_oob_right+0xb0/0x660
[   29.260004]  kunit_try_run_case+0x170/0x3f0
[   29.260042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.260119]  kthread+0x328/0x630
[   29.260225]  ret_from_fork+0x10/0x20
[   29.260348] 
[   29.260428] The buggy address belongs to the object at fff00000c5a4dc00
[   29.260428]  which belongs to the cache kmalloc-128 of size 128
[   29.260557] The buggy address is located 5 bytes to the right of
[   29.260557]  allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73)
[   29.260671] 
[   29.260745] The buggy address belongs to the physical page:
[   29.260785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d
[   29.260868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.261181] page_type: f5(slab)
[   29.261238] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.261354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.261433] page dumped because: kasan: bad access detected
[   29.261498] 
[   29.261528] Memory state around the buggy address:
[   29.261621]  fff00000c5a4db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.261675]  fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.261717] >fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.261993]                                                                 ^
[   29.262057]  fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.262145]  fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.262249] ==================================================================
[   29.262711] ==================================================================
[   29.262774] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.262876] Read of size 1 at addr fff00000c5a4dc80 by task kunit_try_catch/167
[   29.262924] 
[   29.262952] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.263034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.263069] Hardware name: linux,dummy-virt (DT)
[   29.263100] Call trace:
[   29.263152]  show_stack+0x20/0x38 (C)
[   29.263201]  dump_stack_lvl+0x8c/0xd0
[   29.263244]  print_report+0x118/0x5d0
[   29.263642]  kasan_report+0xdc/0x128
[   29.263687]  __asan_report_load1_noabort+0x20/0x30
[   29.263735]  kmalloc_oob_right+0x5d0/0x660
[   29.263781]  kunit_try_run_case+0x170/0x3f0
[   29.263830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.263883]  kthread+0x328/0x630
[   29.263925]  ret_from_fork+0x10/0x20
[   29.263970] 
[   29.264044] Allocated by task 167:
[   29.264108]  kasan_save_stack+0x3c/0x68
[   29.264244]  kasan_save_track+0x20/0x40
[   29.264344]  kasan_save_alloc_info+0x40/0x58
[   29.264438]  __kasan_kmalloc+0xd4/0xd8
[   29.264500]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.264539]  kmalloc_oob_right+0xb0/0x660
[   29.264849]  kunit_try_run_case+0x170/0x3f0
[   29.264919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.264987]  kthread+0x328/0x630
[   29.265066]  ret_from_fork+0x10/0x20
[   29.265841] 
[   29.265863] The buggy address belongs to the object at fff00000c5a4dc00
[   29.265863]  which belongs to the cache kmalloc-128 of size 128
[   29.265930] The buggy address is located 13 bytes to the right of
[   29.265930]  allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73)
[   29.265995] 
[   29.266014] The buggy address belongs to the physical page:
[   29.266043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d
[   29.266094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.266150] page_type: f5(slab)
[   29.266185] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.266236] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.266276] page dumped because: kasan: bad access detected
[   29.266306] 
[   29.266323] Memory state around the buggy address:
[   29.266353]  fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266395]  fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.266437] >fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266474]                    ^
[   29.266500]  fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266542]  fff00000c5a4dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266580] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  108.203706] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689
[  108.204737] Modules linked in:
[  108.204945] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[  108.205926] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  108.206180] Hardware name: linux,dummy-virt (DT)
[  108.206396] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  108.207248] pc : intlog10+0x38/0x48
[  108.207667] lr : intlog10_test+0xe4/0x200
[  108.208063] sp : ffff800082127c10
[  108.208273] x29: ffff800082127c90 x28: 0000000000000000 x27: 0000000000000000
[  108.208709] x26: 1ffe0000193905c1 x25: 0000000000000000 x24: ffff800082127ce0
[  108.209469] x23: ffff800082127d00 x22: 0000000000000000 x21: 1ffff00010424f82
[  108.209924] x20: ffff909024a1f0a0 x19: ffff800080087990 x18: 0000000039f1ead1
[  108.210529] x17: 00000000a8ad3369 x16: fff00000c457b43c x15: 00000000831fe234
[  108.211203] x14: 000000008155a86c x13: 1ffe00001b48eddd x12: ffff721205120b89
[  108.211863] x11: 1ffff21205120b88 x10: ffff721205120b88 x9 : ffff9090220487b4
[  108.212335] x8 : ffff909028905c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  108.214937] x5 : ffff700010424f82 x4 : 1ffff00010010f3b x3 : 1ffff21204943e14
[  108.215650] x2 : 1ffff21204943e14 x1 : 0000000000000003 x0 : 0000000000000000
[  108.216341] Call trace:
[  108.216675]  intlog10+0x38/0x48 (P)
[  108.216880]  kunit_try_run_case+0x170/0x3f0
[  108.217123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.217598]  kthread+0x328/0x630
[  108.217837]  ret_from_fork+0x10/0x20
[  108.218034] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  108.153181] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/671
[  108.157356] Modules linked in:
[  108.158217] CPU: 0 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[  108.159767] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  108.160495] Hardware name: linux,dummy-virt (DT)
[  108.160970] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  108.161275] pc : intlog2+0xd8/0xf8
[  108.161459] lr : intlog2_test+0xe4/0x200
[  108.161647] sp : ffff800082187c10
[  108.161803] x29: ffff800082187c90 x28: 0000000000000000 x27: 0000000000000000
[  108.162167] x26: 1ffe000019390421 x25: 0000000000000000 x24: ffff800082187ce0
[  108.162513] x23: ffff800082187d00 x22: 0000000000000000 x21: 1ffff00010430f82
[  108.162979] x20: ffff909024a1efa0 x19: ffff800080087990 x18: 00000000be0ef0b4
[  108.163890] x17: 00000000529f3baa x16: fff00000c457b43c x15: fff00000ff616b48
[  108.164863] x14: 0000000000018fff x13: 1ffe00001b48eddd x12: ffff721205120b89
[  108.165602] x11: 1ffff21205120b88 x10: ffff721205120b88 x9 : ffff9090220489b4
[  108.166337] x8 : ffff909028905c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  108.167199] x5 : ffff700010430f82 x4 : 1ffff00010010f3b x3 : 1ffff21204943df4
[  108.168030] x2 : 1ffff21204943df4 x1 : 0000000000000003 x0 : 0000000000000000
[  108.168779] Call trace:
[  108.169064]  intlog2+0xd8/0xf8 (P)
[  108.169463]  kunit_try_run_case+0x170/0x3f0
[  108.169903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.170449]  kthread+0x328/0x630
[  108.170840]  ret_from_fork+0x10/0x20
[  108.171323] ---[ end trace 0000000000000000 ]---