Hay
Date
July 11, 2025, 10:11 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   32.894383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   32.967232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   32.730107] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   62.710487] ==================================================================
[   62.710577] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   62.710577] 
[   62.710673] Use-after-free read at 0x00000000689434cb (in kfence-#191):
[   62.710726]  test_krealloc+0x51c/0x830
[   62.710774]  kunit_try_run_case+0x170/0x3f0
[   62.710824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.710865]  kthread+0x328/0x630
[   62.710905]  ret_from_fork+0x10/0x20
[   62.710945] 
[   62.710969] kfence-#191: 0x00000000689434cb-0x00000000f55c9cd4, size=32, cache=kmalloc-32
[   62.710969] 
[   62.711030] allocated by task 368 on cpu 1 at 62.709782s (0.001244s ago):
[   62.711102]  test_alloc+0x29c/0x628
[   62.711142]  test_krealloc+0xc0/0x830
[   62.711183]  kunit_try_run_case+0x170/0x3f0
[   62.711224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.711266]  kthread+0x328/0x630
[   62.711303]  ret_from_fork+0x10/0x20
[   62.711357] 
[   62.711380] freed by task 368 on cpu 1 at 62.710045s (0.001331s ago):
[   62.711445]  krealloc_noprof+0x148/0x360
[   62.711486]  test_krealloc+0x1dc/0x830
[   62.711527]  kunit_try_run_case+0x170/0x3f0
[   62.711568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.711609]  kthread+0x328/0x630
[   62.711645]  ret_from_fork+0x10/0x20
[   62.711683] 
[   62.711731] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   62.711812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.711843] Hardware name: linux,dummy-virt (DT)
[   62.711878] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   62.621873] ==================================================================
[   62.621982] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   62.621982] 
[   62.622085] Use-after-free read at 0x000000001d7255a7 (in kfence-#190):
[   62.622141]  test_memcache_typesafe_by_rcu+0x280/0x560
[   62.622192]  kunit_try_run_case+0x170/0x3f0
[   62.622238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.622281]  kthread+0x328/0x630
[   62.622339]  ret_from_fork+0x10/0x20
[   62.622384] 
[   62.622409] kfence-#190: 0x000000001d7255a7-0x00000000d2d60b17, size=32, cache=test
[   62.622409] 
[   62.622464] allocated by task 366 on cpu 0 at 62.609844s (0.012616s ago):
[   62.622537]  test_alloc+0x230/0x628
[   62.622579]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   62.622622]  kunit_try_run_case+0x170/0x3f0
[   62.622663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.622703]  kthread+0x328/0x630
[   62.622738]  ret_from_fork+0x10/0x20
[   62.622778] 
[   62.622801] freed by task 366 on cpu 0 at 62.609966s (0.012832s ago):
[   62.622859]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   62.622903]  kunit_try_run_case+0x170/0x3f0
[   62.622944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.622985]  kthread+0x328/0x630
[   62.623026]  ret_from_fork+0x10/0x20
[   62.623064] 
[   62.623110] CPU: 0 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   62.623192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.623223] Hardware name: linux,dummy-virt (DT)
[   62.623256] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   40.479271] ==================================================================
[   40.479444] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   40.479444] 
[   40.479557] Invalid read at 0x000000004b20b36f:
[   40.479745]  test_invalid_access+0xdc/0x1f0
[   40.479820]  kunit_try_run_case+0x170/0x3f0
[   40.479910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.479962]  kthread+0x328/0x630
[   40.480673]  ret_from_fork+0x10/0x20
[   40.480772] 
[   40.480829] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   40.481013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.481056] Hardware name: linux,dummy-virt (DT)
[   40.481539] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   40.246172] ==================================================================
[   40.246270] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.246270] 
[   40.246354] Corrupted memory at 0x00000000ec2ad28b [ ! . . . . . . . . . . . . . . . ] (in kfence-#186):
[   40.246677]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.246729]  kunit_try_run_case+0x170/0x3f0
[   40.246774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.246815]  kthread+0x328/0x630
[   40.246852]  ret_from_fork+0x10/0x20
[   40.246892] 
[   40.246916] kfence-#186: 0x00000000d25665fd-0x000000008fcc53a5, size=73, cache=kmalloc-96
[   40.246916] 
[   40.246972] allocated by task 356 on cpu 1 at 40.245901s (0.001068s ago):
[   40.247043]  test_alloc+0x29c/0x628
[   40.247086]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   40.247131]  kunit_try_run_case+0x170/0x3f0
[   40.247172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.247214]  kthread+0x328/0x630
[   40.247249]  ret_from_fork+0x10/0x20
[   40.247288] 
[   40.247313] freed by task 356 on cpu 1 at 40.246078s (0.001231s ago):
[   40.247389]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.247435]  kunit_try_run_case+0x170/0x3f0
[   40.247477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.247520]  kthread+0x328/0x630
[   40.247555]  ret_from_fork+0x10/0x20
[   40.247595] 
[   40.247639] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   40.247719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.247749] Hardware name: linux,dummy-virt (DT)
[   40.247784] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   40.142288] ==================================================================
[   40.142407] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   40.142407] 
[   40.142513] Out-of-bounds read at 0x0000000085951910 (105B right of kfence-#185):
[   40.142578]  test_kmalloc_aligned_oob_read+0x238/0x468
[   40.142646]  kunit_try_run_case+0x170/0x3f0
[   40.142695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.142738]  kthread+0x328/0x630
[   40.142780]  ret_from_fork+0x10/0x20
[   40.142821] 
[   40.142845] kfence-#185: 0x000000002a3ca38a-0x00000000dd544513, size=73, cache=kmalloc-96
[   40.142845] 
[   40.142901] allocated by task 354 on cpu 1 at 40.142012s (0.000885s ago):
[   40.142974]  test_alloc+0x29c/0x628
[   40.143016]  test_kmalloc_aligned_oob_read+0x100/0x468
[   40.143071]  kunit_try_run_case+0x170/0x3f0
[   40.143113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.143154]  kthread+0x328/0x630
[   40.143193]  ret_from_fork+0x10/0x20
[   40.143233] 
[   40.143282] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   40.143376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.143407] Hardware name: linux,dummy-virt (DT)
[   40.143443] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   36.398030] ==================================================================
[   36.398126] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   36.398126] 
[   36.398192] Corrupted memory at 0x000000002dddf327 [ ! ] (in kfence-#149):
[   36.398311]  test_corruption+0x1d8/0x378
[   36.398375]  kunit_try_run_case+0x170/0x3f0
[   36.398419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.398461]  kthread+0x328/0x630
[   36.398503]  ret_from_fork+0x10/0x20
[   36.398548] 
[   36.398574] kfence-#149: 0x0000000035a7a9f0-0x00000000e77ebb00, size=32, cache=test
[   36.398574] 
[   36.398637] allocated by task 344 on cpu 0 at 36.397873s (0.000759s ago):
[   36.398707]  test_alloc+0x230/0x628
[   36.398750]  test_corruption+0x198/0x378
[   36.398793]  kunit_try_run_case+0x170/0x3f0
[   36.398837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.398878]  kthread+0x328/0x630
[   36.398915]  ret_from_fork+0x10/0x20
[   36.398954] 
[   36.398977] freed by task 344 on cpu 0 at 36.397934s (0.001040s ago):
[   36.399048]  test_corruption+0x1d8/0x378
[   36.399090]  kunit_try_run_case+0x170/0x3f0
[   36.399131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.399172]  kthread+0x328/0x630
[   36.399209]  ret_from_fork+0x10/0x20
[   36.399247] 
[   36.399290] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   36.399381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.399412] Hardware name: linux,dummy-virt (DT)
[   36.399446] ==================================================================
[   35.982152] ==================================================================
[   35.982246] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   35.982246] 
[   35.982313] Corrupted memory at 0x0000000099b8baa9 [ ! ] (in kfence-#145):
[   35.982466]  test_corruption+0x284/0x378
[   35.982516]  kunit_try_run_case+0x170/0x3f0
[   35.982561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.982602]  kthread+0x328/0x630
[   35.982642]  ret_from_fork+0x10/0x20
[   35.982682] 
[   35.982707] kfence-#145: 0x00000000e0489fb1-0x000000004acda954, size=32, cache=kmalloc-32
[   35.982707] 
[   35.982764] allocated by task 342 on cpu 0 at 35.981861s (0.000899s ago):
[   35.982828]  test_alloc+0x29c/0x628
[   35.982870]  test_corruption+0x198/0x378
[   35.982912]  kunit_try_run_case+0x170/0x3f0
[   35.982952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.982994]  kthread+0x328/0x630
[   35.983289]  ret_from_fork+0x10/0x20
[   35.983340] 
[   35.983363] freed by task 342 on cpu 0 at 35.981971s (0.001389s ago):
[   35.983428]  test_corruption+0x284/0x378
[   35.983468]  kunit_try_run_case+0x170/0x3f0
[   35.983510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.983551]  kthread+0x328/0x630
[   35.983588]  ret_from_fork+0x10/0x20
[   35.983627] 
[   35.983672] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   35.983752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.983781] Hardware name: linux,dummy-virt (DT)
[   35.983815] ==================================================================
[   36.190034] ==================================================================
[   36.190136] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   36.190136] 
[   36.190201] Corrupted memory at 0x00000000c78f1d34 [ ! . . . . . . . . . . . . . . . ] (in kfence-#147):
[   36.190529]  test_corruption+0x120/0x378
[   36.190578]  kunit_try_run_case+0x170/0x3f0
[   36.190625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.190667]  kthread+0x328/0x630
[   36.190707]  ret_from_fork+0x10/0x20
[   36.190749] 
[   36.190775] kfence-#147: 0x00000000887355bd-0x00000000f5e32572, size=32, cache=test
[   36.190775] 
[   36.190832] allocated by task 344 on cpu 0 at 36.189880s (0.000948s ago):
[   36.190896]  test_alloc+0x230/0x628
[   36.190937]  test_corruption+0xdc/0x378
[   36.190977]  kunit_try_run_case+0x170/0x3f0
[   36.191019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.191063]  kthread+0x328/0x630
[   36.191100]  ret_from_fork+0x10/0x20
[   36.191138] 
[   36.191161] freed by task 344 on cpu 0 at 36.189940s (0.001218s ago):
[   36.191224]  test_corruption+0x120/0x378
[   36.191266]  kunit_try_run_case+0x170/0x3f0
[   36.191306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.191358]  kthread+0x328/0x630
[   36.191394]  ret_from_fork+0x10/0x20
[   36.191434] 
[   36.191478] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   36.191560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.191588] Hardware name: linux,dummy-virt (DT)
[   36.191621] ==================================================================
[   35.878176] ==================================================================
[   35.878299] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   35.878299] 
[   35.878392] Corrupted memory at 0x000000007a63092a [ ! . . . . . . . . . . . . . . . ] (in kfence-#144):
[   35.879552]  test_corruption+0x278/0x378
[   35.879609]  kunit_try_run_case+0x170/0x3f0
[   35.879658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.879702]  kthread+0x328/0x630
[   35.879742]  ret_from_fork+0x10/0x20
[   35.879785] 
[   35.879809] kfence-#144: 0x00000000f87c5ec7-0x0000000073755430, size=32, cache=kmalloc-32
[   35.879809] 
[   35.879870] allocated by task 342 on cpu 0 at 35.877882s (0.001985s ago):
[   35.879937]  test_alloc+0x29c/0x628
[   35.879981]  test_corruption+0xdc/0x378
[   35.880024]  kunit_try_run_case+0x170/0x3f0
[   35.880065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.880107]  kthread+0x328/0x630
[   35.880143]  ret_from_fork+0x10/0x20
[   35.880182] 
[   35.880206] freed by task 342 on cpu 0 at 35.877989s (0.002213s ago):
[   35.880270]  test_corruption+0x278/0x378
[   35.880310]  kunit_try_run_case+0x170/0x3f0
[   35.880364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.880403]  kthread+0x328/0x630
[   35.880438]  ret_from_fork+0x10/0x20
[   35.880478] 
[   35.880527] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   35.880606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.880636] Hardware name: linux,dummy-virt (DT)
[   35.880671] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   35.254469] ==================================================================
[   35.254825] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   35.254825] 
[   35.254949] Invalid free of 0x00000000f666ee47 (in kfence-#138):
[   35.255050]  test_invalid_addr_free+0x1ac/0x238
[   35.255114]  kunit_try_run_case+0x170/0x3f0
[   35.255372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.255553]  kthread+0x328/0x630
[   35.255616]  ret_from_fork+0x10/0x20
[   35.255681] 
[   35.255726] kfence-#138: 0x000000001727de11-0x00000000aceca602, size=32, cache=kmalloc-32
[   35.255726] 
[   35.255812] allocated by task 338 on cpu 0 at 35.254306s (0.001495s ago):
[   35.255895]  test_alloc+0x29c/0x628
[   35.255938]  test_invalid_addr_free+0xd4/0x238
[   35.255998]  kunit_try_run_case+0x170/0x3f0
[   35.256061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.256122]  kthread+0x328/0x630
[   35.256179]  ret_from_fork+0x10/0x20
[   35.256222] 
[   35.256269] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   35.256509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.256561] Hardware name: linux,dummy-virt (DT)
[   35.256595] ==================================================================
[   35.360165] ==================================================================
[   35.360256] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   35.360256] 
[   35.360318] Invalid free of 0x000000004a76aaa3 (in kfence-#139):
[   35.360742]  test_invalid_addr_free+0xec/0x238
[   35.360819]  kunit_try_run_case+0x170/0x3f0
[   35.360913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.360966]  kthread+0x328/0x630
[   35.361006]  ret_from_fork+0x10/0x20
[   35.361056] 
[   35.361083] kfence-#139: 0x000000003fbfb905-0x00000000c143fdf3, size=32, cache=test
[   35.361083] 
[   35.361139] allocated by task 340 on cpu 0 at 35.359694s (0.001441s ago):
[   35.361208]  test_alloc+0x230/0x628
[   35.361252]  test_invalid_addr_free+0xd4/0x238
[   35.361293]  kunit_try_run_case+0x170/0x3f0
[   35.361345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.361864]  kthread+0x328/0x630
[   35.362055]  ret_from_fork+0x10/0x20
[   35.362180] 
[   35.362414] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   35.362568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.362602] Hardware name: linux,dummy-virt (DT)
[   35.362637] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   35.046721] ==================================================================
[   35.046827] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   35.046827] 
[   35.046980] Invalid free of 0x00000000eecc345f (in kfence-#136):
[   35.047146]  test_double_free+0x1bc/0x238
[   35.047226]  kunit_try_run_case+0x170/0x3f0
[   35.047281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.047359]  kthread+0x328/0x630
[   35.047402]  ret_from_fork+0x10/0x20
[   35.047460] 
[   35.047494] kfence-#136: 0x00000000eecc345f-0x0000000030a7a33e, size=32, cache=kmalloc-32
[   35.047494] 
[   35.047554] allocated by task 334 on cpu 0 at 35.046106s (0.001443s ago):
[   35.047618]  test_alloc+0x29c/0x628
[   35.047661]  test_double_free+0xd4/0x238
[   35.047775]  kunit_try_run_case+0x170/0x3f0
[   35.047818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.047860]  kthread+0x328/0x630
[   35.047898]  ret_from_fork+0x10/0x20
[   35.047937] 
[   35.047967] freed by task 334 on cpu 0 at 35.046432s (0.001530s ago):
[   35.048031]  test_double_free+0x1ac/0x238
[   35.048073]  kunit_try_run_case+0x170/0x3f0
[   35.048114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.048155]  kthread+0x328/0x630
[   35.048191]  ret_from_fork+0x10/0x20
[   35.048241] 
[   35.048288] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   35.048380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.048408] Hardware name: linux,dummy-virt (DT)
[   35.048441] ==================================================================
[   35.150669] ==================================================================
[   35.150745] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   35.150745] 
[   35.150831] Invalid free of 0x0000000027293636 (in kfence-#137):
[   35.150924]  test_double_free+0x100/0x238
[   35.150970]  kunit_try_run_case+0x170/0x3f0
[   35.151016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.151068]  kthread+0x328/0x630
[   35.151134]  ret_from_fork+0x10/0x20
[   35.151175] 
[   35.151201] kfence-#137: 0x0000000027293636-0x00000000c117db09, size=32, cache=test
[   35.151201] 
[   35.151531] allocated by task 336 on cpu 0 at 35.150431s (0.000976s ago):
[   35.151628]  test_alloc+0x230/0x628
[   35.151748]  test_double_free+0xd4/0x238
[   35.151811]  kunit_try_run_case+0x170/0x3f0
[   35.151854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.151911]  kthread+0x328/0x630
[   35.151969]  ret_from_fork+0x10/0x20
[   35.152024] 
[   35.152095] freed by task 336 on cpu 0 at 35.150516s (0.001569s ago):
[   35.152179]  test_double_free+0xf0/0x238
[   35.152222]  kunit_try_run_case+0x170/0x3f0
[   35.152265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.152544]  kthread+0x328/0x630
[   35.152611]  ret_from_fork+0x10/0x20
[   35.152670] 
[   35.152752] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   35.152844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.152874] Hardware name: linux,dummy-virt (DT)
[   35.152907] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   34.618749] ==================================================================
[   34.618826] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   34.618826] 
[   34.618938] Use-after-free read at 0x0000000014593da9 (in kfence-#132):
[   34.619010]  test_use_after_free_read+0x114/0x248
[   34.619073]  kunit_try_run_case+0x170/0x3f0
[   34.619140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.619181]  kthread+0x328/0x630
[   34.619221]  ret_from_fork+0x10/0x20
[   34.619259] 
[   34.619454] kfence-#132: 0x0000000014593da9-0x0000000024053a75, size=32, cache=kmalloc-32
[   34.619454] 
[   34.619534] allocated by task 326 on cpu 0 at 34.618442s (0.001081s ago):
[   34.619687]  test_alloc+0x29c/0x628
[   34.619749]  test_use_after_free_read+0xd0/0x248
[   34.619793]  kunit_try_run_case+0x170/0x3f0
[   34.619838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.619896]  kthread+0x328/0x630
[   34.619948]  ret_from_fork+0x10/0x20
[   34.620013] 
[   34.620037] freed by task 326 on cpu 0 at 34.618534s (0.001499s ago):
[   34.620102]  test_use_after_free_read+0x1c0/0x248
[   34.620147]  kunit_try_run_case+0x170/0x3f0
[   34.620283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.620332]  kthread+0x328/0x630
[   34.620387]  ret_from_fork+0x10/0x20
[   34.620445] 
[   34.620512] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   34.620606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.620656] Hardware name: linux,dummy-virt (DT)
[   34.620720] ==================================================================
[   34.726614] ==================================================================
[   34.726710] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   34.726710] 
[   34.726858] Use-after-free read at 0x000000006e4a0e1c (in kfence-#133):
[   34.726911]  test_use_after_free_read+0x114/0x248
[   34.726979]  kunit_try_run_case+0x170/0x3f0
[   34.727049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.727109]  kthread+0x328/0x630
[   34.727167]  ret_from_fork+0x10/0x20
[   34.727210] 
[   34.727242] kfence-#133: 0x000000006e4a0e1c-0x00000000a9991e0b, size=32, cache=test
[   34.727242] 
[   34.727371] allocated by task 328 on cpu 0 at 34.726369s (0.000980s ago):
[   34.727442]  test_alloc+0x230/0x628
[   34.727494]  test_use_after_free_read+0xd0/0x248
[   34.727558]  kunit_try_run_case+0x170/0x3f0
[   34.727748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.727819]  kthread+0x328/0x630
[   34.727856]  ret_from_fork+0x10/0x20
[   34.727966] 
[   34.728051] freed by task 328 on cpu 0 at 34.726432s (0.001597s ago):
[   34.728172]  test_use_after_free_read+0xf0/0x248
[   34.728224]  kunit_try_run_case+0x170/0x3f0
[   34.728292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.728350]  kthread+0x328/0x630
[   34.728407]  ret_from_fork+0x10/0x20
[   34.728447] 
[   34.728492] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   34.728592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.728631] Hardware name: linux,dummy-virt (DT)
[   34.728680] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   34.406508] ==================================================================
[   34.406604] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   34.406604] 
[   34.406805] Out-of-bounds write at 0x0000000053304692 (1B left of kfence-#130):
[   34.406907]  test_out_of_bounds_write+0x100/0x240
[   34.407010]  kunit_try_run_case+0x170/0x3f0
[   34.407067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.407108]  kthread+0x328/0x630
[   34.407165]  ret_from_fork+0x10/0x20
[   34.407225] 
[   34.407260] kfence-#130: 0x0000000032f2e0d9-0x0000000063cfa4a3, size=32, cache=kmalloc-32
[   34.407260] 
[   34.407340] allocated by task 322 on cpu 0 at 34.406286s (0.001033s ago):
[   34.407413]  test_alloc+0x29c/0x628
[   34.407456]  test_out_of_bounds_write+0xc8/0x240
[   34.407607]  kunit_try_run_case+0x170/0x3f0
[   34.407653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.407700]  kthread+0x328/0x630
[   34.407768]  ret_from_fork+0x10/0x20
[   34.407809] 
[   34.407934] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   34.408075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.408124] Hardware name: linux,dummy-virt (DT)
[   34.408253] ==================================================================
[   34.510317] ==================================================================
[   34.510408] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   34.510408] 
[   34.510545] Out-of-bounds write at 0x00000000a9236e87 (1B left of kfence-#131):
[   34.510618]  test_out_of_bounds_write+0x100/0x240
[   34.510691]  kunit_try_run_case+0x170/0x3f0
[   34.510748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.510791]  kthread+0x328/0x630
[   34.510847]  ret_from_fork+0x10/0x20
[   34.510890] 
[   34.510966] kfence-#131: 0x00000000149145d4-0x000000003c87ab66, size=32, cache=test
[   34.510966] 
[   34.511188] allocated by task 324 on cpu 0 at 34.510213s (0.000960s ago):
[   34.511261]  test_alloc+0x230/0x628
[   34.511303]  test_out_of_bounds_write+0xc8/0x240
[   34.511374]  kunit_try_run_case+0x170/0x3f0
[   34.511504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.511547]  kthread+0x328/0x630
[   34.511582]  ret_from_fork+0x10/0x20
[   34.511620] 
[   34.511666] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   34.511753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.511844] Hardware name: linux,dummy-virt (DT)
[   34.511898] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   33.974472] ==================================================================
[   33.974570] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   33.974570] 
[   33.974686] Out-of-bounds read at 0x000000002cfb0207 (32B right of kfence-#126):
[   33.974783]  test_out_of_bounds_read+0x1c8/0x3e0
[   33.974836]  kunit_try_run_case+0x170/0x3f0
[   33.974899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.974942]  kthread+0x328/0x630
[   33.975340]  ret_from_fork+0x10/0x20
[   33.975413] 
[   33.975495] kfence-#126: 0x0000000035b2aa23-0x00000000a2d8c65b, size=32, cache=kmalloc-32
[   33.975495] 
[   33.975569] allocated by task 318 on cpu 0 at 33.974123s (0.001425s ago):
[   33.975660]  test_alloc+0x29c/0x628
[   33.975740]  test_out_of_bounds_read+0x198/0x3e0
[   33.975784]  kunit_try_run_case+0x170/0x3f0
[   33.975843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.975907]  kthread+0x328/0x630
[   33.975944]  ret_from_fork+0x10/0x20
[   33.975981] 
[   33.976131] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.976214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.976404] Hardware name: linux,dummy-virt (DT)
[   33.976501] ==================================================================
[   34.190524] ==================================================================
[   34.190625] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   34.190625] 
[   34.190721] Out-of-bounds read at 0x00000000ffcb1350 (1B left of kfence-#128):
[   34.190779]  test_out_of_bounds_read+0x114/0x3e0
[   34.191032]  kunit_try_run_case+0x170/0x3f0
[   34.191105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.191186]  kthread+0x328/0x630
[   34.191250]  ret_from_fork+0x10/0x20
[   34.191308] 
[   34.191364] kfence-#128: 0x00000000e4dc167d-0x00000000e2de8d29, size=32, cache=test
[   34.191364] 
[   34.191474] allocated by task 320 on cpu 0 at 34.190420s (0.001032s ago):
[   34.191712]  test_alloc+0x230/0x628
[   34.191914]  test_out_of_bounds_read+0xdc/0x3e0
[   34.191996]  kunit_try_run_case+0x170/0x3f0
[   34.192039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.192162]  kthread+0x328/0x630
[   34.192229]  ret_from_fork+0x10/0x20
[   34.192422] 
[   34.192511] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   34.192613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.192660] Hardware name: linux,dummy-virt (DT)
[   34.192693] ==================================================================
[   33.650687] ==================================================================
[   33.651010] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   33.651010] 
[   33.651254] Out-of-bounds read at 0x0000000060d011b6 (1B left of kfence-#123):
[   33.651413]  test_out_of_bounds_read+0x114/0x3e0
[   33.651477]  kunit_try_run_case+0x170/0x3f0
[   33.651525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.651593]  kthread+0x328/0x630
[   33.651815]  ret_from_fork+0x10/0x20
[   33.651857] 
[   33.651882] kfence-#123: 0x000000004a9ab046-0x00000000fdb335e4, size=32, cache=kmalloc-32
[   33.651882] 
[   33.652181] allocated by task 318 on cpu 0 at 33.650230s (0.001944s ago):
[   33.652266]  test_alloc+0x29c/0x628
[   33.652311]  test_out_of_bounds_read+0xdc/0x3e0
[   33.652362]  kunit_try_run_case+0x170/0x3f0
[   33.652405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.652471]  kthread+0x328/0x630
[   33.652667]  ret_from_fork+0x10/0x20
[   33.652793] 
[   33.652844] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.653043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.653573] Hardware name: linux,dummy-virt (DT)
[   33.654048] ==================================================================
[   34.298233] ==================================================================
[   34.298344] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   34.298344] 
[   34.298433] Out-of-bounds read at 0x000000005c2fbc9d (32B right of kfence-#129):
[   34.298520]  test_out_of_bounds_read+0x1c8/0x3e0
[   34.298596]  kunit_try_run_case+0x170/0x3f0
[   34.298641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.298688]  kthread+0x328/0x630
[   34.298751]  ret_from_fork+0x10/0x20
[   34.298798] 
[   34.298858] kfence-#129: 0x00000000a91cbf5a-0x000000006ffdf3c5, size=32, cache=test
[   34.298858] 
[   34.298912] allocated by task 320 on cpu 0 at 34.298143s (0.000765s ago):
[   34.298983]  test_alloc+0x230/0x628
[   34.299030]  test_out_of_bounds_read+0x198/0x3e0
[   34.299280]  kunit_try_run_case+0x170/0x3f0
[   34.299348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.299397]  kthread+0x328/0x630
[   34.299433]  ret_from_fork+0x10/0x20
[   34.299485] 
[   34.299529] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   34.299686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.299845] Hardware name: linux,dummy-virt (DT)
[   34.300016] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-kmalloc_uaf_16
[   30.347487] ==================================================================
[   30.347591] BUG: KFENCE: use-after-free read in kmalloc_uaf_16+0x1fc/0x438
[   30.347591] 
[   30.347677] Use-after-free read at 0x00000000ad07e3e8 (in kfence-#98):
[   30.347878]  kmalloc_uaf_16+0x1fc/0x438
[   30.347919]  kunit_try_run_case+0x170/0x3f0
[   30.347959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.347997]  kthread+0x328/0x630
[   30.348031]  ret_from_fork+0x10/0x20
[   30.348070] 
[   30.348232] kfence-#98: 0x00000000ad07e3e8-0x00000000d9f8c6bb, size=16, cache=kmalloc-16
[   30.348232] 
[   30.348536] allocated by task 199 on cpu 1 at 30.346060s (0.002374s ago):
[   30.349797]  kmalloc_uaf_16+0x140/0x438
[   30.349865]  kunit_try_run_case+0x170/0x3f0
[   30.350621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.350674]  kthread+0x328/0x630
[   30.350707]  ret_from_fork+0x10/0x20
[   30.350925] 
[   30.351825] freed by task 199 on cpu 1 at 30.346424s (0.004550s ago):
[   30.352171]  kmalloc_uaf_16+0x190/0x438
[   30.352215]  kunit_try_run_case+0x170/0x3f0
[   30.352491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.352548]  kthread+0x328/0x630
[   30.352581]  ret_from_fork+0x10/0x20
[   30.352639] 
[   30.353150] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.353557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.353710] Hardware name: linux,dummy-virt (DT)
[   30.353882] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   33.527222] ==================================================================
[   33.527293] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   33.527433] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.527506] 
[   33.527574] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.527737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.527770] Hardware name: linux,dummy-virt (DT)
[   33.527804] Call trace:
[   33.527845]  show_stack+0x20/0x38 (C)
[   33.528046]  dump_stack_lvl+0x8c/0xd0
[   33.528398]  print_report+0x118/0x5d0
[   33.528639]  kasan_report+0xdc/0x128
[   33.528744]  kasan_check_range+0x100/0x1a8
[   33.528930]  __kasan_check_write+0x20/0x30
[   33.529003]  strncpy_from_user+0x3c/0x2a0
[   33.529190]  copy_user_test_oob+0x5c0/0xec8
[   33.529336]  kunit_try_run_case+0x170/0x3f0
[   33.529518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.529853]  kthread+0x328/0x630
[   33.529911]  ret_from_fork+0x10/0x20
[   33.529979] 
[   33.530022] Allocated by task 316:
[   33.530076]  kasan_save_stack+0x3c/0x68
[   33.530121]  kasan_save_track+0x20/0x40
[   33.530163]  kasan_save_alloc_info+0x40/0x58
[   33.530511]  __kasan_kmalloc+0xd4/0xd8
[   33.530848]  __kmalloc_noprof+0x198/0x4c8
[   33.531106]  kunit_kmalloc_array+0x34/0x88
[   33.531408]  copy_user_test_oob+0xac/0xec8
[   33.531573]  kunit_try_run_case+0x170/0x3f0
[   33.531710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.531785]  kthread+0x328/0x630
[   33.531822]  ret_from_fork+0x10/0x20
[   33.531888] 
[   33.532190] The buggy address belongs to the object at fff00000c91a7600
[   33.532190]  which belongs to the cache kmalloc-128 of size 128
[   33.532608] The buggy address is located 0 bytes inside of
[   33.532608]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.532698] 
[   33.532857] The buggy address belongs to the physical page:
[   33.532902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.533127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.533410] page_type: f5(slab)
[   33.533467] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.533610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.533654] page dumped because: kasan: bad access detected
[   33.533946] 
[   33.533998] Memory state around the buggy address:
[   33.534109]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.534186]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.534275] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.534514]                                                                 ^
[   33.534713]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.534840]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.534883] ==================================================================
[   33.536419] ==================================================================
[   33.536764] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   33.537138] Write of size 1 at addr fff00000c91a7678 by task kunit_try_catch/316
[   33.537209] 
[   33.537245] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.537389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.537420] Hardware name: linux,dummy-virt (DT)
[   33.537453] Call trace:
[   33.537476]  show_stack+0x20/0x38 (C)
[   33.537529]  dump_stack_lvl+0x8c/0xd0
[   33.537886]  print_report+0x118/0x5d0
[   33.538221]  kasan_report+0xdc/0x128
[   33.538388]  __asan_report_store1_noabort+0x20/0x30
[   33.538676]  strncpy_from_user+0x270/0x2a0
[   33.538877]  copy_user_test_oob+0x5c0/0xec8
[   33.539219]  kunit_try_run_case+0x170/0x3f0
[   33.539346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.539444]  kthread+0x328/0x630
[   33.539523]  ret_from_fork+0x10/0x20
[   33.539707] 
[   33.539770] Allocated by task 316:
[   33.539827]  kasan_save_stack+0x3c/0x68
[   33.540021]  kasan_save_track+0x20/0x40
[   33.540239]  kasan_save_alloc_info+0x40/0x58
[   33.540317]  __kasan_kmalloc+0xd4/0xd8
[   33.540539]  __kmalloc_noprof+0x198/0x4c8
[   33.540750]  kunit_kmalloc_array+0x34/0x88
[   33.540869]  copy_user_test_oob+0xac/0xec8
[   33.541023]  kunit_try_run_case+0x170/0x3f0
[   33.541104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.541150]  kthread+0x328/0x630
[   33.541207]  ret_from_fork+0x10/0x20
[   33.541509] 
[   33.541775] The buggy address belongs to the object at fff00000c91a7600
[   33.541775]  which belongs to the cache kmalloc-128 of size 128
[   33.542006] The buggy address is located 0 bytes to the right of
[   33.542006]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.542083] 
[   33.542108] The buggy address belongs to the physical page:
[   33.542149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.542522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.542669] page_type: f5(slab)
[   33.542725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.542779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.542822] page dumped because: kasan: bad access detected
[   33.542943] 
[   33.542974] Memory state around the buggy address:
[   33.543037]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.543087]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.543130] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.543177]                                                                 ^
[   33.543221]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.543265]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.543304] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   33.461115] ==================================================================
[   33.461842] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   33.462376] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.462468] 
[   33.462624] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.462745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.462853] Hardware name: linux,dummy-virt (DT)
[   33.462969] Call trace:
[   33.463018]  show_stack+0x20/0x38 (C)
[   33.463164]  dump_stack_lvl+0x8c/0xd0
[   33.463551]  print_report+0x118/0x5d0
[   33.463705]  kasan_report+0xdc/0x128
[   33.463791]  kasan_check_range+0x100/0x1a8
[   33.463965]  __kasan_check_write+0x20/0x30
[   33.464053]  copy_user_test_oob+0x234/0xec8
[   33.464365]  kunit_try_run_case+0x170/0x3f0
[   33.464473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.464528]  kthread+0x328/0x630
[   33.464873]  ret_from_fork+0x10/0x20
[   33.464965] 
[   33.465135] Allocated by task 316:
[   33.465203]  kasan_save_stack+0x3c/0x68
[   33.465347]  kasan_save_track+0x20/0x40
[   33.465441]  kasan_save_alloc_info+0x40/0x58
[   33.465513]  __kasan_kmalloc+0xd4/0xd8
[   33.465857]  __kmalloc_noprof+0x198/0x4c8
[   33.465957]  kunit_kmalloc_array+0x34/0x88
[   33.466094]  copy_user_test_oob+0xac/0xec8
[   33.466173]  kunit_try_run_case+0x170/0x3f0
[   33.466299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.466378]  kthread+0x328/0x630
[   33.466519]  ret_from_fork+0x10/0x20
[   33.466619] 
[   33.466643] The buggy address belongs to the object at fff00000c91a7600
[   33.466643]  which belongs to the cache kmalloc-128 of size 128
[   33.466726] The buggy address is located 0 bytes inside of
[   33.466726]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.467191] 
[   33.467254] The buggy address belongs to the physical page:
[   33.467617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.467800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.468093] page_type: f5(slab)
[   33.468162] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.468299] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.468372] page dumped because: kasan: bad access detected
[   33.468418] 
[   33.468448] Memory state around the buggy address:
[   33.468486]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.468539]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.468594] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.468650]                                                                 ^
[   33.468693]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.468739]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.468798] ==================================================================
[   33.511571] ==================================================================
[   33.511700] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   33.511773] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.511828] 
[   33.511899] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.511998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.512028] Hardware name: linux,dummy-virt (DT)
[   33.512061] Call trace:
[   33.512099]  show_stack+0x20/0x38 (C)
[   33.512150]  dump_stack_lvl+0x8c/0xd0
[   33.512209]  print_report+0x118/0x5d0
[   33.512254]  kasan_report+0xdc/0x128
[   33.512299]  kasan_check_range+0x100/0x1a8
[   33.512364]  __kasan_check_write+0x20/0x30
[   33.512413]  copy_user_test_oob+0x434/0xec8
[   33.512468]  kunit_try_run_case+0x170/0x3f0
[   33.512520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.512570]  kthread+0x328/0x630
[   33.512619]  ret_from_fork+0x10/0x20
[   33.512669] 
[   33.512689] Allocated by task 316:
[   33.512720]  kasan_save_stack+0x3c/0x68
[   33.512764]  kasan_save_track+0x20/0x40
[   33.512805]  kasan_save_alloc_info+0x40/0x58
[   33.512855]  __kasan_kmalloc+0xd4/0xd8
[   33.512903]  __kmalloc_noprof+0x198/0x4c8
[   33.512946]  kunit_kmalloc_array+0x34/0x88
[   33.512985]  copy_user_test_oob+0xac/0xec8
[   33.513025]  kunit_try_run_case+0x170/0x3f0
[   33.513075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.513118]  kthread+0x328/0x630
[   33.513151]  ret_from_fork+0x10/0x20
[   33.513189] 
[   33.513211] The buggy address belongs to the object at fff00000c91a7600
[   33.513211]  which belongs to the cache kmalloc-128 of size 128
[   33.513273] The buggy address is located 0 bytes inside of
[   33.513273]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.513659] 
[   33.513685] The buggy address belongs to the physical page:
[   33.514100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.514187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.514260] page_type: f5(slab)
[   33.514630] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.514705] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.514915] page dumped because: kasan: bad access detected
[   33.514955] 
[   33.515102] Memory state around the buggy address:
[   33.515368]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.515708]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.515762] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.515867]                                                                 ^
[   33.515913]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.515959]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.516270] ==================================================================
[   33.494013] ==================================================================
[   33.494092] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   33.494175] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.494245] 
[   33.494288] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.494400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.494433] Hardware name: linux,dummy-virt (DT)
[   33.494471] Call trace:
[   33.494498]  show_stack+0x20/0x38 (C)
[   33.494555]  dump_stack_lvl+0x8c/0xd0
[   33.494606]  print_report+0x118/0x5d0
[   33.494653]  kasan_report+0xdc/0x128
[   33.494707]  kasan_check_range+0x100/0x1a8
[   33.494753]  __kasan_check_write+0x20/0x30
[   33.494801]  copy_user_test_oob+0x35c/0xec8
[   33.494849]  kunit_try_run_case+0x170/0x3f0
[   33.494903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.494964]  kthread+0x328/0x630
[   33.495008]  ret_from_fork+0x10/0x20
[   33.495073] 
[   33.495093] Allocated by task 316:
[   33.495133]  kasan_save_stack+0x3c/0x68
[   33.495191]  kasan_save_track+0x20/0x40
[   33.495235]  kasan_save_alloc_info+0x40/0x58
[   33.495274]  __kasan_kmalloc+0xd4/0xd8
[   33.495314]  __kmalloc_noprof+0x198/0x4c8
[   33.496222]  kunit_kmalloc_array+0x34/0x88
[   33.496398]  copy_user_test_oob+0xac/0xec8
[   33.496589]  kunit_try_run_case+0x170/0x3f0
[   33.496723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.496820]  kthread+0x328/0x630
[   33.496880]  ret_from_fork+0x10/0x20
[   33.496937] 
[   33.497099] The buggy address belongs to the object at fff00000c91a7600
[   33.497099]  which belongs to the cache kmalloc-128 of size 128
[   33.497317] The buggy address is located 0 bytes inside of
[   33.497317]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.497699] 
[   33.497839] The buggy address belongs to the physical page:
[   33.497917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.498100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.498161] page_type: f5(slab)
[   33.498371] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.498545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.498822] page dumped because: kasan: bad access detected
[   33.498992] 
[   33.499035] Memory state around the buggy address:
[   33.499110]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.499236]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.499283] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.499525]                                                                 ^
[   33.499965]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.500042]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.500163] ==================================================================
[   33.476409] ==================================================================
[   33.476505] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   33.476582] Read of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.476646] 
[   33.476684] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.476791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.476824] Hardware name: linux,dummy-virt (DT)
[   33.476867] Call trace:
[   33.476898]  show_stack+0x20/0x38 (C)
[   33.476949]  dump_stack_lvl+0x8c/0xd0
[   33.477004]  print_report+0x118/0x5d0
[   33.477050]  kasan_report+0xdc/0x128
[   33.477094]  kasan_check_range+0x100/0x1a8
[   33.477141]  __kasan_check_read+0x20/0x30
[   33.477187]  copy_user_test_oob+0x728/0xec8
[   33.477241]  kunit_try_run_case+0x170/0x3f0
[   33.477292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.477354]  kthread+0x328/0x630
[   33.478008]  ret_from_fork+0x10/0x20
[   33.478153] 
[   33.478195] Allocated by task 316:
[   33.478515]  kasan_save_stack+0x3c/0x68
[   33.478603]  kasan_save_track+0x20/0x40
[   33.478702]  kasan_save_alloc_info+0x40/0x58
[   33.478960]  __kasan_kmalloc+0xd4/0xd8
[   33.479132]  __kmalloc_noprof+0x198/0x4c8
[   33.479209]  kunit_kmalloc_array+0x34/0x88
[   33.479385]  copy_user_test_oob+0xac/0xec8
[   33.479617]  kunit_try_run_case+0x170/0x3f0
[   33.479916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.480036]  kthread+0x328/0x630
[   33.480214]  ret_from_fork+0x10/0x20
[   33.480260] 
[   33.480521] The buggy address belongs to the object at fff00000c91a7600
[   33.480521]  which belongs to the cache kmalloc-128 of size 128
[   33.480740] The buggy address is located 0 bytes inside of
[   33.480740]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.481011] 
[   33.481085] The buggy address belongs to the physical page:
[   33.481255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.481665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.481841] page_type: f5(slab)
[   33.482090] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.482218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.482275] page dumped because: kasan: bad access detected
[   33.482436] 
[   33.482630] Memory state around the buggy address:
[   33.482715]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.482843]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.482919] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.483239]                                                                 ^
[   33.483372]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.483423]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.483912] ==================================================================
[   33.517096] ==================================================================
[   33.517150] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   33.517493] Read of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.517629] 
[   33.517711] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.517803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.517839] Hardware name: linux,dummy-virt (DT)
[   33.518024] Call trace:
[   33.518157]  show_stack+0x20/0x38 (C)
[   33.518297]  dump_stack_lvl+0x8c/0xd0
[   33.518402]  print_report+0x118/0x5d0
[   33.518731]  kasan_report+0xdc/0x128
[   33.518805]  kasan_check_range+0x100/0x1a8
[   33.518914]  __kasan_check_read+0x20/0x30
[   33.519068]  copy_user_test_oob+0x4a0/0xec8
[   33.519185]  kunit_try_run_case+0x170/0x3f0
[   33.519235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.519603]  kthread+0x328/0x630
[   33.519699]  ret_from_fork+0x10/0x20
[   33.520177] 
[   33.520263] Allocated by task 316:
[   33.520348]  kasan_save_stack+0x3c/0x68
[   33.520455]  kasan_save_track+0x20/0x40
[   33.520500]  kasan_save_alloc_info+0x40/0x58
[   33.520539]  __kasan_kmalloc+0xd4/0xd8
[   33.520735]  __kmalloc_noprof+0x198/0x4c8
[   33.520926]  kunit_kmalloc_array+0x34/0x88
[   33.521011]  copy_user_test_oob+0xac/0xec8
[   33.521186]  kunit_try_run_case+0x170/0x3f0
[   33.521389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.521540]  kthread+0x328/0x630
[   33.521630]  ret_from_fork+0x10/0x20
[   33.521746] 
[   33.521793] The buggy address belongs to the object at fff00000c91a7600
[   33.521793]  which belongs to the cache kmalloc-128 of size 128
[   33.521872] The buggy address is located 0 bytes inside of
[   33.521872]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.521951] 
[   33.522236] The buggy address belongs to the physical page:
[   33.522372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.522733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.522920] page_type: f5(slab)
[   33.522966] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.523348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.523418] page dumped because: kasan: bad access detected
[   33.523471] 
[   33.523722] Memory state around the buggy address:
[   33.523916]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.524011]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.524217] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.524418]                                                                 ^
[   33.524731]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.524957]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.525138] ==================================================================
[   33.501215] ==================================================================
[   33.501304] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   33.501552] Read of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.501798] 
[   33.501841] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.501938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.501966] Hardware name: linux,dummy-virt (DT)
[   33.502301] Call trace:
[   33.502737]  show_stack+0x20/0x38 (C)
[   33.502838]  dump_stack_lvl+0x8c/0xd0
[   33.502990]  print_report+0x118/0x5d0
[   33.503080]  kasan_report+0xdc/0x128
[   33.503132]  kasan_check_range+0x100/0x1a8
[   33.503409]  __kasan_check_read+0x20/0x30
[   33.503608]  copy_user_test_oob+0x3c8/0xec8
[   33.503805]  kunit_try_run_case+0x170/0x3f0
[   33.504009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.504165]  kthread+0x328/0x630
[   33.504253]  ret_from_fork+0x10/0x20
[   33.504642] 
[   33.504687] Allocated by task 316:
[   33.504737]  kasan_save_stack+0x3c/0x68
[   33.505067]  kasan_save_track+0x20/0x40
[   33.505283]  kasan_save_alloc_info+0x40/0x58
[   33.505465]  __kasan_kmalloc+0xd4/0xd8
[   33.505549]  __kmalloc_noprof+0x198/0x4c8
[   33.505630]  kunit_kmalloc_array+0x34/0x88
[   33.505743]  copy_user_test_oob+0xac/0xec8
[   33.505786]  kunit_try_run_case+0x170/0x3f0
[   33.505830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.505872]  kthread+0x328/0x630
[   33.505908]  ret_from_fork+0x10/0x20
[   33.505947] 
[   33.505970] The buggy address belongs to the object at fff00000c91a7600
[   33.505970]  which belongs to the cache kmalloc-128 of size 128
[   33.506291] The buggy address is located 0 bytes inside of
[   33.506291]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.506776] 
[   33.506847] The buggy address belongs to the physical page:
[   33.507174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.507506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.507602] page_type: f5(slab)
[   33.507683] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.507741] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.507784] page dumped because: kasan: bad access detected
[   33.508104] 
[   33.508427] Memory state around the buggy address:
[   33.508507]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.508941]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.509270] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.509407]                                                                 ^
[   33.509499]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.509613]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.509654] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   33.416820] ==================================================================
[   33.416882] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   33.417875] Write of size 8 at addr fff00000c91a7578 by task kunit_try_catch/312
[   33.417968] 
[   33.418320] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.418809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.418894] Hardware name: linux,dummy-virt (DT)
[   33.419172] Call trace:
[   33.419252]  show_stack+0x20/0x38 (C)
[   33.419373]  dump_stack_lvl+0x8c/0xd0
[   33.419478]  print_report+0x118/0x5d0
[   33.419565]  kasan_report+0xdc/0x128
[   33.419680]  kasan_check_range+0x100/0x1a8
[   33.419755]  __kasan_check_write+0x20/0x30
[   33.420061]  copy_to_kernel_nofault+0x8c/0x250
[   33.420399]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   33.420519]  kunit_try_run_case+0x170/0x3f0
[   33.420625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.420787]  kthread+0x328/0x630
[   33.420903]  ret_from_fork+0x10/0x20
[   33.420990] 
[   33.421079] Allocated by task 312:
[   33.421150]  kasan_save_stack+0x3c/0x68
[   33.421268]  kasan_save_track+0x20/0x40
[   33.421334]  kasan_save_alloc_info+0x40/0x58
[   33.421374]  __kasan_kmalloc+0xd4/0xd8
[   33.421573]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.421824]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.421898]  kunit_try_run_case+0x170/0x3f0
[   33.421950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.422162]  kthread+0x328/0x630
[   33.422363]  ret_from_fork+0x10/0x20
[   33.422505] 
[   33.422575] The buggy address belongs to the object at fff00000c91a7500
[   33.422575]  which belongs to the cache kmalloc-128 of size 128
[   33.422886] The buggy address is located 0 bytes to the right of
[   33.422886]  allocated 120-byte region [fff00000c91a7500, fff00000c91a7578)
[   33.422997] 
[   33.423349] The buggy address belongs to the physical page:
[   33.423483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.423588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.423799] page_type: f5(slab)
[   33.424004] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.424207] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.424337] page dumped because: kasan: bad access detected
[   33.424475] 
[   33.424851] Memory state around the buggy address:
[   33.424944]  fff00000c91a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.425013]  fff00000c91a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.425276] >fff00000c91a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.425467]                                                                 ^
[   33.425519]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.425750]  fff00000c91a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.425841] ==================================================================
[   33.408048] ==================================================================
[   33.408131] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   33.408286] Read of size 8 at addr fff00000c91a7578 by task kunit_try_catch/312
[   33.408367] 
[   33.408437] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.408583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.408612] Hardware name: linux,dummy-virt (DT)
[   33.408666] Call trace:
[   33.408704]  show_stack+0x20/0x38 (C)
[   33.409068]  dump_stack_lvl+0x8c/0xd0
[   33.409147]  print_report+0x118/0x5d0
[   33.409290]  kasan_report+0xdc/0x128
[   33.409386]  __asan_report_load8_noabort+0x20/0x30
[   33.409637]  copy_to_kernel_nofault+0x204/0x250
[   33.409693]  copy_to_kernel_nofault_oob+0x158/0x418
[   33.409745]  kunit_try_run_case+0x170/0x3f0
[   33.410199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.410358]  kthread+0x328/0x630
[   33.410414]  ret_from_fork+0x10/0x20
[   33.410499] 
[   33.410851] Allocated by task 312:
[   33.410952]  kasan_save_stack+0x3c/0x68
[   33.411046]  kasan_save_track+0x20/0x40
[   33.411180]  kasan_save_alloc_info+0x40/0x58
[   33.411269]  __kasan_kmalloc+0xd4/0xd8
[   33.411344]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.411544]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.411752]  kunit_try_run_case+0x170/0x3f0
[   33.411840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.411984]  kthread+0x328/0x630
[   33.412061]  ret_from_fork+0x10/0x20
[   33.412142] 
[   33.412349] The buggy address belongs to the object at fff00000c91a7500
[   33.412349]  which belongs to the cache kmalloc-128 of size 128
[   33.412529] The buggy address is located 0 bytes to the right of
[   33.412529]  allocated 120-byte region [fff00000c91a7500, fff00000c91a7578)
[   33.412688] 
[   33.412770] The buggy address belongs to the physical page:
[   33.412915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.413018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.413372] page_type: f5(slab)
[   33.413468] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.413577] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.413715] page dumped because: kasan: bad access detected
[   33.413777] 
[   33.413954] Memory state around the buggy address:
[   33.414142]  fff00000c91a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.414227]  fff00000c91a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.414431] >fff00000c91a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.414510]                                                                 ^
[   33.414674]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.414748]  fff00000c91a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.414891] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   33.357055] ==================================================================
[   33.357113] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   33.357545] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300
[   33.357652] 
[   33.357732] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.357903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.357932] Hardware name: linux,dummy-virt (DT)
[   33.357966] Call trace:
[   33.358285]  show_stack+0x20/0x38 (C)
[   33.358420]  dump_stack_lvl+0x8c/0xd0
[   33.358793]  print_report+0x310/0x5d0
[   33.358955]  kasan_report+0xdc/0x128
[   33.359277]  __asan_report_load1_noabort+0x20/0x30
[   33.359488]  vmalloc_oob+0x51c/0x5d0
[   33.359841]  kunit_try_run_case+0x170/0x3f0
[   33.359963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.360078]  kthread+0x328/0x630
[   33.360157]  ret_from_fork+0x10/0x20
[   33.360577] 
[   33.360635] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   33.360785] The buggy address belongs to the physical page:
[   33.360843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091c8
[   33.361206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.361308] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.361477] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.361540] page dumped because: kasan: bad access detected
[   33.361663] 
[   33.361685] Memory state around the buggy address:
[   33.361722]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.361775]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.361821] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.362158]                                                                 ^
[   33.362349]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.362575]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.362697] ==================================================================
[   33.348944] ==================================================================
[   33.349036] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   33.349111] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300
[   33.349165] 
[   33.349208] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.349310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.350311] Hardware name: linux,dummy-virt (DT)
[   33.350746] Call trace:
[   33.350860]  show_stack+0x20/0x38 (C)
[   33.350930]  dump_stack_lvl+0x8c/0xd0
[   33.351030]  print_report+0x310/0x5d0
[   33.351221]  kasan_report+0xdc/0x128
[   33.351420]  __asan_report_load1_noabort+0x20/0x30
[   33.351719]  vmalloc_oob+0x578/0x5d0
[   33.351926]  kunit_try_run_case+0x170/0x3f0
[   33.352275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.352435]  kthread+0x328/0x630
[   33.352523]  ret_from_fork+0x10/0x20
[   33.352712] 
[   33.352742] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   33.352804] The buggy address belongs to the physical page:
[   33.353152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091c8
[   33.353414] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.353594] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.353687] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.353734] page dumped because: kasan: bad access detected
[   33.353769] 
[   33.353804] Memory state around the buggy address:
[   33.354127]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.354280]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.354616] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.354680]                                                              ^
[   33.354820]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.354893]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.355289] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.016890] ==================================================================
[   33.017156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.017485] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.017590] 
[   33.017692] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.018111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.018230] Hardware name: linux,dummy-virt (DT)
[   33.018285] Call trace:
[   33.018310]  show_stack+0x20/0x38 (C)
[   33.018618]  dump_stack_lvl+0x8c/0xd0
[   33.018721]  print_report+0x118/0x5d0
[   33.018833]  kasan_report+0xdc/0x128
[   33.018920]  kasan_check_range+0x100/0x1a8
[   33.019225]  __kasan_check_write+0x20/0x30
[   33.019300]  kasan_atomics_helper+0xa6c/0x4858
[   33.019628]  kasan_atomics+0x198/0x2e0
[   33.019783]  kunit_try_run_case+0x170/0x3f0
[   33.019889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.020227]  kthread+0x328/0x630
[   33.020305]  ret_from_fork+0x10/0x20
[   33.020364] 
[   33.020754] Allocated by task 296:
[   33.020841]  kasan_save_stack+0x3c/0x68
[   33.021223]  kasan_save_track+0x20/0x40
[   33.021343]  kasan_save_alloc_info+0x40/0x58
[   33.021452]  __kasan_kmalloc+0xd4/0xd8
[   33.021541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.021845]  kasan_atomics+0xb8/0x2e0
[   33.021944]  kunit_try_run_case+0x170/0x3f0
[   33.022035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.022128]  kthread+0x328/0x630
[   33.022264]  ret_from_fork+0x10/0x20
[   33.022460] 
[   33.022487] The buggy address belongs to the object at fff00000c91a4d80
[   33.022487]  which belongs to the cache kmalloc-64 of size 64
[   33.022657] The buggy address is located 0 bytes to the right of
[   33.022657]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.022813] 
[   33.022876] The buggy address belongs to the physical page:
[   33.022955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.023162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.023219] page_type: f5(slab)
[   33.023611] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.023708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.024083] page dumped because: kasan: bad access detected
[   33.024181] 
[   33.024240] Memory state around the buggy address:
[   33.024359]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.024446]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.024529] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.024567]                                      ^
[   33.024645]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.024875]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.025041] ==================================================================
[   33.272430] ==================================================================
[   33.272749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   33.272820] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.273057] 
[   33.273133] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.273319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.273371] Hardware name: linux,dummy-virt (DT)
[   33.273422] Call trace:
[   33.273461]  show_stack+0x20/0x38 (C)
[   33.273518]  dump_stack_lvl+0x8c/0xd0
[   33.273565]  print_report+0x118/0x5d0
[   33.273821]  kasan_report+0xdc/0x128
[   33.273988]  __asan_report_load8_noabort+0x20/0x30
[   33.274345]  kasan_atomics_helper+0x3db0/0x4858
[   33.274654]  kasan_atomics+0x198/0x2e0
[   33.274751]  kunit_try_run_case+0x170/0x3f0
[   33.275134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.275196]  kthread+0x328/0x630
[   33.275270]  ret_from_fork+0x10/0x20
[   33.275944] 
[   33.275986] Allocated by task 296:
[   33.276123]  kasan_save_stack+0x3c/0x68
[   33.276175]  kasan_save_track+0x20/0x40
[   33.276266]  kasan_save_alloc_info+0x40/0x58
[   33.276357]  __kasan_kmalloc+0xd4/0xd8
[   33.276716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.276885]  kasan_atomics+0xb8/0x2e0
[   33.277040]  kunit_try_run_case+0x170/0x3f0
[   33.277400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.277475]  kthread+0x328/0x630
[   33.277553]  ret_from_fork+0x10/0x20
[   33.277943] 
[   33.278180] The buggy address belongs to the object at fff00000c91a4d80
[   33.278180]  which belongs to the cache kmalloc-64 of size 64
[   33.278275] The buggy address is located 0 bytes to the right of
[   33.278275]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.278469] 
[   33.278597] The buggy address belongs to the physical page:
[   33.278884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.279077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.279184] page_type: f5(slab)
[   33.279238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.279291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.279521] page dumped because: kasan: bad access detected
[   33.279590] 
[   33.279621] Memory state around the buggy address:
[   33.279670]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.279718]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.279777] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.279831]                                      ^
[   33.279868]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.279923]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.279964] ==================================================================
[   33.242283] ==================================================================
[   33.242409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   33.242495] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.242549] 
[   33.242917] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.243054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.243119] Hardware name: linux,dummy-virt (DT)
[   33.243154] Call trace:
[   33.243195]  show_stack+0x20/0x38 (C)
[   33.243251]  dump_stack_lvl+0x8c/0xd0
[   33.243607]  print_report+0x118/0x5d0
[   33.243677]  kasan_report+0xdc/0x128
[   33.243723]  kasan_check_range+0x100/0x1a8
[   33.243769]  __kasan_check_write+0x20/0x30
[   33.243815]  kasan_atomics_helper+0x147c/0x4858
[   33.243918]  kasan_atomics+0x198/0x2e0
[   33.244008]  kunit_try_run_case+0x170/0x3f0
[   33.244061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.244448]  kthread+0x328/0x630
[   33.244501]  ret_from_fork+0x10/0x20
[   33.244561] 
[   33.244716] Allocated by task 296:
[   33.244758]  kasan_save_stack+0x3c/0x68
[   33.244921]  kasan_save_track+0x20/0x40
[   33.244976]  kasan_save_alloc_info+0x40/0x58
[   33.245018]  __kasan_kmalloc+0xd4/0xd8
[   33.245059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.245390]  kasan_atomics+0xb8/0x2e0
[   33.245593]  kunit_try_run_case+0x170/0x3f0
[   33.245821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.245955]  kthread+0x328/0x630
[   33.246056]  ret_from_fork+0x10/0x20
[   33.246209] 
[   33.246233] The buggy address belongs to the object at fff00000c91a4d80
[   33.246233]  which belongs to the cache kmalloc-64 of size 64
[   33.246302] The buggy address is located 0 bytes to the right of
[   33.246302]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.246379] 
[   33.246401] The buggy address belongs to the physical page:
[   33.246435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.246911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.247081] page_type: f5(slab)
[   33.247129] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.247182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.247226] page dumped because: kasan: bad access detected
[   33.247305] 
[   33.247365] Memory state around the buggy address:
[   33.247417]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.247464]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.247517] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.247563]                                      ^
[   33.247599]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.247653]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.247701] ==================================================================
[   33.248705] ==================================================================
[   33.248794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   33.249194] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.249276] 
[   33.249314] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.249492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.249616] Hardware name: linux,dummy-virt (DT)
[   33.249684] Call trace:
[   33.249716]  show_stack+0x20/0x38 (C)
[   33.249960]  dump_stack_lvl+0x8c/0xd0
[   33.250125]  print_report+0x118/0x5d0
[   33.250388]  kasan_report+0xdc/0x128
[   33.250545]  kasan_check_range+0x100/0x1a8
[   33.250618]  __kasan_check_write+0x20/0x30
[   33.250766]  kasan_atomics_helper+0x14e4/0x4858
[   33.250842]  kasan_atomics+0x198/0x2e0
[   33.250989]  kunit_try_run_case+0x170/0x3f0
[   33.251092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.251163]  kthread+0x328/0x630
[   33.251208]  ret_from_fork+0x10/0x20
[   33.251817] 
[   33.252049] Allocated by task 296:
[   33.252115]  kasan_save_stack+0x3c/0x68
[   33.252472]  kasan_save_track+0x20/0x40
[   33.252550]  kasan_save_alloc_info+0x40/0x58
[   33.252774]  __kasan_kmalloc+0xd4/0xd8
[   33.252899]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.253219]  kasan_atomics+0xb8/0x2e0
[   33.253413]  kunit_try_run_case+0x170/0x3f0
[   33.253560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.253678]  kthread+0x328/0x630
[   33.253882]  ret_from_fork+0x10/0x20
[   33.254155] 
[   33.254320] The buggy address belongs to the object at fff00000c91a4d80
[   33.254320]  which belongs to the cache kmalloc-64 of size 64
[   33.254519] The buggy address is located 0 bytes to the right of
[   33.254519]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.254908] 
[   33.254952] The buggy address belongs to the physical page:
[   33.255008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.255079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.255315] page_type: f5(slab)
[   33.255513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.255634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.255703] page dumped because: kasan: bad access detected
[   33.255745] 
[   33.255767] Memory state around the buggy address:
[   33.255807]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.255864]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.255909] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.255948]                                      ^
[   33.255993]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.256045]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.256100] ==================================================================
[   33.086567] ==================================================================
[   33.086627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.086684] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.086736] 
[   33.086897] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.087026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.087197] Hardware name: linux,dummy-virt (DT)
[   33.087234] Call trace:
[   33.087261]  show_stack+0x20/0x38 (C)
[   33.087355]  dump_stack_lvl+0x8c/0xd0
[   33.087417]  print_report+0x118/0x5d0
[   33.087470]  kasan_report+0xdc/0x128
[   33.087515]  kasan_check_range+0x100/0x1a8
[   33.087563]  __kasan_check_write+0x20/0x30
[   33.087610]  kasan_atomics_helper+0xd3c/0x4858
[   33.087661]  kasan_atomics+0x198/0x2e0
[   33.087710]  kunit_try_run_case+0x170/0x3f0
[   33.087760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.087812]  kthread+0x328/0x630
[   33.087856]  ret_from_fork+0x10/0x20
[   33.087916] 
[   33.087937] Allocated by task 296:
[   33.087969]  kasan_save_stack+0x3c/0x68
[   33.088022]  kasan_save_track+0x20/0x40
[   33.088064]  kasan_save_alloc_info+0x40/0x58
[   33.088104]  __kasan_kmalloc+0xd4/0xd8
[   33.088144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.088188]  kasan_atomics+0xb8/0x2e0
[   33.088227]  kunit_try_run_case+0x170/0x3f0
[   33.088268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.088312]  kthread+0x328/0x630
[   33.089056]  ret_from_fork+0x10/0x20
[   33.089109] 
[   33.089133] The buggy address belongs to the object at fff00000c91a4d80
[   33.089133]  which belongs to the cache kmalloc-64 of size 64
[   33.089194] The buggy address is located 0 bytes to the right of
[   33.089194]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.089258] 
[   33.089527] The buggy address belongs to the physical page:
[   33.089742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.089803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.089863] page_type: f5(slab)
[   33.089906] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.090293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.090586] page dumped because: kasan: bad access detected
[   33.090652] 
[   33.090723] Memory state around the buggy address:
[   33.090826]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.090949]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.091030] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.091112]                                      ^
[   33.091222]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.091284]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.091615] ==================================================================
[   33.208972] ==================================================================
[   33.209131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   33.209190] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.209242] 
[   33.209279] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.209612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.210058] Hardware name: linux,dummy-virt (DT)
[   33.210148] Call trace:
[   33.210206]  show_stack+0x20/0x38 (C)
[   33.210376]  dump_stack_lvl+0x8c/0xd0
[   33.210487]  print_report+0x118/0x5d0
[   33.210552]  kasan_report+0xdc/0x128
[   33.210894]  kasan_check_range+0x100/0x1a8
[   33.210979]  __kasan_check_write+0x20/0x30
[   33.211057]  kasan_atomics_helper+0x12d8/0x4858
[   33.211310]  kasan_atomics+0x198/0x2e0
[   33.211508]  kunit_try_run_case+0x170/0x3f0
[   33.211668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.211772]  kthread+0x328/0x630
[   33.211856]  ret_from_fork+0x10/0x20
[   33.212030] 
[   33.212094] Allocated by task 296:
[   33.212174]  kasan_save_stack+0x3c/0x68
[   33.212318]  kasan_save_track+0x20/0x40
[   33.212371]  kasan_save_alloc_info+0x40/0x58
[   33.212418]  __kasan_kmalloc+0xd4/0xd8
[   33.212479]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.212601]  kasan_atomics+0xb8/0x2e0
[   33.212669]  kunit_try_run_case+0x170/0x3f0
[   33.212721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.212775]  kthread+0x328/0x630
[   33.212812]  ret_from_fork+0x10/0x20
[   33.212850] 
[   33.212873] The buggy address belongs to the object at fff00000c91a4d80
[   33.212873]  which belongs to the cache kmalloc-64 of size 64
[   33.212935] The buggy address is located 0 bytes to the right of
[   33.212935]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.213011] 
[   33.213053] The buggy address belongs to the physical page:
[   33.213093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.213157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.213208] page_type: f5(slab)
[   33.213250] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.213302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.213357] page dumped because: kasan: bad access detected
[   33.213390] 
[   33.213720] Memory state around the buggy address:
[   33.214031]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.214105]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.214162] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.214435]                                      ^
[   33.214581]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.214654]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.214785] ==================================================================
[   33.216120] ==================================================================
[   33.216621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   33.216885] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.217150] 
[   33.217294] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.217405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.217535] Hardware name: linux,dummy-virt (DT)
[   33.217684] Call trace:
[   33.217807]  show_stack+0x20/0x38 (C)
[   33.217897]  dump_stack_lvl+0x8c/0xd0
[   33.217977]  print_report+0x118/0x5d0
[   33.218305]  kasan_report+0xdc/0x128
[   33.218625]  kasan_check_range+0x100/0x1a8
[   33.218790]  __kasan_check_write+0x20/0x30
[   33.219050]  kasan_atomics_helper+0x1384/0x4858
[   33.219243]  kasan_atomics+0x198/0x2e0
[   33.219315]  kunit_try_run_case+0x170/0x3f0
[   33.219662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.219719]  kthread+0x328/0x630
[   33.220093]  ret_from_fork+0x10/0x20
[   33.220205] 
[   33.220483] Allocated by task 296:
[   33.220619]  kasan_save_stack+0x3c/0x68
[   33.220671]  kasan_save_track+0x20/0x40
[   33.221371]  kasan_save_alloc_info+0x40/0x58
[   33.221600]  __kasan_kmalloc+0xd4/0xd8
[   33.221839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.222037]  kasan_atomics+0xb8/0x2e0
[   33.222108]  kunit_try_run_case+0x170/0x3f0
[   33.222260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.222560]  kthread+0x328/0x630
[   33.222633]  ret_from_fork+0x10/0x20
[   33.222787] 
[   33.222850] The buggy address belongs to the object at fff00000c91a4d80
[   33.222850]  which belongs to the cache kmalloc-64 of size 64
[   33.222942] The buggy address is located 0 bytes to the right of
[   33.222942]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.223010] 
[   33.223400] The buggy address belongs to the physical page:
[   33.223629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.223825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.223883] page_type: f5(slab)
[   33.224082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.224256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.224335] page dumped because: kasan: bad access detected
[   33.224617] 
[   33.224723] Memory state around the buggy address:
[   33.224786]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.224910]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.224976] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.225035]                                      ^
[   33.225072]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.225117]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.225166] ==================================================================
[   33.110316] ==================================================================
[   33.110430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.110650] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.110745] 
[   33.111051] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.111205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.111240] Hardware name: linux,dummy-virt (DT)
[   33.111277] Call trace:
[   33.111632]  show_stack+0x20/0x38 (C)
[   33.111796]  dump_stack_lvl+0x8c/0xd0
[   33.111873]  print_report+0x118/0x5d0
[   33.112070]  kasan_report+0xdc/0x128
[   33.112243]  __asan_report_load8_noabort+0x20/0x30
[   33.112319]  kasan_atomics_helper+0x3f58/0x4858
[   33.112387]  kasan_atomics+0x198/0x2e0
[   33.112438]  kunit_try_run_case+0x170/0x3f0
[   33.112719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.112812]  kthread+0x328/0x630
[   33.113070]  ret_from_fork+0x10/0x20
[   33.113183] 
[   33.113217] Allocated by task 296:
[   33.113252]  kasan_save_stack+0x3c/0x68
[   33.113309]  kasan_save_track+0x20/0x40
[   33.113364]  kasan_save_alloc_info+0x40/0x58
[   33.113623]  __kasan_kmalloc+0xd4/0xd8
[   33.113677]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.113834]  kasan_atomics+0xb8/0x2e0
[   33.113920]  kunit_try_run_case+0x170/0x3f0
[   33.114036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.114254]  kthread+0x328/0x630
[   33.114417]  ret_from_fork+0x10/0x20
[   33.114495] 
[   33.114595] The buggy address belongs to the object at fff00000c91a4d80
[   33.114595]  which belongs to the cache kmalloc-64 of size 64
[   33.114673] The buggy address is located 0 bytes to the right of
[   33.114673]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.115245] 
[   33.115380] The buggy address belongs to the physical page:
[   33.115717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.115832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.115895] page_type: f5(slab)
[   33.115936] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.116013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.116066] page dumped because: kasan: bad access detected
[   33.116120] 
[   33.116146] Memory state around the buggy address:
[   33.116201]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.116264]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.116316] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.116383]                                      ^
[   33.116420]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.116473]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.116520] ==================================================================
[   32.987833] ==================================================================
[   32.987886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   32.987940] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   32.987991] 
[   32.988022] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.988210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.988246] Hardware name: linux,dummy-virt (DT)
[   32.988295] Call trace:
[   32.988365]  show_stack+0x20/0x38 (C)
[   32.988420]  dump_stack_lvl+0x8c/0xd0
[   32.988479]  print_report+0x118/0x5d0
[   32.988535]  kasan_report+0xdc/0x128
[   32.988580]  __asan_report_load4_noabort+0x20/0x30
[   32.988687]  kasan_atomics_helper+0x42d8/0x4858
[   32.988763]  kasan_atomics+0x198/0x2e0
[   32.988867]  kunit_try_run_case+0x170/0x3f0
[   32.988921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.989241]  kthread+0x328/0x630
[   32.989319]  ret_from_fork+0x10/0x20
[   32.989380] 
[   32.989491] Allocated by task 296:
[   32.989528]  kasan_save_stack+0x3c/0x68
[   32.989574]  kasan_save_track+0x20/0x40
[   32.989713]  kasan_save_alloc_info+0x40/0x58
[   32.989799]  __kasan_kmalloc+0xd4/0xd8
[   32.989940]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.990036]  kasan_atomics+0xb8/0x2e0
[   32.990143]  kunit_try_run_case+0x170/0x3f0
[   32.990187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.990231]  kthread+0x328/0x630
[   32.990274]  ret_from_fork+0x10/0x20
[   32.990312] 
[   32.990343] The buggy address belongs to the object at fff00000c91a4d80
[   32.990343]  which belongs to the cache kmalloc-64 of size 64
[   32.990933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   32.991080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.991841] Memory state around the buggy address:
[   32.992438] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.992911]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.996041]  kasan_check_range+0x100/0x1a8
[   32.996969] Allocated by task 296:
[   32.997020]  kasan_save_stack+0x3c/0x68
[   32.997158]  kasan_save_track+0x20/0x40
[   32.997420]  kasan_save_alloc_info+0x40/0x58
[   32.997607]  __kasan_kmalloc+0xd4/0xd8
[   32.997649]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.997695]  kasan_atomics+0xb8/0x2e0
[   32.997762]  kunit_try_run_case+0x170/0x3f0
[   32.997808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.997853]  kthread+0x328/0x630
[   32.998220]  ret_from_fork+0x10/0x20
[   32.998301] 
[   32.998408] The buggy address belongs to the object at fff00000c91a4d80
[   32.998408]  which belongs to the cache kmalloc-64 of size 64
[   32.998522] The buggy address is located 0 bytes to the right of
[   32.998522]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   32.998842] 
[   32.998895] The buggy address belongs to the physical page:
[   32.998966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   32.999032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.999085] page_type: f5(slab)
[   32.999135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.999188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.999231] page dumped because: kasan: bad access detected
[   32.999584] 
[   32.999655] Memory state around the buggy address:
[   32.999748]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.000029]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.000209] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.000454]                                      ^
[   33.000499]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.000652]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.000722] ==================================================================
[   33.226115] ==================================================================
[   33.226356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   33.226578] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.226639] 
[   33.226675] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.226971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.227016] Hardware name: linux,dummy-virt (DT)
[   33.227081] Call trace:
[   33.227108]  show_stack+0x20/0x38 (C)
[   33.227162]  dump_stack_lvl+0x8c/0xd0
[   33.227209]  print_report+0x118/0x5d0
[   33.227423]  kasan_report+0xdc/0x128
[   33.228147]  __asan_report_load8_noabort+0x20/0x30
[   33.228288]  kasan_atomics_helper+0x3f04/0x4858
[   33.228505]  kasan_atomics+0x198/0x2e0
[   33.228583]  kunit_try_run_case+0x170/0x3f0
[   33.228736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.228941]  kthread+0x328/0x630
[   33.229405]  ret_from_fork+0x10/0x20
[   33.229793] 
[   33.229821] Allocated by task 296:
[   33.229872]  kasan_save_stack+0x3c/0x68
[   33.229921]  kasan_save_track+0x20/0x40
[   33.229963]  kasan_save_alloc_info+0x40/0x58
[   33.230262]  __kasan_kmalloc+0xd4/0xd8
[   33.230401]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.230583]  kasan_atomics+0xb8/0x2e0
[   33.230654]  kunit_try_run_case+0x170/0x3f0
[   33.230997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.231242]  kthread+0x328/0x630
[   33.231578]  ret_from_fork+0x10/0x20
[   33.231765] 
[   33.231821] The buggy address belongs to the object at fff00000c91a4d80
[   33.231821]  which belongs to the cache kmalloc-64 of size 64
[   33.232135] The buggy address is located 0 bytes to the right of
[   33.232135]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.232430] 
[   33.232625] The buggy address belongs to the physical page:
[   33.232693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.233032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.233211] page_type: f5(slab)
[   33.233287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.233357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.233401] page dumped because: kasan: bad access detected
[   33.233434] 
[   33.233466] Memory state around the buggy address:
[   33.233501]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.233558]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.233602] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.233642]                                      ^
[   33.233686]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.233753]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.233804] ==================================================================
[   33.317646] ==================================================================
[   33.317708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   33.317763] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.317971] 
[   33.318045] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.318405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.318467] Hardware name: linux,dummy-virt (DT)
[   33.318501] Call trace:
[   33.318582]  show_stack+0x20/0x38 (C)
[   33.318669]  dump_stack_lvl+0x8c/0xd0
[   33.318722]  print_report+0x118/0x5d0
[   33.318829]  kasan_report+0xdc/0x128
[   33.318895]  __asan_report_load8_noabort+0x20/0x30
[   33.318946]  kasan_atomics_helper+0x3e20/0x4858
[   33.319280]  kasan_atomics+0x198/0x2e0
[   33.319357]  kunit_try_run_case+0x170/0x3f0
[   33.319523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.319591]  kthread+0x328/0x630
[   33.319636]  ret_from_fork+0x10/0x20
[   33.319921] 
[   33.320044] Allocated by task 296:
[   33.320249]  kasan_save_stack+0x3c/0x68
[   33.320444]  kasan_save_track+0x20/0x40
[   33.320500]  kasan_save_alloc_info+0x40/0x58
[   33.320572]  __kasan_kmalloc+0xd4/0xd8
[   33.320621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.320802]  kasan_atomics+0xb8/0x2e0
[   33.320858]  kunit_try_run_case+0x170/0x3f0
[   33.321008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.321062]  kthread+0x328/0x630
[   33.321230]  ret_from_fork+0x10/0x20
[   33.321285] 
[   33.321461] The buggy address belongs to the object at fff00000c91a4d80
[   33.321461]  which belongs to the cache kmalloc-64 of size 64
[   33.321580] The buggy address is located 0 bytes to the right of
[   33.321580]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.321872] 
[   33.321923] The buggy address belongs to the physical page:
[   33.321977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.322090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.322178] page_type: f5(slab)
[   33.322545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.322647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.322753] page dumped because: kasan: bad access detected
[   33.322786] 
[   33.322806] Memory state around the buggy address:
[   33.323026]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.323215]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.323272] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.323313]                                      ^
[   33.323357]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.323435]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.323493] ==================================================================
[   33.162193] ==================================================================
[   33.162252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.162304] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.162378] 
[   33.162411] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.162508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.162539] Hardware name: linux,dummy-virt (DT)
[   33.162573] Call trace:
[   33.162596]  show_stack+0x20/0x38 (C)
[   33.162647]  dump_stack_lvl+0x8c/0xd0
[   33.162694]  print_report+0x118/0x5d0
[   33.162740]  kasan_report+0xdc/0x128
[   33.162786]  kasan_check_range+0x100/0x1a8
[   33.162833]  __kasan_check_write+0x20/0x30
[   33.162901]  kasan_atomics_helper+0x1058/0x4858
[   33.162956]  kasan_atomics+0x198/0x2e0
[   33.163003]  kunit_try_run_case+0x170/0x3f0
[   33.163059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.163116]  kthread+0x328/0x630
[   33.163159]  ret_from_fork+0x10/0x20
[   33.163209] 
[   33.163240] Allocated by task 296:
[   33.163270]  kasan_save_stack+0x3c/0x68
[   33.163316]  kasan_save_track+0x20/0x40
[   33.163523]  kasan_save_alloc_info+0x40/0x58
[   33.163699]  __kasan_kmalloc+0xd4/0xd8
[   33.163751]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.164179]  kasan_atomics+0xb8/0x2e0
[   33.164247]  kunit_try_run_case+0x170/0x3f0
[   33.164301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.164637]  kthread+0x328/0x630
[   33.164706]  ret_from_fork+0x10/0x20
[   33.164749] 
[   33.164955] The buggy address belongs to the object at fff00000c91a4d80
[   33.164955]  which belongs to the cache kmalloc-64 of size 64
[   33.165045] The buggy address is located 0 bytes to the right of
[   33.165045]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.165125] 
[   33.165559] The buggy address belongs to the physical page:
[   33.165654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.165734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.165792] page_type: f5(slab)
[   33.165835] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.165894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.166388] page dumped because: kasan: bad access detected
[   33.166531] 
[   33.166569] Memory state around the buggy address:
[   33.166854]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.167179]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.167417] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.167541]                                      ^
[   33.167616]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.167759]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.167814] ==================================================================
[   33.076348] ==================================================================
[   33.076410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.076739] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.076820] 
[   33.077277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.077654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.077709] Hardware name: linux,dummy-virt (DT)
[   33.077763] Call trace:
[   33.078201]  show_stack+0x20/0x38 (C)
[   33.078319]  dump_stack_lvl+0x8c/0xd0
[   33.078579]  print_report+0x118/0x5d0
[   33.078668]  kasan_report+0xdc/0x128
[   33.078740]  __asan_report_load4_noabort+0x20/0x30
[   33.078877]  kasan_atomics_helper+0x3dd8/0x4858
[   33.078940]  kasan_atomics+0x198/0x2e0
[   33.079255]  kunit_try_run_case+0x170/0x3f0
[   33.079576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.079743]  kthread+0x328/0x630
[   33.079832]  ret_from_fork+0x10/0x20
[   33.080241] 
[   33.080305] Allocated by task 296:
[   33.080570]  kasan_save_stack+0x3c/0x68
[   33.080781]  kasan_save_track+0x20/0x40
[   33.080861]  kasan_save_alloc_info+0x40/0x58
[   33.081127]  __kasan_kmalloc+0xd4/0xd8
[   33.081211]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.081523]  kasan_atomics+0xb8/0x2e0
[   33.081663]  kunit_try_run_case+0x170/0x3f0
[   33.081750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.081898]  kthread+0x328/0x630
[   33.081939]  ret_from_fork+0x10/0x20
[   33.081978] 
[   33.082133] The buggy address belongs to the object at fff00000c91a4d80
[   33.082133]  which belongs to the cache kmalloc-64 of size 64
[   33.082343] The buggy address is located 0 bytes to the right of
[   33.082343]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.082512] 
[   33.082572] The buggy address belongs to the physical page:
[   33.082852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.083006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.083117] page_type: f5(slab)
[   33.083236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.083639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.083735] page dumped because: kasan: bad access detected
[   33.083807] 
[   33.083916] Memory state around the buggy address:
[   33.083994]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.084061]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.084106] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.084454]                                      ^
[   33.084532]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.084851]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.084980] ==================================================================
[   33.002857] ==================================================================
[   33.002923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.003080] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.003142] 
[   33.003178] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.003264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.003291] Hardware name: linux,dummy-virt (DT)
[   33.003553] Call trace:
[   33.003747]  show_stack+0x20/0x38 (C)
[   33.003929]  dump_stack_lvl+0x8c/0xd0
[   33.003993]  print_report+0x118/0x5d0
[   33.004038]  kasan_report+0xdc/0x128
[   33.004083]  kasan_check_range+0x100/0x1a8
[   33.004129]  __kasan_check_write+0x20/0x30
[   33.004252]  kasan_atomics_helper+0x99c/0x4858
[   33.004578]  kasan_atomics+0x198/0x2e0
[   33.004698]  kunit_try_run_case+0x170/0x3f0
[   33.004755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.004808]  kthread+0x328/0x630
[   33.004885]  ret_from_fork+0x10/0x20
[   33.004947] 
[   33.004969] Allocated by task 296:
[   33.005002]  kasan_save_stack+0x3c/0x68
[   33.005046]  kasan_save_track+0x20/0x40
[   33.005098]  kasan_save_alloc_info+0x40/0x58
[   33.005138]  __kasan_kmalloc+0xd4/0xd8
[   33.005187]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.005232]  kasan_atomics+0xb8/0x2e0
[   33.005281]  kunit_try_run_case+0x170/0x3f0
[   33.005340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.005690]  kthread+0x328/0x630
[   33.005771]  ret_from_fork+0x10/0x20
[   33.005849] 
[   33.005910] The buggy address belongs to the object at fff00000c91a4d80
[   33.005910]  which belongs to the cache kmalloc-64 of size 64
[   33.006017] The buggy address is located 0 bytes to the right of
[   33.006017]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.006085] 
[   33.006107] The buggy address belongs to the physical page:
[   33.006142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.006197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.006600] page_type: f5(slab)
[   33.006922] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.007055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.007139] page dumped because: kasan: bad access detected
[   33.007221] 
[   33.007264] Memory state around the buggy address:
[   33.007307]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.007592]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.007911] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.007987]                                      ^
[   33.008093]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.008203]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.008320] ==================================================================
[   33.010510] ==================================================================
[   33.010710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   33.010784] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.010838] 
[   33.011232] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.011357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.011388] Hardware name: linux,dummy-virt (DT)
[   33.011420] Call trace:
[   33.011456]  show_stack+0x20/0x38 (C)
[   33.011660]  kasan_check_range+0x100/0x1a8
[   33.011956]  kthread+0x328/0x630
[   33.013145]  kunit_try_run_case+0x170/0x3f0
[   33.013472] The buggy address is located 0 bytes to the right of
[   33.013472]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.013538] 
[   33.013559] The buggy address belongs to the physical page:
[   33.013596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.013873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.014021] page_type: f5(slab)
[   33.014435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.014613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.014704] page dumped because: kasan: bad access detected
[   33.014800] 
[   33.014870] Memory state around the buggy address:
[   33.014934]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.014982]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.015031] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.015373]                                      ^
[   33.015825]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.016194]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.016242] ==================================================================
[   33.092698] ==================================================================
[   33.092891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.092960] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.093481] 
[   33.093757] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.093886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.093919] Hardware name: linux,dummy-virt (DT)
[   33.093987] Call trace:
[   33.094410]  show_stack+0x20/0x38 (C)
[   33.094729]  dump_stack_lvl+0x8c/0xd0
[   33.094829]  print_report+0x118/0x5d0
[   33.094930]  kasan_report+0xdc/0x128
[   33.094981]  __asan_report_load4_noabort+0x20/0x30
[   33.095220]  kasan_atomics_helper+0x3e04/0x4858
[   33.095426]  kasan_atomics+0x198/0x2e0
[   33.095706]  kunit_try_run_case+0x170/0x3f0
[   33.095879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.095942]  kthread+0x328/0x630
[   33.095989]  ret_from_fork+0x10/0x20
[   33.096234] 
[   33.096358] Allocated by task 296:
[   33.096660]  kasan_save_stack+0x3c/0x68
[   33.096781]  kasan_save_track+0x20/0x40
[   33.096829]  kasan_save_alloc_info+0x40/0x58
[   33.096903]  __kasan_kmalloc+0xd4/0xd8
[   33.097354]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.097523]  kasan_atomics+0xb8/0x2e0
[   33.097606]  kunit_try_run_case+0x170/0x3f0
[   33.097748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.097818]  kthread+0x328/0x630
[   33.098147]  ret_from_fork+0x10/0x20
[   33.098228] 
[   33.098317] The buggy address belongs to the object at fff00000c91a4d80
[   33.098317]  which belongs to the cache kmalloc-64 of size 64
[   33.098585] The buggy address is located 0 bytes to the right of
[   33.098585]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.098789] 
[   33.098833] The buggy address belongs to the physical page:
[   33.098912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.099031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.099090] page_type: f5(slab)
[   33.099245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.099459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.099811] page dumped because: kasan: bad access detected
[   33.099857] 
[   33.099878] Memory state around the buggy address:
[   33.099929]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.099993]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.100054] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.100100]                                      ^
[   33.100139]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.100191]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.100238] ==================================================================
[   33.324390] ==================================================================
[   33.324447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   33.324500] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.324559] 
[   33.324594] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.324823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.324920] Hardware name: linux,dummy-virt (DT)
[   33.324967] Call trace:
[   33.325186]  show_stack+0x20/0x38 (C)
[   33.325257]  dump_stack_lvl+0x8c/0xd0
[   33.325307]  print_report+0x118/0x5d0
[   33.325364]  kasan_report+0xdc/0x128
[   33.325410]  kasan_check_range+0x100/0x1a8
[   33.325612]  __kasan_check_write+0x20/0x30
[   33.325777]  kasan_atomics_helper+0x17ec/0x4858
[   33.325839]  kasan_atomics+0x198/0x2e0
[   33.325887]  kunit_try_run_case+0x170/0x3f0
[   33.325936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.325988]  kthread+0x328/0x630
[   33.326033]  ret_from_fork+0x10/0x20
[   33.326416] 
[   33.326484] Allocated by task 296:
[   33.326672]  kasan_save_stack+0x3c/0x68
[   33.326848]  kasan_save_track+0x20/0x40
[   33.326932]  kasan_save_alloc_info+0x40/0x58
[   33.327109]  __kasan_kmalloc+0xd4/0xd8
[   33.327294]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.327371]  kasan_atomics+0xb8/0x2e0
[   33.327544]  kunit_try_run_case+0x170/0x3f0
[   33.327712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.327764]  kthread+0x328/0x630
[   33.327951]  ret_from_fork+0x10/0x20
[   33.328137] 
[   33.328191] The buggy address belongs to the object at fff00000c91a4d80
[   33.328191]  which belongs to the cache kmalloc-64 of size 64
[   33.328285] The buggy address is located 0 bytes to the right of
[   33.328285]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.328362] 
[   33.328386] The buggy address belongs to the physical page:
[   33.328419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.328475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.328526] page_type: f5(slab)
[   33.328567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.328619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.328673] page dumped because: kasan: bad access detected
[   33.328705] 
[   33.328736] Memory state around the buggy address:
[   33.328781]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.328825]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.328869] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.328924]                                      ^
[   33.328958]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.329026]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.329083] ==================================================================
[   33.177998] ==================================================================
[   33.178221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.178488] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.178585] 
[   33.178624] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.178904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.179080] Hardware name: linux,dummy-virt (DT)
[   33.179125] Call trace:
[   33.179151]  show_stack+0x20/0x38 (C)
[   33.179204]  dump_stack_lvl+0x8c/0xd0
[   33.179436]  print_report+0x118/0x5d0
[   33.179500]  kasan_report+0xdc/0x128
[   33.179547]  kasan_check_range+0x100/0x1a8
[   33.179601]  __kasan_check_write+0x20/0x30
[   33.179804]  kasan_atomics_helper+0x1128/0x4858
[   33.179889]  kasan_atomics+0x198/0x2e0
[   33.179939]  kunit_try_run_case+0x170/0x3f0
[   33.179999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.180051]  kthread+0x328/0x630
[   33.180148]  ret_from_fork+0x10/0x20
[   33.180201] 
[   33.180226] Allocated by task 296:
[   33.180259]  kasan_save_stack+0x3c/0x68
[   33.180306]  kasan_save_track+0x20/0x40
[   33.180358]  kasan_save_alloc_info+0x40/0x58
[   33.180398]  __kasan_kmalloc+0xd4/0xd8
[   33.180447]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.180502]  kasan_atomics+0xb8/0x2e0
[   33.180547]  kunit_try_run_case+0x170/0x3f0
[   33.180589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.180632]  kthread+0x328/0x630
[   33.180677]  ret_from_fork+0x10/0x20
[   33.180739] 
[   33.180769] The buggy address belongs to the object at fff00000c91a4d80
[   33.180769]  which belongs to the cache kmalloc-64 of size 64
[   33.180837] The buggy address is located 0 bytes to the right of
[   33.180837]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.180903] 
[   33.180926] The buggy address belongs to the physical page:
[   33.180958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.181012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.181062] page_type: f5(slab)
[   33.181101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.181153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.181192] page dumped because: kasan: bad access detected
[   33.181242] 
[   33.181262] Memory state around the buggy address:
[   33.181296]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.182178]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.182244] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.182307]                                      ^
[   33.182364]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.182439]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.182480] ==================================================================
[   33.264902] ==================================================================
[   33.264967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   33.265045] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.265099] 
[   33.265277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.265674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.265744] Hardware name: linux,dummy-virt (DT)
[   33.266124] Call trace:
[   33.266176]  show_stack+0x20/0x38 (C)
[   33.266251]  dump_stack_lvl+0x8c/0xd0
[   33.266384]  print_report+0x118/0x5d0
[   33.266433]  kasan_report+0xdc/0x128
[   33.266479]  kasan_check_range+0x100/0x1a8
[   33.266526]  __kasan_check_write+0x20/0x30
[   33.266573]  kasan_atomics_helper+0x15b4/0x4858
[   33.266624]  kasan_atomics+0x198/0x2e0
[   33.267034]  kunit_try_run_case+0x170/0x3f0
[   33.267225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.267427]  kthread+0x328/0x630
[   33.267620]  ret_from_fork+0x10/0x20
[   33.267692] 
[   33.267748] Allocated by task 296:
[   33.267932]  kasan_save_stack+0x3c/0x68
[   33.268215]  kasan_save_track+0x20/0x40
[   33.268395]  kasan_save_alloc_info+0x40/0x58
[   33.268574]  __kasan_kmalloc+0xd4/0xd8
[   33.268619]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.268697]  kasan_atomics+0xb8/0x2e0
[   33.269000]  kunit_try_run_case+0x170/0x3f0
[   33.269396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.269554]  kthread+0x328/0x630
[   33.269677]  ret_from_fork+0x10/0x20
[   33.269816] 
[   33.269841] The buggy address belongs to the object at fff00000c91a4d80
[   33.269841]  which belongs to the cache kmalloc-64 of size 64
[   33.269904] The buggy address is located 0 bytes to the right of
[   33.269904]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.269971] 
[   33.270129] The buggy address belongs to the physical page:
[   33.270273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.270593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.270976] page_type: f5(slab)
[   33.271131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.271184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.271358] page dumped because: kasan: bad access detected
[   33.271409] 
[   33.271447] Memory state around the buggy address:
[   33.271485]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.271542]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.271586] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.271632]                                      ^
[   33.271669]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.271722]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.271771] ==================================================================
[   33.140195] ==================================================================
[   33.140366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.140441] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.140502] 
[   33.140598] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.140715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.140748] Hardware name: linux,dummy-virt (DT)
[   33.140781] Call trace:
[   33.140959]  show_stack+0x20/0x38 (C)
[   33.141029]  dump_stack_lvl+0x8c/0xd0
[   33.141087]  print_report+0x118/0x5d0
[   33.141419]  kasan_report+0xdc/0x128
[   33.141493]  kasan_check_range+0x100/0x1a8
[   33.141731]  __kasan_check_write+0x20/0x30
[   33.142082]  kasan_atomics_helper+0xf20/0x4858
[   33.142175]  kasan_atomics+0x198/0x2e0
[   33.142358]  kunit_try_run_case+0x170/0x3f0
[   33.142416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.142758]  kthread+0x328/0x630
[   33.142843]  ret_from_fork+0x10/0x20
[   33.143139] 
[   33.143232] Allocated by task 296:
[   33.143347]  kasan_save_stack+0x3c/0x68
[   33.143437]  kasan_save_track+0x20/0x40
[   33.143500]  kasan_save_alloc_info+0x40/0x58
[   33.143811]  __kasan_kmalloc+0xd4/0xd8
[   33.143886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.143985]  kasan_atomics+0xb8/0x2e0
[   33.144174]  kunit_try_run_case+0x170/0x3f0
[   33.144348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.144479]  kthread+0x328/0x630
[   33.144593]  ret_from_fork+0x10/0x20
[   33.144634] 
[   33.144802] The buggy address belongs to the object at fff00000c91a4d80
[   33.144802]  which belongs to the cache kmalloc-64 of size 64
[   33.145028] The buggy address is located 0 bytes to the right of
[   33.145028]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.145402] 
[   33.145465] The buggy address belongs to the physical page:
[   33.145586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.145651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.145834] page_type: f5(slab)
[   33.145882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.146103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.146208] page dumped because: kasan: bad access detected
[   33.146275] 
[   33.146616] Memory state around the buggy address:
[   33.146716]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.146799]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.146934] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.147026]                                      ^
[   33.147084]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.147179]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.147255] ==================================================================
[   33.295634] ==================================================================
[   33.295976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   33.296159] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.296223] 
[   33.296259] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.296535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.296703] Hardware name: linux,dummy-virt (DT)
[   33.296843] Call trace:
[   33.296871]  show_stack+0x20/0x38 (C)
[   33.297045]  dump_stack_lvl+0x8c/0xd0
[   33.297108]  print_report+0x118/0x5d0
[   33.297155]  kasan_report+0xdc/0x128
[   33.297199]  kasan_check_range+0x100/0x1a8
[   33.297389]  __kasan_check_write+0x20/0x30
[   33.297493]  kasan_atomics_helper+0x16d0/0x4858
[   33.297715]  kasan_atomics+0x198/0x2e0
[   33.297777]  kunit_try_run_case+0x170/0x3f0
[   33.298127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.298208]  kthread+0x328/0x630
[   33.298461]  ret_from_fork+0x10/0x20
[   33.298655] 
[   33.298714] Allocated by task 296:
[   33.298848]  kasan_save_stack+0x3c/0x68
[   33.298899]  kasan_save_track+0x20/0x40
[   33.298941]  kasan_save_alloc_info+0x40/0x58
[   33.298992]  __kasan_kmalloc+0xd4/0xd8
[   33.299038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.299084]  kasan_atomics+0xb8/0x2e0
[   33.299133]  kunit_try_run_case+0x170/0x3f0
[   33.299176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.299229]  kthread+0x328/0x630
[   33.299274]  ret_from_fork+0x10/0x20
[   33.299344] 
[   33.299366] The buggy address belongs to the object at fff00000c91a4d80
[   33.299366]  which belongs to the cache kmalloc-64 of size 64
[   33.299637] The buggy address is located 0 bytes to the right of
[   33.299637]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.300001] 
[   33.300039] The buggy address belongs to the physical page:
[   33.300095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.300400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.300501] page_type: f5(slab)
[   33.300739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.300812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.300885] page dumped because: kasan: bad access detected
[   33.300919] 
[   33.301363] Memory state around the buggy address:
[   33.301433]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.301769]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.301915] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.302032]                                      ^
[   33.302099]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.302163]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.302318] ==================================================================
[   33.256978] ==================================================================
[   33.257091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   33.257301] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.257450] 
[   33.257513] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.257685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.257734] Hardware name: linux,dummy-virt (DT)
[   33.257802] Call trace:
[   33.257844]  show_stack+0x20/0x38 (C)
[   33.258126]  dump_stack_lvl+0x8c/0xd0
[   33.258286]  print_report+0x118/0x5d0
[   33.258550]  kasan_report+0xdc/0x128
[   33.258640]  kasan_check_range+0x100/0x1a8
[   33.258697]  __kasan_check_write+0x20/0x30
[   33.259140]  kasan_atomics_helper+0x154c/0x4858
[   33.259374]  kasan_atomics+0x198/0x2e0
[   33.259568]  kunit_try_run_case+0x170/0x3f0
[   33.259629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.259998]  kthread+0x328/0x630
[   33.260091]  ret_from_fork+0x10/0x20
[   33.260577] 
[   33.260611] Allocated by task 296:
[   33.260809]  kasan_save_stack+0x3c/0x68
[   33.261178]  kasan_save_track+0x20/0x40
[   33.262347]  kasan_save_alloc_info+0x40/0x58
[   33.262412]  __kasan_kmalloc+0xd4/0xd8
[   33.262455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.262502]  kasan_atomics+0xb8/0x2e0
[   33.262543]  kunit_try_run_case+0x170/0x3f0
[   33.262586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.262630]  kthread+0x328/0x630
[   33.262666]  ret_from_fork+0x10/0x20
[   33.262706] 
[   33.262729] The buggy address belongs to the object at fff00000c91a4d80
[   33.262729]  which belongs to the cache kmalloc-64 of size 64
[   33.262792] The buggy address is located 0 bytes to the right of
[   33.262792]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.262861] 
[   33.262884] The buggy address belongs to the physical page:
[   33.262920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.262975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.263031] page_type: f5(slab)
[   33.263074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.263124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.263167] page dumped because: kasan: bad access detected
[   33.263200] 
[   33.263220] Memory state around the buggy address:
[   33.263256]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.263300]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.263414] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.263481]                                      ^
[   33.263713]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.263774]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.263814] ==================================================================
[   33.119050] ==================================================================
[   33.119140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.119211] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.119281] 
[   33.119317] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.119427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.119565] Hardware name: linux,dummy-virt (DT)
[   33.119663] Call trace:
[   33.120105]  show_stack+0x20/0x38 (C)
[   33.120194]  dump_stack_lvl+0x8c/0xd0
[   33.120247]  print_report+0x118/0x5d0
[   33.120378]  kasan_report+0xdc/0x128
[   33.120432]  kasan_check_range+0x100/0x1a8
[   33.120483]  __kasan_check_write+0x20/0x30
[   33.120693]  kasan_atomics_helper+0xe44/0x4858
[   33.120764]  kasan_atomics+0x198/0x2e0
[   33.121151]  kunit_try_run_case+0x170/0x3f0
[   33.121238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.121296]  kthread+0x328/0x630
[   33.121352]  ret_from_fork+0x10/0x20
[   33.121511] 
[   33.121717] Allocated by task 296:
[   33.121783]  kasan_save_stack+0x3c/0x68
[   33.122112]  kasan_save_track+0x20/0x40
[   33.122236]  kasan_save_alloc_info+0x40/0x58
[   33.122294]  __kasan_kmalloc+0xd4/0xd8
[   33.122450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.122505]  kasan_atomics+0xb8/0x2e0
[   33.122615]  kunit_try_run_case+0x170/0x3f0
[   33.122797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.122906]  kthread+0x328/0x630
[   33.123198]  ret_from_fork+0x10/0x20
[   33.123279] 
[   33.123350] The buggy address belongs to the object at fff00000c91a4d80
[   33.123350]  which belongs to the cache kmalloc-64 of size 64
[   33.123434] The buggy address is located 0 bytes to the right of
[   33.123434]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.123519] 
[   33.123813] The buggy address belongs to the physical page:
[   33.123876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.124258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.124379] page_type: f5(slab)
[   33.124494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.124592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.124960] page dumped because: kasan: bad access detected
[   33.125020] 
[   33.125071] Memory state around the buggy address:
[   33.125116]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.125177]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.125239] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.125285]                                      ^
[   33.125344]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.125634]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.125985] ==================================================================
[   33.287822] ==================================================================
[   33.288021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   33.288190] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.288253] 
[   33.288290] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.288511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.288546] Hardware name: linux,dummy-virt (DT)
[   33.288597] Call trace:
[   33.288624]  show_stack+0x20/0x38 (C)
[   33.288846]  dump_stack_lvl+0x8c/0xd0
[   33.288926]  print_report+0x118/0x5d0
[   33.288982]  kasan_report+0xdc/0x128
[   33.289029]  __asan_report_load8_noabort+0x20/0x30
[   33.289080]  kasan_atomics_helper+0x3df4/0x4858
[   33.289489]  kasan_atomics+0x198/0x2e0
[   33.289583]  kunit_try_run_case+0x170/0x3f0
[   33.289656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.289854]  kthread+0x328/0x630
[   33.289952]  ret_from_fork+0x10/0x20
[   33.290033] 
[   33.290229] Allocated by task 296:
[   33.290412]  kasan_save_stack+0x3c/0x68
[   33.290682]  kasan_save_track+0x20/0x40
[   33.290843]  kasan_save_alloc_info+0x40/0x58
[   33.290926]  __kasan_kmalloc+0xd4/0xd8
[   33.291153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.291330]  kasan_atomics+0xb8/0x2e0
[   33.291403]  kunit_try_run_case+0x170/0x3f0
[   33.291755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.291848]  kthread+0x328/0x630
[   33.292054]  ret_from_fork+0x10/0x20
[   33.292175] 
[   33.292295] The buggy address belongs to the object at fff00000c91a4d80
[   33.292295]  which belongs to the cache kmalloc-64 of size 64
[   33.292530] The buggy address is located 0 bytes to the right of
[   33.292530]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.292605] 
[   33.292629] The buggy address belongs to the physical page:
[   33.292807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.293150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.293309] page_type: f5(slab)
[   33.293503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.293706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.293772] page dumped because: kasan: bad access detected
[   33.293807] 
[   33.293841] Memory state around the buggy address:
[   33.293884]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.294243]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.294334] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.294391]                                      ^
[   33.294442]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.294849]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.295005] ==================================================================
[   33.101559] ==================================================================
[   33.101682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.101817] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.101984] 
[   33.102023] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.102391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.102449] Hardware name: linux,dummy-virt (DT)
[   33.102520] Call trace:
[   33.102592]  show_stack+0x20/0x38 (C)
[   33.102669]  dump_stack_lvl+0x8c/0xd0
[   33.102976]  print_report+0x118/0x5d0
[   33.103069]  kasan_report+0xdc/0x128
[   33.103130]  kasan_check_range+0x100/0x1a8
[   33.103180]  __kasan_check_read+0x20/0x30
[   33.103535]  kasan_atomics_helper+0xdd4/0x4858
[   33.103847]  kasan_atomics+0x198/0x2e0
[   33.104011]  kunit_try_run_case+0x170/0x3f0
[   33.104088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.104428]  kthread+0x328/0x630
[   33.104507]  ret_from_fork+0x10/0x20
[   33.104820] 
[   33.104872] Allocated by task 296:
[   33.105002]  kasan_save_stack+0x3c/0x68
[   33.105057]  kasan_save_track+0x20/0x40
[   33.105126]  kasan_save_alloc_info+0x40/0x58
[   33.105169]  __kasan_kmalloc+0xd4/0xd8
[   33.105212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.105575]  kasan_atomics+0xb8/0x2e0
[   33.105849]  kunit_try_run_case+0x170/0x3f0
[   33.105905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.105955]  kthread+0x328/0x630
[   33.106004]  ret_from_fork+0x10/0x20
[   33.106198] 
[   33.106248] The buggy address belongs to the object at fff00000c91a4d80
[   33.106248]  which belongs to the cache kmalloc-64 of size 64
[   33.106418] The buggy address is located 0 bytes to the right of
[   33.106418]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.106536] 
[   33.106796] The buggy address belongs to the physical page:
[   33.106888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.107109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.107278] page_type: f5(slab)
[   33.107637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.107780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.107868] page dumped because: kasan: bad access detected
[   33.107956] 
[   33.107979] Memory state around the buggy address:
[   33.108028]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.108084]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.108137] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.108184]                                      ^
[   33.108221]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.108272]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.108338] ==================================================================
[   33.280380] ==================================================================
[   33.280461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   33.280516] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.280576] 
[   33.280611] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.280698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.280733] Hardware name: linux,dummy-virt (DT)
[   33.280765] Call trace:
[   33.280792]  show_stack+0x20/0x38 (C)
[   33.280846]  dump_stack_lvl+0x8c/0xd0
[   33.280896]  print_report+0x118/0x5d0
[   33.280942]  kasan_report+0xdc/0x128
[   33.280987]  kasan_check_range+0x100/0x1a8
[   33.281044]  __kasan_check_write+0x20/0x30
[   33.281091]  kasan_atomics_helper+0x1644/0x4858
[   33.281142]  kasan_atomics+0x198/0x2e0
[   33.281189]  kunit_try_run_case+0x170/0x3f0
[   33.281248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.281306]  kthread+0x328/0x630
[   33.281362]  ret_from_fork+0x10/0x20
[   33.282397] 
[   33.282453] Allocated by task 296:
[   33.282531]  kasan_save_stack+0x3c/0x68
[   33.282580]  kasan_save_track+0x20/0x40
[   33.282631]  kasan_save_alloc_info+0x40/0x58
[   33.282672]  __kasan_kmalloc+0xd4/0xd8
[   33.282762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.283063]  kasan_atomics+0xb8/0x2e0
[   33.283184]  kunit_try_run_case+0x170/0x3f0
[   33.283596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.283659]  kthread+0x328/0x630
[   33.283697]  ret_from_fork+0x10/0x20
[   33.284016] 
[   33.284227] The buggy address belongs to the object at fff00000c91a4d80
[   33.284227]  which belongs to the cache kmalloc-64 of size 64
[   33.284400] The buggy address is located 0 bytes to the right of
[   33.284400]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.284539] 
[   33.284757] The buggy address belongs to the physical page:
[   33.284918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.285048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.285136] page_type: f5(slab)
[   33.285442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.285604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.285911] page dumped because: kasan: bad access detected
[   33.286002] 
[   33.286051] Memory state around the buggy address:
[   33.286165]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.286270]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.286376] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.286734]                                      ^
[   33.286882]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.287077]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.287168] ==================================================================
[   33.302747] ==================================================================
[   33.302883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   33.302946] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.303289] 
[   33.303477] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.303680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.303751] Hardware name: linux,dummy-virt (DT)
[   33.303786] Call trace:
[   33.303834]  show_stack+0x20/0x38 (C)
[   33.303889]  dump_stack_lvl+0x8c/0xd0
[   33.304176]  print_report+0x118/0x5d0
[   33.304335]  kasan_report+0xdc/0x128
[   33.304403]  __asan_report_load8_noabort+0x20/0x30
[   33.304624]  kasan_atomics_helper+0x3e10/0x4858
[   33.304693]  kasan_atomics+0x198/0x2e0
[   33.304742]  kunit_try_run_case+0x170/0x3f0
[   33.304805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.305031]  kthread+0x328/0x630
[   33.305092]  ret_from_fork+0x10/0x20
[   33.305143] 
[   33.305165] Allocated by task 296:
[   33.305195]  kasan_save_stack+0x3c/0x68
[   33.305240]  kasan_save_track+0x20/0x40
[   33.305281]  kasan_save_alloc_info+0x40/0x58
[   33.305341]  __kasan_kmalloc+0xd4/0xd8
[   33.305608]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.305691]  kasan_atomics+0xb8/0x2e0
[   33.305899]  kunit_try_run_case+0x170/0x3f0
[   33.305952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.305997]  kthread+0x328/0x630
[   33.306492]  ret_from_fork+0x10/0x20
[   33.306634] 
[   33.306702] The buggy address belongs to the object at fff00000c91a4d80
[   33.306702]  which belongs to the cache kmalloc-64 of size 64
[   33.306811] The buggy address is located 0 bytes to the right of
[   33.306811]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.306929] 
[   33.307572] The buggy address belongs to the physical page:
[   33.307628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.307710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.307764] page_type: f5(slab)
[   33.307807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.308035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.308083] page dumped because: kasan: bad access detected
[   33.308395] 
[   33.308571] Memory state around the buggy address:
[   33.308635]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.308691]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.308811] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.308926]                                      ^
[   33.309235]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.309415]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.309491] ==================================================================
[   33.147869] ==================================================================
[   33.148042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.148126] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.148187] 
[   33.148219] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.148335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.148375] Hardware name: linux,dummy-virt (DT)
[   33.148412] Call trace:
[   33.148435]  show_stack+0x20/0x38 (C)
[   33.148486]  dump_stack_lvl+0x8c/0xd0
[   33.148546]  print_report+0x118/0x5d0
[   33.148592]  kasan_report+0xdc/0x128
[   33.148636]  kasan_check_range+0x100/0x1a8
[   33.148686]  __kasan_check_write+0x20/0x30
[   33.148742]  kasan_atomics_helper+0xf88/0x4858
[   33.148801]  kasan_atomics+0x198/0x2e0
[   33.148851]  kunit_try_run_case+0x170/0x3f0
[   33.148903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.148959]  kthread+0x328/0x630
[   33.149014]  ret_from_fork+0x10/0x20
[   33.149063] 
[   33.149085] Allocated by task 296:
[   33.149115]  kasan_save_stack+0x3c/0x68
[   33.149161]  kasan_save_track+0x20/0x40
[   33.149204]  kasan_save_alloc_info+0x40/0x58
[   33.149246]  __kasan_kmalloc+0xd4/0xd8
[   33.149286]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.149343]  kasan_atomics+0xb8/0x2e0
[   33.150104]  kunit_try_run_case+0x170/0x3f0
[   33.150165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.150215]  kthread+0x328/0x630
[   33.150252]  ret_from_fork+0x10/0x20
[   33.150314] 
[   33.150514] The buggy address belongs to the object at fff00000c91a4d80
[   33.150514]  which belongs to the cache kmalloc-64 of size 64
[   33.150769] The buggy address is located 0 bytes to the right of
[   33.150769]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.151176] 
[   33.151219] The buggy address belongs to the physical page:
[   33.151259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.151728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.152187] page_type: f5(slab)
[   33.152441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.152524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.152759] page dumped because: kasan: bad access detected
[   33.152894] 
[   33.152940] Memory state around the buggy address:
[   33.153051]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.153136]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.153525] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.153597]                                      ^
[   33.153697]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.153780]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.153850] ==================================================================
[   33.133773] ==================================================================
[   33.133838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.133894] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.133953] 
[   33.134277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.134637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.134800] Hardware name: linux,dummy-virt (DT)
[   33.134845] Call trace:
[   33.134872]  show_stack+0x20/0x38 (C)
[   33.134928]  dump_stack_lvl+0x8c/0xd0
[   33.135074]  print_report+0x118/0x5d0
[   33.135128]  kasan_report+0xdc/0x128
[   33.135240]  kasan_check_range+0x100/0x1a8
[   33.135295]  __kasan_check_write+0x20/0x30
[   33.135356]  kasan_atomics_helper+0xeb8/0x4858
[   33.135427]  kasan_atomics+0x198/0x2e0
[   33.135479]  kunit_try_run_case+0x170/0x3f0
[   33.135804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.136177]  kthread+0x328/0x630
[   33.136248]  ret_from_fork+0x10/0x20
[   33.136668] 
[   33.136706] Allocated by task 296:
[   33.136742]  kasan_save_stack+0x3c/0x68
[   33.136793]  kasan_save_track+0x20/0x40
[   33.136853]  kasan_save_alloc_info+0x40/0x58
[   33.136898]  __kasan_kmalloc+0xd4/0xd8
[   33.137085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.137264]  kasan_atomics+0xb8/0x2e0
[   33.137320]  kunit_try_run_case+0x170/0x3f0
[   33.137376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.137424]  kthread+0x328/0x630
[   33.137460]  ret_from_fork+0x10/0x20
[   33.137500] 
[   33.137525] The buggy address belongs to the object at fff00000c91a4d80
[   33.137525]  which belongs to the cache kmalloc-64 of size 64
[   33.137660] The buggy address is located 0 bytes to the right of
[   33.137660]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.137744] 
[   33.137768] The buggy address belongs to the physical page:
[   33.137804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.137875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.137930] page_type: f5(slab)
[   33.137989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.138058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.138114] page dumped because: kasan: bad access detected
[   33.138152] 
[   33.138178] Memory state around the buggy address:
[   33.138215]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.138267]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.138317] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.138973]                                      ^
[   33.139081]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.139174]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.139222] ==================================================================
[   33.310031] ==================================================================
[   33.310084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   33.310373] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.310768] 
[   33.310814] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.310905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.310933] Hardware name: linux,dummy-virt (DT)
[   33.311082] Call trace:
[   33.311141]  show_stack+0x20/0x38 (C)
[   33.311195]  dump_stack_lvl+0x8c/0xd0
[   33.311610]  print_report+0x118/0x5d0
[   33.311677]  kasan_report+0xdc/0x128
[   33.311995]  kasan_check_range+0x100/0x1a8
[   33.312073]  __kasan_check_write+0x20/0x30
[   33.312349]  kasan_atomics_helper+0x175c/0x4858
[   33.312522]  kasan_atomics+0x198/0x2e0
[   33.312759]  kunit_try_run_case+0x170/0x3f0
[   33.313004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.313095]  kthread+0x328/0x630
[   33.313283]  ret_from_fork+0x10/0x20
[   33.313358] 
[   33.313380] Allocated by task 296:
[   33.313547]  kasan_save_stack+0x3c/0x68
[   33.313702]  kasan_save_track+0x20/0x40
[   33.313779]  kasan_save_alloc_info+0x40/0x58
[   33.313935]  __kasan_kmalloc+0xd4/0xd8
[   33.314122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.314176]  kasan_atomics+0xb8/0x2e0
[   33.314218]  kunit_try_run_case+0x170/0x3f0
[   33.314262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.314307]  kthread+0x328/0x630
[   33.314648]  ret_from_fork+0x10/0x20
[   33.314748] 
[   33.314809] The buggy address belongs to the object at fff00000c91a4d80
[   33.314809]  which belongs to the cache kmalloc-64 of size 64
[   33.315031] The buggy address is located 0 bytes to the right of
[   33.315031]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.315354] 
[   33.315561] The buggy address belongs to the physical page:
[   33.315613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.315797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.315987] page_type: f5(slab)
[   33.316035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.316199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.316245] page dumped because: kasan: bad access detected
[   33.316279] 
[   33.316434] Memory state around the buggy address:
[   33.316477]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.316560]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.316614] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.316672]                                      ^
[   33.316709]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.316761]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.316811] ==================================================================
[   33.154923] ==================================================================
[   33.155018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.155202] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.155401] 
[   33.155447] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.155859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.155994] Hardware name: linux,dummy-virt (DT)
[   33.156060] Call trace:
[   33.156108]  show_stack+0x20/0x38 (C)
[   33.156172]  dump_stack_lvl+0x8c/0xd0
[   33.156502]  print_report+0x118/0x5d0
[   33.156633]  kasan_report+0xdc/0x128
[   33.156711]  kasan_check_range+0x100/0x1a8
[   33.156813]  __kasan_check_write+0x20/0x30
[   33.156868]  kasan_atomics_helper+0xff0/0x4858
[   33.156956]  kasan_atomics+0x198/0x2e0
[   33.157013]  kunit_try_run_case+0x170/0x3f0
[   33.157065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.157531]  kthread+0x328/0x630
[   33.157719]  ret_from_fork+0x10/0x20
[   33.157868] 
[   33.157895] Allocated by task 296:
[   33.157928]  kasan_save_stack+0x3c/0x68
[   33.157997]  kasan_save_track+0x20/0x40
[   33.158047]  kasan_save_alloc_info+0x40/0x58
[   33.158348]  __kasan_kmalloc+0xd4/0xd8
[   33.158529]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.158705]  kasan_atomics+0xb8/0x2e0
[   33.158782]  kunit_try_run_case+0x170/0x3f0
[   33.158918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.158990]  kthread+0x328/0x630
[   33.159034]  ret_from_fork+0x10/0x20
[   33.159336] 
[   33.159414] The buggy address belongs to the object at fff00000c91a4d80
[   33.159414]  which belongs to the cache kmalloc-64 of size 64
[   33.159621] The buggy address is located 0 bytes to the right of
[   33.159621]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.159847] 
[   33.159892] The buggy address belongs to the physical page:
[   33.159931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.159997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.160394] page_type: f5(slab)
[   33.160448] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.160742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.160885] page dumped because: kasan: bad access detected
[   33.160958] 
[   33.161064] Memory state around the buggy address:
[   33.161147]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.161233]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.161579] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.161719]                                      ^
[   33.161802]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.161868]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.161952] ==================================================================
[   33.026543] ==================================================================
[   33.026663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.026725] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.026793] 
[   33.027002] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.027118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.027268] Hardware name: linux,dummy-virt (DT)
[   33.027312] Call trace:
[   33.027349]  show_stack+0x20/0x38 (C)
[   33.027404]  dump_stack_lvl+0x8c/0xd0
[   33.027453]  print_report+0x118/0x5d0
[   33.027507]  kasan_report+0xdc/0x128
[   33.027664]  kasan_atomics_helper+0xad4/0x4858
[   33.028050]  kasan_save_stack+0x3c/0x68
[   33.028571] The buggy address is located 0 bytes to the right of
[   33.028571]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.028644] 
[   33.028668] The buggy address belongs to the physical page:
[   33.028708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.028761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.028821] page_type: f5(slab)
[   33.028862] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.028916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.028967] page dumped because: kasan: bad access detected
[   33.029001] 
[   33.029020] Memory state around the buggy address:
[   33.029052]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.029106]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.029152] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.029195]                                      ^
[   33.029230]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.029274]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.030589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.031375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.032917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.034616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.035613] 
[   33.035658] The buggy address belongs to the physical page:
[   33.036427] page dumped because: kasan: bad access detected
[   33.036909]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.037587] ==================================================================
[   33.183537] ==================================================================
[   33.183592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   33.183718] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.183794] 
[   33.183839] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.184212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.184274] Hardware name: linux,dummy-virt (DT)
[   33.184310] Call trace:
[   33.184344]  show_stack+0x20/0x38 (C)
[   33.184400]  dump_stack_lvl+0x8c/0xd0
[   33.184445]  print_report+0x118/0x5d0
[   33.184490]  kasan_report+0xdc/0x128
[   33.184797]  kasan_check_range+0x100/0x1a8
[   33.184947]  __kasan_check_write+0x20/0x30
[   33.185044]  kasan_atomics_helper+0x1190/0x4858
[   33.185109]  kasan_atomics+0x198/0x2e0
[   33.185160]  kunit_try_run_case+0x170/0x3f0
[   33.185454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.185611]  kthread+0x328/0x630
[   33.186047]  ret_from_fork+0x10/0x20
[   33.186183] 
[   33.186208] Allocated by task 296:
[   33.186240]  kasan_save_stack+0x3c/0x68
[   33.186469]  kasan_save_track+0x20/0x40
[   33.186651]  kasan_save_alloc_info+0x40/0x58
[   33.186735]  __kasan_kmalloc+0xd4/0xd8
[   33.186933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.187105]  kasan_atomics+0xb8/0x2e0
[   33.187188]  kunit_try_run_case+0x170/0x3f0
[   33.187261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.187475]  kthread+0x328/0x630
[   33.187645]  ret_from_fork+0x10/0x20
[   33.187721] 
[   33.187908] The buggy address belongs to the object at fff00000c91a4d80
[   33.187908]  which belongs to the cache kmalloc-64 of size 64
[   33.188018] The buggy address is located 0 bytes to the right of
[   33.188018]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.188204] 
[   33.188533] The buggy address belongs to the physical page:
[   33.188602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.188825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.189051] page_type: f5(slab)
[   33.189110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.189488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.189647] page dumped because: kasan: bad access detected
[   33.189717] 
[   33.190006] Memory state around the buggy address:
[   33.190053]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.190237]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.190425] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.190815]                                      ^
[   33.190922]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.191086]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.191156] ==================================================================
[   33.168707] ==================================================================
[   33.169063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.169220] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.169306] 
[   33.169352] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.169580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.169718] Hardware name: linux,dummy-virt (DT)
[   33.169795] Call trace:
[   33.169828]  show_stack+0x20/0x38 (C)
[   33.170058]  dump_stack_lvl+0x8c/0xd0
[   33.170229]  print_report+0x118/0x5d0
[   33.170459]  kasan_report+0xdc/0x128
[   33.170636]  kasan_check_range+0x100/0x1a8
[   33.170720]  __kasan_check_write+0x20/0x30
[   33.170911]  kasan_atomics_helper+0x10c0/0x4858
[   33.171104]  kasan_atomics+0x198/0x2e0
[   33.171185]  kunit_try_run_case+0x170/0x3f0
[   33.171541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.171635]  kthread+0x328/0x630
[   33.171831]  ret_from_fork+0x10/0x20
[   33.172045] 
[   33.172089] Allocated by task 296:
[   33.172381]  kasan_save_stack+0x3c/0x68
[   33.172489]  kasan_save_track+0x20/0x40
[   33.172815]  kasan_save_alloc_info+0x40/0x58
[   33.173053]  __kasan_kmalloc+0xd4/0xd8
[   33.173196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.173368]  kasan_atomics+0xb8/0x2e0
[   33.173803]  kunit_try_run_case+0x170/0x3f0
[   33.173899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.174007]  kthread+0x328/0x630
[   33.174293]  ret_from_fork+0x10/0x20
[   33.174378] 
[   33.174560] The buggy address belongs to the object at fff00000c91a4d80
[   33.174560]  which belongs to the cache kmalloc-64 of size 64
[   33.174821] The buggy address is located 0 bytes to the right of
[   33.174821]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.175237] 
[   33.175274] The buggy address belongs to the physical page:
[   33.175464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.175542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.175651] page_type: f5(slab)
[   33.175736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.176197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.176345] page dumped because: kasan: bad access detected
[   33.176421] 
[   33.176475] Memory state around the buggy address:
[   33.176710]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.176951]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.177036] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.177137]                                      ^
[   33.177180]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.177240]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.177293] ==================================================================
[   33.200245] ==================================================================
[   33.200308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   33.200378] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.200630] 
[   33.200803] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.200903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.201219] Hardware name: linux,dummy-virt (DT)
[   33.201335] Call trace:
[   33.201449]  show_stack+0x20/0x38 (C)
[   33.201514]  dump_stack_lvl+0x8c/0xd0
[   33.201563]  print_report+0x118/0x5d0
[   33.201640]  kasan_report+0xdc/0x128
[   33.201769]  kasan_check_range+0x100/0x1a8
[   33.201820]  __kasan_check_write+0x20/0x30
[   33.201867]  kasan_atomics_helper+0x126c/0x4858
[   33.201925]  kasan_atomics+0x198/0x2e0
[   33.201972]  kunit_try_run_case+0x170/0x3f0
[   33.202420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.202528]  kthread+0x328/0x630
[   33.202908]  ret_from_fork+0x10/0x20
[   33.203376] 
[   33.203427] Allocated by task 296:
[   33.203491]  kasan_save_stack+0x3c/0x68
[   33.203719]  kasan_save_track+0x20/0x40
[   33.203889]  kasan_save_alloc_info+0x40/0x58
[   33.204188]  __kasan_kmalloc+0xd4/0xd8
[   33.204361]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.204618]  kasan_atomics+0xb8/0x2e0
[   33.204827]  kunit_try_run_case+0x170/0x3f0
[   33.204958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.205137]  kthread+0x328/0x630
[   33.205523]  ret_from_fork+0x10/0x20
[   33.205733] 
[   33.205785] The buggy address belongs to the object at fff00000c91a4d80
[   33.205785]  which belongs to the cache kmalloc-64 of size 64
[   33.206029] The buggy address is located 0 bytes to the right of
[   33.206029]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.206109] 
[   33.206140] The buggy address belongs to the physical page:
[   33.206175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.206234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.206506] page_type: f5(slab)
[   33.206593] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.206967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.207050] page dumped because: kasan: bad access detected
[   33.207192] 
[   33.207227] Memory state around the buggy address:
[   33.207262]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.207342]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.207398] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.207439]                                      ^
[   33.207475]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.207520]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.207627] ==================================================================
[   33.234714] ==================================================================
[   33.234778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   33.234865] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.235181] 
[   33.235311] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.235483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.235517] Hardware name: linux,dummy-virt (DT)
[   33.235595] Call trace:
[   33.235654]  show_stack+0x20/0x38 (C)
[   33.235728]  dump_stack_lvl+0x8c/0xd0
[   33.235821]  print_report+0x118/0x5d0
[   33.236005]  kasan_report+0xdc/0x128
[   33.236070]  kasan_check_range+0x100/0x1a8
[   33.236356]  __kasan_check_write+0x20/0x30
[   33.236427]  kasan_atomics_helper+0x1414/0x4858
[   33.236680]  kasan_atomics+0x198/0x2e0
[   33.236871]  kunit_try_run_case+0x170/0x3f0
[   33.236934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.237292]  kthread+0x328/0x630
[   33.237370]  ret_from_fork+0x10/0x20
[   33.237424] 
[   33.237446] Allocated by task 296:
[   33.237478]  kasan_save_stack+0x3c/0x68
[   33.237864]  kasan_save_track+0x20/0x40
[   33.238001]  kasan_save_alloc_info+0x40/0x58
[   33.238096]  __kasan_kmalloc+0xd4/0xd8
[   33.238344]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.238497]  kasan_atomics+0xb8/0x2e0
[   33.238690]  kunit_try_run_case+0x170/0x3f0
[   33.238867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.238939]  kthread+0x328/0x630
[   33.239351]  ret_from_fork+0x10/0x20
[   33.239437] 
[   33.239498] The buggy address belongs to the object at fff00000c91a4d80
[   33.239498]  which belongs to the cache kmalloc-64 of size 64
[   33.239565] The buggy address is located 0 bytes to the right of
[   33.239565]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.239868] 
[   33.240143] The buggy address belongs to the physical page:
[   33.240276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.240454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.240508] page_type: f5(slab)
[   33.240816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.240889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.240935] page dumped because: kasan: bad access detected
[   33.240982] 
[   33.241015] Memory state around the buggy address:
[   33.241052]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.241108]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.241197] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.241235]                                      ^
[   33.241272]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.241317]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.241373] ==================================================================
[   33.126611] ==================================================================
[   33.126678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.126734] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.126986] 
[   33.127141] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.127270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.127330] Hardware name: linux,dummy-virt (DT)
[   33.127366] Call trace:
[   33.127523]  show_stack+0x20/0x38 (C)
[   33.127704]  dump_stack_lvl+0x8c/0xd0
[   33.127767]  print_report+0x118/0x5d0
[   33.127860]  kasan_report+0xdc/0x128
[   33.127937]  __asan_report_store8_noabort+0x20/0x30
[   33.128063]  kasan_atomics_helper+0x3e5c/0x4858
[   33.128124]  kasan_atomics+0x198/0x2e0
[   33.128177]  kunit_try_run_case+0x170/0x3f0
[   33.128386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.128589]  kthread+0x328/0x630
[   33.128653]  ret_from_fork+0x10/0x20
[   33.128705] 
[   33.128765] Allocated by task 296:
[   33.128796]  kasan_save_stack+0x3c/0x68
[   33.128853]  kasan_save_track+0x20/0x40
[   33.128896]  kasan_save_alloc_info+0x40/0x58
[   33.128938]  __kasan_kmalloc+0xd4/0xd8
[   33.128979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.129029]  kasan_atomics+0xb8/0x2e0
[   33.129078]  kunit_try_run_case+0x170/0x3f0
[   33.129143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.129197]  kthread+0x328/0x630
[   33.129234]  ret_from_fork+0x10/0x20
[   33.129273] 
[   33.129295] The buggy address belongs to the object at fff00000c91a4d80
[   33.129295]  which belongs to the cache kmalloc-64 of size 64
[   33.129521] The buggy address is located 0 bytes to the right of
[   33.129521]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.130167] 
[   33.130229] The buggy address belongs to the physical page:
[   33.130339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.130606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.130808] page_type: f5(slab)
[   33.130999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.131225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.131502] page dumped because: kasan: bad access detected
[   33.131665] 
[   33.131950] Memory state around the buggy address:
[   33.132149]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.132267]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.132362] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.132419]                                      ^
[   33.132459]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.132663]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.132838] ==================================================================
[   33.192154] ==================================================================
[   33.192400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   33.192506] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.192842] 
[   33.192904] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.193013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.193043] Hardware name: linux,dummy-virt (DT)
[   33.193076] Call trace:
[   33.193260]  show_stack+0x20/0x38 (C)
[   33.193369]  dump_stack_lvl+0x8c/0xd0
[   33.193525]  print_report+0x118/0x5d0
[   33.193577]  kasan_report+0xdc/0x128
[   33.193623]  kasan_check_range+0x100/0x1a8
[   33.193884]  __kasan_check_write+0x20/0x30
[   33.194045]  kasan_atomics_helper+0x11f8/0x4858
[   33.194419]  kasan_atomics+0x198/0x2e0
[   33.194507]  kunit_try_run_case+0x170/0x3f0
[   33.194680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.194739]  kthread+0x328/0x630
[   33.195391]  ret_from_fork+0x10/0x20
[   33.195577] 
[   33.195629] Allocated by task 296:
[   33.195663]  kasan_save_stack+0x3c/0x68
[   33.195746]  kasan_save_track+0x20/0x40
[   33.196108]  kasan_save_alloc_info+0x40/0x58
[   33.196542]  __kasan_kmalloc+0xd4/0xd8
[   33.196643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.196692]  kasan_atomics+0xb8/0x2e0
[   33.196742]  kunit_try_run_case+0x170/0x3f0
[   33.196785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.196840]  kthread+0x328/0x630
[   33.196888]  ret_from_fork+0x10/0x20
[   33.196932] 
[   33.196957] The buggy address belongs to the object at fff00000c91a4d80
[   33.196957]  which belongs to the cache kmalloc-64 of size 64
[   33.197045] The buggy address is located 0 bytes to the right of
[   33.197045]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.197128] 
[   33.197151] The buggy address belongs to the physical page:
[   33.197194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.197262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.197316] page_type: f5(slab)
[   33.197372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.197443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.197487] page dumped because: kasan: bad access detected
[   33.197521] 
[   33.197541] Memory state around the buggy address:
[   33.198197]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.198274]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.198347] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.198590]                                      ^
[   33.198699]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.198783]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.198969] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   32.775843] ==================================================================
[   32.775925] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   32.776620]  show_stack+0x20/0x38 (C)
[   32.777060]  kunit_try_run_case+0x170/0x3f0
[   32.777957]  kasan_save_alloc_info+0x40/0x58
[   32.779516] The buggy address is located 8 bytes inside of
[   32.779516]  allocated 9-byte region [fff00000c63ef120, fff00000c63ef129)
[   32.781633] >fff00000c63ef100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.783922] Write of size 8 at addr fff00000c63ef128 by task kunit_try_catch/292
[   32.784813]  kasan_check_range+0x100/0x1a8
[   32.785071]  kunit_try_run_case+0x170/0x3f0
[   32.786720]  kasan_bitops_generic+0xa0/0x1c8
[   32.787923] 
[   32.788475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.789472]  fff00000c63ef080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.791990] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   32.793269]  kasan_report+0xdc/0x128
[   32.793581]  kasan_bitops_generic+0x11c/0x1c8
[   32.794000]  kasan_save_track+0x20/0x40
[   32.794523] The buggy address is located 8 bytes inside of
[   32.794523]  allocated 9-byte region [fff00000c63ef120, fff00000c63ef129)
[   32.796270]  fff00000c63ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.797977] 
[   32.798284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.799922]  __kasan_check_write+0x20/0x30
[   32.800455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.801744]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.803584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ef
[   32.804881]                                   ^
[   32.806191] ==================================================================
[   32.768128] ==================================================================
[   32.768619] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   32.769270] Hardware name: linux,dummy-virt (DT)
[   32.769889]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   32.770353]  kasan_save_track+0x20/0x40
[   32.771944] 
[   32.772189] The buggy address is located 8 bytes inside of
[   32.772189]  allocated 9-byte region [fff00000c63ef120, fff00000c63ef129)
[   32.774417] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   32.735381] ==================================================================
[   32.735996] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   32.736406]  dump_stack_lvl+0x8c/0xd0
[   32.736718]  kunit_try_run_case+0x170/0x3f0
[   32.736950] Allocated by task 292:
[   32.737149]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.737860] The buggy address belongs to the object at fff00000c63ef120
[   32.737860]  which belongs to the cache kmalloc-16 of size 16
[   32.740457]                                   ^
[   32.741313] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   32.742448] 
[   32.742669]  show_stack+0x20/0x38 (C)
[   32.743067]  kunit_try_run_case+0x170/0x3f0
[   32.743536]  kasan_bitops_generic+0xa0/0x1c8
[   32.743735] 
[   32.744081] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.748779] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   32.660206] ==================================================================
[   32.660462] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   32.660567] Read of size 1 at addr fff00000c99f7010 by task kunit_try_catch/290
[   32.660684] 
[   32.660755] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.660991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.661088] Hardware name: linux,dummy-virt (DT)
[   32.661127] Call trace:
[   32.661175]  show_stack+0x20/0x38 (C)
[   32.661249]  dump_stack_lvl+0x8c/0xd0
[   32.661395]  print_report+0x118/0x5d0
[   32.661464]  kasan_report+0xdc/0x128
[   32.662165]  kunit_try_run_case+0x170/0x3f0
[   32.663687]  kthread+0x328/0x630
[   32.664945]  kunit_try_run_case+0x170/0x3f0
[   32.665081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.665175]  kthread+0x328/0x630
[   32.665587] The buggy address is located 16 bytes inside of
[   32.665587]  freed 32-byte region [fff00000c99f7000, fff00000c99f7020)
[   32.666958]  fff00000c99f6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.670451] Hardware name: linux,dummy-virt (DT)
[   32.670907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.672186]  kthread+0x328/0x630
[   32.672221]  ret_from_fork+0x10/0x20
[   32.672313] 
[   32.672348] Freed by task 290:
[   32.672580]  __kasan_slab_free+0x6c/0x98
[   32.673226] 
[   32.673575] 
[   32.674389] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.676550] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   32.642611] ==================================================================
[   32.642919] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   32.643048] Read of size 1 at addr fff00000c9acbe58 by task kunit_try_catch/288
[   32.643107] 
[   32.643181] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.643280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.643521] Hardware name: linux,dummy-virt (DT)
[   32.643592] Call trace:
[   32.643885]  show_stack+0x20/0x38 (C)
[   32.643969]  dump_stack_lvl+0x8c/0xd0
[   32.644105]  print_report+0x118/0x5d0
[   32.644160]  kasan_report+0xdc/0x128
[   32.644205]  __asan_report_load1_noabort+0x20/0x30
[   32.644468]  memcmp+0x198/0x1d8
[   32.644550]  kasan_memcmp+0x16c/0x300
[   32.644610]  kunit_try_run_case+0x170/0x3f0
[   32.644709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.644795]  kthread+0x328/0x630
[   32.645001]  ret_from_fork+0x10/0x20
[   32.645084] 
[   32.645125] Allocated by task 288:
[   32.645160]  kasan_save_stack+0x3c/0x68
[   32.645206]  kasan_save_track+0x20/0x40
[   32.645341]  kasan_save_alloc_info+0x40/0x58
[   32.645476]  __kasan_kmalloc+0xd4/0xd8
[   32.645601]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.645649]  kasan_memcmp+0xbc/0x300
[   32.645690]  kunit_try_run_case+0x170/0x3f0
[   32.646032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.646118]  kthread+0x328/0x630
[   32.646267]  ret_from_fork+0x10/0x20
[   32.646379] 
[   32.646471] The buggy address belongs to the object at fff00000c9acbe40
[   32.646471]  which belongs to the cache kmalloc-32 of size 32
[   32.646553] The buggy address is located 0 bytes to the right of
[   32.646553]  allocated 24-byte region [fff00000c9acbe40, fff00000c9acbe58)
[   32.646731] 
[   32.646798] The buggy address belongs to the physical page:
[   32.646835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acb
[   32.646925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.647049] page_type: f5(slab)
[   32.647137] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.647282] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.647359] page dumped because: kasan: bad access detected
[   32.647606] 
[   32.647780] Memory state around the buggy address:
[   32.647860]  fff00000c9acbd00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.647944]  fff00000c9acbd80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   32.648215] >fff00000c9acbe00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.648283]                                                     ^
[   32.648421]  fff00000c9acbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.648505]  fff00000c9acbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.648590] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   32.621018] ==================================================================
[   32.621082] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   32.621166] Read of size 1 at addr ffff800080b27b4a by task kunit_try_catch/284
[   32.621220] 
[   32.621260] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.622269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.622373] Hardware name: linux,dummy-virt (DT)
[   32.622420] Call trace:
[   32.622502]  show_stack+0x20/0x38 (C)
[   32.622601]  dump_stack_lvl+0x8c/0xd0
[   32.622883]  print_report+0x310/0x5d0
[   32.622944]  kasan_report+0xdc/0x128
[   32.622995]  __asan_report_load1_noabort+0x20/0x30
[   32.623171]  kasan_alloca_oob_right+0x2dc/0x340
[   32.623340]  kunit_try_run_case+0x170/0x3f0
[   32.623435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.623526]  kthread+0x328/0x630
[   32.623667]  ret_from_fork+0x10/0x20
[   32.623774] 
[   32.623884] The buggy address belongs to stack of task kunit_try_catch/284
[   32.623974] 
[   32.624021] The buggy address ffff800080b27b4a belongs to a vmalloc virtual mapping
[   32.624205] The buggy address belongs to the physical page:
[   32.624248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   32.624384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.624511] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.624671] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.624782] page dumped because: kasan: bad access detected
[   32.624863] 
[   32.624913] Memory state around the buggy address:
[   32.625017]  ffff800080b27a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.625064]  ffff800080b27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.625134] >ffff800080b27b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   32.625317]                                               ^
[   32.625430]  ffff800080b27b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   32.625507]  ffff800080b27c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.625574] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   32.609890] ==================================================================
[   32.610094] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   32.610172] Read of size 1 at addr ffff800080b47b5f by task kunit_try_catch/282
[   32.610226] 
[   32.610441] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.610640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.610701] Hardware name: linux,dummy-virt (DT)
[   32.610807] Call trace:
[   32.610855]  show_stack+0x20/0x38 (C)
[   32.610951]  dump_stack_lvl+0x8c/0xd0
[   32.611060]  print_report+0x310/0x5d0
[   32.611300]  kasan_report+0xdc/0x128
[   32.611369]  __asan_report_load1_noabort+0x20/0x30
[   32.611814]  kasan_alloca_oob_left+0x2b8/0x310
[   32.611900]  kunit_try_run_case+0x170/0x3f0
[   32.612044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.612160]  kthread+0x328/0x630
[   32.612293]  ret_from_fork+0x10/0x20
[   32.612403] 
[   32.612458] The buggy address belongs to stack of task kunit_try_catch/282
[   32.612712] 
[   32.612744] The buggy address ffff800080b47b5f belongs to a vmalloc virtual mapping
[   32.612824] The buggy address belongs to the physical page:
[   32.612945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad7
[   32.613381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.613513] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.613679] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.613775] page dumped because: kasan: bad access detected
[   32.613844] 
[   32.613894] Memory state around the buggy address:
[   32.613961]  ffff800080b47a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.614008]  ffff800080b47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.614062] >ffff800080b47b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   32.614111]                                                     ^
[   32.614160]  ffff800080b47b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   32.614214]  ffff800080b47c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.614254] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   32.595252] ==================================================================
[   32.595500] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   32.595725] Read of size 1 at addr ffff800080b47c2a by task kunit_try_catch/280
[   32.595788] 
[   32.595849] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.595948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.595976] Hardware name: linux,dummy-virt (DT)
[   32.596011] Call trace:
[   32.596040]  show_stack+0x20/0x38 (C)
[   32.596150]  dump_stack_lvl+0x8c/0xd0
[   32.596206]  print_report+0x310/0x5d0
[   32.596250]  kasan_report+0xdc/0x128
[   32.596295]  __asan_report_load1_noabort+0x20/0x30
[   32.596538]  kasan_stack_oob+0x238/0x270
[   32.596669]  kunit_try_run_case+0x170/0x3f0
[   32.596757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.596812]  kthread+0x328/0x630
[   32.596924]  ret_from_fork+0x10/0x20
[   32.596979] 
[   32.597141] The buggy address belongs to stack of task kunit_try_catch/280
[   32.597510]  and is located at offset 138 in frame:
[   32.597605]  kasan_stack_oob+0x0/0x270
[   32.597970] 
[   32.598014] This frame has 4 objects:
[   32.598472]  [48, 49) '__assertion'
[   32.598671]  [64, 72) 'array'
[   32.598742]  [96, 112) '__assertion'
[   32.598989]  [128, 138) 'stack_array'
[   32.599275] 
[   32.599318] The buggy address ffff800080b47c2a belongs to a vmalloc virtual mapping
[   32.599569] The buggy address belongs to the physical page:
[   32.599635] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad7
[   32.599785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.599868] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.599997] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.600087] page dumped because: kasan: bad access detected
[   32.600167] 
[   32.600193] Memory state around the buggy address:
[   32.600616]  ffff800080b47b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.600671]  ffff800080b47b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   32.600749] >ffff800080b47c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   32.600829]                                   ^
[   32.600954]  ffff800080b47c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   32.601005]  ffff800080b47d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.601242] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   32.563951] ==================================================================
[   32.564062] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   32.564199] Read of size 1 at addr ffff93639574d6cd by task kunit_try_catch/276
[   32.564422] 
[   32.564661] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.564761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.564788] Hardware name: linux,dummy-virt (DT)
[   32.564869] Call trace:
[   32.564896]  show_stack+0x20/0x38 (C)
[   32.564981]  dump_stack_lvl+0x8c/0xd0
[   32.565253]  print_report+0x310/0x5d0
[   32.565335]  kasan_report+0xdc/0x128
[   32.566150]  __asan_report_load1_noabort+0x20/0x30
[   32.566253]  kasan_global_oob_right+0x230/0x270
[   32.566404]  kunit_try_run_case+0x170/0x3f0
[   32.566548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.566606]  kthread+0x328/0x630
[   32.566653]  ret_from_fork+0x10/0x20
[   32.567148] 
[   32.567553] The buggy address belongs to the variable:
[   32.567731]  global_array+0xd/0x40
[   32.568238] 
[   32.568402] The buggy address ffff93639574d6cd belongs to a vmalloc virtual mapping
[   32.568619] The buggy address belongs to the physical page:
[   32.568865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4d
[   32.569353] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   32.569544] raw: 03fffe0000002000 ffffc1ffc01f5348 ffffc1ffc01f5348 0000000000000000
[   32.569631] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.569729] page dumped because: kasan: bad access detected
[   32.569781] 
[   32.569830] Memory state around the buggy address:
[   32.569938]  ffff93639574d580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.570024]  ffff93639574d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.570139] >ffff93639574d680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   32.570200]                                               ^
[   32.570240]  ffff93639574d700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   32.570549]  ffff93639574d780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   32.570610] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   32.543440] ==================================================================
[   32.543755] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.543860] Free of addr fff00000c9b68001 by task kunit_try_catch/274
[   32.543906] 
[   32.544035] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.544126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.544153] Hardware name: linux,dummy-virt (DT)
[   32.544317] Call trace:
[   32.544423]  show_stack+0x20/0x38 (C)
[   32.544486]  dump_stack_lvl+0x8c/0xd0
[   32.544553]  print_report+0x118/0x5d0
[   32.544598]  kasan_report_invalid_free+0xc0/0xe8
[   32.544662]  __kasan_mempool_poison_object+0xfc/0x150
[   32.544715]  mempool_free+0x28c/0x328
[   32.544900]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.544960]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   32.545013]  kunit_try_run_case+0x170/0x3f0
[   32.545081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.545136]  kthread+0x328/0x630
[   32.545180]  ret_from_fork+0x10/0x20
[   32.545248] 
[   32.545291] The buggy address belongs to the physical page:
[   32.545334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b68
[   32.545433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.545485] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.545694] page_type: f8(unknown)
[   32.545788] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.545909] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.545994] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.546042] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.546131] head: 0bfffe0000000002 ffffc1ffc326da01 00000000ffffffff 00000000ffffffff
[   32.546254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.546388] page dumped because: kasan: bad access detected
[   32.546470] 
[   32.546518] Memory state around the buggy address:
[   32.546552]  fff00000c9b67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.546832]  fff00000c9b67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.546924] >fff00000c9b68000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.547012]                    ^
[   32.547077]  fff00000c9b68080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.547117]  fff00000c9b68100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.547213] ==================================================================
[   32.532365] ==================================================================
[   32.532558] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.532651] Free of addr fff00000c91a7101 by task kunit_try_catch/272
[   32.532703] 
[   32.532742] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.532830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.532867] Hardware name: linux,dummy-virt (DT)
[   32.532908] Call trace:
[   32.532932]  show_stack+0x20/0x38 (C)
[   32.532984]  dump_stack_lvl+0x8c/0xd0
[   32.533031]  print_report+0x118/0x5d0
[   32.533092]  kasan_report_invalid_free+0xc0/0xe8
[   32.533139]  check_slab_allocation+0xfc/0x108
[   32.533198]  __kasan_mempool_poison_object+0x78/0x150
[   32.533251]  mempool_free+0x28c/0x328
[   32.533297]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.533598]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.534117]  kunit_try_run_case+0x170/0x3f0
[   32.534219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.534284]  kthread+0x328/0x630
[   32.534343]  ret_from_fork+0x10/0x20
[   32.534393] 
[   32.534411] Allocated by task 272:
[   32.534442]  kasan_save_stack+0x3c/0x68
[   32.534485]  kasan_save_track+0x20/0x40
[   32.534525]  kasan_save_alloc_info+0x40/0x58
[   32.534563]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.534828]  remove_element+0x130/0x1f8
[   32.534906]  mempool_alloc_preallocated+0x58/0xc0
[   32.534979]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   32.535053]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.535105]  kunit_try_run_case+0x170/0x3f0
[   32.535174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.535255]  kthread+0x328/0x630
[   32.535319]  ret_from_fork+0x10/0x20
[   32.535416] 
[   32.535487] The buggy address belongs to the object at fff00000c91a7100
[   32.535487]  which belongs to the cache kmalloc-128 of size 128
[   32.535575] The buggy address is located 1 bytes inside of
[   32.535575]  128-byte region [fff00000c91a7100, fff00000c91a7180)
[   32.535656] 
[   32.535676] The buggy address belongs to the physical page:
[   32.535911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   32.536019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.536108] page_type: f5(slab)
[   32.536169] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.536254] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.536336] page dumped because: kasan: bad access detected
[   32.536713] 
[   32.536753] Memory state around the buggy address:
[   32.536805]  fff00000c91a7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.536849]  fff00000c91a7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.537067] >fff00000c91a7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.537220]                    ^
[   32.537294]  fff00000c91a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.537441]  fff00000c91a7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.537525] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   32.506805] ==================================================================
[   32.507177] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.507285] Free of addr fff00000c9b68000 by task kunit_try_catch/268
[   32.507345] 
[   32.507403] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.507492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.507518] Hardware name: linux,dummy-virt (DT)
[   32.507560] Call trace:
[   32.507586]  show_stack+0x20/0x38 (C)
[   32.507657]  dump_stack_lvl+0x8c/0xd0
[   32.507705]  print_report+0x118/0x5d0
[   32.507750]  kasan_report_invalid_free+0xc0/0xe8
[   32.507993]  __kasan_mempool_poison_object+0x14c/0x150
[   32.508056]  mempool_free+0x28c/0x328
[   32.508109]  mempool_double_free_helper+0x150/0x2e8
[   32.508179]  mempool_kmalloc_large_double_free+0xc0/0x118
[   32.508232]  kunit_try_run_case+0x170/0x3f0
[   32.508297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.508361]  kthread+0x328/0x630
[   32.508404]  ret_from_fork+0x10/0x20
[   32.508614] 
[   32.508702] The buggy address belongs to the physical page:
[   32.508753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b68
[   32.508828] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.508879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.508941] page_type: f8(unknown)
[   32.509018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.509083] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.509164] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.509217] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.509266] head: 0bfffe0000000002 ffffc1ffc326da01 00000000ffffffff 00000000ffffffff
[   32.509673] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.509798] page dumped because: kasan: bad access detected
[   32.509843] 
[   32.509861] Memory state around the buggy address:
[   32.509897]  fff00000c9b67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.509962]  fff00000c9b67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.510006] >fff00000c9b68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.510385]                    ^
[   32.510462]  fff00000c9b68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.510541]  fff00000c9b68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.510652] ==================================================================
[   32.492990] ==================================================================
[   32.493185] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.493255] Free of addr fff00000c99f0d00 by task kunit_try_catch/266
[   32.493469] 
[   32.493551] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.493675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.493735] Hardware name: linux,dummy-virt (DT)
[   32.493822] Call trace:
[   32.493882]  show_stack+0x20/0x38 (C)
[   32.494006]  dump_stack_lvl+0x8c/0xd0
[   32.494095]  print_report+0x118/0x5d0
[   32.494152]  kasan_report_invalid_free+0xc0/0xe8
[   32.494200]  check_slab_allocation+0xd4/0x108
[   32.494413]  __kasan_mempool_poison_object+0x78/0x150
[   32.494468]  mempool_free+0x28c/0x328
[   32.494581]  mempool_double_free_helper+0x150/0x2e8
[   32.494667]  mempool_kmalloc_double_free+0xc0/0x118
[   32.494770]  kunit_try_run_case+0x170/0x3f0
[   32.494844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.494946]  kthread+0x328/0x630
[   32.495009]  ret_from_fork+0x10/0x20
[   32.495066] 
[   32.495084] Allocated by task 266:
[   32.495267]  kasan_save_stack+0x3c/0x68
[   32.495337]  kasan_save_track+0x20/0x40
[   32.495398]  kasan_save_alloc_info+0x40/0x58
[   32.495504]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.495590]  remove_element+0x130/0x1f8
[   32.495637]  mempool_alloc_preallocated+0x58/0xc0
[   32.495676]  mempool_double_free_helper+0x94/0x2e8
[   32.495902]  mempool_kmalloc_double_free+0xc0/0x118
[   32.495990]  kunit_try_run_case+0x170/0x3f0
[   32.496032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.496305]  kthread+0x328/0x630
[   32.496429]  ret_from_fork+0x10/0x20
[   32.496517] 
[   32.496597] Freed by task 266:
[   32.496637]  kasan_save_stack+0x3c/0x68
[   32.496675]  kasan_save_track+0x20/0x40
[   32.496751]  kasan_save_free_info+0x4c/0x78
[   32.496966]  __kasan_mempool_poison_object+0xc0/0x150
[   32.497084]  mempool_free+0x28c/0x328
[   32.497192]  mempool_double_free_helper+0x100/0x2e8
[   32.497271]  mempool_kmalloc_double_free+0xc0/0x118
[   32.497342]  kunit_try_run_case+0x170/0x3f0
[   32.497531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.497714]  kthread+0x328/0x630
[   32.497855]  ret_from_fork+0x10/0x20
[   32.497913] 
[   32.497956] The buggy address belongs to the object at fff00000c99f0d00
[   32.497956]  which belongs to the cache kmalloc-128 of size 128
[   32.498062] The buggy address is located 0 bytes inside of
[   32.498062]  128-byte region [fff00000c99f0d00, fff00000c99f0d80)
[   32.498125] 
[   32.498146] The buggy address belongs to the physical page:
[   32.498186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0
[   32.498503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.498625] page_type: f5(slab)
[   32.498683] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.498781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.498858] page dumped because: kasan: bad access detected
[   32.498957] 
[   32.499019] Memory state around the buggy address:
[   32.499062]  fff00000c99f0c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.499125]  fff00000c99f0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.499381] >fff00000c99f0d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.499580]                    ^
[   32.499658]  fff00000c99f0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.499751]  fff00000c99f0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.499825] ==================================================================
[   32.520295] ==================================================================
[   32.520368] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.520458] Free of addr fff00000c9b68000 by task kunit_try_catch/270
[   32.520502] 
[   32.520540] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.520772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.520941] Hardware name: linux,dummy-virt (DT)
[   32.520987] Call trace:
[   32.521081]  show_stack+0x20/0x38 (C)
[   32.521149]  dump_stack_lvl+0x8c/0xd0
[   32.521198]  print_report+0x118/0x5d0
[   32.521260]  kasan_report_invalid_free+0xc0/0xe8
[   32.521520]  __kasan_mempool_poison_pages+0xe0/0xe8
[   32.521638]  mempool_free+0x24c/0x328
[   32.521769]  mempool_double_free_helper+0x150/0x2e8
[   32.521860]  mempool_page_alloc_double_free+0xbc/0x118
[   32.521964]  kunit_try_run_case+0x170/0x3f0
[   32.522056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.522132]  kthread+0x328/0x630
[   32.522195]  ret_from_fork+0x10/0x20
[   32.522295] 
[   32.522378] The buggy address belongs to the physical page:
[   32.522423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b68
[   32.522479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.522570] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.522621] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.522705] page dumped because: kasan: bad access detected
[   32.522738] 
[   32.522975] Memory state around the buggy address:
[   32.523059]  fff00000c9b67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.523134]  fff00000c9b67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.523250] >fff00000c9b68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.523363]                    ^
[   32.523477]  fff00000c9b68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.523557]  fff00000c9b68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.523633] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   32.441177] ==================================================================
[   32.441243] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.441314] Read of size 1 at addr fff00000c9b64000 by task kunit_try_catch/260
[   32.441381] 
[   32.441416] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.441768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.441803] Hardware name: linux,dummy-virt (DT)
[   32.441836] Call trace:
[   32.441861]  show_stack+0x20/0x38 (C)
[   32.441964]  dump_stack_lvl+0x8c/0xd0
[   32.442128]  print_report+0x118/0x5d0
[   32.442216]  kasan_report+0xdc/0x128
[   32.442289]  __asan_report_load1_noabort+0x20/0x30
[   32.442387]  mempool_uaf_helper+0x314/0x340
[   32.442469]  mempool_kmalloc_large_uaf+0xc4/0x120
[   32.442576]  kunit_try_run_case+0x170/0x3f0
[   32.442627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.442812]  kthread+0x328/0x630
[   32.442890]  ret_from_fork+0x10/0x20
[   32.442988] 
[   32.443069] The buggy address belongs to the physical page:
[   32.443139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b64
[   32.443238] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.443353] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.443419] page_type: f8(unknown)
[   32.443486] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.443549] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.443743] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.443866] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.443937] head: 0bfffe0000000002 ffffc1ffc326d901 00000000ffffffff 00000000ffffffff
[   32.443986] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.444026] page dumped because: kasan: bad access detected
[   32.444235] 
[   32.444329] Memory state around the buggy address:
[   32.444406]  fff00000c9b63f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.444536]  fff00000c9b63f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.444580] >fff00000c9b64000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.444652]                    ^
[   32.444800]  fff00000c9b64080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.444961]  fff00000c9b64100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.445074] ==================================================================
[   32.483685] ==================================================================
[   32.483769] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.483857] Read of size 1 at addr fff00000c9b68000 by task kunit_try_catch/264
[   32.484036] 
[   32.484132] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.484250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.484302] Hardware name: linux,dummy-virt (DT)
[   32.484428] Call trace:
[   32.484477]  show_stack+0x20/0x38 (C)
[   32.484552]  dump_stack_lvl+0x8c/0xd0
[   32.484634]  print_report+0x118/0x5d0
[   32.484680]  kasan_report+0xdc/0x128
[   32.484721]  __asan_report_load1_noabort+0x20/0x30
[   32.484769]  mempool_uaf_helper+0x314/0x340
[   32.484815]  mempool_page_alloc_uaf+0xc0/0x118
[   32.484911]  kunit_try_run_case+0x170/0x3f0
[   32.484979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.485030]  kthread+0x328/0x630
[   32.485073]  ret_from_fork+0x10/0x20
[   32.485285] 
[   32.485320] The buggy address belongs to the physical page:
[   32.485555] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b68
[   32.485683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.485787] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.485896] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.485984] page dumped because: kasan: bad access detected
[   32.486076] 
[   32.486140] Memory state around the buggy address:
[   32.486199]  fff00000c9b67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.486269]  fff00000c9b67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.486394] >fff00000c9b68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.486482]                    ^
[   32.486540]  fff00000c9b68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.486622]  fff00000c9b68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.486672] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   32.452574] ==================================================================
[   32.452670] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.452756] Read of size 1 at addr fff00000c9ace240 by task kunit_try_catch/262
[   32.452808] 
[   32.452845] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.452949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.452975] Hardware name: linux,dummy-virt (DT)
[   32.453027] Call trace:
[   32.453086]  show_stack+0x20/0x38 (C)
[   32.453334]  dump_stack_lvl+0x8c/0xd0
[   32.453403]  print_report+0x118/0x5d0
[   32.453543]  kasan_report+0xdc/0x128
[   32.453639]  __asan_report_load1_noabort+0x20/0x30
[   32.453689]  mempool_uaf_helper+0x314/0x340
[   32.453737]  mempool_slab_uaf+0xc0/0x118
[   32.453879]  kunit_try_run_case+0x170/0x3f0
[   32.453931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.454130]  kthread+0x328/0x630
[   32.454218]  ret_from_fork+0x10/0x20
[   32.454299] 
[   32.454337] Allocated by task 262:
[   32.454367]  kasan_save_stack+0x3c/0x68
[   32.454410]  kasan_save_track+0x20/0x40
[   32.454459]  kasan_save_alloc_info+0x40/0x58
[   32.454498]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.454543]  remove_element+0x16c/0x1f8
[   32.454583]  mempool_alloc_preallocated+0x58/0xc0
[   32.454624]  mempool_uaf_helper+0xa4/0x340
[   32.454661]  mempool_slab_uaf+0xc0/0x118
[   32.454700]  kunit_try_run_case+0x170/0x3f0
[   32.454739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.454780]  kthread+0x328/0x630
[   32.454812]  ret_from_fork+0x10/0x20
[   32.454850] 
[   32.454869] Freed by task 262:
[   32.454917]  kasan_save_stack+0x3c/0x68
[   32.454967]  kasan_save_track+0x20/0x40
[   32.455011]  kasan_save_free_info+0x4c/0x78
[   32.455058]  __kasan_mempool_poison_object+0xc0/0x150
[   32.455111]  mempool_free+0x28c/0x328
[   32.455154]  mempool_uaf_helper+0x104/0x340
[   32.455200]  mempool_slab_uaf+0xc0/0x118
[   32.455237]  kunit_try_run_case+0x170/0x3f0
[   32.455286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.455338]  kthread+0x328/0x630
[   32.455372]  ret_from_fork+0x10/0x20
[   32.455406] 
[   32.455426] The buggy address belongs to the object at fff00000c9ace240
[   32.455426]  which belongs to the cache test_cache of size 123
[   32.455486] The buggy address is located 0 bytes inside of
[   32.455486]  freed 123-byte region [fff00000c9ace240, fff00000c9ace2bb)
[   32.455798] 
[   32.455919] The buggy address belongs to the physical page:
[   32.455955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ace
[   32.456158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.456245] page_type: f5(slab)
[   32.456297] raw: 0bfffe0000000000 fff00000c5d1fa00 dead000000000122 0000000000000000
[   32.456378] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.456422] page dumped because: kasan: bad access detected
[   32.456665] 
[   32.456719] Memory state around the buggy address:
[   32.456824]  fff00000c9ace100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.456939]  fff00000c9ace180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.457012] >fff00000c9ace200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.457068]                                            ^
[   32.457125]  fff00000c9ace280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.457188]  fff00000c9ace300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.457225] ==================================================================
[   32.429262] ==================================================================
[   32.429369] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.429465] Read of size 1 at addr fff00000c99f0900 by task kunit_try_catch/258
[   32.429516] 
[   32.429569] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.429666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.429692] Hardware name: linux,dummy-virt (DT)
[   32.429751] Call trace:
[   32.429777]  show_stack+0x20/0x38 (C)
[   32.429945]  dump_stack_lvl+0x8c/0xd0
[   32.430069]  print_report+0x118/0x5d0
[   32.430157]  kasan_report+0xdc/0x128
[   32.430245]  __asan_report_load1_noabort+0x20/0x30
[   32.430342]  mempool_uaf_helper+0x314/0x340
[   32.430427]  mempool_kmalloc_uaf+0xc4/0x120
[   32.430553]  kunit_try_run_case+0x170/0x3f0
[   32.430620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.430695]  kthread+0x328/0x630
[   32.430795]  ret_from_fork+0x10/0x20
[   32.430893] 
[   32.430912] Allocated by task 258:
[   32.430943]  kasan_save_stack+0x3c/0x68
[   32.431275]  kasan_save_track+0x20/0x40
[   32.431372]  kasan_save_alloc_info+0x40/0x58
[   32.431509]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.431605]  remove_element+0x130/0x1f8
[   32.431733]  mempool_alloc_preallocated+0x58/0xc0
[   32.431833]  mempool_uaf_helper+0xa4/0x340
[   32.431928]  mempool_kmalloc_uaf+0xc4/0x120
[   32.432058]  kunit_try_run_case+0x170/0x3f0
[   32.432109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.432152]  kthread+0x328/0x630
[   32.432481]  ret_from_fork+0x10/0x20
[   32.432580] 
[   32.432706] Freed by task 258:
[   32.432757]  kasan_save_stack+0x3c/0x68
[   32.432798]  kasan_save_track+0x20/0x40
[   32.433110]  kasan_save_free_info+0x4c/0x78
[   32.433212]  __kasan_mempool_poison_object+0xc0/0x150
[   32.433349]  mempool_free+0x28c/0x328
[   32.433397]  mempool_uaf_helper+0x104/0x340
[   32.433459]  mempool_kmalloc_uaf+0xc4/0x120
[   32.433566]  kunit_try_run_case+0x170/0x3f0
[   32.433647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.433742]  kthread+0x328/0x630
[   32.433855]  ret_from_fork+0x10/0x20
[   32.433931] 
[   32.433981] The buggy address belongs to the object at fff00000c99f0900
[   32.433981]  which belongs to the cache kmalloc-128 of size 128
[   32.434045] The buggy address is located 0 bytes inside of
[   32.434045]  freed 128-byte region [fff00000c99f0900, fff00000c99f0980)
[   32.434202] 
[   32.434224] The buggy address belongs to the physical page:
[   32.434258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0
[   32.434527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.434614] page_type: f5(slab)
[   32.434688] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.434821] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.434892] page dumped because: kasan: bad access detected
[   32.434946] 
[   32.435054] Memory state around the buggy address:
[   32.435124]  fff00000c99f0800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.435207]  fff00000c99f0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.435249] >fff00000c99f0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.435542]                    ^
[   32.435623]  fff00000c99f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.435779]  fff00000c99f0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.435849] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   32.364085] ==================================================================
[   32.364167] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.364253] Read of size 1 at addr fff00000c99f0573 by task kunit_try_catch/252
[   32.364307] 
[   32.364369] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.364463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.364491] Hardware name: linux,dummy-virt (DT)
[   32.364525] Call trace:
[   32.364552]  show_stack+0x20/0x38 (C)
[   32.364605]  dump_stack_lvl+0x8c/0xd0
[   32.364655]  print_report+0x118/0x5d0
[   32.364699]  kasan_report+0xdc/0x128
[   32.364742]  __asan_report_load1_noabort+0x20/0x30
[   32.364791]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.364840]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.364889]  kunit_try_run_case+0x170/0x3f0
[   32.364941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.364991]  kthread+0x328/0x630
[   32.365035]  ret_from_fork+0x10/0x20
[   32.365085] 
[   32.365104] Allocated by task 252:
[   32.365134]  kasan_save_stack+0x3c/0x68
[   32.365179]  kasan_save_track+0x20/0x40
[   32.365220]  kasan_save_alloc_info+0x40/0x58
[   32.365260]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.365306]  remove_element+0x130/0x1f8
[   32.365358]  mempool_alloc_preallocated+0x58/0xc0
[   32.365621]  mempool_oob_right_helper+0x98/0x2f0
[   32.365672]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.365712]  kunit_try_run_case+0x170/0x3f0
[   32.365751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.365794]  kthread+0x328/0x630
[   32.365828]  ret_from_fork+0x10/0x20
[   32.365864] 
[   32.365885] The buggy address belongs to the object at fff00000c99f0500
[   32.365885]  which belongs to the cache kmalloc-128 of size 128
[   32.365945] The buggy address is located 0 bytes to the right of
[   32.365945]  allocated 115-byte region [fff00000c99f0500, fff00000c99f0573)
[   32.366009] 
[   32.366030] The buggy address belongs to the physical page:
[   32.366065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0
[   32.366124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.366177] page_type: f5(slab)
[   32.366221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.366270] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.366312] page dumped because: kasan: bad access detected
[   32.366360] 
[   32.366378] Memory state around the buggy address:
[   32.366415]  fff00000c99f0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.366459]  fff00000c99f0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.366503] >fff00000c99f0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.366539]                                                              ^
[   32.366580]  fff00000c99f0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.366620]  fff00000c99f0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.366659] ==================================================================
[   32.388103] ==================================================================
[   32.388174] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.388236] Read of size 1 at addr fff00000c9ad12bb by task kunit_try_catch/256
[   32.388288] 
[   32.388343] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.388431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.388457] Hardware name: linux,dummy-virt (DT)
[   32.388487] Call trace:
[   32.388512]  show_stack+0x20/0x38 (C)
[   32.388561]  dump_stack_lvl+0x8c/0xd0
[   32.388608]  print_report+0x118/0x5d0
[   32.388650]  kasan_report+0xdc/0x128
[   32.388694]  __asan_report_load1_noabort+0x20/0x30
[   32.388743]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.388791]  mempool_slab_oob_right+0xc0/0x118
[   32.388838]  kunit_try_run_case+0x170/0x3f0
[   32.388888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.388936]  kthread+0x328/0x630
[   32.388979]  ret_from_fork+0x10/0x20
[   32.389025] 
[   32.389044] Allocated by task 256:
[   32.389076]  kasan_save_stack+0x3c/0x68
[   32.389118]  kasan_save_track+0x20/0x40
[   32.389155]  kasan_save_alloc_info+0x40/0x58
[   32.389193]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.389237]  remove_element+0x16c/0x1f8
[   32.389277]  mempool_alloc_preallocated+0x58/0xc0
[   32.389317]  mempool_oob_right_helper+0x98/0x2f0
[   32.389396]  mempool_slab_oob_right+0xc0/0x118
[   32.389508]  kunit_try_run_case+0x170/0x3f0
[   32.389548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.389589]  kthread+0x328/0x630
[   32.389622]  ret_from_fork+0x10/0x20
[   32.389668] 
[   32.389689] The buggy address belongs to the object at fff00000c9ad1240
[   32.389689]  which belongs to the cache test_cache of size 123
[   32.389749] The buggy address is located 0 bytes to the right of
[   32.389749]  allocated 123-byte region [fff00000c9ad1240, fff00000c9ad12bb)
[   32.389961] 
[   32.389985] The buggy address belongs to the physical page:
[   32.390031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad1
[   32.390239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.390422] page_type: f5(slab)
[   32.390482] raw: 0bfffe0000000000 fff00000c5d1f8c0 dead000000000122 0000000000000000
[   32.390531] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.390573] page dumped because: kasan: bad access detected
[   32.390614] 
[   32.390632] Memory state around the buggy address:
[   32.390664]  fff00000c9ad1180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.390777]  fff00000c9ad1200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.390822] >fff00000c9ad1280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.390912]                                         ^
[   32.390945]  fff00000c9ad1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.391084]  fff00000c9ad1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.391123] ==================================================================
[   32.376400] ==================================================================
[   32.376478] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.376544] Read of size 1 at addr fff00000c9b66001 by task kunit_try_catch/254
[   32.376595] 
[   32.376633] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.376831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.377111] Hardware name: linux,dummy-virt (DT)
[   32.377150] Call trace:
[   32.377182]  show_stack+0x20/0x38 (C)
[   32.377284]  dump_stack_lvl+0x8c/0xd0
[   32.377350]  print_report+0x118/0x5d0
[   32.377396]  kasan_report+0xdc/0x128
[   32.377438]  __asan_report_load1_noabort+0x20/0x30
[   32.377493]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.377603]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   32.377767]  kunit_try_run_case+0x170/0x3f0
[   32.377843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.377893]  kthread+0x328/0x630
[   32.377943]  ret_from_fork+0x10/0x20
[   32.378160] 
[   32.378211] The buggy address belongs to the physical page:
[   32.378269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b64
[   32.378336] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.378386] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.378442] page_type: f8(unknown)
[   32.378486] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.378988] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.379107] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.379226] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.379292] head: 0bfffe0000000002 ffffc1ffc326d901 00000000ffffffff 00000000ffffffff
[   32.379350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.379391] page dumped because: kasan: bad access detected
[   32.379437] 
[   32.379456] Memory state around the buggy address:
[   32.379490]  fff00000c9b65f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.379775]  fff00000c9b65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.379861] >fff00000c9b66000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.379899]                    ^
[   32.379954]  fff00000c9b66080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.380046]  fff00000c9b66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.380085] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   31.775311] ==================================================================
[   31.775426] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   31.775509] Read of size 1 at addr fff00000c3e188c0 by task kunit_try_catch/246
[   31.775562] 
[   31.775608] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   31.775700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.776482] Hardware name: linux,dummy-virt (DT)
[   31.776537] Call trace:
[   31.776581]  show_stack+0x20/0x38 (C)
[   31.776701]  dump_stack_lvl+0x8c/0xd0
[   31.776917]  print_report+0x118/0x5d0
[   31.777353]  kasan_report+0xdc/0x128
[   31.777550]  __kasan_check_byte+0x54/0x70
[   31.778009]  kmem_cache_destroy+0x34/0x218
[   31.778194]  kmem_cache_double_destroy+0x174/0x300
[   31.778354]  kunit_try_run_case+0x170/0x3f0
[   31.778415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.778790]  kthread+0x328/0x630
[   31.779059]  ret_from_fork+0x10/0x20
[   31.779115] 
[   31.779135] Allocated by task 246:
[   31.779539]  kasan_save_stack+0x3c/0x68
[   31.779595]  kasan_save_track+0x20/0x40
[   31.780071]  kasan_save_alloc_info+0x40/0x58
[   31.780113]  __kasan_slab_alloc+0xa8/0xb0
[   31.780555]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.780860]  __kmem_cache_create_args+0x178/0x280
[   31.780907]  kmem_cache_double_destroy+0xc0/0x300
[   31.780950]  kunit_try_run_case+0x170/0x3f0
[   31.781694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.781821]  kthread+0x328/0x630
[   31.781939]  ret_from_fork+0x10/0x20
[   31.782113] 
[   31.782140] Freed by task 246:
[   31.782168]  kasan_save_stack+0x3c/0x68
[   31.782213]  kasan_save_track+0x20/0x40
[   31.782306]  kasan_save_free_info+0x4c/0x78
[   31.782435]  __kasan_slab_free+0x6c/0x98
[   31.782549]  kmem_cache_free+0x260/0x468
[   31.782787]  slab_kmem_cache_release+0x38/0x50
[   31.782828]  kmem_cache_release+0x1c/0x30
[   31.782870]  kobject_put+0x17c/0x420
[   31.782908]  sysfs_slab_release+0x1c/0x30
[   31.782950]  kmem_cache_destroy+0x118/0x218
[   31.782989]  kmem_cache_double_destroy+0x128/0x300
[   31.783209]  kunit_try_run_case+0x170/0x3f0
[   31.783256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.783679]  kthread+0x328/0x630
[   31.783735]  ret_from_fork+0x10/0x20
[   31.783855] 
[   31.784122] The buggy address belongs to the object at fff00000c3e188c0
[   31.784122]  which belongs to the cache kmem_cache of size 208
[   31.784239] The buggy address is located 0 bytes inside of
[   31.784239]  freed 208-byte region [fff00000c3e188c0, fff00000c3e18990)
[   31.784682] 
[   31.784738] The buggy address belongs to the physical page:
[   31.784774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e18
[   31.785190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.785346] page_type: f5(slab)
[   31.785452] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122
[   31.785523] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   31.785575] page dumped because: kasan: bad access detected
[   31.785683] 
[   31.785704] Memory state around the buggy address:
[   31.785905]  fff00000c3e18780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.785994]  fff00000c3e18800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   31.786105] >fff00000c3e18880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   31.786147]                                            ^
[   31.786558]  fff00000c3e18900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.786675]  fff00000c3e18980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.786920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   31.574754] ==================================================================
[   31.575311] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   31.576268] Read of size 1 at addr fff00000c9ad8000 by task kunit_try_catch/244
[   31.576334] 
[   31.576381] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   31.576606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.576657] Hardware name: linux,dummy-virt (DT)
[   31.577268] Call trace:
[   31.577299]  show_stack+0x20/0x38 (C)
[   31.577368]  dump_stack_lvl+0x8c/0xd0
[   31.578058]  print_report+0x118/0x5d0
[   31.578110]  kasan_report+0xdc/0x128
[   31.578258]  __asan_report_load1_noabort+0x20/0x30
[   31.578346]  kmem_cache_rcu_uaf+0x388/0x468
[   31.578860]  kunit_try_run_case+0x170/0x3f0
[   31.579283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.579489]  kthread+0x328/0x630
[   31.580552]  ret_from_fork+0x10/0x20
[   31.580670] 
[   31.580691] Allocated by task 244:
[   31.580725]  kasan_save_stack+0x3c/0x68
[   31.581439]  kasan_save_track+0x20/0x40
[   31.581491]  kasan_save_alloc_info+0x40/0x58
[   31.581797]  __kasan_slab_alloc+0xa8/0xb0
[   31.581865]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.581914]  kmem_cache_rcu_uaf+0x12c/0x468
[   31.582076]  kunit_try_run_case+0x170/0x3f0
[   31.582127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.582180]  kthread+0x328/0x630
[   31.582228]  ret_from_fork+0x10/0x20
[   31.582319] 
[   31.582490] Freed by task 0:
[   31.582700]  kasan_save_stack+0x3c/0x68
[   31.582977]  kasan_save_track+0x20/0x40
[   31.583217]  kasan_save_free_info+0x4c/0x78
[   31.583444]  __kasan_slab_free+0x6c/0x98
[   31.583588]  slab_free_after_rcu_debug+0xd4/0x2f8
[   31.583631]  rcu_core+0x9f4/0x1e20
[   31.583671]  rcu_core_si+0x18/0x30
[   31.583708]  handle_softirqs+0x374/0xb28
[   31.583746]  __do_softirq+0x1c/0x28
[   31.584134] 
[   31.584180] Last potentially related work creation:
[   31.584209]  kasan_save_stack+0x3c/0x68
[   31.584457]  kasan_record_aux_stack+0xb4/0xc8
[   31.584502]  kmem_cache_free+0x120/0x468
[   31.584901]  kmem_cache_rcu_uaf+0x16c/0x468
[   31.585088]  kunit_try_run_case+0x170/0x3f0
[   31.585131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.585263]  kthread+0x328/0x630
[   31.585303]  ret_from_fork+0x10/0x20
[   31.585391] 
[   31.585540] The buggy address belongs to the object at fff00000c9ad8000
[   31.585540]  which belongs to the cache test_cache of size 200
[   31.585682] The buggy address is located 0 bytes inside of
[   31.585682]  freed 200-byte region [fff00000c9ad8000, fff00000c9ad80c8)
[   31.585940] 
[   31.586143] The buggy address belongs to the physical page:
[   31.586269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad8
[   31.586750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.587087] page_type: f5(slab)
[   31.587146] raw: 0bfffe0000000000 fff00000c3e18780 dead000000000122 0000000000000000
[   31.587199] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.587392] page dumped because: kasan: bad access detected
[   31.587428] 
[   31.587462] Memory state around the buggy address:
[   31.587497]  fff00000c9ad7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.587549]  fff00000c9ad7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.587592] >fff00000c9ad8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.587630]                    ^
[   31.587658]  fff00000c9ad8080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.587700]  fff00000c9ad8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.588146] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.053386] ==================================================================
[   31.053531] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   31.053614] Free of addr fff00000c99ff001 by task kunit_try_catch/242
[   31.053660] 
[   31.053704] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   31.054218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.054256] Hardware name: linux,dummy-virt (DT)
[   31.054607] Call trace:
[   31.054689]  show_stack+0x20/0x38 (C)
[   31.055041]  dump_stack_lvl+0x8c/0xd0
[   31.055112]  print_report+0x118/0x5d0
[   31.055545]  kasan_report_invalid_free+0xc0/0xe8
[   31.055607]  check_slab_allocation+0xfc/0x108
[   31.055670]  __kasan_slab_pre_free+0x2c/0x48
[   31.055721]  kmem_cache_free+0xf0/0x468
[   31.055771]  kmem_cache_invalid_free+0x184/0x3c8
[   31.055822]  kunit_try_run_case+0x170/0x3f0
[   31.056385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.056446]  kthread+0x328/0x630
[   31.056957]  ret_from_fork+0x10/0x20
[   31.057015] 
[   31.057036] Allocated by task 242:
[   31.057075]  kasan_save_stack+0x3c/0x68
[   31.057120]  kasan_save_track+0x20/0x40
[   31.057589]  kasan_save_alloc_info+0x40/0x58
[   31.057851]  __kasan_slab_alloc+0xa8/0xb0
[   31.057999]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.058386]  kmem_cache_invalid_free+0x12c/0x3c8
[   31.058567]  kunit_try_run_case+0x170/0x3f0
[   31.058620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.058864]  kthread+0x328/0x630
[   31.059285]  ret_from_fork+0x10/0x20
[   31.059361] 
[   31.059382] The buggy address belongs to the object at fff00000c99ff000
[   31.059382]  which belongs to the cache test_cache of size 200
[   31.059445] The buggy address is located 1 bytes inside of
[   31.059445]  200-byte region [fff00000c99ff000, fff00000c99ff0c8)
[   31.060050] 
[   31.060088] The buggy address belongs to the physical page:
[   31.060203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099ff
[   31.060462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.060922] page_type: f5(slab)
[   31.061042] raw: 0bfffe0000000000 fff00000c3e18640 dead000000000122 0000000000000000
[   31.061418] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.061502] page dumped because: kasan: bad access detected
[   31.061698] 
[   31.061722] Memory state around the buggy address:
[   31.061758]  fff00000c99fef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.061804]  fff00000c99fef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.061848] >fff00000c99ff000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.062359]                    ^
[   31.062435]  fff00000c99ff080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.062814]  fff00000c99ff100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.062862] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   30.982789] ==================================================================
[   30.982883] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   30.982962] Free of addr fff00000c9a00000 by task kunit_try_catch/240
[   30.983006] 
[   30.983054] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.983235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.983553] Hardware name: linux,dummy-virt (DT)
[   30.984034] Call trace:
[   30.984075]  show_stack+0x20/0x38 (C)
[   30.984517]  dump_stack_lvl+0x8c/0xd0
[   30.984578]  print_report+0x118/0x5d0
[   30.984972]  kasan_report_invalid_free+0xc0/0xe8
[   30.985056]  check_slab_allocation+0xd4/0x108
[   30.985222]  __kasan_slab_pre_free+0x2c/0x48
[   30.985608]  kmem_cache_free+0xf0/0x468
[   30.985750]  kmem_cache_double_free+0x190/0x3c8
[   30.985807]  kunit_try_run_case+0x170/0x3f0
[   30.985861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.985914]  kthread+0x328/0x630
[   30.985959]  ret_from_fork+0x10/0x20
[   30.986703] 
[   30.986727] Allocated by task 240:
[   30.986764]  kasan_save_stack+0x3c/0x68
[   30.986990]  kasan_save_track+0x20/0x40
[   30.987182]  kasan_save_alloc_info+0x40/0x58
[   30.987453]  __kasan_slab_alloc+0xa8/0xb0
[   30.987496]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.987538]  kmem_cache_double_free+0x12c/0x3c8
[   30.987582]  kunit_try_run_case+0x170/0x3f0
[   30.988254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.988372]  kthread+0x328/0x630
[   30.988469]  ret_from_fork+0x10/0x20
[   30.988742] 
[   30.988765] Freed by task 240:
[   30.989035]  kasan_save_stack+0x3c/0x68
[   30.989083]  kasan_save_track+0x20/0x40
[   30.989504]  kasan_save_free_info+0x4c/0x78
[   30.989665]  __kasan_slab_free+0x6c/0x98
[   30.989753]  kmem_cache_free+0x260/0x468
[   30.990038]  kmem_cache_double_free+0x140/0x3c8
[   30.990088]  kunit_try_run_case+0x170/0x3f0
[   30.990232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.990282]  kthread+0x328/0x630
[   30.990494]  ret_from_fork+0x10/0x20
[   30.990716] 
[   30.990737] The buggy address belongs to the object at fff00000c9a00000
[   30.990737]  which belongs to the cache test_cache of size 200
[   30.991160] The buggy address is located 0 bytes inside of
[   30.991160]  200-byte region [fff00000c9a00000, fff00000c9a000c8)
[   30.991238] 
[   30.991264] The buggy address belongs to the physical page:
[   30.991536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a00
[   30.991863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.991926] page_type: f5(slab)
[   30.991979] raw: 0bfffe0000000000 fff00000c3e18500 dead000000000122 0000000000000000
[   30.992031] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.992074] page dumped because: kasan: bad access detected
[   30.992107] 
[   30.992124] Memory state around the buggy address:
[   30.992157]  fff00000c99fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.992200]  fff00000c99fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.993257] >fff00000c9a00000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.993412]                    ^
[   30.993463]  fff00000c9a00080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   30.993698]  fff00000c9a00100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.993901] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   30.864154] ==================================================================
[   30.864344] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   30.864416] Read of size 1 at addr fff00000c9a000c8 by task kunit_try_catch/238
[   30.864482] 
[   30.864521] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.864619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.864648] Hardware name: linux,dummy-virt (DT)
[   30.864683] Call trace:
[   30.864716]  show_stack+0x20/0x38 (C)
[   30.864769]  dump_stack_lvl+0x8c/0xd0
[   30.864816]  print_report+0x118/0x5d0
[   30.864860]  kasan_report+0xdc/0x128
[   30.864910]  __asan_report_load1_noabort+0x20/0x30
[   30.864967]  kmem_cache_oob+0x344/0x430
[   30.865017]  kunit_try_run_case+0x170/0x3f0
[   30.865069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.865133]  kthread+0x328/0x630
[   30.865177]  ret_from_fork+0x10/0x20
[   30.865228] 
[   30.865246] Allocated by task 238:
[   30.865276]  kasan_save_stack+0x3c/0x68
[   30.865330]  kasan_save_track+0x20/0x40
[   30.865370]  kasan_save_alloc_info+0x40/0x58
[   30.865410]  __kasan_slab_alloc+0xa8/0xb0
[   30.865450]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.865496]  kmem_cache_oob+0x12c/0x430
[   30.865534]  kunit_try_run_case+0x170/0x3f0
[   30.865598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.865666]  kthread+0x328/0x630
[   30.865700]  ret_from_fork+0x10/0x20
[   30.865737] 
[   30.865756] The buggy address belongs to the object at fff00000c9a00000
[   30.865756]  which belongs to the cache test_cache of size 200
[   30.865825] The buggy address is located 0 bytes to the right of
[   30.865825]  allocated 200-byte region [fff00000c9a00000, fff00000c9a000c8)
[   30.865902] 
[   30.865923] The buggy address belongs to the physical page:
[   30.865974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a00
[   30.866066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.866135] page_type: f5(slab)
[   30.866177] raw: 0bfffe0000000000 fff00000c3e183c0 dead000000000122 0000000000000000
[   30.866235] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.866282] page dumped because: kasan: bad access detected
[   30.866316] 
[   30.866345] Memory state around the buggy address:
[   30.866379]  fff00000c99fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.866463]  fff00000c9a00000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.866528] >fff00000c9a00080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   30.866628]                                               ^
[   30.866730]  fff00000c9a00100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.866824]  fff00000c9a00180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.866920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   30.844460] ==================================================================
[   30.844540] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   30.844609] Read of size 8 at addr fff00000c9a4d880 by task kunit_try_catch/231
[   30.844678] 
[   30.844719] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.845069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.845144] Hardware name: linux,dummy-virt (DT)
[   30.845186] Call trace:
[   30.845213]  show_stack+0x20/0x38 (C)
[   30.845281]  dump_stack_lvl+0x8c/0xd0
[   30.845369]  print_report+0x118/0x5d0
[   30.845453]  kasan_report+0xdc/0x128
[   30.845526]  __asan_report_load8_noabort+0x20/0x30
[   30.845618]  workqueue_uaf+0x480/0x4a8
[   30.845686]  kunit_try_run_case+0x170/0x3f0
[   30.845808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.845897]  kthread+0x328/0x630
[   30.845982]  ret_from_fork+0x10/0x20
[   30.846109] 
[   30.846158] Allocated by task 231:
[   30.846186]  kasan_save_stack+0x3c/0x68
[   30.846229]  kasan_save_track+0x20/0x40
[   30.847181]  kasan_save_alloc_info+0x40/0x58
[   30.847259]  __kasan_kmalloc+0xd4/0xd8
[   30.847404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.847515]  workqueue_uaf+0x13c/0x4a8
[   30.847588]  kunit_try_run_case+0x170/0x3f0
[   30.847696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.847740]  kthread+0x328/0x630
[   30.847772]  ret_from_fork+0x10/0x20
[   30.847817] 
[   30.847896] Freed by task 52:
[   30.847974]  kasan_save_stack+0x3c/0x68
[   30.848091]  kasan_save_track+0x20/0x40
[   30.848150]  kasan_save_free_info+0x4c/0x78
[   30.848196]  __kasan_slab_free+0x6c/0x98
[   30.848235]  kfree+0x214/0x3c8
[   30.848269]  workqueue_uaf_work+0x18/0x30
[   30.848306]  process_one_work+0x530/0xf98
[   30.848355]  worker_thread+0x618/0xf38
[   30.848389]  kthread+0x328/0x630
[   30.848423]  ret_from_fork+0x10/0x20
[   30.848459] 
[   30.848478] Last potentially related work creation:
[   30.848505]  kasan_save_stack+0x3c/0x68
[   30.848583]  kasan_record_aux_stack+0xb4/0xc8
[   30.848678]  __queue_work+0x65c/0xfe0
[   30.848729]  queue_work_on+0xbc/0xf8
[   30.848806]  workqueue_uaf+0x210/0x4a8
[   30.848884]  kunit_try_run_case+0x170/0x3f0
[   30.848985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.849052]  kthread+0x328/0x630
[   30.849136]  ret_from_fork+0x10/0x20
[   30.849206] 
[   30.849310] The buggy address belongs to the object at fff00000c9a4d880
[   30.849310]  which belongs to the cache kmalloc-32 of size 32
[   30.849406] The buggy address is located 0 bytes inside of
[   30.849406]  freed 32-byte region [fff00000c9a4d880, fff00000c9a4d8a0)
[   30.849496] 
[   30.849517] The buggy address belongs to the physical page:
[   30.849558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a4d
[   30.849621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.849945] page_type: f5(slab)
[   30.849995] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   30.850053] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   30.850100] page dumped because: kasan: bad access detected
[   30.850135] 
[   30.850154] Memory state around the buggy address:
[   30.850189]  fff00000c9a4d780: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   30.850237]  fff00000c9a4d800: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   30.850403] >fff00000c9a4d880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   30.850461]                    ^
[   30.850509]  fff00000c9a4d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.850556]  fff00000c9a4d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.850634] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   30.814771] ==================================================================
[   30.814950] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   30.816666] Read of size 4 at addr fff00000c9a4d680 by task swapper/1/0
[   30.817430] 
[   30.817482] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.818672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.818705] Hardware name: linux,dummy-virt (DT)
[   30.818742] Call trace:
[   30.819006]  show_stack+0x20/0x38 (C)
[   30.819897]  dump_stack_lvl+0x8c/0xd0
[   30.820655]  print_report+0x118/0x5d0
[   30.820759]  kasan_report+0xdc/0x128
[   30.820832]  __asan_report_load4_noabort+0x20/0x30
[   30.821422]  rcu_uaf_reclaim+0x64/0x70
[   30.821551]  rcu_core+0x9f4/0x1e20
[   30.821916]  rcu_core_si+0x18/0x30
[   30.822920]  handle_softirqs+0x374/0xb28
[   30.823121]  __do_softirq+0x1c/0x28
[   30.823247]  ____do_softirq+0x18/0x30
[   30.823292]  call_on_irq_stack+0x24/0x30
[   30.824177]  do_softirq_own_stack+0x24/0x38
[   30.824254]  __irq_exit_rcu+0x1fc/0x318
[   30.824301]  irq_exit_rcu+0x1c/0x80
[   30.825235]  el1_interrupt+0x38/0x58
[   30.825854]  el1h_64_irq_handler+0x18/0x28
[   30.825975]  el1h_64_irq+0x6c/0x70
[   30.826706]  arch_local_irq_enable+0x4/0x8 (P)
[   30.827761]  do_idle+0x384/0x4e8
[   30.828060]  cpu_startup_entry+0x64/0x80
[   30.828636]  secondary_start_kernel+0x28c/0x340
[   30.829203]  __secondary_switched+0xc0/0xc8
[   30.829652] 
[   30.830048] Allocated by task 229:
[   30.830568]  kasan_save_stack+0x3c/0x68
[   30.830891]  kasan_save_track+0x20/0x40
[   30.831217]  kasan_save_alloc_info+0x40/0x58
[   30.831567]  __kasan_kmalloc+0xd4/0xd8
[   30.831887]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.832241]  rcu_uaf+0xb0/0x2d8
[   30.832388]  kunit_try_run_case+0x170/0x3f0
[   30.832452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.832495]  kthread+0x328/0x630
[   30.832530]  ret_from_fork+0x10/0x20
[   30.832567] 
[   30.832587] Freed by task 0:
[   30.832613]  kasan_save_stack+0x3c/0x68
[   30.832653]  kasan_save_track+0x20/0x40
[   30.832690]  kasan_save_free_info+0x4c/0x78
[   30.832728]  __kasan_slab_free+0x6c/0x98
[   30.832767]  kfree+0x214/0x3c8
[   30.832804]  rcu_uaf_reclaim+0x28/0x70
[   30.832840]  rcu_core+0x9f4/0x1e20
[   30.832875]  rcu_core_si+0x18/0x30
[   30.832911]  handle_softirqs+0x374/0xb28
[   30.832948]  __do_softirq+0x1c/0x28
[   30.832983] 
[   30.833018] Last potentially related work creation:
[   30.833053]  kasan_save_stack+0x3c/0x68
[   30.833094]  kasan_record_aux_stack+0xb4/0xc8
[   30.833131]  __call_rcu_common.constprop.0+0x74/0x8c8
[   30.833173]  call_rcu+0x18/0x30
[   30.833206]  rcu_uaf+0x14c/0x2d8
[   30.833241]  kunit_try_run_case+0x170/0x3f0
[   30.833281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.833331]  kthread+0x328/0x630
[   30.833366]  ret_from_fork+0x10/0x20
[   30.833406] 
[   30.833433] The buggy address belongs to the object at fff00000c9a4d680
[   30.833433]  which belongs to the cache kmalloc-32 of size 32
[   30.833494] The buggy address is located 0 bytes inside of
[   30.833494]  freed 32-byte region [fff00000c9a4d680, fff00000c9a4d6a0)
[   30.833555] 
[   30.833577] The buggy address belongs to the physical page:
[   30.833623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a4d
[   30.833715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.833819] page_type: f5(slab)
[   30.833898] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   30.833997] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   30.834086] page dumped because: kasan: bad access detected
[   30.834130] 
[   30.834148] Memory state around the buggy address:
[   30.834181]  fff00000c9a4d580: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   30.834224]  fff00000c9a4d600: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   30.834273] >fff00000c9a4d680: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   30.834311]                    ^
[   30.834472]  fff00000c9a4d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.834612]  fff00000c9a4d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.834712] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   30.719097] ==================================================================
[   30.719297] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   30.719380] Read of size 1 at addr fff00000c91b3d00 by task kunit_try_catch/227
[   30.719433] 
[   30.719469] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.719667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.719697] Hardware name: linux,dummy-virt (DT)
[   30.719730] Call trace:
[   30.719756]  show_stack+0x20/0x38 (C)
[   30.719822]  dump_stack_lvl+0x8c/0xd0
[   30.719918]  print_report+0x118/0x5d0
[   30.719963]  kasan_report+0xdc/0x128
[   30.720022]  __kasan_check_byte+0x54/0x70
[   30.720073]  ksize+0x30/0x88
[   30.720145]  ksize_uaf+0x168/0x5f8
[   30.720189]  kunit_try_run_case+0x170/0x3f0
[   30.720257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.721456]  kthread+0x328/0x630
[   30.721512]  ret_from_fork+0x10/0x20
[   30.721564] 
[   30.721582] Allocated by task 227:
[   30.721611]  kasan_save_stack+0x3c/0x68
[   30.721654]  kasan_save_track+0x20/0x40
[   30.721692]  kasan_save_alloc_info+0x40/0x58
[   30.721730]  __kasan_kmalloc+0xd4/0xd8
[   30.721768]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.721810]  ksize_uaf+0xb8/0x5f8
[   30.721845]  kunit_try_run_case+0x170/0x3f0
[   30.721884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.721924]  kthread+0x328/0x630
[   30.721957]  ret_from_fork+0x10/0x20
[   30.721992] 
[   30.722012] Freed by task 227:
[   30.722039]  kasan_save_stack+0x3c/0x68
[   30.722077]  kasan_save_track+0x20/0x40
[   30.722115]  kasan_save_free_info+0x4c/0x78
[   30.722152]  __kasan_slab_free+0x6c/0x98
[   30.722190]  kfree+0x214/0x3c8
[   30.722225]  ksize_uaf+0x11c/0x5f8
[   30.722260]  kunit_try_run_case+0x170/0x3f0
[   30.722300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.722396]  kthread+0x328/0x630
[   30.722454]  ret_from_fork+0x10/0x20
[   30.722500] 
[   30.722519] The buggy address belongs to the object at fff00000c91b3d00
[   30.722519]  which belongs to the cache kmalloc-128 of size 128
[   30.722584] The buggy address is located 0 bytes inside of
[   30.722584]  freed 128-byte region [fff00000c91b3d00, fff00000c91b3d80)
[   30.722695] 
[   30.722779] The buggy address belongs to the physical page:
[   30.722858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.722913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.722963] page_type: f5(slab)
[   30.723015] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.723073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.723318] page dumped because: kasan: bad access detected
[   30.723362] 
[   30.723380] Memory state around the buggy address:
[   30.723425]  fff00000c91b3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.723467]  fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.723520] >fff00000c91b3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.723557]                    ^
[   30.723591]  fff00000c91b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.723635]  fff00000c91b3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.723674] ==================================================================
[   30.724610] ==================================================================
[   30.724666] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   30.724718] Read of size 1 at addr fff00000c91b3d00 by task kunit_try_catch/227
[   30.724767] 
[   30.724797] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.724910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.724957] Hardware name: linux,dummy-virt (DT)
[   30.725016] Call trace:
[   30.725055]  show_stack+0x20/0x38 (C)
[   30.725110]  dump_stack_lvl+0x8c/0xd0
[   30.725158]  print_report+0x118/0x5d0
[   30.725200]  kasan_report+0xdc/0x128
[   30.725243]  __asan_report_load1_noabort+0x20/0x30
[   30.725291]  ksize_uaf+0x598/0x5f8
[   30.725365]  kunit_try_run_case+0x170/0x3f0
[   30.725429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.725479]  kthread+0x328/0x630
[   30.725604]  ret_from_fork+0x10/0x20
[   30.725731] 
[   30.725789] Allocated by task 227:
[   30.725831]  kasan_save_stack+0x3c/0x68
[   30.725907]  kasan_save_track+0x20/0x40
[   30.726000]  kasan_save_alloc_info+0x40/0x58
[   30.726055]  __kasan_kmalloc+0xd4/0xd8
[   30.726134]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.726188]  ksize_uaf+0xb8/0x5f8
[   30.726235]  kunit_try_run_case+0x170/0x3f0
[   30.726365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.726446]  kthread+0x328/0x630
[   30.726506]  ret_from_fork+0x10/0x20
[   30.726629] 
[   30.726668] Freed by task 227:
[   30.726694]  kasan_save_stack+0x3c/0x68
[   30.726733]  kasan_save_track+0x20/0x40
[   30.726770]  kasan_save_free_info+0x4c/0x78
[   30.726809]  __kasan_slab_free+0x6c/0x98
[   30.726872]  kfree+0x214/0x3c8
[   30.726907]  ksize_uaf+0x11c/0x5f8
[   30.726943]  kunit_try_run_case+0x170/0x3f0
[   30.726981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.727027]  kthread+0x328/0x630
[   30.727058]  ret_from_fork+0x10/0x20
[   30.727101] 
[   30.727119] The buggy address belongs to the object at fff00000c91b3d00
[   30.727119]  which belongs to the cache kmalloc-128 of size 128
[   30.727177] The buggy address is located 0 bytes inside of
[   30.727177]  freed 128-byte region [fff00000c91b3d00, fff00000c91b3d80)
[   30.727237] 
[   30.727269] The buggy address belongs to the physical page:
[   30.727348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.727413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.727516] page_type: f5(slab)
[   30.727564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.727660] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.727766] page dumped because: kasan: bad access detected
[   30.727845] 
[   30.727900] Memory state around the buggy address:
[   30.727989]  fff00000c91b3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.728340]  fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.728385] >fff00000c91b3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.728557]                    ^
[   30.728584]  fff00000c91b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.728626]  fff00000c91b3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.728747] ==================================================================
[   30.729997] ==================================================================
[   30.730053] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   30.730104] Read of size 1 at addr fff00000c91b3d78 by task kunit_try_catch/227
[   30.730155] 
[   30.730196] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.730305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.730349] Hardware name: linux,dummy-virt (DT)
[   30.730398] Call trace:
[   30.730438]  show_stack+0x20/0x38 (C)
[   30.730536]  dump_stack_lvl+0x8c/0xd0
[   30.730602]  print_report+0x118/0x5d0
[   30.730646]  kasan_report+0xdc/0x128
[   30.730724]  __asan_report_load1_noabort+0x20/0x30
[   30.730791]  ksize_uaf+0x544/0x5f8
[   30.730857]  kunit_try_run_case+0x170/0x3f0
[   30.730949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.731002]  kthread+0x328/0x630
[   30.731079]  ret_from_fork+0x10/0x20
[   30.731129] 
[   30.731180] Allocated by task 227:
[   30.731227]  kasan_save_stack+0x3c/0x68
[   30.731274]  kasan_save_track+0x20/0x40
[   30.731330]  kasan_save_alloc_info+0x40/0x58
[   30.731408]  __kasan_kmalloc+0xd4/0xd8
[   30.731454]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.731497]  ksize_uaf+0xb8/0x5f8
[   30.731533]  kunit_try_run_case+0x170/0x3f0
[   30.731591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.731734]  kthread+0x328/0x630
[   30.731823]  ret_from_fork+0x10/0x20
[   30.731902] 
[   30.731941] Freed by task 227:
[   30.732006]  kasan_save_stack+0x3c/0x68
[   30.732066]  kasan_save_track+0x20/0x40
[   30.732118]  kasan_save_free_info+0x4c/0x78
[   30.732157]  __kasan_slab_free+0x6c/0x98
[   30.732195]  kfree+0x214/0x3c8
[   30.732239]  ksize_uaf+0x11c/0x5f8
[   30.732274]  kunit_try_run_case+0x170/0x3f0
[   30.732314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.732366]  kthread+0x328/0x630
[   30.732398]  ret_from_fork+0x10/0x20
[   30.732434] 
[   30.732452] The buggy address belongs to the object at fff00000c91b3d00
[   30.732452]  which belongs to the cache kmalloc-128 of size 128
[   30.732509] The buggy address is located 120 bytes inside of
[   30.732509]  freed 128-byte region [fff00000c91b3d00, fff00000c91b3d80)
[   30.732570] 
[   30.732589] The buggy address belongs to the physical page:
[   30.732629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.732680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.732740] page_type: f5(slab)
[   30.732779] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.732829] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.732867] page dumped because: kasan: bad access detected
[   30.732908] 
[   30.732926] Memory state around the buggy address:
[   30.732957]  fff00000c91b3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.733000]  fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.733042] >fff00000c91b3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.733087]                                                                 ^
[   30.733128]  fff00000c91b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.733169]  fff00000c91b3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.733207] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   30.707156] ==================================================================
[   30.707204] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.707254] Read of size 1 at addr fff00000c91b3c78 by task kunit_try_catch/225
[   30.707303] 
[   30.707349] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.707433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.707479] Hardware name: linux,dummy-virt (DT)
[   30.707511] Call trace:
[   30.707533]  show_stack+0x20/0x38 (C)
[   30.707582]  dump_stack_lvl+0x8c/0xd0
[   30.707639]  print_report+0x118/0x5d0
[   30.707692]  kasan_report+0xdc/0x128
[   30.707746]  __asan_report_load1_noabort+0x20/0x30
[   30.707798]  ksize_unpoisons_memory+0x618/0x740
[   30.707848]  kunit_try_run_case+0x170/0x3f0
[   30.707898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.707948]  kthread+0x328/0x630
[   30.707991]  ret_from_fork+0x10/0x20
[   30.708045] 
[   30.708065] Allocated by task 225:
[   30.708102]  kasan_save_stack+0x3c/0x68
[   30.708145]  kasan_save_track+0x20/0x40
[   30.708189]  kasan_save_alloc_info+0x40/0x58
[   30.708233]  __kasan_kmalloc+0xd4/0xd8
[   30.708270]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.708311]  ksize_unpoisons_memory+0xc0/0x740
[   30.708361]  kunit_try_run_case+0x170/0x3f0
[   30.708398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.708447]  kthread+0x328/0x630
[   30.708480]  ret_from_fork+0x10/0x20
[   30.708515] 
[   30.708533] The buggy address belongs to the object at fff00000c91b3c00
[   30.708533]  which belongs to the cache kmalloc-128 of size 128
[   30.708600] The buggy address is located 5 bytes to the right of
[   30.708600]  allocated 115-byte region [fff00000c91b3c00, fff00000c91b3c73)
[   30.708665] 
[   30.708684] The buggy address belongs to the physical page:
[   30.708719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.708772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.708830] page_type: f5(slab)
[   30.708869] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.708919] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.708968] page dumped because: kasan: bad access detected
[   30.709000] 
[   30.709033] Memory state around the buggy address:
[   30.709076]  fff00000c91b3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.709121]  fff00000c91b3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.709161] >fff00000c91b3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.709199]                                                                 ^
[   30.709248]  fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.709297]  fff00000c91b3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.709346] ==================================================================
[   30.702370] ==================================================================
[   30.702444] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.702524] Read of size 1 at addr fff00000c91b3c73 by task kunit_try_catch/225
[   30.702604] 
[   30.702651] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.702778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.702826] Hardware name: linux,dummy-virt (DT)
[   30.702862] Call trace:
[   30.702890]  show_stack+0x20/0x38 (C)
[   30.702962]  dump_stack_lvl+0x8c/0xd0
[   30.703021]  print_report+0x118/0x5d0
[   30.703082]  kasan_report+0xdc/0x128
[   30.703127]  __asan_report_load1_noabort+0x20/0x30
[   30.703187]  ksize_unpoisons_memory+0x628/0x740
[   30.703237]  kunit_try_run_case+0x170/0x3f0
[   30.705340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.705419]  kthread+0x328/0x630
[   30.705467]  ret_from_fork+0x10/0x20
[   30.705518] 
[   30.705536] Allocated by task 225:
[   30.705567]  kasan_save_stack+0x3c/0x68
[   30.705609]  kasan_save_track+0x20/0x40
[   30.705648]  kasan_save_alloc_info+0x40/0x58
[   30.705686]  __kasan_kmalloc+0xd4/0xd8
[   30.705724]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.705764]  ksize_unpoisons_memory+0xc0/0x740
[   30.705803]  kunit_try_run_case+0x170/0x3f0
[   30.705842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.705884]  kthread+0x328/0x630
[   30.705917]  ret_from_fork+0x10/0x20
[   30.705953] 
[   30.705972] The buggy address belongs to the object at fff00000c91b3c00
[   30.705972]  which belongs to the cache kmalloc-128 of size 128
[   30.706032] The buggy address is located 0 bytes to the right of
[   30.706032]  allocated 115-byte region [fff00000c91b3c00, fff00000c91b3c73)
[   30.706096] 
[   30.706118] The buggy address belongs to the physical page:
[   30.706151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.706206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.706255] page_type: f5(slab)
[   30.706300] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.706360] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.706399] page dumped because: kasan: bad access detected
[   30.706430] 
[   30.706449] Memory state around the buggy address:
[   30.706480]  fff00000c91b3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.706521]  fff00000c91b3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.706564] >fff00000c91b3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.706600]                                                              ^
[   30.706640]  fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.706681]  fff00000c91b3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.706719] ==================================================================
[   30.709474] ==================================================================
[   30.709513] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   30.709559] Read of size 1 at addr fff00000c91b3c7f by task kunit_try_catch/225
[   30.709610] 
[   30.709637] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.709732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.709759] Hardware name: linux,dummy-virt (DT)
[   30.709789] Call trace:
[   30.709812]  show_stack+0x20/0x38 (C)
[   30.709860]  dump_stack_lvl+0x8c/0xd0
[   30.709905]  print_report+0x118/0x5d0
[   30.709949]  kasan_report+0xdc/0x128
[   30.709992]  __asan_report_load1_noabort+0x20/0x30
[   30.710043]  ksize_unpoisons_memory+0x690/0x740
[   30.710091]  kunit_try_run_case+0x170/0x3f0
[   30.710140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.710252]  kthread+0x328/0x630
[   30.710296]  ret_from_fork+0x10/0x20
[   30.710357] 
[   30.710377] Allocated by task 225:
[   30.710403]  kasan_save_stack+0x3c/0x68
[   30.710444]  kasan_save_track+0x20/0x40
[   30.710481]  kasan_save_alloc_info+0x40/0x58
[   30.710519]  __kasan_kmalloc+0xd4/0xd8
[   30.710555]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.710596]  ksize_unpoisons_memory+0xc0/0x740
[   30.710634]  kunit_try_run_case+0x170/0x3f0
[   30.710685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.710727]  kthread+0x328/0x630
[   30.710804]  ret_from_fork+0x10/0x20
[   30.710873] 
[   30.710964] The buggy address belongs to the object at fff00000c91b3c00
[   30.710964]  which belongs to the cache kmalloc-128 of size 128
[   30.711056] The buggy address is located 12 bytes to the right of
[   30.711056]  allocated 115-byte region [fff00000c91b3c00, fff00000c91b3c73)
[   30.711140] 
[   30.711192] The buggy address belongs to the physical page:
[   30.711250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.711313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.711370] page_type: f5(slab)
[   30.711405] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.711457] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.711496] page dumped because: kasan: bad access detected
[   30.711527] 
[   30.711544] Memory state around the buggy address:
[   30.711574]  fff00000c91b3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.711630]  fff00000c91b3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.711734] >fff00000c91b3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.711813]                                                                 ^
[   30.711908]  fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.711997]  fff00000c91b3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.712114] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   30.688877] ==================================================================
[   30.689133] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   30.689185] Free of addr fff00000c918c680 by task kunit_try_catch/223
[   30.689244] 
[   30.689276] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.689433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.689489] Hardware name: linux,dummy-virt (DT)
[   30.689568] Call trace:
[   30.689669]  show_stack+0x20/0x38 (C)
[   30.689755]  dump_stack_lvl+0x8c/0xd0
[   30.689843]  print_report+0x118/0x5d0
[   30.689933]  kasan_report_invalid_free+0xc0/0xe8
[   30.690047]  check_slab_allocation+0xd4/0x108
[   30.690147]  __kasan_slab_pre_free+0x2c/0x48
[   30.690255]  kfree+0xe8/0x3c8
[   30.690342]  kfree_sensitive+0x3c/0xb0
[   30.690413]  kmalloc_double_kzfree+0x168/0x308
[   30.690481]  kunit_try_run_case+0x170/0x3f0
[   30.690529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.690577]  kthread+0x328/0x630
[   30.690619]  ret_from_fork+0x10/0x20
[   30.690668] 
[   30.690976] Allocated by task 223:
[   30.691053]  kasan_save_stack+0x3c/0x68
[   30.691147]  kasan_save_track+0x20/0x40
[   30.691254]  kasan_save_alloc_info+0x40/0x58
[   30.691341]  __kasan_kmalloc+0xd4/0xd8
[   30.691438]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.691543]  kmalloc_double_kzfree+0xb8/0x308
[   30.691630]  kunit_try_run_case+0x170/0x3f0
[   30.691757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.691826]  kthread+0x328/0x630
[   30.691861]  ret_from_fork+0x10/0x20
[   30.691905] 
[   30.691959] Freed by task 223:
[   30.692195]  kasan_save_stack+0x3c/0x68
[   30.692247]  kasan_save_track+0x20/0x40
[   30.692286]  kasan_save_free_info+0x4c/0x78
[   30.692558]  __kasan_slab_free+0x6c/0x98
[   30.692717]  kfree+0x214/0x3c8
[   30.692859]  kfree_sensitive+0x80/0xb0
[   30.692940]  kmalloc_double_kzfree+0x11c/0x308
[   30.692993]  kunit_try_run_case+0x170/0x3f0
[   30.693040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.693082]  kthread+0x328/0x630
[   30.693114]  ret_from_fork+0x10/0x20
[   30.693159] 
[   30.693180] The buggy address belongs to the object at fff00000c918c680
[   30.693180]  which belongs to the cache kmalloc-16 of size 16
[   30.693244] The buggy address is located 0 bytes inside of
[   30.693244]  16-byte region [fff00000c918c680, fff00000c918c690)
[   30.693307] 
[   30.693341] The buggy address belongs to the physical page:
[   30.693372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c
[   30.693426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.693477] page_type: f5(slab)
[   30.693516] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.693566] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.693606] page dumped because: kasan: bad access detected
[   30.693636] 
[   30.693654] Memory state around the buggy address:
[   30.693687]  fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.693756]  fff00000c918c600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.693852] >fff00000c918c680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.694001]                    ^
[   30.694082]  fff00000c918c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.694135]  fff00000c918c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.694198] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   30.683787] ==================================================================
[   30.683851] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.683921] Read of size 1 at addr fff00000c918c680 by task kunit_try_catch/223
[   30.683971] 
[   30.684010] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.684098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.684124] Hardware name: linux,dummy-virt (DT)
[   30.684157] Call trace:
[   30.684204]  show_stack+0x20/0x38 (C)
[   30.684258]  dump_stack_lvl+0x8c/0xd0
[   30.684305]  print_report+0x118/0x5d0
[   30.684804]  kasan_report+0xdc/0x128
[   30.684847]  __kasan_check_byte+0x54/0x70
[   30.684896]  kfree_sensitive+0x30/0xb0
[   30.685004]  kmalloc_double_kzfree+0x168/0x308
[   30.685070]  kunit_try_run_case+0x170/0x3f0
[   30.685138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.685190]  kthread+0x328/0x630
[   30.685236]  ret_from_fork+0x10/0x20
[   30.685284] 
[   30.685302] Allocated by task 223:
[   30.685340]  kasan_save_stack+0x3c/0x68
[   30.685382]  kasan_save_track+0x20/0x40
[   30.685451]  kasan_save_alloc_info+0x40/0x58
[   30.685491]  __kasan_kmalloc+0xd4/0xd8
[   30.685529]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.685571]  kmalloc_double_kzfree+0xb8/0x308
[   30.685611]  kunit_try_run_case+0x170/0x3f0
[   30.685650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.685690]  kthread+0x328/0x630
[   30.685724]  ret_from_fork+0x10/0x20
[   30.685760] 
[   30.685779] Freed by task 223:
[   30.685804]  kasan_save_stack+0x3c/0x68
[   30.685843]  kasan_save_track+0x20/0x40
[   30.685880]  kasan_save_free_info+0x4c/0x78
[   30.685916]  __kasan_slab_free+0x6c/0x98
[   30.685955]  kfree+0x214/0x3c8
[   30.685990]  kfree_sensitive+0x80/0xb0
[   30.686028]  kmalloc_double_kzfree+0x11c/0x308
[   30.686068]  kunit_try_run_case+0x170/0x3f0
[   30.686107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.686148]  kthread+0x328/0x630
[   30.686204]  ret_from_fork+0x10/0x20
[   30.686272] 
[   30.686383] The buggy address belongs to the object at fff00000c918c680
[   30.686383]  which belongs to the cache kmalloc-16 of size 16
[   30.686469] The buggy address is located 0 bytes inside of
[   30.686469]  freed 16-byte region [fff00000c918c680, fff00000c918c690)
[   30.686602] 
[   30.686662] The buggy address belongs to the physical page:
[   30.686723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c
[   30.686855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.686922] page_type: f5(slab)
[   30.686994] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.687130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.687207] page dumped because: kasan: bad access detected
[   30.687276] 
[   30.687314] Memory state around the buggy address:
[   30.687358]  fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.687668]  fff00000c918c600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.687787] >fff00000c918c680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.687874]                    ^
[   30.687910]  fff00000c918c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.687996]  fff00000c918c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.688086] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   30.621818] ==================================================================
[   30.621921] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   30.623896] Read of size 1 at addr fff00000c9ac9ba8 by task kunit_try_catch/219
[   30.624263] 
[   30.624418] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.625426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.625509] Hardware name: linux,dummy-virt (DT)
[   30.626292] Call trace:
[   30.626334]  show_stack+0x20/0x38 (C)
[   30.626725]  dump_stack_lvl+0x8c/0xd0
[   30.627277]  print_report+0x118/0x5d0
[   30.627677]  kasan_report+0xdc/0x128
[   30.628340]  __asan_report_load1_noabort+0x20/0x30
[   30.629117]  kmalloc_uaf2+0x3f4/0x468
[   30.629820]  kunit_try_run_case+0x170/0x3f0
[   30.630083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.630652]  kthread+0x328/0x630
[   30.631072]  ret_from_fork+0x10/0x20
[   30.631672] 
[   30.631820] Allocated by task 219:
[   30.632084]  kasan_save_stack+0x3c/0x68
[   30.632434]  kasan_save_track+0x20/0x40
[   30.632477]  kasan_save_alloc_info+0x40/0x58
[   30.633137]  __kasan_kmalloc+0xd4/0xd8
[   30.633654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.634280]  kmalloc_uaf2+0xc4/0x468
[   30.634696]  kunit_try_run_case+0x170/0x3f0
[   30.635085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.635819]  kthread+0x328/0x630
[   30.635989]  ret_from_fork+0x10/0x20
[   30.636421] 
[   30.636444] Freed by task 219:
[   30.636819]  kasan_save_stack+0x3c/0x68
[   30.636871]  kasan_save_track+0x20/0x40
[   30.637654]  kasan_save_free_info+0x4c/0x78
[   30.638151]  __kasan_slab_free+0x6c/0x98
[   30.638446]  kfree+0x214/0x3c8
[   30.638568]  kmalloc_uaf2+0x134/0x468
[   30.639122]  kunit_try_run_case+0x170/0x3f0
[   30.639180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.639223]  kthread+0x328/0x630
[   30.639899]  ret_from_fork+0x10/0x20
[   30.640438] 
[   30.640464] The buggy address belongs to the object at fff00000c9ac9b80
[   30.640464]  which belongs to the cache kmalloc-64 of size 64
[   30.640919] The buggy address is located 40 bytes inside of
[   30.640919]  freed 64-byte region [fff00000c9ac9b80, fff00000c9ac9bc0)
[   30.640990] 
[   30.641012] The buggy address belongs to the physical page:
[   30.641046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ac9
[   30.641107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.641161] page_type: f5(slab)
[   30.642661] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.643477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.643767] page dumped because: kasan: bad access detected
[   30.643840] 
[   30.643859] Memory state around the buggy address:
[   30.644535]  fff00000c9ac9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.644594]  fff00000c9ac9b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.645253] >fff00000c9ac9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.645494]                                   ^
[   30.645803]  fff00000c9ac9c00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   30.645872]  fff00000c9ac9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.645945] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   30.543270] ==================================================================
[   30.543378] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   30.543455] Write of size 33 at addr fff00000c9ac9a80 by task kunit_try_catch/217
[   30.545884] 
[   30.545948] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.546241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.546268] Hardware name: linux,dummy-virt (DT)
[   30.548068] Call trace:
[   30.548169]  show_stack+0x20/0x38 (C)
[   30.548237]  dump_stack_lvl+0x8c/0xd0
[   30.548715]  print_report+0x118/0x5d0
[   30.549225]  kasan_report+0xdc/0x128
[   30.549940]  kasan_check_range+0x100/0x1a8
[   30.550215]  __asan_memset+0x34/0x78
[   30.550348]  kmalloc_uaf_memset+0x170/0x310
[   30.551001]  kunit_try_run_case+0x170/0x3f0
[   30.551635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.551698]  kthread+0x328/0x630
[   30.552619]  ret_from_fork+0x10/0x20
[   30.552685] 
[   30.552705] Allocated by task 217:
[   30.552736]  kasan_save_stack+0x3c/0x68
[   30.553537]  kasan_save_track+0x20/0x40
[   30.553920]  kasan_save_alloc_info+0x40/0x58
[   30.553967]  __kasan_kmalloc+0xd4/0xd8
[   30.554004]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.554726]  kmalloc_uaf_memset+0xb8/0x310
[   30.554779]  kunit_try_run_case+0x170/0x3f0
[   30.555440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.556164]  kthread+0x328/0x630
[   30.556238]  ret_from_fork+0x10/0x20
[   30.557066] 
[   30.557091] Freed by task 217:
[   30.557122]  kasan_save_stack+0x3c/0x68
[   30.557792]  kasan_save_track+0x20/0x40
[   30.558723]  kasan_save_free_info+0x4c/0x78
[   30.558898]  __kasan_slab_free+0x6c/0x98
[   30.559504]  kfree+0x214/0x3c8
[   30.559662]  kmalloc_uaf_memset+0x11c/0x310
[   30.559710]  kunit_try_run_case+0x170/0x3f0
[   30.559982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.560319]  kthread+0x328/0x630
[   30.560692]  ret_from_fork+0x10/0x20
[   30.560734] 
[   30.561572] The buggy address belongs to the object at fff00000c9ac9a80
[   30.561572]  which belongs to the cache kmalloc-64 of size 64
[   30.561661] The buggy address is located 0 bytes inside of
[   30.561661]  freed 64-byte region [fff00000c9ac9a80, fff00000c9ac9ac0)
[   30.561724] 
[   30.562726] The buggy address belongs to the physical page:
[   30.562770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ac9
[   30.562835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.562891] page_type: f5(slab)
[   30.562936] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.562989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.564619] page dumped because: kasan: bad access detected
[   30.565160] 
[   30.565341] Memory state around the buggy address:
[   30.565422]  fff00000c9ac9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.566012]  fff00000c9ac9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.567055] >fff00000c9ac9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.567270]                    ^
[   30.567315]  fff00000c9ac9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.567381]  fff00000c9ac9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.567422] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   30.499132] ==================================================================
[   30.499335] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   30.499925] Read of size 1 at addr fff00000c918c668 by task kunit_try_catch/215
[   30.499991] 
[   30.500149] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.500239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.500266] Hardware name: linux,dummy-virt (DT)
[   30.500304] Call trace:
[   30.500563]  show_stack+0x20/0x38 (C)
[   30.500712]  dump_stack_lvl+0x8c/0xd0
[   30.500800]  print_report+0x118/0x5d0
[   30.501103]  kasan_report+0xdc/0x128
[   30.501203]  __asan_report_load1_noabort+0x20/0x30
[   30.501468]  kmalloc_uaf+0x300/0x338
[   30.501673]  kunit_try_run_case+0x170/0x3f0
[   30.501727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.501779]  kthread+0x328/0x630
[   30.501959]  ret_from_fork+0x10/0x20
[   30.502025] 
[   30.502043] Allocated by task 215:
[   30.502143]  kasan_save_stack+0x3c/0x68
[   30.502189]  kasan_save_track+0x20/0x40
[   30.502228]  kasan_save_alloc_info+0x40/0x58
[   30.502270]  __kasan_kmalloc+0xd4/0xd8
[   30.502388]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.502464]  kmalloc_uaf+0xb8/0x338
[   30.502622]  kunit_try_run_case+0x170/0x3f0
[   30.502707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.502748]  kthread+0x328/0x630
[   30.502780]  ret_from_fork+0x10/0x20
[   30.502856] 
[   30.502936] Freed by task 215:
[   30.503053]  kasan_save_stack+0x3c/0x68
[   30.503119]  kasan_save_track+0x20/0x40
[   30.503217]  kasan_save_free_info+0x4c/0x78
[   30.503265]  __kasan_slab_free+0x6c/0x98
[   30.503303]  kfree+0x214/0x3c8
[   30.503660]  kmalloc_uaf+0x11c/0x338
[   30.504041]  kunit_try_run_case+0x170/0x3f0
[   30.504091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.504285]  kthread+0x328/0x630
[   30.504339]  ret_from_fork+0x10/0x20
[   30.504471] 
[   30.504491] The buggy address belongs to the object at fff00000c918c660
[   30.504491]  which belongs to the cache kmalloc-16 of size 16
[   30.504550] The buggy address is located 8 bytes inside of
[   30.504550]  freed 16-byte region [fff00000c918c660, fff00000c918c670)
[   30.504905] 
[   30.504936] The buggy address belongs to the physical page:
[   30.505028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c
[   30.505105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.505184] page_type: f5(slab)
[   30.505276] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.505339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.505569] page dumped because: kasan: bad access detected
[   30.505674] 
[   30.505697] Memory state around the buggy address:
[   30.505730]  fff00000c918c500: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   30.505772]  fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.505814] >fff00000c918c600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.506036]                                                           ^
[   30.506142]  fff00000c918c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.506224]  fff00000c918c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.506263] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   30.473136] ==================================================================
[   30.473205] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   30.473875] Read of size 64 at addr fff00000c9ac9784 by task kunit_try_catch/213
[   30.473928] 
[   30.474112] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.474226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.474337] Hardware name: linux,dummy-virt (DT)
[   30.474396] Call trace:
[   30.474420]  show_stack+0x20/0x38 (C)
[   30.474510]  dump_stack_lvl+0x8c/0xd0
[   30.474907]  print_report+0x118/0x5d0
[   30.475003]  kasan_report+0xdc/0x128
[   30.475056]  kasan_check_range+0x100/0x1a8
[   30.475101]  __asan_memmove+0x3c/0x98
[   30.475355]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   30.475492]  kunit_try_run_case+0x170/0x3f0
[   30.475543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.475592]  kthread+0x328/0x630
[   30.475635]  ret_from_fork+0x10/0x20
[   30.475960] 
[   30.475982] Allocated by task 213:
[   30.476069]  kasan_save_stack+0x3c/0x68
[   30.476140]  kasan_save_track+0x20/0x40
[   30.476198]  kasan_save_alloc_info+0x40/0x58
[   30.476504]  __kasan_kmalloc+0xd4/0xd8
[   30.476777]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.476831]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   30.476911]  kunit_try_run_case+0x170/0x3f0
[   30.477138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.477247]  kthread+0x328/0x630
[   30.477279]  ret_from_fork+0x10/0x20
[   30.477348] 
[   30.477432] The buggy address belongs to the object at fff00000c9ac9780
[   30.477432]  which belongs to the cache kmalloc-64 of size 64
[   30.477492] The buggy address is located 4 bytes inside of
[   30.477492]  allocated 64-byte region [fff00000c9ac9780, fff00000c9ac97c0)
[   30.477563] 
[   30.477627] The buggy address belongs to the physical page:
[   30.477660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ac9
[   30.477737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.477788] page_type: f5(slab)
[   30.477868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.478077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.478217] page dumped because: kasan: bad access detected
[   30.478284] 
[   30.478301] Memory state around the buggy address:
[   30.478349]  fff00000c9ac9680: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   30.478393]  fff00000c9ac9700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.478445] >fff00000c9ac9780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.478482]                                            ^
[   30.478516]  fff00000c9ac9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.478926]  fff00000c9ac9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.479156] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   30.453675] ==================================================================
[   30.454252] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   30.454375] Read of size 18446744073709551614 at addr fff00000c9ac9584 by task kunit_try_catch/211
[   30.454468] 
[   30.454507] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.454985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.455067] Hardware name: linux,dummy-virt (DT)
[   30.455099] Call trace:
[   30.455131]  show_stack+0x20/0x38 (C)
[   30.455299]  dump_stack_lvl+0x8c/0xd0
[   30.455357]  print_report+0x118/0x5d0
[   30.455401]  kasan_report+0xdc/0x128
[   30.455442]  kasan_check_range+0x100/0x1a8
[   30.455487]  __asan_memmove+0x3c/0x98
[   30.455541]  kmalloc_memmove_negative_size+0x154/0x2e0
[   30.455591]  kunit_try_run_case+0x170/0x3f0
[   30.455990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.456096]  kthread+0x328/0x630
[   30.456314]  ret_from_fork+0x10/0x20
[   30.456445] 
[   30.456463] Allocated by task 211:
[   30.456592]  kasan_save_stack+0x3c/0x68
[   30.456635]  kasan_save_track+0x20/0x40
[   30.457009]  kasan_save_alloc_info+0x40/0x58
[   30.457106]  __kasan_kmalloc+0xd4/0xd8
[   30.457199]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.457242]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   30.457284]  kunit_try_run_case+0x170/0x3f0
[   30.457343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.457468]  kthread+0x328/0x630
[   30.457500]  ret_from_fork+0x10/0x20
[   30.457535] 
[   30.457557] The buggy address belongs to the object at fff00000c9ac9580
[   30.457557]  which belongs to the cache kmalloc-64 of size 64
[   30.457742] The buggy address is located 4 bytes inside of
[   30.457742]  64-byte region [fff00000c9ac9580, fff00000c9ac95c0)
[   30.457802] 
[   30.457825] The buggy address belongs to the physical page:
[   30.457855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ac9
[   30.458257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.458311] page_type: f5(slab)
[   30.458364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.458745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.458790] page dumped because: kasan: bad access detected
[   30.458822] 
[   30.458840] Memory state around the buggy address:
[   30.458874]  fff00000c9ac9480: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   30.458916]  fff00000c9ac9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.459197] >fff00000c9ac9580: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.459241]                    ^
[   30.459281]  fff00000c9ac9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.459511]  fff00000c9ac9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.459577] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   30.438751] ==================================================================
[   30.438860] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.438935] Write of size 16 at addr fff00000c91b3b69 by task kunit_try_catch/209
[   30.438986] 
[   30.439033] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.439300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.439398] Hardware name: linux,dummy-virt (DT)
[   30.439511] Call trace:
[   30.439537]  show_stack+0x20/0x38 (C)
[   30.439589]  dump_stack_lvl+0x8c/0xd0
[   30.439942]  print_report+0x118/0x5d0
[   30.440024]  kasan_report+0xdc/0x128
[   30.440067]  kasan_check_range+0x100/0x1a8
[   30.440111]  __asan_memset+0x34/0x78
[   30.440153]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.440199]  kunit_try_run_case+0x170/0x3f0
[   30.440289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.440494]  kthread+0x328/0x630
[   30.440544]  ret_from_fork+0x10/0x20
[   30.440763] 
[   30.440851] Allocated by task 209:
[   30.440903]  kasan_save_stack+0x3c/0x68
[   30.441030]  kasan_save_track+0x20/0x40
[   30.441074]  kasan_save_alloc_info+0x40/0x58
[   30.441111]  __kasan_kmalloc+0xd4/0xd8
[   30.441154]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.441226]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.441338]  kunit_try_run_case+0x170/0x3f0
[   30.441401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.441447]  kthread+0x328/0x630
[   30.441481]  ret_from_fork+0x10/0x20
[   30.441518] 
[   30.441541] The buggy address belongs to the object at fff00000c91b3b00
[   30.441541]  which belongs to the cache kmalloc-128 of size 128
[   30.441599] The buggy address is located 105 bytes inside of
[   30.441599]  allocated 120-byte region [fff00000c91b3b00, fff00000c91b3b78)
[   30.442009] 
[   30.442033] The buggy address belongs to the physical page:
[   30.442101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.442389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.442672] page_type: f5(slab)
[   30.442731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.442983] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.443155] page dumped because: kasan: bad access detected
[   30.443373] 
[   30.443398] Memory state around the buggy address:
[   30.443436]  fff00000c91b3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.443481]  fff00000c91b3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.443775] >fff00000c91b3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.443884]                                                                 ^
[   30.443986]  fff00000c91b3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.444028]  fff00000c91b3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.444068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   30.419916] ==================================================================
[   30.420165] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   30.420332] Write of size 8 at addr fff00000c91b3a71 by task kunit_try_catch/207
[   30.420382] 
[   30.420418] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.420502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.420527] Hardware name: linux,dummy-virt (DT)
[   30.420557] Call trace:
[   30.420579]  show_stack+0x20/0x38 (C)
[   30.420626]  dump_stack_lvl+0x8c/0xd0
[   30.420670]  print_report+0x118/0x5d0
[   30.421138]  kasan_report+0xdc/0x128
[   30.421541]  kasan_check_range+0x100/0x1a8
[   30.421695]  __asan_memset+0x34/0x78
[   30.421738]  kmalloc_oob_memset_8+0x150/0x2f8
[   30.421784]  kunit_try_run_case+0x170/0x3f0
[   30.421832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.421880]  kthread+0x328/0x630
[   30.421922]  ret_from_fork+0x10/0x20
[   30.421969] 
[   30.421986] Allocated by task 207:
[   30.422536]  kasan_save_stack+0x3c/0x68
[   30.422589]  kasan_save_track+0x20/0x40
[   30.422954]  kasan_save_alloc_info+0x40/0x58
[   30.422992]  __kasan_kmalloc+0xd4/0xd8
[   30.423033]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.423077]  kmalloc_oob_memset_8+0xb0/0x2f8
[   30.423115]  kunit_try_run_case+0x170/0x3f0
[   30.423154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.423205]  kthread+0x328/0x630
[   30.423238]  ret_from_fork+0x10/0x20
[   30.423272] 
[   30.423610] The buggy address belongs to the object at fff00000c91b3a00
[   30.423610]  which belongs to the cache kmalloc-128 of size 128
[   30.423669] The buggy address is located 113 bytes inside of
[   30.423669]  allocated 120-byte region [fff00000c91b3a00, fff00000c91b3a78)
[   30.423731] 
[   30.423754] The buggy address belongs to the physical page:
[   30.424116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.424205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.424257] page_type: f5(slab)
[   30.424299] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.424632] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.424829] page dumped because: kasan: bad access detected
[   30.424863] 
[   30.424911] Memory state around the buggy address:
[   30.424945]  fff00000c91b3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.425031]  fff00000c91b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.425193] >fff00000c91b3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.425229]                                                                 ^
[   30.425267]  fff00000c91b3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.425345]  fff00000c91b3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.425407] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   30.405175] ==================================================================
[   30.405511] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   30.405591] Write of size 4 at addr fff00000c91b3975 by task kunit_try_catch/205
[   30.405648] 
[   30.405686] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.405771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.405822] Hardware name: linux,dummy-virt (DT)
[   30.405855] Call trace:
[   30.405878]  show_stack+0x20/0x38 (C)
[   30.405984]  dump_stack_lvl+0x8c/0xd0
[   30.406371]  print_report+0x118/0x5d0
[   30.406458]  kasan_report+0xdc/0x128
[   30.406499]  kasan_check_range+0x100/0x1a8
[   30.406622]  __asan_memset+0x34/0x78
[   30.406666]  kmalloc_oob_memset_4+0x150/0x300
[   30.406711]  kunit_try_run_case+0x170/0x3f0
[   30.406759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.406829]  kthread+0x328/0x630
[   30.407032]  ret_from_fork+0x10/0x20
[   30.407107] 
[   30.407195] Allocated by task 205:
[   30.407224]  kasan_save_stack+0x3c/0x68
[   30.407265]  kasan_save_track+0x20/0x40
[   30.407302]  kasan_save_alloc_info+0x40/0x58
[   30.407349]  __kasan_kmalloc+0xd4/0xd8
[   30.407393]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.407582]  kmalloc_oob_memset_4+0xb0/0x300
[   30.407669]  kunit_try_run_case+0x170/0x3f0
[   30.407776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.407971]  kthread+0x328/0x630
[   30.408004]  ret_from_fork+0x10/0x20
[   30.408079] 
[   30.408174] The buggy address belongs to the object at fff00000c91b3900
[   30.408174]  which belongs to the cache kmalloc-128 of size 128
[   30.408275] The buggy address is located 117 bytes inside of
[   30.408275]  allocated 120-byte region [fff00000c91b3900, fff00000c91b3978)
[   30.408344] 
[   30.408365] The buggy address belongs to the physical page:
[   30.408395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.408447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.408495] page_type: f5(slab)
[   30.408536] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.408613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.408652] page dumped because: kasan: bad access detected
[   30.408965] 
[   30.409245] Memory state around the buggy address:
[   30.409355]  fff00000c91b3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.409676]  fff00000c91b3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.409808] >fff00000c91b3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.409990]                                                                 ^
[   30.410057]  fff00000c91b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.410201]  fff00000c91b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.410243] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   30.386771] ==================================================================
[   30.386854] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   30.386924] Write of size 2 at addr fff00000c91b3877 by task kunit_try_catch/203
[   30.386974] 
[   30.387013] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.387345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.387378] Hardware name: linux,dummy-virt (DT)
[   30.387409] Call trace:
[   30.387433]  show_stack+0x20/0x38 (C)
[   30.387484]  dump_stack_lvl+0x8c/0xd0
[   30.388278]  print_report+0x118/0x5d0
[   30.388372]  kasan_report+0xdc/0x128
[   30.388414]  kasan_check_range+0x100/0x1a8
[   30.388457]  __asan_memset+0x34/0x78
[   30.388809]  kmalloc_oob_memset_2+0x150/0x2f8
[   30.389034]  kunit_try_run_case+0x170/0x3f0
[   30.389274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.389701]  kthread+0x328/0x630
[   30.389764]  ret_from_fork+0x10/0x20
[   30.389813] 
[   30.389955] Allocated by task 203:
[   30.389984]  kasan_save_stack+0x3c/0x68
[   30.390183]  kasan_save_track+0x20/0x40
[   30.390392]  kasan_save_alloc_info+0x40/0x58
[   30.390491]  __kasan_kmalloc+0xd4/0xd8
[   30.390536]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.390600]  kmalloc_oob_memset_2+0xb0/0x2f8
[   30.391042]  kunit_try_run_case+0x170/0x3f0
[   30.391095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.391176]  kthread+0x328/0x630
[   30.391334]  ret_from_fork+0x10/0x20
[   30.391371] 
[   30.391392] The buggy address belongs to the object at fff00000c91b3800
[   30.391392]  which belongs to the cache kmalloc-128 of size 128
[   30.391503] The buggy address is located 119 bytes inside of
[   30.391503]  allocated 120-byte region [fff00000c91b3800, fff00000c91b3878)
[   30.391758] 
[   30.391806] The buggy address belongs to the physical page:
[   30.392055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.392144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.392293] page_type: f5(slab)
[   30.392498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.392555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.392595] page dumped because: kasan: bad access detected
[   30.392638] 
[   30.392656] Memory state around the buggy address:
[   30.392688]  fff00000c91b3700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.392812]  fff00000c91b3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.393039] >fff00000c91b3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.393223]                                                                 ^
[   30.393510]  fff00000c91b3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.393559]  fff00000c91b3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.393595] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   30.367754] ==================================================================
[   30.367820] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   30.367887] Write of size 128 at addr fff00000c91b3700 by task kunit_try_catch/201
[   30.367938] 
[   30.367988] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.368414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.368447] Hardware name: linux,dummy-virt (DT)
[   30.368478] Call trace:
[   30.368591]  show_stack+0x20/0x38 (C)
[   30.368641]  dump_stack_lvl+0x8c/0xd0
[   30.368687]  print_report+0x118/0x5d0
[   30.368728]  kasan_report+0xdc/0x128
[   30.368769]  kasan_check_range+0x100/0x1a8
[   30.368812]  __asan_memset+0x34/0x78
[   30.368853]  kmalloc_oob_in_memset+0x144/0x2d0
[   30.368905]  kunit_try_run_case+0x170/0x3f0
[   30.369035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.369203]  kthread+0x328/0x630
[   30.369679]  ret_from_fork+0x10/0x20
[   30.370371] 
[   30.370400] Allocated by task 201:
[   30.370431]  kasan_save_stack+0x3c/0x68
[   30.370538]  kasan_save_track+0x20/0x40
[   30.370917]  kasan_save_alloc_info+0x40/0x58
[   30.371050]  __kasan_kmalloc+0xd4/0xd8
[   30.371130]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.371202]  kmalloc_oob_in_memset+0xb0/0x2d0
[   30.371302]  kunit_try_run_case+0x170/0x3f0
[   30.371416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.371462]  kthread+0x328/0x630
[   30.371494]  ret_from_fork+0x10/0x20
[   30.371529] 
[   30.371551] The buggy address belongs to the object at fff00000c91b3700
[   30.371551]  which belongs to the cache kmalloc-128 of size 128
[   30.371608] The buggy address is located 0 bytes inside of
[   30.371608]  allocated 120-byte region [fff00000c91b3700, fff00000c91b3778)
[   30.371667] 
[   30.371688] The buggy address belongs to the physical page:
[   30.372149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.372273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.372750] page_type: f5(slab)
[   30.372803] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.372852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.372890] page dumped because: kasan: bad access detected
[   30.373277] 
[   30.373300] Memory state around the buggy address:
[   30.373483]  fff00000c91b3600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.373536]  fff00000c91b3680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.373606] >fff00000c91b3700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.373693]                                                                 ^
[   30.373739]  fff00000c91b3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.373778]  fff00000c91b3800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.373815] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   30.327769] ==================================================================
[   30.328010] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   30.328185] Write of size 16 at addr fff00000c918c600 by task kunit_try_catch/197
[   30.328235] 
[   30.328273] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.328367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.328393] Hardware name: linux,dummy-virt (DT)
[   30.328576] Call trace:
[   30.328818]  show_stack+0x20/0x38 (C)
[   30.329450]  dump_stack_lvl+0x8c/0xd0
[   30.329766]  print_report+0x118/0x5d0
[   30.329814]  kasan_report+0xdc/0x128
[   30.329880]  __asan_report_store16_noabort+0x20/0x30
[   30.329928]  kmalloc_oob_16+0x3a0/0x3f8
[   30.329973]  kunit_try_run_case+0x170/0x3f0
[   30.330021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.330070]  kthread+0x328/0x630
[   30.330113]  ret_from_fork+0x10/0x20
[   30.330162] 
[   30.330180] Allocated by task 197:
[   30.330208]  kasan_save_stack+0x3c/0x68
[   30.330531]  kasan_save_track+0x20/0x40
[   30.330609]  kasan_save_alloc_info+0x40/0x58
[   30.330646]  __kasan_kmalloc+0xd4/0xd8
[   30.330685]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.330923]  kmalloc_oob_16+0xb4/0x3f8
[   30.330960]  kunit_try_run_case+0x170/0x3f0
[   30.331402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.331454]  kthread+0x328/0x630
[   30.331554]  ret_from_fork+0x10/0x20
[   30.331637] 
[   30.331702] The buggy address belongs to the object at fff00000c918c600
[   30.331702]  which belongs to the cache kmalloc-16 of size 16
[   30.331758] The buggy address is located 0 bytes inside of
[   30.331758]  allocated 13-byte region [fff00000c918c600, fff00000c918c60d)
[   30.331860] 
[   30.331993] The buggy address belongs to the physical page:
[   30.332145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c
[   30.332408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.332471] page_type: f5(slab)
[   30.332819] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.332928] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.333030] page dumped because: kasan: bad access detected
[   30.333161] 
[   30.333179] Memory state around the buggy address:
[   30.333210]  fff00000c918c500: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   30.333355]  fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.333430] >fff00000c918c600: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.333550]                       ^
[   30.333579]  fff00000c918c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.333619]  fff00000c918c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.333655] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   30.298998] ==================================================================
[   30.299096] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   30.299220] Read of size 1 at addr fff00000c9554c00 by task kunit_try_catch/195
[   30.299364] 
[   30.299483] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.299858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.299884] Hardware name: linux,dummy-virt (DT)
[   30.299990] Call trace:
[   30.300115]  show_stack+0x20/0x38 (C)
[   30.300166]  dump_stack_lvl+0x8c/0xd0
[   30.300218]  print_report+0x118/0x5d0
[   30.300597]  kasan_report+0xdc/0x128
[   30.300983]  __kasan_check_byte+0x54/0x70
[   30.301127]  krealloc_noprof+0x44/0x360
[   30.301354]  krealloc_uaf+0x180/0x520
[   30.301462]  kunit_try_run_case+0x170/0x3f0
[   30.301707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.301768]  kthread+0x328/0x630
[   30.301810]  ret_from_fork+0x10/0x20
[   30.301986] 
[   30.302007] Allocated by task 195:
[   30.302036]  kasan_save_stack+0x3c/0x68
[   30.302080]  kasan_save_track+0x20/0x40
[   30.302117]  kasan_save_alloc_info+0x40/0x58
[   30.302179]  __kasan_kmalloc+0xd4/0xd8
[   30.302291]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.302354]  krealloc_uaf+0xc8/0x520
[   30.302399]  kunit_try_run_case+0x170/0x3f0
[   30.302520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.302559]  kthread+0x328/0x630
[   30.302591]  ret_from_fork+0x10/0x20
[   30.302625] 
[   30.302644] Freed by task 195:
[   30.302893]  kasan_save_stack+0x3c/0x68
[   30.302970]  kasan_save_track+0x20/0x40
[   30.303055]  kasan_save_free_info+0x4c/0x78
[   30.303172]  __kasan_slab_free+0x6c/0x98
[   30.303227]  kfree+0x214/0x3c8
[   30.303270]  krealloc_uaf+0x12c/0x520
[   30.303481]  kunit_try_run_case+0x170/0x3f0
[   30.303520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.303559]  kthread+0x328/0x630
[   30.303597]  ret_from_fork+0x10/0x20
[   30.303869] 
[   30.303892] The buggy address belongs to the object at fff00000c9554c00
[   30.303892]  which belongs to the cache kmalloc-256 of size 256
[   30.304218] The buggy address is located 0 bytes inside of
[   30.304218]  freed 256-byte region [fff00000c9554c00, fff00000c9554d00)
[   30.304280] 
[   30.304313] The buggy address belongs to the physical page:
[   30.304392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554
[   30.304819] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.305075] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.305135] page_type: f5(slab)
[   30.305178] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.305238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.305285] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.305457] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.305541] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff
[   30.305677] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.305717] page dumped because: kasan: bad access detected
[   30.305784] 
[   30.306008] Memory state around the buggy address:
[   30.306121]  fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.306163]  fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.306209] >fff00000c9554c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.306456]                    ^
[   30.306636]  fff00000c9554c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.306684]  fff00000c9554d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.306720] ==================================================================
[   30.307742] ==================================================================
[   30.307794] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   30.308072] Read of size 1 at addr fff00000c9554c00 by task kunit_try_catch/195
[   30.308405] 
[   30.308449] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.308534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.308566] Hardware name: linux,dummy-virt (DT)
[   30.308721] Call trace:
[   30.308743]  show_stack+0x20/0x38 (C)
[   30.308793]  dump_stack_lvl+0x8c/0xd0
[   30.308841]  print_report+0x118/0x5d0
[   30.308883]  kasan_report+0xdc/0x128
[   30.308925]  __asan_report_load1_noabort+0x20/0x30
[   30.308972]  krealloc_uaf+0x4c8/0x520
[   30.309016]  kunit_try_run_case+0x170/0x3f0
[   30.309063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.309113]  kthread+0x328/0x630
[   30.309153]  ret_from_fork+0x10/0x20
[   30.309199] 
[   30.309224] Allocated by task 195:
[   30.309556]  kasan_save_stack+0x3c/0x68
[   30.309827]  kasan_save_track+0x20/0x40
[   30.309870]  kasan_save_alloc_info+0x40/0x58
[   30.309906]  __kasan_kmalloc+0xd4/0xd8
[   30.310115]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.310184]  krealloc_uaf+0xc8/0x520
[   30.310256]  kunit_try_run_case+0x170/0x3f0
[   30.310295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.310347]  kthread+0x328/0x630
[   30.310380]  ret_from_fork+0x10/0x20
[   30.310415] 
[   30.310434] Freed by task 195:
[   30.310467]  kasan_save_stack+0x3c/0x68
[   30.310648]  kasan_save_track+0x20/0x40
[   30.310774]  kasan_save_free_info+0x4c/0x78
[   30.310810]  __kasan_slab_free+0x6c/0x98
[   30.310947]  kfree+0x214/0x3c8
[   30.310981]  krealloc_uaf+0x12c/0x520
[   30.311031]  kunit_try_run_case+0x170/0x3f0
[   30.311231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.311297]  kthread+0x328/0x630
[   30.311345]  ret_from_fork+0x10/0x20
[   30.311379] 
[   30.311398] The buggy address belongs to the object at fff00000c9554c00
[   30.311398]  which belongs to the cache kmalloc-256 of size 256
[   30.311621] The buggy address is located 0 bytes inside of
[   30.311621]  freed 256-byte region [fff00000c9554c00, fff00000c9554d00)
[   30.311687] 
[   30.311706] The buggy address belongs to the physical page:
[   30.311955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554
[   30.312289] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.312626] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.312702] page_type: f5(slab)
[   30.313066] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.313677] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.313781] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.313828] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.313896] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff
[   30.313943] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.314077] page dumped because: kasan: bad access detected
[   30.314795] 
[   30.314846] Memory state around the buggy address:
[   30.314943]  fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.315009]  fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.315059] >fff00000c9554c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.315095]                    ^
[   30.315124]  fff00000c9554c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.315164]  fff00000c9554d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.315199] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   30.218360] ==================================================================
[   30.218410] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.218533] Write of size 1 at addr fff00000c9554aea by task kunit_try_catch/189
[   30.218920] 
[   30.218956] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.219048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.219073] Hardware name: linux,dummy-virt (DT)
[   30.219103] Call trace:
[   30.219125]  show_stack+0x20/0x38 (C)
[   30.219175]  dump_stack_lvl+0x8c/0xd0
[   30.219219]  print_report+0x118/0x5d0
[   30.219835]  kasan_report+0xdc/0x128
[   30.219879]  __asan_report_store1_noabort+0x20/0x30
[   30.220298]  krealloc_less_oob_helper+0xae4/0xc50
[   30.220452]  krealloc_less_oob+0x20/0x38
[   30.220498]  kunit_try_run_case+0x170/0x3f0
[   30.220774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.220884]  kthread+0x328/0x630
[   30.220935]  ret_from_fork+0x10/0x20
[   30.221084] 
[   30.221104] Allocated by task 189:
[   30.221132]  kasan_save_stack+0x3c/0x68
[   30.221172]  kasan_save_track+0x20/0x40
[   30.221443]  kasan_save_alloc_info+0x40/0x58
[   30.221485]  __kasan_krealloc+0x118/0x178
[   30.221523]  krealloc_noprof+0x128/0x360
[   30.221585]  krealloc_less_oob_helper+0x168/0xc50
[   30.221665]  krealloc_less_oob+0x20/0x38
[   30.221702]  kunit_try_run_case+0x170/0x3f0
[   30.221876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.221917]  kthread+0x328/0x630
[   30.222269]  ret_from_fork+0x10/0x20
[   30.222315] 
[   30.222353] The buggy address belongs to the object at fff00000c9554a00
[   30.222353]  which belongs to the cache kmalloc-256 of size 256
[   30.222421] The buggy address is located 33 bytes to the right of
[   30.222421]  allocated 201-byte region [fff00000c9554a00, fff00000c9554ac9)
[   30.222538] 
[   30.222648] The buggy address belongs to the physical page:
[   30.222712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554
[   30.222782] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.222884] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.222938] page_type: f5(slab)
[   30.222977] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.223090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.223168] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.223350] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.223398] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff
[   30.223444] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.223481] page dumped because: kasan: bad access detected
[   30.223511] 
[   30.223528] Memory state around the buggy address:
[   30.223758]  fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.224144]  fff00000c9554a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.224188] >fff00000c9554a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.224256]                                                           ^
[   30.224447]  fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.224511]  fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.224547] ==================================================================
[   30.282887] ==================================================================
[   30.282987] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.283059] Write of size 1 at addr fff00000c9a660eb by task kunit_try_catch/193
[   30.283120] 
[   30.283381] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.283473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.283499] Hardware name: linux,dummy-virt (DT)
[   30.283528] Call trace:
[   30.283909]  show_stack+0x20/0x38 (C)
[   30.284035]  dump_stack_lvl+0x8c/0xd0
[   30.284081]  print_report+0x118/0x5d0
[   30.284124]  kasan_report+0xdc/0x128
[   30.284165]  __asan_report_store1_noabort+0x20/0x30
[   30.284218]  krealloc_less_oob_helper+0xa58/0xc50
[   30.284554]  krealloc_large_less_oob+0x20/0x38
[   30.284698]  kunit_try_run_case+0x170/0x3f0
[   30.285088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.285207]  kthread+0x328/0x630
[   30.285639]  ret_from_fork+0x10/0x20
[   30.285721] 
[   30.285742] The buggy address belongs to the physical page:
[   30.285773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64
[   30.285833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.285879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.286090] page_type: f8(unknown)
[   30.286266] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.286316] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.286376] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.286423] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.286470] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff
[   30.286516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.286567] page dumped because: kasan: bad access detected
[   30.286596] 
[   30.286614] Memory state around the buggy address:
[   30.286839]  fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.286938]  fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.287048] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.287400]                                                           ^
[   30.287626]  fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.287677]  fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.288041] ==================================================================
[   30.276514] ==================================================================
[   30.276819] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.277108] Write of size 1 at addr fff00000c9a660ea by task kunit_try_catch/193
[   30.277164] 
[   30.277295] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.277640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.277682] Hardware name: linux,dummy-virt (DT)
[   30.277712] Call trace:
[   30.277734]  show_stack+0x20/0x38 (C)
[   30.277784]  dump_stack_lvl+0x8c/0xd0
[   30.277832]  print_report+0x118/0x5d0
[   30.278098]  kasan_report+0xdc/0x128
[   30.278278]  __asan_report_store1_noabort+0x20/0x30
[   30.278339]  krealloc_less_oob_helper+0xae4/0xc50
[   30.278388]  krealloc_large_less_oob+0x20/0x38
[   30.278446]  kunit_try_run_case+0x170/0x3f0
[   30.278493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.278717]  kthread+0x328/0x630
[   30.278997]  ret_from_fork+0x10/0x20
[   30.279059] 
[   30.279109] The buggy address belongs to the physical page:
[   30.279138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64
[   30.279260] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.279342] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.279393] page_type: f8(unknown)
[   30.279443] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.279492] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.279909] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.280106] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.280205] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff
[   30.280305] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.280354] page dumped because: kasan: bad access detected
[   30.280384] 
[   30.280401] Memory state around the buggy address:
[   30.280441]  fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.280483]  fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.281261] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.281435]                                                           ^
[   30.281475]  fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.281516]  fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.281552] ==================================================================
[   30.271493] ==================================================================
[   30.271628] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.271805] Write of size 1 at addr fff00000c9a660da by task kunit_try_catch/193
[   30.271853] 
[   30.271880] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.271961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.271985] Hardware name: linux,dummy-virt (DT)
[   30.272288] Call trace:
[   30.272443]  show_stack+0x20/0x38 (C)
[   30.272631]  dump_stack_lvl+0x8c/0xd0
[   30.272719]  print_report+0x118/0x5d0
[   30.272811]  kasan_report+0xdc/0x128
[   30.272914]  __asan_report_store1_noabort+0x20/0x30
[   30.272961]  krealloc_less_oob_helper+0xa80/0xc50
[   30.273015]  krealloc_large_less_oob+0x20/0x38
[   30.273206]  kunit_try_run_case+0x170/0x3f0
[   30.273277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.273368]  kthread+0x328/0x630
[   30.273409]  ret_from_fork+0x10/0x20
[   30.274010] 
[   30.274098] The buggy address belongs to the physical page:
[   30.274152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64
[   30.274206] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.274263] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.274316] page_type: f8(unknown)
[   30.274365] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.274413] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.274593] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.275077] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.275132] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff
[   30.275212] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.275249] page dumped because: kasan: bad access detected
[   30.275278] 
[   30.275296] Memory state around the buggy address:
[   30.275499]  fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.275549]  fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.275697] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.275733]                                                     ^
[   30.275788]  fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.275936]  fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.275972] ==================================================================
[   30.225307] ==================================================================
[   30.225516] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.225763] Write of size 1 at addr fff00000c9554aeb by task kunit_try_catch/189
[   30.225820] 
[   30.225863] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.226052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.226078] Hardware name: linux,dummy-virt (DT)
[   30.226108] Call trace:
[   30.226183]  show_stack+0x20/0x38 (C)
[   30.226336]  dump_stack_lvl+0x8c/0xd0
[   30.226406]  print_report+0x118/0x5d0
[   30.226529]  kasan_report+0xdc/0x128
[   30.226628]  __asan_report_store1_noabort+0x20/0x30
[   30.226717]  krealloc_less_oob_helper+0xa58/0xc50
[   30.226845]  krealloc_less_oob+0x20/0x38
[   30.226924]  kunit_try_run_case+0x170/0x3f0
[   30.227150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.227203]  kthread+0x328/0x630
[   30.227245]  ret_from_fork+0x10/0x20
[   30.227602] 
[   30.227624] Allocated by task 189:
[   30.227652]  kasan_save_stack+0x3c/0x68
[   30.227792]  kasan_save_track+0x20/0x40
[   30.227926]  kasan_save_alloc_info+0x40/0x58
[   30.227990]  __kasan_krealloc+0x118/0x178
[   30.228153]  krealloc_noprof+0x128/0x360
[   30.228191]  krealloc_less_oob_helper+0x168/0xc50
[   30.228232]  krealloc_less_oob+0x20/0x38
[   30.228275]  kunit_try_run_case+0x170/0x3f0
[   30.228578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.228733]  kthread+0x328/0x630
[   30.229110]  ret_from_fork+0x10/0x20
[   30.229150] 
[   30.229245] The buggy address belongs to the object at fff00000c9554a00
[   30.229245]  which belongs to the cache kmalloc-256 of size 256
[   30.229348] The buggy address is located 34 bytes to the right of
[   30.229348]  allocated 201-byte region [fff00000c9554a00, fff00000c9554ac9)
[   30.229421] 
[   30.229497] The buggy address belongs to the physical page:
[   30.229586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554
[   30.229660] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.229706] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.229758] page_type: f5(slab)
[   30.229796] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.229844] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.229892] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.229949] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.230239] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff
[   30.230290] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.230338] page dumped because: kasan: bad access detected
[   30.230660] 
[   30.230681] Memory state around the buggy address:
[   30.230714]  fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.230756]  fff00000c9554a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.230796] >fff00000c9554a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.230831]                                                           ^
[   30.231196]  fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.231275]  fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.231346] ==================================================================
[   30.192556] ==================================================================
[   30.193034] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.193114] Write of size 1 at addr fff00000c9554ac9 by task kunit_try_catch/189
[   30.193172] 
[   30.193226] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.193313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.193351] Hardware name: linux,dummy-virt (DT)
[   30.193389] Call trace:
[   30.193415]  show_stack+0x20/0x38 (C)
[   30.193465]  dump_stack_lvl+0x8c/0xd0
[   30.194107]  print_report+0x118/0x5d0
[   30.194356]  kasan_report+0xdc/0x128
[   30.194454]  __asan_report_store1_noabort+0x20/0x30
[   30.194716]  krealloc_less_oob_helper+0xa48/0xc50
[   30.194791]  krealloc_less_oob+0x20/0x38
[   30.194968]  kunit_try_run_case+0x170/0x3f0
[   30.195019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.195074]  kthread+0x328/0x630
[   30.195157]  ret_from_fork+0x10/0x20
[   30.195396] 
[   30.195453] Allocated by task 189:
[   30.195481]  kasan_save_stack+0x3c/0x68
[   30.195524]  kasan_save_track+0x20/0x40
[   30.195561]  kasan_save_alloc_info+0x40/0x58
[   30.195637]  __kasan_krealloc+0x118/0x178
[   30.195693]  krealloc_noprof+0x128/0x360
[   30.195836]  krealloc_less_oob_helper+0x168/0xc50
[   30.196010]  krealloc_less_oob+0x20/0x38
[   30.196176]  kunit_try_run_case+0x170/0x3f0
[   30.196231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.196311]  kthread+0x328/0x630
[   30.196516]  ret_from_fork+0x10/0x20
[   30.196758] 
[   30.196779] The buggy address belongs to the object at fff00000c9554a00
[   30.196779]  which belongs to the cache kmalloc-256 of size 256
[   30.196836] The buggy address is located 0 bytes to the right of
[   30.196836]  allocated 201-byte region [fff00000c9554a00, fff00000c9554ac9)
[   30.197224] 
[   30.197441] The buggy address belongs to the physical page:
[   30.197564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554
[   30.197641] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.197794] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.197874] page_type: f5(slab)
[   30.197957] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.198076] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.198241] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.198337] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.198386] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff
[   30.198598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.198656] page dumped because: kasan: bad access detected
[   30.198784] 
[   30.198877] Memory state around the buggy address:
[   30.198910]  fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.198951]  fff00000c9554a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.198994] >fff00000c9554a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.199037]                                               ^
[   30.199071]  fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.199507]  fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.199891] ==================================================================
[   30.267620] ==================================================================
[   30.267669] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.267722] Write of size 1 at addr fff00000c9a660d0 by task kunit_try_catch/193
[   30.267769] 
[   30.267801] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.267881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.267906] Hardware name: linux,dummy-virt (DT)
[   30.267934] Call trace:
[   30.267956]  show_stack+0x20/0x38 (C)
[   30.268002]  dump_stack_lvl+0x8c/0xd0
[   30.268057]  print_report+0x118/0x5d0
[   30.268187]  kasan_report+0xdc/0x128
[   30.268299]  __asan_report_store1_noabort+0x20/0x30
[   30.268376]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.268426]  krealloc_large_less_oob+0x20/0x38
[   30.268472]  kunit_try_run_case+0x170/0x3f0
[   30.268519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.268766]  kthread+0x328/0x630
[   30.269081]  ret_from_fork+0x10/0x20
[   30.269387] 
[   30.269467] The buggy address belongs to the physical page:
[   30.269737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64
[   30.269858] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.269912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.270006] page_type: f8(unknown)
[   30.270131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.270251] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.270299] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.270356] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.270403] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff
[   30.270471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.270508] page dumped because: kasan: bad access detected
[   30.270590] 
[   30.270610] Memory state around the buggy address:
[   30.270832]  fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.270911]  fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.270953] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.271075]                                                  ^
[   30.271212]  fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.271252]  fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.271288] ==================================================================
[   30.210549] ==================================================================
[   30.210603] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.210662] Write of size 1 at addr fff00000c9554ada by task kunit_try_catch/189
[   30.210901] 
[   30.210936] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.211016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.211056] Hardware name: linux,dummy-virt (DT)
[   30.211193] Call trace:
[   30.211302]  show_stack+0x20/0x38 (C)
[   30.211471]  dump_stack_lvl+0x8c/0xd0
[   30.211594]  print_report+0x118/0x5d0
[   30.211687]  kasan_report+0xdc/0x128
[   30.211803]  __asan_report_store1_noabort+0x20/0x30
[   30.211877]  krealloc_less_oob_helper+0xa80/0xc50
[   30.211952]  krealloc_less_oob+0x20/0x38
[   30.211997]  kunit_try_run_case+0x170/0x3f0
[   30.212049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.212216]  kthread+0x328/0x630
[   30.212309]  ret_from_fork+0x10/0x20
[   30.212704] 
[   30.212735] Allocated by task 189:
[   30.212767]  kasan_save_stack+0x3c/0x68
[   30.212965]  kasan_save_track+0x20/0x40
[   30.213025]  kasan_save_alloc_info+0x40/0x58
[   30.213061]  __kasan_krealloc+0x118/0x178
[   30.213382]  krealloc_noprof+0x128/0x360
[   30.213741]  krealloc_less_oob_helper+0x168/0xc50
[   30.213794]  krealloc_less_oob+0x20/0x38
[   30.214047]  kunit_try_run_case+0x170/0x3f0
[   30.214148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.214195]  kthread+0x328/0x630
[   30.214591]  ret_from_fork+0x10/0x20
[   30.214675] 
[   30.214696] The buggy address belongs to the object at fff00000c9554a00
[   30.214696]  which belongs to the cache kmalloc-256 of size 256
[   30.214752] The buggy address is located 17 bytes to the right of
[   30.214752]  allocated 201-byte region [fff00000c9554a00, fff00000c9554ac9)
[   30.214814] 
[   30.214834] The buggy address belongs to the physical page:
[   30.215035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554
[   30.215408] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.215565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.215641] page_type: f5(slab)
[   30.215917] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.215968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.216016] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.216062] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.216109] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff
[   30.216155] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.216194] page dumped because: kasan: bad access detected
[   30.216280] 
[   30.216300] Memory state around the buggy address:
[   30.216535]  fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.216914]  fff00000c9554a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.217049] >fff00000c9554a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.217092]                                                     ^
[   30.217129]  fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.217354]  fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.217485] ==================================================================
[   30.201100] ==================================================================
[   30.201150] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.201203] Write of size 1 at addr fff00000c9554ad0 by task kunit_try_catch/189
[   30.201250] 
[   30.201283] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.201380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.201406] Hardware name: linux,dummy-virt (DT)
[   30.201435] Call trace:
[   30.201458]  show_stack+0x20/0x38 (C)
[   30.201506]  dump_stack_lvl+0x8c/0xd0
[   30.201678]  print_report+0x118/0x5d0
[   30.202446]  kasan_report+0xdc/0x128
[   30.202623]  __asan_report_store1_noabort+0x20/0x30
[   30.202774]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.202853]  krealloc_less_oob+0x20/0x38
[   30.202906]  kunit_try_run_case+0x170/0x3f0
[   30.203507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.203831]  kthread+0x328/0x630
[   30.204146]  ret_from_fork+0x10/0x20
[   30.204477] 
[   30.204498] Allocated by task 189:
[   30.204598]  kasan_save_stack+0x3c/0x68
[   30.204800]  kasan_save_track+0x20/0x40
[   30.204867]  kasan_save_alloc_info+0x40/0x58
[   30.204979]  __kasan_krealloc+0x118/0x178
[   30.205034]  krealloc_noprof+0x128/0x360
[   30.205079]  krealloc_less_oob_helper+0x168/0xc50
[   30.205228]  krealloc_less_oob+0x20/0x38
[   30.205270]  kunit_try_run_case+0x170/0x3f0
[   30.205358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.205397]  kthread+0x328/0x630
[   30.205428]  ret_from_fork+0x10/0x20
[   30.205462] 
[   30.205481] The buggy address belongs to the object at fff00000c9554a00
[   30.205481]  which belongs to the cache kmalloc-256 of size 256
[   30.205537] The buggy address is located 7 bytes to the right of
[   30.205537]  allocated 201-byte region [fff00000c9554a00, fff00000c9554ac9)
[   30.206045] 
[   30.206143] The buggy address belongs to the physical page:
[   30.206222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554
[   30.206304] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.206364] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.206683] page_type: f5(slab)
[   30.206738] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.206842] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.206891] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.207186] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.207425] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff
[   30.207475] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.207514] page dumped because: kasan: bad access detected
[   30.207544] 
[   30.207562] Memory state around the buggy address:
[   30.207749]  fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.207948]  fff00000c9554a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.207991] >fff00000c9554a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.208026]                                                  ^
[   30.208062]  fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.208494]  fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.208536] ==================================================================
[   30.260097] ==================================================================
[   30.260548] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.260908] Write of size 1 at addr fff00000c9a660c9 by task kunit_try_catch/193
[   30.260961] 
[   30.260997] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.261405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.261440] Hardware name: linux,dummy-virt (DT)
[   30.261472] Call trace:
[   30.261494]  show_stack+0x20/0x38 (C)
[   30.262023]  dump_stack_lvl+0x8c/0xd0
[   30.262104]  print_report+0x118/0x5d0
[   30.262148]  kasan_report+0xdc/0x128
[   30.262192]  __asan_report_store1_noabort+0x20/0x30
[   30.262241]  krealloc_less_oob_helper+0xa48/0xc50
[   30.262289]  krealloc_large_less_oob+0x20/0x38
[   30.262348]  kunit_try_run_case+0x170/0x3f0
[   30.262620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.262701]  kthread+0x328/0x630
[   30.262828]  ret_from_fork+0x10/0x20
[   30.262925] 
[   30.262946] The buggy address belongs to the physical page:
[   30.262995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64
[   30.263222] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.263271] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.263349] page_type: f8(unknown)
[   30.263390] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.263599] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.263687] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.263842] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.263890] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff
[   30.263937] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.264033] page dumped because: kasan: bad access detected
[   30.264100] 
[   30.264118] Memory state around the buggy address:
[   30.264156]  fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.264422]  fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.264582] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.264819]                                               ^
[   30.264859]  fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.264980]  fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.265064] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   30.239735] ==================================================================
[   30.240069] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.240268] Write of size 1 at addr fff00000c9a660eb by task kunit_try_catch/191
[   30.240409] 
[   30.240448] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.240531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.240557] Hardware name: linux,dummy-virt (DT)
[   30.240816] Call trace:
[   30.240851]  show_stack+0x20/0x38 (C)
[   30.240906]  dump_stack_lvl+0x8c/0xd0
[   30.240953]  print_report+0x118/0x5d0
[   30.241332]  kasan_report+0xdc/0x128
[   30.241836]  __asan_report_store1_noabort+0x20/0x30
[   30.242287]  krealloc_more_oob_helper+0x60c/0x678
[   30.242352]  krealloc_large_more_oob+0x20/0x38
[   30.242401]  kunit_try_run_case+0x170/0x3f0
[   30.242448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.242496]  kthread+0x328/0x630
[   30.243254]  ret_from_fork+0x10/0x20
[   30.243452] 
[   30.243486] The buggy address belongs to the physical page:
[   30.243519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64
[   30.243604] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.243652] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.243865] page_type: f8(unknown)
[   30.243912] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.243961] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.244008] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.244055] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.244634] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff
[   30.244887] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.244954] page dumped because: kasan: bad access detected
[   30.245060] 
[   30.245078] Memory state around the buggy address:
[   30.245111]  fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.245152]  fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.245248] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.245821]                                                           ^
[   30.245868]  fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.245909]  fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.246015] ==================================================================
[   30.174536] ==================================================================
[   30.174583] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.174745] Write of size 1 at addr fff00000c95548f0 by task kunit_try_catch/187
[   30.174796] 
[   30.174824] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.174926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.174961] Hardware name: linux,dummy-virt (DT)
[   30.174990] Call trace:
[   30.175012]  show_stack+0x20/0x38 (C)
[   30.175066]  dump_stack_lvl+0x8c/0xd0
[   30.175112]  print_report+0x118/0x5d0
[   30.175179]  kasan_report+0xdc/0x128
[   30.175244]  __asan_report_store1_noabort+0x20/0x30
[   30.175310]  krealloc_more_oob_helper+0x5c0/0x678
[   30.175399]  krealloc_more_oob+0x20/0x38
[   30.175445]  kunit_try_run_case+0x170/0x3f0
[   30.175493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.175803]  kthread+0x328/0x630
[   30.175846]  ret_from_fork+0x10/0x20
[   30.175892] 
[   30.175910] Allocated by task 187:
[   30.175937]  kasan_save_stack+0x3c/0x68
[   30.176038]  kasan_save_track+0x20/0x40
[   30.176077]  kasan_save_alloc_info+0x40/0x58
[   30.176113]  __kasan_krealloc+0x118/0x178
[   30.176152]  krealloc_noprof+0x128/0x360
[   30.176207]  krealloc_more_oob_helper+0x168/0x678
[   30.176267]  krealloc_more_oob+0x20/0x38
[   30.176304]  kunit_try_run_case+0x170/0x3f0
[   30.176369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.176416]  kthread+0x328/0x630
[   30.176451]  ret_from_fork+0x10/0x20
[   30.176504] 
[   30.176551] The buggy address belongs to the object at fff00000c9554800
[   30.176551]  which belongs to the cache kmalloc-256 of size 256
[   30.176607] The buggy address is located 5 bytes to the right of
[   30.176607]  allocated 235-byte region [fff00000c9554800, fff00000c95548eb)
[   30.176669] 
[   30.176688] The buggy address belongs to the physical page:
[   30.176717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554
[   30.176785] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.176849] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.177193] page_type: f5(slab)
[   30.177251] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.177316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.177407] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.177503] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.177565] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff
[   30.177629] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.177667] page dumped because: kasan: bad access detected
[   30.177770] 
[   30.177811] Memory state around the buggy address:
[   30.177888]  fff00000c9554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.177948]  fff00000c9554800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.178012] >fff00000c9554880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.178047]                                                              ^
[   30.178084]  fff00000c9554900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.178124]  fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.178159] ==================================================================
[   30.247686] ==================================================================
[   30.247734] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.247786] Write of size 1 at addr fff00000c9a660f0 by task kunit_try_catch/191
[   30.247834] 
[   30.247867] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.247948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.247974] Hardware name: linux,dummy-virt (DT)
[   30.248005] Call trace:
[   30.248027]  show_stack+0x20/0x38 (C)
[   30.248074]  dump_stack_lvl+0x8c/0xd0
[   30.248120]  print_report+0x118/0x5d0
[   30.248162]  kasan_report+0xdc/0x128
[   30.248204]  __asan_report_store1_noabort+0x20/0x30
[   30.248253]  krealloc_more_oob_helper+0x5c0/0x678
[   30.248312]  krealloc_large_more_oob+0x20/0x38
[   30.248384]  kunit_try_run_case+0x170/0x3f0
[   30.248562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.248621]  kthread+0x328/0x630
[   30.248934]  ret_from_fork+0x10/0x20
[   30.249221] 
[   30.249247] The buggy address belongs to the physical page:
[   30.249500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64
[   30.249708] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.249892] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.250270] page_type: f8(unknown)
[   30.250339] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.250390] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.250438] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.250681] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.250734] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff
[   30.250781] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.250818] page dumped because: kasan: bad access detected
[   30.250925] 
[   30.250945] Memory state around the buggy address:
[   30.251035]  fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.251077]  fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.251673] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.251789]                                                              ^
[   30.251874]  fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.251916]  fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.251952] ==================================================================
[   30.168845] ==================================================================
[   30.168911] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.168973] Write of size 1 at addr fff00000c95548eb by task kunit_try_catch/187
[   30.169104] 
[   30.169173] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.169352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.169581] Hardware name: linux,dummy-virt (DT)
[   30.169628] Call trace:
[   30.169652]  show_stack+0x20/0x38 (C)
[   30.169707]  dump_stack_lvl+0x8c/0xd0
[   30.169763]  print_report+0x118/0x5d0
[   30.169806]  kasan_report+0xdc/0x128
[   30.169850]  __asan_report_store1_noabort+0x20/0x30
[   30.169900]  krealloc_more_oob_helper+0x60c/0x678
[   30.170066]  krealloc_more_oob+0x20/0x38
[   30.170144]  kunit_try_run_case+0x170/0x3f0
[   30.170306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.170411]  kthread+0x328/0x630
[   30.170565]  ret_from_fork+0x10/0x20
[   30.170921] 
[   30.170966] Allocated by task 187:
[   30.171018]  kasan_save_stack+0x3c/0x68
[   30.171142]  kasan_save_track+0x20/0x40
[   30.171207]  kasan_save_alloc_info+0x40/0x58
[   30.171245]  __kasan_krealloc+0x118/0x178
[   30.171595]  krealloc_noprof+0x128/0x360
[   30.171697]  krealloc_more_oob_helper+0x168/0x678
[   30.171821]  krealloc_more_oob+0x20/0x38
[   30.171910]  kunit_try_run_case+0x170/0x3f0
[   30.171948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.172240]  kthread+0x328/0x630
[   30.172314]  ret_from_fork+0x10/0x20
[   30.172361] 
[   30.172381] The buggy address belongs to the object at fff00000c9554800
[   30.172381]  which belongs to the cache kmalloc-256 of size 256
[   30.172594] The buggy address is located 0 bytes to the right of
[   30.172594]  allocated 235-byte region [fff00000c9554800, fff00000c95548eb)
[   30.172691] 
[   30.172773] The buggy address belongs to the physical page:
[   30.172830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554
[   30.172940] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.172997] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.173065] page_type: f5(slab)
[   30.173218] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.173313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.173460] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.173509] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.173556] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff
[   30.173602] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.173640] page dumped because: kasan: bad access detected
[   30.173670] 
[   30.173687] Memory state around the buggy address:
[   30.173719]  fff00000c9554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.173760]  fff00000c9554800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.173800] >fff00000c9554880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.173835]                                                           ^
[   30.173872]  fff00000c9554900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.173912]  fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.173948] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   30.157464] ==================================================================
[   30.157590] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   30.157661] Read of size 1 at addr fff00000c9aa0000 by task kunit_try_catch/185
[   30.157720] 
[   30.157760] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.158061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.158175] Hardware name: linux,dummy-virt (DT)
[   30.158286] Call trace:
[   30.158435]  show_stack+0x20/0x38 (C)
[   30.158594]  dump_stack_lvl+0x8c/0xd0
[   30.158673]  print_report+0x118/0x5d0
[   30.158782]  kasan_report+0xdc/0x128
[   30.158881]  __asan_report_load1_noabort+0x20/0x30
[   30.159154]  page_alloc_uaf+0x328/0x350
[   30.159282]  kunit_try_run_case+0x170/0x3f0
[   30.159386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.159525]  kthread+0x328/0x630
[   30.159621]  ret_from_fork+0x10/0x20
[   30.159982] 
[   30.160030] The buggy address belongs to the physical page:
[   30.160168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aa0
[   30.160282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.160351] page_type: f0(buddy)
[   30.160546] raw: 0bfffe0000000000 fff00000ff616148 fff00000ff616148 0000000000000000
[   30.160636] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   30.160749] page dumped because: kasan: bad access detected
[   30.160809] 
[   30.160928] Memory state around the buggy address:
[   30.160966]  fff00000c9a9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161041]  fff00000c9a9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161280] >fff00000c9aa0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161458]                    ^
[   30.161515]  fff00000c9aa0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161592]  fff00000c9aa0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161670] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   30.137282] ==================================================================
[   30.137395] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   30.137551] Free of addr fff00000c91b4001 by task kunit_try_catch/181
[   30.137650] 
[   30.137688] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.137772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.137798] Hardware name: linux,dummy-virt (DT)
[   30.137829] Call trace:
[   30.137852]  show_stack+0x20/0x38 (C)
[   30.137903]  dump_stack_lvl+0x8c/0xd0
[   30.137971]  print_report+0x118/0x5d0
[   30.138016]  kasan_report_invalid_free+0xc0/0xe8
[   30.138062]  __kasan_kfree_large+0x5c/0xa8
[   30.138110]  free_large_kmalloc+0x68/0x150
[   30.138157]  kfree+0x270/0x3c8
[   30.138199]  kmalloc_large_invalid_free+0x108/0x270
[   30.138247]  kunit_try_run_case+0x170/0x3f0
[   30.138296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.138370]  kthread+0x328/0x630
[   30.138447]  ret_from_fork+0x10/0x20
[   30.138575] 
[   30.138630] The buggy address belongs to the physical page:
[   30.138678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b4
[   30.138779] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.138897] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.139013] page_type: f8(unknown)
[   30.139131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.139183] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.139495] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.139610] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.139739] head: 0bfffe0000000002 ffffc1ffc3246d01 00000000ffffffff 00000000ffffffff
[   30.139837] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.139966] page dumped because: kasan: bad access detected
[   30.139997] 
[   30.140015] Memory state around the buggy address:
[   30.140046]  fff00000c91b3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.140129]  fff00000c91b3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.140338] >fff00000c91b4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.140549]                    ^
[   30.140606]  fff00000c91b4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.140646]  fff00000c91b4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.140762] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   30.129762] ==================================================================
[   30.129829] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   30.129890] Read of size 1 at addr fff00000c91b4000 by task kunit_try_catch/179
[   30.129939] 
[   30.129977] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.130061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.130088] Hardware name: linux,dummy-virt (DT)
[   30.130134] Call trace:
[   30.130190]  show_stack+0x20/0x38 (C)
[   30.130242]  dump_stack_lvl+0x8c/0xd0
[   30.130289]  print_report+0x118/0x5d0
[   30.130344]  kasan_report+0xdc/0x128
[   30.130385]  __asan_report_load1_noabort+0x20/0x30
[   30.130432]  kmalloc_large_uaf+0x2cc/0x2f8
[   30.130476]  kunit_try_run_case+0x170/0x3f0
[   30.130524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.130592]  kthread+0x328/0x630
[   30.130644]  ret_from_fork+0x10/0x20
[   30.130699] 
[   30.130736] The buggy address belongs to the physical page:
[   30.130774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b4
[   30.130827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.130904] raw: 0bfffe0000000000 fff00000da478d00 fff00000da478d00 0000000000000000
[   30.130962] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   30.131000] page dumped because: kasan: bad access detected
[   30.131047] 
[   30.131065] Memory state around the buggy address:
[   30.131097]  fff00000c91b3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.131137]  fff00000c91b3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.131177] >fff00000c91b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.131213]                    ^
[   30.131265]  fff00000c91b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.131305]  fff00000c91b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.131350] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   30.119275] ==================================================================
[   30.119936] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   30.120025] Write of size 1 at addr fff00000c9a0e00a by task kunit_try_catch/177
[   30.120180] 
[   30.120225] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.120369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.120429] Hardware name: linux,dummy-virt (DT)
[   30.120463] Call trace:
[   30.120488]  show_stack+0x20/0x38 (C)
[   30.120698]  dump_stack_lvl+0x8c/0xd0
[   30.120767]  print_report+0x118/0x5d0
[   30.120863]  kasan_report+0xdc/0x128
[   30.120930]  __asan_report_store1_noabort+0x20/0x30
[   30.121030]  kmalloc_large_oob_right+0x278/0x2b8
[   30.121098]  kunit_try_run_case+0x170/0x3f0
[   30.121147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.121213]  kthread+0x328/0x630
[   30.121258]  ret_from_fork+0x10/0x20
[   30.121520] 
[   30.121727] The buggy address belongs to the physical page:
[   30.121776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a0c
[   30.121893] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.121960] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.122026] page_type: f8(unknown)
[   30.122192] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.122241] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.122448] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.122582] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.122677] head: 0bfffe0000000002 ffffc1ffc3268301 00000000ffffffff 00000000ffffffff
[   30.122805] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.122843] page dumped because: kasan: bad access detected
[   30.123020] 
[   30.123053] Memory state around the buggy address:
[   30.123087]  fff00000c9a0df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.123130]  fff00000c9a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.123226] >fff00000c9a0e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.123309]                       ^
[   30.123426]  fff00000c9a0e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.123478]  fff00000c9a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.123743] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   30.105280] ==================================================================
[   30.105386] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   30.105571] Write of size 1 at addr fff00000c9a71f00 by task kunit_try_catch/175
[   30.105677] 
[   30.105789] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.105914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.105946] Hardware name: linux,dummy-virt (DT)
[   30.105981] Call trace:
[   30.106005]  show_stack+0x20/0x38 (C)
[   30.106058]  dump_stack_lvl+0x8c/0xd0
[   30.106107]  print_report+0x118/0x5d0
[   30.106151]  kasan_report+0xdc/0x128
[   30.106194]  __asan_report_store1_noabort+0x20/0x30
[   30.106244]  kmalloc_big_oob_right+0x2a4/0x2f0
[   30.106292]  kunit_try_run_case+0x170/0x3f0
[   30.106353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.106449]  kthread+0x328/0x630
[   30.106533]  ret_from_fork+0x10/0x20
[   30.106711] 
[   30.106764] Allocated by task 175:
[   30.106831]  kasan_save_stack+0x3c/0x68
[   30.106959]  kasan_save_track+0x20/0x40
[   30.107047]  kasan_save_alloc_info+0x40/0x58
[   30.107145]  __kasan_kmalloc+0xd4/0xd8
[   30.107257]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.107418]  kmalloc_big_oob_right+0xb8/0x2f0
[   30.107468]  kunit_try_run_case+0x170/0x3f0
[   30.107549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.107630]  kthread+0x328/0x630
[   30.107943]  ret_from_fork+0x10/0x20
[   30.108082] 
[   30.108112] The buggy address belongs to the object at fff00000c9a70000
[   30.108112]  which belongs to the cache kmalloc-8k of size 8192
[   30.108222] The buggy address is located 0 bytes to the right of
[   30.108222]  allocated 7936-byte region [fff00000c9a70000, fff00000c9a71f00)
[   30.108347] 
[   30.108402] The buggy address belongs to the physical page:
[   30.108459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a70
[   30.108546] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.108855] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.108962] page_type: f5(slab)
[   30.109419] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.109488] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.109565] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.109652] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.109737] head: 0bfffe0000000003 ffffc1ffc3269c01 00000000ffffffff 00000000ffffffff
[   30.109784] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.109848] page dumped because: kasan: bad access detected
[   30.109879] 
[   30.109897] Memory state around the buggy address:
[   30.109930]  fff00000c9a71e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.110125]  fff00000c9a71e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.110299] >fff00000c9a71f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.110398]                    ^
[   30.110467]  fff00000c9a71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.110553]  fff00000c9a72000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.110614] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   30.091483] ==================================================================
[   30.091548] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   30.091611] Write of size 1 at addr fff00000c91b3478 by task kunit_try_catch/173
[   30.091661] 
[   30.091699] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.091781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.091807] Hardware name: linux,dummy-virt (DT)
[   30.091838] Call trace:
[   30.091861]  show_stack+0x20/0x38 (C)
[   30.091910]  dump_stack_lvl+0x8c/0xd0
[   30.091956]  print_report+0x118/0x5d0
[   30.091999]  kasan_report+0xdc/0x128
[   30.092041]  __asan_report_store1_noabort+0x20/0x30
[   30.092132]  kmalloc_track_caller_oob_right+0x40c/0x488
[   30.092186]  kunit_try_run_case+0x170/0x3f0
[   30.092301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.092371]  kthread+0x328/0x630
[   30.092432]  ret_from_fork+0x10/0x20
[   30.092493] 
[   30.092512] Allocated by task 173:
[   30.092559]  kasan_save_stack+0x3c/0x68
[   30.092628]  kasan_save_track+0x20/0x40
[   30.092667]  kasan_save_alloc_info+0x40/0x58
[   30.092703]  __kasan_kmalloc+0xd4/0xd8
[   30.092739]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.092800]  kmalloc_track_caller_oob_right+0xa8/0x488
[   30.092869]  kunit_try_run_case+0x170/0x3f0
[   30.092926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.092994]  kthread+0x328/0x630
[   30.093060]  ret_from_fork+0x10/0x20
[   30.093095] 
[   30.093113] The buggy address belongs to the object at fff00000c91b3400
[   30.093113]  which belongs to the cache kmalloc-128 of size 128
[   30.093185] The buggy address is located 0 bytes to the right of
[   30.093185]  allocated 120-byte region [fff00000c91b3400, fff00000c91b3478)
[   30.093466] 
[   30.093596] The buggy address belongs to the physical page:
[   30.093706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.093822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.093892] page_type: f5(slab)
[   30.093970] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.094020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.094058] page dumped because: kasan: bad access detected
[   30.094112] 
[   30.094130] Memory state around the buggy address:
[   30.094162]  fff00000c91b3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.094203]  fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.094243] >fff00000c91b3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.094279]                                                                 ^
[   30.094317]  fff00000c91b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.094367]  fff00000c91b3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.094403] ==================================================================
[   30.095650] ==================================================================
[   30.095714] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   30.095771] Write of size 1 at addr fff00000c91b3578 by task kunit_try_catch/173
[   30.095966] 
[   30.096035] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.096117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.096205] Hardware name: linux,dummy-virt (DT)
[   30.096255] Call trace:
[   30.096293]  show_stack+0x20/0x38 (C)
[   30.096373]  dump_stack_lvl+0x8c/0xd0
[   30.096440]  print_report+0x118/0x5d0
[   30.096485]  kasan_report+0xdc/0x128
[   30.096529]  __asan_report_store1_noabort+0x20/0x30
[   30.096603]  kmalloc_track_caller_oob_right+0x418/0x488
[   30.096670]  kunit_try_run_case+0x170/0x3f0
[   30.096737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.096786]  kthread+0x328/0x630
[   30.096842]  ret_from_fork+0x10/0x20
[   30.096909] 
[   30.096928] Allocated by task 173:
[   30.096955]  kasan_save_stack+0x3c/0x68
[   30.097011]  kasan_save_track+0x20/0x40
[   30.097073]  kasan_save_alloc_info+0x40/0x58
[   30.097110]  __kasan_kmalloc+0xd4/0xd8
[   30.097157]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.097207]  kmalloc_track_caller_oob_right+0x184/0x488
[   30.097252]  kunit_try_run_case+0x170/0x3f0
[   30.097397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.097524]  kthread+0x328/0x630
[   30.097602]  ret_from_fork+0x10/0x20
[   30.097756] 
[   30.097857] The buggy address belongs to the object at fff00000c91b3500
[   30.097857]  which belongs to the cache kmalloc-128 of size 128
[   30.097963] The buggy address is located 0 bytes to the right of
[   30.097963]  allocated 120-byte region [fff00000c91b3500, fff00000c91b3578)
[   30.098114] 
[   30.098193] The buggy address belongs to the physical page:
[   30.098291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.098406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.098460] page_type: f5(slab)
[   30.098502] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.098557] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.098603] page dumped because: kasan: bad access detected
[   30.098840] 
[   30.098952] Memory state around the buggy address:
[   30.099101]  fff00000c91b3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.099168]  fff00000c91b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.099214] >fff00000c91b3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.099257]                                                                 ^
[   30.099303]  fff00000c91b3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.099359]  fff00000c91b3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.099401] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   30.082538] ==================================================================
[   30.082613] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   30.082677] Read of size 1 at addr fff00000c984f000 by task kunit_try_catch/171
[   30.082727] 
[   30.082764] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.082930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.083003] Hardware name: linux,dummy-virt (DT)
[   30.083059] Call trace:
[   30.083100]  show_stack+0x20/0x38 (C)
[   30.083167]  dump_stack_lvl+0x8c/0xd0
[   30.083222]  print_report+0x118/0x5d0
[   30.083290]  kasan_report+0xdc/0x128
[   30.083344]  __asan_report_load1_noabort+0x20/0x30
[   30.083392]  kmalloc_node_oob_right+0x2f4/0x330
[   30.083446]  kunit_try_run_case+0x170/0x3f0
[   30.083513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.083582]  kthread+0x328/0x630
[   30.083641]  ret_from_fork+0x10/0x20
[   30.083734] 
[   30.083753] Allocated by task 171:
[   30.083781]  kasan_save_stack+0x3c/0x68
[   30.083829]  kasan_save_track+0x20/0x40
[   30.083875]  kasan_save_alloc_info+0x40/0x58
[   30.084156]  __kasan_kmalloc+0xd4/0xd8
[   30.084231]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   30.084292]  kmalloc_node_oob_right+0xbc/0x330
[   30.084359]  kunit_try_run_case+0x170/0x3f0
[   30.084403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.084475]  kthread+0x328/0x630
[   30.084523]  ret_from_fork+0x10/0x20
[   30.084558] 
[   30.084577] The buggy address belongs to the object at fff00000c984e000
[   30.084577]  which belongs to the cache kmalloc-4k of size 4096
[   30.084651] The buggy address is located 0 bytes to the right of
[   30.084651]  allocated 4096-byte region [fff00000c984e000, fff00000c984f000)
[   30.084730] 
[   30.084769] The buggy address belongs to the physical page:
[   30.084844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109848
[   30.085001] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.085050] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.085221] page_type: f5(slab)
[   30.085335] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   30.085424] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.085484] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   30.085610] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.085692] head: 0bfffe0000000003 ffffc1ffc3261201 00000000ffffffff 00000000ffffffff
[   30.085842] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.085933] page dumped because: kasan: bad access detected
[   30.086042] 
[   30.086114] Memory state around the buggy address:
[   30.086199]  fff00000c984ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.087019]  fff00000c984ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.087073] >fff00000c984f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.087109]                    ^
[   30.087137]  fff00000c984f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.087177]  fff00000c984f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.087213] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   30.072525] ==================================================================
[   30.072697] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   30.072764] Read of size 1 at addr fff00000c918c5df by task kunit_try_catch/169
[   30.072839] 
[   30.072878] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.073068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.073138] Hardware name: linux,dummy-virt (DT)
[   30.073206] Call trace:
[   30.073281]  show_stack+0x20/0x38 (C)
[   30.073363]  dump_stack_lvl+0x8c/0xd0
[   30.073529]  print_report+0x118/0x5d0
[   30.073651]  kasan_report+0xdc/0x128
[   30.073726]  __asan_report_load1_noabort+0x20/0x30
[   30.073774]  kmalloc_oob_left+0x2ec/0x320
[   30.073819]  kunit_try_run_case+0x170/0x3f0
[   30.073888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.073938]  kthread+0x328/0x630
[   30.073981]  ret_from_fork+0x10/0x20
[   30.074036] 
[   30.074054] Allocated by task 21:
[   30.074084]  kasan_save_stack+0x3c/0x68
[   30.074125]  kasan_save_track+0x20/0x40
[   30.074162]  kasan_save_alloc_info+0x40/0x58
[   30.074198]  __kasan_kmalloc+0xd4/0xd8
[   30.074234]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   30.074276]  build_sched_domains+0x32c/0x3768
[   30.074318]  partition_sched_domains+0x79c/0x1098
[   30.074369]  rebuild_sched_domains_locked+0x494/0xde0
[   30.074424]  cpuset_handle_hotplug+0xab0/0x1480
[   30.074501]  cpuset_update_active_cpus+0x18/0x30
[   30.074581]  sched_cpu_activate+0x2d0/0x388
[   30.074655]  cpuhp_invoke_callback+0x5b8/0x1620
[   30.074746]  cpuhp_thread_fun+0x230/0x5d8
[   30.074804]  smpboot_thread_fn+0x2e8/0x760
[   30.074915]  kthread+0x328/0x630
[   30.074967]  ret_from_fork+0x10/0x20
[   30.075003] 
[   30.075057] Freed by task 21:
[   30.075294]  kasan_save_stack+0x3c/0x68
[   30.075383]  kasan_save_track+0x20/0x40
[   30.075523]  kasan_save_free_info+0x4c/0x78
[   30.075619]  __kasan_slab_free+0x6c/0x98
[   30.075706]  kfree+0x214/0x3c8
[   30.075797]  build_sched_domains+0x1c64/0x3768
[   30.075844]  partition_sched_domains+0x79c/0x1098
[   30.075884]  rebuild_sched_domains_locked+0x494/0xde0
[   30.075968]  cpuset_handle_hotplug+0xab0/0x1480
[   30.076214]  cpuset_update_active_cpus+0x18/0x30
[   30.076252]  sched_cpu_activate+0x2d0/0x388
[   30.076289]  cpuhp_invoke_callback+0x5b8/0x1620
[   30.076342]  cpuhp_thread_fun+0x230/0x5d8
[   30.076383]  smpboot_thread_fn+0x2e8/0x760
[   30.076422]  kthread+0x328/0x630
[   30.076454]  ret_from_fork+0x10/0x20
[   30.076503] 
[   30.076529] The buggy address belongs to the object at fff00000c918c5c0
[   30.076529]  which belongs to the cache kmalloc-16 of size 16
[   30.076596] The buggy address is located 15 bytes to the right of
[   30.076596]  allocated 16-byte region [fff00000c918c5c0, fff00000c918c5d0)
[   30.076668] 
[   30.076689] The buggy address belongs to the physical page:
[   30.076719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c
[   30.076780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.076838] page_type: f5(slab)
[   30.076880] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.076929] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.076979] page dumped because: kasan: bad access detected
[   30.077014] 
[   30.077032] Memory state around the buggy address:
[   30.077080]  fff00000c918c480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.077123]  fff00000c918c500: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   30.077172] >fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   30.077219]                                                     ^
[   30.077271]  fff00000c918c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.077310]  fff00000c918c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.077355] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   30.047575] ==================================================================
[   30.047918] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.048739] Write of size 1 at addr fff00000c91b3373 by task kunit_try_catch/167
[   30.048906] 
[   30.050334] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.050506] Tainted: [N]=TEST
[   30.050539] Hardware name: linux,dummy-virt (DT)
[   30.050758] Call trace:
[   30.051618]  show_stack+0x20/0x38 (C)
[   30.051863]  dump_stack_lvl+0x8c/0xd0
[   30.051918]  print_report+0x118/0x5d0
[   30.051962]  kasan_report+0xdc/0x128
[   30.052005]  __asan_report_store1_noabort+0x20/0x30
[   30.052052]  kmalloc_oob_right+0x5a4/0x660
[   30.052098]  kunit_try_run_case+0x170/0x3f0
[   30.052150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.052199]  kthread+0x328/0x630
[   30.052242]  ret_from_fork+0x10/0x20
[   30.052526] 
[   30.052657] Allocated by task 167:
[   30.052957]  kasan_save_stack+0x3c/0x68
[   30.053541]  kasan_save_track+0x20/0x40
[   30.053637]  kasan_save_alloc_info+0x40/0x58
[   30.053865]  __kasan_kmalloc+0xd4/0xd8
[   30.053902]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.053944]  kmalloc_oob_right+0xb0/0x660
[   30.053980]  kunit_try_run_case+0x170/0x3f0
[   30.054018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.054057]  kthread+0x328/0x630
[   30.054090]  ret_from_fork+0x10/0x20
[   30.054470] 
[   30.054694] The buggy address belongs to the object at fff00000c91b3300
[   30.054694]  which belongs to the cache kmalloc-128 of size 128
[   30.054852] The buggy address is located 0 bytes to the right of
[   30.054852]  allocated 115-byte region [fff00000c91b3300, fff00000c91b3373)
[   30.054956] 
[   30.055297] The buggy address belongs to the physical page:
[   30.055606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.055942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.056315] page_type: f5(slab)
[   30.056622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.056682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.056785] page dumped because: kasan: bad access detected
[   30.056824] 
[   30.056850] Memory state around the buggy address:
[   30.057073]  fff00000c91b3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.057138]  fff00000c91b3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.057189] >fff00000c91b3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.057240]                                                              ^
[   30.057319]  fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.057468]  fff00000c91b3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.057546] ==================================================================
[   30.058713] ==================================================================
[   30.058773] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.058826] Write of size 1 at addr fff00000c91b3378 by task kunit_try_catch/167
[   30.058913] 
[   30.058963] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.059070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.059107] Hardware name: linux,dummy-virt (DT)
[   30.059156] Call trace:
[   30.059196]  show_stack+0x20/0x38 (C)
[   30.059255]  dump_stack_lvl+0x8c/0xd0
[   30.059340]  print_report+0x118/0x5d0
[   30.059406]  kasan_report+0xdc/0x128
[   30.059487]  __asan_report_store1_noabort+0x20/0x30
[   30.059553]  kmalloc_oob_right+0x538/0x660
[   30.059620]  kunit_try_run_case+0x170/0x3f0
[   30.059668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.059735]  kthread+0x328/0x630
[   30.059779]  ret_from_fork+0x10/0x20
[   30.059846] 
[   30.059874] Allocated by task 167:
[   30.059902]  kasan_save_stack+0x3c/0x68
[   30.059957]  kasan_save_track+0x20/0x40
[   30.059995]  kasan_save_alloc_info+0x40/0x58
[   30.060030]  __kasan_kmalloc+0xd4/0xd8
[   30.060153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.060203]  kmalloc_oob_right+0xb0/0x660
[   30.060272]  kunit_try_run_case+0x170/0x3f0
[   30.060395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.060461]  kthread+0x328/0x630
[   30.060495]  ret_from_fork+0x10/0x20
[   30.060590] 
[   30.060651] The buggy address belongs to the object at fff00000c91b3300
[   30.060651]  which belongs to the cache kmalloc-128 of size 128
[   30.060711] The buggy address is located 5 bytes to the right of
[   30.060711]  allocated 115-byte region [fff00000c91b3300, fff00000c91b3373)
[   30.061016] 
[   30.061062] The buggy address belongs to the physical page:
[   30.061103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.061201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.061254] page_type: f5(slab)
[   30.061294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.061413] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.061458] page dumped because: kasan: bad access detected
[   30.061489] 
[   30.061536] Memory state around the buggy address:
[   30.061843]  fff00000c91b3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.061918]  fff00000c91b3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.062063] >fff00000c91b3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.062102]                                                                 ^
[   30.062142]  fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.062182]  fff00000c91b3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.062226] ==================================================================
[   30.062777] ==================================================================
[   30.062825] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.062903] Read of size 1 at addr fff00000c91b3380 by task kunit_try_catch/167
[   30.062969] 
[   30.063007] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.063115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.063142] Hardware name: linux,dummy-virt (DT)
[   30.063179] Call trace:
[   30.063218]  show_stack+0x20/0x38 (C)
[   30.063284]  dump_stack_lvl+0x8c/0xd0
[   30.063344]  print_report+0x118/0x5d0
[   30.063387]  kasan_report+0xdc/0x128
[   30.063648]  __asan_report_load1_noabort+0x20/0x30
[   30.063719]  kmalloc_oob_right+0x5d0/0x660
[   30.063775]  kunit_try_run_case+0x170/0x3f0
[   30.063841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.063910]  kthread+0x328/0x630
[   30.063958]  ret_from_fork+0x10/0x20
[   30.064035] 
[   30.064094] Allocated by task 167:
[   30.064141]  kasan_save_stack+0x3c/0x68
[   30.064200]  kasan_save_track+0x20/0x40
[   30.064239]  kasan_save_alloc_info+0x40/0x58
[   30.064277]  __kasan_kmalloc+0xd4/0xd8
[   30.064425]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.064466]  kmalloc_oob_right+0xb0/0x660
[   30.064546]  kunit_try_run_case+0x170/0x3f0
[   30.064594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.064717]  kthread+0x328/0x630
[   30.064779]  ret_from_fork+0x10/0x20
[   30.064815] 
[   30.064833] The buggy address belongs to the object at fff00000c91b3300
[   30.064833]  which belongs to the cache kmalloc-128 of size 128
[   30.064920] The buggy address is located 13 bytes to the right of
[   30.064920]  allocated 115-byte region [fff00000c91b3300, fff00000c91b3373)
[   30.064993] 
[   30.065032] The buggy address belongs to the physical page:
[   30.065061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.065113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.065280] page_type: f5(slab)
[   30.065319] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.065440] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.065629] page dumped because: kasan: bad access detected
[   30.065744] 
[   30.065795] Memory state around the buggy address:
[   30.065884]  fff00000c91b3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.065936]  fff00000c91b3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.065977] >fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.066012]                    ^
[   30.066055]  fff00000c91b3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.066094]  fff00000c91b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.066131] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  109.357509] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689
[  109.358237] Modules linked in:
[  109.358470] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[  109.358891] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  109.359126] Hardware name: linux,dummy-virt (DT)
[  109.359345] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.360527] pc : intlog10+0x38/0x48
[  109.360944] lr : intlog10_test+0xe4/0x200
[  109.361436] sp : ffff800082327c10
[  109.361850] x29: ffff800082327c90 x28: 0000000000000000 x27: 0000000000000000
[  109.362620] x26: 1ffe00001936a341 x25: 0000000000000000 x24: ffff800082327ce0
[  109.363390] x23: ffff800082327d00 x22: 0000000000000000 x21: 1ffff00010464f82
[  109.364137] x20: ffff93639182f1e0 x19: ffff800080087990 x18: 000000004796e5d8
[  109.364888] x17: 0000000045f92f04 x16: 00000000fc69f4a8 x15: 00000000111b5a35
[  109.365721] x14: 000000007025431d x13: 1ffe00001b48a599 x12: ffff726c72ae2f89
[  109.366501] x11: 1ffff26c72ae2f88 x10: ffff726c72ae2f88 x9 : ffff93638ee49824
[  109.367233] x8 : ffff936395717c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.367982] x5 : ffff700010464f82 x4 : 1ffff00010010f3b x3 : 1ffff26c72305e3c
[  109.368746] x2 : 1ffff26c72305e3c x1 : 0000000000000003 x0 : 0000000000000000
[  109.369528] Call trace:
[  109.369808]  intlog10+0x38/0x48 (P)
[  109.370094]  kunit_try_run_case+0x170/0x3f0
[  109.370581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.370865]  kthread+0x328/0x630
[  109.371061]  ret_from_fork+0x10/0x20
[  109.371254] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  109.305071] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671
[  109.308557] Modules linked in:
[  109.308812] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[  109.310319] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  109.310891] Hardware name: linux,dummy-virt (DT)
[  109.311302] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.311872] pc : intlog2+0xd8/0xf8
[  109.312262] lr : intlog2_test+0xe4/0x200
[  109.312666] sp : ffff800082307c10
[  109.313019] x29: ffff800082307c90 x28: 0000000000000000 x27: 0000000000000000
[  109.313852] x26: 1ffe00001934b581 x25: 0000000000000000 x24: ffff800082307ce0
[  109.314334] x23: ffff800082307d00 x22: 0000000000000000 x21: 1ffff00010460f82
[  109.314916] x20: ffff93639182f0e0 x19: ffff800080087990 x18: 0000000099cebe45
[  109.315276] x17: 000000009e1cf3fb x16: fff00000c643103c x15: 00000000411e8858
[  109.315777] x14: 00000000f1f1f1f1 x13: 1ffe00001b48a5dd x12: ffff726c72ae2f89
[  109.316243] x11: 1ffff26c72ae2f88 x10: ffff726c72ae2f88 x9 : ffff93638ee49a24
[  109.316697] x8 : ffff936395717c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.317151] x5 : ffff700010460f82 x4 : 1ffff00010010f3b x3 : 1ffff26c72305e1c
[  109.317749] x2 : 1ffff26c72305e1c x1 : 0000000000000003 x0 : 0000000000000000
[  109.318332] Call trace:
[  109.318625]  intlog2+0xd8/0xf8 (P)
[  109.318832]  kunit_try_run_case+0x170/0x3f0
[  109.319297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.319857]  kthread+0x328/0x630
[  109.320240]  ret_from_fork+0x10/0x20
[  109.320693] ---[ end trace 0000000000000000 ]---
[  108.371686] Internal error: Oops: 0000000096000005 [#1]  SMP
[  108.376594] Modules linked in:
[  108.377320] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[  108.378482] Tainted: [B]=BAD_PAGE, [N]=TEST
[  108.379001] Hardware name: linux,dummy-virt (DT)
[  108.379678] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  108.380555] pc : kunit_test_null_dereference+0x70/0x170
[  108.381242] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.381950] sp : ffff800082187d30
[  108.382401] x29: ffff800082187d90 x28: 0000000000000000 x27: 0000000000000000
[  108.383377] x26: 1ffe00001923c261 x25: 0000000000000000 x24: 0000000000000004
[  108.384270] x23: fff00000c91e130c x22: ffff93638ee362b0 x21: fff00000c1c95108
[  108.385114] x20: 1ffff00010430fa6 x19: ffff800080087990 x18: 00000000ccca47cc
[  108.385903] x17: 0000000000000001 x16: fff00000c643103c x15: fff00000ff616b48
[  108.386720] x14: 0000000000018fff x13: 1ffe00001b48a5dd x12: fffd800018f9bdc4
[  108.387460] x11: 1ffe000018f9bdc3 x10: fffd800018f9bdc3 x9 : ffff93638ee2da40
[  108.388357] x8 : ffff800082187c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  108.389354] x5 : ffff700010430fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  108.389845] x2 : dfff800000000000 x1 : fff00000c7cde540 x0 : ffff800080087990
[  108.390462] Call trace:
[  108.390809]  kunit_test_null_dereference+0x70/0x170 (P)
[  108.391409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.391977]  kthread+0x328/0x630
[  108.392361]  ret_from_fork+0x10/0x20
[  108.393007] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  108.393928] ---[ end trace 0000000000000000 ]---