Hay
Date
July 14, 2025, 10:38 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   32.199398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   32.271685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   32.257232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   32.289333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   32.247642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   32.146247] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   32.106030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[  109.519745] Internal error: Oops: 0000000096000005 [#1]  SMP
[  109.525242] Modules linked in:
[  109.526565] CPU: 0 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[  109.527815] Tainted: [B]=BAD_PAGE, [N]=TEST
[  109.528022] Hardware name: linux,dummy-virt (DT)
[  109.528797] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.529744] pc : kunit_test_null_dereference+0x70/0x170
[  109.530539] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.531233] sp : ffff800082127d30
[  109.531649] x29: ffff800082127d90 x28: 0000000000000000 x27: 0000000000000000
[  109.532098] x26: 1ffe000019350b01 x25: 0000000000000000 x24: 0000000000000004
[  109.533180] x23: fff00000c9a8580c x22: ffffb0784aa38b58 x21: fff00000c1b2fa88
[  109.534172] x20: 1ffff00010424fa6 x19: ffff800080087990 x18: 000000008cf77334
[  109.535101] x17: 0000000000000001 x16: fff00000c932843c x15: fff00000ff616b48
[  109.536037] x14: 0000000000018fff x13: 1ffe00001b48e9dd x12: fffd8000197c98b4
[  109.536778] x11: 1ffe0000197c98b3 x10: fffd8000197c98b3 x9 : ffffb0784aa302e8
[  109.537482] x8 : ffff800082127c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  109.538218] x5 : ffff700010424fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  109.538934] x2 : dfff800000000000 x1 : fff00000cbe4bcc0 x0 : ffff800080087990
[  109.539464] Call trace:
[  109.539633]  kunit_test_null_dereference+0x70/0x170 (P)
[  109.539880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.540141]  kthread+0x328/0x630
[  109.540401]  ret_from_fork+0x10/0x20
[  109.540902] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  109.541719] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   63.537268] ==================================================================
[   63.537342] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   63.537342] 
[   63.537428] Use-after-free read at 0x00000000f131ff61 (in kfence-#188):
[   63.537481]  test_krealloc+0x51c/0x830
[   63.537525]  kunit_try_run_case+0x170/0x3f0
[   63.537572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.537622]  kthread+0x328/0x630
[   63.537659]  ret_from_fork+0x10/0x20
[   63.537700] 
[   63.537725] kfence-#188: 0x00000000f131ff61-0x00000000982bc35d, size=32, cache=kmalloc-32
[   63.537725] 
[   63.537779] allocated by task 368 on cpu 1 at 63.536588s (0.001187s ago):
[   63.537847]  test_alloc+0x29c/0x628
[   63.537888]  test_krealloc+0xc0/0x830
[   63.537928]  kunit_try_run_case+0x170/0x3f0
[   63.537969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.538011]  kthread+0x328/0x630
[   63.538057]  ret_from_fork+0x10/0x20
[   63.538100] 
[   63.538123] freed by task 368 on cpu 1 at 63.536852s (0.001268s ago):
[   63.538183]  krealloc_noprof+0x148/0x360
[   63.538225]  test_krealloc+0x1dc/0x830
[   63.538264]  kunit_try_run_case+0x170/0x3f0
[   63.538303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.538345]  kthread+0x328/0x630
[   63.538383]  ret_from_fork+0x10/0x20
[   63.538426] 
[   63.538472] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   63.538552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.538581] Hardware name: linux,dummy-virt (DT)
[   63.538614] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   63.447941] ==================================================================
[   63.448058] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   63.448058] 
[   63.448190] Use-after-free read at 0x00000000a7b96bbc (in kfence-#187):
[   63.448246]  test_memcache_typesafe_by_rcu+0x280/0x560
[   63.448297]  kunit_try_run_case+0x170/0x3f0
[   63.448346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.448388]  kthread+0x328/0x630
[   63.448427]  ret_from_fork+0x10/0x20
[   63.448468] 
[   63.448495] kfence-#187: 0x00000000a7b96bbc-0x0000000005dba069, size=32, cache=test
[   63.448495] 
[   63.448547] allocated by task 366 on cpu 0 at 63.431966s (0.016578s ago):
[   63.448618]  test_alloc+0x230/0x628
[   63.448658]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   63.448703]  kunit_try_run_case+0x170/0x3f0
[   63.448744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.448786]  kthread+0x328/0x630
[   63.448821]  ret_from_fork+0x10/0x20
[   63.448860] 
[   63.448883] freed by task 366 on cpu 0 at 63.432093s (0.016787s ago):
[   63.448940]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   63.448982]  kunit_try_run_case+0x170/0x3f0
[   63.449024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.449075]  kthread+0x328/0x630
[   63.449110]  ret_from_fork+0x10/0x20
[   63.449150] 
[   63.449197] CPU: 0 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   63.449278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.449307] Hardware name: linux,dummy-virt (DT)
[   63.449342] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   40.156960] ==================================================================
[   40.157132] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   40.157132] 
[   40.157233] Invalid read at 0x000000001e966d8a:
[   40.157454]  test_invalid_access+0xdc/0x1f0
[   40.157690]  kunit_try_run_case+0x170/0x3f0
[   40.158358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.158820]  kthread+0x328/0x630
[   40.159028]  ret_from_fork+0x10/0x20
[   40.159943] 
[   40.160188] CPU: 1 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   40.160282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.160318] Hardware name: linux,dummy-virt (DT)
[   40.160359] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   33.893549] ==================================================================
[   33.893650] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   33.893650] 
[   33.893855] Out-of-bounds write at 0x00000000aa5ddc1b (1B left of kfence-#125):
[   33.894119]  test_out_of_bounds_write+0x100/0x240
[   33.894295]  kunit_try_run_case+0x170/0x3f0
[   33.894513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.894557]  kthread+0x328/0x630
[   33.894599]  ret_from_fork+0x10/0x20
[   33.894638] 
[   33.894665] kfence-#125: 0x0000000095ec527a-0x000000002871d083, size=32, cache=kmalloc-32
[   33.894665] 
[   33.895532] allocated by task 322 on cpu 0 at 33.893145s (0.001569s ago):
[   33.895622]  test_alloc+0x29c/0x628
[   33.895664]  test_out_of_bounds_write+0xc8/0x240
[   33.896333]  kunit_try_run_case+0x170/0x3f0
[   33.897067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.897144]  kthread+0x328/0x630
[   33.897194]  ret_from_fork+0x10/0x20
[   33.897235] 
[   33.897372] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   33.897865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.898176] Hardware name: linux,dummy-virt (DT)
[   33.898540] ==================================================================
[   34.205584] ==================================================================
[   34.206008] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   34.206008] 
[   34.206214] Out-of-bounds write at 0x00000000ba849019 (1B left of kfence-#128):
[   34.206277]  test_out_of_bounds_write+0x100/0x240
[   34.206371]  kunit_try_run_case+0x170/0x3f0
[   34.206466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.206512]  kthread+0x328/0x630
[   34.206712]  ret_from_fork+0x10/0x20
[   34.206881] 
[   34.206947] kfence-#128: 0x00000000c77a9003-0x0000000069b3d0c2, size=32, cache=test
[   34.206947] 
[   34.207103] allocated by task 324 on cpu 0 at 34.205490s (0.001525s ago):
[   34.207216]  test_alloc+0x230/0x628
[   34.207275]  test_out_of_bounds_write+0xc8/0x240
[   34.207319]  kunit_try_run_case+0x170/0x3f0
[   34.207745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.207840]  kthread+0x328/0x630
[   34.207886]  ret_from_fork+0x10/0x20
[   34.207998] 
[   34.208058] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   34.208147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.208178] Hardware name: linux,dummy-virt (DT)
[   34.208270] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   39.924878] ==================================================================
[   39.924987] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   39.924987] 
[   39.925071] Corrupted memory at 0x00000000a9f49f17 [ ! . . . . . . . . . . . . . . . ] (in kfence-#183):
[   39.925389]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   39.925439]  kunit_try_run_case+0x170/0x3f0
[   39.925487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.925528]  kthread+0x328/0x630
[   39.925566]  ret_from_fork+0x10/0x20
[   39.925610] 
[   39.925637] kfence-#183: 0x00000000c8b8fec1-0x00000000019d166d, size=73, cache=kmalloc-96
[   39.925637] 
[   39.925692] allocated by task 356 on cpu 1 at 39.924621s (0.001066s ago):
[   39.925755]  test_alloc+0x29c/0x628
[   39.925800]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   39.925848]  kunit_try_run_case+0x170/0x3f0
[   39.925887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.925929]  kthread+0x328/0x630
[   39.925966]  ret_from_fork+0x10/0x20
[   39.926004] 
[   39.926028] freed by task 356 on cpu 1 at 39.924771s (0.001253s ago):
[   39.926102]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   39.926149]  kunit_try_run_case+0x170/0x3f0
[   39.926193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.926234]  kthread+0x328/0x630
[   39.926272]  ret_from_fork+0x10/0x20
[   39.926312] 
[   39.926361] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   39.926445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.926474] Hardware name: linux,dummy-virt (DT)
[   39.926509] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   39.612928] ==================================================================
[   39.613038] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   39.613038] 
[   39.613159] Out-of-bounds read at 0x000000003f5cf870 (105B right of kfence-#180):
[   39.613220]  test_kmalloc_aligned_oob_read+0x238/0x468
[   39.613270]  kunit_try_run_case+0x170/0x3f0
[   39.613317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.613357]  kthread+0x328/0x630
[   39.613396]  ret_from_fork+0x10/0x20
[   39.613434] 
[   39.613460] kfence-#180: 0x00000000cd52b3f1-0x00000000af8cae3d, size=73, cache=kmalloc-96
[   39.613460] 
[   39.613514] allocated by task 354 on cpu 0 at 39.612676s (0.000834s ago):
[   39.613585]  test_alloc+0x29c/0x628
[   39.613630]  test_kmalloc_aligned_oob_read+0x100/0x468
[   39.613673]  kunit_try_run_case+0x170/0x3f0
[   39.613714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.613753]  kthread+0x328/0x630
[   39.613789]  ret_from_fork+0x10/0x20
[   39.613828] 
[   39.613876] CPU: 0 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   39.613957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.613985] Hardware name: linux,dummy-virt (DT)
[   39.614020] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   35.244910] ==================================================================
[   35.245004] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   35.245004] 
[   35.245085] Corrupted memory at 0x00000000f2d26b9a [ ! ] (in kfence-#138):
[   35.245216]  test_corruption+0x284/0x378
[   35.245264]  kunit_try_run_case+0x170/0x3f0
[   35.245307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.245349]  kthread+0x328/0x630
[   35.245386]  ret_from_fork+0x10/0x20
[   35.245427] 
[   35.245450] kfence-#138: 0x00000000fd200a2d-0x0000000046d6fc34, size=32, cache=kmalloc-32
[   35.245450] 
[   35.245505] allocated by task 342 on cpu 1 at 35.244631s (0.000871s ago):
[   35.245566]  test_alloc+0x29c/0x628
[   35.245611]  test_corruption+0x198/0x378
[   35.245652]  kunit_try_run_case+0x170/0x3f0
[   35.245694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.245735]  kthread+0x328/0x630
[   35.245772]  ret_from_fork+0x10/0x20
[   35.245811] 
[   35.245834] freed by task 342 on cpu 1 at 35.244740s (0.001091s ago):
[   35.245897]  test_corruption+0x284/0x378
[   35.245936]  kunit_try_run_case+0x170/0x3f0
[   35.245975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.246016]  kthread+0x328/0x630
[   35.246063]  ret_from_fork+0x10/0x20
[   35.246101] 
[   35.246143] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   35.246221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.246251] Hardware name: linux,dummy-virt (DT)
[   35.246285] ==================================================================
[   35.556776] ==================================================================
[   35.556866] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   35.556866] 
[   35.556928] Corrupted memory at 0x00000000749ffd9c [ ! ] (in kfence-#141):
[   35.557042]  test_corruption+0x1d8/0x378
[   35.557106]  kunit_try_run_case+0x170/0x3f0
[   35.557149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.557191]  kthread+0x328/0x630
[   35.557229]  ret_from_fork+0x10/0x20
[   35.557269] 
[   35.557293] kfence-#141: 0x0000000063447b2d-0x00000000ee64cd8c, size=32, cache=test
[   35.557293] 
[   35.557348] allocated by task 344 on cpu 1 at 35.556630s (0.000715s ago):
[   35.557409]  test_alloc+0x230/0x628
[   35.557450]  test_corruption+0x198/0x378
[   35.557491]  kunit_try_run_case+0x170/0x3f0
[   35.557532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.557574]  kthread+0x328/0x630
[   35.557613]  ret_from_fork+0x10/0x20
[   35.557654] 
[   35.557679] freed by task 344 on cpu 1 at 35.556688s (0.000987s ago):
[   35.557743]  test_corruption+0x1d8/0x378
[   35.557784]  kunit_try_run_case+0x170/0x3f0
[   35.557824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.557866]  kthread+0x328/0x630
[   35.557901]  ret_from_fork+0x10/0x20
[   35.557940] 
[   35.557981] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   35.558070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.558100] Hardware name: linux,dummy-virt (DT)
[   35.558134] ==================================================================
[   35.140843] ==================================================================
[   35.140952] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   35.140952] 
[   35.141019] Corrupted memory at 0x0000000089f69fc5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#137):
[   35.142155]  test_corruption+0x278/0x378
[   35.142209]  kunit_try_run_case+0x170/0x3f0
[   35.142257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.142299]  kthread+0x328/0x630
[   35.142339]  ret_from_fork+0x10/0x20
[   35.142381] 
[   35.142405] kfence-#137: 0x000000005a0adbbc-0x0000000023781057, size=32, cache=kmalloc-32
[   35.142405] 
[   35.142463] allocated by task 342 on cpu 1 at 35.140554s (0.001906s ago):
[   35.142527]  test_alloc+0x29c/0x628
[   35.142568]  test_corruption+0xdc/0x378
[   35.142609]  kunit_try_run_case+0x170/0x3f0
[   35.142651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.142692]  kthread+0x328/0x630
[   35.142726]  ret_from_fork+0x10/0x20
[   35.142767] 
[   35.142790] freed by task 342 on cpu 1 at 35.140663s (0.002124s ago):
[   35.142853]  test_corruption+0x278/0x378
[   35.142893]  kunit_try_run_case+0x170/0x3f0
[   35.142932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.142973]  kthread+0x328/0x630
[   35.143008]  ret_from_fork+0x10/0x20
[   35.143057] 
[   35.143105] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   35.143185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.143214] Hardware name: linux,dummy-virt (DT)
[   35.143247] ==================================================================
[   35.348795] ==================================================================
[   35.348896] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   35.348896] 
[   35.348961] Corrupted memory at 0x00000000239cd208 [ ! . . . . . . . . . . . . . . . ] (in kfence-#139):
[   35.349289]  test_corruption+0x120/0x378
[   35.349338]  kunit_try_run_case+0x170/0x3f0
[   35.349383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.349425]  kthread+0x328/0x630
[   35.349464]  ret_from_fork+0x10/0x20
[   35.349504] 
[   35.349528] kfence-#139: 0x0000000042c9df16-0x0000000054fcd1c6, size=32, cache=test
[   35.349528] 
[   35.349585] allocated by task 344 on cpu 1 at 35.348636s (0.000944s ago):
[   35.349652]  test_alloc+0x230/0x628
[   35.349692]  test_corruption+0xdc/0x378
[   35.349732]  kunit_try_run_case+0x170/0x3f0
[   35.349773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.349813]  kthread+0x328/0x630
[   35.349849]  ret_from_fork+0x10/0x20
[   35.349887] 
[   35.349911] freed by task 344 on cpu 1 at 35.348701s (0.001206s ago):
[   35.349972]  test_corruption+0x120/0x378
[   35.350013]  kunit_try_run_case+0x170/0x3f0
[   35.350065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.350107]  kthread+0x328/0x630
[   35.350142]  ret_from_fork+0x10/0x20
[   35.350179] 
[   35.350223] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   35.350304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.350333] Hardware name: linux,dummy-virt (DT)
[   35.350367] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   35.036750] ==================================================================
[   35.036848] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   35.036848] 
[   35.036911] Invalid free of 0x00000000a251537a (in kfence-#136):
[   35.036967]  test_invalid_addr_free+0xec/0x238
[   35.037015]  kunit_try_run_case+0x170/0x3f0
[   35.037076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.037121]  kthread+0x328/0x630
[   35.037162]  ret_from_fork+0x10/0x20
[   35.037203] 
[   35.037227] kfence-#136: 0x00000000d212235e-0x00000000ccef3bd3, size=32, cache=test
[   35.037227] 
[   35.037280] allocated by task 340 on cpu 0 at 35.036621s (0.000655s ago):
[   35.037344]  test_alloc+0x230/0x628
[   35.037385]  test_invalid_addr_free+0xd4/0x238
[   35.037426]  kunit_try_run_case+0x170/0x3f0
[   35.037468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.037508]  kthread+0x328/0x630
[   35.037544]  ret_from_fork+0x10/0x20
[   35.037582] 
[   35.037632] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   35.037712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.037742] Hardware name: linux,dummy-virt (DT)
[   35.037774] ==================================================================
[   34.932793] ==================================================================
[   34.932897] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   34.932897] 
[   34.932962] Invalid free of 0x000000003c39334c (in kfence-#135):
[   34.933020]  test_invalid_addr_free+0x1ac/0x238
[   34.933086]  kunit_try_run_case+0x170/0x3f0
[   34.933133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.933175]  kthread+0x328/0x630
[   34.933216]  ret_from_fork+0x10/0x20
[   34.933257] 
[   34.933281] kfence-#135: 0x00000000abbe6914-0x000000009d7f57e5, size=32, cache=kmalloc-32
[   34.933281] 
[   34.933337] allocated by task 338 on cpu 0 at 34.932636s (0.000697s ago):
[   34.933402]  test_alloc+0x29c/0x628
[   34.933444]  test_invalid_addr_free+0xd4/0x238
[   34.933489]  kunit_try_run_case+0x170/0x3f0
[   34.933531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.933573]  kthread+0x328/0x630
[   34.933621]  ret_from_fork+0x10/0x20
[   34.933662] 
[   34.933710] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   34.933792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.933824] Hardware name: linux,dummy-virt (DT)
[   34.933857] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   34.724994] ==================================================================
[   34.725139] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   34.725139] 
[   34.725214] Invalid free of 0x00000000fe351f62 (in kfence-#133):
[   34.725281]  test_double_free+0x1bc/0x238
[   34.725330]  kunit_try_run_case+0x170/0x3f0
[   34.725378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.725420]  kthread+0x328/0x630
[   34.725459]  ret_from_fork+0x10/0x20
[   34.725499] 
[   34.725525] kfence-#133: 0x00000000fe351f62-0x00000000a5ca718a, size=32, cache=kmalloc-32
[   34.725525] 
[   34.725580] allocated by task 334 on cpu 1 at 34.724654s (0.000922s ago):
[   34.725653]  test_alloc+0x29c/0x628
[   34.725695]  test_double_free+0xd4/0x238
[   34.725737]  kunit_try_run_case+0x170/0x3f0
[   34.725777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.725821]  kthread+0x328/0x630
[   34.725857]  ret_from_fork+0x10/0x20
[   34.725899] 
[   34.725924] freed by task 334 on cpu 1 at 34.724737s (0.001183s ago):
[   34.725990]  test_double_free+0x1ac/0x238
[   34.726030]  kunit_try_run_case+0x170/0x3f0
[   34.726084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.726125]  kthread+0x328/0x630
[   34.726162]  ret_from_fork+0x10/0x20
[   34.726200] 
[   34.726250] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   34.726334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.726363] Hardware name: linux,dummy-virt (DT)
[   34.726397] ==================================================================
[   34.828804] ==================================================================
[   34.828900] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   34.828900] 
[   34.828963] Invalid free of 0x00000000c920656e (in kfence-#134):
[   34.829014]  test_double_free+0x100/0x238
[   34.829078]  kunit_try_run_case+0x170/0x3f0
[   34.829122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.829163]  kthread+0x328/0x630
[   34.829201]  ret_from_fork+0x10/0x20
[   34.829241] 
[   34.829265] kfence-#134: 0x00000000c920656e-0x00000000012ddf33, size=32, cache=test
[   34.829265] 
[   34.829323] allocated by task 336 on cpu 1 at 34.828573s (0.000746s ago):
[   34.829389]  test_alloc+0x230/0x628
[   34.829431]  test_double_free+0xd4/0x238
[   34.829470]  kunit_try_run_case+0x170/0x3f0
[   34.829511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.829552]  kthread+0x328/0x630
[   34.829591]  ret_from_fork+0x10/0x20
[   34.829630] 
[   34.829654] freed by task 336 on cpu 1 at 34.828632s (0.001018s ago):
[   34.829717]  test_double_free+0xf0/0x238
[   34.829758]  kunit_try_run_case+0x170/0x3f0
[   34.829798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.829839]  kthread+0x328/0x630
[   34.829874]  ret_from_fork+0x10/0x20
[   34.829913] 
[   34.829955] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   34.830034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.830070] Hardware name: linux,dummy-virt (DT)
[   34.830104] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   34.310554] ==================================================================
[   34.310654] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   34.310654] 
[   34.310788] Use-after-free read at 0x0000000037457c64 (in kfence-#129):
[   34.310840]  test_use_after_free_read+0x114/0x248
[   34.310934]  kunit_try_run_case+0x170/0x3f0
[   34.310981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.311082]  kthread+0x328/0x630
[   34.311127]  ret_from_fork+0x10/0x20
[   34.311194] 
[   34.311473] kfence-#129: 0x0000000037457c64-0x000000005bf296f3, size=32, cache=kmalloc-32
[   34.311473] 
[   34.311631] allocated by task 326 on cpu 0 at 34.309529s (0.002007s ago):
[   34.311729]  test_alloc+0x29c/0x628
[   34.312040]  test_use_after_free_read+0xd0/0x248
[   34.312202]  kunit_try_run_case+0x170/0x3f0
[   34.312258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.312315]  kthread+0x328/0x630
[   34.312887]  ret_from_fork+0x10/0x20
[   34.313106] 
[   34.313343] freed by task 326 on cpu 0 at 34.309941s (0.003241s ago):
[   34.313477]  test_use_after_free_read+0x1c0/0x248
[   34.313534]  kunit_try_run_case+0x170/0x3f0
[   34.313577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.313636]  kthread+0x328/0x630
[   34.313672]  ret_from_fork+0x10/0x20
[   34.313737] 
[   34.313795] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   34.313889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.313919] Hardware name: linux,dummy-virt (DT)
[   34.313955] ==================================================================
[   34.418166] ==================================================================
[   34.418280] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   34.418280] 
[   34.418490] Use-after-free read at 0x00000000a6d029e1 (in kfence-#130):
[   34.418559]  test_use_after_free_read+0x114/0x248
[   34.418975]  kunit_try_run_case+0x170/0x3f0
[   34.419179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.419299]  kthread+0x328/0x630
[   34.419573]  ret_from_fork+0x10/0x20
[   34.419637] 
[   34.419855] kfence-#130: 0x00000000a6d029e1-0x0000000057219c1d, size=32, cache=test
[   34.419855] 
[   34.420096] allocated by task 328 on cpu 0 at 34.417499s (0.002588s ago):
[   34.420327]  test_alloc+0x230/0x628
[   34.420629]  test_use_after_free_read+0xd0/0x248
[   34.420733]  kunit_try_run_case+0x170/0x3f0
[   34.421176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.421433]  kthread+0x328/0x630
[   34.421487]  ret_from_fork+0x10/0x20
[   34.421529] 
[   34.421553] freed by task 328 on cpu 0 at 34.417834s (0.003715s ago):
[   34.422192]  test_use_after_free_read+0xf0/0x248
[   34.422415]  kunit_try_run_case+0x170/0x3f0
[   34.422669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.422806]  kthread+0x328/0x630
[   34.422904]  ret_from_fork+0x10/0x20
[   34.423220] 
[   34.423502] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   34.423795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.424190] Hardware name: linux,dummy-virt (DT)
[   34.424283] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   33.685357] ==================================================================
[   33.685443] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   33.685443] 
[   33.685605] Out-of-bounds read at 0x000000004d3f0096 (32B right of kfence-#123):
[   33.685745]  test_out_of_bounds_read+0x1c8/0x3e0
[   33.685822]  kunit_try_run_case+0x170/0x3f0
[   33.685902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.685944]  kthread+0x328/0x630
[   33.686280]  ret_from_fork+0x10/0x20
[   33.686438] 
[   33.686475] kfence-#123: 0x000000001e79d931-0x000000002b793eea, size=32, cache=test
[   33.686475] 
[   33.686566] allocated by task 320 on cpu 0 at 33.685193s (0.001333s ago):
[   33.686701]  test_alloc+0x230/0x628
[   33.686758]  test_out_of_bounds_read+0x198/0x3e0
[   33.686803]  kunit_try_run_case+0x170/0x3f0
[   33.686845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.687081]  kthread+0x328/0x630
[   33.687175]  ret_from_fork+0x10/0x20
[   33.687219] 
[   33.687350] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   33.687458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.687556] Hardware name: linux,dummy-virt (DT)
[   33.687590] ==================================================================
[   33.371006] ==================================================================
[   33.371133] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   33.371133] 
[   33.371255] Out-of-bounds read at 0x0000000048fc19dd (1B left of kfence-#120):
[   33.371415]  test_out_of_bounds_read+0x114/0x3e0
[   33.371479]  kunit_try_run_case+0x170/0x3f0
[   33.371524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.371857]  kthread+0x328/0x630
[   33.372007]  ret_from_fork+0x10/0x20
[   33.372067] 
[   33.372118] kfence-#120: 0x00000000fa2f132a-0x000000000b635f6c, size=32, cache=test
[   33.372118] 
[   33.372366] allocated by task 320 on cpu 0 at 33.370230s (0.002074s ago):
[   33.372989]  test_alloc+0x230/0x628
[   33.373142]  test_out_of_bounds_read+0xdc/0x3e0
[   33.373249]  kunit_try_run_case+0x170/0x3f0
[   33.373313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.373516]  kthread+0x328/0x630
[   33.373752]  ret_from_fork+0x10/0x20
[   33.373934] 
[   33.374014] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   33.374783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.374878] Hardware name: linux,dummy-virt (DT)
[   33.374985] ==================================================================
[   33.059589] ==================================================================
[   33.059977] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   33.059977] 
[   33.060825] Out-of-bounds read at 0x0000000038f32756 (1B left of kfence-#117):
[   33.061673]  test_out_of_bounds_read+0x114/0x3e0
[   33.062070]  kunit_try_run_case+0x170/0x3f0
[   33.062267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.062429]  kthread+0x328/0x630
[   33.062528]  ret_from_fork+0x10/0x20
[   33.063102] 
[   33.063733] kfence-#117: 0x00000000a9ecfbbf-0x00000000e18ab0e3, size=32, cache=kmalloc-32
[   33.063733] 
[   33.064628] allocated by task 318 on cpu 0 at 33.057960s (0.006456s ago):
[   33.066375]  test_alloc+0x29c/0x628
[   33.066842]  test_out_of_bounds_read+0xdc/0x3e0
[   33.066962]  kunit_try_run_case+0x170/0x3f0
[   33.067326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.067533]  kthread+0x328/0x630
[   33.067643]  ret_from_fork+0x10/0x20
[   33.068099] 
[   33.068359] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   33.068622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.068800] Hardware name: linux,dummy-virt (DT)
[   33.068859] ==================================================================
[   33.265564] ==================================================================
[   33.265662] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   33.265662] 
[   33.265765] Out-of-bounds read at 0x00000000e92ea9aa (32B right of kfence-#119):
[   33.265828]  test_out_of_bounds_read+0x1c8/0x3e0
[   33.265875]  kunit_try_run_case+0x170/0x3f0
[   33.266066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.266221]  kthread+0x328/0x630
[   33.266276]  ret_from_fork+0x10/0x20
[   33.266547] 
[   33.266643] kfence-#119: 0x00000000592b2bb9-0x000000003297a55c, size=32, cache=kmalloc-32
[   33.266643] 
[   33.266753] allocated by task 318 on cpu 0 at 33.265323s (0.001419s ago):
[   33.266835]  test_alloc+0x29c/0x628
[   33.266898]  test_out_of_bounds_read+0x198/0x3e0
[   33.266958]  kunit_try_run_case+0x170/0x3f0
[   33.267036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.267090]  kthread+0x328/0x630
[   33.267144]  ret_from_fork+0x10/0x20
[   33.267184] 
[   33.267246] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   33.267684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.267764] Hardware name: linux,dummy-virt (DT)
[   33.267799] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   32.921256] ==================================================================
[   32.921757] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   32.921881] Write of size 1 at addr fff00000c85fcf78 by task kunit_try_catch/316
[   32.921956] 
[   32.921990] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.922166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.922193] Hardware name: linux,dummy-virt (DT)
[   32.922754] Call trace:
[   32.922902]  show_stack+0x20/0x38 (C)
[   32.923039]  dump_stack_lvl+0x8c/0xd0
[   32.923159]  print_report+0x118/0x5d0
[   32.923329]  kasan_report+0xdc/0x128
[   32.923395]  __asan_report_store1_noabort+0x20/0x30
[   32.923447]  strncpy_from_user+0x270/0x2a0
[   32.923795]  copy_user_test_oob+0x5c0/0xec8
[   32.923875]  kunit_try_run_case+0x170/0x3f0
[   32.924298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.924510]  kthread+0x328/0x630
[   32.924617]  ret_from_fork+0x10/0x20
[   32.924786] 
[   32.924806] Allocated by task 316:
[   32.924835]  kasan_save_stack+0x3c/0x68
[   32.925178]  kasan_save_track+0x20/0x40
[   32.925435]  kasan_save_alloc_info+0x40/0x58
[   32.925509]  __kasan_kmalloc+0xd4/0xd8
[   32.925660]  __kmalloc_noprof+0x198/0x4c8
[   32.925930]  kunit_kmalloc_array+0x34/0x88
[   32.926130]  copy_user_test_oob+0xac/0xec8
[   32.926234]  kunit_try_run_case+0x170/0x3f0
[   32.926277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.926627]  kthread+0x328/0x630
[   32.926714]  ret_from_fork+0x10/0x20
[   32.926782] 
[   32.926977] The buggy address belongs to the object at fff00000c85fcf00
[   32.926977]  which belongs to the cache kmalloc-128 of size 128
[   32.927454] The buggy address is located 0 bytes to the right of
[   32.927454]  allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78)
[   32.927565] 
[   32.927599] The buggy address belongs to the physical page:
[   32.927861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.928105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.928228] page_type: f5(slab)
[   32.928527] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.928605] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.929038] page dumped because: kasan: bad access detected
[   32.929115] 
[   32.929249] Memory state around the buggy address:
[   32.929708]  fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.929813]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.929864] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.930201]                                                                 ^
[   32.930290]  fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.930661]  fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.930803] ==================================================================
[   32.911269] ==================================================================
[   32.911338] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   32.911399] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316
[   32.911452] 
[   32.911489] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.911585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.911616] Hardware name: linux,dummy-virt (DT)
[   32.911659] Call trace:
[   32.911684]  show_stack+0x20/0x38 (C)
[   32.911732]  dump_stack_lvl+0x8c/0xd0
[   32.911780]  print_report+0x118/0x5d0
[   32.911835]  kasan_report+0xdc/0x128
[   32.911880]  kasan_check_range+0x100/0x1a8
[   32.911926]  __kasan_check_write+0x20/0x30
[   32.911982]  strncpy_from_user+0x3c/0x2a0
[   32.912032]  copy_user_test_oob+0x5c0/0xec8
[   32.912096]  kunit_try_run_case+0x170/0x3f0
[   32.912147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.912982]  kthread+0x328/0x630
[   32.913108]  ret_from_fork+0x10/0x20
[   32.913192] 
[   32.913247] Allocated by task 316:
[   32.913317]  kasan_save_stack+0x3c/0x68
[   32.913401]  kasan_save_track+0x20/0x40
[   32.913481]  kasan_save_alloc_info+0x40/0x58
[   32.913535]  __kasan_kmalloc+0xd4/0xd8
[   32.913576]  __kmalloc_noprof+0x198/0x4c8
[   32.913907]  kunit_kmalloc_array+0x34/0x88
[   32.914442]  copy_user_test_oob+0xac/0xec8
[   32.914525]  kunit_try_run_case+0x170/0x3f0
[   32.914643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.914701]  kthread+0x328/0x630
[   32.914736]  ret_from_fork+0x10/0x20
[   32.915342] 
[   32.915423] The buggy address belongs to the object at fff00000c85fcf00
[   32.915423]  which belongs to the cache kmalloc-128 of size 128
[   32.915568] The buggy address is located 0 bytes inside of
[   32.915568]  allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78)
[   32.915919] 
[   32.916092] The buggy address belongs to the physical page:
[   32.916378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.916469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.916659] page_type: f5(slab)
[   32.916730] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.916923] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.917299] page dumped because: kasan: bad access detected
[   32.917381] 
[   32.917713] Memory state around the buggy address:
[   32.917776]  fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.918075]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.918209] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.918776]                                                                 ^
[   32.918959]  fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.919125]  fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.919461] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   32.876982] ==================================================================
[   32.877145] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   32.877208] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316
[   32.877262] 
[   32.877619] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.877751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.877787] Hardware name: linux,dummy-virt (DT)
[   32.877820] Call trace:
[   32.877940]  show_stack+0x20/0x38 (C)
[   32.878035]  dump_stack_lvl+0x8c/0xd0
[   32.878218]  print_report+0x118/0x5d0
[   32.878282]  kasan_report+0xdc/0x128
[   32.878328]  kasan_check_range+0x100/0x1a8
[   32.878383]  __kasan_check_write+0x20/0x30
[   32.878592]  copy_user_test_oob+0x35c/0xec8
[   32.878656]  kunit_try_run_case+0x170/0x3f0
[   32.878708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.878860]  kthread+0x328/0x630
[   32.878916]  ret_from_fork+0x10/0x20
[   32.878981] 
[   32.879331] Allocated by task 316:
[   32.879437]  kasan_save_stack+0x3c/0x68
[   32.879532]  kasan_save_track+0x20/0x40
[   32.879578]  kasan_save_alloc_info+0x40/0x58
[   32.879655]  __kasan_kmalloc+0xd4/0xd8
[   32.879776]  __kmalloc_noprof+0x198/0x4c8
[   32.879843]  kunit_kmalloc_array+0x34/0x88
[   32.879901]  copy_user_test_oob+0xac/0xec8
[   32.880178]  kunit_try_run_case+0x170/0x3f0
[   32.881036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.881125]  kthread+0x328/0x630
[   32.881198]  ret_from_fork+0x10/0x20
[   32.881266] 
[   32.881343] The buggy address belongs to the object at fff00000c85fcf00
[   32.881343]  which belongs to the cache kmalloc-128 of size 128
[   32.881418] The buggy address is located 0 bytes inside of
[   32.881418]  allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78)
[   32.881485] 
[   32.881879] The buggy address belongs to the physical page:
[   32.881994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.882446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.882515] page_type: f5(slab)
[   32.882560] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.882938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.883324] page dumped because: kasan: bad access detected
[   32.883374] 
[   32.883395] Memory state around the buggy address:
[   32.883432]  fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.883619]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.883676] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.883718]                                                                 ^
[   32.883791]  fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.883836]  fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.883895] ==================================================================
[   32.885537] ==================================================================
[   32.885653] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   32.885708] Read of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316
[   32.885788] 
[   32.886102] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.886215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.886244] Hardware name: linux,dummy-virt (DT)
[   32.886395] Call trace:
[   32.886643]  show_stack+0x20/0x38 (C)
[   32.886789]  dump_stack_lvl+0x8c/0xd0
[   32.886842]  print_report+0x118/0x5d0
[   32.886898]  kasan_report+0xdc/0x128
[   32.886948]  kasan_check_range+0x100/0x1a8
[   32.887241]  __kasan_check_read+0x20/0x30
[   32.887542]  copy_user_test_oob+0x3c8/0xec8
[   32.887622]  kunit_try_run_case+0x170/0x3f0
[   32.887716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.887801]  kthread+0x328/0x630
[   32.887845]  ret_from_fork+0x10/0x20
[   32.887994] 
[   32.888110] Allocated by task 316:
[   32.888230]  kasan_save_stack+0x3c/0x68
[   32.888279]  kasan_save_track+0x20/0x40
[   32.888668]  kasan_save_alloc_info+0x40/0x58
[   32.889112]  __kasan_kmalloc+0xd4/0xd8
[   32.889237]  __kmalloc_noprof+0x198/0x4c8
[   32.889370]  kunit_kmalloc_array+0x34/0x88
[   32.889435]  copy_user_test_oob+0xac/0xec8
[   32.889515]  kunit_try_run_case+0x170/0x3f0
[   32.889560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.889620]  kthread+0x328/0x630
[   32.889656]  ret_from_fork+0x10/0x20
[   32.889695] 
[   32.889718] The buggy address belongs to the object at fff00000c85fcf00
[   32.889718]  which belongs to the cache kmalloc-128 of size 128
[   32.889802] The buggy address is located 0 bytes inside of
[   32.889802]  allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78)
[   32.889874] 
[   32.889905] The buggy address belongs to the physical page:
[   32.889943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.890002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.890061] page_type: f5(slab)
[   32.890102] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.890154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.890213] page dumped because: kasan: bad access detected
[   32.890260] 
[   32.890291] Memory state around the buggy address:
[   32.890339]  fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.890385]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.890429] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.890477]                                                                 ^
[   32.890530]  fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.890571]  fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.890612] ==================================================================
[   32.891630] ==================================================================
[   32.891693] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   32.892007] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316
[   32.892099] 
[   32.892131] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.892384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.892757] Hardware name: linux,dummy-virt (DT)
[   32.892881] Call trace:
[   32.892947]  show_stack+0x20/0x38 (C)
[   32.893092]  dump_stack_lvl+0x8c/0xd0
[   32.893241]  print_report+0x118/0x5d0
[   32.893401]  kasan_report+0xdc/0x128
[   32.893554]  kasan_check_range+0x100/0x1a8
[   32.893726]  __kasan_check_write+0x20/0x30
[   32.893947]  copy_user_test_oob+0x434/0xec8
[   32.894400]  kunit_try_run_case+0x170/0x3f0
[   32.894545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.894707]  kthread+0x328/0x630
[   32.894827]  ret_from_fork+0x10/0x20
[   32.894945] 
[   32.895226] Allocated by task 316:
[   32.895375]  kasan_save_stack+0x3c/0x68
[   32.895478]  kasan_save_track+0x20/0x40
[   32.895737]  kasan_save_alloc_info+0x40/0x58
[   32.895840]  __kasan_kmalloc+0xd4/0xd8
[   32.895902]  __kmalloc_noprof+0x198/0x4c8
[   32.896107]  kunit_kmalloc_array+0x34/0x88
[   32.896442]  copy_user_test_oob+0xac/0xec8
[   32.896617]  kunit_try_run_case+0x170/0x3f0
[   32.896688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.896750]  kthread+0x328/0x630
[   32.896878]  ret_from_fork+0x10/0x20
[   32.897366] 
[   32.897427] The buggy address belongs to the object at fff00000c85fcf00
[   32.897427]  which belongs to the cache kmalloc-128 of size 128
[   32.897502] The buggy address is located 0 bytes inside of
[   32.897502]  allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78)
[   32.897855] 
[   32.897905] The buggy address belongs to the physical page:
[   32.898091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.898149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.898483] page_type: f5(slab)
[   32.898830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.898912] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.898986] page dumped because: kasan: bad access detected
[   32.899166] 
[   32.899235] Memory state around the buggy address:
[   32.899296]  fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.899688]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.899997] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.900119]                                                                 ^
[   32.900193]  fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.900295]  fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.900872] ==================================================================
[   32.858280] ==================================================================
[   32.858552] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   32.858922] Read of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316
[   32.859001] 
[   32.859038] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.859464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.859618] Hardware name: linux,dummy-virt (DT)
[   32.859821] Call trace:
[   32.859869]  show_stack+0x20/0x38 (C)
[   32.859924]  dump_stack_lvl+0x8c/0xd0
[   32.859975]  print_report+0x118/0x5d0
[   32.860020]  kasan_report+0xdc/0x128
[   32.860076]  kasan_check_range+0x100/0x1a8
[   32.860122]  __kasan_check_read+0x20/0x30
[   32.860176]  copy_user_test_oob+0x728/0xec8
[   32.860226]  kunit_try_run_case+0x170/0x3f0
[   32.860276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.860326]  kthread+0x328/0x630
[   32.860689]  ret_from_fork+0x10/0x20
[   32.861070] 
[   32.861147] Allocated by task 316:
[   32.861213]  kasan_save_stack+0x3c/0x68
[   32.861261]  kasan_save_track+0x20/0x40
[   32.861325]  kasan_save_alloc_info+0x40/0x58
[   32.861538]  __kasan_kmalloc+0xd4/0xd8
[   32.861697]  __kmalloc_noprof+0x198/0x4c8
[   32.862118]  kunit_kmalloc_array+0x34/0x88
[   32.862299]  copy_user_test_oob+0xac/0xec8
[   32.862488]  kunit_try_run_case+0x170/0x3f0
[   32.862568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.862726]  kthread+0x328/0x630
[   32.862893]  ret_from_fork+0x10/0x20
[   32.863022] 
[   32.863055] The buggy address belongs to the object at fff00000c85fcf00
[   32.863055]  which belongs to the cache kmalloc-128 of size 128
[   32.863387] The buggy address is located 0 bytes inside of
[   32.863387]  allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78)
[   32.863498] 
[   32.863625] The buggy address belongs to the physical page:
[   32.863665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.864027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.864512] page_type: f5(slab)
[   32.864626] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.864681] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.865076] page dumped because: kasan: bad access detected
[   32.865190] 
[   32.865446] Memory state around the buggy address:
[   32.865552]  fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.866113]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.866180] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.866353]                                                                 ^
[   32.866400]  fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.867006]  fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.867072] ==================================================================
[   32.842358] ==================================================================
[   32.842486] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   32.842586] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316
[   32.842640] 
[   32.842689] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.842784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.842823] Hardware name: linux,dummy-virt (DT)
[   32.842859] Call trace:
[   32.842917]  show_stack+0x20/0x38 (C)
[   32.842990]  dump_stack_lvl+0x8c/0xd0
[   32.843045]  print_report+0x118/0x5d0
[   32.843937]  kasan_report+0xdc/0x128
[   32.844177]  kasan_check_range+0x100/0x1a8
[   32.844438]  __kasan_check_write+0x20/0x30
[   32.844607]  copy_user_test_oob+0x234/0xec8
[   32.844774]  kunit_try_run_case+0x170/0x3f0
[   32.844862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.844939]  kthread+0x328/0x630
[   32.845301]  ret_from_fork+0x10/0x20
[   32.845700] 
[   32.845803] Allocated by task 316:
[   32.845850]  kasan_save_stack+0x3c/0x68
[   32.845988]  kasan_save_track+0x20/0x40
[   32.846033]  kasan_save_alloc_info+0x40/0x58
[   32.846366]  __kasan_kmalloc+0xd4/0xd8
[   32.846453]  __kmalloc_noprof+0x198/0x4c8
[   32.846569]  kunit_kmalloc_array+0x34/0x88
[   32.846762]  copy_user_test_oob+0xac/0xec8
[   32.846892]  kunit_try_run_case+0x170/0x3f0
[   32.847025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.847092]  kthread+0x328/0x630
[   32.847562]  ret_from_fork+0x10/0x20
[   32.847638] 
[   32.847737] The buggy address belongs to the object at fff00000c85fcf00
[   32.847737]  which belongs to the cache kmalloc-128 of size 128
[   32.847843] The buggy address is located 0 bytes inside of
[   32.847843]  allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78)
[   32.847916] 
[   32.848245] The buggy address belongs to the physical page:
[   32.848349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.848417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.848474] page_type: f5(slab)
[   32.848739] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.848964] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.849100] page dumped because: kasan: bad access detected
[   32.849244] 
[   32.849325] Memory state around the buggy address:
[   32.849492]  fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.849553]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.849879] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.849963]                                                                 ^
[   32.850189]  fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.850459]  fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.850686] ==================================================================
[   32.902888] ==================================================================
[   32.903033] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   32.903131] Read of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316
[   32.903284] 
[   32.903318] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.903412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.903439] Hardware name: linux,dummy-virt (DT)
[   32.903749] Call trace:
[   32.904043]  show_stack+0x20/0x38 (C)
[   32.904150]  dump_stack_lvl+0x8c/0xd0
[   32.904378]  print_report+0x118/0x5d0
[   32.904561]  kasan_report+0xdc/0x128
[   32.904623]  kasan_check_range+0x100/0x1a8
[   32.904671]  __kasan_check_read+0x20/0x30
[   32.904719]  copy_user_test_oob+0x4a0/0xec8
[   32.904768]  kunit_try_run_case+0x170/0x3f0
[   32.904952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.905143]  kthread+0x328/0x630
[   32.905359]  ret_from_fork+0x10/0x20
[   32.905727] 
[   32.905777] Allocated by task 316:
[   32.905889]  kasan_save_stack+0x3c/0x68
[   32.905999]  kasan_save_track+0x20/0x40
[   32.906141]  kasan_save_alloc_info+0x40/0x58
[   32.906241]  __kasan_kmalloc+0xd4/0xd8
[   32.906412]  __kmalloc_noprof+0x198/0x4c8
[   32.906458]  kunit_kmalloc_array+0x34/0x88
[   32.906834]  copy_user_test_oob+0xac/0xec8
[   32.907109]  kunit_try_run_case+0x170/0x3f0
[   32.907705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.907808]  kthread+0x328/0x630
[   32.907873]  ret_from_fork+0x10/0x20
[   32.908059] 
[   32.908085] The buggy address belongs to the object at fff00000c85fcf00
[   32.908085]  which belongs to the cache kmalloc-128 of size 128
[   32.908482] The buggy address is located 0 bytes inside of
[   32.908482]  allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78)
[   32.908581] 
[   32.908905] The buggy address belongs to the physical page:
[   32.908965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.909022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.909083] page_type: f5(slab)
[   32.909124] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.909616] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.909780] page dumped because: kasan: bad access detected
[   32.909821] 
[   32.909843] Memory state around the buggy address:
[   32.910124]  fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.910215]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.910398] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.910467]                                                                 ^
[   32.910509]  fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.910554]  fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.910595] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   32.791457] ==================================================================
[   32.791584] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   32.791656] Read of size 8 at addr fff00000c85fce78 by task kunit_try_catch/312
[   32.791708] 
[   32.791942] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.792228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.792317] Hardware name: linux,dummy-virt (DT)
[   32.792401] Call trace:
[   32.792504]  show_stack+0x20/0x38 (C)
[   32.792585]  dump_stack_lvl+0x8c/0xd0
[   32.792899]  print_report+0x118/0x5d0
[   32.793007]  kasan_report+0xdc/0x128
[   32.793460]  __asan_report_load8_noabort+0x20/0x30
[   32.793594]  copy_to_kernel_nofault+0x204/0x250
[   32.794000]  copy_to_kernel_nofault_oob+0x158/0x418
[   32.794108]  kunit_try_run_case+0x170/0x3f0
[   32.794246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.794389]  kthread+0x328/0x630
[   32.794498]  ret_from_fork+0x10/0x20
[   32.794566] 
[   32.794587] Allocated by task 312:
[   32.794890]  kasan_save_stack+0x3c/0x68
[   32.794958]  kasan_save_track+0x20/0x40
[   32.795085]  kasan_save_alloc_info+0x40/0x58
[   32.795184]  __kasan_kmalloc+0xd4/0xd8
[   32.795380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.795462]  copy_to_kernel_nofault_oob+0xc8/0x418
[   32.795660]  kunit_try_run_case+0x170/0x3f0
[   32.795965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.796038]  kthread+0x328/0x630
[   32.796813]  ret_from_fork+0x10/0x20
[   32.796945] 
[   32.797021] The buggy address belongs to the object at fff00000c85fce00
[   32.797021]  which belongs to the cache kmalloc-128 of size 128
[   32.797219] The buggy address is located 0 bytes to the right of
[   32.797219]  allocated 120-byte region [fff00000c85fce00, fff00000c85fce78)
[   32.797310] 
[   32.797334] The buggy address belongs to the physical page:
[   32.797394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.797750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.797973] page_type: f5(slab)
[   32.798154] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.798259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.798375] page dumped because: kasan: bad access detected
[   32.798658] 
[   32.798774] Memory state around the buggy address:
[   32.798916]  fff00000c85fcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.799077]  fff00000c85fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.799183] >fff00000c85fce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.799307]                                                                 ^
[   32.799378]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.799475]  fff00000c85fcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.799904] ==================================================================
[   32.801680] ==================================================================
[   32.802385] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   32.802474] Write of size 8 at addr fff00000c85fce78 by task kunit_try_catch/312
[   32.802531] 
[   32.802567] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.802770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.802837] Hardware name: linux,dummy-virt (DT)
[   32.802881] Call trace:
[   32.803000]  show_stack+0x20/0x38 (C)
[   32.803393]  dump_stack_lvl+0x8c/0xd0
[   32.803475]  print_report+0x118/0x5d0
[   32.803522]  kasan_report+0xdc/0x128
[   32.803752]  kasan_check_range+0x100/0x1a8
[   32.803810]  __kasan_check_write+0x20/0x30
[   32.803858]  copy_to_kernel_nofault+0x8c/0x250
[   32.804110]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   32.804416]  kunit_try_run_case+0x170/0x3f0
[   32.804565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.804749]  kthread+0x328/0x630
[   32.804886]  ret_from_fork+0x10/0x20
[   32.805093] 
[   32.805161] Allocated by task 312:
[   32.805262]  kasan_save_stack+0x3c/0x68
[   32.805311]  kasan_save_track+0x20/0x40
[   32.805373]  kasan_save_alloc_info+0x40/0x58
[   32.805544]  __kasan_kmalloc+0xd4/0xd8
[   32.805766]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.805952]  copy_to_kernel_nofault_oob+0xc8/0x418
[   32.806013]  kunit_try_run_case+0x170/0x3f0
[   32.806473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.806568]  kthread+0x328/0x630
[   32.806664]  ret_from_fork+0x10/0x20
[   32.806734] 
[   32.806998] The buggy address belongs to the object at fff00000c85fce00
[   32.806998]  which belongs to the cache kmalloc-128 of size 128
[   32.807131] The buggy address is located 0 bytes to the right of
[   32.807131]  allocated 120-byte region [fff00000c85fce00, fff00000c85fce78)
[   32.807434] 
[   32.807568] The buggy address belongs to the physical page:
[   32.807646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.807814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.807894] page_type: f5(slab)
[   32.807945] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.808008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.808063] page dumped because: kasan: bad access detected
[   32.808097] 
[   32.808130] Memory state around the buggy address:
[   32.808191]  fff00000c85fcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.808239]  fff00000c85fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.808654] >fff00000c85fce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.808743]                                                                 ^
[   32.809260]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.809325]  fff00000c85fcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.809534] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   32.731467] ==================================================================
[   32.732147] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   32.732751] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300
[   32.733133] 
[   32.733257] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.733641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.733753] Hardware name: linux,dummy-virt (DT)
[   32.733838] Call trace:
[   32.733864]  show_stack+0x20/0x38 (C)
[   32.734247]  dump_stack_lvl+0x8c/0xd0
[   32.734360]  print_report+0x310/0x5d0
[   32.734428]  kasan_report+0xdc/0x128
[   32.734753]  __asan_report_load1_noabort+0x20/0x30
[   32.734928]  vmalloc_oob+0x578/0x5d0
[   32.735109]  kunit_try_run_case+0x170/0x3f0
[   32.735221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.735548]  kthread+0x328/0x630
[   32.735860]  ret_from_fork+0x10/0x20
[   32.736032] 
[   32.736072] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   32.736227] The buggy address belongs to the physical page:
[   32.736394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a89
[   32.736735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.736852] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.736933] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.737424] page dumped because: kasan: bad access detected
[   32.737467] 
[   32.737596] Memory state around the buggy address:
[   32.737791]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.738168]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.738308] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   32.738352]                                                              ^
[   32.738416]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.738752]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.739065] ==================================================================
[   32.741815] ==================================================================
[   32.741873] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   32.741934] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300
[   32.741986] 
[   32.742064] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.742154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.742181] Hardware name: linux,dummy-virt (DT)
[   32.742224] Call trace:
[   32.742250]  show_stack+0x20/0x38 (C)
[   32.742304]  dump_stack_lvl+0x8c/0xd0
[   32.742353]  print_report+0x310/0x5d0
[   32.742396]  kasan_report+0xdc/0x128
[   32.742441]  __asan_report_load1_noabort+0x20/0x30
[   32.742489]  vmalloc_oob+0x51c/0x5d0
[   32.742535]  kunit_try_run_case+0x170/0x3f0
[   32.742593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.742647]  kthread+0x328/0x630
[   32.742689]  ret_from_fork+0x10/0x20
[   32.742736] 
[   32.742760] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   32.742804] The buggy address belongs to the physical page:
[   32.742848] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a89
[   32.742907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.742968] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.743019] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.743070] page dumped because: kasan: bad access detected
[   32.743103] 
[   32.743131] Memory state around the buggy address:
[   32.743165]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.743210]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.743260] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   32.743301]                                                                 ^
[   32.743343]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.743387]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.743426] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   32.567374] ==================================================================
[   32.567433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   32.567485] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.567556] 
[   32.567591] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.567676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.567705] Hardware name: linux,dummy-virt (DT)
[   32.567742] Call trace:
[   32.567769]  show_stack+0x20/0x38 (C)
[   32.567816]  dump_stack_lvl+0x8c/0xd0
[   32.567863]  print_report+0x118/0x5d0
[   32.567912]  kasan_report+0xdc/0x128
[   32.567957]  kasan_check_range+0x100/0x1a8
[   32.568020]  __kasan_check_write+0x20/0x30
[   32.568083]  kasan_atomics_helper+0x1128/0x4858
[   32.568137]  kasan_atomics+0x198/0x2e0
[   32.568447]  kunit_try_run_case+0x170/0x3f0
[   32.568873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.568928]  kthread+0x328/0x630
[   32.568973]  ret_from_fork+0x10/0x20
[   32.569388] 
[   32.569443] Allocated by task 296:
[   32.570069]  kasan_save_stack+0x3c/0x68
[   32.570342]  kasan_save_track+0x20/0x40
[   32.570426]  kasan_save_alloc_info+0x40/0x58
[   32.570598]  __kasan_kmalloc+0xd4/0xd8
[   32.570765]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.571070]  kasan_atomics+0xb8/0x2e0
[   32.571414]  kunit_try_run_case+0x170/0x3f0
[   32.571580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.571631]  kthread+0x328/0x630
[   32.571813]  ret_from_fork+0x10/0x20
[   32.572027] 
[   32.572100] The buggy address belongs to the object at fff00000c85f0e00
[   32.572100]  which belongs to the cache kmalloc-64 of size 64
[   32.572277] The buggy address is located 0 bytes to the right of
[   32.572277]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.572558] 
[   32.572588] The buggy address belongs to the physical page:
[   32.572794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.572918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.572997] page_type: f5(slab)
[   32.573318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.573430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.573550] page dumped because: kasan: bad access detected
[   32.573628] 
[   32.573912] Memory state around the buggy address:
[   32.574043]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.574145]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.574390] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.574562]                                      ^
[   32.574711]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.574789]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.574917] ==================================================================
[   32.684792] ==================================================================
[   32.684845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   32.684895] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.684946] 
[   32.684976] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.685075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.685104] Hardware name: linux,dummy-virt (DT)
[   32.685134] Call trace:
[   32.685159]  show_stack+0x20/0x38 (C)
[   32.685207]  dump_stack_lvl+0x8c/0xd0
[   32.685254]  print_report+0x118/0x5d0
[   32.685298]  kasan_report+0xdc/0x128
[   32.685343]  __asan_report_load8_noabort+0x20/0x30
[   32.685395]  kasan_atomics_helper+0x3df4/0x4858
[   32.685445]  kasan_atomics+0x198/0x2e0
[   32.685493]  kunit_try_run_case+0x170/0x3f0
[   32.685542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.685598]  kthread+0x328/0x630
[   32.685641]  ret_from_fork+0x10/0x20
[   32.685691] 
[   32.685712] Allocated by task 296:
[   32.685741]  kasan_save_stack+0x3c/0x68
[   32.685784]  kasan_save_track+0x20/0x40
[   32.685823]  kasan_save_alloc_info+0x40/0x58
[   32.685862]  __kasan_kmalloc+0xd4/0xd8
[   32.685901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.686005]  kasan_atomics+0xb8/0x2e0
[   32.686240]  kunit_try_run_case+0x170/0x3f0
[   32.686282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.686325]  kthread+0x328/0x630
[   32.686361]  ret_from_fork+0x10/0x20
[   32.686447] 
[   32.686505] The buggy address belongs to the object at fff00000c85f0e00
[   32.686505]  which belongs to the cache kmalloc-64 of size 64
[   32.686746] The buggy address is located 0 bytes to the right of
[   32.686746]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.686812] 
[   32.687010] The buggy address belongs to the physical page:
[   32.687066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.687400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.687463] page_type: f5(slab)
[   32.687503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.687555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.687595] page dumped because: kasan: bad access detected
[   32.687629] 
[   32.687932] Memory state around the buggy address:
[   32.688057]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.688199]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.688364] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.688469]                                      ^
[   32.688835]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.688884]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.688925] ==================================================================
[   32.697493] ==================================================================
[   32.697615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   32.697687] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.697740] 
[   32.697789] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.697873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.697900] Hardware name: linux,dummy-virt (DT)
[   32.697933] Call trace:
[   32.697955]  show_stack+0x20/0x38 (C)
[   32.698023]  dump_stack_lvl+0x8c/0xd0
[   32.698081]  print_report+0x118/0x5d0
[   32.698239]  kasan_report+0xdc/0x128
[   32.698493]  __asan_report_load8_noabort+0x20/0x30
[   32.698566]  kasan_atomics_helper+0x3e10/0x4858
[   32.698928]  kasan_atomics+0x198/0x2e0
[   32.699003]  kunit_try_run_case+0x170/0x3f0
[   32.699068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.699120]  kthread+0x328/0x630
[   32.699197]  ret_from_fork+0x10/0x20
[   32.699293] 
[   32.699322] Allocated by task 296:
[   32.699353]  kasan_save_stack+0x3c/0x68
[   32.699433]  kasan_save_track+0x20/0x40
[   32.699511]  kasan_save_alloc_info+0x40/0x58
[   32.699552]  __kasan_kmalloc+0xd4/0xd8
[   32.699590]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.699658]  kasan_atomics+0xb8/0x2e0
[   32.699698]  kunit_try_run_case+0x170/0x3f0
[   32.699738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.699781]  kthread+0x328/0x630
[   32.699902]  ret_from_fork+0x10/0x20
[   32.700034] 
[   32.700088] The buggy address belongs to the object at fff00000c85f0e00
[   32.700088]  which belongs to the cache kmalloc-64 of size 64
[   32.700151] The buggy address is located 0 bytes to the right of
[   32.700151]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.700246] 
[   32.700434] The buggy address belongs to the physical page:
[   32.700521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.700669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.700741] page_type: f5(slab)
[   32.700781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.700855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.700928] page dumped because: kasan: bad access detected
[   32.700962] 
[   32.700983] Memory state around the buggy address:
[   32.701016]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.701170]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.701232] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.701273]                                      ^
[   32.701308]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.701363]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.701404] ==================================================================
[   32.354357] ==================================================================
[   32.354405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   32.354453] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.354504] 
[   32.354535] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.354618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.354648] Hardware name: linux,dummy-virt (DT)
[   32.354680] Call trace:
[   32.354704]  show_stack+0x20/0x38 (C)
[   32.354775]  dump_stack_lvl+0x8c/0xd0
[   32.354823]  print_report+0x118/0x5d0
[   32.354867]  kasan_report+0xdc/0x128
[   32.354918]  __asan_report_load4_noabort+0x20/0x30
[   32.354968]  kasan_atomics_helper+0x42d8/0x4858
[   32.355020]  kasan_atomics+0x198/0x2e0
[   32.355684]  kunit_try_run_case+0x170/0x3f0
[   32.355782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.356544]  kthread+0x328/0x630
[   32.356639]  ret_from_fork+0x10/0x20
[   32.356721] 
[   32.356742] Allocated by task 296:
[   32.356796]  kasan_save_stack+0x3c/0x68
[   32.357275]  __kasan_kmalloc+0xd4/0xd8
[   32.358627] 
[   32.358926] 
[   32.359151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.359280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.359341] page_type: f5(slab)
[   32.359871] page dumped because: kasan: bad access detected
[   32.360645]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.364657]  kasan_atomics+0x198/0x2e0
[   32.365592] Allocated by task 296:
[   32.365736]  kasan_save_stack+0x3c/0x68
[   32.365968]  kasan_save_track+0x20/0x40
[   32.366139]  kasan_save_alloc_info+0x40/0x58
[   32.366211]  __kasan_kmalloc+0xd4/0xd8
[   32.366540]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.366617]  kasan_atomics+0xb8/0x2e0
[   32.366784]  kunit_try_run_case+0x170/0x3f0
[   32.366856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.367043]  kthread+0x328/0x630
[   32.367241]  ret_from_fork+0x10/0x20
[   32.367300] 
[   32.367324] The buggy address belongs to the object at fff00000c85f0e00
[   32.367324]  which belongs to the cache kmalloc-64 of size 64
[   32.367650] The buggy address is located 0 bytes to the right of
[   32.367650]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.368072] 
[   32.368126] The buggy address belongs to the physical page:
[   32.368281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.368547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.368814] page_type: f5(slab)
[   32.369007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.369129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.369218] page dumped because: kasan: bad access detected
[   32.369252] 
[   32.369491] Memory state around the buggy address:
[   32.369652]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.370077]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.370163] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.370307]                                      ^
[   32.370364]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.370525]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.370649] ==================================================================
[   32.635883] ==================================================================
[   32.635985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   32.636199] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.636497] 
[   32.636875] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.637127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.637195] Hardware name: linux,dummy-virt (DT)
[   32.637352] Call trace:
[   32.637379]  show_stack+0x20/0x38 (C)
[   32.637434]  dump_stack_lvl+0x8c/0xd0
[   32.638072]  print_report+0x118/0x5d0
[   32.638144]  kasan_report+0xdc/0x128
[   32.638324]  kasan_check_range+0x100/0x1a8
[   32.638613]  __kasan_check_write+0x20/0x30
[   32.638772]  kasan_atomics_helper+0x147c/0x4858
[   32.638961]  kasan_atomics+0x198/0x2e0
[   32.639153]  kunit_try_run_case+0x170/0x3f0
[   32.639250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.639341]  kthread+0x328/0x630
[   32.639564]  ret_from_fork+0x10/0x20
[   32.639821] 
[   32.639887] Allocated by task 296:
[   32.640200]  kasan_save_stack+0x3c/0x68
[   32.640661]  kasan_save_track+0x20/0x40
[   32.640781]  kasan_save_alloc_info+0x40/0x58
[   32.641175]  __kasan_kmalloc+0xd4/0xd8
[   32.641250]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.641459]  kasan_atomics+0xb8/0x2e0
[   32.641705]  kunit_try_run_case+0x170/0x3f0
[   32.641809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.642145]  kthread+0x328/0x630
[   32.642546]  ret_from_fork+0x10/0x20
[   32.642792] 
[   32.642838] The buggy address belongs to the object at fff00000c85f0e00
[   32.642838]  which belongs to the cache kmalloc-64 of size 64
[   32.642917] The buggy address is located 0 bytes to the right of
[   32.642917]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.643204] 
[   32.643239] The buggy address belongs to the physical page:
[   32.643398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.643807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.644315] page_type: f5(slab)
[   32.644381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.644795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.644865] page dumped because: kasan: bad access detected
[   32.645024] 
[   32.645144] Memory state around the buggy address:
[   32.645213]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.645620]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.645718] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.645827]                                      ^
[   32.646095]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.646236]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.646484] ==================================================================
[   32.520044] ==================================================================
[   32.520114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   32.520278] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.520430] 
[   32.520498] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.520597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.520895] Hardware name: linux,dummy-virt (DT)
[   32.520948] Call trace:
[   32.521026]  show_stack+0x20/0x38 (C)
[   32.521380]  dump_stack_lvl+0x8c/0xd0
[   32.521506]  print_report+0x118/0x5d0
[   32.521620]  kasan_report+0xdc/0x128
[   32.521665]  kasan_check_range+0x100/0x1a8
[   32.521986]  __kasan_check_write+0x20/0x30
[   32.522392]  kasan_atomics_helper+0xf20/0x4858
[   32.522516]  kasan_atomics+0x198/0x2e0
[   32.522693]  kunit_try_run_case+0x170/0x3f0
[   32.522871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.523363]  kthread+0x328/0x630
[   32.523502]  ret_from_fork+0x10/0x20
[   32.523615] 
[   32.523675] Allocated by task 296:
[   32.523704]  kasan_save_stack+0x3c/0x68
[   32.524122]  kasan_save_track+0x20/0x40
[   32.524259]  kasan_save_alloc_info+0x40/0x58
[   32.524439]  __kasan_kmalloc+0xd4/0xd8
[   32.524618]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.524675]  kasan_atomics+0xb8/0x2e0
[   32.524860]  kunit_try_run_case+0x170/0x3f0
[   32.524984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.525124]  kthread+0x328/0x630
[   32.525436]  ret_from_fork+0x10/0x20
[   32.525580] 
[   32.525627] The buggy address belongs to the object at fff00000c85f0e00
[   32.525627]  which belongs to the cache kmalloc-64 of size 64
[   32.525844] The buggy address is located 0 bytes to the right of
[   32.525844]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.526102] 
[   32.526147] The buggy address belongs to the physical page:
[   32.526295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.526511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.526634] page_type: f5(slab)
[   32.526967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.527233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.527468] page dumped because: kasan: bad access detected
[   32.527597] 
[   32.527693] Memory state around the buggy address:
[   32.527775]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.527934]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.527981] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.528234]                                      ^
[   32.528407]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.528619]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.528817] ==================================================================
[   32.549677] ==================================================================
[   32.549749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   32.549874] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.549936] 
[   32.550160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.550270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.550352] Hardware name: linux,dummy-virt (DT)
[   32.550390] Call trace:
[   32.550440]  show_stack+0x20/0x38 (C)
[   32.550492]  dump_stack_lvl+0x8c/0xd0
[   32.550551]  print_report+0x118/0x5d0
[   32.550597]  kasan_report+0xdc/0x128
[   32.550640]  kasan_check_range+0x100/0x1a8
[   32.550688]  __kasan_check_write+0x20/0x30
[   32.551185]  kasan_atomics_helper+0x1058/0x4858
[   32.551265]  kasan_atomics+0x198/0x2e0
[   32.551543]  kunit_try_run_case+0x170/0x3f0
[   32.551694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.551757]  kthread+0x328/0x630
[   32.551802]  ret_from_fork+0x10/0x20
[   32.551852] 
[   32.551872] Allocated by task 296:
[   32.552383]  kasan_save_stack+0x3c/0x68
[   32.552528]  kasan_save_track+0x20/0x40
[   32.552626]  kasan_save_alloc_info+0x40/0x58
[   32.552704]  __kasan_kmalloc+0xd4/0xd8
[   32.552857]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.552914]  kasan_atomics+0xb8/0x2e0
[   32.552961]  kunit_try_run_case+0x170/0x3f0
[   32.553003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.553311]  kthread+0x328/0x630
[   32.553444]  ret_from_fork+0x10/0x20
[   32.553497] 
[   32.553540] The buggy address belongs to the object at fff00000c85f0e00
[   32.553540]  which belongs to the cache kmalloc-64 of size 64
[   32.553605] The buggy address is located 0 bytes to the right of
[   32.553605]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.553672] 
[   32.553703] The buggy address belongs to the physical page:
[   32.553737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.553804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.553854] page_type: f5(slab)
[   32.553908] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.553961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.554012] page dumped because: kasan: bad access detected
[   32.554045] 
[   32.554092] Memory state around the buggy address:
[   32.554126]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.554170]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.554214] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.554255]                                      ^
[   32.554299]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.554353]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.554394] ==================================================================
[   32.648157] ==================================================================
[   32.648716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   32.649002] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.649221] 
[   32.649291] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.649386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.649506] Hardware name: linux,dummy-virt (DT)
[   32.649578] Call trace:
[   32.649637]  show_stack+0x20/0x38 (C)
[   32.649692]  dump_stack_lvl+0x8c/0xd0
[   32.649747]  print_report+0x118/0x5d0
[   32.649793]  kasan_report+0xdc/0x128
[   32.649837]  kasan_check_range+0x100/0x1a8
[   32.649883]  __kasan_check_write+0x20/0x30
[   32.649938]  kasan_atomics_helper+0x14e4/0x4858
[   32.649989]  kasan_atomics+0x198/0x2e0
[   32.650037]  kunit_try_run_case+0x170/0x3f0
[   32.650097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.650148]  kthread+0x328/0x630
[   32.650191]  ret_from_fork+0x10/0x20
[   32.650258] 
[   32.650282] Allocated by task 296:
[   32.650328]  kasan_save_stack+0x3c/0x68
[   32.650372]  kasan_save_track+0x20/0x40
[   32.650413]  kasan_save_alloc_info+0x40/0x58
[   32.650453]  __kasan_kmalloc+0xd4/0xd8
[   32.650503]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.650546]  kasan_atomics+0xb8/0x2e0
[   32.650585]  kunit_try_run_case+0x170/0x3f0
[   32.650626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.650680]  kthread+0x328/0x630
[   32.650724]  ret_from_fork+0x10/0x20
[   32.650777] 
[   32.650798] The buggy address belongs to the object at fff00000c85f0e00
[   32.650798]  which belongs to the cache kmalloc-64 of size 64
[   32.650866] The buggy address is located 0 bytes to the right of
[   32.650866]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.650932] 
[   32.650954] The buggy address belongs to the physical page:
[   32.650987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.651054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.651550] page_type: f5(slab)
[   32.652045] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.652131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.652225] page dumped because: kasan: bad access detected
[   32.652278] 
[   32.652333] Memory state around the buggy address:
[   32.652773]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.653078]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.653131] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.653169]                                      ^
[   32.653206]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.653600]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.654122] ==================================================================
[   32.712615] ==================================================================
[   32.712664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   32.712716] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.712787] 
[   32.712821] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.713061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.713126] Hardware name: linux,dummy-virt (DT)
[   32.713161] Call trace:
[   32.713211]  show_stack+0x20/0x38 (C)
[   32.713270]  dump_stack_lvl+0x8c/0xd0
[   32.713471]  print_report+0x118/0x5d0
[   32.713578]  kasan_report+0xdc/0x128
[   32.713663]  kasan_check_range+0x100/0x1a8
[   32.713728]  __kasan_check_write+0x20/0x30
[   32.713814]  kasan_atomics_helper+0x17ec/0x4858
[   32.713895]  kasan_atomics+0x198/0x2e0
[   32.713942]  kunit_try_run_case+0x170/0x3f0
[   32.714010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.714073]  kthread+0x328/0x630
[   32.714153]  ret_from_fork+0x10/0x20
[   32.714230] 
[   32.714258] Allocated by task 296:
[   32.714290]  kasan_save_stack+0x3c/0x68
[   32.714334]  kasan_save_track+0x20/0x40
[   32.714375]  kasan_save_alloc_info+0x40/0x58
[   32.714645]  __kasan_kmalloc+0xd4/0xd8
[   32.714715]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.714761]  kasan_atomics+0xb8/0x2e0
[   32.714798]  kunit_try_run_case+0x170/0x3f0
[   32.714851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.714895]  kthread+0x328/0x630
[   32.714936]  ret_from_fork+0x10/0x20
[   32.714976] 
[   32.714998] The buggy address belongs to the object at fff00000c85f0e00
[   32.714998]  which belongs to the cache kmalloc-64 of size 64
[   32.715076] The buggy address is located 0 bytes to the right of
[   32.715076]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.715142] 
[   32.715164] The buggy address belongs to the physical page:
[   32.715196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.715247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.715306] page_type: f5(slab)
[   32.715346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.715396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.715445] page dumped because: kasan: bad access detected
[   32.715484] 
[   32.715504] Memory state around the buggy address:
[   32.715548]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.715592]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.715636] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.715676]                                      ^
[   32.715708]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.715751]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.715799] ==================================================================
[   32.488152] ==================================================================
[   32.488370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   32.488553] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.488611] 
[   32.488643] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.489320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.489358] Hardware name: linux,dummy-virt (DT)
[   32.489406] Call trace:
[   32.489453]  show_stack+0x20/0x38 (C)
[   32.489882]  dump_stack_lvl+0x8c/0xd0
[   32.490113]  print_report+0x118/0x5d0
[   32.490428]  kasan_report+0xdc/0x128
[   32.490630]  __asan_report_load8_noabort+0x20/0x30
[   32.491011]  kasan_atomics_helper+0x3f58/0x4858
[   32.491141]  kasan_atomics+0x198/0x2e0
[   32.491194]  kunit_try_run_case+0x170/0x3f0
[   32.491405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.491740]  kthread+0x328/0x630
[   32.491937]  ret_from_fork+0x10/0x20
[   32.492017] 
[   32.492038] Allocated by task 296:
[   32.492192]  kasan_save_stack+0x3c/0x68
[   32.492481]  kasan_save_track+0x20/0x40
[   32.492659]  kasan_save_alloc_info+0x40/0x58
[   32.492867]  __kasan_kmalloc+0xd4/0xd8
[   32.492951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.492995]  kasan_atomics+0xb8/0x2e0
[   32.493042]  kunit_try_run_case+0x170/0x3f0
[   32.493095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.493489]  kthread+0x328/0x630
[   32.493571]  ret_from_fork+0x10/0x20
[   32.493642] 
[   32.493780] The buggy address belongs to the object at fff00000c85f0e00
[   32.493780]  which belongs to the cache kmalloc-64 of size 64
[   32.494012] The buggy address is located 0 bytes to the right of
[   32.494012]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.494161] 
[   32.494222] The buggy address belongs to the physical page:
[   32.494494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.494705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.494781] page_type: f5(slab)
[   32.494865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.494951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.495022] page dumped because: kasan: bad access detected
[   32.495065] 
[   32.495086] Memory state around the buggy address:
[   32.495268]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.495575]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.495786] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.495874]                                      ^
[   32.496012]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.496107]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.496228] ==================================================================
[   32.619946] ==================================================================
[   32.619998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   32.620139] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.620387] 
[   32.620421] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.620507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.620536] Hardware name: linux,dummy-virt (DT)
[   32.620569] Call trace:
[   32.620592]  show_stack+0x20/0x38 (C)
[   32.620644]  dump_stack_lvl+0x8c/0xd0
[   32.620693]  print_report+0x118/0x5d0
[   32.620739]  kasan_report+0xdc/0x128
[   32.620784]  __asan_report_load8_noabort+0x20/0x30
[   32.621401]  kasan_atomics_helper+0x3f04/0x4858
[   32.621529]  kasan_atomics+0x198/0x2e0
[   32.621876]  kunit_try_run_case+0x170/0x3f0
[   32.622005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.622383]  kthread+0x328/0x630
[   32.622479]  ret_from_fork+0x10/0x20
[   32.622793] 
[   32.622917] Allocated by task 296:
[   32.623229]  kasan_save_stack+0x3c/0x68
[   32.623323]  kasan_save_track+0x20/0x40
[   32.623385]  kasan_save_alloc_info+0x40/0x58
[   32.623629]  __kasan_kmalloc+0xd4/0xd8
[   32.623857]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.624070]  kasan_atomics+0xb8/0x2e0
[   32.624177]  kunit_try_run_case+0x170/0x3f0
[   32.624292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.624462]  kthread+0x328/0x630
[   32.624667]  ret_from_fork+0x10/0x20
[   32.624993] 
[   32.625068] The buggy address belongs to the object at fff00000c85f0e00
[   32.625068]  which belongs to the cache kmalloc-64 of size 64
[   32.625439] The buggy address is located 0 bytes to the right of
[   32.625439]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.625639] 
[   32.625713] The buggy address belongs to the physical page:
[   32.625847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.625932] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.626311] page_type: f5(slab)
[   32.626491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.626708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.626803] page dumped because: kasan: bad access detected
[   32.627220] 
[   32.627264] Memory state around the buggy address:
[   32.627318]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.627629]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.627750] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.627869]                                      ^
[   32.628068]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.628143]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.628384] ==================================================================
[   32.530539] ==================================================================
[   32.530593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   32.530645] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.530697] 
[   32.530965] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.531212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.531386] Hardware name: linux,dummy-virt (DT)
[   32.531651] Call trace:
[   32.531688]  show_stack+0x20/0x38 (C)
[   32.531741]  dump_stack_lvl+0x8c/0xd0
[   32.531981]  print_report+0x118/0x5d0
[   32.532043]  kasan_report+0xdc/0x128
[   32.532102]  kasan_check_range+0x100/0x1a8
[   32.532300]  __kasan_check_write+0x20/0x30
[   32.532490]  kasan_atomics_helper+0xf88/0x4858
[   32.532923]  kasan_atomics+0x198/0x2e0
[   32.533407]  kunit_try_run_case+0x170/0x3f0
[   32.533693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.533754]  kthread+0x328/0x630
[   32.533799]  ret_from_fork+0x10/0x20
[   32.534241] 
[   32.534286] Allocated by task 296:
[   32.534364]  kasan_save_stack+0x3c/0x68
[   32.534514]  kasan_save_track+0x20/0x40
[   32.534565]  kasan_save_alloc_info+0x40/0x58
[   32.534607]  __kasan_kmalloc+0xd4/0xd8
[   32.534982]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.535180]  kasan_atomics+0xb8/0x2e0
[   32.535334]  kunit_try_run_case+0x170/0x3f0
[   32.535501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.535706]  kthread+0x328/0x630
[   32.535769]  ret_from_fork+0x10/0x20
[   32.536059] 
[   32.536149] The buggy address belongs to the object at fff00000c85f0e00
[   32.536149]  which belongs to the cache kmalloc-64 of size 64
[   32.536361] The buggy address is located 0 bytes to the right of
[   32.536361]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.536443] 
[   32.536466] The buggy address belongs to the physical page:
[   32.536686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.536775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.536976] page_type: f5(slab)
[   32.537150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.537290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.537417] page dumped because: kasan: bad access detected
[   32.537491] 
[   32.537512] Memory state around the buggy address:
[   32.537595]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.537660]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.537711] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.537757]                                      ^
[   32.537796]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.537846]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.537902] ==================================================================
[   32.690464] ==================================================================
[   32.690527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   32.690716] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.690810] 
[   32.690841] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.690927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.690954] Hardware name: linux,dummy-virt (DT)
[   32.691379] Call trace:
[   32.691421]  show_stack+0x20/0x38 (C)
[   32.691482]  dump_stack_lvl+0x8c/0xd0
[   32.691565]  print_report+0x118/0x5d0
[   32.691774]  kasan_report+0xdc/0x128
[   32.692096]  kasan_check_range+0x100/0x1a8
[   32.692158]  __kasan_check_write+0x20/0x30
[   32.692594]  kasan_atomics_helper+0x16d0/0x4858
[   32.692742]  kasan_atomics+0x198/0x2e0
[   32.692995]  kunit_try_run_case+0x170/0x3f0
[   32.693056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.693127]  kthread+0x328/0x630
[   32.693170]  ret_from_fork+0x10/0x20
[   32.693219] 
[   32.693842] Allocated by task 296:
[   32.693977]  kasan_save_stack+0x3c/0x68
[   32.694173]  kasan_save_track+0x20/0x40
[   32.694292]  kasan_save_alloc_info+0x40/0x58
[   32.694402]  __kasan_kmalloc+0xd4/0xd8
[   32.694507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.694550]  kasan_atomics+0xb8/0x2e0
[   32.694590]  kunit_try_run_case+0x170/0x3f0
[   32.694631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.694674]  kthread+0x328/0x630
[   32.694709]  ret_from_fork+0x10/0x20
[   32.694760] 
[   32.694804] The buggy address belongs to the object at fff00000c85f0e00
[   32.694804]  which belongs to the cache kmalloc-64 of size 64
[   32.694864] The buggy address is located 0 bytes to the right of
[   32.694864]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.694936] 
[   32.694959] The buggy address belongs to the physical page:
[   32.695015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.695078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.695132] page_type: f5(slab)
[   32.695283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.695338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.695378] page dumped because: kasan: bad access detected
[   32.695656] 
[   32.695744] Memory state around the buggy address:
[   32.695827]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.696178]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.696235] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.696323]                                      ^
[   32.696653]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.696770]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.696889] ==================================================================
[   32.497536] ==================================================================
[   32.497643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   32.497698] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.497766] 
[   32.498074] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.498178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.498416] Hardware name: linux,dummy-virt (DT)
[   32.498475] Call trace:
[   32.498503]  show_stack+0x20/0x38 (C)
[   32.498686]  dump_stack_lvl+0x8c/0xd0
[   32.498753]  print_report+0x118/0x5d0
[   32.498797]  kasan_report+0xdc/0x128
[   32.499076]  kasan_check_range+0x100/0x1a8
[   32.499138]  __kasan_check_write+0x20/0x30
[   32.499330]  kasan_atomics_helper+0xe44/0x4858
[   32.499575]  kasan_atomics+0x198/0x2e0
[   32.499639]  kunit_try_run_case+0x170/0x3f0
[   32.499693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.499754]  kthread+0x328/0x630
[   32.499828]  ret_from_fork+0x10/0x20
[   32.499883] 
[   32.499923] Allocated by task 296:
[   32.499960]  kasan_save_stack+0x3c/0x68
[   32.500150]  kasan_save_track+0x20/0x40
[   32.500543]  kasan_save_alloc_info+0x40/0x58
[   32.500745]  __kasan_kmalloc+0xd4/0xd8
[   32.500867]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.500911]  kasan_atomics+0xb8/0x2e0
[   32.501250]  kunit_try_run_case+0x170/0x3f0
[   32.501430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.501607]  kthread+0x328/0x630
[   32.501875]  ret_from_fork+0x10/0x20
[   32.501925] 
[   32.502101] The buggy address belongs to the object at fff00000c85f0e00
[   32.502101]  which belongs to the cache kmalloc-64 of size 64
[   32.502313] The buggy address is located 0 bytes to the right of
[   32.502313]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.502628] 
[   32.502679] The buggy address belongs to the physical page:
[   32.502741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.502824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.502874] page_type: f5(slab)
[   32.502923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.502975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.503019] page dumped because: kasan: bad access detected
[   32.503076] 
[   32.503106] Memory state around the buggy address:
[   32.503139]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.503183]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.503227] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.503281]                                      ^
[   32.503314]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.503358]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.503407] ==================================================================
[   32.371942] ==================================================================
[   32.372321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   32.372515] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.372634] 
[   32.372842] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.373033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.373078] Hardware name: linux,dummy-virt (DT)
[   32.373111] Call trace:
[   32.373135]  show_stack+0x20/0x38 (C)
[   32.373186]  dump_stack_lvl+0x8c/0xd0
[   32.373236]  print_report+0x118/0x5d0
[   32.373281]  kasan_report+0xdc/0x128
[   32.373388]  kasan_check_range+0x100/0x1a8
[   32.373459]  __kasan_check_write+0x20/0x30
[   32.373513]  kasan_atomics_helper+0x99c/0x4858
[   32.373563]  kasan_atomics+0x198/0x2e0
[   32.373614]  kunit_try_run_case+0x170/0x3f0
[   32.373672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.373723]  kthread+0x328/0x630
[   32.373775]  ret_from_fork+0x10/0x20
[   32.373836] 
[   32.373857] Allocated by task 296:
[   32.373894]  kasan_save_stack+0x3c/0x68
[   32.373940]  kasan_save_track+0x20/0x40
[   32.373987]  kasan_save_alloc_info+0x40/0x58
[   32.374034]  __kasan_kmalloc+0xd4/0xd8
[   32.374624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.374883]  kasan_atomics+0xb8/0x2e0
[   32.375205]  kunit_try_run_case+0x170/0x3f0
[   32.375258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.375571]  kthread+0x328/0x630
[   32.375700]  ret_from_fork+0x10/0x20
[   32.375799] 
[   32.375928] The buggy address belongs to the object at fff00000c85f0e00
[   32.375928]  which belongs to the cache kmalloc-64 of size 64
[   32.376167] The buggy address is located 0 bytes to the right of
[   32.376167]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.376485] 
[   32.376551] The buggy address belongs to the physical page:
[   32.376608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.376757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.376810] page_type: f5(slab)
[   32.376857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.377194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.377652] page dumped because: kasan: bad access detected
[   32.377756] 
[   32.377817] Memory state around the buggy address:
[   32.378032]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.378300]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.378395] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.378517]                                      ^
[   32.378575]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.378630]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.378759] ==================================================================
[   32.504134] ==================================================================
[   32.504185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   32.504236] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.504626] 
[   32.504707] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.505174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.505245] Hardware name: linux,dummy-virt (DT)
[   32.505380] Call trace:
[   32.505436]  show_stack+0x20/0x38 (C)
[   32.505649]  dump_stack_lvl+0x8c/0xd0
[   32.506036]  print_report+0x118/0x5d0
[   32.506146]  kasan_report+0xdc/0x128
[   32.506241]  __asan_report_store8_noabort+0x20/0x30
[   32.506585]  kasan_atomics_helper+0x3e5c/0x4858
[   32.506712]  kasan_atomics+0x198/0x2e0
[   32.506764]  kunit_try_run_case+0x170/0x3f0
[   32.507128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.507220]  kthread+0x328/0x630
[   32.507574]  ret_from_fork+0x10/0x20
[   32.507713] 
[   32.507735] Allocated by task 296:
[   32.507795]  kasan_save_stack+0x3c/0x68
[   32.508077]  kasan_save_track+0x20/0x40
[   32.508236]  kasan_save_alloc_info+0x40/0x58
[   32.508461]  __kasan_kmalloc+0xd4/0xd8
[   32.508698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.508982]  kasan_atomics+0xb8/0x2e0
[   32.509202]  kunit_try_run_case+0x170/0x3f0
[   32.509297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.509350]  kthread+0x328/0x630
[   32.509731]  ret_from_fork+0x10/0x20
[   32.509820] 
[   32.510015] The buggy address belongs to the object at fff00000c85f0e00
[   32.510015]  which belongs to the cache kmalloc-64 of size 64
[   32.510421] The buggy address is located 0 bytes to the right of
[   32.510421]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.510670] 
[   32.510822] The buggy address belongs to the physical page:
[   32.510878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.510968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.511152] page_type: f5(slab)
[   32.511545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.511628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.511798] page dumped because: kasan: bad access detected
[   32.511880] 
[   32.511920] Memory state around the buggy address:
[   32.512005]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.512062]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.512106] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.512553]                                      ^
[   32.512942]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.513030]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.513151] ==================================================================
[   32.464178] ==================================================================
[   32.464564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   32.464657] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.464741] 
[   32.464775] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.465179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.465234] Hardware name: linux,dummy-virt (DT)
[   32.465490] Call trace:
[   32.465524]  show_stack+0x20/0x38 (C)
[   32.465578]  dump_stack_lvl+0x8c/0xd0
[   32.465995]  print_report+0x118/0x5d0
[   32.466361]  kasan_report+0xdc/0x128
[   32.466672]  kasan_check_range+0x100/0x1a8
[   32.466811]  __kasan_check_write+0x20/0x30
[   32.466885]  kasan_atomics_helper+0xd3c/0x4858
[   32.467195]  kasan_atomics+0x198/0x2e0
[   32.467398]  kunit_try_run_case+0x170/0x3f0
[   32.467630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.467690]  kthread+0x328/0x630
[   32.467743]  ret_from_fork+0x10/0x20
[   32.468122] 
[   32.468202] Allocated by task 296:
[   32.468253]  kasan_save_stack+0x3c/0x68
[   32.468303]  kasan_save_track+0x20/0x40
[   32.468344]  kasan_save_alloc_info+0x40/0x58
[   32.468812]  __kasan_kmalloc+0xd4/0xd8
[   32.468982]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.469114]  kasan_atomics+0xb8/0x2e0
[   32.469380]  kunit_try_run_case+0x170/0x3f0
[   32.469578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.469658]  kthread+0x328/0x630
[   32.469779]  ret_from_fork+0x10/0x20
[   32.470126] 
[   32.470194] The buggy address belongs to the object at fff00000c85f0e00
[   32.470194]  which belongs to the cache kmalloc-64 of size 64
[   32.470315] The buggy address is located 0 bytes to the right of
[   32.470315]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.470462] 
[   32.470522] The buggy address belongs to the physical page:
[   32.470591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.470650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.470738] page_type: f5(slab)
[   32.470922] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.471314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.471380] page dumped because: kasan: bad access detected
[   32.471520] 
[   32.471542] Memory state around the buggy address:
[   32.471583]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.471906]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.471999] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.472042]                                      ^
[   32.472387]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.472530]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.472629] ==================================================================
[   32.454138] ==================================================================
[   32.454510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   32.454582] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.454913] 
[   32.454974] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.455073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.455284] Hardware name: linux,dummy-virt (DT)
[   32.455412] Call trace:
[   32.455551]  show_stack+0x20/0x38 (C)
[   32.455611]  dump_stack_lvl+0x8c/0xd0
[   32.455659]  print_report+0x118/0x5d0
[   32.455705]  kasan_report+0xdc/0x128
[   32.455749]  __asan_report_load4_noabort+0x20/0x30
[   32.456365]  kasan_atomics_helper+0x3dd8/0x4858
[   32.456448]  kasan_atomics+0x198/0x2e0
[   32.456773]  kunit_try_run_case+0x170/0x3f0
[   32.456943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.457267]  kthread+0x328/0x630
[   32.457427]  ret_from_fork+0x10/0x20
[   32.457499] 
[   32.457626] Allocated by task 296:
[   32.457826]  kasan_save_stack+0x3c/0x68
[   32.458180]  kasan_save_track+0x20/0x40
[   32.458260]  kasan_save_alloc_info+0x40/0x58
[   32.458324]  __kasan_kmalloc+0xd4/0xd8
[   32.458612]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.458785]  kasan_atomics+0xb8/0x2e0
[   32.458975]  kunit_try_run_case+0x170/0x3f0
[   32.459121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.459252]  kthread+0x328/0x630
[   32.459445]  ret_from_fork+0x10/0x20
[   32.459643] 
[   32.459696] The buggy address belongs to the object at fff00000c85f0e00
[   32.459696]  which belongs to the cache kmalloc-64 of size 64
[   32.459784] The buggy address is located 0 bytes to the right of
[   32.459784]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.459927] 
[   32.459988] The buggy address belongs to the physical page:
[   32.460129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.460488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.460569] page_type: f5(slab)
[   32.460775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.460852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.461314] page dumped because: kasan: bad access detected
[   32.461505] 
[   32.461546] Memory state around the buggy address:
[   32.461768]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.462013]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.462085] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.462269]                                      ^
[   32.462468]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.462540]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.462672] ==================================================================
[   32.701950] ==================================================================
[   32.702014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   32.702116] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.702192] 
[   32.702250] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.702336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.702365] Hardware name: linux,dummy-virt (DT)
[   32.702395] Call trace:
[   32.702419]  show_stack+0x20/0x38 (C)
[   32.702641]  dump_stack_lvl+0x8c/0xd0
[   32.702699]  print_report+0x118/0x5d0
[   32.702743]  kasan_report+0xdc/0x128
[   32.702788]  kasan_check_range+0x100/0x1a8
[   32.702842]  __kasan_check_write+0x20/0x30
[   32.702975]  kasan_atomics_helper+0x175c/0x4858
[   32.703059]  kasan_atomics+0x198/0x2e0
[   32.703182]  kunit_try_run_case+0x170/0x3f0
[   32.703255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.703372]  kthread+0x328/0x630
[   32.703418]  ret_from_fork+0x10/0x20
[   32.703476] 
[   32.703499] Allocated by task 296:
[   32.703529]  kasan_save_stack+0x3c/0x68
[   32.703582]  kasan_save_track+0x20/0x40
[   32.703624]  kasan_save_alloc_info+0x40/0x58
[   32.703664]  __kasan_kmalloc+0xd4/0xd8
[   32.703712]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.703755]  kasan_atomics+0xb8/0x2e0
[   32.703803]  kunit_try_run_case+0x170/0x3f0
[   32.703844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.703895]  kthread+0x328/0x630
[   32.703940]  ret_from_fork+0x10/0x20
[   32.703985] 
[   32.704007] The buggy address belongs to the object at fff00000c85f0e00
[   32.704007]  which belongs to the cache kmalloc-64 of size 64
[   32.704077] The buggy address is located 0 bytes to the right of
[   32.704077]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.704143] 
[   32.704172] The buggy address belongs to the physical page:
[   32.704204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.704278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.704330] page_type: f5(slab)
[   32.704403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.704453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.704702] page dumped because: kasan: bad access detected
[   32.704780] 
[   32.704802] Memory state around the buggy address:
[   32.704837]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.705112]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.705185] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.705225]                                      ^
[   32.705266]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.705374]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.705466] ==================================================================
[   32.396516] ==================================================================
[   32.396569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   32.397068] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.397179] 
[   32.397603] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.397719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.398249]  kasan_check_range+0x100/0x1a8
[   32.399517] 
[   32.399657]  kasan_save_track+0x20/0x40
[   32.400461]  ret_from_fork+0x10/0x20
[   32.401106] 
[   32.401270] The buggy address belongs to the physical page:
[   32.401482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.401809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.401973] page_type: f5(slab)
[   32.402201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.402261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.402657] page dumped because: kasan: bad access detected
[   32.402745] 
[   32.403011] Memory state around the buggy address:
[   32.403292]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.403342]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.403516] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.403709]                                      ^
[   32.403781]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.403930]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.404021] ==================================================================
[   32.591654] ==================================================================
[   32.591707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   32.591758] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.592258] 
[   32.592380] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.592651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.592682] Hardware name: linux,dummy-virt (DT)
[   32.592714] Call trace:
[   32.592885]  show_stack+0x20/0x38 (C)
[   32.593138]  dump_stack_lvl+0x8c/0xd0
[   32.593234]  print_report+0x118/0x5d0
[   32.593635]  kasan_report+0xdc/0x128
[   32.593744]  kasan_check_range+0x100/0x1a8
[   32.593821]  __kasan_check_write+0x20/0x30
[   32.593987]  kasan_atomics_helper+0x126c/0x4858
[   32.594339]  kasan_atomics+0x198/0x2e0
[   32.594477]  kunit_try_run_case+0x170/0x3f0
[   32.594567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.594920]  kthread+0x328/0x630
[   32.595009]  ret_from_fork+0x10/0x20
[   32.595410] 
[   32.595514] Allocated by task 296:
[   32.595584]  kasan_save_stack+0x3c/0x68
[   32.595954]  kasan_save_track+0x20/0x40
[   32.596032]  kasan_save_alloc_info+0x40/0x58
[   32.596088]  __kasan_kmalloc+0xd4/0xd8
[   32.596281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.596501]  kasan_atomics+0xb8/0x2e0
[   32.596802]  kunit_try_run_case+0x170/0x3f0
[   32.596940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.596989]  kthread+0x328/0x630
[   32.597334]  ret_from_fork+0x10/0x20
[   32.597448] 
[   32.597662] The buggy address belongs to the object at fff00000c85f0e00
[   32.597662]  which belongs to the cache kmalloc-64 of size 64
[   32.597731] The buggy address is located 0 bytes to the right of
[   32.597731]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.598247] 
[   32.598333] The buggy address belongs to the physical page:
[   32.598532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.598761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.598964] page_type: f5(slab)
[   32.599283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.599425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.599483] page dumped because: kasan: bad access detected
[   32.599538] 
[   32.599573] Memory state around the buggy address:
[   32.599606]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.599652]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.599695] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.599743]                                      ^
[   32.599788]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.599842]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.599887] ==================================================================
[   32.601739] ==================================================================
[   32.601922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   32.601982] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.602292] 
[   32.602661] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.602768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.602862] Hardware name: linux,dummy-virt (DT)
[   32.602897] Call trace:
[   32.602924]  show_stack+0x20/0x38 (C)
[   32.603082]  dump_stack_lvl+0x8c/0xd0
[   32.603139]  print_report+0x118/0x5d0
[   32.603183]  kasan_report+0xdc/0x128
[   32.603227]  kasan_check_range+0x100/0x1a8
[   32.603289]  __kasan_check_write+0x20/0x30
[   32.603505]  kasan_atomics_helper+0x12d8/0x4858
[   32.603841]  kasan_atomics+0x198/0x2e0
[   32.603913]  kunit_try_run_case+0x170/0x3f0
[   32.603965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.604125]  kthread+0x328/0x630
[   32.604212]  ret_from_fork+0x10/0x20
[   32.604421] 
[   32.604488] Allocated by task 296:
[   32.604608]  kasan_save_stack+0x3c/0x68
[   32.604690]  kasan_save_track+0x20/0x40
[   32.604870]  kasan_save_alloc_info+0x40/0x58
[   32.604952]  __kasan_kmalloc+0xd4/0xd8
[   32.605382]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.605560]  kasan_atomics+0xb8/0x2e0
[   32.605666]  kunit_try_run_case+0x170/0x3f0
[   32.605895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.606037]  kthread+0x328/0x630
[   32.606094]  ret_from_fork+0x10/0x20
[   32.606502] 
[   32.606613] The buggy address belongs to the object at fff00000c85f0e00
[   32.606613]  which belongs to the cache kmalloc-64 of size 64
[   32.606681] The buggy address is located 0 bytes to the right of
[   32.606681]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.606882] 
[   32.606999] The buggy address belongs to the physical page:
[   32.607058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.607141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.607199] page_type: f5(slab)
[   32.607247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.607307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.607350] page dumped because: kasan: bad access detected
[   32.607384] 
[   32.607404] Memory state around the buggy address:
[   32.607447]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.607493]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.607538] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.607578]                                      ^
[   32.607623]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.607678]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.607727] ==================================================================
[   32.671978] ==================================================================
[   32.672038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   32.672100] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.672151] 
[   32.672193] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.672299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.672341] Hardware name: linux,dummy-virt (DT)
[   32.672401] Call trace:
[   32.672556]  show_stack+0x20/0x38 (C)
[   32.672611]  dump_stack_lvl+0x8c/0xd0
[   32.672660]  print_report+0x118/0x5d0
[   32.672707]  kasan_report+0xdc/0x128
[   32.672761]  __asan_report_load8_noabort+0x20/0x30
[   32.672811]  kasan_atomics_helper+0x3db0/0x4858
[   32.672878]  kasan_atomics+0x198/0x2e0
[   32.672925]  kunit_try_run_case+0x170/0x3f0
[   32.672989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.673042]  kthread+0x328/0x630
[   32.673108]  ret_from_fork+0x10/0x20
[   32.673159] 
[   32.673192] Allocated by task 296:
[   32.673228]  kasan_save_stack+0x3c/0x68
[   32.673281]  kasan_save_track+0x20/0x40
[   32.673321]  kasan_save_alloc_info+0x40/0x58
[   32.673378]  __kasan_kmalloc+0xd4/0xd8
[   32.673419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.673471]  kasan_atomics+0xb8/0x2e0
[   32.673519]  kunit_try_run_case+0x170/0x3f0
[   32.673560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.673609]  kthread+0x328/0x630
[   32.673646]  ret_from_fork+0x10/0x20
[   32.673693] 
[   32.673713] The buggy address belongs to the object at fff00000c85f0e00
[   32.673713]  which belongs to the cache kmalloc-64 of size 64
[   32.673772] The buggy address is located 0 bytes to the right of
[   32.673772]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.673848] 
[   32.673869] The buggy address belongs to the physical page:
[   32.673902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.673957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.674013] page_type: f5(slab)
[   32.674069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.674333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.674436] page dumped because: kasan: bad access detected
[   32.674788] 
[   32.674906] Memory state around the buggy address:
[   32.675577]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.675709]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.676025] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.676119]                                      ^
[   32.676218]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676284]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676498] ==================================================================
[   32.473983] ==================================================================
[   32.474037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   32.474209] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.474272] 
[   32.474329] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.474416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.474445] Hardware name: linux,dummy-virt (DT)
[   32.474479] Call trace:
[   32.474519]  show_stack+0x20/0x38 (C)
[   32.474574]  dump_stack_lvl+0x8c/0xd0
[   32.474621]  print_report+0x118/0x5d0
[   32.474666]  kasan_report+0xdc/0x128
[   32.474726]  __asan_report_load4_noabort+0x20/0x30
[   32.474786]  kasan_atomics_helper+0x3e04/0x4858
[   32.474848]  kasan_atomics+0x198/0x2e0
[   32.474897]  kunit_try_run_case+0x170/0x3f0
[   32.474948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.475001]  kthread+0x328/0x630
[   32.475056]  ret_from_fork+0x10/0x20
[   32.475412] 
[   32.475733] Allocated by task 296:
[   32.475776]  kasan_save_stack+0x3c/0x68
[   32.475823]  kasan_save_track+0x20/0x40
[   32.475866]  kasan_save_alloc_info+0x40/0x58
[   32.476161]  __kasan_kmalloc+0xd4/0xd8
[   32.476390]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.476604]  kasan_atomics+0xb8/0x2e0
[   32.476842]  kunit_try_run_case+0x170/0x3f0
[   32.476918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.476964]  kthread+0x328/0x630
[   32.476998]  ret_from_fork+0x10/0x20
[   32.477035] 
[   32.477069] The buggy address belongs to the object at fff00000c85f0e00
[   32.477069]  which belongs to the cache kmalloc-64 of size 64
[   32.477403] The buggy address is located 0 bytes to the right of
[   32.477403]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.477631] 
[   32.477789] The buggy address belongs to the physical page:
[   32.477900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.478066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.478286] page_type: f5(slab)
[   32.478492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.478585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.478851] page dumped because: kasan: bad access detected
[   32.479037] 
[   32.479110] Memory state around the buggy address:
[   32.479336]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.479553]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.479701] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.479800]                                      ^
[   32.479855]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.479974]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.480015] ==================================================================
[   32.576178] ==================================================================
[   32.576271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   32.576661] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.576790] 
[   32.576869] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.577154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.577290] Hardware name: linux,dummy-virt (DT)
[   32.577332] Call trace:
[   32.577407]  show_stack+0x20/0x38 (C)
[   32.577462]  dump_stack_lvl+0x8c/0xd0
[   32.577508]  print_report+0x118/0x5d0
[   32.577574]  kasan_report+0xdc/0x128
[   32.577630]  kasan_check_range+0x100/0x1a8
[   32.577677]  __kasan_check_write+0x20/0x30
[   32.577734]  kasan_atomics_helper+0x1190/0x4858
[   32.577792]  kasan_atomics+0x198/0x2e0
[   32.577847]  kunit_try_run_case+0x170/0x3f0
[   32.577897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.577948]  kthread+0x328/0x630
[   32.577992]  ret_from_fork+0x10/0x20
[   32.578060] 
[   32.578083] Allocated by task 296:
[   32.578113]  kasan_save_stack+0x3c/0x68
[   32.578157]  kasan_save_track+0x20/0x40
[   32.578197]  kasan_save_alloc_info+0x40/0x58
[   32.578252]  __kasan_kmalloc+0xd4/0xd8
[   32.578293]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.578335]  kasan_atomics+0xb8/0x2e0
[   32.578381]  kunit_try_run_case+0x170/0x3f0
[   32.578422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.578471]  kthread+0x328/0x630
[   32.578507]  ret_from_fork+0x10/0x20
[   32.578545] 
[   32.578565] The buggy address belongs to the object at fff00000c85f0e00
[   32.578565]  which belongs to the cache kmalloc-64 of size 64
[   32.578625] The buggy address is located 0 bytes to the right of
[   32.578625]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.578700] 
[   32.578730] The buggy address belongs to the physical page:
[   32.578781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.578838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.578900] page_type: f5(slab)
[   32.578962] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.579014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.579905] page dumped because: kasan: bad access detected
[   32.579973] 
[   32.580018] Memory state around the buggy address:
[   32.580093]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.580179]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.580243] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.580402]                                      ^
[   32.580552]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.580603]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.580644] ==================================================================
[   32.655133] ==================================================================
[   32.655539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   32.655621] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.655675] 
[   32.655713] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.655947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.655979] Hardware name: linux,dummy-virt (DT)
[   32.656012] Call trace:
[   32.656035]  show_stack+0x20/0x38 (C)
[   32.656196]  dump_stack_lvl+0x8c/0xd0
[   32.656248]  print_report+0x118/0x5d0
[   32.656523]  kasan_report+0xdc/0x128
[   32.656736]  kasan_check_range+0x100/0x1a8
[   32.656875]  __kasan_check_write+0x20/0x30
[   32.657078]  kasan_atomics_helper+0x154c/0x4858
[   32.657174]  kasan_atomics+0x198/0x2e0
[   32.657251]  kunit_try_run_case+0x170/0x3f0
[   32.657324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.657377]  kthread+0x328/0x630
[   32.657663]  ret_from_fork+0x10/0x20
[   32.658317] 
[   32.658840] Allocated by task 296:
[   32.658907]  kasan_save_stack+0x3c/0x68
[   32.658980]  kasan_save_track+0x20/0x40
[   32.659106]  kasan_save_alloc_info+0x40/0x58
[   32.659151]  __kasan_kmalloc+0xd4/0xd8
[   32.659583]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.659666]  kasan_atomics+0xb8/0x2e0
[   32.659912]  kunit_try_run_case+0x170/0x3f0
[   32.660104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.660293]  kthread+0x328/0x630
[   32.660517]  ret_from_fork+0x10/0x20
[   32.660785] 
[   32.661034] The buggy address belongs to the object at fff00000c85f0e00
[   32.661034]  which belongs to the cache kmalloc-64 of size 64
[   32.661135] The buggy address is located 0 bytes to the right of
[   32.661135]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.661529] 
[   32.661567] The buggy address belongs to the physical page:
[   32.661624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.661922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.662071] page_type: f5(slab)
[   32.662166] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.662599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.662669] page dumped because: kasan: bad access detected
[   32.662872] 
[   32.663136] Memory state around the buggy address:
[   32.663232]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.663464]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.663550] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.663653]                                      ^
[   32.663691]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.663736]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.664152] ==================================================================
[   32.538906] ==================================================================
[   32.539222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   32.539639] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.539732] 
[   32.539768] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.539935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.539984] Hardware name: linux,dummy-virt (DT)
[   32.540311] Call trace:
[   32.540395]  show_stack+0x20/0x38 (C)
[   32.540460]  dump_stack_lvl+0x8c/0xd0
[   32.540700]  print_report+0x118/0x5d0
[   32.540946]  kasan_report+0xdc/0x128
[   32.541090]  kasan_check_range+0x100/0x1a8
[   32.541233]  __kasan_check_write+0x20/0x30
[   32.541322]  kasan_atomics_helper+0xff0/0x4858
[   32.541498]  kasan_atomics+0x198/0x2e0
[   32.541656]  kunit_try_run_case+0x170/0x3f0
[   32.541764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.541826]  kthread+0x328/0x630
[   32.542043]  ret_from_fork+0x10/0x20
[   32.542284] 
[   32.542344] Allocated by task 296:
[   32.542552]  kasan_save_stack+0x3c/0x68
[   32.542768]  kasan_save_track+0x20/0x40
[   32.542839]  kasan_save_alloc_info+0x40/0x58
[   32.542895]  __kasan_kmalloc+0xd4/0xd8
[   32.542938]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.543294]  kasan_atomics+0xb8/0x2e0
[   32.543384]  kunit_try_run_case+0x170/0x3f0
[   32.543786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.544134]  kthread+0x328/0x630
[   32.544281]  ret_from_fork+0x10/0x20
[   32.544520] 
[   32.544654] The buggy address belongs to the object at fff00000c85f0e00
[   32.544654]  which belongs to the cache kmalloc-64 of size 64
[   32.544827] The buggy address is located 0 bytes to the right of
[   32.544827]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.545124] 
[   32.545298] The buggy address belongs to the physical page:
[   32.545344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.545557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.545855] page_type: f5(slab)
[   32.546121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.546273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.546358] page dumped because: kasan: bad access detected
[   32.546530] 
[   32.546709] Memory state around the buggy address:
[   32.546776]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.546879]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.546932] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.546979]                                      ^
[   32.547018]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.547078]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.547134] ==================================================================
[   32.582421] ==================================================================
[   32.582483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   32.582537] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.582633] 
[   32.582693] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.582820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.582866] Hardware name: linux,dummy-virt (DT)
[   32.582897] Call trace:
[   32.582923]  show_stack+0x20/0x38 (C)
[   32.583154]  dump_stack_lvl+0x8c/0xd0
[   32.583332]  print_report+0x118/0x5d0
[   32.583701]  kasan_report+0xdc/0x128
[   32.583806]  kasan_check_range+0x100/0x1a8
[   32.583874]  __kasan_check_write+0x20/0x30
[   32.583997]  kasan_atomics_helper+0x11f8/0x4858
[   32.584067]  kasan_atomics+0x198/0x2e0
[   32.584121]  kunit_try_run_case+0x170/0x3f0
[   32.584178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.584565]  kthread+0x328/0x630
[   32.584857]  ret_from_fork+0x10/0x20
[   32.584917] 
[   32.584941] Allocated by task 296:
[   32.584972]  kasan_save_stack+0x3c/0x68
[   32.585015]  kasan_save_track+0x20/0x40
[   32.585070]  kasan_save_alloc_info+0x40/0x58
[   32.585729]  __kasan_kmalloc+0xd4/0xd8
[   32.585825]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.585951]  kasan_atomics+0xb8/0x2e0
[   32.585994]  kunit_try_run_case+0x170/0x3f0
[   32.586311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.586540]  kthread+0x328/0x630
[   32.586785]  ret_from_fork+0x10/0x20
[   32.586847] 
[   32.587028] The buggy address belongs to the object at fff00000c85f0e00
[   32.587028]  which belongs to the cache kmalloc-64 of size 64
[   32.587488] The buggy address is located 0 bytes to the right of
[   32.587488]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.587651] 
[   32.587686] The buggy address belongs to the physical page:
[   32.587720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.588076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.588317] page_type: f5(slab)
[   32.588519] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.588577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.588959] page dumped because: kasan: bad access detected
[   32.589060] 
[   32.589138] Memory state around the buggy address:
[   32.589492]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.589568]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.589731] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.589863]                                      ^
[   32.589951]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.590317]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.590433] ==================================================================
[   32.514339] ==================================================================
[   32.514454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   32.514508] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.514559] 
[   32.514592] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.514677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.514705] Hardware name: linux,dummy-virt (DT)
[   32.514738] Call trace:
[   32.514763]  show_stack+0x20/0x38 (C)
[   32.514834]  dump_stack_lvl+0x8c/0xd0
[   32.514884]  print_report+0x118/0x5d0
[   32.514929]  kasan_report+0xdc/0x128
[   32.514973]  kasan_check_range+0x100/0x1a8
[   32.515021]  __kasan_check_write+0x20/0x30
[   32.515079]  kasan_atomics_helper+0xeb8/0x4858
[   32.515129]  kasan_atomics+0x198/0x2e0
[   32.515175]  kunit_try_run_case+0x170/0x3f0
[   32.515224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.515276]  kthread+0x328/0x630
[   32.515325]  ret_from_fork+0x10/0x20
[   32.515383] 
[   32.515413] Allocated by task 296:
[   32.515443]  kasan_save_stack+0x3c/0x68
[   32.515487]  kasan_save_track+0x20/0x40
[   32.515534]  kasan_save_alloc_info+0x40/0x58
[   32.515574]  __kasan_kmalloc+0xd4/0xd8
[   32.515622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.515665]  kasan_atomics+0xb8/0x2e0
[   32.515706]  kunit_try_run_case+0x170/0x3f0
[   32.515748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.515791]  kthread+0x328/0x630
[   32.515827]  ret_from_fork+0x10/0x20
[   32.515865] 
[   32.515894] The buggy address belongs to the object at fff00000c85f0e00
[   32.515894]  which belongs to the cache kmalloc-64 of size 64
[   32.515963] The buggy address is located 0 bytes to the right of
[   32.515963]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.516031] 
[   32.516845] The buggy address belongs to the physical page:
[   32.516904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.516962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.517542] page_type: f5(slab)
[   32.517602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.518067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.518117] page dumped because: kasan: bad access detected
[   32.518150] 
[   32.518200] Memory state around the buggy address:
[   32.518279]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.518373]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.518644] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.518786]                                      ^
[   32.519087]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.519240]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.519284] ==================================================================
[   32.609948] ==================================================================
[   32.610025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   32.610088] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.610139] 
[   32.610172] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.610464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.610508] Hardware name: linux,dummy-virt (DT)
[   32.610792] Call trace:
[   32.610939]  show_stack+0x20/0x38 (C)
[   32.611001]  dump_stack_lvl+0x8c/0xd0
[   32.611229]  print_report+0x118/0x5d0
[   32.611282]  kasan_report+0xdc/0x128
[   32.611327]  kasan_check_range+0x100/0x1a8
[   32.611374]  __kasan_check_write+0x20/0x30
[   32.611580]  kasan_atomics_helper+0x1384/0x4858
[   32.611633]  kasan_atomics+0x198/0x2e0
[   32.611679]  kunit_try_run_case+0x170/0x3f0
[   32.612104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.612192]  kthread+0x328/0x630
[   32.612423]  ret_from_fork+0x10/0x20
[   32.612704] 
[   32.612747] Allocated by task 296:
[   32.613011]  kasan_save_stack+0x3c/0x68
[   32.613203]  kasan_save_track+0x20/0x40
[   32.613263]  kasan_save_alloc_info+0x40/0x58
[   32.613305]  __kasan_kmalloc+0xd4/0xd8
[   32.613527]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.613853]  kasan_atomics+0xb8/0x2e0
[   32.614090]  kunit_try_run_case+0x170/0x3f0
[   32.614311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.614558]  kthread+0x328/0x630
[   32.614650]  ret_from_fork+0x10/0x20
[   32.614834] 
[   32.614857] The buggy address belongs to the object at fff00000c85f0e00
[   32.614857]  which belongs to the cache kmalloc-64 of size 64
[   32.615089] The buggy address is located 0 bytes to the right of
[   32.615089]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.615585] 
[   32.616028] The buggy address belongs to the physical page:
[   32.616089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.616474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.616627] page_type: f5(slab)
[   32.616673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.617161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.617363] page dumped because: kasan: bad access detected
[   32.617403] 
[   32.617517] Memory state around the buggy address:
[   32.617774]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.617961]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.618031] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.618221]                                      ^
[   32.618399]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.618486]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.618824] ==================================================================
[   32.705742] ==================================================================
[   32.705895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   32.705951] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.706107] 
[   32.706194] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.706280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.706328] Hardware name: linux,dummy-virt (DT)
[   32.706409] Call trace:
[   32.706435]  show_stack+0x20/0x38 (C)
[   32.706550]  dump_stack_lvl+0x8c/0xd0
[   32.706672]  print_report+0x118/0x5d0
[   32.706832]  kasan_report+0xdc/0x128
[   32.706926]  __asan_report_load8_noabort+0x20/0x30
[   32.707032]  kasan_atomics_helper+0x3e20/0x4858
[   32.707126]  kasan_atomics+0x198/0x2e0
[   32.707184]  kunit_try_run_case+0x170/0x3f0
[   32.707234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.707302]  kthread+0x328/0x630
[   32.707430]  ret_from_fork+0x10/0x20
[   32.707483] 
[   32.707594] Allocated by task 296:
[   32.707673]  kasan_save_stack+0x3c/0x68
[   32.707741]  kasan_save_track+0x20/0x40
[   32.707788]  kasan_save_alloc_info+0x40/0x58
[   32.707834]  __kasan_kmalloc+0xd4/0xd8
[   32.707907]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.708327]  kasan_atomics+0xb8/0x2e0
[   32.708410]  kunit_try_run_case+0x170/0x3f0
[   32.708456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.708512]  kthread+0x328/0x630
[   32.708546]  ret_from_fork+0x10/0x20
[   32.708584] 
[   32.709134] The buggy address belongs to the object at fff00000c85f0e00
[   32.709134]  which belongs to the cache kmalloc-64 of size 64
[   32.709498] The buggy address is located 0 bytes to the right of
[   32.709498]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.709601] 
[   32.709626] The buggy address belongs to the physical page:
[   32.709756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.709831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.710144] page_type: f5(slab)
[   32.710221] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.710347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.710760] page dumped because: kasan: bad access detected
[   32.710866] 
[   32.710929] Memory state around the buggy address:
[   32.710977]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.711022]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.711344] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.711517]                                      ^
[   32.711619]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.711945]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.712068] ==================================================================
[   32.389874] ==================================================================
[   32.390022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   32.390132] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.390225] 
[   32.390261] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.390502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.390530] Hardware name: linux,dummy-virt (DT)
[   32.390900] Call trace:
[   32.390944]  show_stack+0x20/0x38 (C)
[   32.391000]  dump_stack_lvl+0x8c/0xd0
[   32.391651]  print_report+0x118/0x5d0
[   32.391722]  kasan_report+0xdc/0x128
[   32.391780]  kasan_check_range+0x100/0x1a8
[   32.391849]  __kasan_check_write+0x20/0x30
[   32.391902]  kasan_atomics_helper+0xa6c/0x4858
[   32.391997]  kasan_atomics+0x198/0x2e0
[   32.392058]  kunit_try_run_case+0x170/0x3f0
[   32.392109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.392477]  kthread+0x328/0x630
[   32.392774]  ret_from_fork+0x10/0x20
[   32.392836] 
[   32.392857] Allocated by task 296:
[   32.392916]  kasan_save_stack+0x3c/0x68
[   32.392962]  kasan_save_track+0x20/0x40
[   32.393020]  kasan_save_alloc_info+0x40/0x58
[   32.393071]  __kasan_kmalloc+0xd4/0xd8
[   32.393133]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.393182]  kasan_atomics+0xb8/0x2e0
[   32.393222]  kunit_try_run_case+0x170/0x3f0
[   32.393264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.393305]  kthread+0x328/0x630
[   32.393341]  ret_from_fork+0x10/0x20
[   32.393378] 
[   32.393405] The buggy address belongs to the object at fff00000c85f0e00
[   32.393405]  which belongs to the cache kmalloc-64 of size 64
[   32.393464] The buggy address is located 0 bytes to the right of
[   32.393464]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.393529] 
[   32.393560] The buggy address belongs to the physical page:
[   32.393606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.393659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.393708] page_type: f5(slab)
[   32.393748] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.393817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.393867] page dumped because: kasan: bad access detected
[   32.393910] 
[   32.393939] Memory state around the buggy address:
[   32.393982]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.394335]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.394519] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.395060]                                      ^
[   32.395143]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.395415]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.395609] ==================================================================
[   32.482188] ==================================================================
[   32.482269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   32.482332] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.482383] 
[   32.482521] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.482725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.482766] Hardware name: linux,dummy-virt (DT)
[   32.482801] Call trace:
[   32.482858]  show_stack+0x20/0x38 (C)
[   32.482919]  dump_stack_lvl+0x8c/0xd0
[   32.483201]  print_report+0x118/0x5d0
[   32.483273]  kasan_report+0xdc/0x128
[   32.483465]  kasan_check_range+0x100/0x1a8
[   32.483527]  __kasan_check_read+0x20/0x30
[   32.483812]  kasan_atomics_helper+0xdd4/0x4858
[   32.484105]  kasan_atomics+0x198/0x2e0
[   32.484334]  kunit_try_run_case+0x170/0x3f0
[   32.484770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.484849]  kthread+0x328/0x630
[   32.484898]  ret_from_fork+0x10/0x20
[   32.484951] 
[   32.484972] Allocated by task 296:
[   32.485310]  kasan_save_stack+0x3c/0x68
[   32.485532]  kasan_save_track+0x20/0x40
[   32.485629]  kasan_save_alloc_info+0x40/0x58
[   32.485831]  __kasan_kmalloc+0xd4/0xd8
[   32.485891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.485947]  kasan_atomics+0xb8/0x2e0
[   32.485986]  kunit_try_run_case+0x170/0x3f0
[   32.486033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.486095]  kthread+0x328/0x630
[   32.486135]  ret_from_fork+0x10/0x20
[   32.486172] 
[   32.486194] The buggy address belongs to the object at fff00000c85f0e00
[   32.486194]  which belongs to the cache kmalloc-64 of size 64
[   32.486255] The buggy address is located 0 bytes to the right of
[   32.486255]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.486320] 
[   32.486372] The buggy address belongs to the physical page:
[   32.486429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.486484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.486535] page_type: f5(slab)
[   32.486587] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.486649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.486701] page dumped because: kasan: bad access detected
[   32.486735] 
[   32.486764] Memory state around the buggy address:
[   32.486816]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.486871]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.486915] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.486955]                                      ^
[   32.486988]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.487031]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.487415] ==================================================================
[   32.665452] ==================================================================
[   32.665518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   32.665596] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.665852] 
[   32.666070] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.666181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.666435] Hardware name: linux,dummy-virt (DT)
[   32.666603] Call trace:
[   32.666637]  show_stack+0x20/0x38 (C)
[   32.666693]  dump_stack_lvl+0x8c/0xd0
[   32.666935]  print_report+0x118/0x5d0
[   32.667070]  kasan_report+0xdc/0x128
[   32.667136]  kasan_check_range+0x100/0x1a8
[   32.667184]  __kasan_check_write+0x20/0x30
[   32.667398]  kasan_atomics_helper+0x15b4/0x4858
[   32.667482]  kasan_atomics+0x198/0x2e0
[   32.667740]  kunit_try_run_case+0x170/0x3f0
[   32.667866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.668044]  kthread+0x328/0x630
[   32.668112]  ret_from_fork+0x10/0x20
[   32.668621] 
[   32.668675] Allocated by task 296:
[   32.668753]  kasan_save_stack+0x3c/0x68
[   32.669115]  kasan_save_track+0x20/0x40
[   32.669201]  kasan_save_alloc_info+0x40/0x58
[   32.669249]  __kasan_kmalloc+0xd4/0xd8
[   32.669608]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.669742]  kasan_atomics+0xb8/0x2e0
[   32.669913]  kunit_try_run_case+0x170/0x3f0
[   32.670200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.670368]  kthread+0x328/0x630
[   32.670407]  ret_from_fork+0x10/0x20
[   32.670446] 
[   32.670490] The buggy address belongs to the object at fff00000c85f0e00
[   32.670490]  which belongs to the cache kmalloc-64 of size 64
[   32.670557] The buggy address is located 0 bytes to the right of
[   32.670557]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.670629] 
[   32.670657] The buggy address belongs to the physical page:
[   32.670702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.670772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.670828] page_type: f5(slab)
[   32.670871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.670921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.670964] page dumped because: kasan: bad access detected
[   32.670998] 
[   32.671034] Memory state around the buggy address:
[   32.671092]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.671148]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.671193] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.671237]                                      ^
[   32.671272]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.671318]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.671368] ==================================================================
[   32.629755] ==================================================================
[   32.630117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   32.630185] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.630379] 
[   32.630456] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.630642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.630673] Hardware name: linux,dummy-virt (DT)
[   32.630704] Call trace:
[   32.630738]  show_stack+0x20/0x38 (C)
[   32.630870]  dump_stack_lvl+0x8c/0xd0
[   32.630919]  print_report+0x118/0x5d0
[   32.630972]  kasan_report+0xdc/0x128
[   32.631025]  kasan_check_range+0x100/0x1a8
[   32.631084]  __kasan_check_write+0x20/0x30
[   32.631129]  kasan_atomics_helper+0x1414/0x4858
[   32.631188]  kasan_atomics+0x198/0x2e0
[   32.631242]  kunit_try_run_case+0x170/0x3f0
[   32.631292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.631344]  kthread+0x328/0x630
[   32.631387]  ret_from_fork+0x10/0x20
[   32.631435] 
[   32.631466] Allocated by task 296:
[   32.631505]  kasan_save_stack+0x3c/0x68
[   32.631557]  kasan_save_track+0x20/0x40
[   32.631599]  kasan_save_alloc_info+0x40/0x58
[   32.631638]  __kasan_kmalloc+0xd4/0xd8
[   32.631684]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.631726]  kasan_atomics+0xb8/0x2e0
[   32.631765]  kunit_try_run_case+0x170/0x3f0
[   32.631815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.631860]  kthread+0x328/0x630
[   32.631903]  ret_from_fork+0x10/0x20
[   32.631941] 
[   32.631962] The buggy address belongs to the object at fff00000c85f0e00
[   32.631962]  which belongs to the cache kmalloc-64 of size 64
[   32.632021] The buggy address is located 0 bytes to the right of
[   32.632021]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.632097] 
[   32.632200] The buggy address belongs to the physical page:
[   32.632255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.632331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.632395] page_type: f5(slab)
[   32.632436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.633321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.633409] page dumped because: kasan: bad access detected
[   32.633461] 
[   32.633508] Memory state around the buggy address:
[   32.633574]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.633655]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.633728] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.633767]                                      ^
[   32.634269]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.634365]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.634661] ==================================================================
[   32.556119] ==================================================================
[   32.556378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   32.556484] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.556663] 
[   32.556734] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.556913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.556975] Hardware name: linux,dummy-virt (DT)
[   32.557006] Call trace:
[   32.557030]  show_stack+0x20/0x38 (C)
[   32.557643]  dump_stack_lvl+0x8c/0xd0
[   32.557860]  print_report+0x118/0x5d0
[   32.557954]  kasan_report+0xdc/0x128
[   32.558076]  kasan_check_range+0x100/0x1a8
[   32.558184]  __kasan_check_write+0x20/0x30
[   32.558348]  kasan_atomics_helper+0x10c0/0x4858
[   32.558414]  kasan_atomics+0x198/0x2e0
[   32.558963]  kunit_try_run_case+0x170/0x3f0
[   32.559150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.559432]  kthread+0x328/0x630
[   32.559603]  ret_from_fork+0x10/0x20
[   32.560043] 
[   32.560373] Allocated by task 296:
[   32.560426]  kasan_save_stack+0x3c/0x68
[   32.560651]  kasan_save_track+0x20/0x40
[   32.560899]  kasan_save_alloc_info+0x40/0x58
[   32.560976]  __kasan_kmalloc+0xd4/0xd8
[   32.561156]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.561215]  kasan_atomics+0xb8/0x2e0
[   32.561277]  kunit_try_run_case+0x170/0x3f0
[   32.561326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.561749]  kthread+0x328/0x630
[   32.561998]  ret_from_fork+0x10/0x20
[   32.562166] 
[   32.562523] The buggy address belongs to the object at fff00000c85f0e00
[   32.562523]  which belongs to the cache kmalloc-64 of size 64
[   32.562635] The buggy address is located 0 bytes to the right of
[   32.562635]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.562835] 
[   32.562993] The buggy address belongs to the physical page:
[   32.563446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.563792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.563960] page_type: f5(slab)
[   32.564059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.564214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.564289] page dumped because: kasan: bad access detected
[   32.564530] 
[   32.564627] Memory state around the buggy address:
[   32.564766]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.564826]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.565067] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.565139]                                      ^
[   32.565482]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.565656]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.565877] ==================================================================
[   32.676901] ==================================================================
[   32.677043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   32.677373] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.677440] 
[   32.677475] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.677594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.677626] Hardware name: linux,dummy-virt (DT)
[   32.677657] Call trace:
[   32.677903]  show_stack+0x20/0x38 (C)
[   32.677975]  dump_stack_lvl+0x8c/0xd0
[   32.678034]  print_report+0x118/0x5d0
[   32.678406]  kasan_report+0xdc/0x128
[   32.678502]  kasan_check_range+0x100/0x1a8
[   32.678553]  __kasan_check_write+0x20/0x30
[   32.678612]  kasan_atomics_helper+0x1644/0x4858
[   32.678676]  kasan_atomics+0x198/0x2e0
[   32.678723]  kunit_try_run_case+0x170/0x3f0
[   32.679024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.679106]  kthread+0x328/0x630
[   32.679229]  ret_from_fork+0x10/0x20
[   32.679309] 
[   32.679537] Allocated by task 296:
[   32.679621]  kasan_save_stack+0x3c/0x68
[   32.679675]  kasan_save_track+0x20/0x40
[   32.679717]  kasan_save_alloc_info+0x40/0x58
[   32.679969]  __kasan_kmalloc+0xd4/0xd8
[   32.680059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.680188]  kasan_atomics+0xb8/0x2e0
[   32.680425]  kunit_try_run_case+0x170/0x3f0
[   32.680836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.681134]  kthread+0x328/0x630
[   32.681802]  ret_from_fork+0x10/0x20
[   32.681859] 
[   32.681881] The buggy address belongs to the object at fff00000c85f0e00
[   32.681881]  which belongs to the cache kmalloc-64 of size 64
[   32.682121] The buggy address is located 0 bytes to the right of
[   32.682121]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.682211] 
[   32.682333] The buggy address belongs to the physical page:
[   32.682410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.682551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.682621] page_type: f5(slab)
[   32.682911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.682988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.683032] page dumped because: kasan: bad access detected
[   32.683076] 
[   32.683097] Memory state around the buggy address:
[   32.683129]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.683411]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.683618] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.683682]                                      ^
[   32.684104]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.684227]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.684459] ==================================================================
[   32.380193] ==================================================================
[   32.380404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   32.380461] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.380520] 
[   32.380698] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.381024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.381223] Hardware name: linux,dummy-virt (DT)
[   32.381274] Call trace:
[   32.381462]  show_stack+0x20/0x38 (C)
[   32.381988]  print_report+0x118/0x5d0
[   32.383522]  ret_from_fork+0x10/0x20
[   32.385199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.385930] The buggy address is located 0 bytes to the right of
[   32.385930]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.386009] 
[   32.386043] The buggy address belongs to the physical page:
[   32.386382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.386485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.386639] page_type: f5(slab)
[   32.386724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.386835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.387362] page dumped because: kasan: bad access detected
[   32.387519] 
[   32.387608] Memory state around the buggy address:
[   32.387706]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.387995]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.388243] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.388361]                                      ^
[   32.388508]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.388582]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.388623] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   32.023967] ==================================================================
[   32.024032] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   32.024528] Write of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292
[   32.024604] 
[   32.024644] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.025083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.025217] Hardware name: linux,dummy-virt (DT)
[   32.025254] Call trace:
[   32.025297]  show_stack+0x20/0x38 (C)
[   32.025729]  dump_stack_lvl+0x8c/0xd0
[   32.025837]  print_report+0x118/0x5d0
[   32.025988]  kasan_report+0xdc/0x128
[   32.026064]  kasan_check_range+0x100/0x1a8
[   32.026207]  __kasan_check_write+0x20/0x30
[   32.026296]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   32.026372]  kasan_bitops_generic+0x110/0x1c8
[   32.026689]  kunit_try_run_case+0x170/0x3f0
[   32.026804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.026923]  kthread+0x328/0x630
[   32.027005]  ret_from_fork+0x10/0x20
[   32.027076] 
[   32.027099] Allocated by task 292:
[   32.027142]  kasan_save_stack+0x3c/0x68
[   32.027202]  kasan_save_track+0x20/0x40
[   32.027247]  kasan_save_alloc_info+0x40/0x58
[   32.027288]  __kasan_kmalloc+0xd4/0xd8
[   32.027747]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.027835]  kasan_bitops_generic+0xa0/0x1c8
[   32.028156]  kunit_try_run_case+0x170/0x3f0
[   32.028298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.028395]  kthread+0x328/0x630
[   32.028451]  ret_from_fork+0x10/0x20
[   32.028735] 
[   32.028821] The buggy address belongs to the object at fff00000c64c1b40
[   32.028821]  which belongs to the cache kmalloc-16 of size 16
[   32.028949] The buggy address is located 8 bytes inside of
[   32.028949]  allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49)
[   32.029306] 
[   32.029359] The buggy address belongs to the physical page:
[   32.029449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1
[   32.029683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.029881] page_type: f5(slab)
[   32.029956] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.030248] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000
[   32.030552] page dumped because: kasan: bad access detected
[   32.030681] 
[   32.030749] Memory state around the buggy address:
[   32.030863]  fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.030959]  fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.031122] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   32.031179]                                               ^
[   32.031342]  fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.031553]  fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.031653] ==================================================================
[   32.055799] ==================================================================
[   32.055930] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   32.055984] Write of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292
[   32.056036] 
[   32.056082] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.056167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.056312] Hardware name: linux,dummy-virt (DT)
[   32.056694] Call trace:
[   32.056922]  show_stack+0x20/0x38 (C)
[   32.057114]  dump_stack_lvl+0x8c/0xd0
[   32.057239]  print_report+0x118/0x5d0
[   32.057629]  kasan_report+0xdc/0x128
[   32.057763]  kasan_check_range+0x100/0x1a8
[   32.057954]  __kasan_check_write+0x20/0x30
[   32.058115]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   32.058235]  kasan_bitops_generic+0x110/0x1c8
[   32.058490]  kunit_try_run_case+0x170/0x3f0
[   32.058780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.058904]  kthread+0x328/0x630
[   32.059029]  ret_from_fork+0x10/0x20
[   32.059210] 
[   32.059233] Allocated by task 292:
[   32.059468]  kasan_save_stack+0x3c/0x68
[   32.059568]  kasan_save_track+0x20/0x40
[   32.059723]  kasan_save_alloc_info+0x40/0x58
[   32.059929]  __kasan_kmalloc+0xd4/0xd8
[   32.060099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.060227]  kasan_bitops_generic+0xa0/0x1c8
[   32.060902] 
[   32.062421] page_type: f5(slab)
[   32.062767] page dumped because: kasan: bad access detected
[   32.063668]                                               ^
[   32.065448] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   32.066380]  show_stack+0x20/0x38 (C)
[   32.066643]  kasan_check_range+0x100/0x1a8
[   32.067446]  kthread+0x328/0x630
[   32.068209]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.068428]  kthread+0x328/0x630
[   32.068891] 
[   32.069704] The buggy address is located 8 bytes inside of
[   32.069704]  allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49)
[   32.070996]  fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.072808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.073229] Call trace:
[   32.073298]  show_stack+0x20/0x38 (C)
[   32.074182]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   32.075489] Allocated by task 292:
[   32.076464]  kasan_bitops_generic+0xa0/0x1c8
[   32.076909]  kthread+0x328/0x630
[   32.077572] The buggy address is located 8 bytes inside of
[   32.077572]  allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49)
[   32.078967]  fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.080088] ==================================================================
[   32.048918] ==================================================================
[   32.048971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   32.049474] Read of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292
[   32.049546] 
[   32.049823] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.049927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.050024] Hardware name: linux,dummy-virt (DT)
[   32.050116] Call trace:
[   32.050461]  show_stack+0x20/0x38 (C)
[   32.050571]  dump_stack_lvl+0x8c/0xd0
[   32.050692]  print_report+0x118/0x5d0
[   32.050744]  kasan_report+0xdc/0x128
[   32.050789]  __asan_report_load8_noabort+0x20/0x30
[   32.050984]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   32.051070]  kasan_bitops_generic+0x110/0x1c8
[   32.051267]  kunit_try_run_case+0x170/0x3f0
[   32.051335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.051389]  kthread+0x328/0x630
[   32.051672]  ret_from_fork+0x10/0x20
[   32.051736] 
[   32.051816] Allocated by task 292:
[   32.051872]  kasan_save_stack+0x3c/0x68
[   32.051946]  kasan_save_track+0x20/0x40
[   32.052126]  kasan_save_alloc_info+0x40/0x58
[   32.052367]  __kasan_kmalloc+0xd4/0xd8
[   32.052480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.052832]  kasan_bitops_generic+0xa0/0x1c8
[   32.052948]  kunit_try_run_case+0x170/0x3f0
[   32.053070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.053186]  kthread+0x328/0x630
[   32.053384]  ret_from_fork+0x10/0x20
[   32.053564] 
[   32.053668] The buggy address belongs to the object at fff00000c64c1b40
[   32.053668]  which belongs to the cache kmalloc-16 of size 16
[   32.053750] The buggy address is located 8 bytes inside of
[   32.053750]  allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49)
[   32.053815] 
[   32.053981] The buggy address belongs to the physical page:
[   32.054028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1
[   32.054193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.054278] page_type: f5(slab)
[   32.054336] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.054391] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000
[   32.054445] page dumped because: kasan: bad access detected
[   32.054488] 
[   32.054510] Memory state around the buggy address:
[   32.054544]  fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.054590]  fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.054644] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   32.054699]                                               ^
[   32.054738]  fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.054781]  fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.054835] ==================================================================
[   32.039570] ==================================================================
[   32.039621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   32.039675] Write of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292
[   32.039808] 
[   32.039844] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.039932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.040222] Hardware name: linux,dummy-virt (DT)
[   32.040380] Call trace:
[   32.040454]  show_stack+0x20/0x38 (C)
[   32.040569]  dump_stack_lvl+0x8c/0xd0
[   32.040686]  print_report+0x118/0x5d0
[   32.040854]  kasan_report+0xdc/0x128
[   32.040908]  kasan_check_range+0x100/0x1a8
[   32.040954]  __kasan_check_write+0x20/0x30
[   32.041185]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   32.041382]  kasan_bitops_generic+0x110/0x1c8
[   32.041580]  kunit_try_run_case+0x170/0x3f0
[   32.041763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.041879]  kthread+0x328/0x630
[   32.042081]  ret_from_fork+0x10/0x20
[   32.042296] 
[   32.042384] Allocated by task 292:
[   32.042417]  kasan_save_stack+0x3c/0x68
[   32.042869]  kasan_save_track+0x20/0x40
[   32.043256]  kasan_save_alloc_info+0x40/0x58
[   32.043343]  __kasan_kmalloc+0xd4/0xd8
[   32.043406]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.043488]  kasan_bitops_generic+0xa0/0x1c8
[   32.043562]  kunit_try_run_case+0x170/0x3f0
[   32.044242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.044305]  kthread+0x328/0x630
[   32.044343]  ret_from_fork+0x10/0x20
[   32.044540] 
[   32.044789] The buggy address belongs to the object at fff00000c64c1b40
[   32.044789]  which belongs to the cache kmalloc-16 of size 16
[   32.044963] The buggy address is located 8 bytes inside of
[   32.044963]  allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49)
[   32.045098] 
[   32.045188] The buggy address belongs to the physical page:
[   32.045301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1
[   32.045404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.045952] page_type: f5(slab)
[   32.046128] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.046249] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000
[   32.046348] page dumped because: kasan: bad access detected
[   32.046477] 
[   32.046667] Memory state around the buggy address:
[   32.046734]  fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.046849]  fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.046922] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   32.047252]                                               ^
[   32.047460]  fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.047523]  fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.047689] ==================================================================
[   32.033722] ==================================================================
[   32.033798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   32.033857] Read of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292
[   32.033909] 
[   32.033941] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.034025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.034066] Hardware name: linux,dummy-virt (DT)
[   32.034099] Call trace:
[   32.034122]  show_stack+0x20/0x38 (C)
[   32.034182]  dump_stack_lvl+0x8c/0xd0
[   32.034232]  print_report+0x118/0x5d0
[   32.034276]  kasan_report+0xdc/0x128
[   32.034320]  __asan_report_load8_noabort+0x20/0x30
[   32.034380]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   32.034436]  kasan_bitops_generic+0x110/0x1c8
[   32.034487]  kunit_try_run_case+0x170/0x3f0
[   32.034537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.034589]  kthread+0x328/0x630
[   32.034632]  ret_from_fork+0x10/0x20
[   32.034689] 
[   32.034709] Allocated by task 292:
[   32.034741]  kasan_save_stack+0x3c/0x68
[   32.034782]  kasan_save_track+0x20/0x40
[   32.034821]  kasan_save_alloc_info+0x40/0x58
[   32.034860]  __kasan_kmalloc+0xd4/0xd8
[   32.034900]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.034942]  kasan_bitops_generic+0xa0/0x1c8
[   32.034984]  kunit_try_run_case+0x170/0x3f0
[   32.035025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.035713]  kthread+0x328/0x630
[   32.035775]  ret_from_fork+0x10/0x20
[   32.035825] 
[   32.035856] The buggy address belongs to the object at fff00000c64c1b40
[   32.035856]  which belongs to the cache kmalloc-16 of size 16
[   32.035918] The buggy address is located 8 bytes inside of
[   32.035918]  allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49)
[   32.035981] 
[   32.036203] The buggy address belongs to the physical page:
[   32.036304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1
[   32.036762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.036981] page_type: f5(slab)
[   32.037174] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.037332] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000
[   32.037432] page dumped because: kasan: bad access detected
[   32.037498] 
[   32.037521] Memory state around the buggy address:
[   32.037994]  fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.038169]  fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.038291] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   32.038378]                                               ^
[   32.038484]  fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.038797]  fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.038929] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   32.003528] ==================================================================
[   32.003853] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   32.004200] Read of size 1 at addr fff00000c65343d0 by task kunit_try_catch/290
[   32.004283] 
[   32.004427] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.004552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.004587] Hardware name: linux,dummy-virt (DT)
[   32.004618] Call trace:
[   32.004644]  show_stack+0x20/0x38 (C)
[   32.004850]  dump_stack_lvl+0x8c/0xd0
[   32.005079]  print_report+0x118/0x5d0
[   32.005163]  kasan_report+0xdc/0x128
[   32.005260]  __asan_report_load1_noabort+0x20/0x30
[   32.005443]  strnlen+0x80/0x88
[   32.005622]  kasan_strings+0x478/0xb00
[   32.005698]  kunit_try_run_case+0x170/0x3f0
[   32.005777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.006177]  kthread+0x328/0x630
[   32.006406]  ret_from_fork+0x10/0x20
[   32.006722] 
[   32.006892] Allocated by task 290:
[   32.006941]  kasan_save_stack+0x3c/0x68
[   32.007154]  kasan_save_track+0x20/0x40
[   32.007378]  kasan_save_alloc_info+0x40/0x58
[   32.007466]  __kasan_kmalloc+0xd4/0xd8
[   32.007579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.007685]  kasan_strings+0xc8/0xb00
[   32.007855]  kunit_try_run_case+0x170/0x3f0
[   32.007918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.007960]  kthread+0x328/0x630
[   32.008075]  ret_from_fork+0x10/0x20
[   32.008117] 
[   32.008150] Freed by task 290:
[   32.008183]  kasan_save_stack+0x3c/0x68
[   32.008471]  kasan_save_track+0x20/0x40
[   32.008647]  kasan_save_free_info+0x4c/0x78
[   32.008848]  __kasan_slab_free+0x6c/0x98
[   32.009081]  kfree+0x214/0x3c8
[   32.009158]  kasan_strings+0x24c/0xb00
[   32.009306]  kunit_try_run_case+0x170/0x3f0
[   32.009419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.009566]  kthread+0x328/0x630
[   32.009659]  ret_from_fork+0x10/0x20
[   32.009793] 
[   32.009816] The buggy address belongs to the object at fff00000c65343c0
[   32.009816]  which belongs to the cache kmalloc-32 of size 32
[   32.009923] The buggy address is located 16 bytes inside of
[   32.009923]  freed 32-byte region [fff00000c65343c0, fff00000c65343e0)
[   32.010423] 
[   32.010474] The buggy address belongs to the physical page:
[   32.010528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534
[   32.010753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.010812] page_type: f5(slab)
[   32.010988] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.011061] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.011104] page dumped because: kasan: bad access detected
[   32.011148] 
[   32.011180] Memory state around the buggy address:
[   32.011216]  fff00000c6534280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.011259]  fff00000c6534300: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.011315] >fff00000c6534380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.011365]                                                  ^
[   32.011409]  fff00000c6534400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.011461]  fff00000c6534480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.011502] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   31.993352] ==================================================================
[   31.993906] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   31.993981] Read of size 1 at addr fff00000c65343d0 by task kunit_try_catch/290
[   31.994293] 
[   31.994345] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.994557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.994683] Hardware name: linux,dummy-virt (DT)
[   31.994720] Call trace:
[   31.994786]  show_stack+0x20/0x38 (C)
[   31.994849]  dump_stack_lvl+0x8c/0xd0
[   31.995141]  print_report+0x118/0x5d0
[   31.995211]  kasan_report+0xdc/0x128
[   31.995437]  __asan_report_load1_noabort+0x20/0x30
[   31.995511]  strlen+0xa8/0xb0
[   31.995691]  kasan_strings+0x418/0xb00
[   31.995755]  kunit_try_run_case+0x170/0x3f0
[   31.995881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.996162]  kthread+0x328/0x630
[   31.996290]  ret_from_fork+0x10/0x20
[   31.996374] 
[   31.996413] Allocated by task 290:
[   31.996575]  kasan_save_stack+0x3c/0x68
[   31.996625]  kasan_save_track+0x20/0x40
[   31.996884]  kasan_save_alloc_info+0x40/0x58
[   31.997014]  __kasan_kmalloc+0xd4/0xd8
[   31.997156]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.997310]  kasan_strings+0xc8/0xb00
[   31.997365]  kunit_try_run_case+0x170/0x3f0
[   31.997593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.997748]  kthread+0x328/0x630
[   31.997810]  ret_from_fork+0x10/0x20
[   31.998187] 
[   31.998229] Freed by task 290:
[   31.998435]  kasan_save_stack+0x3c/0x68
[   31.998627]  kasan_save_track+0x20/0x40
[   31.998699]  kasan_save_free_info+0x4c/0x78
[   31.998899]  __kasan_slab_free+0x6c/0x98
[   31.999099]  kfree+0x214/0x3c8
[   31.999197]  kasan_strings+0x24c/0xb00
[   31.999237]  kunit_try_run_case+0x170/0x3f0
[   31.999415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.999460]  kthread+0x328/0x630
[   31.999850]  ret_from_fork+0x10/0x20
[   31.999948] 
[   31.999971] The buggy address belongs to the object at fff00000c65343c0
[   31.999971]  which belongs to the cache kmalloc-32 of size 32
[   32.000373] The buggy address is located 16 bytes inside of
[   32.000373]  freed 32-byte region [fff00000c65343c0, fff00000c65343e0)
[   32.000491] 
[   32.000527] The buggy address belongs to the physical page:
[   32.000585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534
[   32.000655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.000707] page_type: f5(slab)
[   32.000861] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.001121] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.001257] page dumped because: kasan: bad access detected
[   32.001346] 
[   32.001487] Memory state around the buggy address:
[   32.001547]  fff00000c6534280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.001920]  fff00000c6534300: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.001996] >fff00000c6534380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.002139]                                                  ^
[   32.002219]  fff00000c6534400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.002379]  fff00000c6534480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.002469] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   31.981467] ==================================================================
[   31.981520] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   31.981574] Read of size 1 at addr fff00000c65343d0 by task kunit_try_catch/290
[   31.981914] 
[   31.982138] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.982262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.982550] Hardware name: linux,dummy-virt (DT)
[   31.982636] Call trace:
[   31.982703]  show_stack+0x20/0x38 (C)
[   31.982757]  dump_stack_lvl+0x8c/0xd0
[   31.983115]  print_report+0x118/0x5d0
[   31.983191]  kasan_report+0xdc/0x128
[   31.983283]  __asan_report_load1_noabort+0x20/0x30
[   31.983337]  kasan_strings+0x95c/0xb00
[   31.983423]  kunit_try_run_case+0x170/0x3f0
[   31.983587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.983644]  kthread+0x328/0x630
[   31.983953]  ret_from_fork+0x10/0x20
[   31.984032] 
[   31.984068] Allocated by task 290:
[   31.984196]  kasan_save_stack+0x3c/0x68
[   31.984277]  kasan_save_track+0x20/0x40
[   31.984424]  kasan_save_alloc_info+0x40/0x58
[   31.984491]  __kasan_kmalloc+0xd4/0xd8
[   31.984561]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.984605]  kasan_strings+0xc8/0xb00
[   31.984778]  kunit_try_run_case+0x170/0x3f0
[   31.985111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.985230]  kthread+0x328/0x630
[   31.985348]  ret_from_fork+0x10/0x20
[   31.985447] 
[   31.985503] Freed by task 290:
[   31.985595]  kasan_save_stack+0x3c/0x68
[   31.985692]  kasan_save_track+0x20/0x40
[   31.985733]  kasan_save_free_info+0x4c/0x78
[   31.985955]  __kasan_slab_free+0x6c/0x98
[   31.986031]  kfree+0x214/0x3c8
[   31.986221]  kasan_strings+0x24c/0xb00
[   31.986316]  kunit_try_run_case+0x170/0x3f0
[   31.986396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.987173]  kthread+0x328/0x630
[   31.987271]  ret_from_fork+0x10/0x20
[   31.987781] 
[   31.988063] The buggy address belongs to the object at fff00000c65343c0
[   31.988063]  which belongs to the cache kmalloc-32 of size 32
[   31.988332] The buggy address is located 16 bytes inside of
[   31.988332]  freed 32-byte region [fff00000c65343c0, fff00000c65343e0)
[   31.988396] 
[   31.988573] The buggy address belongs to the physical page:
[   31.988625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534
[   31.988787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.989100] page_type: f5(slab)
[   31.989405] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.989645] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.989872] page dumped because: kasan: bad access detected
[   31.990212] 
[   31.990303] Memory state around the buggy address:
[   31.990383]  fff00000c6534280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.990508]  fff00000c6534300: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.990584] >fff00000c6534380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.990710]                                                  ^
[   31.990768]  fff00000c6534400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.990834]  fff00000c6534480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.990947] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   31.974645] ==================================================================
[   31.974706] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   31.975008] Read of size 1 at addr fff00000c65343d0 by task kunit_try_catch/290
[   31.975549] 
[   31.975773] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.975872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.975996] Hardware name: linux,dummy-virt (DT)
[   31.976060] Call trace:
[   31.976124]  show_stack+0x20/0x38 (C)
[   31.976278]  dump_stack_lvl+0x8c/0xd0
[   31.976331]  print_report+0x118/0x5d0
[   31.976691]  kasan_report+0xdc/0x128
[   31.976771]  __asan_report_load1_noabort+0x20/0x30
[   31.976885]  strcmp+0xc0/0xc8
[   31.976997]  kasan_strings+0x340/0xb00
[   31.977190]  kunit_try_run_case+0x170/0x3f0
[   31.977252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.977304]  kthread+0x328/0x630
[   31.977347]  ret_from_fork+0x10/0x20
[   31.977398] 
[   31.977457] Allocated by task 290:
[   31.977513]  kasan_save_stack+0x3c/0x68
[   31.977567]  kasan_save_track+0x20/0x40
[   31.977614]  kasan_save_alloc_info+0x40/0x58
[   31.977656]  __kasan_kmalloc+0xd4/0xd8
[   31.977697]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.977740]  kasan_strings+0xc8/0xb00
[   31.977778]  kunit_try_run_case+0x170/0x3f0
[   31.977818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.977865]  kthread+0x328/0x630
[   31.977899]  ret_from_fork+0x10/0x20
[   31.977936] 
[   31.977967] Freed by task 290:
[   31.977995]  kasan_save_stack+0x3c/0x68
[   31.978044]  kasan_save_track+0x20/0x40
[   31.978099]  kasan_save_free_info+0x4c/0x78
[   31.978148]  __kasan_slab_free+0x6c/0x98
[   31.978190]  kfree+0x214/0x3c8
[   31.978228]  kasan_strings+0x24c/0xb00
[   31.978265]  kunit_try_run_case+0x170/0x3f0
[   31.978316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.978364]  kthread+0x328/0x630
[   31.978400]  ret_from_fork+0x10/0x20
[   31.978438] 
[   31.978470] The buggy address belongs to the object at fff00000c65343c0
[   31.978470]  which belongs to the cache kmalloc-32 of size 32
[   31.978536] The buggy address is located 16 bytes inside of
[   31.978536]  freed 32-byte region [fff00000c65343c0, fff00000c65343e0)
[   31.978605] 
[   31.978635] The buggy address belongs to the physical page:
[   31.978675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534
[   31.978758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.978832] page_type: f5(slab)
[   31.978878] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.978930] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.978981] page dumped because: kasan: bad access detected
[   31.979025] 
[   31.979737] Memory state around the buggy address:
[   31.979829]  fff00000c6534280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.979888]  fff00000c6534300: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.979998] >fff00000c6534380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.980040]                                                  ^
[   31.980094]  fff00000c6534400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.980467]  fff00000c6534480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.980685] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   31.947794] ==================================================================
[   31.948011] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   31.948125] Read of size 1 at addr fff00000c6534218 by task kunit_try_catch/288
[   31.948283] 
[   31.948327] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.948435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.948465] Hardware name: linux,dummy-virt (DT)
[   31.948509] Call trace:
[   31.948536]  show_stack+0x20/0x38 (C)
[   31.948941]  dump_stack_lvl+0x8c/0xd0
[   31.949120]  print_report+0x118/0x5d0
[   31.949237]  kasan_report+0xdc/0x128
[   31.949381]  __asan_report_load1_noabort+0x20/0x30
[   31.949494]  memcmp+0x198/0x1d8
[   31.949584]  kasan_memcmp+0x16c/0x300
[   31.949852]  kunit_try_run_case+0x170/0x3f0
[   31.950029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.950165]  kthread+0x328/0x630
[   31.950212]  ret_from_fork+0x10/0x20
[   31.950274] 
[   31.950303] Allocated by task 288:
[   31.950343]  kasan_save_stack+0x3c/0x68
[   31.950390]  kasan_save_track+0x20/0x40
[   31.950439]  kasan_save_alloc_info+0x40/0x58
[   31.950477]  __kasan_kmalloc+0xd4/0xd8
[   31.950526]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.950573]  kasan_memcmp+0xbc/0x300
[   31.950619]  kunit_try_run_case+0x170/0x3f0
[   31.950659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.950726]  kthread+0x328/0x630
[   31.950760]  ret_from_fork+0x10/0x20
[   31.950798] 
[   31.950828] The buggy address belongs to the object at fff00000c6534200
[   31.950828]  which belongs to the cache kmalloc-32 of size 32
[   31.950897] The buggy address is located 0 bytes to the right of
[   31.950897]  allocated 24-byte region [fff00000c6534200, fff00000c6534218)
[   31.950968] 
[   31.951008] The buggy address belongs to the physical page:
[   31.951069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534
[   31.951401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.951732] page_type: f5(slab)
[   31.951852] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.951967] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.952198] page dumped because: kasan: bad access detected
[   31.952600] 
[   31.952665] Memory state around the buggy address:
[   31.952794]  fff00000c6534100: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   31.952871]  fff00000c6534180: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.952937] >fff00000c6534200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.953128]                             ^
[   31.953315]  fff00000c6534280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.953367]  fff00000c6534300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.953499] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   31.922418] ==================================================================
[   31.922670] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   31.922891] Read of size 1 at addr ffff800080b77b4a by task kunit_try_catch/284
[   31.922983] 
[   31.923269] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.923370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.923616] Hardware name: linux,dummy-virt (DT)
[   31.923694] Call trace:
[   31.923721]  show_stack+0x20/0x38 (C)
[   31.923775]  dump_stack_lvl+0x8c/0xd0
[   31.923931]  print_report+0x310/0x5d0
[   31.923988]  kasan_report+0xdc/0x128
[   31.924034]  __asan_report_load1_noabort+0x20/0x30
[   31.924116]  kasan_alloca_oob_right+0x2dc/0x340
[   31.924167]  kunit_try_run_case+0x170/0x3f0
[   31.924362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.924460]  kthread+0x328/0x630
[   31.924586]  ret_from_fork+0x10/0x20
[   31.924641] 
[   31.924935] The buggy address belongs to stack of task kunit_try_catch/284
[   31.925109] 
[   31.925169] The buggy address ffff800080b77b4a belongs to a vmalloc virtual mapping
[   31.925279] The buggy address belongs to the physical page:
[   31.925316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1d
[   31.925734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.925838] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.925906] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.926125] page dumped because: kasan: bad access detected
[   31.926543] 
[   31.926594] Memory state around the buggy address:
[   31.926722]  ffff800080b77a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.926808]  ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.927096] >ffff800080b77b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   31.927252]                                               ^
[   31.927311]  ffff800080b77b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   31.927478]  ffff800080b77c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   31.927666] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   31.907536] ==================================================================
[   31.907612] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   31.907670] Read of size 1 at addr ffff800080b77b5f by task kunit_try_catch/282
[   31.907722] 
[   31.907756] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.907870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.907899] Hardware name: linux,dummy-virt (DT)
[   31.907933] Call trace:
[   31.907965]  show_stack+0x20/0x38 (C)
[   31.908017]  dump_stack_lvl+0x8c/0xd0
[   31.908923]  print_report+0x310/0x5d0
[   31.909399]  kasan_report+0xdc/0x128
[   31.909583]  __asan_report_load1_noabort+0x20/0x30
[   31.909718]  kasan_alloca_oob_left+0x2b8/0x310
[   31.909772]  kunit_try_run_case+0x170/0x3f0
[   31.910008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.910131]  kthread+0x328/0x630
[   31.910302]  ret_from_fork+0x10/0x20
[   31.910445] 
[   31.910516] The buggy address belongs to stack of task kunit_try_catch/282
[   31.910664] 
[   31.910706] The buggy address ffff800080b77b5f belongs to a vmalloc virtual mapping
[   31.911071] The buggy address belongs to the physical page:
[   31.911152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1d
[   31.911277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.911395] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.911551] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.911640] page dumped because: kasan: bad access detected
[   31.911965] 
[   31.912098] Memory state around the buggy address:
[   31.912164]  ffff800080b77a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.912308]  ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.912390] >ffff800080b77b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   31.912554]                                                     ^
[   31.912763]  ffff800080b77b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   31.912828]  ffff800080b77c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   31.913156] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   31.893191] ==================================================================
[   31.893426] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   31.893505] Read of size 1 at addr ffff800080b77c2a by task kunit_try_catch/280
[   31.893558] 
[   31.893609] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.893699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.893886] Hardware name: linux,dummy-virt (DT)
[   31.893962] Call trace:
[   31.894000]  show_stack+0x20/0x38 (C)
[   31.894131]  dump_stack_lvl+0x8c/0xd0
[   31.894183]  print_report+0x310/0x5d0
[   31.894582]  kasan_report+0xdc/0x128
[   31.894725]  __asan_report_load1_noabort+0x20/0x30
[   31.894829]  kasan_stack_oob+0x238/0x270
[   31.894906]  kunit_try_run_case+0x170/0x3f0
[   31.895122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.895193]  kthread+0x328/0x630
[   31.895239]  ret_from_fork+0x10/0x20
[   31.895421] 
[   31.895612] The buggy address belongs to stack of task kunit_try_catch/280
[   31.895738]  and is located at offset 138 in frame:
[   31.896059]  kasan_stack_oob+0x0/0x270
[   31.896351] 
[   31.897169] This frame has 4 objects:
[   31.897322]  [48, 49) '__assertion'
[   31.897402]  [64, 72) 'array'
[   31.897447]  [96, 112) '__assertion'
[   31.897511]  [128, 138) 'stack_array'
[   31.897570] 
[   31.897612] The buggy address ffff800080b77c2a belongs to a vmalloc virtual mapping
[   31.897676] The buggy address belongs to the physical page:
[   31.897738] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1d
[   31.897797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.897883] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.897935] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.897978] page dumped because: kasan: bad access detected
[   31.898026] 
[   31.898061] Memory state around the buggy address:
[   31.898354]  ffff800080b77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.898453]  ffff800080b77b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   31.898642] >ffff800080b77c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   31.898917]                                   ^
[   31.899480]  ffff800080b77c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   31.899557]  ffff800080b77d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   31.899652] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   31.867781] ==================================================================
[   31.868105] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   31.868451] Read of size 1 at addr ffffb0785134e6cd by task kunit_try_catch/276
[   31.868637] 
[   31.868787] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.868892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.869156] Hardware name: linux,dummy-virt (DT)
[   31.869275] Call trace:
[   31.869567]  show_stack+0x20/0x38 (C)
[   31.869679]  dump_stack_lvl+0x8c/0xd0
[   31.869844]  print_report+0x310/0x5d0
[   31.869944]  kasan_report+0xdc/0x128
[   31.870031]  __asan_report_load1_noabort+0x20/0x30
[   31.870096]  kasan_global_oob_right+0x230/0x270
[   31.870159]  kunit_try_run_case+0x170/0x3f0
[   31.870216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.870279]  kthread+0x328/0x630
[   31.870332]  ret_from_fork+0x10/0x20
[   31.870405] 
[   31.870483] The buggy address belongs to the variable:
[   31.870540]  global_array+0xd/0x40
[   31.870615] 
[   31.870673] The buggy address ffffb0785134e6cd belongs to a vmalloc virtual mapping
[   31.870781] The buggy address belongs to the physical page:
[   31.870826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4e
[   31.870885] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   31.870957] raw: 03fffe0000002000 ffffc1ffc01f5388 ffffc1ffc01f5388 0000000000000000
[   31.871010] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.871319] page dumped because: kasan: bad access detected
[   31.871641] 
[   31.871857] Memory state around the buggy address:
[   31.871936]  ffffb0785134e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.872292]  ffffb0785134e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.872601] >ffffb0785134e680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   31.872755]                                               ^
[   31.872847]  ffffb0785134e700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   31.873154]  ffffb0785134e780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   31.873283] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   31.853582] ==================================================================
[   31.853654] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.853713] Free of addr fff00000c9c08001 by task kunit_try_catch/274
[   31.853759] 
[   31.853794] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.853878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.853903] Hardware name: linux,dummy-virt (DT)
[   31.853935] Call trace:
[   31.853957]  show_stack+0x20/0x38 (C)
[   31.854074]  dump_stack_lvl+0x8c/0xd0
[   31.854140]  print_report+0x118/0x5d0
[   31.854186]  kasan_report_invalid_free+0xc0/0xe8
[   31.854232]  __kasan_mempool_poison_object+0xfc/0x150
[   31.854285]  mempool_free+0x28c/0x328
[   31.854340]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.854391]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   31.854443]  kunit_try_run_case+0x170/0x3f0
[   31.854492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.854548]  kthread+0x328/0x630
[   31.854591]  ret_from_fork+0x10/0x20
[   31.854646] 
[   31.854676] The buggy address belongs to the physical page:
[   31.854709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c08
[   31.854773] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.854821] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.854883] page_type: f8(unknown)
[   31.854922] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.854978] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.855028] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.855885] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.856159] head: 0bfffe0000000002 ffffc1ffc3270201 00000000ffffffff 00000000ffffffff
[   31.856284] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.856370] page dumped because: kasan: bad access detected
[   31.856455] 
[   31.856759] Memory state around the buggy address:
[   31.856830]  fff00000c9c07f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.856977]  fff00000c9c07f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.857106] >fff00000c9c08000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.857339]                    ^
[   31.857422]  fff00000c9c08080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.857571]  fff00000c9c08100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.857976] ==================================================================
[   31.833790] ==================================================================
[   31.833862] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.833948] Free of addr fff00000c85fca01 by task kunit_try_catch/272
[   31.833992] 
[   31.834038] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.834136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.834171] Hardware name: linux,dummy-virt (DT)
[   31.834204] Call trace:
[   31.834235]  show_stack+0x20/0x38 (C)
[   31.834284]  dump_stack_lvl+0x8c/0xd0
[   31.834332]  print_report+0x118/0x5d0
[   31.834376]  kasan_report_invalid_free+0xc0/0xe8
[   31.834422]  check_slab_allocation+0xfc/0x108
[   31.834478]  __kasan_mempool_poison_object+0x78/0x150
[   31.834532]  mempool_free+0x28c/0x328
[   31.834576]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.834629]  mempool_kmalloc_invalid_free+0xc0/0x118
[   31.834684]  kunit_try_run_case+0x170/0x3f0
[   31.834731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.834781]  kthread+0x328/0x630
[   31.834824]  ret_from_fork+0x10/0x20
[   31.834873] 
[   31.834897] Allocated by task 272:
[   31.834925]  kasan_save_stack+0x3c/0x68
[   31.834965]  kasan_save_track+0x20/0x40
[   31.835004]  kasan_save_alloc_info+0x40/0x58
[   31.835962]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.836067]  remove_element+0x130/0x1f8
[   31.836130]  mempool_alloc_preallocated+0x58/0xc0
[   31.836183]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   31.836261]  mempool_kmalloc_invalid_free+0xc0/0x118
[   31.836443]  kunit_try_run_case+0x170/0x3f0
[   31.836493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.836535]  kthread+0x328/0x630
[   31.836568]  ret_from_fork+0x10/0x20
[   31.836976] 
[   31.837070] The buggy address belongs to the object at fff00000c85fca00
[   31.837070]  which belongs to the cache kmalloc-128 of size 128
[   31.837433] The buggy address is located 1 bytes inside of
[   31.837433]  128-byte region [fff00000c85fca00, fff00000c85fca80)
[   31.837602] 
[   31.837682] The buggy address belongs to the physical page:
[   31.837993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   31.838079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.838247] page_type: f5(slab)
[   31.838343] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.838706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.838839] page dumped because: kasan: bad access detected
[   31.838899] 
[   31.839205] Memory state around the buggy address:
[   31.839291]  fff00000c85fc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.839367]  fff00000c85fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.839508] >fff00000c85fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.839585]                    ^
[   31.839614]  fff00000c85fca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.839986]  fff00000c85fcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.840069] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   31.798164] ==================================================================
[   31.798271] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.798418] Free of addr fff00000c9c04000 by task kunit_try_catch/268
[   31.798486] 
[   31.798543] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.798783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.798816] Hardware name: linux,dummy-virt (DT)
[   31.798847] Call trace:
[   31.798877]  show_stack+0x20/0x38 (C)
[   31.799146]  dump_stack_lvl+0x8c/0xd0
[   31.799354]  print_report+0x118/0x5d0
[   31.799655]  kasan_report_invalid_free+0xc0/0xe8
[   31.799727]  __kasan_mempool_poison_object+0x14c/0x150
[   31.799780]  mempool_free+0x28c/0x328
[   31.799879]  mempool_double_free_helper+0x150/0x2e8
[   31.799966]  mempool_kmalloc_large_double_free+0xc0/0x118
[   31.800020]  kunit_try_run_case+0x170/0x3f0
[   31.800157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.800238]  kthread+0x328/0x630
[   31.800699]  ret_from_fork+0x10/0x20
[   31.800811] 
[   31.801277] The buggy address belongs to the physical page:
[   31.801351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c04
[   31.801431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.801489] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.801806] page_type: f8(unknown)
[   31.801960] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.802704] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.802776] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.802853] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.802937] head: 0bfffe0000000002 ffffc1ffc3270101 00000000ffffffff 00000000ffffffff
[   31.803255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.803372] page dumped because: kasan: bad access detected
[   31.803487] 
[   31.803541] Memory state around the buggy address:
[   31.803622]  fff00000c9c03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.803788]  fff00000c9c03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.803867] >fff00000c9c04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.804160]                    ^
[   31.804263]  fff00000c9c04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.804336]  fff00000c9c04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.804428] ==================================================================
[   31.817115] ==================================================================
[   31.817181] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.817245] Free of addr fff00000c9c04000 by task kunit_try_catch/270
[   31.817288] 
[   31.817756] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.817900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.818068] Hardware name: linux,dummy-virt (DT)
[   31.818159] Call trace:
[   31.818205]  show_stack+0x20/0x38 (C)
[   31.818280]  dump_stack_lvl+0x8c/0xd0
[   31.818665]  print_report+0x118/0x5d0
[   31.818786]  kasan_report_invalid_free+0xc0/0xe8
[   31.818872]  __kasan_mempool_poison_pages+0xe0/0xe8
[   31.819011]  mempool_free+0x24c/0x328
[   31.819110]  mempool_double_free_helper+0x150/0x2e8
[   31.819472]  mempool_page_alloc_double_free+0xbc/0x118
[   31.819605]  kunit_try_run_case+0x170/0x3f0
[   31.819930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.820098]  kthread+0x328/0x630
[   31.820268]  ret_from_fork+0x10/0x20
[   31.820347] 
[   31.820409] The buggy address belongs to the physical page:
[   31.820527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c04
[   31.820598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.820673] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.821032] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.821165] page dumped because: kasan: bad access detected
[   31.821302] 
[   31.821355] Memory state around the buggy address:
[   31.821432]  fff00000c9c03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.821580]  fff00000c9c03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.821633] >fff00000c9c04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.822099]                    ^
[   31.822231]  fff00000c9c04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.822352]  fff00000c9c04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.822477] ==================================================================
[   31.775992] ==================================================================
[   31.776540] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.776872] Free of addr fff00000c85fc600 by task kunit_try_catch/266
[   31.777226] 
[   31.777269] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.777659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.777700] Hardware name: linux,dummy-virt (DT)
[   31.777769] Call trace:
[   31.778119]  show_stack+0x20/0x38 (C)
[   31.778526]  dump_stack_lvl+0x8c/0xd0
[   31.778665]  print_report+0x118/0x5d0
[   31.778744]  kasan_report_invalid_free+0xc0/0xe8
[   31.779119]  check_slab_allocation+0xd4/0x108
[   31.779273]  __kasan_mempool_poison_object+0x78/0x150
[   31.779329]  mempool_free+0x28c/0x328
[   31.779680]  mempool_double_free_helper+0x150/0x2e8
[   31.779763]  mempool_kmalloc_double_free+0xc0/0x118
[   31.779848]  kunit_try_run_case+0x170/0x3f0
[   31.780247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.780415]  kthread+0x328/0x630
[   31.780494]  ret_from_fork+0x10/0x20
[   31.780562] 
[   31.780580] Allocated by task 266:
[   31.780887]  kasan_save_stack+0x3c/0x68
[   31.780982]  kasan_save_track+0x20/0x40
[   31.781141]  kasan_save_alloc_info+0x40/0x58
[   31.781220]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.781519]  remove_element+0x130/0x1f8
[   31.781742]  mempool_alloc_preallocated+0x58/0xc0
[   31.781803]  mempool_double_free_helper+0x94/0x2e8
[   31.782031]  mempool_kmalloc_double_free+0xc0/0x118
[   31.782230]  kunit_try_run_case+0x170/0x3f0
[   31.782354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.782417]  kthread+0x328/0x630
[   31.782733]  ret_from_fork+0x10/0x20
[   31.782808] 
[   31.782857] Freed by task 266:
[   31.783003]  kasan_save_stack+0x3c/0x68
[   31.783089]  kasan_save_track+0x20/0x40
[   31.783351]  kasan_save_free_info+0x4c/0x78
[   31.783566]  __kasan_mempool_poison_object+0xc0/0x150
[   31.783690]  mempool_free+0x28c/0x328
[   31.783880]  mempool_double_free_helper+0x100/0x2e8
[   31.784072]  mempool_kmalloc_double_free+0xc0/0x118
[   31.784147]  kunit_try_run_case+0x170/0x3f0
[   31.784365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.784598]  kthread+0x328/0x630
[   31.784686]  ret_from_fork+0x10/0x20
[   31.784798] 
[   31.784851] The buggy address belongs to the object at fff00000c85fc600
[   31.784851]  which belongs to the cache kmalloc-128 of size 128
[   31.784972] The buggy address is located 0 bytes inside of
[   31.784972]  128-byte region [fff00000c85fc600, fff00000c85fc680)
[   31.785097] 
[   31.785148] The buggy address belongs to the physical page:
[   31.785180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   31.785246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.785294] page_type: f5(slab)
[   31.785335] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.785394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.785434] page dumped because: kasan: bad access detected
[   31.785465] 
[   31.785482] Memory state around the buggy address:
[   31.785520]  fff00000c85fc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.785578]  fff00000c85fc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.785636] >fff00000c85fc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.785673]                    ^
[   31.785715]  fff00000c85fc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.785758]  fff00000c85fc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.785805] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   31.762498] ==================================================================
[   31.762569] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   31.762948] Read of size 1 at addr fff00000c9c04000 by task kunit_try_catch/264
[   31.763074] 
[   31.763128] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.763583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.763648] Hardware name: linux,dummy-virt (DT)
[   31.763728] Call trace:
[   31.763759]  show_stack+0x20/0x38 (C)
[   31.763831]  dump_stack_lvl+0x8c/0xd0
[   31.763899]  print_report+0x118/0x5d0
[   31.763944]  kasan_report+0xdc/0x128
[   31.763987]  __asan_report_load1_noabort+0x20/0x30
[   31.764390]  mempool_uaf_helper+0x314/0x340
[   31.764471]  mempool_page_alloc_uaf+0xc0/0x118
[   31.764588]  kunit_try_run_case+0x170/0x3f0
[   31.764657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.764716]  kthread+0x328/0x630
[   31.765124]  ret_from_fork+0x10/0x20
[   31.765255] 
[   31.765281] The buggy address belongs to the physical page:
[   31.765346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c04
[   31.765420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.765800] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.766193] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.766257] page dumped because: kasan: bad access detected
[   31.766294] 
[   31.766313] Memory state around the buggy address:
[   31.766480]  fff00000c9c03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.766684]  fff00000c9c03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.766760] >fff00000c9c04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.766821]                    ^
[   31.766926]  fff00000c9c04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.767079]  fff00000c9c04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.767272] ==================================================================
[   31.695443] ==================================================================
[   31.695626] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   31.695712] Read of size 1 at addr fff00000c9c00000 by task kunit_try_catch/260
[   31.695764] 
[   31.695958] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.696095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.696199] Hardware name: linux,dummy-virt (DT)
[   31.696252] Call trace:
[   31.696355]  show_stack+0x20/0x38 (C)
[   31.696413]  dump_stack_lvl+0x8c/0xd0
[   31.696476]  print_report+0x118/0x5d0
[   31.696525]  kasan_report+0xdc/0x128
[   31.696603]  __asan_report_load1_noabort+0x20/0x30
[   31.697007]  mempool_uaf_helper+0x314/0x340
[   31.697086]  mempool_kmalloc_large_uaf+0xc4/0x120
[   31.697142]  kunit_try_run_case+0x170/0x3f0
[   31.697190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.697277]  kthread+0x328/0x630
[   31.697322]  ret_from_fork+0x10/0x20
[   31.697377] 
[   31.697410] The buggy address belongs to the physical page:
[   31.697445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c00
[   31.697512] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.697577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.697646] page_type: f8(unknown)
[   31.697690] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.697742] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.697792] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.697840] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.697889] head: 0bfffe0000000002 ffffc1ffc3270001 00000000ffffffff 00000000ffffffff
[   31.697951] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.697993] page dumped because: kasan: bad access detected
[   31.698025] 
[   31.698044] Memory state around the buggy address:
[   31.698103]  fff00000c9bfff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.698145]  fff00000c9bfff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.698186] >fff00000c9c00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.698224]                    ^
[   31.698258]  fff00000c9c00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.698300]  fff00000c9c00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.698357] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   31.682718] ==================================================================
[   31.682811] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   31.682891] Read of size 1 at addr fff00000c85fc200 by task kunit_try_catch/258
[   31.682944] 
[   31.682987] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.683096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.683125] Hardware name: linux,dummy-virt (DT)
[   31.683160] Call trace:
[   31.683185]  show_stack+0x20/0x38 (C)
[   31.683237]  dump_stack_lvl+0x8c/0xd0
[   31.683287]  print_report+0x118/0x5d0
[   31.683330]  kasan_report+0xdc/0x128
[   31.683373]  __asan_report_load1_noabort+0x20/0x30
[   31.683421]  mempool_uaf_helper+0x314/0x340
[   31.683467]  mempool_kmalloc_uaf+0xc4/0x120
[   31.683514]  kunit_try_run_case+0x170/0x3f0
[   31.683567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.683616]  kthread+0x328/0x630
[   31.683658]  ret_from_fork+0x10/0x20
[   31.683705] 
[   31.683725] Allocated by task 258:
[   31.683753]  kasan_save_stack+0x3c/0x68
[   31.683795]  kasan_save_track+0x20/0x40
[   31.683832]  kasan_save_alloc_info+0x40/0x58
[   31.683871]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.683912]  remove_element+0x130/0x1f8
[   31.683950]  mempool_alloc_preallocated+0x58/0xc0
[   31.683990]  mempool_uaf_helper+0xa4/0x340
[   31.684027]  mempool_kmalloc_uaf+0xc4/0x120
[   31.684075]  kunit_try_run_case+0x170/0x3f0
[   31.684113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.684155]  kthread+0x328/0x630
[   31.684204]  ret_from_fork+0x10/0x20
[   31.684242] 
[   31.684274] Freed by task 258:
[   31.684301]  kasan_save_stack+0x3c/0x68
[   31.684339]  kasan_save_track+0x20/0x40
[   31.684378]  kasan_save_free_info+0x4c/0x78
[   31.684414]  __kasan_mempool_poison_object+0xc0/0x150
[   31.684457]  mempool_free+0x28c/0x328
[   31.684494]  mempool_uaf_helper+0x104/0x340
[   31.684531]  mempool_kmalloc_uaf+0xc4/0x120
[   31.684570]  kunit_try_run_case+0x170/0x3f0
[   31.684608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.684650]  kthread+0x328/0x630
[   31.684682]  ret_from_fork+0x10/0x20
[   31.684719] 
[   31.684739] The buggy address belongs to the object at fff00000c85fc200
[   31.684739]  which belongs to the cache kmalloc-128 of size 128
[   31.684798] The buggy address is located 0 bytes inside of
[   31.684798]  freed 128-byte region [fff00000c85fc200, fff00000c85fc280)
[   31.684857] 
[   31.684881] The buggy address belongs to the physical page:
[   31.684913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   31.684970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.685022] page_type: f5(slab)
[   31.685075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.685125] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.685166] page dumped because: kasan: bad access detected
[   31.685198] 
[   31.685216] Memory state around the buggy address:
[   31.685250]  fff00000c85fc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.685292]  fff00000c85fc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.685334] >fff00000c85fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.685374]                    ^
[   31.685402]  fff00000c85fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.685445]  fff00000c85fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.685483] ==================================================================
[   31.711947] ==================================================================
[   31.712020] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   31.712090] Read of size 1 at addr fff00000c85de240 by task kunit_try_catch/262
[   31.712140] 
[   31.712178] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.713208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.713347] Hardware name: linux,dummy-virt (DT)
[   31.713503] Call trace:
[   31.713556]  show_stack+0x20/0x38 (C)
[   31.713638]  dump_stack_lvl+0x8c/0xd0
[   31.714425]  print_report+0x118/0x5d0
[   31.714508]  kasan_report+0xdc/0x128
[   31.714555]  __asan_report_load1_noabort+0x20/0x30
[   31.714660]  mempool_uaf_helper+0x314/0x340
[   31.714723]  mempool_slab_uaf+0xc0/0x118
[   31.714770]  kunit_try_run_case+0x170/0x3f0
[   31.714819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.714878]  kthread+0x328/0x630
[   31.714936]  ret_from_fork+0x10/0x20
[   31.714993] 
[   31.715013] Allocated by task 262:
[   31.715064]  kasan_save_stack+0x3c/0x68
[   31.715111]  kasan_save_track+0x20/0x40
[   31.715151]  kasan_save_alloc_info+0x40/0x58
[   31.715189]  __kasan_mempool_unpoison_object+0xbc/0x180
[   31.715231]  remove_element+0x16c/0x1f8
[   31.715279]  mempool_alloc_preallocated+0x58/0xc0
[   31.715325]  mempool_uaf_helper+0xa4/0x340
[   31.715372]  mempool_slab_uaf+0xc0/0x118
[   31.715416]  kunit_try_run_case+0x170/0x3f0
[   31.715454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.715496]  kthread+0x328/0x630
[   31.715528]  ret_from_fork+0x10/0x20
[   31.715582] 
[   31.715602] Freed by task 262:
[   31.715635]  kasan_save_stack+0x3c/0x68
[   31.715674]  kasan_save_track+0x20/0x40
[   31.715721]  kasan_save_free_info+0x4c/0x78
[   31.715758]  __kasan_mempool_poison_object+0xc0/0x150
[   31.715810]  mempool_free+0x28c/0x328
[   31.715847]  mempool_uaf_helper+0x104/0x340
[   31.715885]  mempool_slab_uaf+0xc0/0x118
[   31.715921]  kunit_try_run_case+0x170/0x3f0
[   31.715975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.716023]  kthread+0x328/0x630
[   31.716087]  ret_from_fork+0x10/0x20
[   31.716479] 
[   31.716504] The buggy address belongs to the object at fff00000c85de240
[   31.716504]  which belongs to the cache test_cache of size 123
[   31.717312] The buggy address is located 0 bytes inside of
[   31.717312]  freed 123-byte region [fff00000c85de240, fff00000c85de2bb)
[   31.717596] 
[   31.717638] The buggy address belongs to the physical page:
[   31.718132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085de
[   31.718244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.718434] page_type: f5(slab)
[   31.718522] raw: 0bfffe0000000000 fff00000c5687b40 dead000000000122 0000000000000000
[   31.718681] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   31.718782] page dumped because: kasan: bad access detected
[   31.719164] 
[   31.719225] Memory state around the buggy address:
[   31.719309]  fff00000c85de100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.719482]  fff00000c85de180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.719528] >fff00000c85de200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   31.719960]                                            ^
[   31.720014]  fff00000c85de280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.720376]  fff00000c85de300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.720501] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   31.614404] ==================================================================
[   31.614910] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.615121] Read of size 1 at addr fff00000c85fc2bb by task kunit_try_catch/256
[   31.615379] 
[   31.615824] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.615970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.616033] Hardware name: linux,dummy-virt (DT)
[   31.616092] Call trace:
[   31.616183]  show_stack+0x20/0x38 (C)
[   31.616278]  dump_stack_lvl+0x8c/0xd0
[   31.616365]  print_report+0x118/0x5d0
[   31.617073]  kasan_report+0xdc/0x128
[   31.617629]  __asan_report_load1_noabort+0x20/0x30
[   31.617691]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.617740]  mempool_slab_oob_right+0xc0/0x118
[   31.618387]  kunit_try_run_case+0x170/0x3f0
[   31.619420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.619481]  kthread+0x328/0x630
[   31.619823]  ret_from_fork+0x10/0x20
[   31.619882] 
[   31.619902] Allocated by task 256:
[   31.619933]  kasan_save_stack+0x3c/0x68
[   31.619976]  kasan_save_track+0x20/0x40
[   31.620016]  kasan_save_alloc_info+0x40/0x58
[   31.620065]  __kasan_mempool_unpoison_object+0xbc/0x180
[   31.621497]  remove_element+0x16c/0x1f8
[   31.621658]  mempool_alloc_preallocated+0x58/0xc0
[   31.622029]  mempool_oob_right_helper+0x98/0x2f0
[   31.622664]  mempool_slab_oob_right+0xc0/0x118
[   31.623509]  kunit_try_run_case+0x170/0x3f0
[   31.623566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.623960]  kthread+0x328/0x630
[   31.624006]  ret_from_fork+0x10/0x20
[   31.624371] 
[   31.624414] The buggy address belongs to the object at fff00000c85fc240
[   31.624414]  which belongs to the cache test_cache of size 123
[   31.624493] The buggy address is located 0 bytes to the right of
[   31.624493]  allocated 123-byte region [fff00000c85fc240, fff00000c85fc2bb)
[   31.624619] 
[   31.624641] The buggy address belongs to the physical page:
[   31.624675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   31.625374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.625872] page_type: f5(slab)
[   31.626134] raw: 0bfffe0000000000 fff00000c592e780 dead000000000122 0000000000000000
[   31.626272] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   31.626824] page dumped because: kasan: bad access detected
[   31.627318] 
[   31.627400] Memory state around the buggy address:
[   31.627562]  fff00000c85fc180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.627952]  fff00000c85fc200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   31.628719] >fff00000c85fc280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   31.628937]                                         ^
[   31.629214]  fff00000c85fc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.629432]  fff00000c85fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.629766] ==================================================================
[   31.602900] ==================================================================
[   31.602979] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.603062] Read of size 1 at addr fff00000c9be2001 by task kunit_try_catch/254
[   31.603112] 
[   31.603151] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.603264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.603293] Hardware name: linux,dummy-virt (DT)
[   31.603324] Call trace:
[   31.603389]  show_stack+0x20/0x38 (C)
[   31.603489]  dump_stack_lvl+0x8c/0xd0
[   31.603535]  print_report+0x118/0x5d0
[   31.603578]  kasan_report+0xdc/0x128
[   31.603619]  __asan_report_load1_noabort+0x20/0x30
[   31.603744]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.603817]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   31.603966]  kunit_try_run_case+0x170/0x3f0
[   31.604179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.604271]  kthread+0x328/0x630
[   31.604316]  ret_from_fork+0x10/0x20
[   31.604423] 
[   31.604448] The buggy address belongs to the physical page:
[   31.604483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109be0
[   31.604539] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.604591] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.604770] page_type: f8(unknown)
[   31.604857] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.605044] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.605105] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.605153] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.605202] head: 0bfffe0000000002 ffffc1ffc326f801 00000000ffffffff 00000000ffffffff
[   31.605286] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.605330] page dumped because: kasan: bad access detected
[   31.605362] 
[   31.605403] Memory state around the buggy address:
[   31.605437]  fff00000c9be1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.605481]  fff00000c9be1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.605523] >fff00000c9be2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.605561]                    ^
[   31.605592]  fff00000c9be2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.605635]  fff00000c9be2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.605674] ==================================================================
[   31.588727] ==================================================================
[   31.588813] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.588894] Read of size 1 at addr fff00000c6537273 by task kunit_try_catch/252
[   31.588944] 
[   31.588989] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.589095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.589124] Hardware name: linux,dummy-virt (DT)
[   31.589157] Call trace:
[   31.589184]  show_stack+0x20/0x38 (C)
[   31.589236]  dump_stack_lvl+0x8c/0xd0
[   31.589285]  print_report+0x118/0x5d0
[   31.589329]  kasan_report+0xdc/0x128
[   31.589371]  __asan_report_load1_noabort+0x20/0x30
[   31.589418]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.589467]  mempool_kmalloc_oob_right+0xc4/0x120
[   31.589515]  kunit_try_run_case+0x170/0x3f0
[   31.589565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.589619]  kthread+0x328/0x630
[   31.589663]  ret_from_fork+0x10/0x20
[   31.589710] 
[   31.589729] Allocated by task 252:
[   31.589759]  kasan_save_stack+0x3c/0x68
[   31.589800]  kasan_save_track+0x20/0x40
[   31.589840]  kasan_save_alloc_info+0x40/0x58
[   31.589876]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.589918]  remove_element+0x130/0x1f8
[   31.589958]  mempool_alloc_preallocated+0x58/0xc0
[   31.589998]  mempool_oob_right_helper+0x98/0x2f0
[   31.590037]  mempool_kmalloc_oob_right+0xc4/0x120
[   31.590087]  kunit_try_run_case+0x170/0x3f0
[   31.590125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.590166]  kthread+0x328/0x630
[   31.590199]  ret_from_fork+0x10/0x20
[   31.590235] 
[   31.590255] The buggy address belongs to the object at fff00000c6537200
[   31.590255]  which belongs to the cache kmalloc-128 of size 128
[   31.590313] The buggy address is located 0 bytes to the right of
[   31.590313]  allocated 115-byte region [fff00000c6537200, fff00000c6537273)
[   31.590377] 
[   31.590399] The buggy address belongs to the physical page:
[   31.590434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106537
[   31.590492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.590545] page_type: f5(slab)
[   31.590588] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.590637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.590680] page dumped because: kasan: bad access detected
[   31.590713] 
[   31.590731] Memory state around the buggy address:
[   31.590766]  fff00000c6537100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.590809]  fff00000c6537180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.590853] >fff00000c6537200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.590891]                                                              ^
[   31.590930]  fff00000c6537280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.590973]  fff00000c6537300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.591011] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   31.011465] ==================================================================
[   31.011547] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   31.011619] Read of size 1 at addr fff00000c56878c0 by task kunit_try_catch/246
[   31.012486] 
[   31.012904] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.013193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.013282] Hardware name: linux,dummy-virt (DT)
[   31.013656] Call trace:
[   31.013778]  show_stack+0x20/0x38 (C)
[   31.013840]  dump_stack_lvl+0x8c/0xd0
[   31.014284]  print_report+0x118/0x5d0
[   31.014443]  kasan_report+0xdc/0x128
[   31.014772]  __kasan_check_byte+0x54/0x70
[   31.014930]  kmem_cache_destroy+0x34/0x218
[   31.015018]  kmem_cache_double_destroy+0x174/0x300
[   31.015451]  kunit_try_run_case+0x170/0x3f0
[   31.015528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.015783]  kthread+0x328/0x630
[   31.016105]  ret_from_fork+0x10/0x20
[   31.016254] 
[   31.016343] Allocated by task 246:
[   31.016472]  kasan_save_stack+0x3c/0x68
[   31.016592]  kasan_save_track+0x20/0x40
[   31.016968]  kasan_save_alloc_info+0x40/0x58
[   31.017237]  __kasan_slab_alloc+0xa8/0xb0
[   31.017336]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.017392]  __kmem_cache_create_args+0x178/0x280
[   31.017713]  kmem_cache_double_destroy+0xc0/0x300
[   31.017819]  kunit_try_run_case+0x170/0x3f0
[   31.018112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.018196]  kthread+0x328/0x630
[   31.018288]  ret_from_fork+0x10/0x20
[   31.018471] 
[   31.018609] Freed by task 246:
[   31.018747]  kasan_save_stack+0x3c/0x68
[   31.018918]  kasan_save_track+0x20/0x40
[   31.018993]  kasan_save_free_info+0x4c/0x78
[   31.019035]  __kasan_slab_free+0x6c/0x98
[   31.019245]  kmem_cache_free+0x260/0x468
[   31.019414]  slab_kmem_cache_release+0x38/0x50
[   31.019873]  kmem_cache_release+0x1c/0x30
[   31.019986]  kobject_put+0x17c/0x420
[   31.020419]  sysfs_slab_release+0x1c/0x30
[   31.020498]  kmem_cache_destroy+0x118/0x218
[   31.020668]  kmem_cache_double_destroy+0x128/0x300
[   31.020759]  kunit_try_run_case+0x170/0x3f0
[   31.020905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.021155]  kthread+0x328/0x630
[   31.021400]  ret_from_fork+0x10/0x20
[   31.021469] 
[   31.021576] The buggy address belongs to the object at fff00000c56878c0
[   31.021576]  which belongs to the cache kmem_cache of size 208
[   31.021681] The buggy address is located 0 bytes inside of
[   31.021681]  freed 208-byte region [fff00000c56878c0, fff00000c5687990)
[   31.021812] 
[   31.021953] The buggy address belongs to the physical page:
[   31.022027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105687
[   31.022455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.022693] page_type: f5(slab)
[   31.022858] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   31.023095] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   31.023169] page dumped because: kasan: bad access detected
[   31.023325] 
[   31.023410] Memory state around the buggy address:
[   31.023480]  fff00000c5687780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.023716]  fff00000c5687800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   31.024022] >fff00000c5687880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   31.024151]                                            ^
[   31.024214]  fff00000c5687900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.024387]  fff00000c5687980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.024619] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   30.921169] ==================================================================
[   30.921272] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   30.921354] Read of size 1 at addr fff00000c9b87000 by task kunit_try_catch/244
[   30.921580] 
[   30.921836] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   30.922328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.922358] Hardware name: linux,dummy-virt (DT)
[   30.922394] Call trace:
[   30.922421]  show_stack+0x20/0x38 (C)
[   30.923145]  dump_stack_lvl+0x8c/0xd0
[   30.923448]  print_report+0x118/0x5d0
[   30.923509]  kasan_report+0xdc/0x128
[   30.923712]  __asan_report_load1_noabort+0x20/0x30
[   30.923853]  kmem_cache_rcu_uaf+0x388/0x468
[   30.924033]  kunit_try_run_case+0x170/0x3f0
[   30.924111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.924425]  kthread+0x328/0x630
[   30.924501]  ret_from_fork+0x10/0x20
[   30.924714] 
[   30.924828] Allocated by task 244:
[   30.925002]  kasan_save_stack+0x3c/0x68
[   30.925066]  kasan_save_track+0x20/0x40
[   30.925521]  kasan_save_alloc_info+0x40/0x58
[   30.925702]  __kasan_slab_alloc+0xa8/0xb0
[   30.925794]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.925837]  kmem_cache_rcu_uaf+0x12c/0x468
[   30.925887]  kunit_try_run_case+0x170/0x3f0
[   30.925925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.926108]  kthread+0x328/0x630
[   30.926411]  ret_from_fork+0x10/0x20
[   30.926462] 
[   30.926509] Freed by task 0:
[   30.926541]  kasan_save_stack+0x3c/0x68
[   30.926579]  kasan_save_track+0x20/0x40
[   30.926839]  kasan_save_free_info+0x4c/0x78
[   30.926883]  __kasan_slab_free+0x6c/0x98
[   30.926922]  slab_free_after_rcu_debug+0xd4/0x2f8
[   30.926963]  rcu_core+0x9f4/0x1e20
[   30.927002]  rcu_core_si+0x18/0x30
[   30.927037]  handle_softirqs+0x374/0xb28
[   30.927085]  __do_softirq+0x1c/0x28
[   30.927119] 
[   30.927138] Last potentially related work creation:
[   30.927165]  kasan_save_stack+0x3c/0x68
[   30.927514]  kasan_record_aux_stack+0xb4/0xc8
[   30.927619]  kmem_cache_free+0x120/0x468
[   30.927661]  kmem_cache_rcu_uaf+0x16c/0x468
[   30.927698]  kunit_try_run_case+0x170/0x3f0
[   30.928213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.928258]  kthread+0x328/0x630
[   30.928570]  ret_from_fork+0x10/0x20
[   30.928719] 
[   30.928743] The buggy address belongs to the object at fff00000c9b87000
[   30.928743]  which belongs to the cache test_cache of size 200
[   30.928881] The buggy address is located 0 bytes inside of
[   30.928881]  freed 200-byte region [fff00000c9b87000, fff00000c9b870c8)
[   30.928974] 
[   30.928997] The buggy address belongs to the physical page:
[   30.929032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b87
[   30.929345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.929487] page_type: f5(slab)
[   30.929612] raw: 0bfffe0000000000 fff00000c5687780 dead000000000122 0000000000000000
[   30.929707] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.929749] page dumped because: kasan: bad access detected
[   30.929782] 
[   30.929800] Memory state around the buggy address:
[   30.929906]  fff00000c9b86f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.930063]  fff00000c9b86f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.930106] >fff00000c9b87000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.930192]                    ^
[   30.930221]  fff00000c9b87080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   30.930711]  fff00000c9b87100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.930759] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   30.296035] ==================================================================
[   30.296939] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   30.297189] Free of addr fff00000c9b86001 by task kunit_try_catch/242
[   30.297280] 
[   30.297324] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   30.297411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.297437] Hardware name: linux,dummy-virt (DT)
[   30.297470] Call trace:
[   30.297494]  show_stack+0x20/0x38 (C)
[   30.297572]  dump_stack_lvl+0x8c/0xd0
[   30.297630]  print_report+0x118/0x5d0
[   30.297674]  kasan_report_invalid_free+0xc0/0xe8
[   30.297721]  check_slab_allocation+0xfc/0x108
[   30.297771]  __kasan_slab_pre_free+0x2c/0x48
[   30.297819]  kmem_cache_free+0xf0/0x468
[   30.297881]  kmem_cache_invalid_free+0x184/0x3c8
[   30.298055]  kunit_try_run_case+0x170/0x3f0
[   30.298142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.298191]  kthread+0x328/0x630
[   30.298235]  ret_from_fork+0x10/0x20
[   30.298282] 
[   30.298302] Allocated by task 242:
[   30.298332]  kasan_save_stack+0x3c/0x68
[   30.298383]  kasan_save_track+0x20/0x40
[   30.298422]  kasan_save_alloc_info+0x40/0x58
[   30.298459]  __kasan_slab_alloc+0xa8/0xb0
[   30.298496]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.298537]  kmem_cache_invalid_free+0x12c/0x3c8
[   30.298574]  kunit_try_run_case+0x170/0x3f0
[   30.298613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.298653]  kthread+0x328/0x630
[   30.298709]  ret_from_fork+0x10/0x20
[   30.298745] 
[   30.298763] The buggy address belongs to the object at fff00000c9b86000
[   30.298763]  which belongs to the cache test_cache of size 200
[   30.298826] The buggy address is located 1 bytes inside of
[   30.298826]  200-byte region [fff00000c9b86000, fff00000c9b860c8)
[   30.298945] 
[   30.299086] The buggy address belongs to the physical page:
[   30.299175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b86
[   30.299255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.299308] page_type: f5(slab)
[   30.299350] raw: 0bfffe0000000000 fff00000c5687640 dead000000000122 0000000000000000
[   30.299413] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.299457] page dumped because: kasan: bad access detected
[   30.299489] 
[   30.299506] Memory state around the buggy address:
[   30.299539]  fff00000c9b85f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.299582]  fff00000c9b85f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.299624] >fff00000c9b86000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.299661]                    ^
[   30.299700]  fff00000c9b86080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   30.299848]  fff00000c9b86100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.299896] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   30.268041] ==================================================================
[   30.268679] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   30.268916] Free of addr fff00000c9b84000 by task kunit_try_catch/240
[   30.269075] 
[   30.269121] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   30.269208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.269235] Hardware name: linux,dummy-virt (DT)
[   30.269269] Call trace:
[   30.269295]  show_stack+0x20/0x38 (C)
[   30.269384]  dump_stack_lvl+0x8c/0xd0
[   30.269435]  print_report+0x118/0x5d0
[   30.269480]  kasan_report_invalid_free+0xc0/0xe8
[   30.269526]  check_slab_allocation+0xd4/0x108
[   30.269575]  __kasan_slab_pre_free+0x2c/0x48
[   30.269630]  kmem_cache_free+0xf0/0x468
[   30.269733]  kmem_cache_double_free+0x190/0x3c8
[   30.269783]  kunit_try_run_case+0x170/0x3f0
[   30.269904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.270025]  kthread+0x328/0x630
[   30.270181]  ret_from_fork+0x10/0x20
[   30.270231] 
[   30.270259] Allocated by task 240:
[   30.270373]  kasan_save_stack+0x3c/0x68
[   30.270415]  kasan_save_track+0x20/0x40
[   30.270464]  kasan_save_alloc_info+0x40/0x58
[   30.270502]  __kasan_slab_alloc+0xa8/0xb0
[   30.270540]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.270619]  kmem_cache_double_free+0x12c/0x3c8
[   30.270809]  kunit_try_run_case+0x170/0x3f0
[   30.270867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.271011]  kthread+0x328/0x630
[   30.271044]  ret_from_fork+0x10/0x20
[   30.271132] 
[   30.271151] Freed by task 240:
[   30.271238]  kasan_save_stack+0x3c/0x68
[   30.271289]  kasan_save_track+0x20/0x40
[   30.271332]  kasan_save_free_info+0x4c/0x78
[   30.271369]  __kasan_slab_free+0x6c/0x98
[   30.271407]  kmem_cache_free+0x260/0x468
[   30.271472]  kmem_cache_double_free+0x140/0x3c8
[   30.271510]  kunit_try_run_case+0x170/0x3f0
[   30.271589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.271780]  kthread+0x328/0x630
[   30.271900]  ret_from_fork+0x10/0x20
[   30.271937] 
[   30.271956] The buggy address belongs to the object at fff00000c9b84000
[   30.271956]  which belongs to the cache test_cache of size 200
[   30.272014] The buggy address is located 0 bytes inside of
[   30.272014]  200-byte region [fff00000c9b84000, fff00000c9b840c8)
[   30.272082] 
[   30.272106] The buggy address belongs to the physical page:
[   30.272138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b84
[   30.272224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.272276] page_type: f5(slab)
[   30.272318] raw: 0bfffe0000000000 fff00000c5687500 dead000000000122 0000000000000000
[   30.272367] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.272408] page dumped because: kasan: bad access detected
[   30.272439] 
[   30.272456] Memory state around the buggy address:
[   30.272489]  fff00000c9b83f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.272532]  fff00000c9b83f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.272574] >fff00000c9b84000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.272612]                    ^
[   30.272639]  fff00000c9b84080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   30.272680]  fff00000c9b84100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.272716] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   30.011606] ==================================================================
[   30.011682] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   30.011933] Read of size 1 at addr fff00000c9b830c8 by task kunit_try_catch/238
[   30.012014] 
[   30.012099] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   30.012210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.012238] Hardware name: linux,dummy-virt (DT)
[   30.012318] Call trace:
[   30.012342]  show_stack+0x20/0x38 (C)
[   30.012398]  dump_stack_lvl+0x8c/0xd0
[   30.012570]  print_report+0x118/0x5d0
[   30.012618]  kasan_report+0xdc/0x128
[   30.012734]  __asan_report_load1_noabort+0x20/0x30
[   30.012861]  kmem_cache_oob+0x344/0x430
[   30.012968]  kunit_try_run_case+0x170/0x3f0
[   30.013030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.013105]  kthread+0x328/0x630
[   30.013268]  ret_from_fork+0x10/0x20
[   30.013398] 
[   30.013416] Allocated by task 238:
[   30.013455]  kasan_save_stack+0x3c/0x68
[   30.013537]  kasan_save_track+0x20/0x40
[   30.013576]  kasan_save_alloc_info+0x40/0x58
[   30.013616]  __kasan_slab_alloc+0xa8/0xb0
[   30.013828]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.013940]  kmem_cache_oob+0x12c/0x430
[   30.014061]  kunit_try_run_case+0x170/0x3f0
[   30.014225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.014266]  kthread+0x328/0x630
[   30.014347]  ret_from_fork+0x10/0x20
[   30.014705] 
[   30.014852] The buggy address belongs to the object at fff00000c9b83000
[   30.014852]  which belongs to the cache test_cache of size 200
[   30.014996] The buggy address is located 0 bytes to the right of
[   30.014996]  allocated 200-byte region [fff00000c9b83000, fff00000c9b830c8)
[   30.015112] 
[   30.015371] The buggy address belongs to the physical page:
[   30.015492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b83
[   30.015628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.015714] page_type: f5(slab)
[   30.015785] raw: 0bfffe0000000000 fff00000c56873c0 dead000000000122 0000000000000000
[   30.015985] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.016193] page dumped because: kasan: bad access detected
[   30.016317] 
[   30.016363] Memory state around the buggy address:
[   30.016408]  fff00000c9b82f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.016506]  fff00000c9b83000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.016597] >fff00000c9b83080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   30.016636]                                               ^
[   30.016673]  fff00000c9b83100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.016714]  fff00000c9b83180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.016754] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   29.987224] ==================================================================
[   29.987311] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   29.987385] Read of size 8 at addr fff00000c9aded80 by task kunit_try_catch/231
[   29.987444] 
[   29.987483] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.987581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.987610] Hardware name: linux,dummy-virt (DT)
[   29.987658] Call trace:
[   29.987683]  show_stack+0x20/0x38 (C)
[   29.987733]  dump_stack_lvl+0x8c/0xd0
[   29.987778]  print_report+0x118/0x5d0
[   29.987822]  kasan_report+0xdc/0x128
[   29.987864]  __asan_report_load8_noabort+0x20/0x30
[   29.987913]  workqueue_uaf+0x480/0x4a8
[   29.987960]  kunit_try_run_case+0x170/0x3f0
[   29.988016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.988081]  kthread+0x328/0x630
[   29.988121]  ret_from_fork+0x10/0x20
[   29.988170] 
[   29.988215] Allocated by task 231:
[   29.988261]  kasan_save_stack+0x3c/0x68
[   29.988402]  kasan_save_track+0x20/0x40
[   29.988649]  kasan_save_alloc_info+0x40/0x58
[   29.988734]  __kasan_kmalloc+0xd4/0xd8
[   29.988774]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.988817]  workqueue_uaf+0x13c/0x4a8
[   29.988854]  kunit_try_run_case+0x170/0x3f0
[   29.988922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.988966]  kthread+0x328/0x630
[   29.989082]  ret_from_fork+0x10/0x20
[   29.989128] 
[   29.989147] Freed by task 75:
[   29.989173]  kasan_save_stack+0x3c/0x68
[   29.989212]  kasan_save_track+0x20/0x40
[   29.989250]  kasan_save_free_info+0x4c/0x78
[   29.989288]  __kasan_slab_free+0x6c/0x98
[   29.989327]  kfree+0x214/0x3c8
[   29.989404]  workqueue_uaf_work+0x18/0x30
[   29.989535]  process_one_work+0x530/0xf98
[   29.989574]  worker_thread+0x618/0xf38
[   29.989725]  kthread+0x328/0x630
[   29.989758]  ret_from_fork+0x10/0x20
[   29.989860] 
[   29.989921] Last potentially related work creation:
[   29.989964]  kasan_save_stack+0x3c/0x68
[   29.990134]  kasan_record_aux_stack+0xb4/0xc8
[   29.990222]  __queue_work+0x65c/0xfe0
[   29.990379]  queue_work_on+0xbc/0xf8
[   29.990512]  workqueue_uaf+0x210/0x4a8
[   29.990559]  kunit_try_run_case+0x170/0x3f0
[   29.990610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.990651]  kthread+0x328/0x630
[   29.990682]  ret_from_fork+0x10/0x20
[   29.990718] 
[   29.990908] The buggy address belongs to the object at fff00000c9aded80
[   29.990908]  which belongs to the cache kmalloc-32 of size 32
[   29.991005] The buggy address is located 0 bytes inside of
[   29.991005]  freed 32-byte region [fff00000c9aded80, fff00000c9adeda0)
[   29.991165] 
[   29.991271] The buggy address belongs to the physical page:
[   29.991360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ade
[   29.991429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.991552] page_type: f5(slab)
[   29.991675] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.991788] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.991888] page dumped because: kasan: bad access detected
[   29.991939] 
[   29.991956] Memory state around the buggy address:
[   29.991991]  fff00000c9adec80: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.992034]  fff00000c9aded00: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   29.992086] >fff00000c9aded80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.992324]                    ^
[   29.992415]  fff00000c9adee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.992485]  fff00000c9adee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.992587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   29.961458] ==================================================================
[   29.963121] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   29.963204] Read of size 4 at addr fff00000c9adebc0 by task swapper/0/0
[   29.964358] 
[   29.964418] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.964993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.965651] Hardware name: linux,dummy-virt (DT)
[   29.965958] Call trace:
[   29.966161]  show_stack+0x20/0x38 (C)
[   29.966798]  dump_stack_lvl+0x8c/0xd0
[   29.967340]  print_report+0x118/0x5d0
[   29.967734]  kasan_report+0xdc/0x128
[   29.967781]  __asan_report_load4_noabort+0x20/0x30
[   29.967829]  rcu_uaf_reclaim+0x64/0x70
[   29.968778]  rcu_core+0x9f4/0x1e20
[   29.968843]  rcu_core_si+0x18/0x30
[   29.969770]  handle_softirqs+0x374/0xb28
[   29.969826]  __do_softirq+0x1c/0x28
[   29.969871]  ____do_softirq+0x18/0x30
[   29.969917]  call_on_irq_stack+0x24/0x30
[   29.971427]  do_softirq_own_stack+0x24/0x38
[   29.971491]  __irq_exit_rcu+0x1fc/0x318
[   29.971539]  irq_exit_rcu+0x1c/0x80
[   29.971584]  el1_interrupt+0x38/0x58
[   29.971636]  el1h_64_irq_handler+0x18/0x28
[   29.971684]  el1h_64_irq+0x6c/0x70
[   29.971811]  arch_local_irq_enable+0x4/0x8 (P)
[   29.971864]  do_idle+0x384/0x4e8
[   29.971908]  cpu_startup_entry+0x68/0x80
[   29.971951]  rest_init+0x160/0x188
[   29.971997]  start_kernel+0x30c/0x3d0
[   29.972064]  __primary_switched+0x8c/0xa0
[   29.972393] 
[   29.972430] Allocated by task 229:
[   29.972463]  kasan_save_stack+0x3c/0x68
[   29.972510]  kasan_save_track+0x20/0x40
[   29.972716]  kasan_save_alloc_info+0x40/0x58
[   29.972762]  __kasan_kmalloc+0xd4/0xd8
[   29.972917]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.973112]  rcu_uaf+0xb0/0x2d8
[   29.973211]  kunit_try_run_case+0x170/0x3f0
[   29.973353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.973397]  kthread+0x328/0x630
[   29.973564]  ret_from_fork+0x10/0x20
[   29.973761] 
[   29.973831] Freed by task 0:
[   29.973877]  kasan_save_stack+0x3c/0x68
[   29.974028]  kasan_save_track+0x20/0x40
[   29.974094]  kasan_save_free_info+0x4c/0x78
[   29.974135]  __kasan_slab_free+0x6c/0x98
[   29.974176]  kfree+0x214/0x3c8
[   29.974210]  rcu_uaf_reclaim+0x28/0x70
[   29.974246]  rcu_core+0x9f4/0x1e20
[   29.974306]  rcu_core_si+0x18/0x30
[   29.974415]  handle_softirqs+0x374/0xb28
[   29.974516]  __do_softirq+0x1c/0x28
[   29.974579] 
[   29.974616] Last potentially related work creation:
[   29.974694]  kasan_save_stack+0x3c/0x68
[   29.974791]  kasan_record_aux_stack+0xb4/0xc8
[   29.974830]  __call_rcu_common.constprop.0+0x74/0x8c8
[   29.974907]  call_rcu+0x18/0x30
[   29.974967]  rcu_uaf+0x14c/0x2d8
[   29.975003]  kunit_try_run_case+0x170/0x3f0
[   29.975095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.975141]  kthread+0x328/0x630
[   29.975187]  ret_from_fork+0x10/0x20
[   29.975231] 
[   29.975260] The buggy address belongs to the object at fff00000c9adebc0
[   29.975260]  which belongs to the cache kmalloc-32 of size 32
[   29.975339] The buggy address is located 0 bytes inside of
[   29.975339]  freed 32-byte region [fff00000c9adebc0, fff00000c9adebe0)
[   29.975419] 
[   29.975443] The buggy address belongs to the physical page:
[   29.975495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ade
[   29.975572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.975629] page_type: f5(slab)
[   29.975674] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.975731] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.975778] page dumped because: kasan: bad access detected
[   29.975815] 
[   29.975833] Memory state around the buggy address:
[   29.975882]  fff00000c9adea80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.975942]  fff00000c9adeb00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.976002] >fff00000c9adeb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.976060]                                            ^
[   29.976100]  fff00000c9adec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.976150]  fff00000c9adec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.976196] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   29.864269] ==================================================================
[   29.864325] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   29.864420] Read of size 1 at addr fff00000c636af78 by task kunit_try_catch/227
[   29.864473] 
[   29.864506] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.864590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.864617] Hardware name: linux,dummy-virt (DT)
[   29.864648] Call trace:
[   29.864669]  show_stack+0x20/0x38 (C)
[   29.864971]  dump_stack_lvl+0x8c/0xd0
[   29.865076]  print_report+0x118/0x5d0
[   29.865621]  kasan_report+0xdc/0x128
[   29.865746]  __asan_report_load1_noabort+0x20/0x30
[   29.865847]  ksize_uaf+0x544/0x5f8
[   29.865890]  kunit_try_run_case+0x170/0x3f0
[   29.865938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.866204]  kthread+0x328/0x630
[   29.866396]  ret_from_fork+0x10/0x20
[   29.866463] 
[   29.866483] Allocated by task 227:
[   29.866592]  kasan_save_stack+0x3c/0x68
[   29.866654]  kasan_save_track+0x20/0x40
[   29.867068]  kasan_save_alloc_info+0x40/0x58
[   29.867236]  __kasan_kmalloc+0xd4/0xd8
[   29.867277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.867320]  ksize_uaf+0xb8/0x5f8
[   29.867394]  kunit_try_run_case+0x170/0x3f0
[   29.867451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.867557]  kthread+0x328/0x630
[   29.867590]  ret_from_fork+0x10/0x20
[   29.867627] 
[   29.867646] Freed by task 227:
[   29.867674]  kasan_save_stack+0x3c/0x68
[   29.867713]  kasan_save_track+0x20/0x40
[   29.867887]  kasan_save_free_info+0x4c/0x78
[   29.867937]  __kasan_slab_free+0x6c/0x98
[   29.867979]  kfree+0x214/0x3c8
[   29.868013]  ksize_uaf+0x11c/0x5f8
[   29.868059]  kunit_try_run_case+0x170/0x3f0
[   29.868098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.868140]  kthread+0x328/0x630
[   29.868179]  ret_from_fork+0x10/0x20
[   29.868680] 
[   29.868704] The buggy address belongs to the object at fff00000c636af00
[   29.868704]  which belongs to the cache kmalloc-128 of size 128
[   29.868834] The buggy address is located 120 bytes inside of
[   29.868834]  freed 128-byte region [fff00000c636af00, fff00000c636af80)
[   29.869111] 
[   29.869198] The buggy address belongs to the physical page:
[   29.869236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.869380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.869466] page_type: f5(slab)
[   29.869546] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.869650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.869744] page dumped because: kasan: bad access detected
[   29.869862] 
[   29.869927] Memory state around the buggy address:
[   29.869968]  fff00000c636ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.870069]  fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.870111] >fff00000c636af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.870148]                                                                 ^
[   29.870349]  fff00000c636af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.870549]  fff00000c636b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.870652] ==================================================================
[   29.847653] ==================================================================
[   29.847730] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   29.848058] Read of size 1 at addr fff00000c636af00 by task kunit_try_catch/227
[   29.848126] 
[   29.848749] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.848849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.848948] Hardware name: linux,dummy-virt (DT)
[   29.848985] Call trace:
[   29.849254]  show_stack+0x20/0x38 (C)
[   29.849460]  dump_stack_lvl+0x8c/0xd0
[   29.849522]  print_report+0x118/0x5d0
[   29.849566]  kasan_report+0xdc/0x128
[   29.849624]  __kasan_check_byte+0x54/0x70
[   29.849670]  ksize+0x30/0x88
[   29.850134]  ksize_uaf+0x168/0x5f8
[   29.850298]  kunit_try_run_case+0x170/0x3f0
[   29.850348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.850399]  kthread+0x328/0x630
[   29.850443]  ret_from_fork+0x10/0x20
[   29.850502] 
[   29.850521] Allocated by task 227:
[   29.850552]  kasan_save_stack+0x3c/0x68
[   29.850836]  kasan_save_track+0x20/0x40
[   29.851307]  kasan_save_alloc_info+0x40/0x58
[   29.851483]  __kasan_kmalloc+0xd4/0xd8
[   29.851524]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.851605]  ksize_uaf+0xb8/0x5f8
[   29.851774]  kunit_try_run_case+0x170/0x3f0
[   29.851866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.851982]  kthread+0x328/0x630
[   29.852018]  ret_from_fork+0x10/0x20
[   29.852065] 
[   29.852084] Freed by task 227:
[   29.852112]  kasan_save_stack+0x3c/0x68
[   29.852150]  kasan_save_track+0x20/0x40
[   29.852383]  kasan_save_free_info+0x4c/0x78
[   29.852423]  __kasan_slab_free+0x6c/0x98
[   29.852722]  kfree+0x214/0x3c8
[   29.852807]  ksize_uaf+0x11c/0x5f8
[   29.852871]  kunit_try_run_case+0x170/0x3f0
[   29.852913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.852996]  kthread+0x328/0x630
[   29.853035]  ret_from_fork+0x10/0x20
[   29.853194] 
[   29.853217] The buggy address belongs to the object at fff00000c636af00
[   29.853217]  which belongs to the cache kmalloc-128 of size 128
[   29.853300] The buggy address is located 0 bytes inside of
[   29.853300]  freed 128-byte region [fff00000c636af00, fff00000c636af80)
[   29.853694] 
[   29.853723] The buggy address belongs to the physical page:
[   29.853813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.853944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.854079] page_type: f5(slab)
[   29.854125] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.854215] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.854256] page dumped because: kasan: bad access detected
[   29.854287] 
[   29.854307] Memory state around the buggy address:
[   29.854499]  fff00000c636ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.854690]  fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.854735] >fff00000c636af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.854930]                    ^
[   29.855079]  fff00000c636af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.855179]  fff00000c636b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.855218] ==================================================================
[   29.856553] ==================================================================
[   29.856612] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   29.856668] Read of size 1 at addr fff00000c636af00 by task kunit_try_catch/227
[   29.856822] 
[   29.856859] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.856951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.857090] Hardware name: linux,dummy-virt (DT)
[   29.857190] Call trace:
[   29.857212]  show_stack+0x20/0x38 (C)
[   29.857438]  dump_stack_lvl+0x8c/0xd0
[   29.857485]  print_report+0x118/0x5d0
[   29.857529]  kasan_report+0xdc/0x128
[   29.857577]  __asan_report_load1_noabort+0x20/0x30
[   29.857801]  ksize_uaf+0x598/0x5f8
[   29.857851]  kunit_try_run_case+0x170/0x3f0
[   29.857988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.858036]  kthread+0x328/0x630
[   29.858087]  ret_from_fork+0x10/0x20
[   29.858135] 
[   29.858152] Allocated by task 227:
[   29.858222]  kasan_save_stack+0x3c/0x68
[   29.858265]  kasan_save_track+0x20/0x40
[   29.858462]  kasan_save_alloc_info+0x40/0x58
[   29.858780]  __kasan_kmalloc+0xd4/0xd8
[   29.858961]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.859200]  ksize_uaf+0xb8/0x5f8
[   29.859323]  kunit_try_run_case+0x170/0x3f0
[   29.859417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.859459]  kthread+0x328/0x630
[   29.859493]  ret_from_fork+0x10/0x20
[   29.859530] 
[   29.859551] Freed by task 227:
[   29.859578]  kasan_save_stack+0x3c/0x68
[   29.859688]  kasan_save_track+0x20/0x40
[   29.859736]  kasan_save_free_info+0x4c/0x78
[   29.859813]  __kasan_slab_free+0x6c/0x98
[   29.859850]  kfree+0x214/0x3c8
[   29.859885]  ksize_uaf+0x11c/0x5f8
[   29.860336]  kunit_try_run_case+0x170/0x3f0
[   29.860379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.860422]  kthread+0x328/0x630
[   29.860457]  ret_from_fork+0x10/0x20
[   29.860494] 
[   29.860516] The buggy address belongs to the object at fff00000c636af00
[   29.860516]  which belongs to the cache kmalloc-128 of size 128
[   29.860602] The buggy address is located 0 bytes inside of
[   29.860602]  freed 128-byte region [fff00000c636af00, fff00000c636af80)
[   29.860904] 
[   29.860952] The buggy address belongs to the physical page:
[   29.860993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.861067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.861117] page_type: f5(slab)
[   29.861554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.861655] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.861695] page dumped because: kasan: bad access detected
[   29.861725] 
[   29.861745] Memory state around the buggy address:
[   29.861788]  fff00000c636ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.861830]  fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.862023] >fff00000c636af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.862461]                    ^
[   29.862541]  fff00000c636af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.862607]  fff00000c636b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.862645] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   29.830432] ==================================================================
[   29.830480] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   29.830526] Read of size 1 at addr fff00000c636ae7f by task kunit_try_catch/225
[   29.830588] 
[   29.830619] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.831311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.831367] Hardware name: linux,dummy-virt (DT)
[   29.831399] Call trace:
[   29.831421]  show_stack+0x20/0x38 (C)
[   29.831472]  dump_stack_lvl+0x8c/0xd0
[   29.831523]  print_report+0x118/0x5d0
[   29.831724]  kasan_report+0xdc/0x128
[   29.831850]  __asan_report_load1_noabort+0x20/0x30
[   29.832019]  ksize_unpoisons_memory+0x690/0x740
[   29.832561]  kunit_try_run_case+0x170/0x3f0
[   29.832938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.833354]  kthread+0x328/0x630
[   29.833498]  ret_from_fork+0x10/0x20
[   29.833625] 
[   29.833644] Allocated by task 225:
[   29.834078]  kasan_save_stack+0x3c/0x68
[   29.834181]  kasan_save_track+0x20/0x40
[   29.834284]  kasan_save_alloc_info+0x40/0x58
[   29.834320]  __kasan_kmalloc+0xd4/0xd8
[   29.834358]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.834412]  ksize_unpoisons_memory+0xc0/0x740
[   29.834452]  kunit_try_run_case+0x170/0x3f0
[   29.834490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.834531]  kthread+0x328/0x630
[   29.834564]  ret_from_fork+0x10/0x20
[   29.834599] 
[   29.834620] The buggy address belongs to the object at fff00000c636ae00
[   29.834620]  which belongs to the cache kmalloc-128 of size 128
[   29.834677] The buggy address is located 12 bytes to the right of
[   29.834677]  allocated 115-byte region [fff00000c636ae00, fff00000c636ae73)
[   29.834741] 
[   29.834761] The buggy address belongs to the physical page:
[   29.834791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.834857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.834907] page_type: f5(slab)
[   29.835083] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.835139] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.835180] page dumped because: kasan: bad access detected
[   29.835693] 
[   29.836030] Memory state around the buggy address:
[   29.836081]  fff00000c636ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.836132]  fff00000c636ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.836557] >fff00000c636ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.836639]                                                                 ^
[   29.836686]  fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.837022]  fff00000c636af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.837128] ==================================================================
[   29.825153] ==================================================================
[   29.825208] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   29.825261] Read of size 1 at addr fff00000c636ae78 by task kunit_try_catch/225
[   29.825311] 
[   29.825344] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.825429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.825455] Hardware name: linux,dummy-virt (DT)
[   29.825488] Call trace:
[   29.825510]  show_stack+0x20/0x38 (C)
[   29.825558]  dump_stack_lvl+0x8c/0xd0
[   29.825777]  print_report+0x118/0x5d0
[   29.826100]  kasan_report+0xdc/0x128
[   29.826155]  __asan_report_load1_noabort+0x20/0x30
[   29.826442]  ksize_unpoisons_memory+0x618/0x740
[   29.826712]  kunit_try_run_case+0x170/0x3f0
[   29.826789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.826969]  kthread+0x328/0x630
[   29.827013]  ret_from_fork+0x10/0x20
[   29.827074] 
[   29.827093] Allocated by task 225:
[   29.827344]  kasan_save_stack+0x3c/0x68
[   29.827416]  kasan_save_track+0x20/0x40
[   29.827588]  kasan_save_alloc_info+0x40/0x58
[   29.827663]  __kasan_kmalloc+0xd4/0xd8
[   29.827719]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.827835]  ksize_unpoisons_memory+0xc0/0x740
[   29.827877]  kunit_try_run_case+0x170/0x3f0
[   29.827923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.828125]  kthread+0x328/0x630
[   29.828158]  ret_from_fork+0x10/0x20
[   29.828263] 
[   29.828282] The buggy address belongs to the object at fff00000c636ae00
[   29.828282]  which belongs to the cache kmalloc-128 of size 128
[   29.828550] The buggy address is located 5 bytes to the right of
[   29.828550]  allocated 115-byte region [fff00000c636ae00, fff00000c636ae73)
[   29.828653] 
[   29.828718] The buggy address belongs to the physical page:
[   29.828751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.829023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.829133] page_type: f5(slab)
[   29.829174] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.829292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.829335] page dumped because: kasan: bad access detected
[   29.829366] 
[   29.829385] Memory state around the buggy address:
[   29.829418]  fff00000c636ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.829468]  fff00000c636ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.829554] >fff00000c636ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.829615]                                                                 ^
[   29.829659]  fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.829702]  fff00000c636af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.829741] ==================================================================
[   29.818663] ==================================================================
[   29.819132] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   29.819343] Read of size 1 at addr fff00000c636ae73 by task kunit_try_catch/225
[   29.819396] 
[   29.819436] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.819524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.819563] Hardware name: linux,dummy-virt (DT)
[   29.819596] Call trace:
[   29.819620]  show_stack+0x20/0x38 (C)
[   29.819941]  dump_stack_lvl+0x8c/0xd0
[   29.820290]  print_report+0x118/0x5d0
[   29.820348]  kasan_report+0xdc/0x128
[   29.820417]  __asan_report_load1_noabort+0x20/0x30
[   29.820555]  ksize_unpoisons_memory+0x628/0x740
[   29.820760]  kunit_try_run_case+0x170/0x3f0
[   29.820810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.820867]  kthread+0x328/0x630
[   29.821073]  ret_from_fork+0x10/0x20
[   29.821170] 
[   29.821227] Allocated by task 225:
[   29.821270]  kasan_save_stack+0x3c/0x68
[   29.821388]  kasan_save_track+0x20/0x40
[   29.821512]  kasan_save_alloc_info+0x40/0x58
[   29.821608]  __kasan_kmalloc+0xd4/0xd8
[   29.821663]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.821710]  ksize_unpoisons_memory+0xc0/0x740
[   29.821749]  kunit_try_run_case+0x170/0x3f0
[   29.821892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.821933]  kthread+0x328/0x630
[   29.821965]  ret_from_fork+0x10/0x20
[   29.822046] 
[   29.822074] The buggy address belongs to the object at fff00000c636ae00
[   29.822074]  which belongs to the cache kmalloc-128 of size 128
[   29.822131] The buggy address is located 0 bytes to the right of
[   29.822131]  allocated 115-byte region [fff00000c636ae00, fff00000c636ae73)
[   29.822194] 
[   29.822215] The buggy address belongs to the physical page:
[   29.822245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.822634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.822688] page_type: f5(slab)
[   29.823109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.823200] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.823344] page dumped because: kasan: bad access detected
[   29.823376] 
[   29.823394] Memory state around the buggy address:
[   29.823429]  fff00000c636ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.823683]  fff00000c636ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.823735] >fff00000c636ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.823776]                                                              ^
[   29.824062]  fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.824121]  fff00000c636af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.824161] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   29.799630] ==================================================================
[   29.799834] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   29.799927] Free of addr fff00000c64c1b20 by task kunit_try_catch/223
[   29.800078] 
[   29.800146] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.800382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.800410] Hardware name: linux,dummy-virt (DT)
[   29.800442] Call trace:
[   29.800525]  show_stack+0x20/0x38 (C)
[   29.800579]  dump_stack_lvl+0x8c/0xd0
[   29.800916]  print_report+0x118/0x5d0
[   29.800980]  kasan_report_invalid_free+0xc0/0xe8
[   29.801029]  check_slab_allocation+0xd4/0x108
[   29.801091]  __kasan_slab_pre_free+0x2c/0x48
[   29.801179]  kfree+0xe8/0x3c8
[   29.801383]  kfree_sensitive+0x3c/0xb0
[   29.801499]  kmalloc_double_kzfree+0x168/0x308
[   29.801660]  kunit_try_run_case+0x170/0x3f0
[   29.801707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.801757]  kthread+0x328/0x630
[   29.801805]  ret_from_fork+0x10/0x20
[   29.801883] 
[   29.801939] Allocated by task 223:
[   29.801975]  kasan_save_stack+0x3c/0x68
[   29.802163]  kasan_save_track+0x20/0x40
[   29.802206]  kasan_save_alloc_info+0x40/0x58
[   29.802244]  __kasan_kmalloc+0xd4/0xd8
[   29.802282]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.802359]  kmalloc_double_kzfree+0xb8/0x308
[   29.802543]  kunit_try_run_case+0x170/0x3f0
[   29.802689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.802738]  kthread+0x328/0x630
[   29.802866]  ret_from_fork+0x10/0x20
[   29.802904] 
[   29.802922] Freed by task 223:
[   29.802981]  kasan_save_stack+0x3c/0x68
[   29.803020]  kasan_save_track+0x20/0x40
[   29.803492]  kasan_save_free_info+0x4c/0x78
[   29.803936]  __kasan_slab_free+0x6c/0x98
[   29.804125]  kfree+0x214/0x3c8
[   29.804302]  kfree_sensitive+0x80/0xb0
[   29.804446]  kmalloc_double_kzfree+0x11c/0x308
[   29.804617]  kunit_try_run_case+0x170/0x3f0
[   29.804658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.804699]  kthread+0x328/0x630
[   29.804731]  ret_from_fork+0x10/0x20
[   29.804823] 
[   29.805130] The buggy address belongs to the object at fff00000c64c1b20
[   29.805130]  which belongs to the cache kmalloc-16 of size 16
[   29.805226] The buggy address is located 0 bytes inside of
[   29.805226]  16-byte region [fff00000c64c1b20, fff00000c64c1b30)
[   29.805285] 
[   29.805315] The buggy address belongs to the physical page:
[   29.805349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1
[   29.805561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.805841] page_type: f5(slab)
[   29.806198] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.806273] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000
[   29.806360] page dumped because: kasan: bad access detected
[   29.806393] 
[   29.806411] Memory state around the buggy address:
[   29.806445]  fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.806643]  fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.806719] >fff00000c64c1b00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   29.806914]                                ^
[   29.806950]  fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.806992]  fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.807225] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   29.790826] ==================================================================
[   29.791097] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   29.791218] Read of size 1 at addr fff00000c64c1b20 by task kunit_try_catch/223
[   29.791411] 
[   29.791594] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.791864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.791964] Hardware name: linux,dummy-virt (DT)
[   29.792057] Call trace:
[   29.792090]  show_stack+0x20/0x38 (C)
[   29.792230]  dump_stack_lvl+0x8c/0xd0
[   29.792278]  print_report+0x118/0x5d0
[   29.792948]  kasan_report+0xdc/0x128
[   29.793012]  __kasan_check_byte+0x54/0x70
[   29.793093]  kfree_sensitive+0x30/0xb0
[   29.793144]  kmalloc_double_kzfree+0x168/0x308
[   29.793193]  kunit_try_run_case+0x170/0x3f0
[   29.793241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.793475]  kthread+0x328/0x630
[   29.793520]  ret_from_fork+0x10/0x20
[   29.793576] 
[   29.793601] Allocated by task 223:
[   29.793692]  kasan_save_stack+0x3c/0x68
[   29.793903]  kasan_save_track+0x20/0x40
[   29.794125]  kasan_save_alloc_info+0x40/0x58
[   29.794173]  __kasan_kmalloc+0xd4/0xd8
[   29.794212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.794338]  kmalloc_double_kzfree+0xb8/0x308
[   29.794380]  kunit_try_run_case+0x170/0x3f0
[   29.794626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.794749]  kthread+0x328/0x630
[   29.794824]  ret_from_fork+0x10/0x20
[   29.794905] 
[   29.795017] Freed by task 223:
[   29.795109]  kasan_save_stack+0x3c/0x68
[   29.795151]  kasan_save_track+0x20/0x40
[   29.795189]  kasan_save_free_info+0x4c/0x78
[   29.795226]  __kasan_slab_free+0x6c/0x98
[   29.795278]  kfree+0x214/0x3c8
[   29.795314]  kfree_sensitive+0x80/0xb0
[   29.795498]  kmalloc_double_kzfree+0x11c/0x308
[   29.795539]  kunit_try_run_case+0x170/0x3f0
[   29.795628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.795674]  kthread+0x328/0x630
[   29.795727]  ret_from_fork+0x10/0x20
[   29.795907] 
[   29.795969] The buggy address belongs to the object at fff00000c64c1b20
[   29.795969]  which belongs to the cache kmalloc-16 of size 16
[   29.796028] The buggy address is located 0 bytes inside of
[   29.796028]  freed 16-byte region [fff00000c64c1b20, fff00000c64c1b30)
[   29.796380] 
[   29.796408] The buggy address belongs to the physical page:
[   29.796441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1
[   29.796968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.797035] page_type: f5(slab)
[   29.797089] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.797140] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000
[   29.797181] page dumped because: kasan: bad access detected
[   29.797213] 
[   29.797230] Memory state around the buggy address:
[   29.797444]  fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.797512]  fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.797760] >fff00000c64c1b00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   29.797800]                                ^
[   29.797833]  fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.798165]  fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.798209] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   29.766658] ==================================================================
[   29.766766] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   29.766833] Read of size 1 at addr fff00000c9adf1a8 by task kunit_try_catch/219
[   29.767106] 
[   29.767192] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.767346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.767375] Hardware name: linux,dummy-virt (DT)
[   29.767407] Call trace:
[   29.767438]  show_stack+0x20/0x38 (C)
[   29.767533]  dump_stack_lvl+0x8c/0xd0
[   29.767766]  print_report+0x118/0x5d0
[   29.767813]  kasan_report+0xdc/0x128
[   29.767856]  __asan_report_load1_noabort+0x20/0x30
[   29.767905]  kmalloc_uaf2+0x3f4/0x468
[   29.767948]  kunit_try_run_case+0x170/0x3f0
[   29.767998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.768058]  kthread+0x328/0x630
[   29.768100]  ret_from_fork+0x10/0x20
[   29.768149] 
[   29.768216] Allocated by task 219:
[   29.768247]  kasan_save_stack+0x3c/0x68
[   29.768399]  kasan_save_track+0x20/0x40
[   29.768747]  kasan_save_alloc_info+0x40/0x58
[   29.768943]  __kasan_kmalloc+0xd4/0xd8
[   29.768986]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.769028]  kmalloc_uaf2+0xc4/0x468
[   29.769099]  kunit_try_run_case+0x170/0x3f0
[   29.769166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.769207]  kthread+0x328/0x630
[   29.769239]  ret_from_fork+0x10/0x20
[   29.769277] 
[   29.769296] Freed by task 219:
[   29.769323]  kasan_save_stack+0x3c/0x68
[   29.769769]  kasan_save_track+0x20/0x40
[   29.769845]  kasan_save_free_info+0x4c/0x78
[   29.769883]  __kasan_slab_free+0x6c/0x98
[   29.769925]  kfree+0x214/0x3c8
[   29.769959]  kmalloc_uaf2+0x134/0x468
[   29.769995]  kunit_try_run_case+0x170/0x3f0
[   29.770168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.770210]  kthread+0x328/0x630
[   29.770242]  ret_from_fork+0x10/0x20
[   29.770279] 
[   29.770299] The buggy address belongs to the object at fff00000c9adf180
[   29.770299]  which belongs to the cache kmalloc-64 of size 64
[   29.770359] The buggy address is located 40 bytes inside of
[   29.770359]  freed 64-byte region [fff00000c9adf180, fff00000c9adf1c0)
[   29.770420] 
[   29.770501] The buggy address belongs to the physical page:
[   29.770539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   29.770870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.770968] page_type: f5(slab)
[   29.771033] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.771094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.771135] page dumped because: kasan: bad access detected
[   29.771378] 
[   29.771451] Memory state around the buggy address:
[   29.771484]  fff00000c9adf080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.771539]  fff00000c9adf100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.771699] >fff00000c9adf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.771738]                                   ^
[   29.771772]  fff00000c9adf200: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   29.771964]  fff00000c9adf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.772066] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   29.749763] ==================================================================
[   29.749847] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   29.750031] Write of size 33 at addr fff00000c9adf000 by task kunit_try_catch/217
[   29.750115] 
[   29.750198] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.750338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.750366] Hardware name: linux,dummy-virt (DT)
[   29.750463] Call trace:
[   29.750541]  show_stack+0x20/0x38 (C)
[   29.750619]  dump_stack_lvl+0x8c/0xd0
[   29.750668]  print_report+0x118/0x5d0
[   29.750818]  kasan_report+0xdc/0x128
[   29.750864]  kasan_check_range+0x100/0x1a8
[   29.750909]  __asan_memset+0x34/0x78
[   29.750953]  kmalloc_uaf_memset+0x170/0x310
[   29.750998]  kunit_try_run_case+0x170/0x3f0
[   29.751067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.751119]  kthread+0x328/0x630
[   29.751612]  ret_from_fork+0x10/0x20
[   29.751712] 
[   29.751776] Allocated by task 217:
[   29.751804]  kasan_save_stack+0x3c/0x68
[   29.751900]  kasan_save_track+0x20/0x40
[   29.751939]  kasan_save_alloc_info+0x40/0x58
[   29.751975]  __kasan_kmalloc+0xd4/0xd8
[   29.752013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.752310]  kmalloc_uaf_memset+0xb8/0x310
[   29.752557]  kunit_try_run_case+0x170/0x3f0
[   29.752630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.752672]  kthread+0x328/0x630
[   29.752996]  ret_from_fork+0x10/0x20
[   29.753244] 
[   29.753264] Freed by task 217:
[   29.753312]  kasan_save_stack+0x3c/0x68
[   29.753354]  kasan_save_track+0x20/0x40
[   29.753419]  kasan_save_free_info+0x4c/0x78
[   29.753456]  __kasan_slab_free+0x6c/0x98
[   29.753567]  kfree+0x214/0x3c8
[   29.753617]  kmalloc_uaf_memset+0x11c/0x310
[   29.753655]  kunit_try_run_case+0x170/0x3f0
[   29.753694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.753734]  kthread+0x328/0x630
[   29.753767]  ret_from_fork+0x10/0x20
[   29.753855] 
[   29.753876] The buggy address belongs to the object at fff00000c9adf000
[   29.753876]  which belongs to the cache kmalloc-64 of size 64
[   29.753934] The buggy address is located 0 bytes inside of
[   29.753934]  freed 64-byte region [fff00000c9adf000, fff00000c9adf040)
[   29.754025] 
[   29.754056] The buggy address belongs to the physical page:
[   29.754089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   29.754145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.754199] page_type: f5(slab)
[   29.754240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.754290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.754330] page dumped because: kasan: bad access detected
[   29.754361] 
[   29.754378] Memory state around the buggy address:
[   29.754410]  fff00000c9adef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.755383]  fff00000c9adef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.755431] >fff00000c9adf000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.755516]                    ^
[   29.755658]  fff00000c9adf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.755746]  fff00000c9adf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.755810] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   29.735339] ==================================================================
[   29.735822] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   29.736073] Read of size 1 at addr fff00000c64c1b08 by task kunit_try_catch/215
[   29.736126] 
[   29.736163] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.736289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.736314] Hardware name: linux,dummy-virt (DT)
[   29.736347] Call trace:
[   29.736371]  show_stack+0x20/0x38 (C)
[   29.736420]  dump_stack_lvl+0x8c/0xd0
[   29.736467]  print_report+0x118/0x5d0
[   29.736508]  kasan_report+0xdc/0x128
[   29.736777]  __asan_report_load1_noabort+0x20/0x30
[   29.736835]  kmalloc_uaf+0x300/0x338
[   29.737037]  kunit_try_run_case+0x170/0x3f0
[   29.737226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.737280]  kthread+0x328/0x630
[   29.737321]  ret_from_fork+0x10/0x20
[   29.737397] 
[   29.737416] Allocated by task 215:
[   29.737451]  kasan_save_stack+0x3c/0x68
[   29.737495]  kasan_save_track+0x20/0x40
[   29.737550]  kasan_save_alloc_info+0x40/0x58
[   29.737593]  __kasan_kmalloc+0xd4/0xd8
[   29.737831]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.738031]  kmalloc_uaf+0xb8/0x338
[   29.738082]  kunit_try_run_case+0x170/0x3f0
[   29.738160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.738213]  kthread+0x328/0x630
[   29.738287]  ret_from_fork+0x10/0x20
[   29.738460] 
[   29.738481] Freed by task 215:
[   29.738507]  kasan_save_stack+0x3c/0x68
[   29.738663]  kasan_save_track+0x20/0x40
[   29.738776]  kasan_save_free_info+0x4c/0x78
[   29.738814]  __kasan_slab_free+0x6c/0x98
[   29.739177]  kfree+0x214/0x3c8
[   29.739231]  kmalloc_uaf+0x11c/0x338
[   29.739268]  kunit_try_run_case+0x170/0x3f0
[   29.739347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.739530]  kthread+0x328/0x630
[   29.739695]  ret_from_fork+0x10/0x20
[   29.739733] 
[   29.739788] The buggy address belongs to the object at fff00000c64c1b00
[   29.739788]  which belongs to the cache kmalloc-16 of size 16
[   29.739846] The buggy address is located 8 bytes inside of
[   29.739846]  freed 16-byte region [fff00000c64c1b00, fff00000c64c1b10)
[   29.739927] 
[   29.740034] The buggy address belongs to the physical page:
[   29.740371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1
[   29.740543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.740597] page_type: f5(slab)
[   29.740639] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.740801] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000
[   29.740845] page dumped because: kasan: bad access detected
[   29.740933] 
[   29.741016] Memory state around the buggy address:
[   29.741132]  fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.741177]  fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.741219] >fff00000c64c1b00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.741312]                       ^
[   29.741383]  fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.741453]  fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.741496] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   29.719963] ==================================================================
[   29.720355] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   29.720473] Read of size 64 at addr fff00000c9ad9d04 by task kunit_try_catch/213
[   29.720525] 
[   29.720565] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.720652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.720679] Hardware name: linux,dummy-virt (DT)
[   29.720924] Call trace:
[   29.721044]  show_stack+0x20/0x38 (C)
[   29.721206]  dump_stack_lvl+0x8c/0xd0
[   29.721254]  print_report+0x118/0x5d0
[   29.721298]  kasan_report+0xdc/0x128
[   29.721341]  kasan_check_range+0x100/0x1a8
[   29.721652]  __asan_memmove+0x3c/0x98
[   29.721714]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   29.721773]  kunit_try_run_case+0x170/0x3f0
[   29.722005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.722207]  kthread+0x328/0x630
[   29.722352]  ret_from_fork+0x10/0x20
[   29.722730] 
[   29.722818] Allocated by task 213:
[   29.722893]  kasan_save_stack+0x3c/0x68
[   29.722955]  kasan_save_track+0x20/0x40
[   29.722995]  kasan_save_alloc_info+0x40/0x58
[   29.723042]  __kasan_kmalloc+0xd4/0xd8
[   29.723091]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.723212]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   29.723539]  kunit_try_run_case+0x170/0x3f0
[   29.723586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.723864]  kthread+0x328/0x630
[   29.724014]  ret_from_fork+0x10/0x20
[   29.724113] 
[   29.724135] The buggy address belongs to the object at fff00000c9ad9d00
[   29.724135]  which belongs to the cache kmalloc-64 of size 64
[   29.724194] The buggy address is located 4 bytes inside of
[   29.724194]  allocated 64-byte region [fff00000c9ad9d00, fff00000c9ad9d40)
[   29.724265] 
[   29.724287] The buggy address belongs to the physical page:
[   29.724319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad9
[   29.724717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.724918] page_type: f5(slab)
[   29.724973] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.725023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.725265] page dumped because: kasan: bad access detected
[   29.725303] 
[   29.725555] Memory state around the buggy address:
[   29.725597]  fff00000c9ad9c00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   29.725653]  fff00000c9ad9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.725697] >fff00000c9ad9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.725735]                                            ^
[   29.725805]  fff00000c9ad9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.725937]  fff00000c9ad9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.726181] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   29.702527] ==================================================================
[   29.702754] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   29.703023] Read of size 18446744073709551614 at addr fff00000c9ad9b04 by task kunit_try_catch/211
[   29.703335] 
[   29.703398] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.703496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.703523] Hardware name: linux,dummy-virt (DT)
[   29.703646] Call trace:
[   29.703822]  show_stack+0x20/0x38 (C)
[   29.704068]  dump_stack_lvl+0x8c/0xd0
[   29.704167]  print_report+0x118/0x5d0
[   29.704274]  kasan_report+0xdc/0x128
[   29.704330]  kasan_check_range+0x100/0x1a8
[   29.704373]  __asan_memmove+0x3c/0x98
[   29.704415]  kmalloc_memmove_negative_size+0x154/0x2e0
[   29.704466]  kunit_try_run_case+0x170/0x3f0
[   29.704676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.704730]  kthread+0x328/0x630
[   29.704772]  ret_from_fork+0x10/0x20
[   29.704972] 
[   29.705026] Allocated by task 211:
[   29.705066]  kasan_save_stack+0x3c/0x68
[   29.705111]  kasan_save_track+0x20/0x40
[   29.705149]  kasan_save_alloc_info+0x40/0x58
[   29.705207]  __kasan_kmalloc+0xd4/0xd8
[   29.705387]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.705426]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   29.705613]  kunit_try_run_case+0x170/0x3f0
[   29.705765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.705811]  kthread+0x328/0x630
[   29.705847]  ret_from_fork+0x10/0x20
[   29.705929] 
[   29.706005] The buggy address belongs to the object at fff00000c9ad9b00
[   29.706005]  which belongs to the cache kmalloc-64 of size 64
[   29.706071] The buggy address is located 4 bytes inside of
[   29.706071]  64-byte region [fff00000c9ad9b00, fff00000c9ad9b40)
[   29.706130] 
[   29.706151] The buggy address belongs to the physical page:
[   29.706183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad9
[   29.706239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.706291] page_type: f5(slab)
[   29.706766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.706891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.706934] page dumped because: kasan: bad access detected
[   29.707044] 
[   29.707133] Memory state around the buggy address:
[   29.707167]  fff00000c9ad9a00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   29.707210]  fff00000c9ad9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.707251] >fff00000c9ad9b00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.707446]                    ^
[   29.707478]  fff00000c9ad9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.707717]  fff00000c9ad9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.707802] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   29.687123] ==================================================================
[   29.687350] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   29.687800] Write of size 16 at addr fff00000c636ad69 by task kunit_try_catch/209
[   29.687929] 
[   29.687970] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.688067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.688502] Hardware name: linux,dummy-virt (DT)
[   29.688596] Call trace:
[   29.688620]  show_stack+0x20/0x38 (C)
[   29.688672]  dump_stack_lvl+0x8c/0xd0
[   29.688719]  print_report+0x118/0x5d0
[   29.688763]  kasan_report+0xdc/0x128
[   29.688983]  kasan_check_range+0x100/0x1a8
[   29.689156]  __asan_memset+0x34/0x78
[   29.689258]  kmalloc_oob_memset_16+0x150/0x2f8
[   29.689394]  kunit_try_run_case+0x170/0x3f0
[   29.689463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.689640]  kthread+0x328/0x630
[   29.689854]  ret_from_fork+0x10/0x20
[   29.689910] 
[   29.689947] Allocated by task 209:
[   29.689974]  kasan_save_stack+0x3c/0x68
[   29.690015]  kasan_save_track+0x20/0x40
[   29.690062]  kasan_save_alloc_info+0x40/0x58
[   29.690099]  __kasan_kmalloc+0xd4/0xd8
[   29.690136]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.690183]  kmalloc_oob_memset_16+0xb0/0x2f8
[   29.690252]  kunit_try_run_case+0x170/0x3f0
[   29.690337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.690380]  kthread+0x328/0x630
[   29.690419]  ret_from_fork+0x10/0x20
[   29.690545] 
[   29.690564] The buggy address belongs to the object at fff00000c636ad00
[   29.690564]  which belongs to the cache kmalloc-128 of size 128
[   29.690711] The buggy address is located 105 bytes inside of
[   29.690711]  allocated 120-byte region [fff00000c636ad00, fff00000c636ad78)
[   29.690840] 
[   29.690863] The buggy address belongs to the physical page:
[   29.690895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.690950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.691055] page_type: f5(slab)
[   29.691099] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.691148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.691688] page dumped because: kasan: bad access detected
[   29.691729] 
[   29.691955] Memory state around the buggy address:
[   29.692084]  fff00000c636ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.692324]  fff00000c636ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.692369] >fff00000c636ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.692407]                                                                 ^
[   29.692448]  fff00000c636ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.692490]  fff00000c636ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.692536] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   29.673186] ==================================================================
[   29.673583] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   29.673903] Write of size 8 at addr fff00000c636ac71 by task kunit_try_catch/207
[   29.673953] 
[   29.673991] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.674088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.674273] Hardware name: linux,dummy-virt (DT)
[   29.674383] Call trace:
[   29.674520]  show_stack+0x20/0x38 (C)
[   29.674586]  dump_stack_lvl+0x8c/0xd0
[   29.674653]  print_report+0x118/0x5d0
[   29.674744]  kasan_report+0xdc/0x128
[   29.674974]  kasan_check_range+0x100/0x1a8
[   29.675020]  __asan_memset+0x34/0x78
[   29.675072]  kmalloc_oob_memset_8+0x150/0x2f8
[   29.675128]  kunit_try_run_case+0x170/0x3f0
[   29.675180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.675797]  kthread+0x328/0x630
[   29.675931]  ret_from_fork+0x10/0x20
[   29.675981] 
[   29.676000] Allocated by task 207:
[   29.676028]  kasan_save_stack+0x3c/0x68
[   29.676390]  kasan_save_track+0x20/0x40
[   29.676432]  kasan_save_alloc_info+0x40/0x58
[   29.676470]  __kasan_kmalloc+0xd4/0xd8
[   29.676508]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.676550]  kmalloc_oob_memset_8+0xb0/0x2f8
[   29.676588]  kunit_try_run_case+0x170/0x3f0
[   29.676633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.676673]  kthread+0x328/0x630
[   29.676704]  ret_from_fork+0x10/0x20
[   29.676945] 
[   29.676994] The buggy address belongs to the object at fff00000c636ac00
[   29.676994]  which belongs to the cache kmalloc-128 of size 128
[   29.677261] The buggy address is located 113 bytes inside of
[   29.677261]  allocated 120-byte region [fff00000c636ac00, fff00000c636ac78)
[   29.677711] 
[   29.677805] The buggy address belongs to the physical page:
[   29.677837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.677895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.677945] page_type: f5(slab)
[   29.677986] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.678449] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.678501] page dumped because: kasan: bad access detected
[   29.678531] 
[   29.678550] Memory state around the buggy address:
[   29.678583]  fff00000c636ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.678624]  fff00000c636ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.679200] >fff00000c636ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.679467]                                                                 ^
[   29.679593]  fff00000c636ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.679637]  fff00000c636ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.679673] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   29.650814] ==================================================================
[   29.652346] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   29.652686] Write of size 4 at addr fff00000c636ab75 by task kunit_try_catch/205
[   29.652740] 
[   29.652780] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.653829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.654080] Hardware name: linux,dummy-virt (DT)
[   29.654295] Call trace:
[   29.654703]  show_stack+0x20/0x38 (C)
[   29.655204]  dump_stack_lvl+0x8c/0xd0
[   29.655255]  print_report+0x118/0x5d0
[   29.655298]  kasan_report+0xdc/0x128
[   29.655340]  kasan_check_range+0x100/0x1a8
[   29.655384]  __asan_memset+0x34/0x78
[   29.655426]  kmalloc_oob_memset_4+0x150/0x300
[   29.655473]  kunit_try_run_case+0x170/0x3f0
[   29.655522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.656311]  kthread+0x328/0x630
[   29.657308]  ret_from_fork+0x10/0x20
[   29.657371] 
[   29.657390] Allocated by task 205:
[   29.657419]  kasan_save_stack+0x3c/0x68
[   29.657601]  kasan_save_track+0x20/0x40
[   29.657641]  kasan_save_alloc_info+0x40/0x58
[   29.657730]  __kasan_kmalloc+0xd4/0xd8
[   29.657894]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.657933]  kmalloc_oob_memset_4+0xb0/0x300
[   29.658112]  kunit_try_run_case+0x170/0x3f0
[   29.658269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.658555]  kthread+0x328/0x630
[   29.658653]  ret_from_fork+0x10/0x20
[   29.658981] 
[   29.659004] The buggy address belongs to the object at fff00000c636ab00
[   29.659004]  which belongs to the cache kmalloc-128 of size 128
[   29.659087] The buggy address is located 117 bytes inside of
[   29.659087]  allocated 120-byte region [fff00000c636ab00, fff00000c636ab78)
[   29.659148] 
[   29.659170] The buggy address belongs to the physical page:
[   29.659203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.659258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.659309] page_type: f5(slab)
[   29.659856] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.660165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.660314] page dumped because: kasan: bad access detected
[   29.660371] 
[   29.660389] Memory state around the buggy address:
[   29.660422]  fff00000c636aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.660462]  fff00000c636aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.660614] >fff00000c636ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.660656]                                                                 ^
[   29.660740]  fff00000c636ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.660782]  fff00000c636ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.660866] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   29.621883] ==================================================================
[   29.622101] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   29.622372] Write of size 2 at addr fff00000c636aa77 by task kunit_try_catch/203
[   29.622716] 
[   29.622958] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.623058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.623083] Hardware name: linux,dummy-virt (DT)
[   29.623114] Call trace:
[   29.623137]  show_stack+0x20/0x38 (C)
[   29.623190]  dump_stack_lvl+0x8c/0xd0
[   29.623236]  print_report+0x118/0x5d0
[   29.623279]  kasan_report+0xdc/0x128
[   29.623320]  kasan_check_range+0x100/0x1a8
[   29.623363]  __asan_memset+0x34/0x78
[   29.623405]  kmalloc_oob_memset_2+0x150/0x2f8
[   29.623450]  kunit_try_run_case+0x170/0x3f0
[   29.624030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.624416]  kthread+0x328/0x630
[   29.625035]  ret_from_fork+0x10/0x20
[   29.625097] 
[   29.625116] Allocated by task 203:
[   29.625143]  kasan_save_stack+0x3c/0x68
[   29.625185]  kasan_save_track+0x20/0x40
[   29.625672]  kasan_save_alloc_info+0x40/0x58
[   29.625947]  __kasan_kmalloc+0xd4/0xd8
[   29.625989]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.626284]  kmalloc_oob_memset_2+0xb0/0x2f8
[   29.626447]  kunit_try_run_case+0x170/0x3f0
[   29.627072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.627687]  kthread+0x328/0x630
[   29.628007]  ret_from_fork+0x10/0x20
[   29.628241] 
[   29.628282] The buggy address belongs to the object at fff00000c636aa00
[   29.628282]  which belongs to the cache kmalloc-128 of size 128
[   29.628355] The buggy address is located 119 bytes inside of
[   29.628355]  allocated 120-byte region [fff00000c636aa00, fff00000c636aa78)
[   29.628416] 
[   29.628438] The buggy address belongs to the physical page:
[   29.628469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.628523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.628572] page_type: f5(slab)
[   29.628614] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.628661] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.628699] page dumped because: kasan: bad access detected
[   29.628729] 
[   29.628747] Memory state around the buggy address:
[   29.628779]  fff00000c636a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.628819]  fff00000c636a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.628859] >fff00000c636aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.628895]                                                                 ^
[   29.628934]  fff00000c636aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.628974]  fff00000c636ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.629011] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   29.594887] ==================================================================
[   29.594982] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   29.595061] Write of size 128 at addr fff00000c636a900 by task kunit_try_catch/201
[   29.595111] 
[   29.595150] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.595986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.596367] Hardware name: linux,dummy-virt (DT)
[   29.596667] Call trace:
[   29.596706]  show_stack+0x20/0x38 (C)
[   29.596764]  dump_stack_lvl+0x8c/0xd0
[   29.596812]  print_report+0x118/0x5d0
[   29.597449]  kasan_report+0xdc/0x128
[   29.597518]  kasan_check_range+0x100/0x1a8
[   29.597896]  __asan_memset+0x34/0x78
[   29.598199]  kmalloc_oob_in_memset+0x144/0x2d0
[   29.598292]  kunit_try_run_case+0x170/0x3f0
[   29.598341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.598934]  kthread+0x328/0x630
[   29.599079]  ret_from_fork+0x10/0x20
[   29.599354] 
[   29.599374] Allocated by task 201:
[   29.599752]  kasan_save_stack+0x3c/0x68
[   29.600089]  kasan_save_track+0x20/0x40
[   29.600148]  kasan_save_alloc_info+0x40/0x58
[   29.600209]  __kasan_kmalloc+0xd4/0xd8
[   29.600392]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.600434]  kmalloc_oob_in_memset+0xb0/0x2d0
[   29.600472]  kunit_try_run_case+0x170/0x3f0
[   29.601017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.601162]  kthread+0x328/0x630
[   29.601195]  ret_from_fork+0x10/0x20
[   29.601230] 
[   29.601761] The buggy address belongs to the object at fff00000c636a900
[   29.601761]  which belongs to the cache kmalloc-128 of size 128
[   29.601884] The buggy address is located 0 bytes inside of
[   29.601884]  allocated 120-byte region [fff00000c636a900, fff00000c636a978)
[   29.602131] 
[   29.602396] The buggy address belongs to the physical page:
[   29.602429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.602643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.602697] page_type: f5(slab)
[   29.603345] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.603400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.603916] page dumped because: kasan: bad access detected
[   29.604216] 
[   29.604387] Memory state around the buggy address:
[   29.604427]  fff00000c636a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.604608]  fff00000c636a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.604680] >fff00000c636a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.604731]                                                                 ^
[   29.604778]  fff00000c636a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.604819]  fff00000c636aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605144] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   29.562476] ==================================================================
[   29.562555] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   29.562618] Read of size 16 at addr fff00000c64c1ae0 by task kunit_try_catch/199
[   29.562854] 
[   29.562913] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.562999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.563031] Hardware name: linux,dummy-virt (DT)
[   29.563100] Call trace:
[   29.563133]  show_stack+0x20/0x38 (C)
[   29.563185]  dump_stack_lvl+0x8c/0xd0
[   29.563230]  print_report+0x118/0x5d0
[   29.563272]  kasan_report+0xdc/0x128
[   29.563314]  __asan_report_load16_noabort+0x20/0x30
[   29.563362]  kmalloc_uaf_16+0x3bc/0x438
[   29.563416]  kunit_try_run_case+0x170/0x3f0
[   29.563472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.563521]  kthread+0x328/0x630
[   29.563562]  ret_from_fork+0x10/0x20
[   29.563608] 
[   29.563626] Allocated by task 199:
[   29.563822]  kasan_save_stack+0x3c/0x68
[   29.563880]  kasan_save_track+0x20/0x40
[   29.563918]  kasan_save_alloc_info+0x40/0x58
[   29.564123]  __kasan_kmalloc+0xd4/0xd8
[   29.564658]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.564894]  kmalloc_uaf_16+0x140/0x438
[   29.564944]  kunit_try_run_case+0x170/0x3f0
[   29.564984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.565384]  kthread+0x328/0x630
[   29.565593]  ret_from_fork+0x10/0x20
[   29.565898] 
[   29.565974] Freed by task 199:
[   29.566002]  kasan_save_stack+0x3c/0x68
[   29.566044]  kasan_save_track+0x20/0x40
[   29.566728]  kasan_save_free_info+0x4c/0x78
[   29.566775]  __kasan_slab_free+0x6c/0x98
[   29.567040]  kfree+0x214/0x3c8
[   29.567094]  kmalloc_uaf_16+0x190/0x438
[   29.567131]  kunit_try_run_case+0x170/0x3f0
[   29.567169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.567947]  kthread+0x328/0x630
[   29.568009]  ret_from_fork+0x10/0x20
[   29.568472] 
[   29.568654] The buggy address belongs to the object at fff00000c64c1ae0
[   29.568654]  which belongs to the cache kmalloc-16 of size 16
[   29.568720] The buggy address is located 0 bytes inside of
[   29.568720]  freed 16-byte region [fff00000c64c1ae0, fff00000c64c1af0)
[   29.568779] 
[   29.569119] The buggy address belongs to the physical page:
[   29.569371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1
[   29.569952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.570261] page_type: f5(slab)
[   29.570507] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.570655] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000
[   29.570957] page dumped because: kasan: bad access detected
[   29.570989] 
[   29.571007] Memory state around the buggy address:
[   29.571043]  fff00000c64c1980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.571474]  fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.571548] >fff00000c64c1a80: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   29.571585]                                                        ^
[   29.571829]  fff00000c64c1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.571872]  fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.571909] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   29.546734] ==================================================================
[   29.546807] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   29.546901] Write of size 16 at addr fff00000c64c1a80 by task kunit_try_catch/197
[   29.546953] 
[   29.546988] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.547083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.547118] Hardware name: linux,dummy-virt (DT)
[   29.547149] Call trace:
[   29.547171]  show_stack+0x20/0x38 (C)
[   29.547221]  dump_stack_lvl+0x8c/0xd0
[   29.547267]  print_report+0x118/0x5d0
[   29.547309]  kasan_report+0xdc/0x128
[   29.547350]  __asan_report_store16_noabort+0x20/0x30
[   29.547435]  kmalloc_oob_16+0x3a0/0x3f8
[   29.547634]  kunit_try_run_case+0x170/0x3f0
[   29.547682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.547730]  kthread+0x328/0x630
[   29.547772]  ret_from_fork+0x10/0x20
[   29.547818] 
[   29.547835] Allocated by task 197:
[   29.547861]  kasan_save_stack+0x3c/0x68
[   29.547901]  kasan_save_track+0x20/0x40
[   29.547938]  kasan_save_alloc_info+0x40/0x58
[   29.547973]  __kasan_kmalloc+0xd4/0xd8
[   29.548009]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.548064]  kmalloc_oob_16+0xb4/0x3f8
[   29.548219]  kunit_try_run_case+0x170/0x3f0
[   29.548258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.548297]  kthread+0x328/0x630
[   29.548328]  ret_from_fork+0x10/0x20
[   29.548364] 
[   29.548382] The buggy address belongs to the object at fff00000c64c1a80
[   29.548382]  which belongs to the cache kmalloc-16 of size 16
[   29.548437] The buggy address is located 0 bytes inside of
[   29.548437]  allocated 13-byte region [fff00000c64c1a80, fff00000c64c1a8d)
[   29.548607] 
[   29.548628] The buggy address belongs to the physical page:
[   29.548657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1
[   29.548715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.548764] page_type: f5(slab)
[   29.548812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.548861] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000
[   29.548900] page dumped because: kasan: bad access detected
[   29.548929] 
[   29.548947] Memory state around the buggy address:
[   29.548977]  fff00000c64c1980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.549019]  fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.549069] >fff00000c64c1a80: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.549105]                       ^
[   29.549132]  fff00000c64c1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.549172]  fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.549225] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   29.531496] ==================================================================
[   29.531561] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   29.531704] Read of size 1 at addr fff00000c9688400 by task kunit_try_catch/195
[   29.531769] 
[   29.531802] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.531884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.531909] Hardware name: linux,dummy-virt (DT)
[   29.531939] Call trace:
[   29.531961]  show_stack+0x20/0x38 (C)
[   29.532009]  dump_stack_lvl+0x8c/0xd0
[   29.532065]  print_report+0x118/0x5d0
[   29.532120]  kasan_report+0xdc/0x128
[   29.532256]  __kasan_check_byte+0x54/0x70
[   29.532348]  krealloc_noprof+0x44/0x360
[   29.532419]  krealloc_uaf+0x180/0x520
[   29.532482]  kunit_try_run_case+0x170/0x3f0
[   29.532528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.532576]  kthread+0x328/0x630
[   29.532616]  ret_from_fork+0x10/0x20
[   29.532663] 
[   29.532681] Allocated by task 195:
[   29.532709]  kasan_save_stack+0x3c/0x68
[   29.532750]  kasan_save_track+0x20/0x40
[   29.532787]  kasan_save_alloc_info+0x40/0x58
[   29.532843]  __kasan_kmalloc+0xd4/0xd8
[   29.532880]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.532918]  krealloc_uaf+0xc8/0x520
[   29.533008]  kunit_try_run_case+0x170/0x3f0
[   29.533058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.533098]  kthread+0x328/0x630
[   29.533131]  ret_from_fork+0x10/0x20
[   29.533166] 
[   29.533199] Freed by task 195:
[   29.533247]  kasan_save_stack+0x3c/0x68
[   29.533285]  kasan_save_track+0x20/0x40
[   29.533321]  kasan_save_free_info+0x4c/0x78
[   29.533357]  __kasan_slab_free+0x6c/0x98
[   29.533394]  kfree+0x214/0x3c8
[   29.533428]  krealloc_uaf+0x12c/0x520
[   29.533472]  kunit_try_run_case+0x170/0x3f0
[   29.533670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.533712]  kthread+0x328/0x630
[   29.533744]  ret_from_fork+0x10/0x20
[   29.533796] 
[   29.533918] The buggy address belongs to the object at fff00000c9688400
[   29.533918]  which belongs to the cache kmalloc-256 of size 256
[   29.534084] The buggy address is located 0 bytes inside of
[   29.534084]  freed 256-byte region [fff00000c9688400, fff00000c9688500)
[   29.534145] 
[   29.534166] The buggy address belongs to the physical page:
[   29.534197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688
[   29.534248] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.534294] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.534422] page_type: f5(slab)
[   29.534540] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.534710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.534758] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.534805] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.534853] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff
[   29.534901] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.534940] page dumped because: kasan: bad access detected
[   29.534971] 
[   29.534989] Memory state around the buggy address:
[   29.535021]  fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.535081]  fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.535121] >fff00000c9688400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.535157]                    ^
[   29.535183]  fff00000c9688480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.535223]  fff00000c9688500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.535260] ==================================================================
[   29.536698] ==================================================================
[   29.536748] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   29.536795] Read of size 1 at addr fff00000c9688400 by task kunit_try_catch/195
[   29.536931] 
[   29.536965] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.537044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.537081] Hardware name: linux,dummy-virt (DT)
[   29.537110] Call trace:
[   29.537131]  show_stack+0x20/0x38 (C)
[   29.537187]  dump_stack_lvl+0x8c/0xd0
[   29.537233]  print_report+0x118/0x5d0
[   29.537275]  kasan_report+0xdc/0x128
[   29.537316]  __asan_report_load1_noabort+0x20/0x30
[   29.537362]  krealloc_uaf+0x4c8/0x520
[   29.537407]  kunit_try_run_case+0x170/0x3f0
[   29.537453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.537571]  kthread+0x328/0x630
[   29.537694]  ret_from_fork+0x10/0x20
[   29.537742] 
[   29.537759] Allocated by task 195:
[   29.537791]  kasan_save_stack+0x3c/0x68
[   29.537864]  kasan_save_track+0x20/0x40
[   29.537901]  kasan_save_alloc_info+0x40/0x58
[   29.537936]  __kasan_kmalloc+0xd4/0xd8
[   29.537972]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.538011]  krealloc_uaf+0xc8/0x520
[   29.538045]  kunit_try_run_case+0x170/0x3f0
[   29.538091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.538129]  kthread+0x328/0x630
[   29.538160]  ret_from_fork+0x10/0x20
[   29.538263] 
[   29.538349] Freed by task 195:
[   29.538470]  kasan_save_stack+0x3c/0x68
[   29.538552]  kasan_save_track+0x20/0x40
[   29.538589]  kasan_save_free_info+0x4c/0x78
[   29.538624]  __kasan_slab_free+0x6c/0x98
[   29.538660]  kfree+0x214/0x3c8
[   29.538692]  krealloc_uaf+0x12c/0x520
[   29.538726]  kunit_try_run_case+0x170/0x3f0
[   29.538763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.538808]  kthread+0x328/0x630
[   29.538957]  ret_from_fork+0x10/0x20
[   29.539080] 
[   29.539097] The buggy address belongs to the object at fff00000c9688400
[   29.539097]  which belongs to the cache kmalloc-256 of size 256
[   29.539153] The buggy address is located 0 bytes inside of
[   29.539153]  freed 256-byte region [fff00000c9688400, fff00000c9688500)
[   29.539210] 
[   29.539229] The buggy address belongs to the physical page:
[   29.539259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688
[   29.539309] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.539354] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.539439] page_type: f5(slab)
[   29.539670] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.539720] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.539769] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.539816] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.539863] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff
[   29.539910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.539948] page dumped because: kasan: bad access detected
[   29.539986] 
[   29.540004] Memory state around the buggy address:
[   29.540034]  fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540084]  fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540125] >fff00000c9688400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.540183]                    ^
[   29.540210]  fff00000c9688480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.540250]  fff00000c9688500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540302] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   29.445135] ==================================================================
[   29.445197] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.445256] Write of size 1 at addr fff00000c96882c9 by task kunit_try_catch/189
[   29.445305] 
[   29.445341] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.445528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.445554] Hardware name: linux,dummy-virt (DT)
[   29.445584] Call trace:
[   29.445612]  show_stack+0x20/0x38 (C)
[   29.445717]  dump_stack_lvl+0x8c/0xd0
[   29.445854]  print_report+0x118/0x5d0
[   29.445898]  kasan_report+0xdc/0x128
[   29.445939]  __asan_report_store1_noabort+0x20/0x30
[   29.445986]  krealloc_less_oob_helper+0xa48/0xc50
[   29.446034]  krealloc_less_oob+0x20/0x38
[   29.446089]  kunit_try_run_case+0x170/0x3f0
[   29.446136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.446184]  kthread+0x328/0x630
[   29.446225]  ret_from_fork+0x10/0x20
[   29.446272] 
[   29.446290] Allocated by task 189:
[   29.446317]  kasan_save_stack+0x3c/0x68
[   29.446368]  kasan_save_track+0x20/0x40
[   29.446408]  kasan_save_alloc_info+0x40/0x58
[   29.446445]  __kasan_krealloc+0x118/0x178
[   29.446560]  krealloc_noprof+0x128/0x360
[   29.446783]  krealloc_less_oob_helper+0x168/0xc50
[   29.447114]  krealloc_less_oob+0x20/0x38
[   29.447158]  kunit_try_run_case+0x170/0x3f0
[   29.447475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.447662]  kthread+0x328/0x630
[   29.447697]  ret_from_fork+0x10/0x20
[   29.447731] 
[   29.447750] The buggy address belongs to the object at fff00000c9688200
[   29.447750]  which belongs to the cache kmalloc-256 of size 256
[   29.448332] The buggy address is located 0 bytes to the right of
[   29.448332]  allocated 201-byte region [fff00000c9688200, fff00000c96882c9)
[   29.448416] 
[   29.448438] The buggy address belongs to the physical page:
[   29.448469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688
[   29.448688] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.448843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.448899] page_type: f5(slab)
[   29.448940] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.448999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.449058] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.449501] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.449628] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff
[   29.449813] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.450040] page dumped because: kasan: bad access detected
[   29.450117] 
[   29.450135] Memory state around the buggy address:
[   29.450202]  fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.450243]  fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.450448] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.450626]                                               ^
[   29.450666]  fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.450842]  fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.450916] ==================================================================
[   29.461298] ==================================================================
[   29.461353] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.461408] Write of size 1 at addr fff00000c96882da by task kunit_try_catch/189
[   29.461456] 
[   29.461580] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.461948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.461974] Hardware name: linux,dummy-virt (DT)
[   29.462004] Call trace:
[   29.462026]  show_stack+0x20/0x38 (C)
[   29.462085]  dump_stack_lvl+0x8c/0xd0
[   29.462129]  print_report+0x118/0x5d0
[   29.462171]  kasan_report+0xdc/0x128
[   29.462213]  __asan_report_store1_noabort+0x20/0x30
[   29.462267]  krealloc_less_oob_helper+0xa80/0xc50
[   29.462490]  krealloc_less_oob+0x20/0x38
[   29.462707]  kunit_try_run_case+0x170/0x3f0
[   29.462783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.462832]  kthread+0x328/0x630
[   29.462880]  ret_from_fork+0x10/0x20
[   29.463003] 
[   29.463040] Allocated by task 189:
[   29.463336]  kasan_save_stack+0x3c/0x68
[   29.463671]  kasan_save_track+0x20/0x40
[   29.464020]  kasan_save_alloc_info+0x40/0x58
[   29.464071]  __kasan_krealloc+0x118/0x178
[   29.464109]  krealloc_noprof+0x128/0x360
[   29.464147]  krealloc_less_oob_helper+0x168/0xc50
[   29.464478]  krealloc_less_oob+0x20/0x38
[   29.464626]  kunit_try_run_case+0x170/0x3f0
[   29.464783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.464870]  kthread+0x328/0x630
[   29.464904]  ret_from_fork+0x10/0x20
[   29.464940] 
[   29.464960] The buggy address belongs to the object at fff00000c9688200
[   29.464960]  which belongs to the cache kmalloc-256 of size 256
[   29.465018] The buggy address is located 17 bytes to the right of
[   29.465018]  allocated 201-byte region [fff00000c9688200, fff00000c96882c9)
[   29.465091] 
[   29.465111] The buggy address belongs to the physical page:
[   29.465168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688
[   29.465219] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.465264] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.465315] page_type: f5(slab)
[   29.465352] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.465400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.465447] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.465907] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.466025] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff
[   29.466096] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.466189] page dumped because: kasan: bad access detected
[   29.466289] 
[   29.466307] Memory state around the buggy address:
[   29.466338]  fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.466387]  fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.466767] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.466869]                                                     ^
[   29.466922]  fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.467022]  fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.467205] ==================================================================
[   29.522835] ==================================================================
[   29.522867] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.522906] Write of size 1 at addr fff00000c9b060eb by task kunit_try_catch/193
[   29.522955] 
[   29.522982] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.523186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.523286] Hardware name: linux,dummy-virt (DT)
[   29.523406] Call trace:
[   29.523460]  show_stack+0x20/0x38 (C)
[   29.523505]  dump_stack_lvl+0x8c/0xd0
[   29.523700]  print_report+0x118/0x5d0
[   29.523811]  kasan_report+0xdc/0x128
[   29.523938]  __asan_report_store1_noabort+0x20/0x30
[   29.524148]  krealloc_less_oob_helper+0xa58/0xc50
[   29.524231]  krealloc_large_less_oob+0x20/0x38
[   29.524278]  kunit_try_run_case+0x170/0x3f0
[   29.524325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.524373]  kthread+0x328/0x630
[   29.524414]  ret_from_fork+0x10/0x20
[   29.524460] 
[   29.524479] The buggy address belongs to the physical page:
[   29.524508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04
[   29.524558] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.524602] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.524651] page_type: f8(unknown)
[   29.524715] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.524817] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.524877] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.524925] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.524972] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff
[   29.525020] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.525066] page dumped because: kasan: bad access detected
[   29.525095] 
[   29.525156] Memory state around the buggy address:
[   29.525185]  fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.525227]  fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.525286] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.525321]                                                           ^
[   29.525358]  fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.525399]  fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.525495] ==================================================================
[   29.518292] ==================================================================
[   29.518361] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.518415] Write of size 1 at addr fff00000c9b060da by task kunit_try_catch/193
[   29.518543] 
[   29.518629] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.518708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.518732] Hardware name: linux,dummy-virt (DT)
[   29.518761] Call trace:
[   29.518781]  show_stack+0x20/0x38 (C)
[   29.518826]  dump_stack_lvl+0x8c/0xd0
[   29.518870]  print_report+0x118/0x5d0
[   29.518911]  kasan_report+0xdc/0x128
[   29.518952]  __asan_report_store1_noabort+0x20/0x30
[   29.519020]  krealloc_less_oob_helper+0xa80/0xc50
[   29.519079]  krealloc_large_less_oob+0x20/0x38
[   29.519125]  kunit_try_run_case+0x170/0x3f0
[   29.519172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.519220]  kthread+0x328/0x630
[   29.519260]  ret_from_fork+0x10/0x20
[   29.519315] 
[   29.519335] The buggy address belongs to the physical page:
[   29.519364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04
[   29.519414] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.519458] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.519510] page_type: f8(unknown)
[   29.519546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.519695] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.519878] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.519924] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.520128] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff
[   29.520244] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.520284] page dumped because: kasan: bad access detected
[   29.520313] 
[   29.520330] Memory state around the buggy address:
[   29.520360]  fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.520400]  fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.520440] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.520475]                                                     ^
[   29.520547]  fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.520605]  fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.520642] ==================================================================
[   29.473897] ==================================================================
[   29.473942] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.473990] Write of size 1 at addr fff00000c96882eb by task kunit_try_catch/189
[   29.474037] 
[   29.474080] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.474159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.474194] Hardware name: linux,dummy-virt (DT)
[   29.474337] Call trace:
[   29.474360]  show_stack+0x20/0x38 (C)
[   29.474407]  dump_stack_lvl+0x8c/0xd0
[   29.474450]  print_report+0x118/0x5d0
[   29.474492]  kasan_report+0xdc/0x128
[   29.474533]  __asan_report_store1_noabort+0x20/0x30
[   29.474580]  krealloc_less_oob_helper+0xa58/0xc50
[   29.474627]  krealloc_less_oob+0x20/0x38
[   29.474671]  kunit_try_run_case+0x170/0x3f0
[   29.474718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.474766]  kthread+0x328/0x630
[   29.474806]  ret_from_fork+0x10/0x20
[   29.474858] 
[   29.474882] Allocated by task 189:
[   29.474908]  kasan_save_stack+0x3c/0x68
[   29.475305]  kasan_save_track+0x20/0x40
[   29.475530]  kasan_save_alloc_info+0x40/0x58
[   29.475966]  __kasan_krealloc+0x118/0x178
[   29.476011]  krealloc_noprof+0x128/0x360
[   29.476428]  krealloc_less_oob_helper+0x168/0xc50
[   29.476684]  krealloc_less_oob+0x20/0x38
[   29.476725]  kunit_try_run_case+0x170/0x3f0
[   29.476763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.476806]  kthread+0x328/0x630
[   29.476838]  ret_from_fork+0x10/0x20
[   29.476991] 
[   29.477016] The buggy address belongs to the object at fff00000c9688200
[   29.477016]  which belongs to the cache kmalloc-256 of size 256
[   29.477271] The buggy address is located 34 bytes to the right of
[   29.477271]  allocated 201-byte region [fff00000c9688200, fff00000c96882c9)
[   29.477372] 
[   29.477399] The buggy address belongs to the physical page:
[   29.477556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688
[   29.477664] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.477710] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.477772] page_type: f5(slab)
[   29.477905] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.477953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.478003] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.478060] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.478108] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff
[   29.478254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.478447] page dumped because: kasan: bad access detected
[   29.478481] 
[   29.478633] Memory state around the buggy address:
[   29.479017]  fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.479268]  fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.479376] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.479426]                                                           ^
[   29.479500]  fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.479666]  fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.479703] ==================================================================
[   29.452232] ==================================================================
[   29.452280] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.452328] Write of size 1 at addr fff00000c96882d0 by task kunit_try_catch/189
[   29.452375] 
[   29.452407] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.452487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.452512] Hardware name: linux,dummy-virt (DT)
[   29.452542] Call trace:
[   29.452563]  show_stack+0x20/0x38 (C)
[   29.452990]  dump_stack_lvl+0x8c/0xd0
[   29.453064]  print_report+0x118/0x5d0
[   29.453107]  kasan_report+0xdc/0x128
[   29.453149]  __asan_report_store1_noabort+0x20/0x30
[   29.453503]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.453849]  krealloc_less_oob+0x20/0x38
[   29.454037]  kunit_try_run_case+0x170/0x3f0
[   29.454111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.454546]  kthread+0x328/0x630
[   29.454709]  ret_from_fork+0x10/0x20
[   29.455154] 
[   29.455325] Allocated by task 189:
[   29.455455]  kasan_save_stack+0x3c/0x68
[   29.455499]  kasan_save_track+0x20/0x40
[   29.455560]  kasan_save_alloc_info+0x40/0x58
[   29.455926]  __kasan_krealloc+0x118/0x178
[   29.455974]  krealloc_noprof+0x128/0x360
[   29.456058]  krealloc_less_oob_helper+0x168/0xc50
[   29.456097]  krealloc_less_oob+0x20/0x38
[   29.456481]  kunit_try_run_case+0x170/0x3f0
[   29.456526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.456565]  kthread+0x328/0x630
[   29.456597]  ret_from_fork+0x10/0x20
[   29.456703] 
[   29.456722] The buggy address belongs to the object at fff00000c9688200
[   29.456722]  which belongs to the cache kmalloc-256 of size 256
[   29.457013] The buggy address is located 7 bytes to the right of
[   29.457013]  allocated 201-byte region [fff00000c9688200, fff00000c96882c9)
[   29.457158] 
[   29.457180] The buggy address belongs to the physical page:
[   29.457412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688
[   29.457524] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.457582] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.457639] page_type: f5(slab)
[   29.457678] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.457860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.457915] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.458094] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.458148] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff
[   29.458195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.458351] page dumped because: kasan: bad access detected
[   29.458427] 
[   29.458446] Memory state around the buggy address:
[   29.458481]  fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.458623]  fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.458708] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.458809]                                                  ^
[   29.458906]  fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.458948]  fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.459028] ==================================================================
[   29.509897] ==================================================================
[   29.509972] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.510035] Write of size 1 at addr fff00000c9b060c9 by task kunit_try_catch/193
[   29.510098] 
[   29.510136] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.510218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.510244] Hardware name: linux,dummy-virt (DT)
[   29.510275] Call trace:
[   29.510298]  show_stack+0x20/0x38 (C)
[   29.510345]  dump_stack_lvl+0x8c/0xd0
[   29.510391]  print_report+0x118/0x5d0
[   29.510433]  kasan_report+0xdc/0x128
[   29.510475]  __asan_report_store1_noabort+0x20/0x30
[   29.510522]  krealloc_less_oob_helper+0xa48/0xc50
[   29.510569]  krealloc_large_less_oob+0x20/0x38
[   29.510616]  kunit_try_run_case+0x170/0x3f0
[   29.510663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.511008]  kthread+0x328/0x630
[   29.511323]  ret_from_fork+0x10/0x20
[   29.511752] 
[   29.511920] The buggy address belongs to the physical page:
[   29.511958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04
[   29.512014] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.512072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.512307] page_type: f8(unknown)
[   29.512490] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.512755] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.513018] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.513075] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.513125] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff
[   29.513193] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.513232] page dumped because: kasan: bad access detected
[   29.513262] 
[   29.513280] Memory state around the buggy address:
[   29.513312]  fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.513354]  fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.513394] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.513430]                                               ^
[   29.513463]  fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.513505]  fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.513541] ==================================================================
[   29.515419] ==================================================================
[   29.515466] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.515517] Write of size 1 at addr fff00000c9b060d0 by task kunit_try_catch/193
[   29.515564] 
[   29.515595] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.515676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.515701] Hardware name: linux,dummy-virt (DT)
[   29.515748] Call trace:
[   29.515782]  show_stack+0x20/0x38 (C)
[   29.515838]  dump_stack_lvl+0x8c/0xd0
[   29.516091]  print_report+0x118/0x5d0
[   29.516232]  kasan_report+0xdc/0x128
[   29.516274]  __asan_report_store1_noabort+0x20/0x30
[   29.516321]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.516369]  krealloc_large_less_oob+0x20/0x38
[   29.516415]  kunit_try_run_case+0x170/0x3f0
[   29.516464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.516512]  kthread+0x328/0x630
[   29.516553]  ret_from_fork+0x10/0x20
[   29.516600] 
[   29.516620] The buggy address belongs to the physical page:
[   29.516650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04
[   29.516702] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.516764] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.516888] page_type: f8(unknown)
[   29.516934] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.517056] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.517283] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.517330] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.517378] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff
[   29.517424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.517462] page dumped because: kasan: bad access detected
[   29.517491] 
[   29.517508] Memory state around the buggy address:
[   29.517537]  fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.517580]  fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.517627] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.517674]                                                  ^
[   29.517708]  fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.517749]  fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.517872] ==================================================================
[   29.467872] ==================================================================
[   29.467941] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.467987] Write of size 1 at addr fff00000c96882ea by task kunit_try_catch/189
[   29.468034] 
[   29.468076] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.468155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.468215] Hardware name: linux,dummy-virt (DT)
[   29.468295] Call trace:
[   29.468317]  show_stack+0x20/0x38 (C)
[   29.468492]  dump_stack_lvl+0x8c/0xd0
[   29.468542]  print_report+0x118/0x5d0
[   29.468641]  kasan_report+0xdc/0x128
[   29.468732]  __asan_report_store1_noabort+0x20/0x30
[   29.468849]  krealloc_less_oob_helper+0xae4/0xc50
[   29.468944]  krealloc_less_oob+0x20/0x38
[   29.469089]  kunit_try_run_case+0x170/0x3f0
[   29.469232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.469320]  kthread+0x328/0x630
[   29.469448]  ret_from_fork+0x10/0x20
[   29.469523] 
[   29.469542] Allocated by task 189:
[   29.469581]  kasan_save_stack+0x3c/0x68
[   29.469626]  kasan_save_track+0x20/0x40
[   29.469663]  kasan_save_alloc_info+0x40/0x58
[   29.469806]  __kasan_krealloc+0x118/0x178
[   29.470077]  krealloc_noprof+0x128/0x360
[   29.470118]  krealloc_less_oob_helper+0x168/0xc50
[   29.470202]  krealloc_less_oob+0x20/0x38
[   29.470239]  kunit_try_run_case+0x170/0x3f0
[   29.470283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.470449]  kthread+0x328/0x630
[   29.470480]  ret_from_fork+0x10/0x20
[   29.470514] 
[   29.470533] The buggy address belongs to the object at fff00000c9688200
[   29.470533]  which belongs to the cache kmalloc-256 of size 256
[   29.470589] The buggy address is located 33 bytes to the right of
[   29.470589]  allocated 201-byte region [fff00000c9688200, fff00000c96882c9)
[   29.470651] 
[   29.470716] The buggy address belongs to the physical page:
[   29.470858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688
[   29.471068] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.471114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.471163] page_type: f5(slab)
[   29.471252] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.471573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.471923] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.471985] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.472036] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff
[   29.472091] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.472129] page dumped because: kasan: bad access detected
[   29.472368] 
[   29.472453] Memory state around the buggy address:
[   29.472492]  fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.472535]  fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.472575] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.472611]                                                           ^
[   29.472844]  fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.472962]  fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.472999] ==================================================================
[   29.520788] ==================================================================
[   29.520826] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.520870] Write of size 1 at addr fff00000c9b060ea by task kunit_try_catch/193
[   29.520916] 
[   29.520943] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.521085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.521113] Hardware name: linux,dummy-virt (DT)
[   29.521142] Call trace:
[   29.521162]  show_stack+0x20/0x38 (C)
[   29.521208]  dump_stack_lvl+0x8c/0xd0
[   29.521263]  print_report+0x118/0x5d0
[   29.521462]  kasan_report+0xdc/0x128
[   29.521505]  __asan_report_store1_noabort+0x20/0x30
[   29.521559]  krealloc_less_oob_helper+0xae4/0xc50
[   29.521638]  krealloc_large_less_oob+0x20/0x38
[   29.521684]  kunit_try_run_case+0x170/0x3f0
[   29.521732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.521779]  kthread+0x328/0x630
[   29.521820]  ret_from_fork+0x10/0x20
[   29.521866] 
[   29.521894] The buggy address belongs to the physical page:
[   29.521995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04
[   29.522071] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.522115] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.522164] page_type: f8(unknown)
[   29.522200] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.522247] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.522294] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.522341] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.522388] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff
[   29.522434] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.522472] page dumped because: kasan: bad access detected
[   29.522501] 
[   29.522518] Memory state around the buggy address:
[   29.522547]  fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.522597]  fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.522638] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.522674]                                                           ^
[   29.522710]  fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.522749]  fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.522784] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   29.497207] ==================================================================
[   29.497262] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.497317] Write of size 1 at addr fff00000c9b060f0 by task kunit_try_catch/191
[   29.497364] 
[   29.497399] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.497515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.497543] Hardware name: linux,dummy-virt (DT)
[   29.497574] Call trace:
[   29.497603]  show_stack+0x20/0x38 (C)
[   29.497655]  dump_stack_lvl+0x8c/0xd0
[   29.497703]  print_report+0x118/0x5d0
[   29.497745]  kasan_report+0xdc/0x128
[   29.498086]  __asan_report_store1_noabort+0x20/0x30
[   29.498332]  krealloc_more_oob_helper+0x5c0/0x678
[   29.498456]  krealloc_large_more_oob+0x20/0x38
[   29.498559]  kunit_try_run_case+0x170/0x3f0
[   29.498677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.498726]  kthread+0x328/0x630
[   29.498768]  ret_from_fork+0x10/0x20
[   29.498818] 
[   29.498839] The buggy address belongs to the physical page:
[   29.498991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04
[   29.499161] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.499319] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.499471] page_type: f8(unknown)
[   29.499528] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.499689] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.499773] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.500057] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.500240] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff
[   29.500408] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.500473] page dumped because: kasan: bad access detected
[   29.500570] 
[   29.500635] Memory state around the buggy address:
[   29.500684]  fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.500726]  fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.500766] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.500802]                                                              ^
[   29.500866]  fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.500907]  fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.500943] ==================================================================
[   29.421835] ==================================================================
[   29.421904] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.421968] Write of size 1 at addr fff00000c96880eb by task kunit_try_catch/187
[   29.422017] 
[   29.422066] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.422149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.422175] Hardware name: linux,dummy-virt (DT)
[   29.422208] Call trace:
[   29.422496]  show_stack+0x20/0x38 (C)
[   29.422635]  dump_stack_lvl+0x8c/0xd0
[   29.422962]  print_report+0x118/0x5d0
[   29.423332]  kasan_report+0xdc/0x128
[   29.423742]  __asan_report_store1_noabort+0x20/0x30
[   29.424384]  krealloc_more_oob_helper+0x60c/0x678
[   29.424440]  krealloc_more_oob+0x20/0x38
[   29.424487]  kunit_try_run_case+0x170/0x3f0
[   29.424536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.424939]  kthread+0x328/0x630
[   29.425158]  ret_from_fork+0x10/0x20
[   29.425230] 
[   29.425308] Allocated by task 187:
[   29.425396]  kasan_save_stack+0x3c/0x68
[   29.425450]  kasan_save_track+0x20/0x40
[   29.425488]  kasan_save_alloc_info+0x40/0x58
[   29.425524]  __kasan_krealloc+0x118/0x178
[   29.425950]  krealloc_noprof+0x128/0x360
[   29.425991]  krealloc_more_oob_helper+0x168/0x678
[   29.426031]  krealloc_more_oob+0x20/0x38
[   29.426077]  kunit_try_run_case+0x170/0x3f0
[   29.426137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.426243]  kthread+0x328/0x630
[   29.426291]  ret_from_fork+0x10/0x20
[   29.426373] 
[   29.426441] The buggy address belongs to the object at fff00000c9688000
[   29.426441]  which belongs to the cache kmalloc-256 of size 256
[   29.426498] The buggy address is located 0 bytes to the right of
[   29.426498]  allocated 235-byte region [fff00000c9688000, fff00000c96880eb)
[   29.426618] 
[   29.426695] The buggy address belongs to the physical page:
[   29.426727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688
[   29.426968] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.427032] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.427110] page_type: f5(slab)
[   29.427152] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.427682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.427765] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.427992] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.428234] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff
[   29.428284] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.428566] page dumped because: kasan: bad access detected
[   29.428605] 
[   29.428624] Memory state around the buggy address:
[   29.428663]  fff00000c9687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.428710]  fff00000c9688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.428751] >fff00000c9688080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.428814]                                                           ^
[   29.428853]  fff00000c9688100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.428894]  fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.428930] ==================================================================
[   29.490706] ==================================================================
[   29.490774] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.490839] Write of size 1 at addr fff00000c9b060eb by task kunit_try_catch/191
[   29.491028] 
[   29.491123] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.491774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.491915] Hardware name: linux,dummy-virt (DT)
[   29.491948] Call trace:
[   29.491971]  show_stack+0x20/0x38 (C)
[   29.492025]  dump_stack_lvl+0x8c/0xd0
[   29.492090]  print_report+0x118/0x5d0
[   29.492251]  kasan_report+0xdc/0x128
[   29.492294]  __asan_report_store1_noabort+0x20/0x30
[   29.492355]  krealloc_more_oob_helper+0x60c/0x678
[   29.492727]  krealloc_large_more_oob+0x20/0x38
[   29.492778]  kunit_try_run_case+0x170/0x3f0
[   29.492828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.492877]  kthread+0x328/0x630
[   29.492919]  ret_from_fork+0x10/0x20
[   29.493172] 
[   29.493198] The buggy address belongs to the physical page:
[   29.493329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04
[   29.493452] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.493622] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.493677] page_type: f8(unknown)
[   29.493719] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.493767] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.493822] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.493951] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.494124] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff
[   29.494313] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.494397] page dumped because: kasan: bad access detected
[   29.494499] 
[   29.494517] Memory state around the buggy address:
[   29.494566]  fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.494608]  fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.494725] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.494890]                                                           ^
[   29.494927]  fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.494968]  fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.495386] ==================================================================
[   29.430301] ==================================================================
[   29.430600] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.431127] Write of size 1 at addr fff00000c96880f0 by task kunit_try_catch/187
[   29.431253] 
[   29.431428] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.431566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.431591] Hardware name: linux,dummy-virt (DT)
[   29.431622] Call trace:
[   29.431644]  show_stack+0x20/0x38 (C)
[   29.431699]  dump_stack_lvl+0x8c/0xd0
[   29.431778]  print_report+0x118/0x5d0
[   29.431964]  kasan_report+0xdc/0x128
[   29.432080]  __asan_report_store1_noabort+0x20/0x30
[   29.432129]  krealloc_more_oob_helper+0x5c0/0x678
[   29.432229]  krealloc_more_oob+0x20/0x38
[   29.432647]  kunit_try_run_case+0x170/0x3f0
[   29.432701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.432912]  kthread+0x328/0x630
[   29.432959]  ret_from_fork+0x10/0x20
[   29.433045] 
[   29.433151] Allocated by task 187:
[   29.433189]  kasan_save_stack+0x3c/0x68
[   29.433448]  kasan_save_track+0x20/0x40
[   29.433490]  kasan_save_alloc_info+0x40/0x58
[   29.433526]  __kasan_krealloc+0x118/0x178
[   29.433563]  krealloc_noprof+0x128/0x360
[   29.433608]  krealloc_more_oob_helper+0x168/0x678
[   29.433657]  krealloc_more_oob+0x20/0x38
[   29.433693]  kunit_try_run_case+0x170/0x3f0
[   29.433959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.434159]  kthread+0x328/0x630
[   29.434229]  ret_from_fork+0x10/0x20
[   29.434265] 
[   29.434284] The buggy address belongs to the object at fff00000c9688000
[   29.434284]  which belongs to the cache kmalloc-256 of size 256
[   29.434351] The buggy address is located 5 bytes to the right of
[   29.434351]  allocated 235-byte region [fff00000c9688000, fff00000c96880eb)
[   29.434451] 
[   29.434506] The buggy address belongs to the physical page:
[   29.434541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688
[   29.434592] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.434802] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.435094] page_type: f5(slab)
[   29.435233] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.435376] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.435425] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.435472] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.435733] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff
[   29.435785] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.435824] page dumped because: kasan: bad access detected
[   29.435925] 
[   29.435943] Memory state around the buggy address:
[   29.436021]  fff00000c9687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.436100]  fff00000c9688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.436201] >fff00000c9688080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.436237]                                                              ^
[   29.436275]  fff00000c9688100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.436769]  fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.436832] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   29.403312] ==================================================================
[   29.403440] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   29.403506] Read of size 1 at addr fff00000c9b40000 by task kunit_try_catch/185
[   29.403888] 
[   29.404082] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.404384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.404872] Hardware name: linux,dummy-virt (DT)
[   29.405008] Call trace:
[   29.405032]  show_stack+0x20/0x38 (C)
[   29.405139]  dump_stack_lvl+0x8c/0xd0
[   29.405192]  print_report+0x118/0x5d0
[   29.405237]  kasan_report+0xdc/0x128
[   29.405279]  __asan_report_load1_noabort+0x20/0x30
[   29.405405]  page_alloc_uaf+0x328/0x350
[   29.405615]  kunit_try_run_case+0x170/0x3f0
[   29.405664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.405715]  kthread+0x328/0x630
[   29.405757]  ret_from_fork+0x10/0x20
[   29.405872] 
[   29.405978] The buggy address belongs to the physical page:
[   29.406077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b40
[   29.406133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.406183] page_type: f0(buddy)
[   29.406249] raw: 0bfffe0000000000 fff00000ff6161b0 fff00000ff6161b0 0000000000000000
[   29.407097] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   29.407195] page dumped because: kasan: bad access detected
[   29.407243] 
[   29.407291] Memory state around the buggy address:
[   29.407878]  fff00000c9b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.407928]  fff00000c9b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.407970] >fff00000c9b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.408006]                    ^
[   29.408103]  fff00000c9b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.408254]  fff00000c9b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.408291] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   29.370935] ==================================================================
[   29.371281] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   29.371370] Free of addr fff00000c9b00001 by task kunit_try_catch/181
[   29.371506] 
[   29.371579] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.371817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.372026] Hardware name: linux,dummy-virt (DT)
[   29.372129] Call trace:
[   29.372156]  show_stack+0x20/0x38 (C)
[   29.372329]  dump_stack_lvl+0x8c/0xd0
[   29.372528]  print_report+0x118/0x5d0
[   29.372579]  kasan_report_invalid_free+0xc0/0xe8
[   29.372649]  __kasan_kfree_large+0x5c/0xa8
[   29.372705]  free_large_kmalloc+0x68/0x150
[   29.372752]  kfree+0x270/0x3c8
[   29.372794]  kmalloc_large_invalid_free+0x108/0x270
[   29.373268]  kunit_try_run_case+0x170/0x3f0
[   29.373570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.373995]  kthread+0x328/0x630
[   29.374319]  ret_from_fork+0x10/0x20
[   29.374573] 
[   29.374596] The buggy address belongs to the physical page:
[   29.375366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b00
[   29.376281] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.376830] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.376905] page_type: f8(unknown)
[   29.376949] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.376998] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.377056] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.377104] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.377151] head: 0bfffe0000000002 ffffc1ffc326c001 00000000ffffffff 00000000ffffffff
[   29.377198] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.377236] page dumped because: kasan: bad access detected
[   29.377266] 
[   29.377287] Memory state around the buggy address:
[   29.377318]  fff00000c9afff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.377363]  fff00000c9afff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.377404] >fff00000c9b00000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.377440]                    ^
[   29.377467]  fff00000c9b00080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.377508]  fff00000c9b00100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.377560] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   29.361332] ==================================================================
[   29.361400] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   29.361458] Read of size 1 at addr fff00000c9b00000 by task kunit_try_catch/179
[   29.361506] 
[   29.361544] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.361637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.361663] Hardware name: linux,dummy-virt (DT)
[   29.361693] Call trace:
[   29.361716]  show_stack+0x20/0x38 (C)
[   29.361901]  dump_stack_lvl+0x8c/0xd0
[   29.362114]  print_report+0x118/0x5d0
[   29.362275]  kasan_report+0xdc/0x128
[   29.362373]  __asan_report_load1_noabort+0x20/0x30
[   29.362511]  kmalloc_large_uaf+0x2cc/0x2f8
[   29.362596]  kunit_try_run_case+0x170/0x3f0
[   29.362644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.362965]  kthread+0x328/0x630
[   29.363016]  ret_from_fork+0x10/0x20
[   29.363374] 
[   29.363449] The buggy address belongs to the physical page:
[   29.363566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b00
[   29.363681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.363845] raw: 0bfffe0000000000 ffffc1ffc326c108 fff00000da456d00 0000000000000000
[   29.363895] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   29.363964] page dumped because: kasan: bad access detected
[   29.364242] 
[   29.364306] Memory state around the buggy address:
[   29.364413]  fff00000c9afff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.364576]  fff00000c9afff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.364661] >fff00000c9b00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.364709]                    ^
[   29.364744]  fff00000c9b00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.364881]  fff00000c9b00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.364937] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   29.350099] ==================================================================
[   29.350209] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   29.350261] Write of size 1 at addr fff00000c9a1a00a by task kunit_try_catch/177
[   29.350317] 
[   29.350352] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.350588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.350618] Hardware name: linux,dummy-virt (DT)
[   29.350649] Call trace:
[   29.350844]  show_stack+0x20/0x38 (C)
[   29.350945]  dump_stack_lvl+0x8c/0xd0
[   29.351014]  print_report+0x118/0x5d0
[   29.351070]  kasan_report+0xdc/0x128
[   29.351128]  __asan_report_store1_noabort+0x20/0x30
[   29.351180]  kmalloc_large_oob_right+0x278/0x2b8
[   29.351226]  kunit_try_run_case+0x170/0x3f0
[   29.351282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.351357]  kthread+0x328/0x630
[   29.351400]  ret_from_fork+0x10/0x20
[   29.351447] 
[   29.351514] The buggy address belongs to the physical page:
[   29.351583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a18
[   29.351681] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.351747] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.351806] page_type: f8(unknown)
[   29.352039] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.352112] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.352526] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.352579] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.352811] head: 0bfffe0000000002 ffffc1ffc3268601 00000000ffffffff 00000000ffffffff
[   29.353184] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.353247] page dumped because: kasan: bad access detected
[   29.353335] 
[   29.353415] Memory state around the buggy address:
[   29.353527]  fff00000c9a19f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.353926]  fff00000c9a19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.353981] >fff00000c9a1a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.354018]                       ^
[   29.354059]  fff00000c9a1a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.354110]  fff00000c9a1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.354148] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   29.339594] ==================================================================
[   29.339676] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   29.339760] Write of size 1 at addr fff00000c659df00 by task kunit_try_catch/175
[   29.339826] 
[   29.339883] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.340175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.340286] Hardware name: linux,dummy-virt (DT)
[   29.340457] Call trace:
[   29.340574]  show_stack+0x20/0x38 (C)
[   29.340682]  dump_stack_lvl+0x8c/0xd0
[   29.340793]  print_report+0x118/0x5d0
[   29.340878]  kasan_report+0xdc/0x128
[   29.340918]  __asan_report_store1_noabort+0x20/0x30
[   29.340965]  kmalloc_big_oob_right+0x2a4/0x2f0
[   29.341033]  kunit_try_run_case+0x170/0x3f0
[   29.341091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.341139]  kthread+0x328/0x630
[   29.341180]  ret_from_fork+0x10/0x20
[   29.341228] 
[   29.341247] Allocated by task 175:
[   29.341275]  kasan_save_stack+0x3c/0x68
[   29.341316]  kasan_save_track+0x20/0x40
[   29.341496]  kasan_save_alloc_info+0x40/0x58
[   29.341608]  __kasan_kmalloc+0xd4/0xd8
[   29.341729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.341827]  kmalloc_big_oob_right+0xb8/0x2f0
[   29.341884]  kunit_try_run_case+0x170/0x3f0
[   29.342185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.342325]  kthread+0x328/0x630
[   29.342409]  ret_from_fork+0x10/0x20
[   29.342542] 
[   29.342563] The buggy address belongs to the object at fff00000c659c000
[   29.342563]  which belongs to the cache kmalloc-8k of size 8192
[   29.342638] The buggy address is located 0 bytes to the right of
[   29.342638]  allocated 7936-byte region [fff00000c659c000, fff00000c659df00)
[   29.342722] 
[   29.342745] The buggy address belongs to the physical page:
[   29.342777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106598
[   29.342845] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.342910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.342980] page_type: f5(slab)
[   29.343021] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.343079] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.343127] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.343174] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.343220] head: 0bfffe0000000003 ffffc1ffc3196601 00000000ffffffff 00000000ffffffff
[   29.343266] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   29.343304] page dumped because: kasan: bad access detected
[   29.343342] 
[   29.343360] Memory state around the buggy address:
[   29.343400]  fff00000c659de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.343448]  fff00000c659de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.343498] >fff00000c659df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.343533]                    ^
[   29.343559]  fff00000c659df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.343614]  fff00000c659e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.343658] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   29.327939] ==================================================================
[   29.328063] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   29.328181] Write of size 1 at addr fff00000c636a878 by task kunit_try_catch/173
[   29.328343] 
[   29.328478] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.328640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.328780] Hardware name: linux,dummy-virt (DT)
[   29.328865] Call trace:
[   29.328904]  show_stack+0x20/0x38 (C)
[   29.328953]  dump_stack_lvl+0x8c/0xd0
[   29.329002]  print_report+0x118/0x5d0
[   29.329074]  kasan_report+0xdc/0x128
[   29.329119]  __asan_report_store1_noabort+0x20/0x30
[   29.329174]  kmalloc_track_caller_oob_right+0x418/0x488
[   29.329228]  kunit_try_run_case+0x170/0x3f0
[   29.329276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.329364]  kthread+0x328/0x630
[   29.329658]  ret_from_fork+0x10/0x20
[   29.329828] 
[   29.329897] Allocated by task 173:
[   29.329994]  kasan_save_stack+0x3c/0x68
[   29.330369]  kasan_save_track+0x20/0x40
[   29.330418]  kasan_save_alloc_info+0x40/0x58
[   29.330512]  __kasan_kmalloc+0xd4/0xd8
[   29.330600]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.330647]  kmalloc_track_caller_oob_right+0x184/0x488
[   29.330691]  kunit_try_run_case+0x170/0x3f0
[   29.330752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.330795]  kthread+0x328/0x630
[   29.330827]  ret_from_fork+0x10/0x20
[   29.330877] 
[   29.330914] The buggy address belongs to the object at fff00000c636a800
[   29.330914]  which belongs to the cache kmalloc-128 of size 128
[   29.330985] The buggy address is located 0 bytes to the right of
[   29.330985]  allocated 120-byte region [fff00000c636a800, fff00000c636a878)
[   29.331073] 
[   29.331110] The buggy address belongs to the physical page:
[   29.331143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.331201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.331268] page_type: f5(slab)
[   29.331306] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.331361] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.331404] page dumped because: kasan: bad access detected
[   29.331443] 
[   29.331460] Memory state around the buggy address:
[   29.331491]  fff00000c636a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.331538]  fff00000c636a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.331585] >fff00000c636a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.331630]                                                                 ^
[   29.331673]  fff00000c636a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.331718]  fff00000c636a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.331760] ==================================================================
[   29.321899] ==================================================================
[   29.321991] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   29.322122] Write of size 1 at addr fff00000c636a778 by task kunit_try_catch/173
[   29.322177] 
[   29.322212] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.322368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.322394] Hardware name: linux,dummy-virt (DT)
[   29.322453] Call trace:
[   29.322481]  show_stack+0x20/0x38 (C)
[   29.322529]  dump_stack_lvl+0x8c/0xd0
[   29.322836]  print_report+0x118/0x5d0
[   29.322896]  kasan_report+0xdc/0x128
[   29.322939]  __asan_report_store1_noabort+0x20/0x30
[   29.323077]  kmalloc_track_caller_oob_right+0x40c/0x488
[   29.323129]  kunit_try_run_case+0x170/0x3f0
[   29.323233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.323308]  kthread+0x328/0x630
[   29.323395]  ret_from_fork+0x10/0x20
[   29.323447] 
[   29.323466] Allocated by task 173:
[   29.323494]  kasan_save_stack+0x3c/0x68
[   29.323535]  kasan_save_track+0x20/0x40
[   29.323573]  kasan_save_alloc_info+0x40/0x58
[   29.323668]  __kasan_kmalloc+0xd4/0xd8
[   29.323706]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.323753]  kmalloc_track_caller_oob_right+0xa8/0x488
[   29.323797]  kunit_try_run_case+0x170/0x3f0
[   29.323836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.324057]  kthread+0x328/0x630
[   29.324306]  ret_from_fork+0x10/0x20
[   29.324406] 
[   29.324454] The buggy address belongs to the object at fff00000c636a700
[   29.324454]  which belongs to the cache kmalloc-128 of size 128
[   29.324621] The buggy address is located 0 bytes to the right of
[   29.324621]  allocated 120-byte region [fff00000c636a700, fff00000c636a778)
[   29.324694] 
[   29.324725] The buggy address belongs to the physical page:
[   29.324761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.324822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.324874] page_type: f5(slab)
[   29.324913] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.324967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.325011] page dumped because: kasan: bad access detected
[   29.325044] 
[   29.325073] Memory state around the buggy address:
[   29.325106]  fff00000c636a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.325152]  fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.325198] >fff00000c636a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.325262]                                                                 ^
[   29.325307]  fff00000c636a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.325354]  fff00000c636a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.325556] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   29.310269] ==================================================================
[   29.310332] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   29.310386] Read of size 1 at addr fff00000c8f19000 by task kunit_try_catch/171
[   29.310481] 
[   29.310515] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.310857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.310958] Hardware name: linux,dummy-virt (DT)
[   29.310994] Call trace:
[   29.311110]  show_stack+0x20/0x38 (C)
[   29.311164]  dump_stack_lvl+0x8c/0xd0
[   29.311212]  print_report+0x118/0x5d0
[   29.311253]  kasan_report+0xdc/0x128
[   29.311294]  __asan_report_load1_noabort+0x20/0x30
[   29.311543]  kmalloc_node_oob_right+0x2f4/0x330
[   29.311617]  kunit_try_run_case+0x170/0x3f0
[   29.311719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.311808]  kthread+0x328/0x630
[   29.311909]  ret_from_fork+0x10/0x20
[   29.311974] 
[   29.312013] Allocated by task 171:
[   29.312099]  kasan_save_stack+0x3c/0x68
[   29.312144]  kasan_save_track+0x20/0x40
[   29.312190]  kasan_save_alloc_info+0x40/0x58
[   29.312257]  __kasan_kmalloc+0xd4/0xd8
[   29.312375]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   29.312435]  kmalloc_node_oob_right+0xbc/0x330
[   29.312540]  kunit_try_run_case+0x170/0x3f0
[   29.312598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.312676]  kthread+0x328/0x630
[   29.312707]  ret_from_fork+0x10/0x20
[   29.312741] 
[   29.312759] The buggy address belongs to the object at fff00000c8f18000
[   29.312759]  which belongs to the cache kmalloc-4k of size 4096
[   29.312960] The buggy address is located 0 bytes to the right of
[   29.312960]  allocated 4096-byte region [fff00000c8f18000, fff00000c8f19000)
[   29.313023] 
[   29.313043] The buggy address belongs to the physical page:
[   29.313127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f18
[   29.313621] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.313689] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.313862] page_type: f5(slab)
[   29.314013] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   29.314160] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.314236] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   29.314332] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.314426] head: 0bfffe0000000003 ffffc1ffc323c601 00000000ffffffff 00000000ffffffff
[   29.314476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   29.314556] page dumped because: kasan: bad access detected
[   29.314585] 
[   29.314603] Memory state around the buggy address:
[   29.314633]  fff00000c8f18f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.314718]  fff00000c8f18f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.314761] >fff00000c8f19000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.314796]                    ^
[   29.314823]  fff00000c8f19080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.314892]  fff00000c8f19100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.314966] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   29.299790] ==================================================================
[   29.299880] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.299936] Read of size 1 at addr fff00000c64c1a5f by task kunit_try_catch/169
[   29.300012] 
[   29.300207] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.300374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.300497] Hardware name: linux,dummy-virt (DT)
[   29.300550] Call trace:
[   29.300609]  show_stack+0x20/0x38 (C)
[   29.300695]  dump_stack_lvl+0x8c/0xd0
[   29.300772]  print_report+0x118/0x5d0
[   29.300815]  kasan_report+0xdc/0x128
[   29.300894]  __asan_report_load1_noabort+0x20/0x30
[   29.300941]  kmalloc_oob_left+0x2ec/0x320
[   29.300985]  kunit_try_run_case+0x170/0x3f0
[   29.301032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.301093]  kthread+0x328/0x630
[   29.301134]  ret_from_fork+0x10/0x20
[   29.301182] 
[   29.301200] Allocated by task 110:
[   29.301229]  kasan_save_stack+0x3c/0x68
[   29.301268]  kasan_save_track+0x20/0x40
[   29.301305]  kasan_save_alloc_info+0x40/0x58
[   29.301340]  __kasan_kmalloc+0xd4/0xd8
[   29.301375]  __kmalloc_noprof+0x198/0x4c8
[   29.301412]  kunit_kmalloc_array+0x34/0x88
[   29.301448]  test_readerwriter+0x3b0/0x948
[   29.301623]  kunit_try_run_case+0x170/0x3f0
[   29.301669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.301797]  kthread+0x328/0x630
[   29.301916]  ret_from_fork+0x10/0x20
[   29.302013] 
[   29.302148] The buggy address belongs to the object at fff00000c64c1a40
[   29.302148]  which belongs to the cache kmalloc-16 of size 16
[   29.302223] The buggy address is located 15 bytes to the right of
[   29.302223]  allocated 16-byte region [fff00000c64c1a40, fff00000c64c1a50)
[   29.302512] 
[   29.302577] The buggy address belongs to the physical page:
[   29.302625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1
[   29.302758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.302896] page_type: f5(slab)
[   29.302959] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.303311] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000
[   29.303423] page dumped because: kasan: bad access detected
[   29.303571] 
[   29.303655] Memory state around the buggy address:
[   29.303688]  fff00000c64c1900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.303784]  fff00000c64c1980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.304070] >fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   29.304110]                                                     ^
[   29.304154]  fff00000c64c1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.304432]  fff00000c64c1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.304566] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   29.285067] ==================================================================
[   29.285107] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.285188] Write of size 1 at addr fff00000c636a678 by task kunit_try_catch/167
[   29.285264] 
[   29.285323] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.285424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.285450] Hardware name: linux,dummy-virt (DT)
[   29.285496] Call trace:
[   29.285526]  show_stack+0x20/0x38 (C)
[   29.285575]  dump_stack_lvl+0x8c/0xd0
[   29.285627]  print_report+0x118/0x5d0
[   29.285669]  kasan_report+0xdc/0x128
[   29.285711]  __asan_report_store1_noabort+0x20/0x30
[   29.285879]  kmalloc_oob_right+0x538/0x660
[   29.285940]  kunit_try_run_case+0x170/0x3f0
[   29.286017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.286079]  kthread+0x328/0x630
[   29.286158]  ret_from_fork+0x10/0x20
[   29.286258] 
[   29.286276] Allocated by task 167:
[   29.286303]  kasan_save_stack+0x3c/0x68
[   29.286361]  kasan_save_track+0x20/0x40
[   29.286399]  kasan_save_alloc_info+0x40/0x58
[   29.286434]  __kasan_kmalloc+0xd4/0xd8
[   29.286469]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.286507]  kmalloc_oob_right+0xb0/0x660
[   29.286543]  kunit_try_run_case+0x170/0x3f0
[   29.286580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.286785]  kthread+0x328/0x630
[   29.286824]  ret_from_fork+0x10/0x20
[   29.286915] 
[   29.286936] The buggy address belongs to the object at fff00000c636a600
[   29.286936]  which belongs to the cache kmalloc-128 of size 128
[   29.286996] The buggy address is located 5 bytes to the right of
[   29.286996]  allocated 115-byte region [fff00000c636a600, fff00000c636a673)
[   29.287067] 
[   29.287086] The buggy address belongs to the physical page:
[   29.287218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.287273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.287321] page_type: f5(slab)
[   29.287357] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.287477] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.287517] page dumped because: kasan: bad access detected
[   29.287546] 
[   29.287563] Memory state around the buggy address:
[   29.287592]  fff00000c636a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.287633]  fff00000c636a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287673] >fff00000c636a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.287719]                                                                 ^
[   29.287757]  fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287796]  fff00000c636a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287831] ==================================================================
[   29.271563] ==================================================================
[   29.271883] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.272849] Write of size 1 at addr fff00000c636a673 by task kunit_try_catch/167
[   29.273176] 
[   29.274038] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.274199] Tainted: [N]=TEST
[   29.274231] Hardware name: linux,dummy-virt (DT)
[   29.274454] Call trace:
[   29.275005]  show_stack+0x20/0x38 (C)
[   29.275342]  dump_stack_lvl+0x8c/0xd0
[   29.275398]  print_report+0x118/0x5d0
[   29.275441]  kasan_report+0xdc/0x128
[   29.275482]  __asan_report_store1_noabort+0x20/0x30
[   29.275529]  kmalloc_oob_right+0x5a4/0x660
[   29.275574]  kunit_try_run_case+0x170/0x3f0
[   29.275625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.275673]  kthread+0x328/0x630
[   29.275715]  ret_from_fork+0x10/0x20
[   29.276151] 
[   29.276201] Allocated by task 167:
[   29.276320]  kasan_save_stack+0x3c/0x68
[   29.276386]  kasan_save_track+0x20/0x40
[   29.276423]  kasan_save_alloc_info+0x40/0x58
[   29.276458]  __kasan_kmalloc+0xd4/0xd8
[   29.276494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.276533]  kmalloc_oob_right+0xb0/0x660
[   29.276568]  kunit_try_run_case+0x170/0x3f0
[   29.276606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.276713]  kthread+0x328/0x630
[   29.276783]  ret_from_fork+0x10/0x20
[   29.276840] 
[   29.277146] The buggy address belongs to the object at fff00000c636a600
[   29.277146]  which belongs to the cache kmalloc-128 of size 128
[   29.277413] The buggy address is located 0 bytes to the right of
[   29.277413]  allocated 115-byte region [fff00000c636a600, fff00000c636a673)
[   29.277563] 
[   29.277902] The buggy address belongs to the physical page:
[   29.278591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.280235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.281322] page_type: f5(slab)
[   29.282044] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.282219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.282496] page dumped because: kasan: bad access detected
[   29.282541] 
[   29.282567] Memory state around the buggy address:
[   29.282868]  fff00000c636a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.282980]  fff00000c636a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.283034] >fff00000c636a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.283227]                                                              ^
[   29.283559]  fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.283633]  fff00000c636a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.283727] ==================================================================
[   29.287960] ==================================================================
[   29.287996] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.288037] Read of size 1 at addr fff00000c636a680 by task kunit_try_catch/167
[   29.288452] 
[   29.288514] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.288686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.288723] Hardware name: linux,dummy-virt (DT)
[   29.288752] Call trace:
[   29.288774]  show_stack+0x20/0x38 (C)
[   29.288821]  dump_stack_lvl+0x8c/0xd0
[   29.288865]  print_report+0x118/0x5d0
[   29.288943]  kasan_report+0xdc/0x128
[   29.288986]  __asan_report_load1_noabort+0x20/0x30
[   29.289032]  kmalloc_oob_right+0x5d0/0x660
[   29.289088]  kunit_try_run_case+0x170/0x3f0
[   29.289134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.289181]  kthread+0x328/0x630
[   29.289223]  ret_from_fork+0x10/0x20
[   29.289268] 
[   29.289285] Allocated by task 167:
[   29.289311]  kasan_save_stack+0x3c/0x68
[   29.289392]  kasan_save_track+0x20/0x40
[   29.289491]  kasan_save_alloc_info+0x40/0x58
[   29.289618]  __kasan_kmalloc+0xd4/0xd8
[   29.289756]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.289986]  kmalloc_oob_right+0xb0/0x660
[   29.290026]  kunit_try_run_case+0x170/0x3f0
[   29.290073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.290112]  kthread+0x328/0x630
[   29.290143]  ret_from_fork+0x10/0x20
[   29.290176] 
[   29.290291] The buggy address belongs to the object at fff00000c636a600
[   29.290291]  which belongs to the cache kmalloc-128 of size 128
[   29.290472] The buggy address is located 13 bytes to the right of
[   29.290472]  allocated 115-byte region [fff00000c636a600, fff00000c636a673)
[   29.290638] 
[   29.290720] The buggy address belongs to the physical page:
[   29.290748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.290888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.290936] page_type: f5(slab)
[   29.290971] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.291018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.291238] page dumped because: kasan: bad access detected
[   29.291358] 
[   29.291462] Memory state around the buggy address:
[   29.291619]  fff00000c636a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.291673]  fff00000c636a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.291713] >fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.291748]                    ^
[   29.291827]  fff00000c636a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.291960]  fff00000c636a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.292074] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  110.462176] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689
[  110.463851] Modules linked in:
[  110.464923] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[  110.466750] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  110.467356] Hardware name: linux,dummy-virt (DT)
[  110.467863] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  110.468708] pc : intlog10+0x38/0x48
[  110.469182] lr : intlog10_test+0xe4/0x200
[  110.469748] sp : ffff800082407c10
[  110.470153] x29: ffff800082407c90 x28: 0000000000000000 x27: 0000000000000000
[  110.470924] x26: 1ffe0000188a6061 x25: 0000000000000000 x24: ffff800082407ce0
[  110.471279] x23: ffff800082407d00 x22: 0000000000000000 x21: 1ffff00010480f82
[  110.471619] x20: ffffb0784d42f2e0 x19: ffff800080087990 x18: 000000009798dd76
[  110.471954] x17: 000000004b0ec465 x16: fff00000c932843c x15: fff00000ff616b48
[  110.472984] x14: 00000000f1f1f1f1 x13: 1ffe00001b48e9dd x12: ffff760f0a263189
[  110.473803] x11: 1ffff60f0a263188 x10: ffff760f0a263188 x9 : ffffb0784aa4c0cc
[  110.474585] x8 : ffffb07851318c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  110.475361] x5 : ffff700010480f82 x4 : 1ffff00010010f3b x3 : 1ffff60f09a85e5c
[  110.476136] x2 : 1ffff60f09a85e5c x1 : 0000000000000003 x0 : 0000000000000000
[  110.477257] Call trace:
[  110.477552]  intlog10+0x38/0x48 (P)
[  110.478124]  kunit_try_run_case+0x170/0x3f0
[  110.478611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.479203]  kthread+0x328/0x630
[  110.479600]  ret_from_fork+0x10/0x20
[  110.480023] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  110.420467] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671
[  110.421357] Modules linked in:
[  110.421651] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[  110.422172] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  110.422455] Hardware name: linux,dummy-virt (DT)
[  110.422676] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  110.423076] pc : intlog2+0xd8/0xf8
[  110.423305] lr : intlog2_test+0xe4/0x200
[  110.423521] sp : ffff800082377c10
[  110.423732] x29: ffff800082377c90 x28: 0000000000000000 x27: 0000000000000000
[  110.424201] x26: 1ffe0000191d2f61 x25: 0000000000000000 x24: ffff800082377ce0
[  110.424670] x23: ffff800082377d00 x22: 0000000000000000 x21: 1ffff0001046ef82
[  110.425144] x20: ffffb0784d42f1e0 x19: ffff800080087990 x18: 000000009f0f53ff
[  110.425633] x17: 00000000066f06ab x16: fff00000c932803c x15: fff00000ff616b48
[  110.426036] x14: 0000000000018fff x13: 1ffe00001b48a5dd x12: ffff760f0a263189
[  110.426442] x11: 1ffff60f0a263188 x10: ffff760f0a263188 x9 : ffffb0784aa4c2cc
[  110.426870] x8 : ffffb07851318c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  110.427310] x5 : ffff70001046ef82 x4 : 1ffff00010010f3b x3 : 1ffff60f09a85e3c
[  110.427714] x2 : 1ffff60f09a85e3c x1 : 0000000000000003 x0 : 0000000000000000
[  110.428109] Call trace:
[  110.428297]  intlog2+0xd8/0xf8 (P)
[  110.428502]  kunit_try_run_case+0x170/0x3f0
[  110.428769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.429083]  kthread+0x328/0x630
[  110.429348]  ret_from_fork+0x10/0x20
[  110.429605] ---[ end trace 0000000000000000 ]---