Hay
Date
July 15, 2025, 11:35 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.119607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   33.272052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   33.267386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   33.178643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   33.201689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   33.099226] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[  109.017013] Internal error: Oops: 0000000096000005 [#1]  SMP
[  109.025411] Modules linked in:
[  109.026215] CPU: 0 UID: 0 PID: 564 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[  109.027151] Tainted: [B]=BAD_PAGE, [N]=TEST
[  109.027680] Hardware name: linux,dummy-virt (DT)
[  109.028395] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.029117] pc : kunit_test_null_dereference+0x70/0x170
[  109.029776] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.030450] sp : ffff800082017d30
[  109.030850] x29: ffff800082017d90 x28: 0000000000000000 x27: 0000000000000000
[  109.031392] x26: 1ffe000018b94741 x25: 0000000000000000 x24: 0000000000000004
[  109.031759] x23: fff00000c5ca3a0c x22: ffff95f548c3e580 x21: fff00000c1200b08
[  109.032101] x20: 1ffff00010402fa6 x19: ffff800080087990 x18: 00000000801fb5ba
[  109.032463] x17: 0000000000000000 x16: fff00000da450da8 x15: fff00000ff616b48
[  109.033208] x14: 0000000000018fff x13: 1ffe000018c99004 x12: fffd8000197b162c
[  109.034109] x11: 1ffe0000197b162b x10: fffd8000197b162b x9 : ffff95f548c35d10
[  109.035076] x8 : ffff800082017c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  109.035865] x5 : ffff700010402fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  109.036603] x2 : dfff800000000000 x1 : fff00000cbd8a880 x0 : ffff800080087990
[  109.037363] Call trace:
[  109.037710]  kunit_test_null_dereference+0x70/0x170 (P)
[  109.038356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.038949]  kthread+0x328/0x630
[  109.039324]  ret_from_fork+0x10/0x20
[  109.039962] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  109.040882] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   65.471425] ==================================================================
[   65.471513] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   65.471513] 
[   65.471609] Use-after-free read at 0x000000005e76e40e (in kfence-#204):
[   65.471661]  test_krealloc+0x51c/0x830
[   65.471710]  kunit_try_run_case+0x170/0x3f0
[   65.471756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.471800]  kthread+0x328/0x630
[   65.471840]  ret_from_fork+0x10/0x20
[   65.471882] 
[   65.471905] kfence-#204: 0x000000005e76e40e-0x00000000ed53f551, size=32, cache=kmalloc-32
[   65.471905] 
[   65.471957] allocated by task 369 on cpu 0 at 65.470771s (0.001182s ago):
[   65.472029]  test_alloc+0x29c/0x628
[   65.472071]  test_krealloc+0xc0/0x830
[   65.472112]  kunit_try_run_case+0x170/0x3f0
[   65.472152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.472195]  kthread+0x328/0x630
[   65.472231]  ret_from_fork+0x10/0x20
[   65.472270] 
[   65.472294] freed by task 369 on cpu 0 at 65.471018s (0.001272s ago):
[   65.472355]  krealloc_noprof+0x148/0x360
[   65.472397]  test_krealloc+0x1dc/0x830
[   65.472448]  kunit_try_run_case+0x170/0x3f0
[   65.472487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.472530]  kthread+0x328/0x630
[   65.472565]  ret_from_fork+0x10/0x20
[   65.472603] 
[   65.472649] CPU: 0 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   65.472726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.472756] Hardware name: linux,dummy-virt (DT)
[   65.472790] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   65.394123] ==================================================================
[   65.394224] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   65.394224] 
[   65.394329] Use-after-free read at 0x00000000e3967b31 (in kfence-#203):
[   65.394383]  test_memcache_typesafe_by_rcu+0x280/0x560
[   65.394431]  kunit_try_run_case+0x170/0x3f0
[   65.394496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.394541]  kthread+0x328/0x630
[   65.394580]  ret_from_fork+0x10/0x20
[   65.394622] 
[   65.394647] kfence-#203: 0x00000000e3967b31-0x00000000752872e9, size=32, cache=test
[   65.394647] 
[   65.394698] allocated by task 367 on cpu 1 at 65.362850s (0.031844s ago):
[   65.394771]  test_alloc+0x230/0x628
[   65.394813]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   65.394857]  kunit_try_run_case+0x170/0x3f0
[   65.394896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.394938]  kthread+0x328/0x630
[   65.394977]  ret_from_fork+0x10/0x20
[   65.395015] 
[   65.395038] freed by task 367 on cpu 1 at 65.362944s (0.032091s ago):
[   65.395096]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   65.395141]  kunit_try_run_case+0x170/0x3f0
[   65.395181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.395224]  kthread+0x328/0x630
[   65.395260]  ret_from_fork+0x10/0x20
[   65.395298] 
[   65.395347] CPU: 1 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   65.395427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.395468] Hardware name: linux,dummy-virt (DT)
[   65.395501] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   42.610411] ==================================================================
[   42.610580] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   42.610580] 
[   42.610682] Invalid read at 0x00000000abd61c0e:
[   42.611018]  test_invalid_access+0xdc/0x1f0
[   42.611078]  kunit_try_run_case+0x170/0x3f0
[   42.613221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.613304]  kthread+0x328/0x630
[   42.613375]  ret_from_fork+0x10/0x20
[   42.613470] 
[   42.613547] CPU: 0 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   42.613659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.613879] Hardware name: linux,dummy-virt (DT)
[   42.613957] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   34.970502] ==================================================================
[   34.970585] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   34.970585] 
[   34.971061] Out-of-bounds write at 0x00000000769d978e (1B left of kfence-#128):
[   34.971134]  test_out_of_bounds_write+0x100/0x240
[   34.971186]  kunit_try_run_case+0x170/0x3f0
[   34.971232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.971277]  kthread+0x328/0x630
[   34.971315]  ret_from_fork+0x10/0x20
[   34.971356] 
[   34.971380] kfence-#128: 0x00000000ab7166a3-0x0000000024ef8551, size=32, cache=test
[   34.971380] 
[   34.971429] allocated by task 325 on cpu 1 at 34.970344s (0.001082s ago):
[   34.971512]  test_alloc+0x230/0x628
[   34.971555]  test_out_of_bounds_write+0xc8/0x240
[   34.971598]  kunit_try_run_case+0x170/0x3f0
[   34.971638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.971681]  kthread+0x328/0x630
[   34.971716]  ret_from_fork+0x10/0x20
[   34.971755] 
[   34.971797] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   34.971874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.971903] Hardware name: linux,dummy-virt (DT)
[   34.971935] ==================================================================
[   34.758953] ==================================================================
[   34.759080] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   34.759080] 
[   34.759182] Out-of-bounds write at 0x000000001345a9b6 (1B left of kfence-#126):
[   34.759250]  test_out_of_bounds_write+0x100/0x240
[   34.759299]  kunit_try_run_case+0x170/0x3f0
[   34.759343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.759385]  kthread+0x328/0x630
[   34.759665]  ret_from_fork+0x10/0x20
[   34.759722] 
[   34.759748] kfence-#126: 0x00000000633f9b0e-0x00000000cb91990b, size=32, cache=kmalloc-32
[   34.759748] 
[   34.759831] allocated by task 323 on cpu 1 at 34.758784s (0.001012s ago):
[   34.759903]  test_alloc+0x29c/0x628
[   34.759944]  test_out_of_bounds_write+0xc8/0x240
[   34.760169]  kunit_try_run_case+0x170/0x3f0
[   34.760252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.760296]  kthread+0x328/0x630
[   34.760334]  ret_from_fork+0x10/0x20
[   34.760423] 
[   34.760497] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   34.760667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.760716] Hardware name: linux,dummy-virt (DT)
[   34.760775] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   42.378296] ==================================================================
[   42.378388] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   42.378388] 
[   42.378471] Corrupted memory at 0x00000000352cff21 [ ! . . . . . . . . . . . . . . . ] (in kfence-#199):
[   42.378782]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   42.378833]  kunit_try_run_case+0x170/0x3f0
[   42.378873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.378916]  kthread+0x328/0x630
[   42.378953]  ret_from_fork+0x10/0x20
[   42.378994] 
[   42.379017] kfence-#199: 0x000000004d68ca4b-0x000000009d860e4e, size=73, cache=kmalloc-96
[   42.379017] 
[   42.379070] allocated by task 357 on cpu 0 at 42.378061s (0.001005s ago):
[   42.379142]  test_alloc+0x29c/0x628
[   42.379183]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   42.379227]  kunit_try_run_case+0x170/0x3f0
[   42.379269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.379312]  kthread+0x328/0x630
[   42.379349]  ret_from_fork+0x10/0x20
[   42.379390] 
[   42.379413] freed by task 357 on cpu 0 at 42.378204s (0.001205s ago):
[   42.379487]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   42.379532]  kunit_try_run_case+0x170/0x3f0
[   42.379572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.379615]  kthread+0x328/0x630
[   42.379652]  ret_from_fork+0x10/0x20
[   42.379691] 
[   42.379733] CPU: 0 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   42.379812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.379842] Hardware name: linux,dummy-virt (DT)
[   42.379875] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   42.170299] ==================================================================
[   42.170399] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   42.170399] 
[   42.170519] Out-of-bounds read at 0x0000000097e63288 (105B right of kfence-#197):
[   42.170580]  test_kmalloc_aligned_oob_read+0x238/0x468
[   42.170630]  kunit_try_run_case+0x170/0x3f0
[   42.170673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.170718]  kthread+0x328/0x630
[   42.170758]  ret_from_fork+0x10/0x20
[   42.170800] 
[   42.170824] kfence-#197: 0x00000000078d9283-0x0000000047d657d2, size=73, cache=kmalloc-96
[   42.170824] 
[   42.170876] allocated by task 355 on cpu 0 at 42.170043s (0.000828s ago):
[   42.170946]  test_alloc+0x29c/0x628
[   42.170987]  test_kmalloc_aligned_oob_read+0x100/0x468
[   42.171030]  kunit_try_run_case+0x170/0x3f0
[   42.171069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.171116]  kthread+0x328/0x630
[   42.171153]  ret_from_fork+0x10/0x20
[   42.171191] 
[   42.171239] CPU: 0 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   42.171318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.171346] Hardware name: linux,dummy-virt (DT)
[   42.171380] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   36.554179] ==================================================================
[   36.554277] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   36.554277] 
[   36.554344] Corrupted memory at 0x00000000e6ccf6bc [ ! . . . . . . . . . . . . . . . ] (in kfence-#143):
[   36.554669]  test_corruption+0x120/0x378
[   36.554718]  kunit_try_run_case+0x170/0x3f0
[   36.554761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.554806]  kthread+0x328/0x630
[   36.554844]  ret_from_fork+0x10/0x20
[   36.554885] 
[   36.554908] kfence-#143: 0x000000008bb1148e-0x000000005cc069ec, size=32, cache=test
[   36.554908] 
[   36.554963] allocated by task 345 on cpu 0 at 36.554027s (0.000931s ago):
[   36.555026]  test_alloc+0x230/0x628
[   36.555066]  test_corruption+0xdc/0x378
[   36.555112]  kunit_try_run_case+0x170/0x3f0
[   36.555153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.555196]  kthread+0x328/0x630
[   36.555232]  ret_from_fork+0x10/0x20
[   36.555271] 
[   36.555293] freed by task 345 on cpu 0 at 36.554088s (0.001202s ago):
[   36.555355]  test_corruption+0x120/0x378
[   36.555399]  kunit_try_run_case+0x170/0x3f0
[   36.555447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.555490]  kthread+0x328/0x630
[   36.555525]  ret_from_fork+0x10/0x20
[   36.555564] 
[   36.555607] CPU: 0 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   36.555684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.555714] Hardware name: linux,dummy-virt (DT)
[   36.555748] ==================================================================
[   36.346328] ==================================================================
[   36.346410] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   36.346410] 
[   36.346487] Corrupted memory at 0x0000000012a5ba25 [ ! ] (in kfence-#141):
[   36.346613]  test_corruption+0x284/0x378
[   36.346662]  kunit_try_run_case+0x170/0x3f0
[   36.346702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.346749]  kthread+0x328/0x630
[   36.346786]  ret_from_fork+0x10/0x20
[   36.346827] 
[   36.346851] kfence-#141: 0x0000000019bd46ad-0x00000000000a3bd2, size=32, cache=kmalloc-32
[   36.346851] 
[   36.346906] allocated by task 343 on cpu 0 at 36.346059s (0.000843s ago):
[   36.346967]  test_alloc+0x29c/0x628
[   36.347009]  test_corruption+0x198/0x378
[   36.347050]  kunit_try_run_case+0x170/0x3f0
[   36.347090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.347141]  kthread+0x328/0x630
[   36.347176]  ret_from_fork+0x10/0x20
[   36.347216] 
[   36.347238] freed by task 343 on cpu 0 at 36.346156s (0.001079s ago):
[   36.347301]  test_corruption+0x284/0x378
[   36.347342]  kunit_try_run_case+0x170/0x3f0
[   36.347380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.347423]  kthread+0x328/0x630
[   36.347470]  ret_from_fork+0x10/0x20
[   36.347509] 
[   36.347553] CPU: 0 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   36.347632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.347667] Hardware name: linux,dummy-virt (DT)
[   36.347703] ==================================================================
[   36.762190] ==================================================================
[   36.762281] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   36.762281] 
[   36.762345] Corrupted memory at 0x000000007b446c25 [ ! ] (in kfence-#145):
[   36.762472]  test_corruption+0x1d8/0x378
[   36.762521]  kunit_try_run_case+0x170/0x3f0
[   36.762562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.762607]  kthread+0x328/0x630
[   36.762644]  ret_from_fork+0x10/0x20
[   36.762685] 
[   36.762708] kfence-#145: 0x0000000093171a28-0x00000000eb489662, size=32, cache=test
[   36.762708] 
[   36.762762] allocated by task 345 on cpu 0 at 36.762044s (0.000715s ago):
[   36.762822]  test_alloc+0x230/0x628
[   36.762864]  test_corruption+0x198/0x378
[   36.762906]  kunit_try_run_case+0x170/0x3f0
[   36.762946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.762989]  kthread+0x328/0x630
[   36.763025]  ret_from_fork+0x10/0x20
[   36.763065] 
[   36.763089] freed by task 345 on cpu 0 at 36.762101s (0.000984s ago):
[   36.763155]  test_corruption+0x1d8/0x378
[   36.763197]  kunit_try_run_case+0x170/0x3f0
[   36.763236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.763280]  kthread+0x328/0x630
[   36.763315]  ret_from_fork+0x10/0x20
[   36.763355] 
[   36.763395] CPU: 0 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   36.763483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.763513] Hardware name: linux,dummy-virt (DT)
[   36.763546] ==================================================================
[   36.242398] ==================================================================
[   36.242533] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   36.242533] 
[   36.242608] Corrupted memory at 0x0000000037f7c8de [ ! . . . . . . . . . . . . . . . ] (in kfence-#140):
[   36.243728]  test_corruption+0x278/0x378
[   36.243785]  kunit_try_run_case+0x170/0x3f0
[   36.243830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.243874]  kthread+0x328/0x630
[   36.243915]  ret_from_fork+0x10/0x20
[   36.243958] 
[   36.243981] kfence-#140: 0x00000000b97bb9f4-0x000000005cb0dd19, size=32, cache=kmalloc-32
[   36.243981] 
[   36.244042] allocated by task 343 on cpu 0 at 36.242090s (0.001948s ago):
[   36.244106]  test_alloc+0x29c/0x628
[   36.244149]  test_corruption+0xdc/0x378
[   36.244191]  kunit_try_run_case+0x170/0x3f0
[   36.244231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.244274]  kthread+0x328/0x630
[   36.244309]  ret_from_fork+0x10/0x20
[   36.244350] 
[   36.244373] freed by task 343 on cpu 0 at 36.242188s (0.002182s ago):
[   36.244447]  test_corruption+0x278/0x378
[   36.244488]  kunit_try_run_case+0x170/0x3f0
[   36.244526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.244569]  kthread+0x328/0x630
[   36.244604]  ret_from_fork+0x10/0x20
[   36.244643] 
[   36.244693] CPU: 0 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   36.244771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.244801] Hardware name: linux,dummy-virt (DT)
[   36.244836] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   35.722156] ==================================================================
[   35.722236] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   35.722236] 
[   35.722297] Invalid free of 0x00000000d8f4fd26 (in kfence-#135):
[   35.722348]  test_invalid_addr_free+0x1ac/0x238
[   35.722397]  kunit_try_run_case+0x170/0x3f0
[   35.722457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.722502]  kthread+0x328/0x630
[   35.722544]  ret_from_fork+0x10/0x20
[   35.722586] 
[   35.722609] kfence-#135: 0x00000000997ae51e-0x00000000de6a9ff1, size=32, cache=kmalloc-32
[   35.722609] 
[   35.722663] allocated by task 339 on cpu 1 at 35.722019s (0.000640s ago):
[   35.722727]  test_alloc+0x29c/0x628
[   35.722769]  test_invalid_addr_free+0xd4/0x238
[   35.722813]  kunit_try_run_case+0x170/0x3f0
[   35.722852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.722895]  kthread+0x328/0x630
[   35.722933]  ret_from_fork+0x10/0x20
[   35.722974] 
[   35.723016] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   35.723096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.723149] Hardware name: linux,dummy-virt (DT)
[   35.723183] ==================================================================
[   35.826083] ==================================================================
[   35.826166] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   35.826166] 
[   35.826228] Invalid free of 0x0000000008f1e645 (in kfence-#136):
[   35.826279]  test_invalid_addr_free+0xec/0x238
[   35.826328]  kunit_try_run_case+0x170/0x3f0
[   35.826371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.826415]  kthread+0x328/0x630
[   35.826471]  ret_from_fork+0x10/0x20
[   35.826512] 
[   35.826535] kfence-#136: 0x0000000075c6a28b-0x0000000044878f7b, size=32, cache=test
[   35.826535] 
[   35.826586] allocated by task 341 on cpu 1 at 35.825967s (0.000615s ago):
[   35.826648]  test_alloc+0x230/0x628
[   35.826691]  test_invalid_addr_free+0xd4/0x238
[   35.826733]  kunit_try_run_case+0x170/0x3f0
[   35.826773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.826815]  kthread+0x328/0x630
[   35.826851]  ret_from_fork+0x10/0x20
[   35.826890] 
[   35.826932] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   35.827009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.827039] Hardware name: linux,dummy-virt (DT)
[   35.827071] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   35.618428] ==================================================================
[   35.618540] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   35.618540] 
[   35.618616] Invalid free of 0x000000006248b1dc (in kfence-#134):
[   35.618689]  test_double_free+0x100/0x238
[   35.618745]  kunit_try_run_case+0x170/0x3f0
[   35.618815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.618860]  kthread+0x328/0x630
[   35.618917]  ret_from_fork+0x10/0x20
[   35.618986] 
[   35.619015] kfence-#134: 0x000000006248b1dc-0x0000000080390fac, size=32, cache=test
[   35.619015] 
[   35.619129] allocated by task 337 on cpu 1 at 35.618189s (0.000901s ago):
[   35.619196]  test_alloc+0x230/0x628
[   35.619241]  test_double_free+0xd4/0x238
[   35.619298]  kunit_try_run_case+0x170/0x3f0
[   35.619338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.619381]  kthread+0x328/0x630
[   35.619416]  ret_from_fork+0x10/0x20
[   35.619737] 
[   35.619771] freed by task 337 on cpu 1 at 35.618244s (0.001523s ago):
[   35.619859]  test_double_free+0xf0/0x238
[   35.620060]  kunit_try_run_case+0x170/0x3f0
[   35.620108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.620154]  kthread+0x328/0x630
[   35.620228]  ret_from_fork+0x10/0x20
[   35.620292] 
[   35.620362] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   35.620494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.620522] Hardware name: linux,dummy-virt (DT)
[   35.620581] ==================================================================
[   35.511931] ==================================================================
[   35.512034] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   35.512034] 
[   35.512102] Invalid free of 0x000000001312013a (in kfence-#133):
[   35.512322]  test_double_free+0x1bc/0x238
[   35.512413]  kunit_try_run_case+0x170/0x3f0
[   35.512492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.512555]  kthread+0x328/0x630
[   35.512601]  ret_from_fork+0x10/0x20
[   35.512644] 
[   35.512669] kfence-#133: 0x000000001312013a-0x0000000015469428, size=32, cache=kmalloc-32
[   35.512669] 
[   35.512755] allocated by task 335 on cpu 1 at 35.511277s (0.001457s ago):
[   35.512820]  test_alloc+0x29c/0x628
[   35.512886]  test_double_free+0xd4/0x238
[   35.512929]  kunit_try_run_case+0x170/0x3f0
[   35.512966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.513010]  kthread+0x328/0x630
[   35.513047]  ret_from_fork+0x10/0x20
[   35.513086] 
[   35.513111] freed by task 335 on cpu 1 at 35.511344s (0.001763s ago):
[   35.513271]  test_double_free+0x1ac/0x238
[   35.513376]  kunit_try_run_case+0x170/0x3f0
[   35.513429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.513483]  kthread+0x328/0x630
[   35.513520]  ret_from_fork+0x10/0x20
[   35.513576] 
[   35.513836] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   35.513932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.513962] Hardware name: linux,dummy-virt (DT)
[   35.513995] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   35.078617] ==================================================================
[   35.078721] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   35.078721] 
[   35.078816] Use-after-free read at 0x0000000085cab558 (in kfence-#129):
[   35.079043]  test_use_after_free_read+0x114/0x248
[   35.079119]  kunit_try_run_case+0x170/0x3f0
[   35.079170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.079215]  kthread+0x328/0x630
[   35.079273]  ret_from_fork+0x10/0x20
[   35.079346] 
[   35.079371] kfence-#129: 0x0000000085cab558-0x000000005b8915e4, size=32, cache=kmalloc-32
[   35.079371] 
[   35.079457] allocated by task 327 on cpu 1 at 35.078261s (0.001191s ago):
[   35.079529]  test_alloc+0x29c/0x628
[   35.079570]  test_use_after_free_read+0xd0/0x248
[   35.079740]  kunit_try_run_case+0x170/0x3f0
[   35.079808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.079853]  kthread+0x328/0x630
[   35.079905]  ret_from_fork+0x10/0x20
[   35.079956] 
[   35.080119] freed by task 327 on cpu 1 at 35.078332s (0.001704s ago):
[   35.080504]  test_use_after_free_read+0x1c0/0x248
[   35.080574]  kunit_try_run_case+0x170/0x3f0
[   35.080664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.080707]  kthread+0x328/0x630
[   35.080742]  ret_from_fork+0x10/0x20
[   35.080839] 
[   35.080907] CPU: 1 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   35.080990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.081019] Hardware name: linux,dummy-virt (DT)
[   35.081053] ==================================================================
[   35.187552] ==================================================================
[   35.187666] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   35.187666] 
[   35.187753] Use-after-free read at 0x00000000c231628f (in kfence-#130):
[   35.187829]  test_use_after_free_read+0x114/0x248
[   35.187896]  kunit_try_run_case+0x170/0x3f0
[   35.187953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.187997]  kthread+0x328/0x630
[   35.188074]  ret_from_fork+0x10/0x20
[   35.188150] 
[   35.188176] kfence-#130: 0x00000000c231628f-0x00000000f7edd4a8, size=32, cache=test
[   35.188176] 
[   35.188252] allocated by task 329 on cpu 1 at 35.187364s (0.000867s ago):
[   35.188352]  test_alloc+0x230/0x628
[   35.188420]  test_use_after_free_read+0xd0/0x248
[   35.188497]  kunit_try_run_case+0x170/0x3f0
[   35.188694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.188741]  kthread+0x328/0x630
[   35.188910]  ret_from_fork+0x10/0x20
[   35.188964] 
[   35.189098] freed by task 329 on cpu 1 at 35.187422s (0.001644s ago):
[   35.189232]  test_use_after_free_read+0xf0/0x248
[   35.189319]  kunit_try_run_case+0x170/0x3f0
[   35.189363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.189492]  kthread+0x328/0x630
[   35.189542]  ret_from_fork+0x10/0x20
[   35.189598] 
[   35.189656] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   35.189822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.189862] Hardware name: linux,dummy-virt (DT)
[   35.189894] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   34.322674] ==================================================================
[   34.322752] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   34.322752] 
[   34.323212] Out-of-bounds read at 0x00000000403207d7 (1B left of kfence-#122):
[   34.323509]  test_out_of_bounds_read+0x114/0x3e0
[   34.323640]  kunit_try_run_case+0x170/0x3f0
[   34.323707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.323754]  kthread+0x328/0x630
[   34.323988]  ret_from_fork+0x10/0x20
[   34.324043] 
[   34.324161] kfence-#122: 0x00000000bfb0626a-0x0000000046d8c3c3, size=32, cache=test
[   34.324161] 
[   34.324314] allocated by task 321 on cpu 1 at 34.322504s (0.001779s ago):
[   34.324516]  test_alloc+0x230/0x628
[   34.324570]  test_out_of_bounds_read+0xdc/0x3e0
[   34.324614]  kunit_try_run_case+0x170/0x3f0
[   34.324884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.325040]  kthread+0x328/0x630
[   34.325279]  ret_from_fork+0x10/0x20
[   34.325349] 
[   34.325395] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   34.325712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.325853] Hardware name: linux,dummy-virt (DT)
[   34.325888] ==================================================================
[   34.214913] ==================================================================
[   34.215009] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   34.215009] 
[   34.215158] Out-of-bounds read at 0x00000000267f2a28 (32B right of kfence-#121):
[   34.215217]  test_out_of_bounds_read+0x1c8/0x3e0
[   34.215286]  kunit_try_run_case+0x170/0x3f0
[   34.215457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.215619]  kthread+0x328/0x630
[   34.215718]  ret_from_fork+0x10/0x20
[   34.215761] 
[   34.215827] kfence-#121: 0x000000003af453e6-0x000000002d4758f5, size=32, cache=kmalloc-32
[   34.215827] 
[   34.215915] allocated by task 319 on cpu 1 at 34.214381s (0.001514s ago):
[   34.215987]  test_alloc+0x29c/0x628
[   34.216031]  test_out_of_bounds_read+0x198/0x3e0
[   34.216273]  kunit_try_run_case+0x170/0x3f0
[   34.216357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.216403]  kthread+0x328/0x630
[   34.216516]  ret_from_fork+0x10/0x20
[   34.216562] 
[   34.216607] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   34.216688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.216715] Hardware name: linux,dummy-virt (DT)
[   34.216748] ==================================================================
[   34.109466] ==================================================================
[   34.109638] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   34.109638] 
[   34.109889] Out-of-bounds read at 0x00000000e39724b9 (1B left of kfence-#120):
[   34.110370]  test_out_of_bounds_read+0x114/0x3e0
[   34.110536]  kunit_try_run_case+0x170/0x3f0
[   34.110649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.110717]  kthread+0x328/0x630
[   34.110870]  ret_from_fork+0x10/0x20
[   34.110921] 
[   34.111124] kfence-#120: 0x0000000037ee6bdb-0x000000005c1d47f7, size=32, cache=kmalloc-32
[   34.111124] 
[   34.111326] allocated by task 319 on cpu 1 at 34.108465s (0.002801s ago):
[   34.112140]  test_alloc+0x29c/0x628
[   34.112236]  test_out_of_bounds_read+0xdc/0x3e0
[   34.112282]  kunit_try_run_case+0x170/0x3f0
[   34.112351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.112394]  kthread+0x328/0x630
[   34.112430]  ret_from_fork+0x10/0x20
[   34.112654] 
[   34.112820] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   34.112970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.113038] Hardware name: linux,dummy-virt (DT)
[   34.113103] ==================================================================
[   34.538655] ==================================================================
[   34.538879] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   34.538879] 
[   34.538969] Out-of-bounds read at 0x000000007c9b0f48 (32B right of kfence-#124):
[   34.539256]  test_out_of_bounds_read+0x1c8/0x3e0
[   34.539533]  kunit_try_run_case+0x170/0x3f0
[   34.539600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.539647]  kthread+0x328/0x630
[   34.539691]  ret_from_fork+0x10/0x20
[   34.539887] 
[   34.539925] kfence-#124: 0x000000001b52b65d-0x000000001f22bcb0, size=32, cache=test
[   34.539925] 
[   34.539978] allocated by task 321 on cpu 1 at 34.538354s (0.001620s ago):
[   34.540171]  test_alloc+0x230/0x628
[   34.540327]  test_out_of_bounds_read+0x198/0x3e0
[   34.540447]  kunit_try_run_case+0x170/0x3f0
[   34.540737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.541000]  kthread+0x328/0x630
[   34.541310]  ret_from_fork+0x10/0x20
[   34.541378] 
[   34.541758] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   34.542312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.542349] Hardware name: linux,dummy-virt (DT)
[   34.542749] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   33.783973] ==================================================================
[   33.784024] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   33.784079] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.784132] 
[   33.784163] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.784247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.785235] Hardware name: linux,dummy-virt (DT)
[   33.785610] Call trace:
[   33.786074]  show_stack+0x20/0x38 (C)
[   33.786134]  dump_stack_lvl+0x8c/0xd0
[   33.786407]  print_report+0x118/0x5d0
[   33.786481]  kasan_report+0xdc/0x128
[   33.786527]  kasan_check_range+0x100/0x1a8
[   33.786575]  __kasan_check_write+0x20/0x30
[   33.786624]  strncpy_from_user+0x3c/0x2a0
[   33.787443]  copy_user_test_oob+0x5c0/0xec8
[   33.787499]  kunit_try_run_case+0x170/0x3f0
[   33.787548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.787604]  kthread+0x328/0x630
[   33.787648]  ret_from_fork+0x10/0x20
[   33.788636] 
[   33.788675] Allocated by task 317:
[   33.788705]  kasan_save_stack+0x3c/0x68
[   33.789044]  kasan_save_track+0x20/0x40
[   33.789095]  kasan_save_alloc_info+0x40/0x58
[   33.789364]  __kasan_kmalloc+0xd4/0xd8
[   33.789405]  __kmalloc_noprof+0x198/0x4c8
[   33.789457]  kunit_kmalloc_array+0x34/0x88
[   33.789496]  copy_user_test_oob+0xac/0xec8
[   33.789775]  kunit_try_run_case+0x170/0x3f0
[   33.790403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.791059]  kthread+0x328/0x630
[   33.791114]  ret_from_fork+0x10/0x20
[   33.791157] 
[   33.791180] The buggy address belongs to the object at fff00000c64f9600
[   33.791180]  which belongs to the cache kmalloc-128 of size 128
[   33.791242] The buggy address is located 0 bytes inside of
[   33.791242]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.791307] 
[   33.791456] The buggy address belongs to the physical page:
[   33.791768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.792202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.792413] page_type: f5(slab)
[   33.792466] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.792520] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.792563] page dumped because: kasan: bad access detected
[   33.792598] 
[   33.792617] Memory state around the buggy address:
[   33.792652]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.792704]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.793272] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.793444]                                                                 ^
[   33.793659]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.794019]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.794254] ==================================================================
[   33.797683] ==================================================================
[   33.797743] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   33.797795] Write of size 1 at addr fff00000c64f9678 by task kunit_try_catch/317
[   33.797845] 
[   33.797882] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.798025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.798057] Hardware name: linux,dummy-virt (DT)
[   33.798091] Call trace:
[   33.798116]  show_stack+0x20/0x38 (C)
[   33.798168]  dump_stack_lvl+0x8c/0xd0
[   33.798228]  print_report+0x118/0x5d0
[   33.798313]  kasan_report+0xdc/0x128
[   33.798358]  __asan_report_store1_noabort+0x20/0x30
[   33.798429]  strncpy_from_user+0x270/0x2a0
[   33.798487]  copy_user_test_oob+0x5c0/0xec8
[   33.798536]  kunit_try_run_case+0x170/0x3f0
[   33.798584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.798638]  kthread+0x328/0x630
[   33.798681]  ret_from_fork+0x10/0x20
[   33.798870] 
[   33.798935] Allocated by task 317:
[   33.798964]  kasan_save_stack+0x3c/0x68
[   33.799057]  kasan_save_track+0x20/0x40
[   33.799100]  kasan_save_alloc_info+0x40/0x58
[   33.799171]  __kasan_kmalloc+0xd4/0xd8
[   33.799362]  __kmalloc_noprof+0x198/0x4c8
[   33.799523]  kunit_kmalloc_array+0x34/0x88
[   33.799563]  copy_user_test_oob+0xac/0xec8
[   33.799609]  kunit_try_run_case+0x170/0x3f0
[   33.799656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.799849]  kthread+0x328/0x630
[   33.799891]  ret_from_fork+0x10/0x20
[   33.800046] 
[   33.800101] The buggy address belongs to the object at fff00000c64f9600
[   33.800101]  which belongs to the cache kmalloc-128 of size 128
[   33.800161] The buggy address is located 0 bytes to the right of
[   33.800161]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.800256] 
[   33.800330] The buggy address belongs to the physical page:
[   33.800408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.800806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.800923] page_type: f5(slab)
[   33.801077] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.801162] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.801205] page dumped because: kasan: bad access detected
[   33.801490] 
[   33.801516] Memory state around the buggy address:
[   33.801702]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.801752]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.802276] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.802328]                                                                 ^
[   33.802372]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.802417]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.803002] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   33.718299] ==================================================================
[   33.718380] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   33.718522] Read of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.718576] 
[   33.718639] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.719150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.719217] Hardware name: linux,dummy-virt (DT)
[   33.719549] Call trace:
[   33.719659]  show_stack+0x20/0x38 (C)
[   33.719930]  dump_stack_lvl+0x8c/0xd0
[   33.719984]  print_report+0x118/0x5d0
[   33.720747]  kasan_report+0xdc/0x128
[   33.720822]  kasan_check_range+0x100/0x1a8
[   33.720872]  __kasan_check_read+0x20/0x30
[   33.720922]  copy_user_test_oob+0x728/0xec8
[   33.721500]  kunit_try_run_case+0x170/0x3f0
[   33.721676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.721742]  kthread+0x328/0x630
[   33.721803]  ret_from_fork+0x10/0x20
[   33.722133] 
[   33.722157] Allocated by task 317:
[   33.722187]  kasan_save_stack+0x3c/0x68
[   33.722390]  kasan_save_track+0x20/0x40
[   33.722576]  kasan_save_alloc_info+0x40/0x58
[   33.722759]  __kasan_kmalloc+0xd4/0xd8
[   33.722993]  __kmalloc_noprof+0x198/0x4c8
[   33.723079]  kunit_kmalloc_array+0x34/0x88
[   33.723173]  copy_user_test_oob+0xac/0xec8
[   33.723344]  kunit_try_run_case+0x170/0x3f0
[   33.723386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.723764]  kthread+0x328/0x630
[   33.724096]  ret_from_fork+0x10/0x20
[   33.724269] 
[   33.724412] The buggy address belongs to the object at fff00000c64f9600
[   33.724412]  which belongs to the cache kmalloc-128 of size 128
[   33.724815] The buggy address is located 0 bytes inside of
[   33.724815]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.725100] 
[   33.725180] The buggy address belongs to the physical page:
[   33.725378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.725501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.725567] page_type: f5(slab)
[   33.725684] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.725860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.726110] page dumped because: kasan: bad access detected
[   33.726166] 
[   33.726187] Memory state around the buggy address:
[   33.726232]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.726446]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.726640] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.726880]                                                                 ^
[   33.727022]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.727343]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.727394] ==================================================================
[   33.696278] ==================================================================
[   33.699258] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   33.699379] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.699445] 
[   33.699498] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.699589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.699618] Hardware name: linux,dummy-virt (DT)
[   33.699653] Call trace:
[   33.699682]  show_stack+0x20/0x38 (C)
[   33.699739]  dump_stack_lvl+0x8c/0xd0
[   33.699795]  print_report+0x118/0x5d0
[   33.699840]  kasan_report+0xdc/0x128
[   33.699888]  kasan_check_range+0x100/0x1a8
[   33.699939]  __kasan_check_write+0x20/0x30
[   33.699986]  copy_user_test_oob+0x234/0xec8
[   33.700037]  kunit_try_run_case+0x170/0x3f0
[   33.700089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.700146]  kthread+0x328/0x630
[   33.700193]  ret_from_fork+0x10/0x20
[   33.700246] 
[   33.700269] Allocated by task 317:
[   33.700300]  kasan_save_stack+0x3c/0x68
[   33.700348]  kasan_save_track+0x20/0x40
[   33.700388]  kasan_save_alloc_info+0x40/0x58
[   33.700429]  __kasan_kmalloc+0xd4/0xd8
[   33.700480]  __kmalloc_noprof+0x198/0x4c8
[   33.700525]  kunit_kmalloc_array+0x34/0x88
[   33.700573]  copy_user_test_oob+0xac/0xec8
[   33.700615]  kunit_try_run_case+0x170/0x3f0
[   33.700665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.700710]  kthread+0x328/0x630
[   33.700807]  ret_from_fork+0x10/0x20
[   33.700948] 
[   33.701012] The buggy address belongs to the object at fff00000c64f9600
[   33.701012]  which belongs to the cache kmalloc-128 of size 128
[   33.701111] The buggy address is located 0 bytes inside of
[   33.701111]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.701544] 
[   33.701579] The buggy address belongs to the physical page:
[   33.701618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.701977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.702060] page_type: f5(slab)
[   33.702116] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.702175] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.702218] page dumped because: kasan: bad access detected
[   33.702255] 
[   33.702276] Memory state around the buggy address:
[   33.702313]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.703001]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.703061] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.703103]                                                                 ^
[   33.703157]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.703410]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.703650] ==================================================================
[   33.741078] ==================================================================
[   33.741139] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   33.742025] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.742118] 
[   33.742166] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.742254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.742309] Hardware name: linux,dummy-virt (DT)
[   33.742343] Call trace:
[   33.742384]  show_stack+0x20/0x38 (C)
[   33.742661]  dump_stack_lvl+0x8c/0xd0
[   33.742917]  print_report+0x118/0x5d0
[   33.743410]  kasan_report+0xdc/0x128
[   33.743712]  kasan_check_range+0x100/0x1a8
[   33.744045]  __kasan_check_write+0x20/0x30
[   33.744494]  copy_user_test_oob+0x35c/0xec8
[   33.744673]  kunit_try_run_case+0x170/0x3f0
[   33.744723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.745276]  kthread+0x328/0x630
[   33.745363]  ret_from_fork+0x10/0x20
[   33.745416] 
[   33.745737] Allocated by task 317:
[   33.745791]  kasan_save_stack+0x3c/0x68
[   33.745839]  kasan_save_track+0x20/0x40
[   33.745891]  kasan_save_alloc_info+0x40/0x58
[   33.745931]  __kasan_kmalloc+0xd4/0xd8
[   33.746073]  __kmalloc_noprof+0x198/0x4c8
[   33.746121]  kunit_kmalloc_array+0x34/0x88
[   33.746183]  copy_user_test_oob+0xac/0xec8
[   33.746448]  kunit_try_run_case+0x170/0x3f0
[   33.746498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.746550]  kthread+0x328/0x630
[   33.746586]  ret_from_fork+0x10/0x20
[   33.746625] 
[   33.747053] The buggy address belongs to the object at fff00000c64f9600
[   33.747053]  which belongs to the cache kmalloc-128 of size 128
[   33.747141] The buggy address is located 0 bytes inside of
[   33.747141]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.747319] 
[   33.747517] The buggy address belongs to the physical page:
[   33.747554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.747613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.748041] page_type: f5(slab)
[   33.748095] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.748165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.748362] page dumped because: kasan: bad access detected
[   33.748397] 
[   33.748418] Memory state around the buggy address:
[   33.748462]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.748511]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.748557] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.748598]                                                                 ^
[   33.748924]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.748988]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.749028] ==================================================================
[   33.774196] ==================================================================
[   33.774258] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   33.774750] Read of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.775020] 
[   33.775227] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.775359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.775824] Hardware name: linux,dummy-virt (DT)
[   33.775875] Call trace:
[   33.775899]  show_stack+0x20/0x38 (C)
[   33.775953]  dump_stack_lvl+0x8c/0xd0
[   33.776144]  print_report+0x118/0x5d0
[   33.776347]  kasan_report+0xdc/0x128
[   33.776516]  kasan_check_range+0x100/0x1a8
[   33.776663]  __kasan_check_read+0x20/0x30
[   33.776899]  copy_user_test_oob+0x4a0/0xec8
[   33.776976]  kunit_try_run_case+0x170/0x3f0
[   33.777109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.777167]  kthread+0x328/0x630
[   33.777210]  ret_from_fork+0x10/0x20
[   33.777925] 
[   33.777969] Allocated by task 317:
[   33.778088]  kasan_save_stack+0x3c/0x68
[   33.778137]  kasan_save_track+0x20/0x40
[   33.778181]  kasan_save_alloc_info+0x40/0x58
[   33.778236]  __kasan_kmalloc+0xd4/0xd8
[   33.778279]  __kmalloc_noprof+0x198/0x4c8
[   33.778321]  kunit_kmalloc_array+0x34/0x88
[   33.779133]  copy_user_test_oob+0xac/0xec8
[   33.779482]  kunit_try_run_case+0x170/0x3f0
[   33.779693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.779886]  kthread+0x328/0x630
[   33.779923]  ret_from_fork+0x10/0x20
[   33.780225] 
[   33.780520] The buggy address belongs to the object at fff00000c64f9600
[   33.780520]  which belongs to the cache kmalloc-128 of size 128
[   33.780808] The buggy address is located 0 bytes inside of
[   33.780808]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.781113] 
[   33.781138] The buggy address belongs to the physical page:
[   33.781457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.781736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.781806] page_type: f5(slab)
[   33.781847] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.781901] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.781943] page dumped because: kasan: bad access detected
[   33.781977] 
[   33.781998] Memory state around the buggy address:
[   33.782031]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.782076]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.782257] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.782334]                                                                 ^
[   33.782467]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.782514]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.782555] ==================================================================
[   33.750861] ==================================================================
[   33.750916] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   33.750969] Read of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.751019] 
[   33.751716] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.752295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.752338] Hardware name: linux,dummy-virt (DT)
[   33.752371] Call trace:
[   33.752395]  show_stack+0x20/0x38 (C)
[   33.752764]  dump_stack_lvl+0x8c/0xd0
[   33.752870]  print_report+0x118/0x5d0
[   33.752918]  kasan_report+0xdc/0x128
[   33.753039]  kasan_check_range+0x100/0x1a8
[   33.753300]  __kasan_check_read+0x20/0x30
[   33.753651]  copy_user_test_oob+0x3c8/0xec8
[   33.753973]  kunit_try_run_case+0x170/0x3f0
[   33.754024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.754078]  kthread+0x328/0x630
[   33.754121]  ret_from_fork+0x10/0x20
[   33.754171] 
[   33.754191] Allocated by task 317:
[   33.754219]  kasan_save_stack+0x3c/0x68
[   33.754265]  kasan_save_track+0x20/0x40
[   33.754307]  kasan_save_alloc_info+0x40/0x58
[   33.754707]  __kasan_kmalloc+0xd4/0xd8
[   33.754887]  __kmalloc_noprof+0x198/0x4c8
[   33.754929]  kunit_kmalloc_array+0x34/0x88
[   33.754969]  copy_user_test_oob+0xac/0xec8
[   33.755256]  kunit_try_run_case+0x170/0x3f0
[   33.755596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.755670]  kthread+0x328/0x630
[   33.755977]  ret_from_fork+0x10/0x20
[   33.756186] 
[   33.756303] The buggy address belongs to the object at fff00000c64f9600
[   33.756303]  which belongs to the cache kmalloc-128 of size 128
[   33.756370] The buggy address is located 0 bytes inside of
[   33.756370]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.756724] 
[   33.757033] The buggy address belongs to the physical page:
[   33.757381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.757459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.757545] page_type: f5(slab)
[   33.757586] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.758191] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.758649] page dumped because: kasan: bad access detected
[   33.758690] 
[   33.758711] Memory state around the buggy address:
[   33.758872]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.758921]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.759155] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.759554]                                                                 ^
[   33.759780]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.759999]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.760040] ==================================================================
[   33.761247] ==================================================================
[   33.761592] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   33.762019] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.762213] 
[   33.762248] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.762672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.762706] Hardware name: linux,dummy-virt (DT)
[   33.763051] Call trace:
[   33.763261]  show_stack+0x20/0x38 (C)
[   33.763479]  dump_stack_lvl+0x8c/0xd0
[   33.763542]  print_report+0x118/0x5d0
[   33.763864]  kasan_report+0xdc/0x128
[   33.764198]  kasan_check_range+0x100/0x1a8
[   33.764255]  __kasan_check_write+0x20/0x30
[   33.764376]  copy_user_test_oob+0x434/0xec8
[   33.764536]  kunit_try_run_case+0x170/0x3f0
[   33.765070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.765328]  kthread+0x328/0x630
[   33.765390]  ret_from_fork+0x10/0x20
[   33.765965] 
[   33.766246] Allocated by task 317:
[   33.766286]  kasan_save_stack+0x3c/0x68
[   33.766379]  kasan_save_track+0x20/0x40
[   33.766445]  kasan_save_alloc_info+0x40/0x58
[   33.766622]  __kasan_kmalloc+0xd4/0xd8
[   33.766667]  __kmalloc_noprof+0x198/0x4c8
[   33.766710]  kunit_kmalloc_array+0x34/0x88
[   33.767194]  copy_user_test_oob+0xac/0xec8
[   33.767474]  kunit_try_run_case+0x170/0x3f0
[   33.767772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.767867]  kthread+0x328/0x630
[   33.768001]  ret_from_fork+0x10/0x20
[   33.768048] 
[   33.768423] The buggy address belongs to the object at fff00000c64f9600
[   33.768423]  which belongs to the cache kmalloc-128 of size 128
[   33.768658] The buggy address is located 0 bytes inside of
[   33.768658]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.768788] 
[   33.768934] The buggy address belongs to the physical page:
[   33.769208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.769297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.769412] page_type: f5(slab)
[   33.769529] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.769590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.770038] page dumped because: kasan: bad access detected
[   33.770263] 
[   33.770545] Memory state around the buggy address:
[   33.770600]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.770654]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.770705] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.771264]                                                                 ^
[   33.771332]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.771444]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.771783] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   33.635239] ==================================================================
[   33.635297] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   33.635352] Write of size 8 at addr fff00000c64f9578 by task kunit_try_catch/313
[   33.635404] 
[   33.637859] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.637965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.637993] Hardware name: linux,dummy-virt (DT)
[   33.638027] Call trace:
[   33.638051]  show_stack+0x20/0x38 (C)
[   33.638109]  dump_stack_lvl+0x8c/0xd0
[   33.638161]  print_report+0x118/0x5d0
[   33.638206]  kasan_report+0xdc/0x128
[   33.638253]  kasan_check_range+0x100/0x1a8
[   33.638301]  __kasan_check_write+0x20/0x30
[   33.638351]  copy_to_kernel_nofault+0x8c/0x250
[   33.638405]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   33.638927]  kunit_try_run_case+0x170/0x3f0
[   33.639306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.639487]  kthread+0x328/0x630
[   33.639538]  ret_from_fork+0x10/0x20
[   33.639998] 
[   33.640031] Allocated by task 313:
[   33.640246]  kasan_save_stack+0x3c/0x68
[   33.640499]  kasan_save_track+0x20/0x40
[   33.640710]  kasan_save_alloc_info+0x40/0x58
[   33.640763]  __kasan_kmalloc+0xd4/0xd8
[   33.640812]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.640856]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.640900]  kunit_try_run_case+0x170/0x3f0
[   33.640939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.640983]  kthread+0x328/0x630
[   33.641414]  ret_from_fork+0x10/0x20
[   33.641793] 
[   33.641828] The buggy address belongs to the object at fff00000c64f9500
[   33.641828]  which belongs to the cache kmalloc-128 of size 128
[   33.641923] The buggy address is located 0 bytes to the right of
[   33.641923]  allocated 120-byte region [fff00000c64f9500, fff00000c64f9578)
[   33.641989] 
[   33.642206] The buggy address belongs to the physical page:
[   33.642266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.642323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.642736] page_type: f5(slab)
[   33.642849] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.642982] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.643323] page dumped because: kasan: bad access detected
[   33.643528] 
[   33.643608] Memory state around the buggy address:
[   33.643826]  fff00000c64f9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.643915]  fff00000c64f9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.644183] >fff00000c64f9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.644409]                                                                 ^
[   33.644470]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.644516]  fff00000c64f9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.644557] ==================================================================
[   33.622977] ==================================================================
[   33.623047] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   33.623127] Read of size 8 at addr fff00000c64f9578 by task kunit_try_catch/313
[   33.623179] 
[   33.623221] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.623312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.623340] Hardware name: linux,dummy-virt (DT)
[   33.623375] Call trace:
[   33.623401]  show_stack+0x20/0x38 (C)
[   33.623586]  dump_stack_lvl+0x8c/0xd0
[   33.623758]  print_report+0x118/0x5d0
[   33.624307]  kasan_report+0xdc/0x128
[   33.624377]  __asan_report_load8_noabort+0x20/0x30
[   33.624928]  copy_to_kernel_nofault+0x204/0x250
[   33.625000]  copy_to_kernel_nofault_oob+0x158/0x418
[   33.625055]  kunit_try_run_case+0x170/0x3f0
[   33.625632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.625840]  kthread+0x328/0x630
[   33.625938]  ret_from_fork+0x10/0x20
[   33.626000] 
[   33.626029] Allocated by task 313:
[   33.626063]  kasan_save_stack+0x3c/0x68
[   33.626132]  kasan_save_track+0x20/0x40
[   33.626175]  kasan_save_alloc_info+0x40/0x58
[   33.626216]  __kasan_kmalloc+0xd4/0xd8
[   33.626256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.626621]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.626668]  kunit_try_run_case+0x170/0x3f0
[   33.626715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.626904]  kthread+0x328/0x630
[   33.626945]  ret_from_fork+0x10/0x20
[   33.626994] 
[   33.627334] The buggy address belongs to the object at fff00000c64f9500
[   33.627334]  which belongs to the cache kmalloc-128 of size 128
[   33.627743] The buggy address is located 0 bytes to the right of
[   33.627743]  allocated 120-byte region [fff00000c64f9500, fff00000c64f9578)
[   33.627891] 
[   33.628132] The buggy address belongs to the physical page:
[   33.628634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.629056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.629699] page_type: f5(slab)
[   33.629854] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.629911] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.630356] page dumped because: kasan: bad access detected
[   33.630927] 
[   33.631105] Memory state around the buggy address:
[   33.631506]  fff00000c64f9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.631556]  fff00000c64f9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.632145] >fff00000c64f9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.632543]                                                                 ^
[   33.632780]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.633276]  fff00000c64f9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.633580] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   33.561343] ==================================================================
[   33.561420] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   33.561503] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/301
[   33.561556] 
[   33.561594] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.561690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.561717] Hardware name: linux,dummy-virt (DT)
[   33.562245] Call trace:
[   33.562287]  show_stack+0x20/0x38 (C)
[   33.562689]  dump_stack_lvl+0x8c/0xd0
[   33.562838]  print_report+0x310/0x5d0
[   33.562953]  kasan_report+0xdc/0x128
[   33.563120]  __asan_report_load1_noabort+0x20/0x30
[   33.563171]  vmalloc_oob+0x578/0x5d0
[   33.563219]  kunit_try_run_case+0x170/0x3f0
[   33.563270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.563324]  kthread+0x328/0x630
[   33.563372]  ret_from_fork+0x10/0x20
[   33.563424] 
[   33.563460] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   33.563522] The buggy address belongs to the physical page:
[   33.563557] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f6
[   33.563790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.563969] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.564184] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.564323] page dumped because: kasan: bad access detected
[   33.564390] 
[   33.564874] Memory state around the buggy address:
[   33.565136]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.565652]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.565707] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.565748]                                                              ^
[   33.565948]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.566250]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.566301] ==================================================================
[   33.569000] ==================================================================
[   33.569055] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   33.569576] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/301
[   33.569691] 
[   33.569726] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.569813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.569866] Hardware name: linux,dummy-virt (DT)
[   33.569900] Call trace:
[   33.569973]  show_stack+0x20/0x38 (C)
[   33.570112]  dump_stack_lvl+0x8c/0xd0
[   33.570532]  print_report+0x310/0x5d0
[   33.570777]  kasan_report+0xdc/0x128
[   33.570845]  __asan_report_load1_noabort+0x20/0x30
[   33.570895]  vmalloc_oob+0x51c/0x5d0
[   33.570943]  kunit_try_run_case+0x170/0x3f0
[   33.571137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.571342]  kthread+0x328/0x630
[   33.571392]  ret_from_fork+0x10/0x20
[   33.571791] 
[   33.571822] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   33.571967] The buggy address belongs to the physical page:
[   33.572020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f6
[   33.572075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.572141] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.572193] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.572234] page dumped because: kasan: bad access detected
[   33.572267] 
[   33.572308] Memory state around the buggy address:
[   33.572474]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.572595]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.572641] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.572791]                                                                 ^
[   33.572833]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.572915]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.573068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.240841] ==================================================================
[   33.240893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.241107] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.241170] 
[   33.241338] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.241470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.241507] Hardware name: linux,dummy-virt (DT)
[   33.241541] Call trace:
[   33.241586]  show_stack+0x20/0x38 (C)
[   33.241648]  dump_stack_lvl+0x8c/0xd0
[   33.241698]  print_report+0x118/0x5d0
[   33.241745]  kasan_report+0xdc/0x128
[   33.241958]  kasan_check_range+0x100/0x1a8
[   33.242064]  __kasan_check_write+0x20/0x30
[   33.242196]  kasan_atomics_helper+0xad4/0x4858
[   33.242260]  kasan_atomics+0x198/0x2e0
[   33.242321]  kunit_try_run_case+0x170/0x3f0
[   33.242379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.242464]  kthread+0x328/0x630
[   33.242512]  ret_from_fork+0x10/0x20
[   33.242562] 
[   33.242604] Allocated by task 297:
[   33.242634]  kasan_save_stack+0x3c/0x68
[   33.242884]  kasan_save_track+0x20/0x40
[   33.242941]  kasan_save_alloc_info+0x40/0x58
[   33.242982]  __kasan_kmalloc+0xd4/0xd8
[   33.243024]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.243121]  kasan_atomics+0xb8/0x2e0
[   33.243212]  kunit_try_run_case+0x170/0x3f0
[   33.243360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.243511]  kthread+0x328/0x630
[   33.243712]  ret_from_fork+0x10/0x20
[   33.243933] 
[   33.244033] The buggy address belongs to the object at fff00000c64f7f00
[   33.244033]  which belongs to the cache kmalloc-64 of size 64
[   33.244141] The buggy address is located 0 bytes to the right of
[   33.244141]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.244274] 
[   33.244351] The buggy address belongs to the physical page:
[   33.244385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.244451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.244770] page_type: f5(slab)
[   33.244870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.244950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.245163] page dumped because: kasan: bad access detected
[   33.245199] 
[   33.245326] Memory state around the buggy address:
[   33.245375]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.245467]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.245597] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.245744]                                      ^
[   33.245814]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.245872]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.245912] ==================================================================
[   33.446610] ==================================================================
[   33.446694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   33.447254] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.447399] 
[   33.447479] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.447766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.448034] Hardware name: linux,dummy-virt (DT)
[   33.448293] Call trace:
[   33.448344]  show_stack+0x20/0x38 (C)
[   33.448415]  dump_stack_lvl+0x8c/0xd0
[   33.448851]  print_report+0x118/0x5d0
[   33.449079]  kasan_report+0xdc/0x128
[   33.449144]  kasan_check_range+0x100/0x1a8
[   33.449200]  __kasan_check_write+0x20/0x30
[   33.449354]  kasan_atomics_helper+0x1414/0x4858
[   33.449783]  kasan_atomics+0x198/0x2e0
[   33.449834]  kunit_try_run_case+0x170/0x3f0
[   33.449884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.449940]  kthread+0x328/0x630
[   33.449985]  ret_from_fork+0x10/0x20
[   33.450037] 
[   33.450246] Allocated by task 297:
[   33.450296]  kasan_save_stack+0x3c/0x68
[   33.450535]  kasan_save_track+0x20/0x40
[   33.451359]  kasan_save_alloc_info+0x40/0x58
[   33.451616]  __kasan_kmalloc+0xd4/0xd8
[   33.451671]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.451716]  kasan_atomics+0xb8/0x2e0
[   33.451756]  kunit_try_run_case+0x170/0x3f0
[   33.452024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.452400]  kthread+0x328/0x630
[   33.452452]  ret_from_fork+0x10/0x20
[   33.452848] 
[   33.452876] The buggy address belongs to the object at fff00000c64f7f00
[   33.452876]  which belongs to the cache kmalloc-64 of size 64
[   33.453180] The buggy address is located 0 bytes to the right of
[   33.453180]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.453546] 
[   33.453575] The buggy address belongs to the physical page:
[   33.453834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.454098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.454150] page_type: f5(slab)
[   33.454300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.454522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.454566] page dumped because: kasan: bad access detected
[   33.455091] 
[   33.455314] Memory state around the buggy address:
[   33.455585]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.455655]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.455699] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.455738]                                      ^
[   33.455775]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.456407]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.456471] ==================================================================
[   33.501480] ==================================================================
[   33.501536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   33.501951] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.502019] 
[   33.502058] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.502153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.502951] Hardware name: linux,dummy-virt (DT)
[   33.503018] Call trace:
[   33.503041]  show_stack+0x20/0x38 (C)
[   33.503096]  dump_stack_lvl+0x8c/0xd0
[   33.503754]  print_report+0x118/0x5d0
[   33.503933]  kasan_report+0xdc/0x128
[   33.504266]  __asan_report_load8_noabort+0x20/0x30
[   33.504335]  kasan_atomics_helper+0x3db0/0x4858
[   33.504390]  kasan_atomics+0x198/0x2e0
[   33.504738]  kunit_try_run_case+0x170/0x3f0
[   33.505119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.505526]  kthread+0x328/0x630
[   33.505893]  ret_from_fork+0x10/0x20
[   33.506205] 
[   33.506232] Allocated by task 297:
[   33.506433]  kasan_save_stack+0x3c/0x68
[   33.506832]  kasan_save_track+0x20/0x40
[   33.507084]  kasan_save_alloc_info+0x40/0x58
[   33.507344]  __kasan_kmalloc+0xd4/0xd8
[   33.507673]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.508010]  kasan_atomics+0xb8/0x2e0
[   33.508055]  kunit_try_run_case+0x170/0x3f0
[   33.508930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.509034]  kthread+0x328/0x630
[   33.509405]  ret_from_fork+0x10/0x20
[   33.509595] 
[   33.509811] The buggy address belongs to the object at fff00000c64f7f00
[   33.509811]  which belongs to the cache kmalloc-64 of size 64
[   33.510337] The buggy address is located 0 bytes to the right of
[   33.510337]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.510465] 
[   33.510489] The buggy address belongs to the physical page:
[   33.510581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.510694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.510843] page_type: f5(slab)
[   33.510987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.511059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.511102] page dumped because: kasan: bad access detected
[   33.511147] 
[   33.511258] Memory state around the buggy address:
[   33.511422]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.511583]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.511735] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.511840]                                      ^
[   33.512007]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.512084]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.512171] ==================================================================
[   33.470015] ==================================================================
[   33.470071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   33.470125] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.470175] 
[   33.470212] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.470299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.470326] Hardware name: linux,dummy-virt (DT)
[   33.470359] Call trace:
[   33.471059]  show_stack+0x20/0x38 (C)
[   33.471212]  dump_stack_lvl+0x8c/0xd0
[   33.471732]  print_report+0x118/0x5d0
[   33.471783]  kasan_report+0xdc/0x128
[   33.471830]  kasan_check_range+0x100/0x1a8
[   33.471877]  __kasan_check_write+0x20/0x30
[   33.472585]  kasan_atomics_helper+0x14e4/0x4858
[   33.472688]  kasan_atomics+0x198/0x2e0
[   33.473113]  kunit_try_run_case+0x170/0x3f0
[   33.473331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.473386]  kthread+0x328/0x630
[   33.473431]  ret_from_fork+0x10/0x20
[   33.473626] 
[   33.473674] Allocated by task 297:
[   33.473705]  kasan_save_stack+0x3c/0x68
[   33.473753]  kasan_save_track+0x20/0x40
[   33.474021]  kasan_save_alloc_info+0x40/0x58
[   33.474255]  __kasan_kmalloc+0xd4/0xd8
[   33.474400]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.474469]  kasan_atomics+0xb8/0x2e0
[   33.475004]  kunit_try_run_case+0x170/0x3f0
[   33.475139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.475322]  kthread+0x328/0x630
[   33.475658]  ret_from_fork+0x10/0x20
[   33.475711] 
[   33.475897] The buggy address belongs to the object at fff00000c64f7f00
[   33.475897]  which belongs to the cache kmalloc-64 of size 64
[   33.476055] The buggy address is located 0 bytes to the right of
[   33.476055]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.476228] 
[   33.476251] The buggy address belongs to the physical page:
[   33.476285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.476556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.477087] page_type: f5(slab)
[   33.477237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.477544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.477716] page dumped because: kasan: bad access detected
[   33.478232] 
[   33.478391] Memory state around the buggy address:
[   33.478433]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.478505]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.478657] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.478996]                                      ^
[   33.479161]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.479238]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.479408] ==================================================================
[   33.380961] ==================================================================
[   33.381016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   33.381068] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.381119] 
[   33.381151] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.381236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.381263] Hardware name: linux,dummy-virt (DT)
[   33.381296] Call trace:
[   33.381320]  show_stack+0x20/0x38 (C)
[   33.381370]  dump_stack_lvl+0x8c/0xd0
[   33.382172]  print_report+0x118/0x5d0
[   33.382255]  kasan_report+0xdc/0x128
[   33.382307]  kasan_check_range+0x100/0x1a8
[   33.382356]  __kasan_check_write+0x20/0x30
[   33.382691]  kasan_atomics_helper+0x1190/0x4858
[   33.383221]  kasan_atomics+0x198/0x2e0
[   33.383594]  kunit_try_run_case+0x170/0x3f0
[   33.383797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.383868]  kthread+0x328/0x630
[   33.384162]  ret_from_fork+0x10/0x20
[   33.384472] 
[   33.384499] Allocated by task 297:
[   33.384531]  kasan_save_stack+0x3c/0x68
[   33.384580]  kasan_save_track+0x20/0x40
[   33.385019]  kasan_save_alloc_info+0x40/0x58
[   33.385347]  __kasan_kmalloc+0xd4/0xd8
[   33.385738]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.385982]  kasan_atomics+0xb8/0x2e0
[   33.386035]  kunit_try_run_case+0x170/0x3f0
[   33.386198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.386246]  kthread+0x328/0x630
[   33.386283]  ret_from_fork+0x10/0x20
[   33.386530] 
[   33.386603] The buggy address belongs to the object at fff00000c64f7f00
[   33.386603]  which belongs to the cache kmalloc-64 of size 64
[   33.387019] The buggy address is located 0 bytes to the right of
[   33.387019]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.387600] 
[   33.387874] The buggy address belongs to the physical page:
[   33.387971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.388471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.388524] page_type: f5(slab)
[   33.388563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.388615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.388657] page dumped because: kasan: bad access detected
[   33.389152] 
[   33.389339] Memory state around the buggy address:
[   33.389420]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.389478]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.389529] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.389568]                                      ^
[   33.389768]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.389887]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.389935] ==================================================================
[   33.133403] ==================================================================
[   33.133516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   33.133742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.133905] Call trace:
[   33.134317]  print_report+0x118/0x5d0
[   33.134970]  kasan_check_range+0x100/0x1a8
[   33.135067]  kasan_atomics_helper+0x1ec/0x4858
[   33.135293]  kthread+0x328/0x630
[   33.135387] 
[   33.135492]  kasan_save_track+0x20/0x40
[   33.136133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.136333] The buggy address is located 0 bytes to the right of
[   33.136333]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.136601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.137608] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.138507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   33.138560] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.138642] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.138911]  print_report+0x118/0x5d0
[   33.138958]  kasan_report+0xdc/0x128
[   33.139098]  kasan_atomics_helper+0x24c/0x4858
[   33.139204]  kunit_try_run_case+0x170/0x3f0
[   33.139305]  kthread+0x328/0x630
[   33.139472]  kasan_save_stack+0x3c/0x68
[   33.139776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.139982] The buggy address is located 0 bytes to the right of
[   33.139982]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.140099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.140369] 
[   33.140528] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.140830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   33.140926] 
[   33.140954] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.141263]  kasan_report+0xdc/0x128
[   33.141377]  __kasan_check_read+0x20/0x30
[   33.141584]  kunit_try_run_case+0x170/0x3f0
[   33.142001] 
[   33.142116]  kasan_save_track+0x20/0x40
[   33.142357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.142712] The buggy address is located 0 bytes to the right of
[   33.142712]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.143777] page dumped because: kasan: bad access detected
[   33.144121] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.144160]                                      ^
[   33.144471] ==================================================================
[   33.402521] ==================================================================
[   33.402572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   33.402624] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.402677] 
[   33.402709] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.402837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.402941] Hardware name: linux,dummy-virt (DT)
[   33.403942] Call trace:
[   33.403980]  show_stack+0x20/0x38 (C)
[   33.404046]  dump_stack_lvl+0x8c/0xd0
[   33.404223]  print_report+0x118/0x5d0
[   33.404271]  kasan_report+0xdc/0x128
[   33.404699]  kasan_check_range+0x100/0x1a8
[   33.405027]  __kasan_check_write+0x20/0x30
[   33.405099]  kasan_atomics_helper+0x126c/0x4858
[   33.405510]  kasan_atomics+0x198/0x2e0
[   33.405612]  kunit_try_run_case+0x170/0x3f0
[   33.405827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.405908]  kthread+0x328/0x630
[   33.406601]  ret_from_fork+0x10/0x20
[   33.406710] 
[   33.406732] Allocated by task 297:
[   33.406763]  kasan_save_stack+0x3c/0x68
[   33.406808]  kasan_save_track+0x20/0x40
[   33.407406]  kasan_save_alloc_info+0x40/0x58
[   33.407718]  __kasan_kmalloc+0xd4/0xd8
[   33.408045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.408216]  kasan_atomics+0xb8/0x2e0
[   33.408490]  kunit_try_run_case+0x170/0x3f0
[   33.408714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.408771]  kthread+0x328/0x630
[   33.409227]  ret_from_fork+0x10/0x20
[   33.409344] 
[   33.409659] The buggy address belongs to the object at fff00000c64f7f00
[   33.409659]  which belongs to the cache kmalloc-64 of size 64
[   33.409913] The buggy address is located 0 bytes to the right of
[   33.409913]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.409988] 
[   33.410010] The buggy address belongs to the physical page:
[   33.410612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.410714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.411167] page_type: f5(slab)
[   33.411785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.411936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.412292] page dumped because: kasan: bad access detected
[   33.412453] 
[   33.412475] Memory state around the buggy address:
[   33.412510]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.412559]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.412603] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.413239]                                      ^
[   33.413299]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.413678]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.413722] ==================================================================
[   33.301231] ==================================================================
[   33.301303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.301379] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.301455] 
[   33.301488] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.301573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.301602] Hardware name: linux,dummy-virt (DT)
[   33.301769] Call trace:
[   33.301799]  show_stack+0x20/0x38 (C)
[   33.301959]  dump_stack_lvl+0x8c/0xd0
[   33.302120]  print_report+0x118/0x5d0
[   33.302199]  kasan_report+0xdc/0x128
[   33.302525]  kasan_check_range+0x100/0x1a8
[   33.302584]  __kasan_check_write+0x20/0x30
[   33.302633]  kasan_atomics_helper+0xe44/0x4858
[   33.302685]  kasan_atomics+0x198/0x2e0
[   33.303194]  kunit_try_run_case+0x170/0x3f0
[   33.303317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.303534]  kthread+0x328/0x630
[   33.303666]  ret_from_fork+0x10/0x20
[   33.303822] 
[   33.303883] Allocated by task 297:
[   33.303936]  kasan_save_stack+0x3c/0x68
[   33.303982]  kasan_save_track+0x20/0x40
[   33.304297]  kasan_save_alloc_info+0x40/0x58
[   33.304455]  __kasan_kmalloc+0xd4/0xd8
[   33.304570]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.304847]  kasan_atomics+0xb8/0x2e0
[   33.304977]  kunit_try_run_case+0x170/0x3f0
[   33.305052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.305262]  kthread+0x328/0x630
[   33.305370]  ret_from_fork+0x10/0x20
[   33.305525] 
[   33.305623] The buggy address belongs to the object at fff00000c64f7f00
[   33.305623]  which belongs to the cache kmalloc-64 of size 64
[   33.305714] The buggy address is located 0 bytes to the right of
[   33.305714]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.305999] 
[   33.306106] The buggy address belongs to the physical page:
[   33.306232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.306322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.306415] page_type: f5(slab)
[   33.306482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.306556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.306599] page dumped because: kasan: bad access detected
[   33.306633] 
[   33.306653] Memory state around the buggy address:
[   33.306686]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.306729]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.306977] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.307047]                                      ^
[   33.307143]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.307287]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.307402] ==================================================================
[   33.312925] ==================================================================
[   33.312984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.313110] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.313161] 
[   33.313193] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.313317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.313575] Hardware name: linux,dummy-virt (DT)
[   33.313705] Call trace:
[   33.313741]  show_stack+0x20/0x38 (C)
[   33.313806]  dump_stack_lvl+0x8c/0xd0
[   33.313857]  print_report+0x118/0x5d0
[   33.313910]  kasan_report+0xdc/0x128
[   33.313963]  kasan_check_range+0x100/0x1a8
[   33.314034]  __kasan_check_write+0x20/0x30
[   33.314094]  kasan_atomics_helper+0xeb8/0x4858
[   33.314145]  kasan_atomics+0x198/0x2e0
[   33.314194]  kunit_try_run_case+0x170/0x3f0
[   33.314259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.314312]  kthread+0x328/0x630
[   33.314358]  ret_from_fork+0x10/0x20
[   33.314413] 
[   33.314454] Allocated by task 297:
[   33.314491]  kasan_save_stack+0x3c/0x68
[   33.314537]  kasan_save_track+0x20/0x40
[   33.314579]  kasan_save_alloc_info+0x40/0x58
[   33.314620]  __kasan_kmalloc+0xd4/0xd8
[   33.314669]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.314713]  kasan_atomics+0xb8/0x2e0
[   33.314761]  kunit_try_run_case+0x170/0x3f0
[   33.314804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.314851]  kthread+0x328/0x630
[   33.314887]  ret_from_fork+0x10/0x20
[   33.314935] 
[   33.314977] The buggy address belongs to the object at fff00000c64f7f00
[   33.314977]  which belongs to the cache kmalloc-64 of size 64
[   33.315037] The buggy address is located 0 bytes to the right of
[   33.315037]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.315103] 
[   33.315134] The buggy address belongs to the physical page:
[   33.315182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.315232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.315289] page_type: f5(slab)
[   33.315334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.315385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.315427] page dumped because: kasan: bad access detected
[   33.315470] 
[   33.315490] Memory state around the buggy address:
[   33.315524]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.315567]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.315643] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.315684]                                      ^
[   33.315718]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.315761]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.315801] ==================================================================
[   33.323458] ==================================================================
[   33.323506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.323556] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.323606] 
[   33.323637] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.323721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.323750] Hardware name: linux,dummy-virt (DT)
[   33.323780] Call trace:
[   33.323803]  show_stack+0x20/0x38 (C)
[   33.323852]  dump_stack_lvl+0x8c/0xd0
[   33.323899]  print_report+0x118/0x5d0
[   33.323946]  kasan_report+0xdc/0x128
[   33.323990]  kasan_check_range+0x100/0x1a8
[   33.324036]  __kasan_check_write+0x20/0x30
[   33.324084]  kasan_atomics_helper+0xf88/0x4858
[   33.324135]  kasan_atomics+0x198/0x2e0
[   33.324184]  kunit_try_run_case+0x170/0x3f0
[   33.324232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.324286]  kthread+0x328/0x630
[   33.324331]  ret_from_fork+0x10/0x20
[   33.324380] 
[   33.324400] Allocated by task 297:
[   33.324429]  kasan_save_stack+0x3c/0x68
[   33.327217]  kasan_save_track+0x20/0x40
[   33.327263]  kasan_save_alloc_info+0x40/0x58
[   33.327304]  __kasan_kmalloc+0xd4/0xd8
[   33.327345]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.327388]  kasan_atomics+0xb8/0x2e0
[   33.327428]  kunit_try_run_case+0x170/0x3f0
[   33.327482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.327528]  kthread+0x328/0x630
[   33.327564]  ret_from_fork+0x10/0x20
[   33.327603] 
[   33.327627] The buggy address belongs to the object at fff00000c64f7f00
[   33.327627]  which belongs to the cache kmalloc-64 of size 64
[   33.327687] The buggy address is located 0 bytes to the right of
[   33.327687]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.327751] 
[   33.327774] The buggy address belongs to the physical page:
[   33.327807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.327857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.327905] page_type: f5(slab)
[   33.327944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.327995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.328036] page dumped because: kasan: bad access detected
[   33.328069] 
[   33.328088] Memory state around the buggy address:
[   33.328122]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.328166]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.328209] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.328250]                                      ^
[   33.328286]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.328329]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.328369] ==================================================================
[   33.246562] ==================================================================
[   33.246783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.246853] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.246939] 
[   33.246987] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.247088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.247125] Hardware name: linux,dummy-virt (DT)
[   33.247168] Call trace:
[   33.247193]  show_stack+0x20/0x38 (C)
[   33.247245]  dump_stack_lvl+0x8c/0xd0
[   33.247294]  print_report+0x118/0x5d0
[   33.247341]  kasan_report+0xdc/0x128
[   33.247387]  __asan_report_load4_noabort+0x20/0x30
[   33.247459]  kasan_atomics_helper+0x3dcc/0x4858
[   33.247512]  kasan_atomics+0x198/0x2e0
[   33.247560]  kunit_try_run_case+0x170/0x3f0
[   33.247608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.247663]  kthread+0x328/0x630
[   33.247718]  ret_from_fork+0x10/0x20
[   33.247769] 
[   33.247791] Allocated by task 297:
[   33.247820]  kasan_save_stack+0x3c/0x68
[   33.247869]  kasan_save_track+0x20/0x40
[   33.247911]  kasan_save_alloc_info+0x40/0x58
[   33.247952]  __kasan_kmalloc+0xd4/0xd8
[   33.247992]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.248036]  kasan_atomics+0xb8/0x2e0
[   33.248084]  kunit_try_run_case+0x170/0x3f0
[   33.248129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.248174]  kthread+0x328/0x630
[   33.248209]  ret_from_fork+0x10/0x20
[   33.248247] 
[   33.248276] The buggy address belongs to the object at fff00000c64f7f00
[   33.248276]  which belongs to the cache kmalloc-64 of size 64
[   33.248333] The buggy address is located 0 bytes to the right of
[   33.248333]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.248396] 
[   33.248423] The buggy address belongs to the physical page:
[   33.248465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.248517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.248915] page_type: f5(slab)
[   33.249070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.249129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.249179] page dumped because: kasan: bad access detected
[   33.249212] 
[   33.249234] Memory state around the buggy address:
[   33.249283]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.249347]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.249391] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.249449]                                      ^
[   33.249486]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.249675]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.249778] ==================================================================
[   33.275472] ==================================================================
[   33.275517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.275568] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.275660] 
[   33.275694] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.276025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.276086] Hardware name: linux,dummy-virt (DT)
[   33.276139] Call trace:
[   33.276168]  show_stack+0x20/0x38 (C)
[   33.276242]  dump_stack_lvl+0x8c/0xd0
[   33.276449]  print_report+0x118/0x5d0
[   33.276566]  kasan_report+0xdc/0x128
[   33.276619]  __asan_report_load4_noabort+0x20/0x30
[   33.276672]  kasan_atomics_helper+0x3dd8/0x4858
[   33.276764]  kasan_atomics+0x198/0x2e0
[   33.276831]  kunit_try_run_case+0x170/0x3f0
[   33.276888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.276960]  kthread+0x328/0x630
[   33.277007]  ret_from_fork+0x10/0x20
[   33.277057] 
[   33.277187] Allocated by task 297:
[   33.277219]  kasan_save_stack+0x3c/0x68
[   33.277265]  kasan_save_track+0x20/0x40
[   33.277385]  kasan_save_alloc_info+0x40/0x58
[   33.277447]  __kasan_kmalloc+0xd4/0xd8
[   33.277559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.277644]  kasan_atomics+0xb8/0x2e0
[   33.277708]  kunit_try_run_case+0x170/0x3f0
[   33.277983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.278150]  kthread+0x328/0x630
[   33.278189]  ret_from_fork+0x10/0x20
[   33.278229] 
[   33.278250] The buggy address belongs to the object at fff00000c64f7f00
[   33.278250]  which belongs to the cache kmalloc-64 of size 64
[   33.278311] The buggy address is located 0 bytes to the right of
[   33.278311]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.278659] 
[   33.278721] The buggy address belongs to the physical page:
[   33.278811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.278918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.279245] page_type: f5(slab)
[   33.279337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.279493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.279598] page dumped because: kasan: bad access detected
[   33.279687] 
[   33.279780] Memory state around the buggy address:
[   33.280020]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.280173]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.280273] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.280366]                                      ^
[   33.280492]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.280585]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.280646] ==================================================================
[   33.234794] ==================================================================
[   33.234869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.234923] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.235008] 
[   33.235238] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.235463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.235496] Hardware name: linux,dummy-virt (DT)
[   33.235526] Call trace:
[   33.235784]  show_stack+0x20/0x38 (C)
[   33.235889]  dump_stack_lvl+0x8c/0xd0
[   33.235941]  print_report+0x118/0x5d0
[   33.235987]  kasan_report+0xdc/0x128
[   33.236063]  kasan_check_range+0x100/0x1a8
[   33.236130]  __kasan_check_write+0x20/0x30
[   33.236212]  kasan_atomics_helper+0xa6c/0x4858
[   33.236418]  kasan_atomics+0x198/0x2e0
[   33.236544]  kunit_try_run_case+0x170/0x3f0
[   33.236600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.236655]  kthread+0x328/0x630
[   33.236717]  ret_from_fork+0x10/0x20
[   33.236998] 
[   33.237071] Allocated by task 297:
[   33.237109]  kasan_save_stack+0x3c/0x68
[   33.237182]  kasan_save_track+0x20/0x40
[   33.237225]  kasan_save_alloc_info+0x40/0x58
[   33.237283]  __kasan_kmalloc+0xd4/0xd8
[   33.237535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.237664]  kasan_atomics+0xb8/0x2e0
[   33.237793]  kunit_try_run_case+0x170/0x3f0
[   33.237834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.237897]  kthread+0x328/0x630
[   33.237933]  ret_from_fork+0x10/0x20
[   33.237970] 
[   33.237993] The buggy address belongs to the object at fff00000c64f7f00
[   33.237993]  which belongs to the cache kmalloc-64 of size 64
[   33.238090] The buggy address is located 0 bytes to the right of
[   33.238090]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.238153] 
[   33.238176] The buggy address belongs to the physical page:
[   33.238306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.238375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.238471] page_type: f5(slab)
[   33.238528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.238647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.238938] page dumped because: kasan: bad access detected
[   33.238978] 
[   33.238998] Memory state around the buggy address:
[   33.239032]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.239077]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.239270] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.239361]                                      ^
[   33.239445]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.239560]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.239635] ==================================================================
[   33.281054] ==================================================================
[   33.281108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.281228] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.281314] 
[   33.281362] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.281629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.281738] Hardware name: linux,dummy-virt (DT)
[   33.281772] Call trace:
[   33.281813]  show_stack+0x20/0x38 (C)
[   33.281948]  dump_stack_lvl+0x8c/0xd0
[   33.282057]  print_report+0x118/0x5d0
[   33.282172]  kasan_report+0xdc/0x128
[   33.282236]  kasan_check_range+0x100/0x1a8
[   33.282290]  __kasan_check_write+0x20/0x30
[   33.282348]  kasan_atomics_helper+0xd3c/0x4858
[   33.282400]  kasan_atomics+0x198/0x2e0
[   33.282476]  kunit_try_run_case+0x170/0x3f0
[   33.282536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.282591]  kthread+0x328/0x630
[   33.282638]  ret_from_fork+0x10/0x20
[   33.282706] 
[   33.282733] Allocated by task 297:
[   33.282771]  kasan_save_stack+0x3c/0x68
[   33.282825]  kasan_save_track+0x20/0x40
[   33.282868]  kasan_save_alloc_info+0x40/0x58
[   33.282909]  __kasan_kmalloc+0xd4/0xd8
[   33.282957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.283001]  kasan_atomics+0xb8/0x2e0
[   33.283040]  kunit_try_run_case+0x170/0x3f0
[   33.283086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.283135]  kthread+0x328/0x630
[   33.283172]  ret_from_fork+0x10/0x20
[   33.283212] 
[   33.283233] The buggy address belongs to the object at fff00000c64f7f00
[   33.283233]  which belongs to the cache kmalloc-64 of size 64
[   33.283294] The buggy address is located 0 bytes to the right of
[   33.283294]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.283366] 
[   33.283396] The buggy address belongs to the physical page:
[   33.283426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.283890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.283946] page_type: f5(slab)
[   33.283985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.284037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.284139] page dumped because: kasan: bad access detected
[   33.284175] 
[   33.284370] Memory state around the buggy address:
[   33.284427]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.284593]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.284658] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.284962]                                      ^
[   33.285005]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.285096]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.285227] ==================================================================
[   33.516761] ==================================================================
[   33.516810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   33.516861] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.516911] 
[   33.516942] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.517026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.517055] Hardware name: linux,dummy-virt (DT)
[   33.517087] Call trace:
[   33.517111]  show_stack+0x20/0x38 (C)
[   33.517160]  dump_stack_lvl+0x8c/0xd0
[   33.517210]  print_report+0x118/0x5d0
[   33.517255]  kasan_report+0xdc/0x128
[   33.517301]  __asan_report_load8_noabort+0x20/0x30
[   33.517361]  kasan_atomics_helper+0x3df4/0x4858
[   33.517659]  kasan_atomics+0x198/0x2e0
[   33.517712]  kunit_try_run_case+0x170/0x3f0
[   33.517828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.517919]  kthread+0x328/0x630
[   33.517966]  ret_from_fork+0x10/0x20
[   33.518017] 
[   33.518038] Allocated by task 297:
[   33.518068]  kasan_save_stack+0x3c/0x68
[   33.518192]  kasan_save_track+0x20/0x40
[   33.518235]  kasan_save_alloc_info+0x40/0x58
[   33.518275]  __kasan_kmalloc+0xd4/0xd8
[   33.518325]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.518500]  kasan_atomics+0xb8/0x2e0
[   33.518541]  kunit_try_run_case+0x170/0x3f0
[   33.518581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.518626]  kthread+0x328/0x630
[   33.518661]  ret_from_fork+0x10/0x20
[   33.518710] 
[   33.518805] The buggy address belongs to the object at fff00000c64f7f00
[   33.518805]  which belongs to the cache kmalloc-64 of size 64
[   33.518960] The buggy address is located 0 bytes to the right of
[   33.518960]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.519060] 
[   33.519083] The buggy address belongs to the physical page:
[   33.519123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.519225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.519287] page_type: f5(slab)
[   33.519389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.519449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.519489] page dumped because: kasan: bad access detected
[   33.519591] 
[   33.519685] Memory state around the buggy address:
[   33.519719]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.519881]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.519926] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.519966]                                      ^
[   33.520042]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.520087]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.520128] ==================================================================
[   33.490449] ==================================================================
[   33.490505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   33.490562] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.490721] 
[   33.490935] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.491034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.491068] Hardware name: linux,dummy-virt (DT)
[   33.491709] Call trace:
[   33.491736]  show_stack+0x20/0x38 (C)
[   33.491990]  dump_stack_lvl+0x8c/0xd0
[   33.492151]  print_report+0x118/0x5d0
[   33.492371]  kasan_report+0xdc/0x128
[   33.492581]  kasan_check_range+0x100/0x1a8
[   33.492635]  __kasan_check_write+0x20/0x30
[   33.492682]  kasan_atomics_helper+0x15b4/0x4858
[   33.493114]  kasan_atomics+0x198/0x2e0
[   33.493367]  kunit_try_run_case+0x170/0x3f0
[   33.493637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.493755]  kthread+0x328/0x630
[   33.493855]  ret_from_fork+0x10/0x20
[   33.494161] 
[   33.494226] Allocated by task 297:
[   33.494259]  kasan_save_stack+0x3c/0x68
[   33.494317]  kasan_save_track+0x20/0x40
[   33.494363]  kasan_save_alloc_info+0x40/0x58
[   33.495261]  __kasan_kmalloc+0xd4/0xd8
[   33.495328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.495681]  kasan_atomics+0xb8/0x2e0
[   33.495862]  kunit_try_run_case+0x170/0x3f0
[   33.495930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.496458]  kthread+0x328/0x630
[   33.496749]  ret_from_fork+0x10/0x20
[   33.496923] 
[   33.497134] The buggy address belongs to the object at fff00000c64f7f00
[   33.497134]  which belongs to the cache kmalloc-64 of size 64
[   33.497612] The buggy address is located 0 bytes to the right of
[   33.497612]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.497860] 
[   33.497890] The buggy address belongs to the physical page:
[   33.497938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.498005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.498056] page_type: f5(slab)
[   33.498275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.498330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.498373] page dumped because: kasan: bad access detected
[   33.498806] 
[   33.498896] Memory state around the buggy address:
[   33.498934]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.498981]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.499542] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.499590]                                      ^
[   33.499733]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.499873]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.499914] ==================================================================
[   33.215764] ==================================================================
[   33.215818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   33.215871] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.215921] 
[   33.215952] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.216044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.216072] Hardware name: linux,dummy-virt (DT)
[   33.216168] Call trace:
[   33.216240]  show_stack+0x20/0x38 (C)
[   33.216296]  dump_stack_lvl+0x8c/0xd0
[   33.216344]  print_report+0x118/0x5d0
[   33.216389]  kasan_report+0xdc/0x128
[   33.216689]  __asan_report_load4_noabort+0x20/0x30
[   33.216767]  kasan_atomics_helper+0x42d8/0x4858
[   33.216852]  kasan_atomics+0x198/0x2e0
[   33.216941]  kunit_try_run_case+0x170/0x3f0
[   33.216997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.217133]  kthread+0x328/0x630
[   33.217209]  ret_from_fork+0x10/0x20
[   33.217279] 
[   33.217318] Allocated by task 297:
[   33.217380]  kasan_save_stack+0x3c/0x68
[   33.217425]  kasan_save_track+0x20/0x40
[   33.217496]  kasan_save_alloc_info+0x40/0x58
[   33.217538]  __kasan_kmalloc+0xd4/0xd8
[   33.217709]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.217925]  kasan_atomics+0xb8/0x2e0
[   33.218365] The buggy address is located 0 bytes to the right of
[   33.218365]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.218632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.218706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.219594] Memory state around the buggy address:
[   33.219936]                                      ^
[   33.220318] ==================================================================
[   33.285584] ==================================================================
[   33.285694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.285788] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.285874] 
[   33.285913] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.285999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.286028] Hardware name: linux,dummy-virt (DT)
[   33.286205] Call trace:
[   33.286264]  show_stack+0x20/0x38 (C)
[   33.286350]  dump_stack_lvl+0x8c/0xd0
[   33.286528]  print_report+0x118/0x5d0
[   33.286656]  kasan_report+0xdc/0x128
[   33.286764]  __asan_report_load4_noabort+0x20/0x30
[   33.287073]  kasan_atomics_helper+0x3e04/0x4858
[   33.287188]  kasan_atomics+0x198/0x2e0
[   33.287322]  kunit_try_run_case+0x170/0x3f0
[   33.287407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.287474]  kthread+0x328/0x630
[   33.287521]  ret_from_fork+0x10/0x20
[   33.287572] 
[   33.287592] Allocated by task 297:
[   33.287623]  kasan_save_stack+0x3c/0x68
[   33.287843]  kasan_save_track+0x20/0x40
[   33.287931]  kasan_save_alloc_info+0x40/0x58
[   33.288056]  __kasan_kmalloc+0xd4/0xd8
[   33.288145]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.288205]  kasan_atomics+0xb8/0x2e0
[   33.288493]  kunit_try_run_case+0x170/0x3f0
[   33.288634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.288682]  kthread+0x328/0x630
[   33.288977]  ret_from_fork+0x10/0x20
[   33.289104] 
[   33.289169] The buggy address belongs to the object at fff00000c64f7f00
[   33.289169]  which belongs to the cache kmalloc-64 of size 64
[   33.289456] The buggy address is located 0 bytes to the right of
[   33.289456]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.289602] 
[   33.289667] The buggy address belongs to the physical page:
[   33.289728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.289825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.289974] page_type: f5(slab)
[   33.290017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.290080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.290123] page dumped because: kasan: bad access detected
[   33.290155] 
[   33.290444] Memory state around the buggy address:
[   33.290613]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.290688]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.290750] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.291055]                                      ^
[   33.291125]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.291226]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.291304] ==================================================================
[   33.414431] ==================================================================
[   33.414493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   33.414545] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.414595] 
[   33.414627] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.414713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.414742] Hardware name: linux,dummy-virt (DT)
[   33.414772] Call trace:
[   33.414798]  show_stack+0x20/0x38 (C)
[   33.414846]  dump_stack_lvl+0x8c/0xd0
[   33.416564]  print_report+0x118/0x5d0
[   33.416696]  kasan_report+0xdc/0x128
[   33.416745]  kasan_check_range+0x100/0x1a8
[   33.416794]  __kasan_check_write+0x20/0x30
[   33.416871]  kasan_atomics_helper+0x12d8/0x4858
[   33.416923]  kasan_atomics+0x198/0x2e0
[   33.416970]  kunit_try_run_case+0x170/0x3f0
[   33.417018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.417074]  kthread+0x328/0x630
[   33.417122]  ret_from_fork+0x10/0x20
[   33.417173] 
[   33.418071] Allocated by task 297:
[   33.418124]  kasan_save_stack+0x3c/0x68
[   33.418241]  kasan_save_track+0x20/0x40
[   33.418325]  kasan_save_alloc_info+0x40/0x58
[   33.418719]  __kasan_kmalloc+0xd4/0xd8
[   33.418770]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.419286]  kasan_atomics+0xb8/0x2e0
[   33.419400]  kunit_try_run_case+0x170/0x3f0
[   33.419531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.419577]  kthread+0x328/0x630
[   33.419615]  ret_from_fork+0x10/0x20
[   33.420249] 
[   33.420279] The buggy address belongs to the object at fff00000c64f7f00
[   33.420279]  which belongs to the cache kmalloc-64 of size 64
[   33.420485] The buggy address is located 0 bytes to the right of
[   33.420485]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.420578] 
[   33.420866] The buggy address belongs to the physical page:
[   33.421319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.421647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.421695] page_type: f5(slab)
[   33.421832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.421938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.422381] page dumped because: kasan: bad access detected
[   33.422429] 
[   33.422589] Memory state around the buggy address:
[   33.422786]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.422907]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.423268] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.423310]                                      ^
[   33.423346]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.423825]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.423884] ==================================================================
[   33.524773] ==================================================================
[   33.524822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   33.524872] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.524952] 
[   33.524995] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.525198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.525334] Hardware name: linux,dummy-virt (DT)
[   33.525367] Call trace:
[   33.525390]  show_stack+0x20/0x38 (C)
[   33.525452]  dump_stack_lvl+0x8c/0xd0
[   33.525500]  print_report+0x118/0x5d0
[   33.525547]  kasan_report+0xdc/0x128
[   33.525599]  __asan_report_load8_noabort+0x20/0x30
[   33.525708]  kasan_atomics_helper+0x3e10/0x4858
[   33.525815]  kasan_atomics+0x198/0x2e0
[   33.525967]  kunit_try_run_case+0x170/0x3f0
[   33.526016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.526076]  kthread+0x328/0x630
[   33.526140]  ret_from_fork+0x10/0x20
[   33.526206] 
[   33.526228] Allocated by task 297:
[   33.526267]  kasan_save_stack+0x3c/0x68
[   33.526515]  kasan_save_track+0x20/0x40
[   33.526559]  kasan_save_alloc_info+0x40/0x58
[   33.526599]  __kasan_kmalloc+0xd4/0xd8
[   33.526678]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.526798]  kasan_atomics+0xb8/0x2e0
[   33.526889]  kunit_try_run_case+0x170/0x3f0
[   33.526948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.527087]  kthread+0x328/0x630
[   33.527173]  ret_from_fork+0x10/0x20
[   33.527341] 
[   33.527370] The buggy address belongs to the object at fff00000c64f7f00
[   33.527370]  which belongs to the cache kmalloc-64 of size 64
[   33.527430] The buggy address is located 0 bytes to the right of
[   33.527430]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.527979] 
[   33.528011] The buggy address belongs to the physical page:
[   33.528045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.528457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.528524] page_type: f5(slab)
[   33.528567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.528898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.528943] page dumped because: kasan: bad access detected
[   33.528977] 
[   33.528998] Memory state around the buggy address:
[   33.529377]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.529428]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.529486] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.529667]                                      ^
[   33.529706]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.530074]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.530119] ==================================================================
[   33.480268] ==================================================================
[   33.480324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   33.480381] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.480432] 
[   33.480480] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.480567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.480594] Hardware name: linux,dummy-virt (DT)
[   33.481323] Call trace:
[   33.481364]  show_stack+0x20/0x38 (C)
[   33.481822]  dump_stack_lvl+0x8c/0xd0
[   33.482290]  print_report+0x118/0x5d0
[   33.482354]  kasan_report+0xdc/0x128
[   33.482402]  kasan_check_range+0x100/0x1a8
[   33.482625]  __kasan_check_write+0x20/0x30
[   33.482674]  kasan_atomics_helper+0x154c/0x4858
[   33.482727]  kasan_atomics+0x198/0x2e0
[   33.482776]  kunit_try_run_case+0x170/0x3f0
[   33.483303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.483401]  kthread+0x328/0x630
[   33.483463]  ret_from_fork+0x10/0x20
[   33.483931] 
[   33.484101] Allocated by task 297:
[   33.484135]  kasan_save_stack+0x3c/0x68
[   33.484415]  kasan_save_track+0x20/0x40
[   33.484468]  kasan_save_alloc_info+0x40/0x58
[   33.484509]  __kasan_kmalloc+0xd4/0xd8
[   33.484551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.484596]  kasan_atomics+0xb8/0x2e0
[   33.484847]  kunit_try_run_case+0x170/0x3f0
[   33.485176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.485561]  kthread+0x328/0x630
[   33.485601]  ret_from_fork+0x10/0x20
[   33.485641] 
[   33.485664] The buggy address belongs to the object at fff00000c64f7f00
[   33.485664]  which belongs to the cache kmalloc-64 of size 64
[   33.485724] The buggy address is located 0 bytes to the right of
[   33.485724]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.485973] 
[   33.486003] The buggy address belongs to the physical page:
[   33.486093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.486200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.486249] page_type: f5(slab)
[   33.486579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.486980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.487318] page dumped because: kasan: bad access detected
[   33.487357] 
[   33.487913] Memory state around the buggy address:
[   33.488334]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.488623]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.488728] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.489060]                                      ^
[   33.489106]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.489155]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.489492] ==================================================================
[   33.368633] ==================================================================
[   33.368685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.369599] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.369681] 
[   33.369719] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.370160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.370223] Hardware name: linux,dummy-virt (DT)
[   33.370256] Call trace:
[   33.370282]  show_stack+0x20/0x38 (C)
[   33.370851]  dump_stack_lvl+0x8c/0xd0
[   33.371199]  print_report+0x118/0x5d0
[   33.371255]  kasan_report+0xdc/0x128
[   33.371303]  kasan_check_range+0x100/0x1a8
[   33.371350]  __kasan_check_write+0x20/0x30
[   33.371400]  kasan_atomics_helper+0x1128/0x4858
[   33.371461]  kasan_atomics+0x198/0x2e0
[   33.371509]  kunit_try_run_case+0x170/0x3f0
[   33.371558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.372369]  kthread+0x328/0x630
[   33.372546]  ret_from_fork+0x10/0x20
[   33.373176] 
[   33.373205] Allocated by task 297:
[   33.373842]  kasan_save_stack+0x3c/0x68
[   33.373980]  kasan_save_track+0x20/0x40
[   33.374030]  kasan_save_alloc_info+0x40/0x58
[   33.374543]  __kasan_kmalloc+0xd4/0xd8
[   33.374595]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.374640]  kasan_atomics+0xb8/0x2e0
[   33.374680]  kunit_try_run_case+0x170/0x3f0
[   33.374720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.374766]  kthread+0x328/0x630
[   33.375586]  ret_from_fork+0x10/0x20
[   33.375703] 
[   33.375732] The buggy address belongs to the object at fff00000c64f7f00
[   33.375732]  which belongs to the cache kmalloc-64 of size 64
[   33.375795] The buggy address is located 0 bytes to the right of
[   33.375795]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.375860] 
[   33.375883] The buggy address belongs to the physical page:
[   33.375916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.376798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.376877] page_type: f5(slab)
[   33.377122] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.377566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.377857] page dumped because: kasan: bad access detected
[   33.377896] 
[   33.377916] Memory state around the buggy address:
[   33.378334]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.378655]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.378707] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.379238]                                      ^
[   33.379598]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.379656]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.379697] ==================================================================
[   33.457487] ==================================================================
[   33.457549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   33.457845] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.458021] 
[   33.458627] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.459134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.459165] Hardware name: linux,dummy-virt (DT)
[   33.459554] Call trace:
[   33.459777]  show_stack+0x20/0x38 (C)
[   33.460058]  dump_stack_lvl+0x8c/0xd0
[   33.460125]  print_report+0x118/0x5d0
[   33.460179]  kasan_report+0xdc/0x128
[   33.460388]  kasan_check_range+0x100/0x1a8
[   33.460833]  __kasan_check_write+0x20/0x30
[   33.461310]  kasan_atomics_helper+0x147c/0x4858
[   33.461493]  kasan_atomics+0x198/0x2e0
[   33.461769]  kunit_try_run_case+0x170/0x3f0
[   33.462246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.462320]  kthread+0x328/0x630
[   33.462370]  ret_from_fork+0x10/0x20
[   33.462422] 
[   33.462454] Allocated by task 297:
[   33.462709]  kasan_save_stack+0x3c/0x68
[   33.462833]  kasan_save_track+0x20/0x40
[   33.463206]  kasan_save_alloc_info+0x40/0x58
[   33.463253]  __kasan_kmalloc+0xd4/0xd8
[   33.463491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.464007]  kasan_atomics+0xb8/0x2e0
[   33.464222]  kunit_try_run_case+0x170/0x3f0
[   33.464270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.464609]  kthread+0x328/0x630
[   33.464650]  ret_from_fork+0x10/0x20
[   33.464891] 
[   33.464993] The buggy address belongs to the object at fff00000c64f7f00
[   33.464993]  which belongs to the cache kmalloc-64 of size 64
[   33.465324] The buggy address is located 0 bytes to the right of
[   33.465324]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.465412] 
[   33.465679] The buggy address belongs to the physical page:
[   33.465821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.466170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.466279] page_type: f5(slab)
[   33.466337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.466757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.467014] page dumped because: kasan: bad access detected
[   33.467269] 
[   33.467424] Memory state around the buggy address:
[   33.467522]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.467622]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.467734] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.467773]                                      ^
[   33.467808]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.467854]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.468737] ==================================================================
[   33.357098] ==================================================================
[   33.357152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.357727] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.357911] 
[   33.357948] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.358043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.358071] Hardware name: linux,dummy-virt (DT)
[   33.358289] Call trace:
[   33.358319]  show_stack+0x20/0x38 (C)
[   33.358544]  dump_stack_lvl+0x8c/0xd0
[   33.359023]  print_report+0x118/0x5d0
[   33.359156]  kasan_report+0xdc/0x128
[   33.359204]  kasan_check_range+0x100/0x1a8
[   33.359251]  __kasan_check_write+0x20/0x30
[   33.359298]  kasan_atomics_helper+0x10c0/0x4858
[   33.359351]  kasan_atomics+0x198/0x2e0
[   33.359401]  kunit_try_run_case+0x170/0x3f0
[   33.359461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.360299]  kthread+0x328/0x630
[   33.360417]  ret_from_fork+0x10/0x20
[   33.360650] 
[   33.360671] Allocated by task 297:
[   33.360702]  kasan_save_stack+0x3c/0x68
[   33.361600]  kasan_save_track+0x20/0x40
[   33.361655]  kasan_save_alloc_info+0x40/0x58
[   33.361709]  __kasan_kmalloc+0xd4/0xd8
[   33.361750]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.362338]  kasan_atomics+0xb8/0x2e0
[   33.362396]  kunit_try_run_case+0x170/0x3f0
[   33.362460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.362507]  kthread+0x328/0x630
[   33.362545]  ret_from_fork+0x10/0x20
[   33.362586] 
[   33.362609] The buggy address belongs to the object at fff00000c64f7f00
[   33.362609]  which belongs to the cache kmalloc-64 of size 64
[   33.362970] The buggy address is located 0 bytes to the right of
[   33.362970]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.363599] 
[   33.363785] The buggy address belongs to the physical page:
[   33.364100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.364740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.364857] page_type: f5(slab)
[   33.365168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.365396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.365824] page dumped because: kasan: bad access detected
[   33.366035] 
[   33.366223] Memory state around the buggy address:
[   33.366262]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.366418]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.366473] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.367021]                                      ^
[   33.367348]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.367488]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.367532] ==================================================================
[   33.531188] ==================================================================
[   33.531245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   33.531297] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.531347] 
[   33.531389] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.531632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.531665] Hardware name: linux,dummy-virt (DT)
[   33.531977] Call trace:
[   33.532004]  show_stack+0x20/0x38 (C)
[   33.532055]  dump_stack_lvl+0x8c/0xd0
[   33.532105]  print_report+0x118/0x5d0
[   33.532150]  kasan_report+0xdc/0x128
[   33.532494]  kasan_check_range+0x100/0x1a8
[   33.532799]  __kasan_check_write+0x20/0x30
[   33.532931]  kasan_atomics_helper+0x175c/0x4858
[   33.532983]  kasan_atomics+0x198/0x2e0
[   33.533030]  kunit_try_run_case+0x170/0x3f0
[   33.533078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.533139]  kthread+0x328/0x630
[   33.533339]  ret_from_fork+0x10/0x20
[   33.533649] 
[   33.533755] Allocated by task 297:
[   33.533787]  kasan_save_stack+0x3c/0x68
[   33.533951]  kasan_save_track+0x20/0x40
[   33.533994]  kasan_save_alloc_info+0x40/0x58
[   33.534035]  __kasan_kmalloc+0xd4/0xd8
[   33.534074]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.534117]  kasan_atomics+0xb8/0x2e0
[   33.534157]  kunit_try_run_case+0x170/0x3f0
[   33.534210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.534279]  kthread+0x328/0x630
[   33.534315]  ret_from_fork+0x10/0x20
[   33.534355] 
[   33.534378] The buggy address belongs to the object at fff00000c64f7f00
[   33.534378]  which belongs to the cache kmalloc-64 of size 64
[   33.534447] The buggy address is located 0 bytes to the right of
[   33.534447]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.534513] 
[   33.534536] The buggy address belongs to the physical page:
[   33.534569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.534687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.534739] page_type: f5(slab)
[   33.534790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.534950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.534992] page dumped because: kasan: bad access detected
[   33.535032] 
[   33.535076] Memory state around the buggy address:
[   33.535113]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.535156]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.535246] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.535452]                                      ^
[   33.535563]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.535639]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.535682] ==================================================================
[   33.520397] ==================================================================
[   33.520703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   33.520766] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.521051] 
[   33.521091] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.521287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.521315] Hardware name: linux,dummy-virt (DT)
[   33.521347] Call trace:
[   33.521371]  show_stack+0x20/0x38 (C)
[   33.521499]  dump_stack_lvl+0x8c/0xd0
[   33.521554]  print_report+0x118/0x5d0
[   33.521601]  kasan_report+0xdc/0x128
[   33.521651]  kasan_check_range+0x100/0x1a8
[   33.521700]  __kasan_check_write+0x20/0x30
[   33.521749]  kasan_atomics_helper+0x16d0/0x4858
[   33.521799]  kasan_atomics+0x198/0x2e0
[   33.521880]  kunit_try_run_case+0x170/0x3f0
[   33.521933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.521991]  kthread+0x328/0x630
[   33.522085]  ret_from_fork+0x10/0x20
[   33.522148] 
[   33.522170] Allocated by task 297:
[   33.522200]  kasan_save_stack+0x3c/0x68
[   33.522244]  kasan_save_track+0x20/0x40
[   33.522285]  kasan_save_alloc_info+0x40/0x58
[   33.522325]  __kasan_kmalloc+0xd4/0xd8
[   33.522393]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.522449]  kasan_atomics+0xb8/0x2e0
[   33.522490]  kunit_try_run_case+0x170/0x3f0
[   33.522530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.522633]  kthread+0x328/0x630
[   33.522773]  ret_from_fork+0x10/0x20
[   33.522816] 
[   33.522864] The buggy address belongs to the object at fff00000c64f7f00
[   33.522864]  which belongs to the cache kmalloc-64 of size 64
[   33.523144] The buggy address is located 0 bytes to the right of
[   33.523144]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.523287] 
[   33.523312] The buggy address belongs to the physical page:
[   33.523395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.523542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.523591] page_type: f5(slab)
[   33.523666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.523718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.523757] page dumped because: kasan: bad access detected
[   33.523807] 
[   33.523847] Memory state around the buggy address:
[   33.523935]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.524042]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.524142] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.524226]                                      ^
[   33.524314]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.524449]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.524490] ==================================================================
[   33.226664] ==================================================================
[   33.226753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.226807] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.226883] 
[   33.226950] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.227052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.227100] Hardware name: linux,dummy-virt (DT)
[   33.227162] Call trace:
[   33.227186]  show_stack+0x20/0x38 (C)
[   33.227238]  dump_stack_lvl+0x8c/0xd0
[   33.227325]  print_report+0x118/0x5d0
[   33.227505]  kasan_report+0xdc/0x128
[   33.227560]  kasan_check_range+0x100/0x1a8
[   33.227637]  __kasan_check_write+0x20/0x30
[   33.227703]  kasan_atomics_helper+0x99c/0x4858
[   33.227756]  kasan_atomics+0x198/0x2e0
[   33.227803]  kunit_try_run_case+0x170/0x3f0
[   33.227869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.227922]  kthread+0x328/0x630
[   33.227974]  ret_from_fork+0x10/0x20
[   33.228040] 
[   33.228069] Allocated by task 297:
[   33.228139]  kasan_save_stack+0x3c/0x68
[   33.228185]  kasan_save_track+0x20/0x40
[   33.228231]  kasan_save_alloc_info+0x40/0x58
[   33.228480]  __kasan_kmalloc+0xd4/0xd8
[   33.228583]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.228636]  kasan_atomics+0xb8/0x2e0
[   33.228706]  kunit_try_run_case+0x170/0x3f0
[   33.228787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.228852]  kthread+0x328/0x630
[   33.228903]  ret_from_fork+0x10/0x20
[   33.228967] 
[   33.228990] The buggy address belongs to the object at fff00000c64f7f00
[   33.228990]  which belongs to the cache kmalloc-64 of size 64
[   33.229265] The buggy address is located 0 bytes to the right of
[   33.229265]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.229344] 
[   33.229404] The buggy address belongs to the physical page:
[   33.229471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.229526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.229602] page_type: f5(slab)
[   33.229745] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.229922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.229968] page dumped because: kasan: bad access detected
[   33.230014] 
[   33.230035] Memory state around the buggy address:
[   33.230086]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.230130]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.230195] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.230237]                                      ^
[   33.230272]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.230348]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.230389] ==================================================================
[   33.329868] ==================================================================
[   33.330079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.330147] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.330199] 
[   33.330637] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.330897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.331049] Hardware name: linux,dummy-virt (DT)
[   33.331201] Call trace:
[   33.331248]  show_stack+0x20/0x38 (C)
[   33.331303]  dump_stack_lvl+0x8c/0xd0
[   33.331351]  print_report+0x118/0x5d0
[   33.331398]  kasan_report+0xdc/0x128
[   33.331465]  kasan_check_range+0x100/0x1a8
[   33.331534]  __kasan_check_write+0x20/0x30
[   33.331583]  kasan_atomics_helper+0xff0/0x4858
[   33.331635]  kasan_atomics+0x198/0x2e0
[   33.331693]  kunit_try_run_case+0x170/0x3f0
[   33.331994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.332106]  kthread+0x328/0x630
[   33.332154]  ret_from_fork+0x10/0x20
[   33.333522] 
[   33.333627] Allocated by task 297:
[   33.333936]  kasan_save_stack+0x3c/0x68
[   33.333996]  kasan_save_track+0x20/0x40
[   33.334355]  kasan_save_alloc_info+0x40/0x58
[   33.334887]  __kasan_kmalloc+0xd4/0xd8
[   33.335052]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.335098]  kasan_atomics+0xb8/0x2e0
[   33.335145]  kunit_try_run_case+0x170/0x3f0
[   33.335185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.335232]  kthread+0x328/0x630
[   33.335269]  ret_from_fork+0x10/0x20
[   33.336770] 
[   33.336802] The buggy address belongs to the object at fff00000c64f7f00
[   33.336802]  which belongs to the cache kmalloc-64 of size 64
[   33.337885] The buggy address is located 0 bytes to the right of
[   33.337885]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.338564] 
[   33.338668] The buggy address belongs to the physical page:
[   33.338704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.338879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.339173] page_type: f5(slab)
[   33.340017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.340193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.340715] page dumped because: kasan: bad access detected
[   33.340991] 
[   33.341298] Memory state around the buggy address:
[   33.341337]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.341893]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.342131] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.342205]                                      ^
[   33.342600]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.343132]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.344146] ==================================================================
[   33.307913] ==================================================================
[   33.307962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.308027] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.308113] 
[   33.308172] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.308257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.308285] Hardware name: linux,dummy-virt (DT)
[   33.308617] Call trace:
[   33.308661]  show_stack+0x20/0x38 (C)
[   33.308714]  dump_stack_lvl+0x8c/0xd0
[   33.308799]  print_report+0x118/0x5d0
[   33.308935]  kasan_report+0xdc/0x128
[   33.308984]  __asan_report_store8_noabort+0x20/0x30
[   33.309142]  kasan_atomics_helper+0x3e5c/0x4858
[   33.309225]  kasan_atomics+0x198/0x2e0
[   33.309292]  kunit_try_run_case+0x170/0x3f0
[   33.309343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.309398]  kthread+0x328/0x630
[   33.309467]  ret_from_fork+0x10/0x20
[   33.309518] 
[   33.309538] Allocated by task 297:
[   33.309566]  kasan_save_stack+0x3c/0x68
[   33.309611]  kasan_save_track+0x20/0x40
[   33.309683]  kasan_save_alloc_info+0x40/0x58
[   33.309723]  __kasan_kmalloc+0xd4/0xd8
[   33.309894]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.310046]  kasan_atomics+0xb8/0x2e0
[   33.310138]  kunit_try_run_case+0x170/0x3f0
[   33.310281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.310384]  kthread+0x328/0x630
[   33.310670]  ret_from_fork+0x10/0x20
[   33.310854] 
[   33.310905] The buggy address belongs to the object at fff00000c64f7f00
[   33.310905]  which belongs to the cache kmalloc-64 of size 64
[   33.311006] The buggy address is located 0 bytes to the right of
[   33.311006]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.311072] 
[   33.311094] The buggy address belongs to the physical page:
[   33.311140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.311191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.311239] page_type: f5(slab)
[   33.311282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.311335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.311573] page dumped because: kasan: bad access detected
[   33.311649] 
[   33.311796] Memory state around the buggy address:
[   33.312116]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.312175]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.312240] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.312310]                                      ^
[   33.312422]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.312507]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.312657] ==================================================================
[   33.250222] ==================================================================
[   33.250270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   33.250319] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.250369] 
[   33.250399] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.250709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.250752] Hardware name: linux,dummy-virt (DT)
[   33.250785] Call trace:
[   33.250810]  show_stack+0x20/0x38 (C)
[   33.250864]  dump_stack_lvl+0x8c/0xd0
[   33.250912]  print_report+0x118/0x5d0
[   33.250958]  kasan_report+0xdc/0x128
[   33.251004]  kasan_check_range+0x100/0x1a8
[   33.251052]  __kasan_check_write+0x20/0x30
[   33.251101]  kasan_atomics_helper+0xb70/0x4858
[   33.251160]  kasan_atomics+0x198/0x2e0
[   33.251209]  kunit_try_run_case+0x170/0x3f0
[   33.251257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.251310]  kthread+0x328/0x630
[   33.251355]  ret_from_fork+0x10/0x20
[   33.251406] 
[   33.251426] Allocated by task 297:
[   33.251514]  kasan_save_stack+0x3c/0x68
[   33.251570]  kasan_save_track+0x20/0x40
[   33.251612]  kasan_save_alloc_info+0x40/0x58
[   33.251659]  __kasan_kmalloc+0xd4/0xd8
[   33.251701]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.251743]  kasan_atomics+0xb8/0x2e0
[   33.251918]  kunit_try_run_case+0x170/0x3f0
[   33.251961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.252007]  kthread+0x328/0x630
[   33.252249]  ret_from_fork+0x10/0x20
[   33.252341] 
[   33.252381] The buggy address belongs to the object at fff00000c64f7f00
[   33.252381]  which belongs to the cache kmalloc-64 of size 64
[   33.252472] The buggy address is located 0 bytes to the right of
[   33.252472]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.252544] 
[   33.252572] The buggy address belongs to the physical page:
[   33.252605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.252679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.252888] page_type: f5(slab)
[   33.252945] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.253086] page dumped because: kasan: bad access detected
[   33.253145] Memory state around the buggy address:
[   33.253516] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.253841]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.254955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   33.255068] 
[   33.255203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.255234] Hardware name: linux,dummy-virt (DT)
[   33.256019]  kasan_atomics+0x198/0x2e0
[   33.257359]  kasan_save_alloc_info+0x40/0x58
[   33.258476]  ret_from_fork+0x10/0x20
[   33.258829] 
[   33.258888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.258951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.259154] page_type: f5(slab)
[   33.259220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.259468] 
[   33.259705]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.259910]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.261208] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.261484] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.261682] Call trace:
[   33.262074]  kasan_report+0xdc/0x128
[   33.262366]  kasan_atomics_helper+0xc08/0x4858
[   33.264456] 
[   33.264744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.264800] page_type: f5(slab)
[   33.265076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.265770]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.266286]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.267315] ==================================================================
[   33.539994] ==================================================================
[   33.540223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   33.540326] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.540536] 
[   33.540578] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.540780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.540824] Hardware name: linux,dummy-virt (DT)
[   33.540857] Call trace:
[   33.540881]  show_stack+0x20/0x38 (C)
[   33.540931]  dump_stack_lvl+0x8c/0xd0
[   33.540984]  print_report+0x118/0x5d0
[   33.541210]  kasan_report+0xdc/0x128
[   33.541421]  kasan_check_range+0x100/0x1a8
[   33.541491]  __kasan_check_write+0x20/0x30
[   33.541538]  kasan_atomics_helper+0x17ec/0x4858
[   33.541591]  kasan_atomics+0x198/0x2e0
[   33.541738]  kunit_try_run_case+0x170/0x3f0
[   33.541820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.541875]  kthread+0x328/0x630
[   33.541919]  ret_from_fork+0x10/0x20
[   33.541970] 
[   33.541992] Allocated by task 297:
[   33.542114]  kasan_save_stack+0x3c/0x68
[   33.542160]  kasan_save_track+0x20/0x40
[   33.542201]  kasan_save_alloc_info+0x40/0x58
[   33.542242]  __kasan_kmalloc+0xd4/0xd8
[   33.542305]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.542350]  kasan_atomics+0xb8/0x2e0
[   33.542407]  kunit_try_run_case+0x170/0x3f0
[   33.542457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.542503]  kthread+0x328/0x630
[   33.542537]  ret_from_fork+0x10/0x20
[   33.542576] 
[   33.542599] The buggy address belongs to the object at fff00000c64f7f00
[   33.542599]  which belongs to the cache kmalloc-64 of size 64
[   33.542658] The buggy address is located 0 bytes to the right of
[   33.542658]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.542723] 
[   33.542746] The buggy address belongs to the physical page:
[   33.542778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.542830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.543213] page_type: f5(slab)
[   33.543347] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.543398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.543459] page dumped because: kasan: bad access detected
[   33.543491] 
[   33.543510] Memory state around the buggy address:
[   33.543692]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.543781]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.543826] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.543932]                                      ^
[   33.543966]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.544011]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.544051] ==================================================================
[   33.316819] ==================================================================
[   33.316875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.316926] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.316983] 
[   33.317020] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.317105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.317132] Hardware name: linux,dummy-virt (DT)
[   33.317177] Call trace:
[   33.317216]  show_stack+0x20/0x38 (C)
[   33.317272]  dump_stack_lvl+0x8c/0xd0
[   33.317538]  print_report+0x118/0x5d0
[   33.317597]  kasan_report+0xdc/0x128
[   33.317907]  kasan_check_range+0x100/0x1a8
[   33.317980]  __kasan_check_write+0x20/0x30
[   33.318029]  kasan_atomics_helper+0xf20/0x4858
[   33.318081]  kasan_atomics+0x198/0x2e0
[   33.318188]  kunit_try_run_case+0x170/0x3f0
[   33.318239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.318294]  kthread+0x328/0x630
[   33.318338]  ret_from_fork+0x10/0x20
[   33.318524] 
[   33.318548] Allocated by task 297:
[   33.318580]  kasan_save_stack+0x3c/0x68
[   33.318625]  kasan_save_track+0x20/0x40
[   33.318667]  kasan_save_alloc_info+0x40/0x58
[   33.318707]  __kasan_kmalloc+0xd4/0xd8
[   33.318748]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.318791]  kasan_atomics+0xb8/0x2e0
[   33.318831]  kunit_try_run_case+0x170/0x3f0
[   33.318874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.318919]  kthread+0x328/0x630
[   33.318955]  ret_from_fork+0x10/0x20
[   33.318993] 
[   33.319016] The buggy address belongs to the object at fff00000c64f7f00
[   33.319016]  which belongs to the cache kmalloc-64 of size 64
[   33.320389] The buggy address is located 0 bytes to the right of
[   33.320389]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.322582] 
[   33.322621] The buggy address belongs to the physical page:
[   33.322656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.322710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.322759] page_type: f5(slab)
[   33.322797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.322850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.322892] page dumped because: kasan: bad access detected
[   33.322926] 
[   33.322946] Memory state around the buggy address:
[   33.322979]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.323023]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.323066] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.323106]                                      ^
[   33.323150]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.323194]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.323233] ==================================================================
[   33.535874] ==================================================================
[   33.535919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   33.536047] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.536099] 
[   33.536142] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.536325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.536356] Hardware name: linux,dummy-virt (DT)
[   33.536387] Call trace:
[   33.536411]  show_stack+0x20/0x38 (C)
[   33.536588]  dump_stack_lvl+0x8c/0xd0
[   33.536646]  print_report+0x118/0x5d0
[   33.536723]  kasan_report+0xdc/0x128
[   33.536769]  __asan_report_load8_noabort+0x20/0x30
[   33.536826]  kasan_atomics_helper+0x3e20/0x4858
[   33.537056]  kasan_atomics+0x198/0x2e0
[   33.537105]  kunit_try_run_case+0x170/0x3f0
[   33.537187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.537417]  kthread+0x328/0x630
[   33.537481]  ret_from_fork+0x10/0x20
[   33.537687] 
[   33.537709] Allocated by task 297:
[   33.537739]  kasan_save_stack+0x3c/0x68
[   33.537815]  kasan_save_track+0x20/0x40
[   33.537935]  kasan_save_alloc_info+0x40/0x58
[   33.537989]  __kasan_kmalloc+0xd4/0xd8
[   33.538030]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.538073]  kasan_atomics+0xb8/0x2e0
[   33.538136]  kunit_try_run_case+0x170/0x3f0
[   33.538177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.538222]  kthread+0x328/0x630
[   33.538257]  ret_from_fork+0x10/0x20
[   33.538297] 
[   33.538384] The buggy address belongs to the object at fff00000c64f7f00
[   33.538384]  which belongs to the cache kmalloc-64 of size 64
[   33.538463] The buggy address is located 0 bytes to the right of
[   33.538463]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.538530] 
[   33.538554] The buggy address belongs to the physical page:
[   33.538586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.538664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.538742] page_type: f5(slab)
[   33.538788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.538852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.539011] page dumped because: kasan: bad access detected
[   33.539042] 
[   33.539061] Memory state around the buggy address:
[   33.539095]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.539236]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.539296] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.539337]                                      ^
[   33.539381]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.539461]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.539610] ==================================================================
[   33.391002] ==================================================================
[   33.391135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   33.391489] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.391541] 
[   33.391571] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.391656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.391684] Hardware name: linux,dummy-virt (DT)
[   33.392550] Call trace:
[   33.392741]  show_stack+0x20/0x38 (C)
[   33.392933]  dump_stack_lvl+0x8c/0xd0
[   33.393129]  print_report+0x118/0x5d0
[   33.393176]  kasan_report+0xdc/0x128
[   33.393222]  kasan_check_range+0x100/0x1a8
[   33.393271]  __kasan_check_write+0x20/0x30
[   33.393317]  kasan_atomics_helper+0x11f8/0x4858
[   33.393370]  kasan_atomics+0x198/0x2e0
[   33.393925]  kunit_try_run_case+0x170/0x3f0
[   33.394132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.394666]  kthread+0x328/0x630
[   33.394730]  ret_from_fork+0x10/0x20
[   33.395182] 
[   33.395423] Allocated by task 297:
[   33.395744]  kasan_save_stack+0x3c/0x68
[   33.395798]  kasan_save_track+0x20/0x40
[   33.396075]  kasan_save_alloc_info+0x40/0x58
[   33.396369]  __kasan_kmalloc+0xd4/0xd8
[   33.396422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.396817]  kasan_atomics+0xb8/0x2e0
[   33.396876]  kunit_try_run_case+0x170/0x3f0
[   33.397373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.397754]  kthread+0x328/0x630
[   33.397928]  ret_from_fork+0x10/0x20
[   33.398149] 
[   33.398177] The buggy address belongs to the object at fff00000c64f7f00
[   33.398177]  which belongs to the cache kmalloc-64 of size 64
[   33.398582] The buggy address is located 0 bytes to the right of
[   33.398582]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.398736] 
[   33.398758] The buggy address belongs to the physical page:
[   33.398791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.399405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.399559] page_type: f5(slab)
[   33.399600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.399652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.399695] page dumped because: kasan: bad access detected
[   33.400770] 
[   33.400997] Memory state around the buggy address:
[   33.401035]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.401126]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.401627] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.401717]                                      ^
[   33.401757]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.401809]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.402100] ==================================================================
[   33.344596] ==================================================================
[   33.345330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.345831] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.346193] 
[   33.346230] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.346317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.346345] Hardware name: linux,dummy-virt (DT)
[   33.346774] Call trace:
[   33.346814]  show_stack+0x20/0x38 (C)
[   33.347233]  dump_stack_lvl+0x8c/0xd0
[   33.347384]  print_report+0x118/0x5d0
[   33.347588]  kasan_report+0xdc/0x128
[   33.347639]  kasan_check_range+0x100/0x1a8
[   33.348027]  __kasan_check_write+0x20/0x30
[   33.348473]  kasan_atomics_helper+0x1058/0x4858
[   33.348538]  kasan_atomics+0x198/0x2e0
[   33.348588]  kunit_try_run_case+0x170/0x3f0
[   33.348638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.348692]  kthread+0x328/0x630
[   33.348740]  ret_from_fork+0x10/0x20
[   33.349953] 
[   33.349999] Allocated by task 297:
[   33.350165]  kasan_save_stack+0x3c/0x68
[   33.350222]  kasan_save_track+0x20/0x40
[   33.350263]  kasan_save_alloc_info+0x40/0x58
[   33.350304]  __kasan_kmalloc+0xd4/0xd8
[   33.350344]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.350389]  kasan_atomics+0xb8/0x2e0
[   33.350429]  kunit_try_run_case+0x170/0x3f0
[   33.350482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.351170]  kthread+0x328/0x630
[   33.351355]  ret_from_fork+0x10/0x20
[   33.351779] 
[   33.351805] The buggy address belongs to the object at fff00000c64f7f00
[   33.351805]  which belongs to the cache kmalloc-64 of size 64
[   33.352310] The buggy address is located 0 bytes to the right of
[   33.352310]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.352567] 
[   33.352881] The buggy address belongs to the physical page:
[   33.353043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.353106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.353504] page_type: f5(slab)
[   33.353975] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.354045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.354479] page dumped because: kasan: bad access detected
[   33.354518] 
[   33.354537] Memory state around the buggy address:
[   33.354715]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.355234]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.355288] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.355845]                                      ^
[   33.355968]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.356292]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.356335] ==================================================================
[   33.436590] ==================================================================
[   33.436650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   33.436849] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.437187] 
[   33.437425] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.437527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.437555] Hardware name: linux,dummy-virt (DT)
[   33.437653] Call trace:
[   33.437683]  show_stack+0x20/0x38 (C)
[   33.437787]  dump_stack_lvl+0x8c/0xd0
[   33.437990]  print_report+0x118/0x5d0
[   33.438448]  kasan_report+0xdc/0x128
[   33.438500]  __asan_report_load8_noabort+0x20/0x30
[   33.438971]  kasan_atomics_helper+0x3f04/0x4858
[   33.439167]  kasan_atomics+0x198/0x2e0
[   33.439503]  kunit_try_run_case+0x170/0x3f0
[   33.439681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.439739]  kthread+0x328/0x630
[   33.440007]  ret_from_fork+0x10/0x20
[   33.440402] 
[   33.440430] Allocated by task 297:
[   33.440753]  kasan_save_stack+0x3c/0x68
[   33.440954]  kasan_save_track+0x20/0x40
[   33.441001]  kasan_save_alloc_info+0x40/0x58
[   33.441042]  __kasan_kmalloc+0xd4/0xd8
[   33.441084]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.441576]  kasan_atomics+0xb8/0x2e0
[   33.441642]  kunit_try_run_case+0x170/0x3f0
[   33.441683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.441911]  kthread+0x328/0x630
[   33.442108]  ret_from_fork+0x10/0x20
[   33.442272] 
[   33.442307] The buggy address belongs to the object at fff00000c64f7f00
[   33.442307]  which belongs to the cache kmalloc-64 of size 64
[   33.442507] The buggy address is located 0 bytes to the right of
[   33.442507]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.442598] 
[   33.442799] The buggy address belongs to the physical page:
[   33.442974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.443604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.443745] page_type: f5(slab)
[   33.443787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.443839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.444632] page dumped because: kasan: bad access detected
[   33.444959] 
[   33.445013] Memory state around the buggy address:
[   33.445221]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.445281]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.445379] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.445446]                                      ^
[   33.445481]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.445528]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.445569] ==================================================================
[   33.230691] ==================================================================
[   33.230787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   33.230840] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.230907] 
[   33.230961] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.231048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.231076] Hardware name: linux,dummy-virt (DT)
[   33.231115] Call trace:
[   33.231141]  show_stack+0x20/0x38 (C)
[   33.231341]  dump_stack_lvl+0x8c/0xd0
[   33.231397]  print_report+0x118/0x5d0
[   33.231457]  kasan_report+0xdc/0x128
[   33.231514]  kasan_check_range+0x100/0x1a8
[   33.231562]  __kasan_check_write+0x20/0x30
[   33.231609]  kasan_atomics_helper+0xa04/0x4858
[   33.231660]  kasan_atomics+0x198/0x2e0
[   33.231707]  kunit_try_run_case+0x170/0x3f0
[   33.231755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.231808]  kthread+0x328/0x630
[   33.231854]  ret_from_fork+0x10/0x20
[   33.231912] 
[   33.231947] Allocated by task 297:
[   33.231993]  kasan_save_stack+0x3c/0x68
[   33.232036]  kasan_save_track+0x20/0x40
[   33.232079]  kasan_save_alloc_info+0x40/0x58
[   33.232242]  kunit_try_run_case+0x170/0x3f0
[   33.232861] The buggy address is located 0 bytes to the right of
[   33.232861]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.232981] 
[   33.233019] The buggy address belongs to the physical page:
[   33.233052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.233103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.233265] page_type: f5(slab)
[   33.233429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.233502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.233570] page dumped because: kasan: bad access detected
[   33.233606] 
[   33.233780] Memory state around the buggy address:
[   33.233839]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.233884]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.233944] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.233984]                                      ^
[   33.234052]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.234098]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.234140] ==================================================================
[   33.512664] ==================================================================
[   33.512809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   33.512866] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.512916] 
[   33.512952] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.513038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.513067] Hardware name: linux,dummy-virt (DT)
[   33.513098] Call trace:
[   33.513123]  show_stack+0x20/0x38 (C)
[   33.513180]  dump_stack_lvl+0x8c/0xd0
[   33.513288]  print_report+0x118/0x5d0
[   33.513433]  kasan_report+0xdc/0x128
[   33.513529]  kasan_check_range+0x100/0x1a8
[   33.513578]  __kasan_check_write+0x20/0x30
[   33.513652]  kasan_atomics_helper+0x1644/0x4858
[   33.513740]  kasan_atomics+0x198/0x2e0
[   33.513789]  kunit_try_run_case+0x170/0x3f0
[   33.513849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.513904]  kthread+0x328/0x630
[   33.513949]  ret_from_fork+0x10/0x20
[   33.514016] 
[   33.514038] Allocated by task 297:
[   33.514068]  kasan_save_stack+0x3c/0x68
[   33.514189]  kasan_save_track+0x20/0x40
[   33.514281]  kasan_save_alloc_info+0x40/0x58
[   33.514420]  __kasan_kmalloc+0xd4/0xd8
[   33.514471]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.514515]  kasan_atomics+0xb8/0x2e0
[   33.514586]  kunit_try_run_case+0x170/0x3f0
[   33.514626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.514705]  kthread+0x328/0x630
[   33.514767]  ret_from_fork+0x10/0x20
[   33.514827] 
[   33.514996] The buggy address belongs to the object at fff00000c64f7f00
[   33.514996]  which belongs to the cache kmalloc-64 of size 64
[   33.515056] The buggy address is located 0 bytes to the right of
[   33.515056]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.515126] 
[   33.515147] The buggy address belongs to the physical page:
[   33.515180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.515245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.515292] page_type: f5(slab)
[   33.515517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.515575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.515863] page dumped because: kasan: bad access detected
[   33.515899] 
[   33.515969] Memory state around the buggy address:
[   33.516002]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.516048]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.516139] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.516198]                                      ^
[   33.516295]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.516341]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.516380] ==================================================================
[   33.425101] ==================================================================
[   33.425374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   33.425557] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.425613] 
[   33.425702] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.426073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.426219] Hardware name: linux,dummy-virt (DT)
[   33.426551] Call trace:
[   33.426714]  show_stack+0x20/0x38 (C)
[   33.426851]  dump_stack_lvl+0x8c/0xd0
[   33.427300]  print_report+0x118/0x5d0
[   33.427761]  kasan_report+0xdc/0x128
[   33.427825]  kasan_check_range+0x100/0x1a8
[   33.427874]  __kasan_check_write+0x20/0x30
[   33.428318]  kasan_atomics_helper+0x1384/0x4858
[   33.428466]  kasan_atomics+0x198/0x2e0
[   33.428516]  kunit_try_run_case+0x170/0x3f0
[   33.429060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.429182]  kthread+0x328/0x630
[   33.429229]  ret_from_fork+0x10/0x20
[   33.429280] 
[   33.429730] Allocated by task 297:
[   33.429768]  kasan_save_stack+0x3c/0x68
[   33.430270]  kasan_save_track+0x20/0x40
[   33.430455]  kasan_save_alloc_info+0x40/0x58
[   33.430791]  __kasan_kmalloc+0xd4/0xd8
[   33.430835]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.430887]  kasan_atomics+0xb8/0x2e0
[   33.430929]  kunit_try_run_case+0x170/0x3f0
[   33.431527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.431605]  kthread+0x328/0x630
[   33.431643]  ret_from_fork+0x10/0x20
[   33.431683] 
[   33.431705] The buggy address belongs to the object at fff00000c64f7f00
[   33.431705]  which belongs to the cache kmalloc-64 of size 64
[   33.432358] The buggy address is located 0 bytes to the right of
[   33.432358]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.432465] 
[   33.432488] The buggy address belongs to the physical page:
[   33.432911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.433131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.433181] page_type: f5(slab)
[   33.433225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.433574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.433652] page dumped because: kasan: bad access detected
[   33.434265] 
[   33.434337] Memory state around the buggy address:
[   33.434503]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.434688]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.434737] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.434814]                                      ^
[   33.434876]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.434922]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.435344] ==================================================================
[   33.295991] ==================================================================
[   33.296036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.296085] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.296136] 
[   33.296165] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.296248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.296279] Hardware name: linux,dummy-virt (DT)
[   33.296329] Call trace:
[   33.296352]  show_stack+0x20/0x38 (C)
[   33.296403]  dump_stack_lvl+0x8c/0xd0
[   33.296820]  print_report+0x118/0x5d0
[   33.296926]  kasan_report+0xdc/0x128
[   33.297002]  __asan_report_load8_noabort+0x20/0x30
[   33.297055]  kasan_atomics_helper+0x3f58/0x4858
[   33.297108]  kasan_atomics+0x198/0x2e0
[   33.297172]  kunit_try_run_case+0x170/0x3f0
[   33.297221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.297277]  kthread+0x328/0x630
[   33.297354]  ret_from_fork+0x10/0x20
[   33.297407] 
[   33.297550] Allocated by task 297:
[   33.297608]  kasan_save_stack+0x3c/0x68
[   33.297694]  kasan_save_track+0x20/0x40
[   33.297772]  kasan_save_alloc_info+0x40/0x58
[   33.297853]  __kasan_kmalloc+0xd4/0xd8
[   33.298171]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.298258]  kasan_atomics+0xb8/0x2e0
[   33.298337]  kunit_try_run_case+0x170/0x3f0
[   33.298514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.298602]  kthread+0x328/0x630
[   33.298638]  ret_from_fork+0x10/0x20
[   33.298699] 
[   33.298722] The buggy address belongs to the object at fff00000c64f7f00
[   33.298722]  which belongs to the cache kmalloc-64 of size 64
[   33.298781] The buggy address is located 0 bytes to the right of
[   33.298781]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.298847] 
[   33.298868] The buggy address belongs to the physical page:
[   33.298898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.299065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.299172] page_type: f5(slab)
[   33.299240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.299532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.299589] page dumped because: kasan: bad access detected
[   33.299700] 
[   33.299815] Memory state around the buggy address:
[   33.299882]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.299970]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.300035] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.300101]                                      ^
[   33.300155]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.300203]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.300291] ==================================================================
[   33.291580] ==================================================================
[   33.291630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.291743] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.291797] 
[   33.291844] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.291957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.292005] Hardware name: linux,dummy-virt (DT)
[   33.292067] Call trace:
[   33.292093]  show_stack+0x20/0x38 (C)
[   33.292141]  dump_stack_lvl+0x8c/0xd0
[   33.292190]  print_report+0x118/0x5d0
[   33.292520]  kasan_report+0xdc/0x128
[   33.292622]  kasan_check_range+0x100/0x1a8
[   33.292971]  __kasan_check_read+0x20/0x30
[   33.293041]  kasan_atomics_helper+0xdd4/0x4858
[   33.293135]  kasan_atomics+0x198/0x2e0
[   33.293212]  kunit_try_run_case+0x170/0x3f0
[   33.293261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.293315]  kthread+0x328/0x630
[   33.293367]  ret_from_fork+0x10/0x20
[   33.293418] 
[   33.293451] Allocated by task 297:
[   33.293479]  kasan_save_stack+0x3c/0x68
[   33.293524]  kasan_save_track+0x20/0x40
[   33.293705]  kasan_save_alloc_info+0x40/0x58
[   33.293830]  __kasan_kmalloc+0xd4/0xd8
[   33.293939]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.294068]  kasan_atomics+0xb8/0x2e0
[   33.294182]  kunit_try_run_case+0x170/0x3f0
[   33.294495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.294581]  kthread+0x328/0x630
[   33.294618]  ret_from_fork+0x10/0x20
[   33.294680] 
[   33.294702] The buggy address belongs to the object at fff00000c64f7f00
[   33.294702]  which belongs to the cache kmalloc-64 of size 64
[   33.294762] The buggy address is located 0 bytes to the right of
[   33.294762]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.294825] 
[   33.294847] The buggy address belongs to the physical page:
[   33.295058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.295152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.295201] page_type: f5(slab)
[   33.295249] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.295300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.295342] page dumped because: kasan: bad access detected
[   33.295375] 
[   33.295394] Memory state around the buggy address:
[   33.295453]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.295500]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.295563] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.295602]                                      ^
[   33.295645]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.295688]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.295737] ==================================================================
[   33.159051] ==================================================================
[   33.159735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   33.159897] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.160061] Call trace:
[   33.160346]  __kasan_check_write+0x20/0x30
[   33.160523]  kunit_try_run_case+0x170/0x3f0
[   33.160625]  kthread+0x328/0x630
[   33.160824]  kasan_save_track+0x20/0x40
[   33.161137]  kthread+0x328/0x630
[   33.161295] The buggy address is located 0 bytes to the right of
[   33.161295]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.161759] page dumped because: kasan: bad access detected
[   33.162247]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.162309] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.163394] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.163570] 
[   33.163603] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.163773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.163858] Call trace:
[   33.163972]  dump_stack_lvl+0x8c/0xd0
[   33.164685]  kthread+0x328/0x630
[   33.164813] 
[   33.165126]  kasan_save_alloc_info+0x40/0x58
[   33.165770] 
[   33.166030] 
[   33.166100] The buggy address belongs to the physical page:
[   33.166361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.166801] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.167022] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   32.960334] ==================================================================
[   32.960389] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   32.960448] Read of size 1 at addr fff00000c64fae50 by task kunit_try_catch/291
[   32.960712] 
[   32.960919] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.961086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.961146] Hardware name: linux,dummy-virt (DT)
[   32.961181] Call trace:
[   32.961220]  show_stack+0x20/0x38 (C)
[   32.961275]  dump_stack_lvl+0x8c/0xd0
[   32.961325]  print_report+0x118/0x5d0
[   32.961371]  kasan_report+0xdc/0x128
[   32.961422]  __asan_report_load1_noabort+0x20/0x30
[   32.961487]  strlen+0xa8/0xb0
[   32.961530]  kasan_strings+0x418/0xb00
[   32.961588]  kunit_try_run_case+0x170/0x3f0
[   32.962391]  ret_from_fork+0x10/0x20
[   32.964400]  kthread+0x328/0x630
[   32.966385]  ret_from_fork+0x10/0x20
[   32.967575] 
[   32.970536] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   32.971658]  dump_stack_lvl+0x8c/0xd0
[   32.972324]  kasan_save_alloc_info+0x40/0x58
[   32.974245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.976338] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   32.990979] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   32.994308]  kunit_try_run_case+0x170/0x3f0
[   32.995994]  kasan_bitops_generic+0xa0/0x1c8
[   32.996817] page_type: f5(slab)
[   32.999567] 
[   33.003208]  ret_from_fork+0x10/0x20
[   33.005303]  fff00000c912f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.008663] Call trace:
[   33.009852]  kasan_bitops_generic+0x110/0x1c8
[   33.010286]  kasan_save_alloc_info+0x40/0x58
[   33.010950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.013466] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   32.948616] ==================================================================
[   32.948670] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   32.948723] Read of size 1 at addr fff00000c64fae50 by task kunit_try_catch/291
[   32.948774] 
[   32.948805] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.948892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.948920] Hardware name: linux,dummy-virt (DT)
[   32.949169] Call trace:
[   32.949207]  show_stack+0x20/0x38 (C)
[   32.949271]  dump_stack_lvl+0x8c/0xd0
[   32.949322]  print_report+0x118/0x5d0
[   32.949375]  kasan_report+0xdc/0x128
[   32.949423]  __asan_report_load1_noabort+0x20/0x30
[   32.950761]  kasan_strings+0x95c/0xb00
[   32.950867]  kunit_try_run_case+0x170/0x3f0
[   32.951074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.951303]  kthread+0x328/0x630
[   32.951445]  ret_from_fork+0x10/0x20
[   32.951618] 
[   32.951671] Allocated by task 291:
[   32.951703]  kasan_save_stack+0x3c/0x68
[   32.951956]  kasan_save_track+0x20/0x40
[   32.952276]  kasan_save_alloc_info+0x40/0x58
[   32.952540]  __kasan_kmalloc+0xd4/0xd8
[   32.953141]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.953234]  kasan_strings+0xc8/0xb00
[   32.953296]  kunit_try_run_case+0x170/0x3f0
[   32.953417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.953574]  kthread+0x328/0x630
[   32.953660]  ret_from_fork+0x10/0x20
[   32.953843] 
[   32.953944] Freed by task 291:
[   32.953978]  kasan_save_stack+0x3c/0x68
[   32.954030]  kasan_save_track+0x20/0x40
[   32.954072]  kasan_save_free_info+0x4c/0x78
[   32.954478]  __kasan_slab_free+0x6c/0x98
[   32.954630]  kfree+0x214/0x3c8
[   32.954727]  kasan_strings+0x24c/0xb00
[   32.954812]  kunit_try_run_case+0x170/0x3f0
[   32.954931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.955048]  kthread+0x328/0x630
[   32.955253]  ret_from_fork+0x10/0x20
[   32.955337] 
[   32.955664] The buggy address belongs to the object at fff00000c64fae40
[   32.955664]  which belongs to the cache kmalloc-32 of size 32
[   32.955888] The buggy address is located 16 bytes inside of
[   32.955888]  freed 32-byte region [fff00000c64fae40, fff00000c64fae60)
[   32.956013] 
[   32.956280] The buggy address belongs to the physical page:
[   32.956492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064fa
[   32.956594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.956784] page_type: f5(slab)
[   32.957031] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.957278] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   32.957515] page dumped because: kasan: bad access detected
[   32.957688] 
[   32.957945] Memory state around the buggy address:
[   32.958024]  fff00000c64fad00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.958093]  fff00000c64fad80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.958420] >fff00000c64fae00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.958554]                                                  ^
[   32.958690]  fff00000c64fae80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.958737]  fff00000c64faf00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.958917] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   32.937572] ==================================================================
[   32.938213] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   32.938560] Read of size 1 at addr fff00000c64fae50 by task kunit_try_catch/291
[   32.938723] 
[   32.938857] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.938968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.939022] Hardware name: linux,dummy-virt (DT)
[   32.939148] Call trace:
[   32.939195]  show_stack+0x20/0x38 (C)
[   32.939408]  dump_stack_lvl+0x8c/0xd0
[   32.939651]  print_report+0x118/0x5d0
[   32.939731]  kasan_report+0xdc/0x128
[   32.939913]  __asan_report_load1_noabort+0x20/0x30
[   32.940101]  strcmp+0xc0/0xc8
[   32.940334]  kasan_strings+0x340/0xb00
[   32.940553]  kunit_try_run_case+0x170/0x3f0
[   32.940710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.940816]  kthread+0x328/0x630
[   32.940893]  ret_from_fork+0x10/0x20
[   32.941058] 
[   32.941128] Allocated by task 291:
[   32.941232]  kasan_save_stack+0x3c/0x68
[   32.941331]  kasan_save_track+0x20/0x40
[   32.941549]  kasan_save_alloc_info+0x40/0x58
[   32.941633]  __kasan_kmalloc+0xd4/0xd8
[   32.941802]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.941940]  kasan_strings+0xc8/0xb00
[   32.942046]  kunit_try_run_case+0x170/0x3f0
[   32.942226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.942275]  kthread+0x328/0x630
[   32.942311]  ret_from_fork+0x10/0x20
[   32.942355] 
[   32.942537] Freed by task 291:
[   32.942737]  kasan_save_stack+0x3c/0x68
[   32.942829]  kasan_save_track+0x20/0x40
[   32.942980]  kasan_save_free_info+0x4c/0x78
[   32.943142]  __kasan_slab_free+0x6c/0x98
[   32.943240]  kfree+0x214/0x3c8
[   32.943335]  kasan_strings+0x24c/0xb00
[   32.943517]  kunit_try_run_case+0x170/0x3f0
[   32.943702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.943922]  kthread+0x328/0x630
[   32.944051]  ret_from_fork+0x10/0x20
[   32.944329] 
[   32.944384] The buggy address belongs to the object at fff00000c64fae40
[   32.944384]  which belongs to the cache kmalloc-32 of size 32
[   32.944732] The buggy address is located 16 bytes inside of
[   32.944732]  freed 32-byte region [fff00000c64fae40, fff00000c64fae60)
[   32.944979] 
[   32.945014] The buggy address belongs to the physical page:
[   32.945344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064fa
[   32.945633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.945866] page_type: f5(slab)
[   32.945954] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.946006] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   32.946049] page dumped because: kasan: bad access detected
[   32.946084] 
[   32.946291] Memory state around the buggy address:
[   32.946659]  fff00000c64fad00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.946828]  fff00000c64fad80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.946903] >fff00000c64fae00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.947129]                                                  ^
[   32.947315]  fff00000c64fae80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.947490]  fff00000c64faf00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.947585] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   32.916099] ==================================================================
[   32.916410] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   32.916611] Read of size 1 at addr fff00000c64fac98 by task kunit_try_catch/289
[   32.916717] 
[   32.916792] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.917055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.917250] Hardware name: linux,dummy-virt (DT)
[   32.917295] Call trace:
[   32.917323]  show_stack+0x20/0x38 (C)
[   32.917456]  dump_stack_lvl+0x8c/0xd0
[   32.917508]  print_report+0x118/0x5d0
[   32.917562]  kasan_report+0xdc/0x128
[   32.917609]  __asan_report_load1_noabort+0x20/0x30
[   32.917784]  memcmp+0x198/0x1d8
[   32.917829]  kasan_memcmp+0x16c/0x300
[   32.917884]  kunit_try_run_case+0x170/0x3f0
[   32.918102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.918290]  kthread+0x328/0x630
[   32.918344]  ret_from_fork+0x10/0x20
[   32.918662] 
[   32.918852] Allocated by task 289:
[   32.918993]  kasan_save_stack+0x3c/0x68
[   32.919177]  kasan_save_track+0x20/0x40
[   32.919261]  kasan_save_alloc_info+0x40/0x58
[   32.919345]  __kasan_kmalloc+0xd4/0xd8
[   32.919641]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.919891]  kasan_memcmp+0xbc/0x300
[   32.920078]  kunit_try_run_case+0x170/0x3f0
[   32.920175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.920457]  kthread+0x328/0x630
[   32.920644]  ret_from_fork+0x10/0x20
[   32.920782] 
[   32.920864] The buggy address belongs to the object at fff00000c64fac80
[   32.920864]  which belongs to the cache kmalloc-32 of size 32
[   32.921037] The buggy address is located 0 bytes to the right of
[   32.921037]  allocated 24-byte region [fff00000c64fac80, fff00000c64fac98)
[   32.921110] 
[   32.921132] The buggy address belongs to the physical page:
[   32.921429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064fa
[   32.922233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.922325] page_type: f5(slab)
[   32.922382] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.922447] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.922509] page dumped because: kasan: bad access detected
[   32.922550] 
[   32.922571] Memory state around the buggy address:
[   32.922627]  fff00000c64fab80: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.922706]  fff00000c64fac00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.922761] >fff00000c64fac80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.922802]                             ^
[   32.922835]  fff00000c64fad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.922899]  fff00000c64fad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.922939] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   32.891384] ==================================================================
[   32.891480] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   32.891552] Read of size 1 at addr ffff800080b67b4a by task kunit_try_catch/285
[   32.891614] 
[   32.891655] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.891745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.891773] Hardware name: linux,dummy-virt (DT)
[   32.891806] Call trace:
[   32.891833]  show_stack+0x20/0x38 (C)
[   32.891885]  dump_stack_lvl+0x8c/0xd0
[   32.891936]  print_report+0x310/0x5d0
[   32.891987]  kasan_report+0xdc/0x128
[   32.892033]  __asan_report_load1_noabort+0x20/0x30
[   32.892085]  kasan_alloca_oob_right+0x2dc/0x340
[   32.892143]  kunit_try_run_case+0x170/0x3f0
[   32.892194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.892249]  kthread+0x328/0x630
[   32.892293]  ret_from_fork+0x10/0x20
[   32.892345] 
[   32.892369] The buggy address belongs to stack of task kunit_try_catch/285
[   32.892422] 
[   32.893030] The buggy address ffff800080b67b4a belongs to a vmalloc virtual mapping
[   32.893093] The buggy address belongs to the physical page:
[   32.893131] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534
[   32.893211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.893282] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.893333] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.893589] page dumped because: kasan: bad access detected
[   32.893640] 
[   32.893827] Memory state around the buggy address:
[   32.893899]  ffff800080b67a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.894097]  ffff800080b67a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.894330] >ffff800080b67b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   32.894482]                                               ^
[   32.894569]  ffff800080b67b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   32.894695]  ffff800080b67c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.894737] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   32.872318] ==================================================================
[   32.872396] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   32.873590] Read of size 1 at addr ffff800080b67b5f by task kunit_try_catch/283
[   32.873708] 
[   32.873855] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.874000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.874102] Hardware name: linux,dummy-virt (DT)
[   32.874138] Call trace:
[   32.874162]  show_stack+0x20/0x38 (C)
[   32.874226]  dump_stack_lvl+0x8c/0xd0
[   32.874584]  print_report+0x310/0x5d0
[   32.874721]  kasan_report+0xdc/0x128
[   32.874794]  __asan_report_load1_noabort+0x20/0x30
[   32.874914]  kasan_alloca_oob_left+0x2b8/0x310
[   32.875009]  kunit_try_run_case+0x170/0x3f0
[   32.875173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.875251]  kthread+0x328/0x630
[   32.875679]  ret_from_fork+0x10/0x20
[   32.875850] 
[   32.875908] The buggy address belongs to stack of task kunit_try_catch/283
[   32.876074] 
[   32.876153] The buggy address ffff800080b67b5f belongs to a vmalloc virtual mapping
[   32.876219] The buggy address belongs to the physical page:
[   32.876255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534
[   32.876668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.876871] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.877243] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.877599] page dumped because: kasan: bad access detected
[   32.877775] 
[   32.877859] Memory state around the buggy address:
[   32.877933]  ffff800080b67a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.877996]  ffff800080b67a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.878043] >ffff800080b67b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   32.878369]                                                     ^
[   32.878536]  ffff800080b67b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   32.878631]  ffff800080b67c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.878785] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   32.857521] ==================================================================
[   32.857649] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   32.858082] Read of size 1 at addr ffff800080b67c2a by task kunit_try_catch/281
[   32.858195] 
[   32.858264] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.858379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.858423] Hardware name: linux,dummy-virt (DT)
[   32.858474] Call trace:
[   32.858501]  show_stack+0x20/0x38 (C)
[   32.858558]  dump_stack_lvl+0x8c/0xd0
[   32.858830]  print_report+0x310/0x5d0
[   32.858996]  kasan_report+0xdc/0x128
[   32.859127]  __asan_report_load1_noabort+0x20/0x30
[   32.859232]  kasan_stack_oob+0x238/0x270
[   32.859376]  kunit_try_run_case+0x170/0x3f0
[   32.859541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.859600]  kthread+0x328/0x630
[   32.859882]  ret_from_fork+0x10/0x20
[   32.859984] 
[   32.860357] The buggy address belongs to stack of task kunit_try_catch/281
[   32.860751]  and is located at offset 138 in frame:
[   32.860827]  kasan_stack_oob+0x0/0x270
[   32.861236] 
[   32.861359] This frame has 4 objects:
[   32.861736]  [48, 49) '__assertion'
[   32.861784]  [64, 72) 'array'
[   32.861825]  [96, 112) '__assertion'
[   32.861867]  [128, 138) 'stack_array'
[   32.862252] 
[   32.862287] The buggy address ffff800080b67c2a belongs to a vmalloc virtual mapping
[   32.862672] The buggy address belongs to the physical page:
[   32.862718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534
[   32.862846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.863018] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.863157] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.863232] page dumped because: kasan: bad access detected
[   32.863335] 
[   32.863431] Memory state around the buggy address:
[   32.863529]  ffff800080b67b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.863654]  ffff800080b67b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   32.863725] >ffff800080b67c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   32.863976]                                   ^
[   32.864052]  ffff800080b67c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   32.864122]  ffff800080b67d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.864230] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   32.837839] ==================================================================
[   32.838133] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   32.838211] Read of size 1 at addr ffff95f54f55870d by task kunit_try_catch/277
[   32.838262] 
[   32.838321] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.838481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.838560] Hardware name: linux,dummy-virt (DT)
[   32.838839] Call trace:
[   32.839013]  show_stack+0x20/0x38 (C)
[   32.839171]  dump_stack_lvl+0x8c/0xd0
[   32.839279]  print_report+0x310/0x5d0
[   32.839416]  kasan_report+0xdc/0x128
[   32.839489]  __asan_report_load1_noabort+0x20/0x30
[   32.839670]  kasan_global_oob_right+0x230/0x270
[   32.839794]  kunit_try_run_case+0x170/0x3f0
[   32.839920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.840018]  kthread+0x328/0x630
[   32.840166]  ret_from_fork+0x10/0x20
[   32.840298] 
[   32.840584] The buggy address belongs to the variable:
[   32.840624]  global_array+0xd/0x40
[   32.840703] 
[   32.841118] The buggy address ffff95f54f55870d belongs to a vmalloc virtual mapping
[   32.841388] The buggy address belongs to the physical page:
[   32.841506] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d58
[   32.841661] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   32.841855] raw: 03fffe0000002000 ffffc1ffc01f5608 ffffc1ffc01f5608 0000000000000000
[   32.841976] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.842159] page dumped because: kasan: bad access detected
[   32.842262] 
[   32.842323] Memory state around the buggy address:
[   32.842474]  ffff95f54f558600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.842560]  ffff95f54f558680: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   32.842691] >ffff95f54f558700: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   32.842869]                       ^
[   32.842904]  ffff95f54f558780: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   32.842956]  ffff95f54f558800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.843196] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   32.808875] ==================================================================
[   32.808958] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.809034] Free of addr fff00000c64f9101 by task kunit_try_catch/273
[   32.809077] 
[   32.809117] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.809203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.809231] Hardware name: linux,dummy-virt (DT)
[   32.809263] Call trace:
[   32.809287]  show_stack+0x20/0x38 (C)
[   32.809337]  dump_stack_lvl+0x8c/0xd0
[   32.809388]  print_report+0x118/0x5d0
[   32.809433]  kasan_report_invalid_free+0xc0/0xe8
[   32.809541]  check_slab_allocation+0xfc/0x108
[   32.809605]  __kasan_mempool_poison_object+0x78/0x150
[   32.809687]  mempool_free+0x28c/0x328
[   32.809746]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.809810]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.809870]  kunit_try_run_case+0x170/0x3f0
[   32.809921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.809983]  kthread+0x328/0x630
[   32.810027]  ret_from_fork+0x10/0x20
[   32.810078] 
[   32.810096] Allocated by task 273:
[   32.810126]  kasan_save_stack+0x3c/0x68
[   32.810179]  kasan_save_track+0x20/0x40
[   32.810217]  kasan_save_alloc_info+0x40/0x58
[   32.810256]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.810332]  remove_element+0x130/0x1f8
[   32.810791]  mempool_alloc_preallocated+0x58/0xc0
[   32.811260]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   32.811809]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.812390]  kunit_try_run_case+0x170/0x3f0
[   32.812520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.812661]  kthread+0x328/0x630
[   32.812696]  ret_from_fork+0x10/0x20
[   32.813007] 
[   32.813091] The buggy address belongs to the object at fff00000c64f9100
[   32.813091]  which belongs to the cache kmalloc-128 of size 128
[   32.813170] The buggy address is located 1 bytes inside of
[   32.813170]  128-byte region [fff00000c64f9100, fff00000c64f9180)
[   32.813229] 
[   32.813250] The buggy address belongs to the physical page:
[   32.813551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   32.813694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.813762] page_type: f5(slab)
[   32.813880] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.813991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.814071] page dumped because: kasan: bad access detected
[   32.814202] 
[   32.814244] Memory state around the buggy address:
[   32.814433]  fff00000c64f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.814496]  fff00000c64f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.814539] >fff00000c64f9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.814584]                    ^
[   32.814706]  fff00000c64f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.814785]  fff00000c64f9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.814975] ==================================================================
[   32.826277] ==================================================================
[   32.826347] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.826521] Free of addr fff00000c9b2c001 by task kunit_try_catch/275
[   32.826599] 
[   32.826685] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.826773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.826866] Hardware name: linux,dummy-virt (DT)
[   32.826945] Call trace:
[   32.827056]  show_stack+0x20/0x38 (C)
[   32.827221]  dump_stack_lvl+0x8c/0xd0
[   32.827329]  print_report+0x118/0x5d0
[   32.827475]  kasan_report_invalid_free+0xc0/0xe8
[   32.827561]  __kasan_mempool_poison_object+0xfc/0x150
[   32.827766]  mempool_free+0x28c/0x328
[   32.828025]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.828106]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   32.828302]  kunit_try_run_case+0x170/0x3f0
[   32.828394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.828544]  kthread+0x328/0x630
[   32.828691]  ret_from_fork+0x10/0x20
[   32.828796] 
[   32.828905] The buggy address belongs to the physical page:
[   32.829045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2c
[   32.829137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.829226] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.829316] page_type: f8(unknown)
[   32.829419] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.829481] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.829565] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.829732] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.829831] head: 0bfffe0000000002 ffffc1ffc326cb01 00000000ffffffff 00000000ffffffff
[   32.829920] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.830016] page dumped because: kasan: bad access detected
[   32.830074] 
[   32.830136] Memory state around the buggy address:
[   32.830174]  fff00000c9b2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.830250]  fff00000c9b2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.830549] >fff00000c9b2c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.830693]                    ^
[   32.830770]  fff00000c9b2c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.830877]  fff00000c9b2c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.830951] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   32.740742] ==================================================================
[   32.740808] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.740870] Free of addr fff00000c9b28000 by task kunit_try_catch/269
[   32.740914] 
[   32.740948] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.741169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.741254] Hardware name: linux,dummy-virt (DT)
[   32.741287] Call trace:
[   32.741311]  show_stack+0x20/0x38 (C)
[   32.741982]  dump_stack_lvl+0x8c/0xd0
[   32.742178]  print_report+0x118/0x5d0
[   32.742227]  kasan_report_invalid_free+0xc0/0xe8
[   32.742622]  __kasan_mempool_poison_object+0x14c/0x150
[   32.742714]  mempool_free+0x28c/0x328
[   32.742890]  mempool_double_free_helper+0x150/0x2e8
[   32.743098]  mempool_kmalloc_large_double_free+0xc0/0x118
[   32.743195]  kunit_try_run_case+0x170/0x3f0
[   32.743267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.743427]  kthread+0x328/0x630
[   32.743482]  ret_from_fork+0x10/0x20
[   32.743530] 
[   32.743799] The buggy address belongs to the physical page:
[   32.743869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b28
[   32.744183] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.744240] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.744295] page_type: f8(unknown)
[   32.744336] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.744646] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.744874] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.744926] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.744975] head: 0bfffe0000000002 ffffc1ffc326ca01 00000000ffffffff 00000000ffffffff
[   32.745057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.745105] page dumped because: kasan: bad access detected
[   32.745342] 
[   32.745577] Memory state around the buggy address:
[   32.745660]  fff00000c9b27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.745704]  fff00000c9b27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.745746] >fff00000c9b28000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.745785]                    ^
[   32.745837]  fff00000c9b28080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.745881]  fff00000c9b28100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.745921] ==================================================================
[   32.780127] ==================================================================
[   32.780204] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.780367] Free of addr fff00000c9b2c000 by task kunit_try_catch/271
[   32.782153] 
[   32.782292] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.783516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.783554] Hardware name: linux,dummy-virt (DT)
[   32.783692] Call trace:
[   32.784149]  show_stack+0x20/0x38 (C)
[   32.784565]  dump_stack_lvl+0x8c/0xd0
[   32.784815]  print_report+0x118/0x5d0
[   32.784898]  kasan_report_invalid_free+0xc0/0xe8
[   32.785305]  __kasan_mempool_poison_pages+0xe0/0xe8
[   32.785397]  mempool_free+0x24c/0x328
[   32.786517]  mempool_double_free_helper+0x150/0x2e8
[   32.786993]  mempool_page_alloc_double_free+0xbc/0x118
[   32.787318]  kunit_try_run_case+0x170/0x3f0
[   32.787432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.787498]  kthread+0x328/0x630
[   32.787544]  ret_from_fork+0x10/0x20
[   32.787596] 
[   32.788353] The buggy address belongs to the physical page:
[   32.788835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2c
[   32.789188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.789543] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.789594] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.790503] page dumped because: kasan: bad access detected
[   32.791243] 
[   32.791308] Memory state around the buggy address:
[   32.791344]  fff00000c9b2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.791848]  fff00000c9b2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.792083] >fff00000c9b2c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.792925]                    ^
[   32.793142]  fff00000c9b2c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.793270]  fff00000c9b2c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.793557] ==================================================================
[   32.722882] ==================================================================
[   32.723257] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.723478] Free of addr fff00000c9147e00 by task kunit_try_catch/267
[   32.723591] 
[   32.723624] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.723708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.723733] Hardware name: linux,dummy-virt (DT)
[   32.723788] Call trace:
[   32.723917]  show_stack+0x20/0x38 (C)
[   32.723977]  dump_stack_lvl+0x8c/0xd0
[   32.724026]  print_report+0x118/0x5d0
[   32.724070]  kasan_report_invalid_free+0xc0/0xe8
[   32.724119]  check_slab_allocation+0xd4/0x108
[   32.724172]  __kasan_mempool_poison_object+0x78/0x150
[   32.724314]  mempool_free+0x28c/0x328
[   32.724848]  mempool_double_free_helper+0x150/0x2e8
[   32.724990]  mempool_kmalloc_double_free+0xc0/0x118
[   32.725345]  kunit_try_run_case+0x170/0x3f0
[   32.725401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.725465]  kthread+0x328/0x630
[   32.725510]  ret_from_fork+0x10/0x20
[   32.725971] 
[   32.726218] Allocated by task 267:
[   32.726359]  kasan_save_stack+0x3c/0x68
[   32.726406]  kasan_save_track+0x20/0x40
[   32.726459]  kasan_save_alloc_info+0x40/0x58
[   32.726615]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.726805]  remove_element+0x130/0x1f8
[   32.726848]  mempool_alloc_preallocated+0x58/0xc0
[   32.726909]  mempool_double_free_helper+0x94/0x2e8
[   32.727012]  mempool_kmalloc_double_free+0xc0/0x118
[   32.727055]  kunit_try_run_case+0x170/0x3f0
[   32.727091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.727139]  kthread+0x328/0x630
[   32.727184]  ret_from_fork+0x10/0x20
[   32.727243] 
[   32.727262] Freed by task 267:
[   32.727589]  kasan_save_stack+0x3c/0x68
[   32.727639]  kasan_save_track+0x20/0x40
[   32.727961]  kasan_save_free_info+0x4c/0x78
[   32.728143]  __kasan_mempool_poison_object+0xc0/0x150
[   32.728197]  mempool_free+0x28c/0x328
[   32.728232]  mempool_double_free_helper+0x100/0x2e8
[   32.728301]  mempool_kmalloc_double_free+0xc0/0x118
[   32.728383]  kunit_try_run_case+0x170/0x3f0
[   32.728447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.728490]  kthread+0x328/0x630
[   32.728522]  ret_from_fork+0x10/0x20
[   32.728560] 
[   32.728580] The buggy address belongs to the object at fff00000c9147e00
[   32.728580]  which belongs to the cache kmalloc-128 of size 128
[   32.728642] The buggy address is located 0 bytes inside of
[   32.728642]  128-byte region [fff00000c9147e00, fff00000c9147e80)
[   32.728711] 
[   32.728733] The buggy address belongs to the physical page:
[   32.728766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109147
[   32.729230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.729285] page_type: f5(slab)
[   32.729326] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.729682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.729797] page dumped because: kasan: bad access detected
[   32.729887] 
[   32.729911] Memory state around the buggy address:
[   32.729945]  fff00000c9147d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.729988]  fff00000c9147d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.730029] >fff00000c9147e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.730170]                    ^
[   32.730204]  fff00000c9147e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.730366]  fff00000c9147f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.730473] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   32.649604] ==================================================================
[   32.649665] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.649725] Read of size 1 at addr fff00000c6398000 by task kunit_try_catch/261
[   32.649774] 
[   32.649811] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.649898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.649925] Hardware name: linux,dummy-virt (DT)
[   32.649958] Call trace:
[   32.649983]  show_stack+0x20/0x38 (C)
[   32.650041]  dump_stack_lvl+0x8c/0xd0
[   32.650283]  print_report+0x118/0x5d0
[   32.650413]  kasan_report+0xdc/0x128
[   32.650465]  __asan_report_load1_noabort+0x20/0x30
[   32.650514]  mempool_uaf_helper+0x314/0x340
[   32.650560]  mempool_kmalloc_large_uaf+0xc4/0x120
[   32.650608]  kunit_try_run_case+0x170/0x3f0
[   32.650787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.651113]  kthread+0x328/0x630
[   32.651215]  ret_from_fork+0x10/0x20
[   32.651569] 
[   32.651592] The buggy address belongs to the physical page:
[   32.651626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398
[   32.651792] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.651848] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.651903] page_type: f8(unknown)
[   32.651944] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.652135] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.652185] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.652412] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.652473] head: 0bfffe0000000002 ffffc1ffc318e601 00000000ffffffff 00000000ffffffff
[   32.652550] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.652605] page dumped because: kasan: bad access detected
[   32.652726] 
[   32.652745] Memory state around the buggy address:
[   32.652777]  fff00000c6397f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.652819]  fff00000c6397f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.652902] >fff00000c6398000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.653452]                    ^
[   32.653582]  fff00000c6398080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.653761]  fff00000c6398100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.653803] ==================================================================
[   32.713571] ==================================================================
[   32.713664] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.714338] Read of size 1 at addr fff00000c9b28000 by task kunit_try_catch/265
[   32.714431] 
[   32.714539] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.714845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.714876] Hardware name: linux,dummy-virt (DT)
[   32.714910] Call trace:
[   32.714937]  show_stack+0x20/0x38 (C)
[   32.715091]  dump_stack_lvl+0x8c/0xd0
[   32.715157]  print_report+0x118/0x5d0
[   32.715202]  kasan_report+0xdc/0x128
[   32.715255]  __asan_report_load1_noabort+0x20/0x30
[   32.715466]  mempool_uaf_helper+0x314/0x340
[   32.715532]  mempool_page_alloc_uaf+0xc0/0x118
[   32.715602]  kunit_try_run_case+0x170/0x3f0
[   32.715653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.715846]  kthread+0x328/0x630
[   32.715902]  ret_from_fork+0x10/0x20
[   32.715950] 
[   32.715972] The buggy address belongs to the physical page:
[   32.716248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b28
[   32.716353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.716495] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.716625] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.716710] page dumped because: kasan: bad access detected
[   32.716853] 
[   32.716871] Memory state around the buggy address:
[   32.716964]  fff00000c9b27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.717044]  fff00000c9b27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.717134] >fff00000c9b28000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.717185]                    ^
[   32.717249]  fff00000c9b28080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.717407]  fff00000c9b28100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.717477] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   32.669263] ==================================================================
[   32.669487] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.669649] Read of size 1 at addr fff00000c64c4240 by task kunit_try_catch/263
[   32.669699] 
[   32.669858] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.669994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.670053] Hardware name: linux,dummy-virt (DT)
[   32.670169] Call trace:
[   32.670252]  show_stack+0x20/0x38 (C)
[   32.670365]  dump_stack_lvl+0x8c/0xd0
[   32.670561]  print_report+0x118/0x5d0
[   32.670607]  kasan_report+0xdc/0x128
[   32.670657]  __asan_report_load1_noabort+0x20/0x30
[   32.670964]  mempool_uaf_helper+0x314/0x340
[   32.671032]  mempool_slab_uaf+0xc0/0x118
[   32.671363]  kunit_try_run_case+0x170/0x3f0
[   32.671579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.671749]  kthread+0x328/0x630
[   32.671821]  ret_from_fork+0x10/0x20
[   32.671879] 
[   32.671963] Allocated by task 263:
[   32.672016]  kasan_save_stack+0x3c/0x68
[   32.672077]  kasan_save_track+0x20/0x40
[   32.672118]  kasan_save_alloc_info+0x40/0x58
[   32.672157]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.672199]  remove_element+0x16c/0x1f8
[   32.672277]  mempool_alloc_preallocated+0x58/0xc0
[   32.672351]  mempool_uaf_helper+0xa4/0x340
[   32.672512]  mempool_slab_uaf+0xc0/0x118
[   32.672554]  kunit_try_run_case+0x170/0x3f0
[   32.672596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.672693]  kthread+0x328/0x630
[   32.672798]  ret_from_fork+0x10/0x20
[   32.672880] 
[   32.672946] Freed by task 263:
[   32.673018]  kasan_save_stack+0x3c/0x68
[   32.673058]  kasan_save_track+0x20/0x40
[   32.673099]  kasan_save_free_info+0x4c/0x78
[   32.673138]  __kasan_mempool_poison_object+0xc0/0x150
[   32.673267]  mempool_free+0x28c/0x328
[   32.673305]  mempool_uaf_helper+0x104/0x340
[   32.673342]  mempool_slab_uaf+0xc0/0x118
[   32.673380]  kunit_try_run_case+0x170/0x3f0
[   32.673429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.673482]  kthread+0x328/0x630
[   32.673514]  ret_from_fork+0x10/0x20
[   32.673974] 
[   32.674006] The buggy address belongs to the object at fff00000c64c4240
[   32.674006]  which belongs to the cache test_cache of size 123
[   32.674080] The buggy address is located 0 bytes inside of
[   32.674080]  freed 123-byte region [fff00000c64c4240, fff00000c64c42bb)
[   32.674292] 
[   32.674383] The buggy address belongs to the physical page:
[   32.674416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064c4
[   32.674482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.674534] page_type: f5(slab)
[   32.674578] raw: 0bfffe0000000000 fff00000c650c140 dead000000000122 0000000000000000
[   32.674626] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.674666] page dumped because: kasan: bad access detected
[   32.674697] 
[   32.674714] Memory state around the buggy address:
[   32.674748]  fff00000c64c4100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.674991]  fff00000c64c4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.675047] >fff00000c64c4200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.675477]                                            ^
[   32.675657]  fff00000c64c4280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.675701]  fff00000c64c4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.675739] ==================================================================
[   32.633815] ==================================================================
[   32.633907] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.633976] Read of size 1 at addr fff00000c9147a00 by task kunit_try_catch/259
[   32.634025] 
[   32.634066] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.634154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.634549] Hardware name: linux,dummy-virt (DT)
[   32.634676] Call trace:
[   32.634703]  show_stack+0x20/0x38 (C)
[   32.634757]  dump_stack_lvl+0x8c/0xd0
[   32.635096]  print_report+0x118/0x5d0
[   32.635249]  kasan_report+0xdc/0x128
[   32.635294]  __asan_report_load1_noabort+0x20/0x30
[   32.635345]  mempool_uaf_helper+0x314/0x340
[   32.635471]  mempool_kmalloc_uaf+0xc4/0x120
[   32.635518]  kunit_try_run_case+0x170/0x3f0
[   32.635570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.635642]  kthread+0x328/0x630
[   32.635693]  ret_from_fork+0x10/0x20
[   32.635874] 
[   32.635893] Allocated by task 259:
[   32.635929]  kasan_save_stack+0x3c/0x68
[   32.635986]  kasan_save_track+0x20/0x40
[   32.636167]  kasan_save_alloc_info+0x40/0x58
[   32.636255]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.636298]  remove_element+0x130/0x1f8
[   32.636336]  mempool_alloc_preallocated+0x58/0xc0
[   32.636383]  mempool_uaf_helper+0xa4/0x340
[   32.636470]  mempool_kmalloc_uaf+0xc4/0x120
[   32.636507]  kunit_try_run_case+0x170/0x3f0
[   32.636544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.636587]  kthread+0x328/0x630
[   32.636620]  ret_from_fork+0x10/0x20
[   32.636655] 
[   32.636675] Freed by task 259:
[   32.636700]  kasan_save_stack+0x3c/0x68
[   32.636738]  kasan_save_track+0x20/0x40
[   32.637278]  kasan_save_free_info+0x4c/0x78
[   32.637548]  __kasan_mempool_poison_object+0xc0/0x150
[   32.637753]  mempool_free+0x28c/0x328
[   32.637806]  mempool_uaf_helper+0x104/0x340
[   32.638030]  mempool_kmalloc_uaf+0xc4/0x120
[   32.638083]  kunit_try_run_case+0x170/0x3f0
[   32.638122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.638163]  kthread+0x328/0x630
[   32.638197]  ret_from_fork+0x10/0x20
[   32.638233] 
[   32.638255] The buggy address belongs to the object at fff00000c9147a00
[   32.638255]  which belongs to the cache kmalloc-128 of size 128
[   32.638317] The buggy address is located 0 bytes inside of
[   32.638317]  freed 128-byte region [fff00000c9147a00, fff00000c9147a80)
[   32.638377] 
[   32.638400] The buggy address belongs to the physical page:
[   32.638447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109147
[   32.638502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.638553] page_type: f5(slab)
[   32.638593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.638641] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.638681] page dumped because: kasan: bad access detected
[   32.638722] 
[   32.638739] Memory state around the buggy address:
[   32.638773]  fff00000c9147900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.639178]  fff00000c9147980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.639417] >fff00000c9147a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.639469]                    ^
[   32.639534]  fff00000c9147a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.639576]  fff00000c9147b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.639680] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   32.559482] ==================================================================
[   32.559558] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.559636] Read of size 1 at addr fff00000c9147673 by task kunit_try_catch/253
[   32.559685] 
[   32.559730] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.559819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.559847] Hardware name: linux,dummy-virt (DT)
[   32.559883] Call trace:
[   32.559909]  show_stack+0x20/0x38 (C)
[   32.559962]  dump_stack_lvl+0x8c/0xd0
[   32.560014]  print_report+0x118/0x5d0
[   32.560058]  kasan_report+0xdc/0x128
[   32.560101]  __asan_report_load1_noabort+0x20/0x30
[   32.560150]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.560201]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.560250]  kunit_try_run_case+0x170/0x3f0
[   32.560300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.560359]  kthread+0x328/0x630
[   32.560402]  ret_from_fork+0x10/0x20
[   32.560465] 
[   32.560483] Allocated by task 253:
[   32.560512]  kasan_save_stack+0x3c/0x68
[   32.560557]  kasan_save_track+0x20/0x40
[   32.560597]  kasan_save_alloc_info+0x40/0x58
[   32.560635]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.560679]  remove_element+0x130/0x1f8
[   32.560719]  mempool_alloc_preallocated+0x58/0xc0
[   32.560760]  mempool_oob_right_helper+0x98/0x2f0
[   32.560802]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.560845]  kunit_try_run_case+0x170/0x3f0
[   32.560881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.560924]  kthread+0x328/0x630
[   32.560958]  ret_from_fork+0x10/0x20
[   32.560994] 
[   32.561015] The buggy address belongs to the object at fff00000c9147600
[   32.561015]  which belongs to the cache kmalloc-128 of size 128
[   32.561076] The buggy address is located 0 bytes to the right of
[   32.561076]  allocated 115-byte region [fff00000c9147600, fff00000c9147673)
[   32.561139] 
[   32.561161] The buggy address belongs to the physical page:
[   32.561195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109147
[   32.561252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.561305] page_type: f5(slab)
[   32.561350] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.561400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.561450] page dumped because: kasan: bad access detected
[   32.561482] 
[   32.561501] Memory state around the buggy address:
[   32.561535]  fff00000c9147500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.561579]  fff00000c9147580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.561623] >fff00000c9147600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.561682]                                                              ^
[   32.561744]  fff00000c9147680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.561787]  fff00000c9147700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.561825] ==================================================================
[   32.596888] ==================================================================
[   32.596976] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.597046] Read of size 1 at addr fff00000c650a1fb by task kunit_try_catch/257
[   32.597096] 
[   32.597135] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.597224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.597258] Hardware name: linux,dummy-virt (DT)
[   32.597404] Call trace:
[   32.597452]  show_stack+0x20/0x38 (C)
[   32.597614]  dump_stack_lvl+0x8c/0xd0
[   32.597678]  print_report+0x118/0x5d0
[   32.598018]  kasan_report+0xdc/0x128
[   32.598244]  __asan_report_load1_noabort+0x20/0x30
[   32.598300]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.598352]  mempool_slab_oob_right+0xc0/0x118
[   32.598452]  kunit_try_run_case+0x170/0x3f0
[   32.598507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.598563]  kthread+0x328/0x630
[   32.598806]  ret_from_fork+0x10/0x20
[   32.598914] 
[   32.598962] Allocated by task 257:
[   32.598991]  kasan_save_stack+0x3c/0x68
[   32.599038]  kasan_save_track+0x20/0x40
[   32.599428]  kasan_save_alloc_info+0x40/0x58
[   32.599481]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.599621]  remove_element+0x16c/0x1f8
[   32.599768]  mempool_alloc_preallocated+0x58/0xc0
[   32.599848]  mempool_oob_right_helper+0x98/0x2f0
[   32.599948]  mempool_slab_oob_right+0xc0/0x118
[   32.600004]  kunit_try_run_case+0x170/0x3f0
[   32.600042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.600087]  kthread+0x328/0x630
[   32.600119]  ret_from_fork+0x10/0x20
[   32.600157] 
[   32.600190] The buggy address belongs to the object at fff00000c650a180
[   32.600190]  which belongs to the cache test_cache of size 123
[   32.600421] The buggy address is located 0 bytes to the right of
[   32.600421]  allocated 123-byte region [fff00000c650a180, fff00000c650a1fb)
[   32.600563] 
[   32.600587] The buggy address belongs to the physical page:
[   32.600666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10650a
[   32.601036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.601111] page_type: f5(slab)
[   32.601154] raw: 0bfffe0000000000 fff00000c650c000 dead000000000122 0000000000000000
[   32.601203] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.601244] page dumped because: kasan: bad access detected
[   32.601275] 
[   32.601293] Memory state around the buggy address:
[   32.601585]  fff00000c650a080: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.601730]  fff00000c650a100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.601971] >fff00000c650a180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03
[   32.602170]                                                                 ^
[   32.602249]  fff00000c650a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.602368]  fff00000c650a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.602408] ==================================================================
[   32.567455] ==================================================================
[   32.567512] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.567567] Read of size 1 at addr fff00000c639a001 by task kunit_try_catch/255
[   32.567617] 
[   32.567648] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.567729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.567756] Hardware name: linux,dummy-virt (DT)
[   32.567785] Call trace:
[   32.567809]  show_stack+0x20/0x38 (C)
[   32.567856]  dump_stack_lvl+0x8c/0xd0
[   32.567902]  print_report+0x118/0x5d0
[   32.567946]  kasan_report+0xdc/0x128
[   32.567988]  __asan_report_load1_noabort+0x20/0x30
[   32.568037]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.568087]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   32.568138]  kunit_try_run_case+0x170/0x3f0
[   32.568184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.568236]  kthread+0x328/0x630
[   32.568278]  ret_from_fork+0x10/0x20
[   32.568326] 
[   32.568345] The buggy address belongs to the physical page:
[   32.568377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398
[   32.568431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.568491] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.568543] page_type: f8(unknown)
[   32.568582] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.568687] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.568737] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.568784] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.568834] head: 0bfffe0000000002 ffffc1ffc318e601 00000000ffffffff 00000000ffffffff
[   32.568879] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.568919] page dumped because: kasan: bad access detected
[   32.568951] 
[   32.568970] Memory state around the buggy address:
[   32.569001]  fff00000c6399f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.569042]  fff00000c6399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.569084] >fff00000c639a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.569122]                    ^
[   32.569149]  fff00000c639a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.569190]  fff00000c639a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.569229] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   31.996247] ==================================================================
[   31.996333] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   31.996410] Read of size 1 at addr fff00000c5c5cc80 by task kunit_try_catch/247
[   31.996475] 
[   31.996516] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   31.996605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.996631] Hardware name: linux,dummy-virt (DT)
[   31.996665] Call trace:
[   31.996689]  show_stack+0x20/0x38 (C)
[   31.996741]  dump_stack_lvl+0x8c/0xd0
[   31.996793]  print_report+0x118/0x5d0
[   31.996839]  kasan_report+0xdc/0x128
[   31.996884]  __kasan_check_byte+0x54/0x70
[   31.996929]  kmem_cache_destroy+0x34/0x218
[   31.996979]  kmem_cache_double_destroy+0x174/0x300
[   31.997032]  kunit_try_run_case+0x170/0x3f0
[   31.997080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.997133]  kthread+0x328/0x630
[   31.997179]  ret_from_fork+0x10/0x20
[   31.997228] 
[   31.997247] Allocated by task 247:
[   31.997277]  kasan_save_stack+0x3c/0x68
[   31.997320]  kasan_save_track+0x20/0x40
[   31.997360]  kasan_save_alloc_info+0x40/0x58
[   31.997399]  __kasan_slab_alloc+0xa8/0xb0
[   31.997444]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.997488]  __kmem_cache_create_args+0x178/0x280
[   31.997528]  kmem_cache_double_destroy+0xc0/0x300
[   31.997570]  kunit_try_run_case+0x170/0x3f0
[   31.997606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.997653]  kthread+0x328/0x630
[   31.997687]  ret_from_fork+0x10/0x20
[   31.997723] 
[   31.997742] Freed by task 247:
[   31.997769]  kasan_save_stack+0x3c/0x68
[   31.997807]  kasan_save_track+0x20/0x40
[   31.997847]  kasan_save_free_info+0x4c/0x78
[   31.997886]  __kasan_slab_free+0x6c/0x98
[   31.997924]  kmem_cache_free+0x260/0x468
[   31.997961]  slab_kmem_cache_release+0x38/0x50
[   31.998003]  kmem_cache_release+0x1c/0x30
[   31.998042]  kobject_put+0x17c/0x420
[   31.998079]  sysfs_slab_release+0x1c/0x30
[   31.998119]  kmem_cache_destroy+0x118/0x218
[   31.998160]  kmem_cache_double_destroy+0x128/0x300
[   31.998202]  kunit_try_run_case+0x170/0x3f0
[   31.998239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.998282]  kthread+0x328/0x630
[   31.998314]  ret_from_fork+0x10/0x20
[   31.998351] 
[   31.998371] The buggy address belongs to the object at fff00000c5c5cc80
[   31.998371]  which belongs to the cache kmem_cache of size 208
[   31.998427] The buggy address is located 0 bytes inside of
[   31.998427]  freed 208-byte region [fff00000c5c5cc80, fff00000c5c5cd50)
[   31.998501] 
[   31.998522] The buggy address belongs to the physical page:
[   31.998557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c5c
[   31.998612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.998664] page_type: f5(slab)
[   31.998705] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   31.998755] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   31.998795] page dumped because: kasan: bad access detected
[   31.998828] 
[   31.998845] Memory state around the buggy address:
[   31.998878]  fff00000c5c5cb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.998920]  fff00000c5c5cc00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.998964] >fff00000c5c5cc80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.999002]                    ^
[   31.999028]  fff00000c5c5cd00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   31.999071]  fff00000c5c5cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.999115] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   31.858749] ==================================================================
[   31.858847] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   31.858932] Read of size 1 at addr fff00000c6525000 by task kunit_try_catch/245
[   31.858982] 
[   31.859027] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   31.859121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.859149] Hardware name: linux,dummy-virt (DT)
[   31.859181] Call trace:
[   31.859207]  show_stack+0x20/0x38 (C)
[   31.859262]  dump_stack_lvl+0x8c/0xd0
[   31.859315]  print_report+0x118/0x5d0
[   31.859359]  kasan_report+0xdc/0x128
[   31.859403]  __asan_report_load1_noabort+0x20/0x30
[   31.859470]  kmem_cache_rcu_uaf+0x388/0x468
[   31.859522]  kunit_try_run_case+0x170/0x3f0
[   31.859574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.859661]  kthread+0x328/0x630
[   31.859712]  ret_from_fork+0x10/0x20
[   31.859978] 
[   31.859999] Allocated by task 245:
[   31.860030]  kasan_save_stack+0x3c/0x68
[   31.860077]  kasan_save_track+0x20/0x40
[   31.860116]  kasan_save_alloc_info+0x40/0x58
[   31.860155]  __kasan_slab_alloc+0xa8/0xb0
[   31.860191]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.860261]  kmem_cache_rcu_uaf+0x12c/0x468
[   31.860302]  kunit_try_run_case+0x170/0x3f0
[   31.860340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.860390]  kthread+0x328/0x630
[   31.860432]  ret_from_fork+0x10/0x20
[   31.860489] 
[   31.860508] Freed by task 0:
[   31.860534]  kasan_save_stack+0x3c/0x68
[   31.860581]  kasan_save_track+0x20/0x40
[   31.860618]  kasan_save_free_info+0x4c/0x78
[   31.860656]  __kasan_slab_free+0x6c/0x98
[   31.860694]  slab_free_after_rcu_debug+0xd4/0x2f8
[   31.860744]  rcu_core+0x9f4/0x1e20
[   31.860782]  rcu_core_si+0x18/0x30
[   31.860815]  handle_softirqs+0x374/0xb28
[   31.860853]  __do_softirq+0x1c/0x28
[   31.860886] 
[   31.860905] Last potentially related work creation:
[   31.860962]  kasan_save_stack+0x3c/0x68
[   31.861012]  kasan_record_aux_stack+0xb4/0xc8
[   31.861170]  kmem_cache_free+0x120/0x468
[   31.861207]  kmem_cache_rcu_uaf+0x16c/0x468
[   31.861253]  kunit_try_run_case+0x170/0x3f0
[   31.861430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.861690]  kthread+0x328/0x630
[   31.861739]  ret_from_fork+0x10/0x20
[   31.861776] 
[   31.861796] The buggy address belongs to the object at fff00000c6525000
[   31.861796]  which belongs to the cache test_cache of size 200
[   31.861855] The buggy address is located 0 bytes inside of
[   31.861855]  freed 200-byte region [fff00000c6525000, fff00000c65250c8)
[   31.861917] 
[   31.861938] The buggy address belongs to the physical page:
[   31.861971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106525
[   31.862029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.862081] page_type: f5(slab)
[   31.862124] raw: 0bfffe0000000000 fff00000c5c5cb40 dead000000000122 0000000000000000
[   31.862173] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.862214] page dumped because: kasan: bad access detected
[   31.862244] 
[   31.862262] Memory state around the buggy address:
[   31.862295]  fff00000c6524f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.862339]  fff00000c6524f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.862382] >fff00000c6525000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.862417]                    ^
[   31.862457]  fff00000c6525080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.862601]  fff00000c6525100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.862708] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.264694] ==================================================================
[   31.265197] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   31.265383] Free of addr fff00000c6526001 by task kunit_try_catch/243
[   31.265539] 
[   31.265686] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   31.265778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.265805] Hardware name: linux,dummy-virt (DT)
[   31.266146] Call trace:
[   31.266176]  show_stack+0x20/0x38 (C)
[   31.266234]  dump_stack_lvl+0x8c/0xd0
[   31.266394]  print_report+0x118/0x5d0
[   31.266450]  kasan_report_invalid_free+0xc0/0xe8
[   31.266608]  check_slab_allocation+0xfc/0x108
[   31.266662]  __kasan_slab_pre_free+0x2c/0x48
[   31.266712]  kmem_cache_free+0xf0/0x468
[   31.266773]  kmem_cache_invalid_free+0x184/0x3c8
[   31.266942]  kunit_try_run_case+0x170/0x3f0
[   31.267090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.267208]  kthread+0x328/0x630
[   31.267253]  ret_from_fork+0x10/0x20
[   31.267303] 
[   31.267323] Allocated by task 243:
[   31.267362]  kasan_save_stack+0x3c/0x68
[   31.267407]  kasan_save_track+0x20/0x40
[   31.267691]  kasan_save_alloc_info+0x40/0x58
[   31.267956]  __kasan_slab_alloc+0xa8/0xb0
[   31.268024]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.268104]  kmem_cache_invalid_free+0x12c/0x3c8
[   31.268168]  kunit_try_run_case+0x170/0x3f0
[   31.268319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.268371]  kthread+0x328/0x630
[   31.268403]  ret_from_fork+0x10/0x20
[   31.268628] 
[   31.268839] The buggy address belongs to the object at fff00000c6526000
[   31.268839]  which belongs to the cache test_cache of size 200
[   31.268900] The buggy address is located 1 bytes inside of
[   31.268900]  200-byte region [fff00000c6526000, fff00000c65260c8)
[   31.268959] 
[   31.268980] The buggy address belongs to the physical page:
[   31.269014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106526
[   31.269070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.269120] page_type: f5(slab)
[   31.269170] raw: 0bfffe0000000000 fff00000c5c5ca00 dead000000000122 0000000000000000
[   31.269221] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.269261] page dumped because: kasan: bad access detected
[   31.269340] 
[   31.269406] Memory state around the buggy address:
[   31.269449]  fff00000c6525f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.269491]  fff00000c6525f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.269533] >fff00000c6526000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.269571]                    ^
[   31.269606]  fff00000c6526080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.269729]  fff00000c6526100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.269899] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   31.222850] ==================================================================
[   31.223221] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.223536] Free of addr fff00000c6526000 by task kunit_try_catch/241
[   31.223642] 
[   31.223687] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   31.223779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.223916] Hardware name: linux,dummy-virt (DT)
[   31.223948] Call trace:
[   31.223972]  show_stack+0x20/0x38 (C)
[   31.224025]  dump_stack_lvl+0x8c/0xd0
[   31.224084]  print_report+0x118/0x5d0
[   31.224308]  kasan_report_invalid_free+0xc0/0xe8
[   31.224465]  check_slab_allocation+0xd4/0x108
[   31.224515]  __kasan_slab_pre_free+0x2c/0x48
[   31.224565]  kmem_cache_free+0xf0/0x468
[   31.224613]  kmem_cache_double_free+0x190/0x3c8
[   31.224662]  kunit_try_run_case+0x170/0x3f0
[   31.224957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.225220]  kthread+0x328/0x630
[   31.225301]  ret_from_fork+0x10/0x20
[   31.225352] 
[   31.225370] Allocated by task 241:
[   31.225402]  kasan_save_stack+0x3c/0x68
[   31.225454]  kasan_save_track+0x20/0x40
[   31.225678]  kasan_save_alloc_info+0x40/0x58
[   31.225823]  __kasan_slab_alloc+0xa8/0xb0
[   31.225858]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.225900]  kmem_cache_double_free+0x12c/0x3c8
[   31.226123]  kunit_try_run_case+0x170/0x3f0
[   31.226182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.226233]  kthread+0x328/0x630
[   31.226368]  ret_from_fork+0x10/0x20
[   31.226403] 
[   31.226421] Freed by task 241:
[   31.226507]  kasan_save_stack+0x3c/0x68
[   31.226547]  kasan_save_track+0x20/0x40
[   31.226586]  kasan_save_free_info+0x4c/0x78
[   31.226634]  __kasan_slab_free+0x6c/0x98
[   31.226675]  kmem_cache_free+0x260/0x468
[   31.226714]  kmem_cache_double_free+0x140/0x3c8
[   31.226757]  kunit_try_run_case+0x170/0x3f0
[   31.227024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.227090]  kthread+0x328/0x630
[   31.227126]  ret_from_fork+0x10/0x20
[   31.227162] 
[   31.227193] The buggy address belongs to the object at fff00000c6526000
[   31.227193]  which belongs to the cache test_cache of size 200
[   31.227254] The buggy address is located 0 bytes inside of
[   31.227254]  200-byte region [fff00000c6526000, fff00000c65260c8)
[   31.227616] 
[   31.227722] The buggy address belongs to the physical page:
[   31.227763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106526
[   31.227855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.227993] page_type: f5(slab)
[   31.228068] raw: 0bfffe0000000000 fff00000c5c5c8c0 dead000000000122 0000000000000000
[   31.228189] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.228383] page dumped because: kasan: bad access detected
[   31.228462] 
[   31.228522] Memory state around the buggy address:
[   31.228555]  fff00000c6525f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.228643]  fff00000c6525f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.228690] >fff00000c6526000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.228729]                    ^
[   31.228756]  fff00000c6526080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.228798]  fff00000c6526100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.228864] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   31.017115] ==================================================================
[   31.017210] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   31.017593] Read of size 1 at addr fff00000c65270c8 by task kunit_try_catch/239
[   31.018046] 
[   31.018303] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   31.018396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.018422] Hardware name: linux,dummy-virt (DT)
[   31.018465] Call trace:
[   31.019078]  show_stack+0x20/0x38 (C)
[   31.019754]  dump_stack_lvl+0x8c/0xd0
[   31.020811]  print_report+0x118/0x5d0
[   31.020928]  kasan_report+0xdc/0x128
[   31.021497]  __asan_report_load1_noabort+0x20/0x30
[   31.021685]  kmem_cache_oob+0x344/0x430
[   31.022050]  kunit_try_run_case+0x170/0x3f0
[   31.022115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.022169]  kthread+0x328/0x630
[   31.022218]  ret_from_fork+0x10/0x20
[   31.022430] 
[   31.022522] Allocated by task 239:
[   31.022996]  kasan_save_stack+0x3c/0x68
[   31.023318]  kasan_save_track+0x20/0x40
[   31.023540]  kasan_save_alloc_info+0x40/0x58
[   31.023628]  __kasan_slab_alloc+0xa8/0xb0
[   31.024084]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.024155]  kmem_cache_oob+0x12c/0x430
[   31.024432]  kunit_try_run_case+0x170/0x3f0
[   31.024482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.024775]  kthread+0x328/0x630
[   31.025031]  ret_from_fork+0x10/0x20
[   31.025186] 
[   31.025213] The buggy address belongs to the object at fff00000c6527000
[   31.025213]  which belongs to the cache test_cache of size 200
[   31.025272] The buggy address is located 0 bytes to the right of
[   31.025272]  allocated 200-byte region [fff00000c6527000, fff00000c65270c8)
[   31.025969] 
[   31.025994] The buggy address belongs to the physical page:
[   31.026071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106527
[   31.026133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.026650] page_type: f5(slab)
[   31.026694] raw: 0bfffe0000000000 fff00000c5c5c780 dead000000000122 0000000000000000
[   31.026745] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.026786] page dumped because: kasan: bad access detected
[   31.026817] 
[   31.026834] Memory state around the buggy address:
[   31.027655]  fff00000c6526f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.028056]  fff00000c6527000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.028112] >fff00000c6527080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.028151]                                               ^
[   31.028187]  fff00000c6527100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.028229]  fff00000c6527180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.028267] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   30.992453] ==================================================================
[   30.992615] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   30.992675] Read of size 8 at addr fff00000c6500e00 by task kunit_try_catch/232
[   30.992726] 
[   30.992762] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.992850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.992877] Hardware name: linux,dummy-virt (DT)
[   30.992915] Call trace:
[   30.993038]  show_stack+0x20/0x38 (C)
[   30.993285]  dump_stack_lvl+0x8c/0xd0
[   30.993367]  print_report+0x118/0x5d0
[   30.993410]  kasan_report+0xdc/0x128
[   30.993468]  __asan_report_load8_noabort+0x20/0x30
[   30.993684]  workqueue_uaf+0x480/0x4a8
[   30.993730]  kunit_try_run_case+0x170/0x3f0
[   30.993777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.993830]  kthread+0x328/0x630
[   30.994119]  ret_from_fork+0x10/0x20
[   30.994407] 
[   30.994430] Allocated by task 232:
[   30.994471]  kasan_save_stack+0x3c/0x68
[   30.994518]  kasan_save_track+0x20/0x40
[   30.994558]  kasan_save_alloc_info+0x40/0x58
[   30.994594]  __kasan_kmalloc+0xd4/0xd8
[   30.994633]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.994913]  workqueue_uaf+0x13c/0x4a8
[   30.994960]  kunit_try_run_case+0x170/0x3f0
[   30.994996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.995119]  kthread+0x328/0x630
[   30.995225]  ret_from_fork+0x10/0x20
[   30.995325] 
[   30.995400] Freed by task 76:
[   30.995428]  kasan_save_stack+0x3c/0x68
[   30.995585]  kasan_save_track+0x20/0x40
[   30.995628]  kasan_save_free_info+0x4c/0x78
[   30.995664]  __kasan_slab_free+0x6c/0x98
[   30.996105]  kfree+0x214/0x3c8
[   30.996141]  workqueue_uaf_work+0x18/0x30
[   30.996180]  process_one_work+0x530/0xf98
[   30.996219]  worker_thread+0x618/0xf38
[   30.996257]  kthread+0x328/0x630
[   30.996290]  ret_from_fork+0x10/0x20
[   30.996327] 
[   30.996348] Last potentially related work creation:
[   30.996374]  kasan_save_stack+0x3c/0x68
[   30.996423]  kasan_record_aux_stack+0xb4/0xc8
[   30.996474]  __queue_work+0x65c/0xfe0
[   30.996890]  queue_work_on+0xbc/0xf8
[   30.997166]  workqueue_uaf+0x210/0x4a8
[   30.997205]  kunit_try_run_case+0x170/0x3f0
[   30.997243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.997288]  kthread+0x328/0x630
[   30.997320]  ret_from_fork+0x10/0x20
[   30.997365] 
[   30.997384] The buggy address belongs to the object at fff00000c6500e00
[   30.997384]  which belongs to the cache kmalloc-32 of size 32
[   30.997605] The buggy address is located 0 bytes inside of
[   30.997605]  freed 32-byte region [fff00000c6500e00, fff00000c6500e20)
[   30.997723] 
[   30.997743] The buggy address belongs to the physical page:
[   30.997778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500
[   30.997874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.998073] page_type: f5(slab)
[   30.998287] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   30.998384] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   30.998425] page dumped because: kasan: bad access detected
[   30.998468] 
[   30.998507] Memory state around the buggy address:
[   30.998542]  fff00000c6500d00: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   30.998584]  fff00000c6500d80: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   30.998627] >fff00000c6500e00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   30.998665]                    ^
[   30.998693]  fff00000c6500e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.998736]  fff00000c6500f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.998773] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   30.959127] ==================================================================
[   30.959245] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   30.959309] Read of size 4 at addr fff00000c6500bc0 by task swapper/0/0
[   30.959355] 
[   30.959392] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.961994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.962403] Hardware name: linux,dummy-virt (DT)
[   30.963042] Call trace:
[   30.963585]  show_stack+0x20/0x38 (C)
[   30.964043]  dump_stack_lvl+0x8c/0xd0
[   30.964480]  print_report+0x118/0x5d0
[   30.964536]  kasan_report+0xdc/0x128
[   30.965043]  __asan_report_load4_noabort+0x20/0x30
[   30.965541]  rcu_uaf_reclaim+0x64/0x70
[   30.966063]  rcu_core+0x9f4/0x1e20
[   30.966117]  rcu_core_si+0x18/0x30
[   30.966834]  handle_softirqs+0x374/0xb28
[   30.968148]  __do_softirq+0x1c/0x28
[   30.968212]  ____do_softirq+0x18/0x30
[   30.968260]  call_on_irq_stack+0x24/0x30
[   30.968307]  do_softirq_own_stack+0x24/0x38
[   30.968355]  __irq_exit_rcu+0x1fc/0x318
[   30.968401]  irq_exit_rcu+0x1c/0x80
[   30.968822]  el1_interrupt+0x38/0x58
[   30.968884]  el1h_64_irq_handler+0x18/0x28
[   30.968943]  el1h_64_irq+0x6c/0x70
[   30.969051]  finish_task_switch.isra.0+0x120/0x5e8 (P)
[   30.969108]  __schedule+0xab4/0x2840
[   30.969156]  schedule_idle+0x60/0xa8
[   30.969200]  do_idle+0x2c4/0x4e8
[   30.969248]  cpu_startup_entry+0x64/0x80
[   30.969295]  rest_init+0x160/0x188
[   30.969339]  start_kernel+0x30c/0x3d0
[   30.969391]  __primary_switched+0x8c/0xa0
[   30.969455] 
[   30.970675] Allocated by task 230:
[   30.970715]  kasan_save_stack+0x3c/0x68
[   30.970766]  kasan_save_track+0x20/0x40
[   30.970806]  kasan_save_alloc_info+0x40/0x58
[   30.970845]  __kasan_kmalloc+0xd4/0xd8
[   30.970883]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.970925]  rcu_uaf+0xb0/0x2d8
[   30.971234]  kunit_try_run_case+0x170/0x3f0
[   30.971285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.971331]  kthread+0x328/0x630
[   30.971839]  ret_from_fork+0x10/0x20
[   30.971952] 
[   30.971972] Freed by task 0:
[   30.972154]  kasan_save_stack+0x3c/0x68
[   30.972201]  kasan_save_track+0x20/0x40
[   30.972239]  kasan_save_free_info+0x4c/0x78
[   30.972277]  __kasan_slab_free+0x6c/0x98
[   30.972935]  kfree+0x214/0x3c8
[   30.973837]  rcu_uaf_reclaim+0x28/0x70
[   30.973884]  rcu_core+0x9f4/0x1e20
[   30.973920]  rcu_core_si+0x18/0x30
[   30.973955]  handle_softirqs+0x374/0xb28
[   30.973993]  __do_softirq+0x1c/0x28
[   30.974029] 
[   30.974065] Last potentially related work creation:
[   30.974486]  kasan_save_stack+0x3c/0x68
[   30.974536]  kasan_record_aux_stack+0xb4/0xc8
[   30.974576]  __call_rcu_common.constprop.0+0x74/0x8c8
[   30.974620]  call_rcu+0x18/0x30
[   30.974654]  rcu_uaf+0x14c/0x2d8
[   30.974691]  kunit_try_run_case+0x170/0x3f0
[   30.974729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.974772]  kthread+0x328/0x630
[   30.974805]  ret_from_fork+0x10/0x20
[   30.974848] 
[   30.974875] The buggy address belongs to the object at fff00000c6500bc0
[   30.974875]  which belongs to the cache kmalloc-32 of size 32
[   30.974935] The buggy address is located 0 bytes inside of
[   30.974935]  freed 32-byte region [fff00000c6500bc0, fff00000c6500be0)
[   30.974994] 
[   30.975014] The buggy address belongs to the physical page:
[   30.975047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500
[   30.975100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.975160] page_type: f5(slab)
[   30.975206] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   30.975256] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   30.975297] page dumped because: kasan: bad access detected
[   30.975327] 
[   30.975344] Memory state around the buggy address:
[   30.975378]  fff00000c6500a80: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   30.975420]  fff00000c6500b00: fa fb fb fb fc fc fc fc 00 00 05 fc fc fc fc fc
[   30.975491] >fff00000c6500b80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   30.975530]                                            ^
[   30.975564]  fff00000c6500c00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.975605]  fff00000c6500c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.975644] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   30.882819] ==================================================================
[   30.882870] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   30.882919] Read of size 1 at addr fff00000c64f4d78 by task kunit_try_catch/228
[   30.883417] 
[   30.883479] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.883832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.883860] Hardware name: linux,dummy-virt (DT)
[   30.883890] Call trace:
[   30.884317]  show_stack+0x20/0x38 (C)
[   30.884526]  dump_stack_lvl+0x8c/0xd0
[   30.884611]  print_report+0x118/0x5d0
[   30.884996]  kasan_report+0xdc/0x128
[   30.885047]  __asan_report_load1_noabort+0x20/0x30
[   30.885458]  ksize_uaf+0x544/0x5f8
[   30.885605]  kunit_try_run_case+0x170/0x3f0
[   30.885800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.885922]  kthread+0x328/0x630
[   30.885967]  ret_from_fork+0x10/0x20
[   30.886014] 
[   30.886034] Allocated by task 228:
[   30.886563]  kasan_save_stack+0x3c/0x68
[   30.886669]  kasan_save_track+0x20/0x40
[   30.886710]  kasan_save_alloc_info+0x40/0x58
[   30.886754]  __kasan_kmalloc+0xd4/0xd8
[   30.886998]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.887322]  ksize_uaf+0xb8/0x5f8
[   30.887544]  kunit_try_run_case+0x170/0x3f0
[   30.887604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.887689]  kthread+0x328/0x630
[   30.888047]  ret_from_fork+0x10/0x20
[   30.888218] 
[   30.888243] Freed by task 228:
[   30.888270]  kasan_save_stack+0x3c/0x68
[   30.888311]  kasan_save_track+0x20/0x40
[   30.888788]  kasan_save_free_info+0x4c/0x78
[   30.888952]  __kasan_slab_free+0x6c/0x98
[   30.889275]  kfree+0x214/0x3c8
[   30.889317]  ksize_uaf+0x11c/0x5f8
[   30.889353]  kunit_try_run_case+0x170/0x3f0
[   30.889390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.889433]  kthread+0x328/0x630
[   30.889475]  ret_from_fork+0x10/0x20
[   30.889513] 
[   30.889535] The buggy address belongs to the object at fff00000c64f4d00
[   30.889535]  which belongs to the cache kmalloc-128 of size 128
[   30.889593] The buggy address is located 120 bytes inside of
[   30.889593]  freed 128-byte region [fff00000c64f4d00, fff00000c64f4d80)
[   30.890124] 
[   30.890149] The buggy address belongs to the physical page:
[   30.890421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.890496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.891061] page_type: f5(slab)
[   30.891103] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.891156] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.891197] page dumped because: kasan: bad access detected
[   30.891659] 
[   30.891685] Memory state around the buggy address:
[   30.891929]  fff00000c64f4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.892131]  fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.892299] >fff00000c64f4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.892339]                                                                 ^
[   30.892380]  fff00000c64f4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.892422]  fff00000c64f4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.892473] ==================================================================
[   30.869388] ==================================================================
[   30.870007] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   30.870071] Read of size 1 at addr fff00000c64f4d00 by task kunit_try_catch/228
[   30.870488] 
[   30.870526] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.870875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.870919] Hardware name: linux,dummy-virt (DT)
[   30.871131] Call trace:
[   30.871353]  show_stack+0x20/0x38 (C)
[   30.871632]  dump_stack_lvl+0x8c/0xd0
[   30.871827]  print_report+0x118/0x5d0
[   30.871909]  kasan_report+0xdc/0x128
[   30.872041]  __asan_report_load1_noabort+0x20/0x30
[   30.872281]  ksize_uaf+0x598/0x5f8
[   30.872511]  kunit_try_run_case+0x170/0x3f0
[   30.872567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.872942]  kthread+0x328/0x630
[   30.872988]  ret_from_fork+0x10/0x20
[   30.873044] 
[   30.873251] Allocated by task 228:
[   30.873367]  kasan_save_stack+0x3c/0x68
[   30.873566]  kasan_save_track+0x20/0x40
[   30.873606]  kasan_save_alloc_info+0x40/0x58
[   30.873653]  __kasan_kmalloc+0xd4/0xd8
[   30.873693]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.873734]  ksize_uaf+0xb8/0x5f8
[   30.874410]  kunit_try_run_case+0x170/0x3f0
[   30.874531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.874576]  kthread+0x328/0x630
[   30.874873]  ret_from_fork+0x10/0x20
[   30.875551] 
[   30.875591] Freed by task 228:
[   30.875760]  kasan_save_stack+0x3c/0x68
[   30.875806]  kasan_save_track+0x20/0x40
[   30.876026]  kasan_save_free_info+0x4c/0x78
[   30.876081]  __kasan_slab_free+0x6c/0x98
[   30.876665]  kfree+0x214/0x3c8
[   30.876771]  ksize_uaf+0x11c/0x5f8
[   30.877201]  kunit_try_run_case+0x170/0x3f0
[   30.877241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.877288]  kthread+0x328/0x630
[   30.877321]  ret_from_fork+0x10/0x20
[   30.877359] 
[   30.877381] The buggy address belongs to the object at fff00000c64f4d00
[   30.877381]  which belongs to the cache kmalloc-128 of size 128
[   30.878183] The buggy address is located 0 bytes inside of
[   30.878183]  freed 128-byte region [fff00000c64f4d00, fff00000c64f4d80)
[   30.878543] 
[   30.878593] The buggy address belongs to the physical page:
[   30.878849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.878903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.879112] page_type: f5(slab)
[   30.879411] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.879736] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.879778] page dumped because: kasan: bad access detected
[   30.879810] 
[   30.879828] Memory state around the buggy address:
[   30.880123]  fff00000c64f4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.880341]  fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.880418] >fff00000c64f4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.880465]                    ^
[   30.880494]  fff00000c64f4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.880536]  fff00000c64f4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.880574] ==================================================================
[   30.855683] ==================================================================
[   30.855786] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   30.855858] Read of size 1 at addr fff00000c64f4d00 by task kunit_try_catch/228
[   30.855910] 
[   30.855950] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.856038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.856471] Hardware name: linux,dummy-virt (DT)
[   30.856562] Call trace:
[   30.856773]  show_stack+0x20/0x38 (C)
[   30.857391]  dump_stack_lvl+0x8c/0xd0
[   30.857533]  print_report+0x118/0x5d0
[   30.857580]  kasan_report+0xdc/0x128
[   30.857809]  __kasan_check_byte+0x54/0x70
[   30.858105]  ksize+0x30/0x88
[   30.858190]  ksize_uaf+0x168/0x5f8
[   30.858237]  kunit_try_run_case+0x170/0x3f0
[   30.858283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.859136]  kthread+0x328/0x630
[   30.859253]  ret_from_fork+0x10/0x20
[   30.859742] 
[   30.859913] Allocated by task 228:
[   30.859947]  kasan_save_stack+0x3c/0x68
[   30.860026]  kasan_save_track+0x20/0x40
[   30.860067]  kasan_save_alloc_info+0x40/0x58
[   30.860483]  __kasan_kmalloc+0xd4/0xd8
[   30.860685]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.861097]  ksize_uaf+0xb8/0x5f8
[   30.861220]  kunit_try_run_case+0x170/0x3f0
[   30.861261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.861696]  kthread+0x328/0x630
[   30.861734]  ret_from_fork+0x10/0x20
[   30.861801] 
[   30.861825] Freed by task 228:
[   30.862078]  kasan_save_stack+0x3c/0x68
[   30.862174]  kasan_save_track+0x20/0x40
[   30.862223]  kasan_save_free_info+0x4c/0x78
[   30.862307]  __kasan_slab_free+0x6c/0x98
[   30.862348]  kfree+0x214/0x3c8
[   30.862383]  ksize_uaf+0x11c/0x5f8
[   30.862764]  kunit_try_run_case+0x170/0x3f0
[   30.862992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.863086]  kthread+0x328/0x630
[   30.863365]  ret_from_fork+0x10/0x20
[   30.863555] 
[   30.863744] The buggy address belongs to the object at fff00000c64f4d00
[   30.863744]  which belongs to the cache kmalloc-128 of size 128
[   30.863858] The buggy address is located 0 bytes inside of
[   30.863858]  freed 128-byte region [fff00000c64f4d00, fff00000c64f4d80)
[   30.863919] 
[   30.864469] The buggy address belongs to the physical page:
[   30.864689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.864837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.865084] page_type: f5(slab)
[   30.865133] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.865587] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.865647] page dumped because: kasan: bad access detected
[   30.866213] 
[   30.866236] Memory state around the buggy address:
[   30.866271]  fff00000c64f4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.866399]  fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.866725] >fff00000c64f4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.866970]                    ^
[   30.867130]  fff00000c64f4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.867568]  fff00000c64f4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.867627] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   30.808702] ==================================================================
[   30.808773] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.808854] Read of size 1 at addr fff00000c64f4c73 by task kunit_try_catch/226
[   30.808905] 
[   30.810507] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.810765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.810794] Hardware name: linux,dummy-virt (DT)
[   30.811161] Call trace:
[   30.811195]  show_stack+0x20/0x38 (C)
[   30.811267]  dump_stack_lvl+0x8c/0xd0
[   30.811368]  print_report+0x118/0x5d0
[   30.811419]  kasan_report+0xdc/0x128
[   30.811476]  __asan_report_load1_noabort+0x20/0x30
[   30.811578]  ksize_unpoisons_memory+0x628/0x740
[   30.811633]  kunit_try_run_case+0x170/0x3f0
[   30.811680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.812190]  kthread+0x328/0x630
[   30.812548]  ret_from_fork+0x10/0x20
[   30.812794] 
[   30.812862] Allocated by task 226:
[   30.812902]  kasan_save_stack+0x3c/0x68
[   30.813141]  kasan_save_track+0x20/0x40
[   30.813181]  kasan_save_alloc_info+0x40/0x58
[   30.813636]  __kasan_kmalloc+0xd4/0xd8
[   30.813695]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.813898]  ksize_unpoisons_memory+0xc0/0x740
[   30.813999]  kunit_try_run_case+0x170/0x3f0
[   30.814040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.814085]  kthread+0x328/0x630
[   30.814347]  ret_from_fork+0x10/0x20
[   30.814406] 
[   30.814449] The buggy address belongs to the object at fff00000c64f4c00
[   30.814449]  which belongs to the cache kmalloc-128 of size 128
[   30.814930] The buggy address is located 0 bytes to the right of
[   30.814930]  allocated 115-byte region [fff00000c64f4c00, fff00000c64f4c73)
[   30.815122] 
[   30.815155] The buggy address belongs to the physical page:
[   30.815212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.815547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.815620] page_type: f5(slab)
[   30.815757] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.816073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.816333] page dumped because: kasan: bad access detected
[   30.816377] 
[   30.816602] Memory state around the buggy address:
[   30.816647]  fff00000c64f4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.816698]  fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.816741] >fff00000c64f4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.817235]                                                              ^
[   30.817622]  fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.818180]  fff00000c64f4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.818221] ==================================================================
[   30.830421] ==================================================================
[   30.830729] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   30.830781] Read of size 1 at addr fff00000c64f4c7f by task kunit_try_catch/226
[   30.830830] 
[   30.830862] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.830945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.830971] Hardware name: linux,dummy-virt (DT)
[   30.831002] Call trace:
[   30.831787]  show_stack+0x20/0x38 (C)
[   30.832058]  dump_stack_lvl+0x8c/0xd0
[   30.832396]  print_report+0x118/0x5d0
[   30.832455]  kasan_report+0xdc/0x128
[   30.832500]  __asan_report_load1_noabort+0x20/0x30
[   30.832548]  ksize_unpoisons_memory+0x690/0x740
[   30.832598]  kunit_try_run_case+0x170/0x3f0
[   30.832645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.832695]  kthread+0x328/0x630
[   30.832738]  ret_from_fork+0x10/0x20
[   30.832786] 
[   30.832803] Allocated by task 226:
[   30.832829]  kasan_save_stack+0x3c/0x68
[   30.832872]  kasan_save_track+0x20/0x40
[   30.832912]  kasan_save_alloc_info+0x40/0x58
[   30.832950]  __kasan_kmalloc+0xd4/0xd8
[   30.832988]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.833029]  ksize_unpoisons_memory+0xc0/0x740
[   30.833069]  kunit_try_run_case+0x170/0x3f0
[   30.833781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.834377]  kthread+0x328/0x630
[   30.834491]  ret_from_fork+0x10/0x20
[   30.835001] 
[   30.835027] The buggy address belongs to the object at fff00000c64f4c00
[   30.835027]  which belongs to the cache kmalloc-128 of size 128
[   30.835456] The buggy address is located 12 bytes to the right of
[   30.835456]  allocated 115-byte region [fff00000c64f4c00, fff00000c64f4c73)
[   30.835529] 
[   30.835880] The buggy address belongs to the physical page:
[   30.836284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.836385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.836449] page_type: f5(slab)
[   30.836877] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.836966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.837135] page dumped because: kasan: bad access detected
[   30.837167] 
[   30.837184] Memory state around the buggy address:
[   30.837215]  fff00000c64f4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.837259]  fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.837302] >fff00000c64f4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.837340]                                                                 ^
[   30.837953]  fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.838163]  fff00000c64f4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.838214] ==================================================================
[   30.820622] ==================================================================
[   30.820677] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.820729] Read of size 1 at addr fff00000c64f4c78 by task kunit_try_catch/226
[   30.820777] 
[   30.821660] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.821774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.821803] Hardware name: linux,dummy-virt (DT)
[   30.821955] Call trace:
[   30.821979]  show_stack+0x20/0x38 (C)
[   30.822032]  dump_stack_lvl+0x8c/0xd0
[   30.822083]  print_report+0x118/0x5d0
[   30.822130]  kasan_report+0xdc/0x128
[   30.822172]  __asan_report_load1_noabort+0x20/0x30
[   30.822222]  ksize_unpoisons_memory+0x618/0x740
[   30.822325]  kunit_try_run_case+0x170/0x3f0
[   30.822374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.822428]  kthread+0x328/0x630
[   30.823456]  ret_from_fork+0x10/0x20
[   30.823663] 
[   30.823681] Allocated by task 226:
[   30.823710]  kasan_save_stack+0x3c/0x68
[   30.824246]  kasan_save_track+0x20/0x40
[   30.824462]  kasan_save_alloc_info+0x40/0x58
[   30.824507]  __kasan_kmalloc+0xd4/0xd8
[   30.824546]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.824744]  ksize_unpoisons_memory+0xc0/0x740
[   30.825174]  kunit_try_run_case+0x170/0x3f0
[   30.825219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.825379]  kthread+0x328/0x630
[   30.825466]  ret_from_fork+0x10/0x20
[   30.825979] 
[   30.826065] The buggy address belongs to the object at fff00000c64f4c00
[   30.826065]  which belongs to the cache kmalloc-128 of size 128
[   30.826127] The buggy address is located 5 bytes to the right of
[   30.826127]  allocated 115-byte region [fff00000c64f4c00, fff00000c64f4c73)
[   30.826191] 
[   30.826210] The buggy address belongs to the physical page:
[   30.826266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.826784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.826915] page_type: f5(slab)
[   30.827188] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.827637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.827686] page dumped because: kasan: bad access detected
[   30.827718] 
[   30.827737] Memory state around the buggy address:
[   30.827768]  fff00000c64f4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.827813]  fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.827855] >fff00000c64f4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.827893]                                                                 ^
[   30.827935]  fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.827977]  fff00000c64f4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.828014] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   30.779430] ==================================================================
[   30.779529] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   30.779922] Free of addr fff00000c648e3e0 by task kunit_try_catch/224
[   30.779969] 
[   30.780270] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.780361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.780388] Hardware name: linux,dummy-virt (DT)
[   30.780419] Call trace:
[   30.780454]  show_stack+0x20/0x38 (C)
[   30.781394]  dump_stack_lvl+0x8c/0xd0
[   30.781965]  print_report+0x118/0x5d0
[   30.782019]  kasan_report_invalid_free+0xc0/0xe8
[   30.782185]  check_slab_allocation+0xd4/0x108
[   30.782265]  __kasan_slab_pre_free+0x2c/0x48
[   30.782382]  kfree+0xe8/0x3c8
[   30.782429]  kfree_sensitive+0x3c/0xb0
[   30.782510]  kmalloc_double_kzfree+0x168/0x308
[   30.782561]  kunit_try_run_case+0x170/0x3f0
[   30.782863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.783074]  kthread+0x328/0x630
[   30.783164]  ret_from_fork+0x10/0x20
[   30.783215] 
[   30.783618] Allocated by task 224:
[   30.783691]  kasan_save_stack+0x3c/0x68
[   30.783769]  kasan_save_track+0x20/0x40
[   30.784064]  kasan_save_alloc_info+0x40/0x58
[   30.784110]  __kasan_kmalloc+0xd4/0xd8
[   30.784302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.784870]  kmalloc_double_kzfree+0xb8/0x308
[   30.785498]  kunit_try_run_case+0x170/0x3f0
[   30.785728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.786071]  kthread+0x328/0x630
[   30.786176]  ret_from_fork+0x10/0x20
[   30.786279] 
[   30.786341] Freed by task 224:
[   30.786370]  kasan_save_stack+0x3c/0x68
[   30.786661]  kasan_save_track+0x20/0x40
[   30.786759]  kasan_save_free_info+0x4c/0x78
[   30.786859]  __kasan_slab_free+0x6c/0x98
[   30.787171]  kfree+0x214/0x3c8
[   30.787400]  kfree_sensitive+0x80/0xb0
[   30.787743]  kmalloc_double_kzfree+0x11c/0x308
[   30.787935]  kunit_try_run_case+0x170/0x3f0
[   30.788023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.788256]  kthread+0x328/0x630
[   30.788296]  ret_from_fork+0x10/0x20
[   30.788569] 
[   30.788745] The buggy address belongs to the object at fff00000c648e3e0
[   30.788745]  which belongs to the cache kmalloc-16 of size 16
[   30.788955] The buggy address is located 0 bytes inside of
[   30.788955]  16-byte region [fff00000c648e3e0, fff00000c648e3f0)
[   30.789014] 
[   30.789451] The buggy address belongs to the physical page:
[   30.789617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e
[   30.789684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.789734] page_type: f5(slab)
[   30.789932] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.790567] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.790751] page dumped because: kasan: bad access detected
[   30.790811] 
[   30.791018] Memory state around the buggy address:
[   30.791086]  fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.791134]  fff00000c648e300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.791177] >fff00000c648e380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.791608]                                                        ^
[   30.791765]  fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.791812]  fff00000c648e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.791852] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   30.752593] ==================================================================
[   30.753810] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.753971] Read of size 1 at addr fff00000c648e3e0 by task kunit_try_catch/224
[   30.754020] 
[   30.754058] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.755319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.755836] Hardware name: linux,dummy-virt (DT)
[   30.756025] Call trace:
[   30.756527]  show_stack+0x20/0x38 (C)
[   30.756622]  dump_stack_lvl+0x8c/0xd0
[   30.756670]  print_report+0x118/0x5d0
[   30.757662]  kasan_report+0xdc/0x128
[   30.757832]  __kasan_check_byte+0x54/0x70
[   30.758328]  kfree_sensitive+0x30/0xb0
[   30.759121]  kmalloc_double_kzfree+0x168/0x308
[   30.759193]  kunit_try_run_case+0x170/0x3f0
[   30.759951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.760024]  kthread+0x328/0x630
[   30.760632]  ret_from_fork+0x10/0x20
[   30.761078] 
[   30.761305] Allocated by task 224:
[   30.761552]  kasan_save_stack+0x3c/0x68
[   30.761942]  kasan_save_track+0x20/0x40
[   30.761987]  kasan_save_alloc_info+0x40/0x58
[   30.762027]  __kasan_kmalloc+0xd4/0xd8
[   30.762066]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.762977]  kmalloc_double_kzfree+0xb8/0x308
[   30.763267]  kunit_try_run_case+0x170/0x3f0
[   30.763693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.763869]  kthread+0x328/0x630
[   30.763903]  ret_from_fork+0x10/0x20
[   30.763941] 
[   30.763961] Freed by task 224:
[   30.764859]  kasan_save_stack+0x3c/0x68
[   30.765293]  kasan_save_track+0x20/0x40
[   30.765756]  kasan_save_free_info+0x4c/0x78
[   30.765812]  __kasan_slab_free+0x6c/0x98
[   30.765854]  kfree+0x214/0x3c8
[   30.766465]  kfree_sensitive+0x80/0xb0
[   30.766872]  kmalloc_double_kzfree+0x11c/0x308
[   30.767456]  kunit_try_run_case+0x170/0x3f0
[   30.767519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.767564]  kthread+0x328/0x630
[   30.767597]  ret_from_fork+0x10/0x20
[   30.767634] 
[   30.768389] The buggy address belongs to the object at fff00000c648e3e0
[   30.768389]  which belongs to the cache kmalloc-16 of size 16
[   30.768469] The buggy address is located 0 bytes inside of
[   30.768469]  freed 16-byte region [fff00000c648e3e0, fff00000c648e3f0)
[   30.769078] 
[   30.769180] The buggy address belongs to the physical page:
[   30.769219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e
[   30.770508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.771382] page_type: f5(slab)
[   30.771481] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.771731] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.771864] page dumped because: kasan: bad access detected
[   30.771967] 
[   30.772054] Memory state around the buggy address:
[   30.772127]  fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.772182]  fff00000c648e300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.772227] >fff00000c648e380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.772266]                                                        ^
[   30.772306]  fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.773285]  fff00000c648e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.773340] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   30.711487] ==================================================================
[   30.711873] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   30.712158] Read of size 1 at addr fff00000c6503828 by task kunit_try_catch/220
[   30.712341] 
[   30.712568] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.713205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.713999] Hardware name: linux,dummy-virt (DT)
[   30.714040] Call trace:
[   30.714903]  show_stack+0x20/0x38 (C)
[   30.715414]  dump_stack_lvl+0x8c/0xd0
[   30.715877]  print_report+0x118/0x5d0
[   30.715923]  kasan_report+0xdc/0x128
[   30.715968]  __asan_report_load1_noabort+0x20/0x30
[   30.716018]  kmalloc_uaf2+0x3f4/0x468
[   30.716066]  kunit_try_run_case+0x170/0x3f0
[   30.716114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.716167]  kthread+0x328/0x630
[   30.716209]  ret_from_fork+0x10/0x20
[   30.716263] 
[   30.716281] Allocated by task 220:
[   30.716310]  kasan_save_stack+0x3c/0x68
[   30.716354]  kasan_save_track+0x20/0x40
[   30.716391]  kasan_save_alloc_info+0x40/0x58
[   30.716429]  __kasan_kmalloc+0xd4/0xd8
[   30.717330]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.717936]  kmalloc_uaf2+0xc4/0x468
[   30.717977]  kunit_try_run_case+0x170/0x3f0
[   30.718106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.718248]  kthread+0x328/0x630
[   30.718286]  ret_from_fork+0x10/0x20
[   30.718572] 
[   30.718846] Freed by task 220:
[   30.719113]  kasan_save_stack+0x3c/0x68
[   30.719225]  kasan_save_track+0x20/0x40
[   30.719265]  kasan_save_free_info+0x4c/0x78
[   30.719304]  __kasan_slab_free+0x6c/0x98
[   30.719673]  kfree+0x214/0x3c8
[   30.719723]  kmalloc_uaf2+0x134/0x468
[   30.719965]  kunit_try_run_case+0x170/0x3f0
[   30.720002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.720144]  kthread+0x328/0x630
[   30.720180]  ret_from_fork+0x10/0x20
[   30.720654] 
[   30.720733] The buggy address belongs to the object at fff00000c6503800
[   30.720733]  which belongs to the cache kmalloc-64 of size 64
[   30.721129] The buggy address is located 40 bytes inside of
[   30.721129]  freed 64-byte region [fff00000c6503800, fff00000c6503840)
[   30.721332] 
[   30.721597] The buggy address belongs to the physical page:
[   30.721664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106503
[   30.722112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.722167] page_type: f5(slab)
[   30.722466] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.722521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.722573] page dumped because: kasan: bad access detected
[   30.722971] 
[   30.722991] Memory state around the buggy address:
[   30.723222]  fff00000c6503700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.723269]  fff00000c6503780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.723311] >fff00000c6503800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.723349]                                   ^
[   30.723381]  fff00000c6503880: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   30.723422]  fff00000c6503900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.723801] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   30.693704] ==================================================================
[   30.693784] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   30.693837] Write of size 33 at addr fff00000c6503680 by task kunit_try_catch/218
[   30.693994] 
[   30.694149] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.694246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.694273] Hardware name: linux,dummy-virt (DT)
[   30.694303] Call trace:
[   30.694326]  show_stack+0x20/0x38 (C)
[   30.694520]  dump_stack_lvl+0x8c/0xd0
[   30.694651]  print_report+0x118/0x5d0
[   30.694786]  kasan_report+0xdc/0x128
[   30.694906]  kasan_check_range+0x100/0x1a8
[   30.695001]  __asan_memset+0x34/0x78
[   30.695097]  kmalloc_uaf_memset+0x170/0x310
[   30.695191]  kunit_try_run_case+0x170/0x3f0
[   30.695239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.695528]  kthread+0x328/0x630
[   30.695662]  ret_from_fork+0x10/0x20
[   30.695717] 
[   30.695872] Allocated by task 218:
[   30.695944]  kasan_save_stack+0x3c/0x68
[   30.695991]  kasan_save_track+0x20/0x40
[   30.696032]  kasan_save_alloc_info+0x40/0x58
[   30.696129]  __kasan_kmalloc+0xd4/0xd8
[   30.696171]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.696212]  kmalloc_uaf_memset+0xb8/0x310
[   30.696279]  kunit_try_run_case+0x170/0x3f0
[   30.696317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.696358]  kthread+0x328/0x630
[   30.696404]  ret_from_fork+0x10/0x20
[   30.696453] 
[   30.696473] Freed by task 218:
[   30.696532]  kasan_save_stack+0x3c/0x68
[   30.696914]  kasan_save_track+0x20/0x40
[   30.697112]  kasan_save_free_info+0x4c/0x78
[   30.697336]  __kasan_slab_free+0x6c/0x98
[   30.697379]  kfree+0x214/0x3c8
[   30.697453]  kmalloc_uaf_memset+0x11c/0x310
[   30.697491]  kunit_try_run_case+0x170/0x3f0
[   30.697528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.697920]  kthread+0x328/0x630
[   30.697974]  ret_from_fork+0x10/0x20
[   30.698009] 
[   30.698029] The buggy address belongs to the object at fff00000c6503680
[   30.698029]  which belongs to the cache kmalloc-64 of size 64
[   30.698109] The buggy address is located 0 bytes inside of
[   30.698109]  freed 64-byte region [fff00000c6503680, fff00000c65036c0)
[   30.698286] 
[   30.698306] The buggy address belongs to the physical page:
[   30.698396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106503
[   30.698551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.698655] page_type: f5(slab)
[   30.698711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.698836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.698875] page dumped because: kasan: bad access detected
[   30.698905] 
[   30.698922] Memory state around the buggy address:
[   30.698954]  fff00000c6503580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.699149]  fff00000c6503600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.699275] >fff00000c6503680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.699381]                    ^
[   30.699961]  fff00000c6503700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.700010]  fff00000c6503780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.700049] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   30.680644] ==================================================================
[   30.680733] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   30.680784] Read of size 1 at addr fff00000c648e3c8 by task kunit_try_catch/216
[   30.680851] 
[   30.680898] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.680983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.681010] Hardware name: linux,dummy-virt (DT)
[   30.681040] Call trace:
[   30.681060]  show_stack+0x20/0x38 (C)
[   30.681108]  dump_stack_lvl+0x8c/0xd0
[   30.681172]  print_report+0x118/0x5d0
[   30.681318]  kasan_report+0xdc/0x128
[   30.681374]  __asan_report_load1_noabort+0x20/0x30
[   30.681673]  kmalloc_uaf+0x300/0x338
[   30.681856]  kunit_try_run_case+0x170/0x3f0
[   30.681992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.682079]  kthread+0x328/0x630
[   30.682143]  ret_from_fork+0x10/0x20
[   30.682192] 
[   30.682210] Allocated by task 216:
[   30.682239]  kasan_save_stack+0x3c/0x68
[   30.682281]  kasan_save_track+0x20/0x40
[   30.682321]  kasan_save_alloc_info+0x40/0x58
[   30.682834]  __kasan_kmalloc+0xd4/0xd8
[   30.682913]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.683002]  kmalloc_uaf+0xb8/0x338
[   30.683153]  kunit_try_run_case+0x170/0x3f0
[   30.683248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.683369]  kthread+0x328/0x630
[   30.683457]  ret_from_fork+0x10/0x20
[   30.683542] 
[   30.683562] Freed by task 216:
[   30.683589]  kasan_save_stack+0x3c/0x68
[   30.683664]  kasan_save_track+0x20/0x40
[   30.683990]  kasan_save_free_info+0x4c/0x78
[   30.684100]  __kasan_slab_free+0x6c/0x98
[   30.684193]  kfree+0x214/0x3c8
[   30.684319]  kmalloc_uaf+0x11c/0x338
[   30.684621]  kunit_try_run_case+0x170/0x3f0
[   30.684744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.684864]  kthread+0x328/0x630
[   30.684940]  ret_from_fork+0x10/0x20
[   30.685077] 
[   30.685195] The buggy address belongs to the object at fff00000c648e3c0
[   30.685195]  which belongs to the cache kmalloc-16 of size 16
[   30.685311] The buggy address is located 8 bytes inside of
[   30.685311]  freed 16-byte region [fff00000c648e3c0, fff00000c648e3d0)
[   30.685371] 
[   30.685671] The buggy address belongs to the physical page:
[   30.685784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e
[   30.685867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.685932] page_type: f5(slab)
[   30.685969] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.686046] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.686086] page dumped because: kasan: bad access detected
[   30.686147] 
[   30.686165] Memory state around the buggy address:
[   30.686198]  fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.686240]  fff00000c648e300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.686282] >fff00000c648e380: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   30.686412]                                               ^
[   30.686644]  fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.686764]  fff00000c648e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.686886] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   30.670706] ==================================================================
[   30.670954] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   30.671016] Read of size 64 at addr fff00000c6503404 by task kunit_try_catch/214
[   30.671073] 
[   30.671102] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.671206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.671235] Hardware name: linux,dummy-virt (DT)
[   30.671267] Call trace:
[   30.671288]  show_stack+0x20/0x38 (C)
[   30.671335]  dump_stack_lvl+0x8c/0xd0
[   30.671384]  print_report+0x118/0x5d0
[   30.671430]  kasan_report+0xdc/0x128
[   30.671730]  kasan_check_range+0x100/0x1a8
[   30.671815]  __asan_memmove+0x3c/0x98
[   30.671938]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   30.671994]  kunit_try_run_case+0x170/0x3f0
[   30.672042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.672098]  kthread+0x328/0x630
[   30.672141]  ret_from_fork+0x10/0x20
[   30.672296] 
[   30.672374] Allocated by task 214:
[   30.672406]  kasan_save_stack+0x3c/0x68
[   30.672462]  kasan_save_track+0x20/0x40
[   30.672740]  kasan_save_alloc_info+0x40/0x58
[   30.672827]  __kasan_kmalloc+0xd4/0xd8
[   30.672870]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.672936]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   30.672983]  kunit_try_run_case+0x170/0x3f0
[   30.673021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.673096]  kthread+0x328/0x630
[   30.673150]  ret_from_fork+0x10/0x20
[   30.673212] 
[   30.673251] The buggy address belongs to the object at fff00000c6503400
[   30.673251]  which belongs to the cache kmalloc-64 of size 64
[   30.673322] The buggy address is located 4 bytes inside of
[   30.673322]  allocated 64-byte region [fff00000c6503400, fff00000c6503440)
[   30.673457] 
[   30.673478] The buggy address belongs to the physical page:
[   30.673513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106503
[   30.673682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.673797] page_type: f5(slab)
[   30.673890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.673990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.674085] page dumped because: kasan: bad access detected
[   30.674180] 
[   30.674259] Memory state around the buggy address:
[   30.674354]  fff00000c6503300: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   30.674460]  fff00000c6503380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.674503] >fff00000c6503400: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.674541]                                            ^
[   30.674594]  fff00000c6503480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.674637]  fff00000c6503500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.674675] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   30.659137] ==================================================================
[   30.659218] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   30.659313] Read of size 18446744073709551614 at addr fff00000c6503204 by task kunit_try_catch/212
[   30.659395] 
[   30.659472] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.659578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.659604] Hardware name: linux,dummy-virt (DT)
[   30.659636] Call trace:
[   30.659676]  show_stack+0x20/0x38 (C)
[   30.659820]  dump_stack_lvl+0x8c/0xd0
[   30.659873]  print_report+0x118/0x5d0
[   30.659917]  kasan_report+0xdc/0x128
[   30.660160]  kasan_check_range+0x100/0x1a8
[   30.660234]  __asan_memmove+0x3c/0x98
[   30.660478]  kmalloc_memmove_negative_size+0x154/0x2e0
[   30.660653]  kunit_try_run_case+0x170/0x3f0
[   30.660733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.660878]  kthread+0x328/0x630
[   30.661061]  ret_from_fork+0x10/0x20
[   30.661129] 
[   30.661167] Allocated by task 212:
[   30.661215]  kasan_save_stack+0x3c/0x68
[   30.661258]  kasan_save_track+0x20/0x40
[   30.661317]  kasan_save_alloc_info+0x40/0x58
[   30.661361]  __kasan_kmalloc+0xd4/0xd8
[   30.661418]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.661477]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   30.661544]  kunit_try_run_case+0x170/0x3f0
[   30.661600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.661728]  kthread+0x328/0x630
[   30.661836]  ret_from_fork+0x10/0x20
[   30.661884] 
[   30.661906] The buggy address belongs to the object at fff00000c6503200
[   30.661906]  which belongs to the cache kmalloc-64 of size 64
[   30.661991] The buggy address is located 4 bytes inside of
[   30.661991]  64-byte region [fff00000c6503200, fff00000c6503240)
[   30.662390] 
[   30.662418] The buggy address belongs to the physical page:
[   30.662611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106503
[   30.662839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.662980] page_type: f5(slab)
[   30.663047] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.663145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.663264] page dumped because: kasan: bad access detected
[   30.663354] 
[   30.663425] Memory state around the buggy address:
[   30.663516]  fff00000c6503100: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   30.663613]  fff00000c6503180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.663693] >fff00000c6503200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.663780]                    ^
[   30.663860]  fff00000c6503280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.663946]  fff00000c6503300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.664001] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   30.647561] ==================================================================
[   30.647864] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.647943] Write of size 16 at addr fff00000c64f4b69 by task kunit_try_catch/210
[   30.648036] 
[   30.648089] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.648191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.648233] Hardware name: linux,dummy-virt (DT)
[   30.648265] Call trace:
[   30.648314]  show_stack+0x20/0x38 (C)
[   30.648397]  dump_stack_lvl+0x8c/0xd0
[   30.648460]  print_report+0x118/0x5d0
[   30.648581]  kasan_report+0xdc/0x128
[   30.648721]  kasan_check_range+0x100/0x1a8
[   30.648784]  __asan_memset+0x34/0x78
[   30.648827]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.649114]  kunit_try_run_case+0x170/0x3f0
[   30.649234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.649318]  kthread+0x328/0x630
[   30.649382]  ret_from_fork+0x10/0x20
[   30.649459] 
[   30.649521] Allocated by task 210:
[   30.649576]  kasan_save_stack+0x3c/0x68
[   30.649674]  kasan_save_track+0x20/0x40
[   30.650013]  kasan_save_alloc_info+0x40/0x58
[   30.650147]  __kasan_kmalloc+0xd4/0xd8
[   30.650250]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.650385]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.650472]  kunit_try_run_case+0x170/0x3f0
[   30.650565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.650707]  kthread+0x328/0x630
[   30.650761]  ret_from_fork+0x10/0x20
[   30.650799] 
[   30.650820] The buggy address belongs to the object at fff00000c64f4b00
[   30.650820]  which belongs to the cache kmalloc-128 of size 128
[   30.650901] The buggy address is located 105 bytes inside of
[   30.650901]  allocated 120-byte region [fff00000c64f4b00, fff00000c64f4b78)
[   30.650962] 
[   30.650985] The buggy address belongs to the physical page:
[   30.651258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.651343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.651417] page_type: f5(slab)
[   30.651520] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.651606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.651713] page dumped because: kasan: bad access detected
[   30.651781] 
[   30.651840] Memory state around the buggy address:
[   30.651951]  fff00000c64f4a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.652019]  fff00000c64f4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.652081] >fff00000c64f4b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.652119]                                                                 ^
[   30.652158]  fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.652201]  fff00000c64f4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.652238] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   30.635559] ==================================================================
[   30.635613] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   30.635663] Write of size 8 at addr fff00000c64f4a71 by task kunit_try_catch/208
[   30.635710] 
[   30.635741] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.635822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.635847] Hardware name: linux,dummy-virt (DT)
[   30.635876] Call trace:
[   30.635897]  show_stack+0x20/0x38 (C)
[   30.635943]  dump_stack_lvl+0x8c/0xd0
[   30.635989]  print_report+0x118/0x5d0
[   30.636032]  kasan_report+0xdc/0x128
[   30.636073]  kasan_check_range+0x100/0x1a8
[   30.636117]  __asan_memset+0x34/0x78
[   30.636160]  kmalloc_oob_memset_8+0x150/0x2f8
[   30.636207]  kunit_try_run_case+0x170/0x3f0
[   30.636252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.636301]  kthread+0x328/0x630
[   30.636342]  ret_from_fork+0x10/0x20
[   30.636389] 
[   30.636406] Allocated by task 208:
[   30.636432]  kasan_save_stack+0x3c/0x68
[   30.636523]  kasan_save_track+0x20/0x40
[   30.636561]  kasan_save_alloc_info+0x40/0x58
[   30.636742]  __kasan_kmalloc+0xd4/0xd8
[   30.636893]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.637032]  kmalloc_oob_memset_8+0xb0/0x2f8
[   30.637161]  kunit_try_run_case+0x170/0x3f0
[   30.637261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.637332]  kthread+0x328/0x630
[   30.637487]  ret_from_fork+0x10/0x20
[   30.637560] 
[   30.637580] The buggy address belongs to the object at fff00000c64f4a00
[   30.637580]  which belongs to the cache kmalloc-128 of size 128
[   30.637658] The buggy address is located 113 bytes inside of
[   30.637658]  allocated 120-byte region [fff00000c64f4a00, fff00000c64f4a78)
[   30.637718] 
[   30.637903] The buggy address belongs to the physical page:
[   30.637935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.637986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.638033] page_type: f5(slab)
[   30.638140] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.638243] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.638318] page dumped because: kasan: bad access detected
[   30.638396] 
[   30.638520] Memory state around the buggy address:
[   30.638608]  fff00000c64f4900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.638740]  fff00000c64f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.638787] >fff00000c64f4a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.638907]                                                                 ^
[   30.639016]  fff00000c64f4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.639097]  fff00000c64f4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.639138] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   30.626354] ==================================================================
[   30.626408] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   30.626476] Write of size 4 at addr fff00000c64f4975 by task kunit_try_catch/206
[   30.626523] 
[   30.626553] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.626899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.626961] Hardware name: linux,dummy-virt (DT)
[   30.627043] Call trace:
[   30.627087]  show_stack+0x20/0x38 (C)
[   30.627143]  dump_stack_lvl+0x8c/0xd0
[   30.627190]  print_report+0x118/0x5d0
[   30.627233]  kasan_report+0xdc/0x128
[   30.627275]  kasan_check_range+0x100/0x1a8
[   30.627329]  __asan_memset+0x34/0x78
[   30.627384]  kmalloc_oob_memset_4+0x150/0x300
[   30.627431]  kunit_try_run_case+0x170/0x3f0
[   30.627489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.627538]  kthread+0x328/0x630
[   30.627791]  ret_from_fork+0x10/0x20
[   30.627873] 
[   30.627891] Allocated by task 206:
[   30.627919]  kasan_save_stack+0x3c/0x68
[   30.627960]  kasan_save_track+0x20/0x40
[   30.627999]  kasan_save_alloc_info+0x40/0x58
[   30.628232]  __kasan_kmalloc+0xd4/0xd8
[   30.628379]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.628495]  kmalloc_oob_memset_4+0xb0/0x300
[   30.628579]  kunit_try_run_case+0x170/0x3f0
[   30.628667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.628738]  kthread+0x328/0x630
[   30.628772]  ret_from_fork+0x10/0x20
[   30.628923] 
[   30.628944] The buggy address belongs to the object at fff00000c64f4900
[   30.628944]  which belongs to the cache kmalloc-128 of size 128
[   30.629044] The buggy address is located 117 bytes inside of
[   30.629044]  allocated 120-byte region [fff00000c64f4900, fff00000c64f4978)
[   30.629194] 
[   30.629241] The buggy address belongs to the physical page:
[   30.629298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.629398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.629528] page_type: f5(slab)
[   30.629593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.629674] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.630039] page dumped because: kasan: bad access detected
[   30.630123] 
[   30.630181] Memory state around the buggy address:
[   30.630213]  fff00000c64f4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.630254]  fff00000c64f4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.630293] >fff00000c64f4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.630478]                                                                 ^
[   30.630643]  fff00000c64f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.630769]  fff00000c64f4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.630881] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   30.428706] ==================================================================
[   30.428775] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   30.428977] Read of size 1 at addr fff00000c9a60000 by task kunit_try_catch/186
[   30.429047] 
[   30.429185] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.429314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.429662] Hardware name: linux,dummy-virt (DT)
[   30.429788] Call trace:
[   30.429813]  show_stack+0x20/0x38 (C)
[   30.429882]  dump_stack_lvl+0x8c/0xd0
[   30.429941]  print_report+0x118/0x5d0
[   30.429987]  kasan_report+0xdc/0x128
[   30.430183]  __asan_report_load1_noabort+0x20/0x30
[   30.430331]  page_alloc_uaf+0x328/0x350
[   30.430575]  kunit_try_run_case+0x170/0x3f0
[   30.430701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.430913]  kthread+0x328/0x630
[   30.431161]  ret_from_fork+0x10/0x20
[   30.431448] 
[   30.431530] The buggy address belongs to the physical page:
[   30.431653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a60
[   30.431780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.432019] page_type: f0(buddy)
[   30.432252] raw: 0bfffe0000000000 fff00000ff616148 fff00000ff616148 0000000000000000
[   30.432325] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   30.432485] page dumped because: kasan: bad access detected
[   30.432566] 
[   30.432633] Memory state around the buggy address:
[   30.432722]  fff00000c9a5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.432796]  fff00000c9a5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.432869] >fff00000c9a60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.432906]                    ^
[   30.433123]  fff00000c9a60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.433417]  fff00000c9a60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.433633] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   30.615754] ==================================================================
[   30.616002] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   30.616122] Write of size 2 at addr fff00000c64f4877 by task kunit_try_catch/204
[   30.616273] 
[   30.616364] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.616480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.616506] Hardware name: linux,dummy-virt (DT)
[   30.616535] Call trace:
[   30.616556]  show_stack+0x20/0x38 (C)
[   30.616611]  dump_stack_lvl+0x8c/0xd0
[   30.616744]  print_report+0x118/0x5d0
[   30.616944]  kasan_report+0xdc/0x128
[   30.616997]  kasan_check_range+0x100/0x1a8
[   30.617129]  __asan_memset+0x34/0x78
[   30.617313]  kmalloc_oob_memset_2+0x150/0x2f8
[   30.617416]  kunit_try_run_case+0x170/0x3f0
[   30.617499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.617549]  kthread+0x328/0x630
[   30.617666]  ret_from_fork+0x10/0x20
[   30.617714] 
[   30.618136] Allocated by task 204:
[   30.618241]  kasan_save_stack+0x3c/0x68
[   30.618319]  kasan_save_track+0x20/0x40
[   30.618357]  kasan_save_alloc_info+0x40/0x58
[   30.618394]  __kasan_kmalloc+0xd4/0xd8
[   30.618461]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.618503]  kmalloc_oob_memset_2+0xb0/0x2f8
[   30.618541]  kunit_try_run_case+0x170/0x3f0
[   30.618577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.618619]  kthread+0x328/0x630
[   30.618650]  ret_from_fork+0x10/0x20
[   30.618685] 
[   30.618705] The buggy address belongs to the object at fff00000c64f4800
[   30.618705]  which belongs to the cache kmalloc-128 of size 128
[   30.618759] The buggy address is located 119 bytes inside of
[   30.618759]  allocated 120-byte region [fff00000c64f4800, fff00000c64f4878)
[   30.618938] 
[   30.618966] The buggy address belongs to the physical page:
[   30.619068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.619182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.619229] page_type: f5(slab)
[   30.619266] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.619314] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.619357] page dumped because: kasan: bad access detected
[   30.619387] 
[   30.619404] Memory state around the buggy address:
[   30.619542]  fff00000c64f4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.619740]  fff00000c64f4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.619788] >fff00000c64f4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.619890]                                                                 ^
[   30.619978]  fff00000c64f4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.620080]  fff00000c64f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.620143] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   30.600403] ==================================================================
[   30.600484] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   30.600607] Write of size 128 at addr fff00000c64f4700 by task kunit_try_catch/202
[   30.600793] 
[   30.600933] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.601295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.601354] Hardware name: linux,dummy-virt (DT)
[   30.601385] Call trace:
[   30.601406]  show_stack+0x20/0x38 (C)
[   30.601709]  dump_stack_lvl+0x8c/0xd0
[   30.602341]  print_report+0x118/0x5d0
[   30.602536]  kasan_report+0xdc/0x128
[   30.602586]  kasan_check_range+0x100/0x1a8
[   30.602644]  __asan_memset+0x34/0x78
[   30.602798]  kmalloc_oob_in_memset+0x144/0x2d0
[   30.602846]  kunit_try_run_case+0x170/0x3f0
[   30.602912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.603234]  kthread+0x328/0x630
[   30.603301]  ret_from_fork+0x10/0x20
[   30.603350] 
[   30.603368] Allocated by task 202:
[   30.603395]  kasan_save_stack+0x3c/0x68
[   30.603446]  kasan_save_track+0x20/0x40
[   30.603495]  kasan_save_alloc_info+0x40/0x58
[   30.603533]  __kasan_kmalloc+0xd4/0xd8
[   30.603766]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.604037]  kmalloc_oob_in_memset+0xb0/0x2d0
[   30.604077]  kunit_try_run_case+0x170/0x3f0
[   30.604113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.604154]  kthread+0x328/0x630
[   30.604499]  ret_from_fork+0x10/0x20
[   30.604564] 
[   30.604859] The buggy address belongs to the object at fff00000c64f4700
[   30.604859]  which belongs to the cache kmalloc-128 of size 128
[   30.605018] The buggy address is located 0 bytes inside of
[   30.605018]  allocated 120-byte region [fff00000c64f4700, fff00000c64f4778)
[   30.605092] 
[   30.605111] The buggy address belongs to the physical page:
[   30.605268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.605644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.605902] page_type: f5(slab)
[   30.606001] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.606049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.606087] page dumped because: kasan: bad access detected
[   30.606142] 
[   30.606160] Memory state around the buggy address:
[   30.606220]  fff00000c64f4600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.606336]  fff00000c64f4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.606502] >fff00000c64f4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.606719]                                                                 ^
[   30.606824]  fff00000c64f4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.606865]  fff00000c64f4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.606901] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   30.586079] ==================================================================
[   30.586276] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   30.586361] Read of size 16 at addr fff00000c648e3a0 by task kunit_try_catch/200
[   30.586742] 
[   30.586788] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.587035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.587063] Hardware name: linux,dummy-virt (DT)
[   30.587100] Call trace:
[   30.587171]  show_stack+0x20/0x38 (C)
[   30.587235]  dump_stack_lvl+0x8c/0xd0
[   30.587399]  print_report+0x118/0x5d0
[   30.587454]  kasan_report+0xdc/0x128
[   30.587497]  __asan_report_load16_noabort+0x20/0x30
[   30.587546]  kmalloc_uaf_16+0x3bc/0x438
[   30.587591]  kunit_try_run_case+0x170/0x3f0
[   30.587646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.587698]  kthread+0x328/0x630
[   30.588224]  ret_from_fork+0x10/0x20
[   30.588562] 
[   30.588586] Allocated by task 200:
[   30.588615]  kasan_save_stack+0x3c/0x68
[   30.588661]  kasan_save_track+0x20/0x40
[   30.588701]  kasan_save_alloc_info+0x40/0x58
[   30.588739]  __kasan_kmalloc+0xd4/0xd8
[   30.588787]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.588827]  kmalloc_uaf_16+0x140/0x438
[   30.589057]  kunit_try_run_case+0x170/0x3f0
[   30.589228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.589270]  kthread+0x328/0x630
[   30.589302]  ret_from_fork+0x10/0x20
[   30.589657] 
[   30.589838] Freed by task 200:
[   30.589905]  kasan_save_stack+0x3c/0x68
[   30.589968]  kasan_save_track+0x20/0x40
[   30.590076]  kasan_save_free_info+0x4c/0x78
[   30.590112]  __kasan_slab_free+0x6c/0x98
[   30.590173]  kfree+0x214/0x3c8
[   30.590207]  kmalloc_uaf_16+0x190/0x438
[   30.590243]  kunit_try_run_case+0x170/0x3f0
[   30.590413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.590466]  kthread+0x328/0x630
[   30.590498]  ret_from_fork+0x10/0x20
[   30.590532] 
[   30.590552] The buggy address belongs to the object at fff00000c648e3a0
[   30.590552]  which belongs to the cache kmalloc-16 of size 16
[   30.590609] The buggy address is located 0 bytes inside of
[   30.590609]  freed 16-byte region [fff00000c648e3a0, fff00000c648e3b0)
[   30.590889] 
[   30.590911] The buggy address belongs to the physical page:
[   30.590961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e
[   30.591229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.591452] page_type: f5(slab)
[   30.591547] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.591601] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.591690] page dumped because: kasan: bad access detected
[   30.591742] 
[   30.591759] Memory state around the buggy address:
[   30.591797]  fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.591887]  fff00000c648e300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.592027] >fff00000c648e380: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.592065]                                ^
[   30.592131]  fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.592297]  fff00000c648e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.592378] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   30.557312] ==================================================================
[   30.557383] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   30.557457] Write of size 16 at addr fff00000c648e360 by task kunit_try_catch/198
[   30.557506] 
[   30.557719] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.557972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.558051] Hardware name: linux,dummy-virt (DT)
[   30.558127] Call trace:
[   30.558160]  show_stack+0x20/0x38 (C)
[   30.558251]  dump_stack_lvl+0x8c/0xd0
[   30.558367]  print_report+0x118/0x5d0
[   30.558502]  kasan_report+0xdc/0x128
[   30.558582]  __asan_report_store16_noabort+0x20/0x30
[   30.558741]  kmalloc_oob_16+0x3a0/0x3f8
[   30.558837]  kunit_try_run_case+0x170/0x3f0
[   30.558898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.558950]  kthread+0x328/0x630
[   30.559048]  ret_from_fork+0x10/0x20
[   30.559204] 
[   30.559224] Allocated by task 198:
[   30.559252]  kasan_save_stack+0x3c/0x68
[   30.559297]  kasan_save_track+0x20/0x40
[   30.559335]  kasan_save_alloc_info+0x40/0x58
[   30.559464]  __kasan_kmalloc+0xd4/0xd8
[   30.559521]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.559598]  kmalloc_oob_16+0xb4/0x3f8
[   30.559746]  kunit_try_run_case+0x170/0x3f0
[   30.559856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.559996]  kthread+0x328/0x630
[   30.560079]  ret_from_fork+0x10/0x20
[   30.560166] 
[   30.560204] The buggy address belongs to the object at fff00000c648e360
[   30.560204]  which belongs to the cache kmalloc-16 of size 16
[   30.560278] The buggy address is located 0 bytes inside of
[   30.560278]  allocated 13-byte region [fff00000c648e360, fff00000c648e36d)
[   30.560384] 
[   30.560424] The buggy address belongs to the physical page:
[   30.560465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e
[   30.560895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.561035] page_type: f5(slab)
[   30.561078] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.561152] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.561528] page dumped because: kasan: bad access detected
[   30.561765] 
[   30.561880] Memory state around the buggy address:
[   30.561959]  fff00000c648e200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.562029]  fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.562135] >fff00000c648e300: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   30.562193]                                                           ^
[   30.562266]  fff00000c648e380: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.562350]  fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.562387] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   30.538916] ==================================================================
[   30.538978] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   30.539224] Read of size 1 at addr fff00000c792ec00 by task kunit_try_catch/196
[   30.539348] 
[   30.539402] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.539524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.539550] Hardware name: linux,dummy-virt (DT)
[   30.539579] Call trace:
[   30.539613]  show_stack+0x20/0x38 (C)
[   30.539662]  dump_stack_lvl+0x8c/0xd0
[   30.539780]  print_report+0x118/0x5d0
[   30.539827]  kasan_report+0xdc/0x128
[   30.539992]  __kasan_check_byte+0x54/0x70
[   30.540045]  krealloc_noprof+0x44/0x360
[   30.540092]  krealloc_uaf+0x180/0x520
[   30.540174]  kunit_try_run_case+0x170/0x3f0
[   30.540239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.540306]  kthread+0x328/0x630
[   30.540368]  ret_from_fork+0x10/0x20
[   30.540417] 
[   30.540447] Allocated by task 196:
[   30.540474]  kasan_save_stack+0x3c/0x68
[   30.540534]  kasan_save_track+0x20/0x40
[   30.540643]  kasan_save_alloc_info+0x40/0x58
[   30.540757]  __kasan_kmalloc+0xd4/0xd8
[   30.540823]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.540866]  krealloc_uaf+0xc8/0x520
[   30.540949]  kunit_try_run_case+0x170/0x3f0
[   30.540985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.541064]  kthread+0x328/0x630
[   30.541097]  ret_from_fork+0x10/0x20
[   30.541138] 
[   30.541165] Freed by task 196:
[   30.541191]  kasan_save_stack+0x3c/0x68
[   30.541265]  kasan_save_track+0x20/0x40
[   30.541489]  kasan_save_free_info+0x4c/0x78
[   30.541540]  __kasan_slab_free+0x6c/0x98
[   30.541579]  kfree+0x214/0x3c8
[   30.541613]  krealloc_uaf+0x12c/0x520
[   30.541771]  kunit_try_run_case+0x170/0x3f0
[   30.541897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.541940]  kthread+0x328/0x630
[   30.541999]  ret_from_fork+0x10/0x20
[   30.542035] 
[   30.542056] The buggy address belongs to the object at fff00000c792ec00
[   30.542056]  which belongs to the cache kmalloc-256 of size 256
[   30.542466] The buggy address is located 0 bytes inside of
[   30.542466]  freed 256-byte region [fff00000c792ec00, fff00000c792ed00)
[   30.542642] 
[   30.542727] The buggy address belongs to the physical page:
[   30.542795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.542899] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.542964] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.543012] page_type: f5(slab)
[   30.543420] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.543519] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.543612] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.543660] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.543958] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.544057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.544172] page dumped because: kasan: bad access detected
[   30.544264] 
[   30.544301] Memory state around the buggy address:
[   30.544332]  fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.544383]  fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.544608] >fff00000c792ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.544688]                    ^
[   30.544716]  fff00000c792ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.544985]  fff00000c792ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.545070] ==================================================================
[   30.546202] ==================================================================
[   30.546249] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   30.546297] Read of size 1 at addr fff00000c792ec00 by task kunit_try_catch/196
[   30.546344] 
[   30.546558] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.546663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.546689] Hardware name: linux,dummy-virt (DT)
[   30.546719] Call trace:
[   30.546762]  show_stack+0x20/0x38 (C)
[   30.546849]  dump_stack_lvl+0x8c/0xd0
[   30.546896]  print_report+0x118/0x5d0
[   30.546940]  kasan_report+0xdc/0x128
[   30.547168]  __asan_report_load1_noabort+0x20/0x30
[   30.547244]  krealloc_uaf+0x4c8/0x520
[   30.547291]  kunit_try_run_case+0x170/0x3f0
[   30.547345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.547397]  kthread+0x328/0x630
[   30.547450]  ret_from_fork+0x10/0x20
[   30.547497] 
[   30.547522] Allocated by task 196:
[   30.547550]  kasan_save_stack+0x3c/0x68
[   30.547599]  kasan_save_track+0x20/0x40
[   30.547637]  kasan_save_alloc_info+0x40/0x58
[   30.547673]  __kasan_kmalloc+0xd4/0xd8
[   30.547738]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.547932]  krealloc_uaf+0xc8/0x520
[   30.547974]  kunit_try_run_case+0x170/0x3f0
[   30.548074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.548140]  kthread+0x328/0x630
[   30.548206]  ret_from_fork+0x10/0x20
[   30.548247] 
[   30.548333] Freed by task 196:
[   30.548425]  kasan_save_stack+0x3c/0x68
[   30.548474]  kasan_save_track+0x20/0x40
[   30.548511]  kasan_save_free_info+0x4c/0x78
[   30.548547]  __kasan_slab_free+0x6c/0x98
[   30.548584]  kfree+0x214/0x3c8
[   30.548616]  krealloc_uaf+0x12c/0x520
[   30.548652]  kunit_try_run_case+0x170/0x3f0
[   30.548686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.549022]  kthread+0x328/0x630
[   30.549160]  ret_from_fork+0x10/0x20
[   30.549196] 
[   30.549215] The buggy address belongs to the object at fff00000c792ec00
[   30.549215]  which belongs to the cache kmalloc-256 of size 256
[   30.549270] The buggy address is located 0 bytes inside of
[   30.549270]  freed 256-byte region [fff00000c792ec00, fff00000c792ed00)
[   30.549556] 
[   30.549653] The buggy address belongs to the physical page:
[   30.549731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.549834] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.549916] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.550011] page_type: f5(slab)
[   30.550087] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.550135] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.550182] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.550459] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.550606] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.550712] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.550830] page dumped because: kasan: bad access detected
[   30.550894] 
[   30.550911] Memory state around the buggy address:
[   30.550941]  fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.550982]  fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.551021] >fff00000c792ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.551255]                    ^
[   30.551334]  fff00000c792ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.551414]  fff00000c792ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.551555] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   30.485506] ==================================================================
[   30.485563] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.485634] Write of size 1 at addr fff00000c792eaea by task kunit_try_catch/190
[   30.485705] 
[   30.485734] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.485960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.486675] Hardware name: linux,dummy-virt (DT)
[   30.486774] Call trace:
[   30.486848]  show_stack+0x20/0x38 (C)
[   30.486938]  dump_stack_lvl+0x8c/0xd0
[   30.487035]  print_report+0x118/0x5d0
[   30.487136]  kasan_report+0xdc/0x128
[   30.487235]  __asan_report_store1_noabort+0x20/0x30
[   30.487374]  krealloc_less_oob_helper+0xae4/0xc50
[   30.487424]  krealloc_less_oob+0x20/0x38
[   30.487661]  kunit_try_run_case+0x170/0x3f0
[   30.487728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.487839]  kthread+0x328/0x630
[   30.487937]  ret_from_fork+0x10/0x20
[   30.488200] 
[   30.488430] Allocated by task 190:
[   30.488512]  kasan_save_stack+0x3c/0x68
[   30.488598]  kasan_save_track+0x20/0x40
[   30.488712]  kasan_save_alloc_info+0x40/0x58
[   30.488778]  __kasan_krealloc+0x118/0x178
[   30.488813]  krealloc_noprof+0x128/0x360
[   30.489082]  krealloc_less_oob_helper+0x168/0xc50
[   30.489179]  krealloc_less_oob+0x20/0x38
[   30.489242]  kunit_try_run_case+0x170/0x3f0
[   30.489279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.489342]  kthread+0x328/0x630
[   30.489383]  ret_from_fork+0x10/0x20
[   30.489418] 
[   30.489448] The buggy address belongs to the object at fff00000c792ea00
[   30.489448]  which belongs to the cache kmalloc-256 of size 256
[   30.489510] The buggy address is located 33 bytes to the right of
[   30.489510]  allocated 201-byte region [fff00000c792ea00, fff00000c792eac9)
[   30.489572] 
[   30.489599] The buggy address belongs to the physical page:
[   30.489662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.489763] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.489901] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.489957] page_type: f5(slab)
[   30.489994] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.490041] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.490123] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.490171] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.490325] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.490413] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.490503] page dumped because: kasan: bad access detected
[   30.490580] 
[   30.490641] Memory state around the buggy address:
[   30.490723]  fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.490834]  fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.490907] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.490943]                                                           ^
[   30.490997]  fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.491042]  fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.491131] ==================================================================
[   30.514263] ==================================================================
[   30.514319] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.514374] Write of size 1 at addr fff00000c9a5a0c9 by task kunit_try_catch/194
[   30.514421] 
[   30.514536] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.514733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.514814] Hardware name: linux,dummy-virt (DT)
[   30.514878] Call trace:
[   30.514986]  show_stack+0x20/0x38 (C)
[   30.515126]  dump_stack_lvl+0x8c/0xd0
[   30.515271]  print_report+0x118/0x5d0
[   30.515398]  kasan_report+0xdc/0x128
[   30.515463]  __asan_report_store1_noabort+0x20/0x30
[   30.515512]  krealloc_less_oob_helper+0xa48/0xc50
[   30.515562]  krealloc_large_less_oob+0x20/0x38
[   30.515610]  kunit_try_run_case+0x170/0x3f0
[   30.515961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.516101]  kthread+0x328/0x630
[   30.516185]  ret_from_fork+0x10/0x20
[   30.516317] 
[   30.516375] The buggy address belongs to the physical page:
[   30.516432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58
[   30.516522] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.516577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.516673] page_type: f8(unknown)
[   30.516762] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.516819] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.516893] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.517204] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.517309] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff
[   30.517403] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.517459] page dumped because: kasan: bad access detected
[   30.517685] 
[   30.517868] Memory state around the buggy address:
[   30.517943]  fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.518091]  fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.518170] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.518245]                                               ^
[   30.518319]  fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.518366]  fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.518476] ==================================================================
[   30.475992] ==================================================================
[   30.476081] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.476133] Write of size 1 at addr fff00000c792ead0 by task kunit_try_catch/190
[   30.476186] 
[   30.476320] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.476575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.476604] Hardware name: linux,dummy-virt (DT)
[   30.476633] Call trace:
[   30.476663]  show_stack+0x20/0x38 (C)
[   30.476723]  dump_stack_lvl+0x8c/0xd0
[   30.476895]  print_report+0x118/0x5d0
[   30.477003]  kasan_report+0xdc/0x128
[   30.477055]  __asan_report_store1_noabort+0x20/0x30
[   30.477109]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.477291]  krealloc_less_oob+0x20/0x38
[   30.477346]  kunit_try_run_case+0x170/0x3f0
[   30.477390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.477452]  kthread+0x328/0x630
[   30.477493]  ret_from_fork+0x10/0x20
[   30.477662] 
[   30.477682] Allocated by task 190:
[   30.477799]  kasan_save_stack+0x3c/0x68
[   30.477852]  kasan_save_track+0x20/0x40
[   30.477921]  kasan_save_alloc_info+0x40/0x58
[   30.477989]  __kasan_krealloc+0x118/0x178
[   30.478026]  krealloc_noprof+0x128/0x360
[   30.478134]  krealloc_less_oob_helper+0x168/0xc50
[   30.478219]  krealloc_less_oob+0x20/0x38
[   30.478343]  kunit_try_run_case+0x170/0x3f0
[   30.478505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.478604]  kthread+0x328/0x630
[   30.478681]  ret_from_fork+0x10/0x20
[   30.478778] 
[   30.478799] The buggy address belongs to the object at fff00000c792ea00
[   30.478799]  which belongs to the cache kmalloc-256 of size 256
[   30.478854] The buggy address is located 7 bytes to the right of
[   30.478854]  allocated 201-byte region [fff00000c792ea00, fff00000c792eac9)
[   30.478931] 
[   30.478951] The buggy address belongs to the physical page:
[   30.479328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.479477] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.479530] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.479647] page_type: f5(slab)
[   30.479784] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.479869] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.479955] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.480064] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.480198] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.480246] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.480304] page dumped because: kasan: bad access detected
[   30.480523] 
[   30.480665] Memory state around the buggy address:
[   30.480739]  fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.480822]  fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.480863] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.480919]                                                  ^
[   30.480962]  fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.481005]  fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.481041] ==================================================================
[   30.525322] ==================================================================
[   30.525356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.525426] Write of size 1 at addr fff00000c9a5a0ea by task kunit_try_catch/194
[   30.525540] 
[   30.525567] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.525659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.525684] Hardware name: linux,dummy-virt (DT)
[   30.525712] Call trace:
[   30.525889]  show_stack+0x20/0x38 (C)
[   30.525937]  dump_stack_lvl+0x8c/0xd0
[   30.526107]  print_report+0x118/0x5d0
[   30.526287]  kasan_report+0xdc/0x128
[   30.526407]  __asan_report_store1_noabort+0x20/0x30
[   30.526534]  krealloc_less_oob_helper+0xae4/0xc50
[   30.526664]  krealloc_large_less_oob+0x20/0x38
[   30.526796]  kunit_try_run_case+0x170/0x3f0
[   30.526926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.527064]  kthread+0x328/0x630
[   30.527124]  ret_from_fork+0x10/0x20
[   30.527180] 
[   30.527429] The buggy address belongs to the physical page:
[   30.527531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58
[   30.527674] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.527781] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.527925] page_type: f8(unknown)
[   30.527990] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.528076] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.528188] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.528311] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.528360] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff
[   30.528606] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.528818] page dumped because: kasan: bad access detected
[   30.528918] 
[   30.528995] Memory state around the buggy address:
[   30.529128]  fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.529233]  fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.529330] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.529379]                                                           ^
[   30.529454]  fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.529572]  fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.529609] ==================================================================
[   30.519129] ==================================================================
[   30.519174] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.519227] Write of size 1 at addr fff00000c9a5a0d0 by task kunit_try_catch/194
[   30.519273] 
[   30.519309] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.519388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.519413] Hardware name: linux,dummy-virt (DT)
[   30.519459] Call trace:
[   30.519479]  show_stack+0x20/0x38 (C)
[   30.519526]  dump_stack_lvl+0x8c/0xd0
[   30.519725]  print_report+0x118/0x5d0
[   30.519790]  kasan_report+0xdc/0x128
[   30.519839]  __asan_report_store1_noabort+0x20/0x30
[   30.519889]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.519938]  krealloc_large_less_oob+0x20/0x38
[   30.519995]  kunit_try_run_case+0x170/0x3f0
[   30.520041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.520092]  kthread+0x328/0x630
[   30.520136]  ret_from_fork+0x10/0x20
[   30.520183] 
[   30.520202] The buggy address belongs to the physical page:
[   30.520237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58
[   30.520288] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.520335] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.520383] page_type: f8(unknown)
[   30.520420] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.520766] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.520826] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.520978] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.521036] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff
[   30.521094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.521170] page dumped because: kasan: bad access detected
[   30.521201] 
[   30.521218] Memory state around the buggy address:
[   30.521264]  fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.521322]  fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.521420] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.521475]                                                  ^
[   30.521511]  fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.521611]  fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.521704] ==================================================================
[   30.522364] ==================================================================
[   30.522408] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.522508] Write of size 1 at addr fff00000c9a5a0da by task kunit_try_catch/194
[   30.522574] 
[   30.522631] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.522711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.522762] Hardware name: linux,dummy-virt (DT)
[   30.522809] Call trace:
[   30.522873]  show_stack+0x20/0x38 (C)
[   30.522939]  dump_stack_lvl+0x8c/0xd0
[   30.523004]  print_report+0x118/0x5d0
[   30.523068]  kasan_report+0xdc/0x128
[   30.523139]  __asan_report_store1_noabort+0x20/0x30
[   30.523188]  krealloc_less_oob_helper+0xa80/0xc50
[   30.523237]  krealloc_large_less_oob+0x20/0x38
[   30.523284]  kunit_try_run_case+0x170/0x3f0
[   30.523503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.523565]  kthread+0x328/0x630
[   30.523689]  ret_from_fork+0x10/0x20
[   30.523755] 
[   30.523804] The buggy address belongs to the physical page:
[   30.523876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58
[   30.523928] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.523972] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.524019] page_type: f8(unknown)
[   30.524055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.524140] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.524207] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.524262] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.524337] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff
[   30.524671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.524788] page dumped because: kasan: bad access detected
[   30.524836] 
[   30.524875] Memory state around the buggy address:
[   30.524923]  fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.524965]  fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.525042] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.525079]                                                     ^
[   30.525113]  fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.525181]  fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.525245] ==================================================================
[   30.470901] ==================================================================
[   30.470960] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.471030] Write of size 1 at addr fff00000c792eac9 by task kunit_try_catch/190
[   30.471158] 
[   30.471192] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.471274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.471299] Hardware name: linux,dummy-virt (DT)
[   30.471329] Call trace:
[   30.471350]  show_stack+0x20/0x38 (C)
[   30.471397]  dump_stack_lvl+0x8c/0xd0
[   30.471485]  print_report+0x118/0x5d0
[   30.471528]  kasan_report+0xdc/0x128
[   30.471572]  __asan_report_store1_noabort+0x20/0x30
[   30.471622]  krealloc_less_oob_helper+0xa48/0xc50
[   30.471853]  krealloc_less_oob+0x20/0x38
[   30.472001]  kunit_try_run_case+0x170/0x3f0
[   30.472058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.472151]  kthread+0x328/0x630
[   30.472279]  ret_from_fork+0x10/0x20
[   30.472409] 
[   30.472532] Allocated by task 190:
[   30.472603]  kasan_save_stack+0x3c/0x68
[   30.472656]  kasan_save_track+0x20/0x40
[   30.472694]  kasan_save_alloc_info+0x40/0x58
[   30.472730]  __kasan_krealloc+0x118/0x178
[   30.472765]  krealloc_noprof+0x128/0x360
[   30.472814]  krealloc_less_oob_helper+0x168/0xc50
[   30.472863]  krealloc_less_oob+0x20/0x38
[   30.472900]  kunit_try_run_case+0x170/0x3f0
[   30.472935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.472977]  kthread+0x328/0x630
[   30.473021]  ret_from_fork+0x10/0x20
[   30.473065] 
[   30.473084] The buggy address belongs to the object at fff00000c792ea00
[   30.473084]  which belongs to the cache kmalloc-256 of size 256
[   30.473148] The buggy address is located 0 bytes to the right of
[   30.473148]  allocated 201-byte region [fff00000c792ea00, fff00000c792eac9)
[   30.473209] 
[   30.473228] The buggy address belongs to the physical page:
[   30.473260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.473333] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.473405] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.473467] page_type: f5(slab)
[   30.473505] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.473552] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.473599] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.473646] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.473719] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.474079] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.474210] page dumped because: kasan: bad access detected
[   30.474309] 
[   30.474460] Memory state around the buggy address:
[   30.474590]  fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.474659]  fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.474727] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.474832]                                               ^
[   30.475046]  fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.475092]  fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.475132] ==================================================================
[   30.492491] ==================================================================
[   30.492545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.492595] Write of size 1 at addr fff00000c792eaeb by task kunit_try_catch/190
[   30.492642] 
[   30.492679] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.492760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.492785] Hardware name: linux,dummy-virt (DT)
[   30.492982] Call trace:
[   30.493044]  show_stack+0x20/0x38 (C)
[   30.493098]  dump_stack_lvl+0x8c/0xd0
[   30.493145]  print_report+0x118/0x5d0
[   30.493198]  kasan_report+0xdc/0x128
[   30.493242]  __asan_report_store1_noabort+0x20/0x30
[   30.493290]  krealloc_less_oob_helper+0xa58/0xc50
[   30.493339]  krealloc_less_oob+0x20/0x38
[   30.493385]  kunit_try_run_case+0x170/0x3f0
[   30.493462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.493514]  kthread+0x328/0x630
[   30.493554]  ret_from_fork+0x10/0x20
[   30.493611] 
[   30.493676] Allocated by task 190:
[   30.493704]  kasan_save_stack+0x3c/0x68
[   30.494022]  kasan_save_track+0x20/0x40
[   30.494136]  kasan_save_alloc_info+0x40/0x58
[   30.494176]  __kasan_krealloc+0x118/0x178
[   30.494211]  krealloc_noprof+0x128/0x360
[   30.494275]  krealloc_less_oob_helper+0x168/0xc50
[   30.494316]  krealloc_less_oob+0x20/0x38
[   30.494352]  kunit_try_run_case+0x170/0x3f0
[   30.494626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.494745]  kthread+0x328/0x630
[   30.494816]  ret_from_fork+0x10/0x20
[   30.494918] 
[   30.494987] The buggy address belongs to the object at fff00000c792ea00
[   30.494987]  which belongs to the cache kmalloc-256 of size 256
[   30.495043] The buggy address is located 34 bytes to the right of
[   30.495043]  allocated 201-byte region [fff00000c792ea00, fff00000c792eac9)
[   30.495368] 
[   30.495501] The buggy address belongs to the physical page:
[   30.495646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.495715] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.495759] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.496082] page_type: f5(slab)
[   30.496172] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.496269] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.496363] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.496415] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.496478] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.496534] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.496573] page dumped because: kasan: bad access detected
[   30.496605] 
[   30.496622] Memory state around the buggy address:
[   30.496652]  fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.496692]  fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.496733] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.496768]                                                           ^
[   30.496812]  fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.496868]  fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.496913] ==================================================================
[   30.481732] ==================================================================
[   30.481777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.481896] Write of size 1 at addr fff00000c792eada by task kunit_try_catch/190
[   30.482045] 
[   30.482081] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.482272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.482319] Hardware name: linux,dummy-virt (DT)
[   30.482349] Call trace:
[   30.482369]  show_stack+0x20/0x38 (C)
[   30.482419]  dump_stack_lvl+0x8c/0xd0
[   30.482482]  print_report+0x118/0x5d0
[   30.482525]  kasan_report+0xdc/0x128
[   30.482585]  __asan_report_store1_noabort+0x20/0x30
[   30.482660]  krealloc_less_oob_helper+0xa80/0xc50
[   30.482715]  krealloc_less_oob+0x20/0x38
[   30.482782]  kunit_try_run_case+0x170/0x3f0
[   30.482846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.482909]  kthread+0x328/0x630
[   30.482950]  ret_from_fork+0x10/0x20
[   30.482997] 
[   30.483015] Allocated by task 190:
[   30.483064]  kasan_save_stack+0x3c/0x68
[   30.483105]  kasan_save_track+0x20/0x40
[   30.483187]  kasan_save_alloc_info+0x40/0x58
[   30.483318]  __kasan_krealloc+0x118/0x178
[   30.483373]  krealloc_noprof+0x128/0x360
[   30.483472]  krealloc_less_oob_helper+0x168/0xc50
[   30.483552]  krealloc_less_oob+0x20/0x38
[   30.483608]  kunit_try_run_case+0x170/0x3f0
[   30.483645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.483750]  kthread+0x328/0x630
[   30.483808]  ret_from_fork+0x10/0x20
[   30.483843] 
[   30.483892] The buggy address belongs to the object at fff00000c792ea00
[   30.483892]  which belongs to the cache kmalloc-256 of size 256
[   30.483948] The buggy address is located 17 bytes to the right of
[   30.483948]  allocated 201-byte region [fff00000c792ea00, fff00000c792eac9)
[   30.484009] 
[   30.484027] The buggy address belongs to the physical page:
[   30.484076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.484178] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.484223] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.484298] page_type: f5(slab)
[   30.484366] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.484415] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.484561] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.484704] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.484758] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.484823] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.484919] page dumped because: kasan: bad access detected
[   30.484956] 
[   30.484974] Memory state around the buggy address:
[   30.485031]  fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.485117]  fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.485196] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.485232]                                                     ^
[   30.485267]  fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.485306]  fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.485342] ==================================================================
[   30.530847] ==================================================================
[   30.530897] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.531238] Write of size 1 at addr fff00000c9a5a0eb by task kunit_try_catch/194
[   30.531350] 
[   30.531384] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.531519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.531545] Hardware name: linux,dummy-virt (DT)
[   30.531574] Call trace:
[   30.531612]  show_stack+0x20/0x38 (C)
[   30.531675]  dump_stack_lvl+0x8c/0xd0
[   30.531740]  print_report+0x118/0x5d0
[   30.531784]  kasan_report+0xdc/0x128
[   30.531831]  __asan_report_store1_noabort+0x20/0x30
[   30.531899]  krealloc_less_oob_helper+0xa58/0xc50
[   30.531949]  krealloc_large_less_oob+0x20/0x38
[   30.531997]  kunit_try_run_case+0x170/0x3f0
[   30.532042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.532092]  kthread+0x328/0x630
[   30.532143]  ret_from_fork+0x10/0x20
[   30.532190] 
[   30.532208] The buggy address belongs to the physical page:
[   30.532237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58
[   30.532287] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.532331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.532378] page_type: f8(unknown)
[   30.532413] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.532471] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.532518] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.532564] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.532611] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff
[   30.532657] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.532694] page dumped because: kasan: bad access detected
[   30.532723] 
[   30.532751] Memory state around the buggy address:
[   30.532780]  fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.532820]  fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.532860] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.532895]                                                           ^
[   30.532930]  fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.532969]  fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.533005] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   30.451901] ==================================================================
[   30.451976] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.452040] Write of size 1 at addr fff00000c792e8eb by task kunit_try_catch/188
[   30.452089] 
[   30.452126] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.452208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.452233] Hardware name: linux,dummy-virt (DT)
[   30.452264] Call trace:
[   30.452328]  show_stack+0x20/0x38 (C)
[   30.453190]  dump_stack_lvl+0x8c/0xd0
[   30.453256]  print_report+0x118/0x5d0
[   30.453303]  kasan_report+0xdc/0x128
[   30.453346]  __asan_report_store1_noabort+0x20/0x30
[   30.453395]  krealloc_more_oob_helper+0x60c/0x678
[   30.453454]  krealloc_more_oob+0x20/0x38
[   30.453500]  kunit_try_run_case+0x170/0x3f0
[   30.454349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.454422]  kthread+0x328/0x630
[   30.454755]  ret_from_fork+0x10/0x20
[   30.454807] 
[   30.454826] Allocated by task 188:
[   30.454854]  kasan_save_stack+0x3c/0x68
[   30.454899]  kasan_save_track+0x20/0x40
[   30.454938]  kasan_save_alloc_info+0x40/0x58
[   30.454976]  __kasan_krealloc+0x118/0x178
[   30.455011]  krealloc_noprof+0x128/0x360
[   30.455049]  krealloc_more_oob_helper+0x168/0x678
[   30.455090]  krealloc_more_oob+0x20/0x38
[   30.455133]  kunit_try_run_case+0x170/0x3f0
[   30.455168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.455209]  kthread+0x328/0x630
[   30.455240]  ret_from_fork+0x10/0x20
[   30.455275] 
[   30.455295] The buggy address belongs to the object at fff00000c792e800
[   30.455295]  which belongs to the cache kmalloc-256 of size 256
[   30.455351] The buggy address is located 0 bytes to the right of
[   30.455351]  allocated 235-byte region [fff00000c792e800, fff00000c792e8eb)
[   30.455412] 
[   30.455431] The buggy address belongs to the physical page:
[   30.455510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.455699] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.455745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.455798] page_type: f5(slab)
[   30.455838] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.455888] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.455988] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.456555] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.456673] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.456737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.456805] page dumped because: kasan: bad access detected
[   30.456836] 
[   30.456853] Memory state around the buggy address:
[   30.456887]  fff00000c792e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.457071]  fff00000c792e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.457152] >fff00000c792e880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.457239]                                                           ^
[   30.457388]  fff00000c792e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.457517]  fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.457565] ==================================================================
[   30.503457] ==================================================================
[   30.503523] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.503587] Write of size 1 at addr fff00000c9a5a0eb by task kunit_try_catch/192
[   30.503635] 
[   30.503667] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.503763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.503788] Hardware name: linux,dummy-virt (DT)
[   30.503825] Call trace:
[   30.503846]  show_stack+0x20/0x38 (C)
[   30.503895]  dump_stack_lvl+0x8c/0xd0
[   30.503943]  print_report+0x118/0x5d0
[   30.503987]  kasan_report+0xdc/0x128
[   30.504030]  __asan_report_store1_noabort+0x20/0x30
[   30.504079]  krealloc_more_oob_helper+0x60c/0x678
[   30.504127]  krealloc_large_more_oob+0x20/0x38
[   30.504175]  kunit_try_run_case+0x170/0x3f0
[   30.504229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.504280]  kthread+0x328/0x630
[   30.504322]  ret_from_fork+0x10/0x20
[   30.504368] 
[   30.504393] The buggy address belongs to the physical page:
[   30.504424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58
[   30.504488] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.504534] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.504582] page_type: f8(unknown)
[   30.504619] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.504667] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.504714] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.504759] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.505134] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff
[   30.505322] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.505388] page dumped because: kasan: bad access detected
[   30.505451] 
[   30.505469] Memory state around the buggy address:
[   30.505500]  fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.505547]  fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.505592] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.505664]                                                           ^
[   30.505745]  fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.505845]  fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.505914] ==================================================================
[   30.458780] ==================================================================
[   30.458828] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.458878] Write of size 1 at addr fff00000c792e8f0 by task kunit_try_catch/188
[   30.458925] 
[   30.458956] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.459036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.459121] Hardware name: linux,dummy-virt (DT)
[   30.459165] Call trace:
[   30.459231]  show_stack+0x20/0x38 (C)
[   30.459287]  dump_stack_lvl+0x8c/0xd0
[   30.459339]  print_report+0x118/0x5d0
[   30.459451]  kasan_report+0xdc/0x128
[   30.459801]  __asan_report_store1_noabort+0x20/0x30
[   30.459953]  krealloc_more_oob_helper+0x5c0/0x678
[   30.460114]  krealloc_more_oob+0x20/0x38
[   30.460161]  kunit_try_run_case+0x170/0x3f0
[   30.460206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.460257]  kthread+0x328/0x630
[   30.460299]  ret_from_fork+0x10/0x20
[   30.460346] 
[   30.460364] Allocated by task 188:
[   30.461658]  kasan_save_stack+0x3c/0x68
[   30.461883]  kasan_save_track+0x20/0x40
[   30.461922]  kasan_save_alloc_info+0x40/0x58
[   30.461960]  __kasan_krealloc+0x118/0x178
[   30.462600]  krealloc_noprof+0x128/0x360
[   30.462651]  krealloc_more_oob_helper+0x168/0x678
[   30.462692]  krealloc_more_oob+0x20/0x38
[   30.462729]  kunit_try_run_case+0x170/0x3f0
[   30.462765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.462807]  kthread+0x328/0x630
[   30.462838]  ret_from_fork+0x10/0x20
[   30.462874] 
[   30.462893] The buggy address belongs to the object at fff00000c792e800
[   30.462893]  which belongs to the cache kmalloc-256 of size 256
[   30.462948] The buggy address is located 5 bytes to the right of
[   30.462948]  allocated 235-byte region [fff00000c792e800, fff00000c792e8eb)
[   30.463009] 
[   30.463028] The buggy address belongs to the physical page:
[   30.463058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.463138] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.463285] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.463365] page_type: f5(slab)
[   30.463468] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.463782] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.464015] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.464121] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.464186] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.464240] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.464279] page dumped because: kasan: bad access detected
[   30.464326] 
[   30.464343] Memory state around the buggy address:
[   30.464382]  fff00000c792e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.464423]  fff00000c792e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.464476] >fff00000c792e880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.464534]                                                              ^
[   30.464571]  fff00000c792e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.464619]  fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.464665] ==================================================================
[   30.506356] ==================================================================
[   30.506401] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.506482] Write of size 1 at addr fff00000c9a5a0f0 by task kunit_try_catch/192
[   30.506557] 
[   30.506606] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.506726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.506751] Hardware name: linux,dummy-virt (DT)
[   30.506780] Call trace:
[   30.506799]  show_stack+0x20/0x38 (C)
[   30.506846]  dump_stack_lvl+0x8c/0xd0
[   30.506892]  print_report+0x118/0x5d0
[   30.507079]  kasan_report+0xdc/0x128
[   30.507168]  __asan_report_store1_noabort+0x20/0x30
[   30.507223]  krealloc_more_oob_helper+0x5c0/0x678
[   30.507273]  krealloc_large_more_oob+0x20/0x38
[   30.507320]  kunit_try_run_case+0x170/0x3f0
[   30.507365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.507417]  kthread+0x328/0x630
[   30.507497]  ret_from_fork+0x10/0x20
[   30.507545] 
[   30.507582] The buggy address belongs to the physical page:
[   30.507728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58
[   30.507860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.507910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.507959] page_type: f8(unknown)
[   30.507995] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.508235] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.508354] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.508410] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.508477] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff
[   30.508543] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.508620] page dumped because: kasan: bad access detected
[   30.508650] 
[   30.508703] Memory state around the buggy address:
[   30.508751]  fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.508797]  fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.508838] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.508898]                                                              ^
[   30.508954]  fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.509184]  fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.509271] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   30.391658] ==================================================================
[   30.391803] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   30.392068] Free of addr fff00000c92fc001 by task kunit_try_catch/182
[   30.392131] 
[   30.392173] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.392838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.392931] Hardware name: linux,dummy-virt (DT)
[   30.393006] Call trace:
[   30.393031]  show_stack+0x20/0x38 (C)
[   30.393234]  dump_stack_lvl+0x8c/0xd0
[   30.393445]  print_report+0x118/0x5d0
[   30.393510]  kasan_report_invalid_free+0xc0/0xe8
[   30.393642]  __kasan_kfree_large+0x5c/0xa8
[   30.393746]  free_large_kmalloc+0x68/0x150
[   30.393893]  kfree+0x270/0x3c8
[   30.394024]  kmalloc_large_invalid_free+0x108/0x270
[   30.394098]  kunit_try_run_case+0x170/0x3f0
[   30.394517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.394661]  kthread+0x328/0x630
[   30.394759]  ret_from_fork+0x10/0x20
[   30.394862] 
[   30.395001] The buggy address belongs to the physical page:
[   30.395223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1092fc
[   30.395553] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.395670] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.395997] page_type: f8(unknown)
[   30.396149] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.396255] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.396388] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.396493] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.396547] head: 0bfffe0000000002 ffffc1ffc324bf01 00000000ffffffff 00000000ffffffff
[   30.396769] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.397069] page dumped because: kasan: bad access detected
[   30.397147] 
[   30.397292] Memory state around the buggy address:
[   30.397387]  fff00000c92fbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.397700]  fff00000c92fbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.397986] >fff00000c92fc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.398083]                    ^
[   30.398307]  fff00000c92fc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.398421]  fff00000c92fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.398680] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   30.372065] ==================================================================
[   30.372150] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   30.372946] Read of size 1 at addr fff00000c92fc000 by task kunit_try_catch/180
[   30.373067] 
[   30.373109] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.373508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.373543] Hardware name: linux,dummy-virt (DT)
[   30.373601] Call trace:
[   30.373626]  show_stack+0x20/0x38 (C)
[   30.373965]  dump_stack_lvl+0x8c/0xd0
[   30.374153]  print_report+0x118/0x5d0
[   30.374296]  kasan_report+0xdc/0x128
[   30.374400]  __asan_report_load1_noabort+0x20/0x30
[   30.374473]  kmalloc_large_uaf+0x2cc/0x2f8
[   30.374755]  kunit_try_run_case+0x170/0x3f0
[   30.375291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.375378]  kthread+0x328/0x630
[   30.375462]  ret_from_fork+0x10/0x20
[   30.375516] 
[   30.375538] The buggy address belongs to the physical page:
[   30.375580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1092fc
[   30.375643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.375736] raw: 0bfffe0000000000 fff00000da454d00 fff00000da454d00 0000000000000000
[   30.375784] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   30.375822] page dumped because: kasan: bad access detected
[   30.375853] 
[   30.375879] Memory state around the buggy address:
[   30.375911]  fff00000c92fbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.375961]  fff00000c92fbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.376001] >fff00000c92fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.376037]                    ^
[   30.376065]  fff00000c92fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.376114]  fff00000c92fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.376150] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   30.352015] ==================================================================
[   30.352134] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   30.352551] Write of size 1 at addr fff00000c92fe00a by task kunit_try_catch/178
[   30.352622] 
[   30.352690] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.353125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.353161] Hardware name: linux,dummy-virt (DT)
[   30.353289] Call trace:
[   30.353510]  show_stack+0x20/0x38 (C)
[   30.353616]  dump_stack_lvl+0x8c/0xd0
[   30.353764]  print_report+0x118/0x5d0
[   30.353811]  kasan_report+0xdc/0x128
[   30.353853]  __asan_report_store1_noabort+0x20/0x30
[   30.353901]  kmalloc_large_oob_right+0x278/0x2b8
[   30.354364]  kunit_try_run_case+0x170/0x3f0
[   30.354488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.354603]  kthread+0x328/0x630
[   30.354771]  ret_from_fork+0x10/0x20
[   30.354876] 
[   30.355113] The buggy address belongs to the physical page:
[   30.355197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1092fc
[   30.355496] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.355647] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.355744] page_type: f8(unknown)
[   30.355851] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.356143] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.356297] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.356378] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.356649] head: 0bfffe0000000002 ffffc1ffc324bf01 00000000ffffffff 00000000ffffffff
[   30.356816] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.356957] page dumped because: kasan: bad access detected
[   30.357197] 
[   30.357245] Memory state around the buggy address:
[   30.357415]  fff00000c92fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.357719]  fff00000c92fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.357789] >fff00000c92fe000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.357852]                       ^
[   30.357937]  fff00000c92fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.357995]  fff00000c92fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.358068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   30.329004] ==================================================================
[   30.329482] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   30.329652] Write of size 1 at addr fff00000c658df00 by task kunit_try_catch/176
[   30.330019] 
[   30.330157] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.330338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.330499] Hardware name: linux,dummy-virt (DT)
[   30.330590] Call trace:
[   30.330770]  show_stack+0x20/0x38 (C)
[   30.330847]  dump_stack_lvl+0x8c/0xd0
[   30.331038]  print_report+0x118/0x5d0
[   30.331289]  kasan_report+0xdc/0x128
[   30.331411]  __asan_report_store1_noabort+0x20/0x30
[   30.331569]  kmalloc_big_oob_right+0x2a4/0x2f0
[   30.331835]  kunit_try_run_case+0x170/0x3f0
[   30.331990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.332253]  kthread+0x328/0x630
[   30.332399]  ret_from_fork+0x10/0x20
[   30.332660] 
[   30.332903] Allocated by task 176:
[   30.333474]  kasan_save_stack+0x3c/0x68
[   30.333710]  kasan_save_track+0x20/0x40
[   30.334038]  kasan_save_alloc_info+0x40/0x58
[   30.334292]  __kasan_kmalloc+0xd4/0xd8
[   30.334507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.334564]  kmalloc_big_oob_right+0xb8/0x2f0
[   30.334801]  kunit_try_run_case+0x170/0x3f0
[   30.335104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.335463]  kthread+0x328/0x630
[   30.335662]  ret_from_fork+0x10/0x20
[   30.336025] 
[   30.336194] The buggy address belongs to the object at fff00000c658c000
[   30.336194]  which belongs to the cache kmalloc-8k of size 8192
[   30.336378] The buggy address is located 0 bytes to the right of
[   30.336378]  allocated 7936-byte region [fff00000c658c000, fff00000c658df00)
[   30.336566] 
[   30.336697] The buggy address belongs to the physical page:
[   30.336754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106588
[   30.336919] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.336989] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.337396] page_type: f5(slab)
[   30.337519] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   30.337983] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.338084] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   30.338242] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.338290] head: 0bfffe0000000003 ffffc1ffc3196201 00000000ffffffff 00000000ffffffff
[   30.338505] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.338616] page dumped because: kasan: bad access detected
[   30.338894] 
[   30.339105] Memory state around the buggy address:
[   30.339532]  fff00000c658de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.339738]  fff00000c658de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.339986] >fff00000c658df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.340074]                    ^
[   30.340208]  fff00000c658df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.340254]  fff00000c658e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.340346] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   30.309936] ==================================================================
[   30.310009] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   30.310226] Write of size 1 at addr fff00000c64f4578 by task kunit_try_catch/174
[   30.310290] 
[   30.310353] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.310483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.310574] Hardware name: linux,dummy-virt (DT)
[   30.310643] Call trace:
[   30.310713]  show_stack+0x20/0x38 (C)
[   30.310809]  dump_stack_lvl+0x8c/0xd0
[   30.310887]  print_report+0x118/0x5d0
[   30.310932]  kasan_report+0xdc/0x128
[   30.311238]  __asan_report_store1_noabort+0x20/0x30
[   30.311382]  kmalloc_track_caller_oob_right+0x40c/0x488
[   30.311536]  kunit_try_run_case+0x170/0x3f0
[   30.311604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.311948]  kthread+0x328/0x630
[   30.312037]  ret_from_fork+0x10/0x20
[   30.312174] 
[   30.312276] Allocated by task 174:
[   30.312326]  kasan_save_stack+0x3c/0x68
[   30.312371]  kasan_save_track+0x20/0x40
[   30.312617]  kasan_save_alloc_info+0x40/0x58
[   30.312793]  __kasan_kmalloc+0xd4/0xd8
[   30.312895]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.312981]  kmalloc_track_caller_oob_right+0xa8/0x488
[   30.313035]  kunit_try_run_case+0x170/0x3f0
[   30.313098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.313332]  kthread+0x328/0x630
[   30.313487]  ret_from_fork+0x10/0x20
[   30.313665] 
[   30.313719] The buggy address belongs to the object at fff00000c64f4500
[   30.313719]  which belongs to the cache kmalloc-128 of size 128
[   30.313795] The buggy address is located 0 bytes to the right of
[   30.313795]  allocated 120-byte region [fff00000c64f4500, fff00000c64f4578)
[   30.313870] 
[   30.313897] The buggy address belongs to the physical page:
[   30.313930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.313983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.314033] page_type: f5(slab)
[   30.314075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.314173] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.314310] page dumped because: kasan: bad access detected
[   30.314403] 
[   30.314493] Memory state around the buggy address:
[   30.314597]  fff00000c64f4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.314681]  fff00000c64f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.314740] >fff00000c64f4500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.314791]                                                                 ^
[   30.314830]  fff00000c64f4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.315002]  fff00000c64f4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.315188] ==================================================================
[   30.316350] ==================================================================
[   30.316429] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   30.316597] Write of size 1 at addr fff00000c64f4678 by task kunit_try_catch/174
[   30.316653] 
[   30.316806] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.316916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.316943] Hardware name: linux,dummy-virt (DT)
[   30.316978] Call trace:
[   30.317002]  show_stack+0x20/0x38 (C)
[   30.317078]  dump_stack_lvl+0x8c/0xd0
[   30.317128]  print_report+0x118/0x5d0
[   30.317172]  kasan_report+0xdc/0x128
[   30.317359]  __asan_report_store1_noabort+0x20/0x30
[   30.317420]  kmalloc_track_caller_oob_right+0x418/0x488
[   30.317511]  kunit_try_run_case+0x170/0x3f0
[   30.317558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.317609]  kthread+0x328/0x630
[   30.317807]  ret_from_fork+0x10/0x20
[   30.317872] 
[   30.317957] Allocated by task 174:
[   30.318024]  kasan_save_stack+0x3c/0x68
[   30.318107]  kasan_save_track+0x20/0x40
[   30.318214]  kasan_save_alloc_info+0x40/0x58
[   30.318313]  __kasan_kmalloc+0xd4/0xd8
[   30.318404]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.318502]  kmalloc_track_caller_oob_right+0x184/0x488
[   30.318894]  kunit_try_run_case+0x170/0x3f0
[   30.318992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.319078]  kthread+0x328/0x630
[   30.319131]  ret_from_fork+0x10/0x20
[   30.319224] 
[   30.319262] The buggy address belongs to the object at fff00000c64f4600
[   30.319262]  which belongs to the cache kmalloc-128 of size 128
[   30.319355] The buggy address is located 0 bytes to the right of
[   30.319355]  allocated 120-byte region [fff00000c64f4600, fff00000c64f4678)
[   30.319418] 
[   30.319448] The buggy address belongs to the physical page:
[   30.319479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.319678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.319836] page_type: f5(slab)
[   30.319879] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.320049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.320176] page dumped because: kasan: bad access detected
[   30.320268] 
[   30.320353] Memory state around the buggy address:
[   30.320453]  fff00000c64f4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.320533]  fff00000c64f4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.320644] >fff00000c64f4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.320723]                                                                 ^
[   30.320781]  fff00000c64f4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.321108]  fff00000c64f4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.321331] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   30.296498] ==================================================================
[   30.296629] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   30.296699] Read of size 1 at addr fff00000c9a07000 by task kunit_try_catch/172
[   30.296813] 
[   30.297196] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.297287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.297313] Hardware name: linux,dummy-virt (DT)
[   30.297413] Call trace:
[   30.297456]  show_stack+0x20/0x38 (C)
[   30.297509]  dump_stack_lvl+0x8c/0xd0
[   30.297558]  print_report+0x118/0x5d0
[   30.297601]  kasan_report+0xdc/0x128
[   30.297765]  __asan_report_load1_noabort+0x20/0x30
[   30.297991]  kmalloc_node_oob_right+0x2f4/0x330
[   30.298099]  kunit_try_run_case+0x170/0x3f0
[   30.298188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.298269]  kthread+0x328/0x630
[   30.298366]  ret_from_fork+0x10/0x20
[   30.298502] 
[   30.298550] Allocated by task 172:
[   30.298615]  kasan_save_stack+0x3c/0x68
[   30.298669]  kasan_save_track+0x20/0x40
[   30.298708]  kasan_save_alloc_info+0x40/0x58
[   30.298744]  __kasan_kmalloc+0xd4/0xd8
[   30.298781]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   30.298830]  kmalloc_node_oob_right+0xbc/0x330
[   30.298869]  kunit_try_run_case+0x170/0x3f0
[   30.298904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.298945]  kthread+0x328/0x630
[   30.298976]  ret_from_fork+0x10/0x20
[   30.299012] 
[   30.299032] The buggy address belongs to the object at fff00000c9a06000
[   30.299032]  which belongs to the cache kmalloc-4k of size 4096
[   30.299088] The buggy address is located 0 bytes to the right of
[   30.299088]  allocated 4096-byte region [fff00000c9a06000, fff00000c9a07000)
[   30.299307] 
[   30.299353] The buggy address belongs to the physical page:
[   30.299472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a00
[   30.299753] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.299831] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.299955] page_type: f5(slab)
[   30.300014] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   30.300086] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.300142] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   30.300201] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.300702] head: 0bfffe0000000003 ffffc1ffc3268001 00000000ffffffff 00000000ffffffff
[   30.300759] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.300808] page dumped because: kasan: bad access detected
[   30.300838] 
[   30.300855] Memory state around the buggy address:
[   30.301063]  fff00000c9a06f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.301138]  fff00000c9a06f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.301181] >fff00000c9a07000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.301262]                    ^
[   30.301345]  fff00000c9a07080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.301428]  fff00000c9a07100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.301494] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   30.275131] ==================================================================
[   30.275228] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   30.275310] Read of size 1 at addr fff00000c648e33f by task kunit_try_catch/170
[   30.275359] 
[   30.275955] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.276320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.276500] Hardware name: linux,dummy-virt (DT)
[   30.276535] Call trace:
[   30.276564]  show_stack+0x20/0x38 (C)
[   30.276627]  dump_stack_lvl+0x8c/0xd0
[   30.276972]  print_report+0x118/0x5d0
[   30.277077]  kasan_report+0xdc/0x128
[   30.277155]  __asan_report_load1_noabort+0x20/0x30
[   30.277210]  kmalloc_oob_left+0x2ec/0x320
[   30.277415]  kunit_try_run_case+0x170/0x3f0
[   30.277516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.277568]  kthread+0x328/0x630
[   30.277663]  ret_from_fork+0x10/0x20
[   30.277718] 
[   30.278074] Allocated by task 111:
[   30.278170]  kasan_save_stack+0x3c/0x68
[   30.278309]  kasan_save_track+0x20/0x40
[   30.278357]  kasan_save_alloc_info+0x40/0x58
[   30.278503]  __kasan_kmalloc+0xd4/0xd8
[   30.278553]  __kmalloc_noprof+0x198/0x4c8
[   30.278601]  kunit_kmalloc_array+0x34/0x88
[   30.278754]  test_readerwriter+0x3b0/0x948
[   30.278829]  kunit_try_run_case+0x170/0x3f0
[   30.278881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.278923]  kthread+0x328/0x630
[   30.279204]  ret_from_fork+0x10/0x20
[   30.279246] 
[   30.279282] Freed by task 113:
[   30.279546]  kasan_save_stack+0x3c/0x68
[   30.279598]  kasan_save_track+0x20/0x40
[   30.279636]  kasan_save_free_info+0x4c/0x78
[   30.280019]  __kasan_slab_free+0x6c/0x98
[   30.280076]  kfree+0x214/0x3c8
[   30.280397]  kfree_action_wrapper+0x18/0x30
[   30.280473]  __kunit_action_free+0x58/0x80
[   30.280509]  kunit_remove_resource+0x14c/0x1f8
[   30.280552]  kunit_cleanup+0x6c/0x108
[   30.280755]  kunit_try_run_case_cleanup+0xa4/0xe0
[   30.280919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.281156]  kthread+0x328/0x630
[   30.281189]  ret_from_fork+0x10/0x20
[   30.281279] 
[   30.281304] The buggy address belongs to the object at fff00000c648e320
[   30.281304]  which belongs to the cache kmalloc-16 of size 16
[   30.281517] The buggy address is located 15 bytes to the right of
[   30.281517]  allocated 16-byte region [fff00000c648e320, fff00000c648e330)
[   30.281587] 
[   30.281607] The buggy address belongs to the physical page:
[   30.281709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e
[   30.281764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.281828] page_type: f5(slab)
[   30.281870] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.281919] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.282124] page dumped because: kasan: bad access detected
[   30.282154] 
[   30.282194] Memory state around the buggy address:
[   30.282312]  fff00000c648e200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.282353]  fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.282393] >fff00000c648e300: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   30.282486]                                         ^
[   30.282552]  fff00000c648e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.282594]  fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.282631] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   30.252516] ==================================================================
[   30.252844] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.253789] Write of size 1 at addr fff00000c64f4473 by task kunit_try_catch/168
[   30.253899] 
[   30.254676] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.254820] Tainted: [N]=TEST
[   30.254852] Hardware name: linux,dummy-virt (DT)
[   30.255079] Call trace:
[   30.255255]  show_stack+0x20/0x38 (C)
[   30.255394]  dump_stack_lvl+0x8c/0xd0
[   30.255463]  print_report+0x118/0x5d0
[   30.255507]  kasan_report+0xdc/0x128
[   30.255551]  __asan_report_store1_noabort+0x20/0x30
[   30.255600]  kmalloc_oob_right+0x5a4/0x660
[   30.255646]  kunit_try_run_case+0x170/0x3f0
[   30.255695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.255747]  kthread+0x328/0x630
[   30.255791]  ret_from_fork+0x10/0x20
[   30.255948] 
[   30.255985] Allocated by task 168:
[   30.256097]  kasan_save_stack+0x3c/0x68
[   30.256163]  kasan_save_track+0x20/0x40
[   30.256202]  kasan_save_alloc_info+0x40/0x58
[   30.256240]  __kasan_kmalloc+0xd4/0xd8
[   30.256277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.256319]  kmalloc_oob_right+0xb0/0x660
[   30.256356]  kunit_try_run_case+0x170/0x3f0
[   30.256391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.256433]  kthread+0x328/0x630
[   30.256475]  ret_from_fork+0x10/0x20
[   30.256529] 
[   30.256589] The buggy address belongs to the object at fff00000c64f4400
[   30.256589]  which belongs to the cache kmalloc-128 of size 128
[   30.256682] The buggy address is located 0 bytes to the right of
[   30.256682]  allocated 115-byte region [fff00000c64f4400, fff00000c64f4473)
[   30.256746] 
[   30.256827] The buggy address belongs to the physical page:
[   30.257033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.257296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.257595] page_type: f5(slab)
[   30.257917] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.257978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.258086] page dumped because: kasan: bad access detected
[   30.258126] 
[   30.258152] Memory state around the buggy address:
[   30.258370]  fff00000c64f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.258433]  fff00000c64f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.258500] >fff00000c64f4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.258556]                                                              ^
[   30.258640]  fff00000c64f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.258681]  fff00000c64f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.258741] ==================================================================
[   30.263315] ==================================================================
[   30.263359] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.263405] Read of size 1 at addr fff00000c64f4480 by task kunit_try_catch/168
[   30.263485] 
[   30.263514] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.263593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.263619] Hardware name: linux,dummy-virt (DT)
[   30.263648] Call trace:
[   30.263668]  show_stack+0x20/0x38 (C)
[   30.263975]  dump_stack_lvl+0x8c/0xd0
[   30.264049]  print_report+0x118/0x5d0
[   30.264094]  kasan_report+0xdc/0x128
[   30.264165]  __asan_report_load1_noabort+0x20/0x30
[   30.264232]  kmalloc_oob_right+0x5d0/0x660
[   30.264280]  kunit_try_run_case+0x170/0x3f0
[   30.264325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.264384]  kthread+0x328/0x630
[   30.264461]  ret_from_fork+0x10/0x20
[   30.264527] 
[   30.264544] Allocated by task 168:
[   30.264571]  kasan_save_stack+0x3c/0x68
[   30.264611]  kasan_save_track+0x20/0x40
[   30.264653]  kasan_save_alloc_info+0x40/0x58
[   30.264691]  __kasan_kmalloc+0xd4/0xd8
[   30.264730]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.264965]  kmalloc_oob_right+0xb0/0x660
[   30.265020]  kunit_try_run_case+0x170/0x3f0
[   30.265057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.265098]  kthread+0x328/0x630
[   30.265268]  ret_from_fork+0x10/0x20
[   30.265335] 
[   30.265374] The buggy address belongs to the object at fff00000c64f4400
[   30.265374]  which belongs to the cache kmalloc-128 of size 128
[   30.265466] The buggy address is located 13 bytes to the right of
[   30.265466]  allocated 115-byte region [fff00000c64f4400, fff00000c64f4473)
[   30.265528] 
[   30.265547] The buggy address belongs to the physical page:
[   30.265594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.265726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.265849] page_type: f5(slab)
[   30.265936] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.266020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.266075] page dumped because: kasan: bad access detected
[   30.266114] 
[   30.266131] Memory state around the buggy address:
[   30.266195]  fff00000c64f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.266268]  fff00000c64f4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.266370] >fff00000c64f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.266453]                    ^
[   30.266480]  fff00000c64f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.266519]  fff00000c64f4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.266589] ==================================================================
[   30.259537] ==================================================================
[   30.259635] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.259702] Write of size 1 at addr fff00000c64f4478 by task kunit_try_catch/168
[   30.259757] 
[   30.259788] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.259925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.259951] Hardware name: linux,dummy-virt (DT)
[   30.260010] Call trace:
[   30.260068]  show_stack+0x20/0x38 (C)
[   30.260116]  dump_stack_lvl+0x8c/0xd0
[   30.260502]  print_report+0x118/0x5d0
[   30.260585]  kasan_report+0xdc/0x128
[   30.260670]  __asan_report_store1_noabort+0x20/0x30
[   30.260801]  kmalloc_oob_right+0x538/0x660
[   30.260858]  kunit_try_run_case+0x170/0x3f0
[   30.260932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.260984]  kthread+0x328/0x630
[   30.261052]  ret_from_fork+0x10/0x20
[   30.261538] 
[   30.261593] Allocated by task 168:
[   30.261667]  kasan_save_stack+0x3c/0x68
[   30.261765]  kasan_save_track+0x20/0x40
[   30.261803]  kasan_save_alloc_info+0x40/0x58
[   30.261839]  __kasan_kmalloc+0xd4/0xd8
[   30.261876]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.261916]  kmalloc_oob_right+0xb0/0x660
[   30.261952]  kunit_try_run_case+0x170/0x3f0
[   30.261988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.262030]  kthread+0x328/0x630
[   30.262061]  ret_from_fork+0x10/0x20
[   30.262096] 
[   30.262114] The buggy address belongs to the object at fff00000c64f4400
[   30.262114]  which belongs to the cache kmalloc-128 of size 128
[   30.262168] The buggy address is located 5 bytes to the right of
[   30.262168]  allocated 115-byte region [fff00000c64f4400, fff00000c64f4473)
[   30.262229] 
[   30.262247] The buggy address belongs to the physical page:
[   30.262276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.262325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.262370] page_type: f5(slab)
[   30.262406] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.262467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.262505] page dumped because: kasan: bad access detected
[   30.262534] 
[   30.262551] Memory state around the buggy address:
[   30.262580]  fff00000c64f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.262620]  fff00000c64f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.262661] >fff00000c64f4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.262696]                                                                 ^
[   30.262733]  fff00000c64f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.262773]  fff00000c64f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.262808] ==================================================================
Failure - log-parser-boot/exception-warning-libteststest_ratelimit-at-test_ratelimit_stress_child
------------[ cut here ]------------
[  196.961426] WARNING: lib/tests/test_ratelimit.c:87 at test_ratelimit_stress_child+0x160/0x1b8, CPU#1: test_ratelimit_/1724
[  196.965047] Modules linked in:
[  196.965288] CPU: 1 UID: 0 PID: 1724 Comm: test_ratelimit_ Tainted: G    B D W        N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[  196.966859] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  196.967630] Hardware name: linux,dummy-virt (DT)
[  196.967996] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  196.968266] pc : test_ratelimit_stress_child+0x160/0x1b8
[  196.968894] lr : test_ratelimit_stress_child+0x30/0x1b8
[  196.969578] sp : ffff8000898c7d90
[  196.970181] x29: ffff8000898c7d90 x28: 0000000000000000 x27: 0000000000000000
[  196.970997] x26: 1ffe000018f9f721 x25: 0000000000000000 x24: 0000000000000004
[  196.971344] x23: fff00000c7cfb90c x22: fff00000cb0f4ca8 x21: ffff95f548d6a0c8
[  196.971698] x20: fff00000c7cfb900 x19: fff00000cb0f4ca8 x18: 000000002bffa41d
[  196.972039] x17: 0000000000000000 x16: fff00000c5b3103c x15: fff00000ff616b48
[  196.972374] x14: 0000000000018fff x13: 1ffe00001b48a1dd x12: fffd80001b48e459
[  196.973558] x11: 1ffe00001b48e458 x10: fffd80001b48e458 x9 : ffff95f54b371bfc
[  196.974540] x8 : ffff8000898c7ae8 x7 : 0000000000000001 x6 : ffff8000898c7c00
[  196.975318] x5 : 0000000000000001 x4 : ffff95f54d6d43e0 x3 : 0000000000000000
[  196.976046] x2 : 1ffe00001961e999 x1 : 0000000000000000 x0 : 0000000000000000
[  196.977041] Call trace:
[  196.977464]  test_ratelimit_stress_child+0x160/0x1b8 (P)
[  196.978380]  kthread+0x328/0x630
[  196.978945]  ret_from_fork+0x10/0x20
[  196.979344] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  109.925297] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/690
[  109.926313] Modules linked in:
[  109.926582] CPU: 1 UID: 0 PID: 690 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[  109.927001] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  109.927326] Hardware name: linux,dummy-virt (DT)
[  109.927619] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.927998] pc : intlog10+0x38/0x48
[  109.928236] lr : intlog10_test+0xe4/0x200
[  109.928499] sp : ffff800082327c10
[  109.928708] x29: ffff800082327c90 x28: 0000000000000000 x27: 0000000000000000
[  109.929135] x26: 1ffe000018cae101 x25: 0000000000000000 x24: ffff800082327ce0
[  109.929513] x23: ffff800082327d00 x22: 0000000000000000 x21: 1ffff00010464f82
[  109.930040] x20: ffff95f54b630220 x19: ffff800080087990 x18: 00000000772bffed
[  109.930526] x17: 00000000ceb4896c x16: 00000000e40f5308 x15: 00000000124f3a42
[  109.930996] x14: 00000000e329dae2 x13: 0000000021b2613a x12: ffff72bea9ea4589
[  109.931505] x11: 1ffff2bea9ea4588 x10: ffff72bea9ea4588 x9 : ffff95f548c51af4
[  109.932054] x8 : ffff95f54f522c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.932607] x5 : ffff700010464f82 x4 : 1ffff00010010f3b x3 : 1ffff2bea96c6044
[  109.933062] x2 : 1ffff2bea96c6044 x1 : 0000000000000003 x0 : 0000000000000000
[  109.933528] Call trace:
[  109.933720]  intlog10+0x38/0x48 (P)
[  109.933991]  kunit_try_run_case+0x170/0x3f0
[  109.934210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.934566]  kthread+0x328/0x630
[  109.934936]  ret_from_fork+0x10/0x20
[  109.935265] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  109.886236] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/672
[  109.887563] Modules linked in:
[  109.887809] CPU: 1 UID: 0 PID: 672 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[  109.888390] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  109.888666] Hardware name: linux,dummy-virt (DT)
[  109.888927] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.889239] pc : intlog2+0xd8/0xf8
[  109.889449] lr : intlog2_test+0xe4/0x200
[  109.889770] sp : ffff800082287c10
[  109.890011] x29: ffff800082287c90 x28: 0000000000000000 x27: 0000000000000000
[  109.890492] x26: 1ffe000018cae041 x25: 0000000000000000 x24: ffff800082287ce0
[  109.890895] x23: ffff800082287d00 x22: 0000000000000000 x21: 1ffff00010450f82
[  109.891304] x20: ffff95f54b630120 x19: ffff800080087990 x18: 00000000e515c74a
[  109.891733] x17: 00000000672eef1f x16: 0000000047765505 x15: 0000000002b88606
[  109.892124] x14: 000000002cfda917 x13: 000000003ccdbee8 x12: ffff72bea9ea4589
[  109.892510] x11: 1ffff2bea9ea4588 x10: ffff72bea9ea4588 x9 : ffff95f548c51cf4
[  109.892967] x8 : ffff95f54f522c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.893380] x5 : ffff700010450f82 x4 : 1ffff00010010f3b x3 : 1ffff2bea96c6024
[  109.893803] x2 : 1ffff2bea96c6024 x1 : 0000000000000003 x0 : 0000000000000000
[  109.894213] Call trace:
[  109.894394]  intlog2+0xd8/0xf8 (P)
[  109.894629]  kunit_try_run_case+0x170/0x3f0
[  109.894895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.895198]  kthread+0x328/0x630
[  109.895390]  ret_from_fork+0x10/0x20
[  109.895759] ---[ end trace 0000000000000000 ]---