Hay
Date
July 16, 2025, 12:11 p.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.269104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   33.381191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   33.288195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   33.170896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[  108.957602] Internal error: Oops: 0000000096000005 [#1]  SMP
[  108.964762] Modules linked in:
[  108.965184] CPU: 0 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[  108.965749] Tainted: [B]=BAD_PAGE, [N]=TEST
[  108.966005] Hardware name: linux,dummy-virt (DT)
[  108.966372] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  108.966764] pc : kunit_test_null_dereference+0x70/0x170
[  108.967139] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.967465] sp : ffff800082077d30
[  108.967726] x29: ffff800082077d90 x28: 0000000000000000 x27: 0000000000000000
[  108.968550] x26: 1ffe000018b1e3a1 x25: 0000000000000000 x24: 0000000000000004
[  108.969009] x23: fff00000c58f1d0c x22: ffff9420b20426b8 x21: fff00000c1b75b08
[  108.969619] x20: 1ffff0001040efa6 x19: ffff800080087990 x18: 000000004b2eb4ba
[  108.970156] x17: 0000000000000001 x16: fff00000da44cda8 x15: fff00000ff616b48
[  108.970693] x14: 0000000000018fff x13: fff00000c0988008 x12: fffd800018c7911c
[  108.971234] x11: 1ffe000018c7911b x10: fffd800018c7911b x9 : ffff9420b2039e48
[  108.971734] x8 : ffff800082077c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  108.972240] x5 : ffff70001040efa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  108.972739] x2 : dfff800000000000 x1 : fff00000c63c8000 x0 : ffff800080087990
[  108.973218] Call trace:
[  108.973484]  kunit_test_null_dereference+0x70/0x170 (P)
[  108.973825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.974156]  kthread+0x328/0x630
[  108.974415]  ret_from_fork+0x10/0x20
[  108.974944] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  108.975522] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   65.609563] ==================================================================
[   65.609617] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   65.609617] 
[   65.609699] Use-after-free read at 0x0000000029f91e44 (in kfence-#201):
[   65.609751]  test_krealloc+0x51c/0x830
[   65.609799]  kunit_try_run_case+0x170/0x3f0
[   65.609843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.609888]  kthread+0x328/0x630
[   65.609930]  ret_from_fork+0x10/0x20
[   65.609976] 
[   65.610001] kfence-#201: 0x0000000029f91e44-0x0000000050f11232, size=32, cache=kmalloc-32
[   65.610001] 
[   65.610058] allocated by task 368 on cpu 1 at 65.608965s (0.001089s ago):
[   65.610129]  test_alloc+0x29c/0x628
[   65.610171]  test_krealloc+0xc0/0x830
[   65.610212]  kunit_try_run_case+0x170/0x3f0
[   65.610251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.610295]  kthread+0x328/0x630
[   65.610332]  ret_from_fork+0x10/0x20
[   65.610375] 
[   65.610399] freed by task 368 on cpu 1 at 65.609168s (0.001227s ago):
[   65.610464]  krealloc_noprof+0x148/0x360
[   65.610518]  test_krealloc+0x1dc/0x830
[   65.610559]  kunit_try_run_case+0x170/0x3f0
[   65.610597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.610641]  kthread+0x328/0x630
[   65.610676]  ret_from_fork+0x10/0x20
[   65.610714] 
[   65.610756] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   65.610835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.610866] Hardware name: linux,dummy-virt (DT)
[   65.610899] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   65.524213] ==================================================================
[   65.524314] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   65.524314] 
[   65.524411] Use-after-free read at 0x00000000139ae04a (in kfence-#200):
[   65.524466]  test_memcache_typesafe_by_rcu+0x280/0x560
[   65.524534]  kunit_try_run_case+0x170/0x3f0
[   65.524581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.524625]  kthread+0x328/0x630
[   65.524666]  ret_from_fork+0x10/0x20
[   65.524706] 
[   65.524730] kfence-#200: 0x00000000139ae04a-0x00000000bcf2d3c9, size=32, cache=test
[   65.524730] 
[   65.524782] allocated by task 366 on cpu 0 at 65.508156s (0.016623s ago):
[   65.524855]  test_alloc+0x230/0x628
[   65.524897]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   65.524939]  kunit_try_run_case+0x170/0x3f0
[   65.524977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.525020]  kthread+0x328/0x630
[   65.525056]  ret_from_fork+0x10/0x20
[   65.525097] 
[   65.525119] freed by task 366 on cpu 0 at 65.508260s (0.016855s ago):
[   65.525177]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   65.525220]  kunit_try_run_case+0x170/0x3f0
[   65.525258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.525299]  kthread+0x328/0x630
[   65.525336]  ret_from_fork+0x10/0x20
[   65.525373] 
[   65.525418] CPU: 0 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   65.525498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.525538] Hardware name: linux,dummy-virt (DT)
[   65.525576] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   42.531758] ==================================================================
[   42.532049] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   42.532049] 
[   42.532177] Invalid read at 0x00000000a77893a2:
[   42.532244]  test_invalid_access+0xdc/0x1f0
[   42.532417]  kunit_try_run_case+0x170/0x3f0
[   42.532474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.532542]  kthread+0x328/0x630
[   42.532587]  ret_from_fork+0x10/0x20
[   42.532640] 
[   42.532692] CPU: 1 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   42.532779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.532817] Hardware name: linux,dummy-virt (DT)
[   42.533236] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   42.296439] ==================================================================
[   42.296551] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   42.296551] 
[   42.296619] Corrupted memory at 0x00000000857bedcb [ ! . . . . . . . . . . . . . . . ] (in kfence-#195):
[   42.296935]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   42.296989]  kunit_try_run_case+0x170/0x3f0
[   42.297034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.297079]  kthread+0x328/0x630
[   42.297118]  ret_from_fork+0x10/0x20
[   42.297157] 
[   42.297183] kfence-#195: 0x00000000360065ee-0x000000002c567863, size=73, cache=kmalloc-96
[   42.297183] 
[   42.297243] allocated by task 356 on cpu 1 at 42.296203s (0.001035s ago):
[   42.297310]  test_alloc+0x29c/0x628
[   42.297352]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   42.297400]  kunit_try_run_case+0x170/0x3f0
[   42.297462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.297519]  kthread+0x328/0x630
[   42.297557]  ret_from_fork+0x10/0x20
[   42.297598] 
[   42.297622] freed by task 356 on cpu 1 at 42.296345s (0.001273s ago):
[   42.297690]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   42.297738]  kunit_try_run_case+0x170/0x3f0
[   42.297778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.297824]  kthread+0x328/0x630
[   42.297861]  ret_from_fork+0x10/0x20
[   42.297901] 
[   42.297944] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   42.298032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.298063] Hardware name: linux,dummy-virt (DT)
[   42.298096] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   42.088339] ==================================================================
[   42.088422] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   42.088422] 
[   42.088532] Out-of-bounds read at 0x000000001f729449 (105B right of kfence-#193):
[   42.088598]  test_kmalloc_aligned_oob_read+0x238/0x468
[   42.088650]  kunit_try_run_case+0x170/0x3f0
[   42.088697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.088745]  kthread+0x328/0x630
[   42.088785]  ret_from_fork+0x10/0x20
[   42.088826] 
[   42.088850] kfence-#193: 0x0000000092d4af12-0x00000000970304fc, size=73, cache=kmalloc-96
[   42.088850] 
[   42.088909] allocated by task 354 on cpu 1 at 42.088113s (0.000792s ago):
[   42.088984]  test_alloc+0x29c/0x628
[   42.089027]  test_kmalloc_aligned_oob_read+0x100/0x468
[   42.089071]  kunit_try_run_case+0x170/0x3f0
[   42.089110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.089156]  kthread+0x328/0x630
[   42.089192]  ret_from_fork+0x10/0x20
[   42.089234] 
[   42.089279] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   42.089366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.089397] Hardware name: linux,dummy-virt (DT)
[   42.089433] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   36.264525] ==================================================================
[   36.264648] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   36.264648] 
[   36.264716] Corrupted memory at 0x0000000066e9e06d [ ! . . . . . . . . . . . . . . . ] (in kfence-#137):
[   36.265839]  test_corruption+0x278/0x378
[   36.265891]  kunit_try_run_case+0x170/0x3f0
[   36.265938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.265986]  kthread+0x328/0x630
[   36.266028]  ret_from_fork+0x10/0x20
[   36.266072] 
[   36.266097] kfence-#137: 0x00000000b09094cb-0x0000000065cc9994, size=32, cache=kmalloc-32
[   36.266097] 
[   36.266160] allocated by task 342 on cpu 0 at 36.264221s (0.001935s ago):
[   36.266231]  test_alloc+0x29c/0x628
[   36.266275]  test_corruption+0xdc/0x378
[   36.266314]  kunit_try_run_case+0x170/0x3f0
[   36.266355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.266406]  kthread+0x328/0x630
[   36.266443]  ret_from_fork+0x10/0x20
[   36.266484] 
[   36.266519] freed by task 342 on cpu 0 at 36.264323s (0.002192s ago):
[   36.266584]  test_corruption+0x278/0x378
[   36.266622]  kunit_try_run_case+0x170/0x3f0
[   36.266663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.266708]  kthread+0x328/0x630
[   36.266746]  ret_from_fork+0x10/0x20
[   36.266786] 
[   36.266832] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   36.266920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.266951] Hardware name: linux,dummy-virt (DT)
[   36.266990] ==================================================================
[   36.368871] ==================================================================
[   36.368965] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   36.368965] 
[   36.369027] Corrupted memory at 0x00000000c069d962 [ ! ] (in kfence-#138):
[   36.369158]  test_corruption+0x284/0x378
[   36.369202]  kunit_try_run_case+0x170/0x3f0
[   36.369247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.369294]  kthread+0x328/0x630
[   36.369333]  ret_from_fork+0x10/0x20
[   36.369374] 
[   36.369397] kfence-#138: 0x00000000f982a3f9-0x00000000a5c3052e, size=32, cache=kmalloc-32
[   36.369397] 
[   36.369456] allocated by task 342 on cpu 0 at 36.368602s (0.000850s ago):
[   36.369542]  test_alloc+0x29c/0x628
[   36.369587]  test_corruption+0x198/0x378
[   36.369625]  kunit_try_run_case+0x170/0x3f0
[   36.369666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.369711]  kthread+0x328/0x630
[   36.369750]  ret_from_fork+0x10/0x20
[   36.369790] 
[   36.369813] freed by task 342 on cpu 0 at 36.368702s (0.001107s ago):
[   36.369880]  test_corruption+0x284/0x378
[   36.369918]  kunit_try_run_case+0x170/0x3f0
[   36.369959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.370006]  kthread+0x328/0x630
[   36.370043]  ret_from_fork+0x10/0x20
[   36.370083] 
[   36.370122] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   36.370209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.370241] Hardware name: linux,dummy-virt (DT)
[   36.370277] ==================================================================
[   36.576354] ==================================================================
[   36.576456] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   36.576456] 
[   36.576535] Corrupted memory at 0x00000000c312d7ca [ ! . . . . . . . . . . . . . . . ] (in kfence-#140):
[   36.576853]  test_corruption+0x120/0x378
[   36.576901]  kunit_try_run_case+0x170/0x3f0
[   36.576949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.576996]  kthread+0x328/0x630
[   36.577037]  ret_from_fork+0x10/0x20
[   36.577080] 
[   36.577104] kfence-#140: 0x000000006194bc67-0x00000000f6be2846, size=32, cache=test
[   36.577104] 
[   36.577163] allocated by task 344 on cpu 0 at 36.576205s (0.000953s ago):
[   36.577231]  test_alloc+0x230/0x628
[   36.577273]  test_corruption+0xdc/0x378
[   36.577313]  kunit_try_run_case+0x170/0x3f0
[   36.577354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.577400]  kthread+0x328/0x630
[   36.577437]  ret_from_fork+0x10/0x20
[   36.577477] 
[   36.577500] freed by task 344 on cpu 0 at 36.576261s (0.001235s ago):
[   36.577583]  test_corruption+0x120/0x378
[   36.577623]  kunit_try_run_case+0x170/0x3f0
[   36.577662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.577708]  kthread+0x328/0x630
[   36.577743]  ret_from_fork+0x10/0x20
[   36.577784] 
[   36.577828] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   36.577915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.577947] Hardware name: linux,dummy-virt (DT)
[   36.577983] ==================================================================
[   36.888330] ==================================================================
[   36.888428] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   36.888428] 
[   36.888490] Corrupted memory at 0x000000008f57fbc6 [ ! ] (in kfence-#143):
[   36.888626]  test_corruption+0x1d8/0x378
[   36.888671]  kunit_try_run_case+0x170/0x3f0
[   36.888716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.888763]  kthread+0x328/0x630
[   36.888802]  ret_from_fork+0x10/0x20
[   36.888842] 
[   36.888867] kfence-#143: 0x0000000062fab046-0x0000000063e7a052, size=32, cache=test
[   36.888867] 
[   36.888926] allocated by task 344 on cpu 0 at 36.888184s (0.000739s ago):
[   36.888996]  test_alloc+0x230/0x628
[   36.889040]  test_corruption+0x198/0x378
[   36.889080]  kunit_try_run_case+0x170/0x3f0
[   36.889122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.889169]  kthread+0x328/0x630
[   36.889206]  ret_from_fork+0x10/0x20
[   36.889246] 
[   36.889270] freed by task 344 on cpu 0 at 36.888240s (0.001026s ago):
[   36.889337]  test_corruption+0x1d8/0x378
[   36.889377]  kunit_try_run_case+0x170/0x3f0
[   36.889418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.889465]  kthread+0x328/0x630
[   36.889502]  ret_from_fork+0x10/0x20
[   36.889552] 
[   36.889594] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   36.889682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.889714] Hardware name: linux,dummy-virt (DT)
[   36.889751] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   35.952344] ==================================================================
[   35.952427] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   35.952427] 
[   35.952493] Invalid free of 0x0000000084997000 (in kfence-#134):
[   35.952568]  test_invalid_addr_free+0x1ac/0x238
[   35.952615]  kunit_try_run_case+0x170/0x3f0
[   35.952660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.952706]  kthread+0x328/0x630
[   35.952746]  ret_from_fork+0x10/0x20
[   35.952787] 
[   35.952811] kfence-#134: 0x0000000071e8c933-0x00000000d6da2f82, size=32, cache=kmalloc-32
[   35.952811] 
[   35.952866] allocated by task 338 on cpu 1 at 35.952204s (0.000658s ago):
[   35.952932]  test_alloc+0x29c/0x628
[   35.952974]  test_invalid_addr_free+0xd4/0x238
[   35.953014]  kunit_try_run_case+0x170/0x3f0
[   35.953054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.953098]  kthread+0x328/0x630
[   35.953136]  ret_from_fork+0x10/0x20
[   35.953174] 
[   35.953220] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   35.953301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.953329] Hardware name: linux,dummy-virt (DT)
[   35.953366] ==================================================================
[   36.056215] ==================================================================
[   36.056300] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   36.056300] 
[   36.056356] Invalid free of 0x00000000047fa866 (in kfence-#135):
[   36.056411]  test_invalid_addr_free+0xec/0x238
[   36.056455]  kunit_try_run_case+0x170/0x3f0
[   36.056498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.056558]  kthread+0x328/0x630
[   36.056597]  ret_from_fork+0x10/0x20
[   36.056637] 
[   36.056661] kfence-#135: 0x00000000f547577a-0x0000000002a9082a, size=32, cache=test
[   36.056661] 
[   36.056714] allocated by task 340 on cpu 1 at 36.056098s (0.000612s ago):
[   36.056778]  test_alloc+0x230/0x628
[   36.056819]  test_invalid_addr_free+0xd4/0x238
[   36.056859]  kunit_try_run_case+0x170/0x3f0
[   36.056897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.056940]  kthread+0x328/0x630
[   36.056976]  ret_from_fork+0x10/0x20
[   36.057015] 
[   36.057056] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   36.057136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.057165] Hardware name: linux,dummy-virt (DT)
[   36.057197] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   35.848439] ==================================================================
[   35.848545] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   35.848545] 
[   35.848604] Invalid free of 0x00000000ebf908ce (in kfence-#133):
[   35.848659]  test_double_free+0x100/0x238
[   35.848700]  kunit_try_run_case+0x170/0x3f0
[   35.848744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.848790]  kthread+0x328/0x630
[   35.848828]  ret_from_fork+0x10/0x20
[   35.848869] 
[   35.848894] kfence-#133: 0x00000000ebf908ce-0x00000000ba2b8e1e, size=32, cache=test
[   35.848894] 
[   35.848947] allocated by task 336 on cpu 0 at 35.848237s (0.000706s ago):
[   35.849012]  test_alloc+0x230/0x628
[   35.849054]  test_double_free+0xd4/0x238
[   35.849091]  kunit_try_run_case+0x170/0x3f0
[   35.849131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.849174]  kthread+0x328/0x630
[   35.849210]  ret_from_fork+0x10/0x20
[   35.849249] 
[   35.849272] freed by task 336 on cpu 0 at 35.848291s (0.000978s ago):
[   35.849336]  test_double_free+0xf0/0x238
[   35.849373]  kunit_try_run_case+0x170/0x3f0
[   35.849412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.849454]  kthread+0x328/0x630
[   35.849490]  ret_from_fork+0x10/0x20
[   35.849540] 
[   35.849583] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   35.849662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.849692] Hardware name: linux,dummy-virt (DT)
[   35.849726] ==================================================================
[   35.744435] ==================================================================
[   35.744568] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   35.744568] 
[   35.744634] Invalid free of 0x000000008fbd2d51 (in kfence-#132):
[   35.744703]  test_double_free+0x1bc/0x238
[   35.744749]  kunit_try_run_case+0x170/0x3f0
[   35.744794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.744840]  kthread+0x328/0x630
[   35.744878]  ret_from_fork+0x10/0x20
[   35.744919] 
[   35.744945] kfence-#132: 0x000000008fbd2d51-0x0000000045164ad8, size=32, cache=kmalloc-32
[   35.744945] 
[   35.744999] allocated by task 334 on cpu 0 at 35.744144s (0.000851s ago):
[   35.745065]  test_alloc+0x29c/0x628
[   35.745107]  test_double_free+0xd4/0x238
[   35.745145]  kunit_try_run_case+0x170/0x3f0
[   35.745187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.745232]  kthread+0x328/0x630
[   35.745269]  ret_from_fork+0x10/0x20
[   35.745308] 
[   35.745331] freed by task 334 on cpu 0 at 35.744212s (0.001116s ago):
[   35.745398]  test_double_free+0x1ac/0x238
[   35.745438]  kunit_try_run_case+0x170/0x3f0
[   35.745478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.745533]  kthread+0x328/0x630
[   35.745571]  ret_from_fork+0x10/0x20
[   35.745608] 
[   35.745656] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   35.745738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.745767] Hardware name: linux,dummy-virt (DT)
[   35.745802] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   35.329975] ==================================================================
[   35.330067] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   35.330067] 
[   35.330412] Use-after-free read at 0x0000000081ca01b9 (in kfence-#128):
[   35.330773]  test_use_after_free_read+0x114/0x248
[   35.330858]  kunit_try_run_case+0x170/0x3f0
[   35.330912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.331009]  kthread+0x328/0x630
[   35.331294]  ret_from_fork+0x10/0x20
[   35.331366] 
[   35.331391] kfence-#128: 0x0000000081ca01b9-0x000000004cbeddd2, size=32, cache=kmalloc-32
[   35.331391] 
[   35.331530] allocated by task 326 on cpu 0 at 35.329091s (0.002386s ago):
[   35.331609]  test_alloc+0x29c/0x628
[   35.331669]  test_use_after_free_read+0xd0/0x248
[   35.331718]  kunit_try_run_case+0x170/0x3f0
[   35.331802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.331886]  kthread+0x328/0x630
[   35.331979]  ret_from_fork+0x10/0x20
[   35.332076] 
[   35.332304] freed by task 326 on cpu 0 at 35.329154s (0.003040s ago):
[   35.332999]  test_use_after_free_read+0x1c0/0x248
[   35.333067]  kunit_try_run_case+0x170/0x3f0
[   35.333357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.333497]  kthread+0x328/0x630
[   35.333573]  ret_from_fork+0x10/0x20
[   35.333770] 
[   35.333962] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   35.334529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.334630] Hardware name: linux,dummy-virt (DT)
[   35.334722] ==================================================================
[   35.437923] ==================================================================
[   35.442033] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   35.442033] 
[   35.443418] Use-after-free read at 0x0000000014966054 (in kfence-#129):
[   35.444567]  test_use_after_free_read+0x114/0x248
[   35.444624]  kunit_try_run_case+0x170/0x3f0
[   35.444671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.444716]  kthread+0x328/0x630
[   35.444755]  ret_from_fork+0x10/0x20
[   35.444795] 
[   35.444819] kfence-#129: 0x0000000014966054-0x00000000b5e6891d, size=32, cache=test
[   35.444819] 
[   35.444873] allocated by task 328 on cpu 0 at 35.435812s (0.009057s ago):
[   35.444943]  test_alloc+0x230/0x628
[   35.444984]  test_use_after_free_read+0xd0/0x248
[   35.445022]  kunit_try_run_case+0x170/0x3f0
[   35.445062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.445105]  kthread+0x328/0x630
[   35.445142]  ret_from_fork+0x10/0x20
[   35.445179] 
[   35.445202] freed by task 328 on cpu 0 at 35.436309s (0.008889s ago):
[   35.445303]  test_use_after_free_read+0xf0/0x248
[   35.445347]  kunit_try_run_case+0x170/0x3f0
[   35.445385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.445430]  kthread+0x328/0x630
[   35.445466]  ret_from_fork+0x10/0x20
[   35.445520] 
[   35.445563] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   35.445643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.445671] Hardware name: linux,dummy-virt (DT)
[   35.445705] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   34.912679] ==================================================================
[   34.912762] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   34.912762] 
[   34.912857] Out-of-bounds write at 0x00000000d80bdc28 (1B left of kfence-#124):
[   34.912918]  test_out_of_bounds_write+0x100/0x240
[   34.912975]  kunit_try_run_case+0x170/0x3f0
[   34.913020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.913067]  kthread+0x328/0x630
[   34.913105]  ret_from_fork+0x10/0x20
[   34.913146] 
[   34.913170] kfence-#124: 0x000000006d3862bd-0x00000000037badc0, size=32, cache=kmalloc-32
[   34.913170] 
[   34.913467] allocated by task 322 on cpu 0 at 34.912528s (0.000931s ago):
[   34.913622]  test_alloc+0x29c/0x628
[   34.913708]  test_out_of_bounds_write+0xc8/0x240
[   34.913778]  kunit_try_run_case+0x170/0x3f0
[   34.913824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.913906]  kthread+0x328/0x630
[   34.913943]  ret_from_fork+0x10/0x20
[   34.914158] 
[   34.914305] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   34.914420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.914451] Hardware name: linux,dummy-virt (DT)
[   34.914496] ==================================================================
[   35.225415] ==================================================================
[   35.225517] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   35.225517] 
[   35.225606] Out-of-bounds write at 0x0000000098a101c2 (1B left of kfence-#127):
[   35.225670]  test_out_of_bounds_write+0x100/0x240
[   35.226124]  kunit_try_run_case+0x170/0x3f0
[   35.226202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.226303]  kthread+0x328/0x630
[   35.226347]  ret_from_fork+0x10/0x20
[   35.226411] 
[   35.226626] kfence-#127: 0x00000000b37fd51b-0x0000000096a64314, size=32, cache=test
[   35.226626] 
[   35.226950] allocated by task 324 on cpu 0 at 35.225309s (0.001570s ago):
[   35.227059]  test_alloc+0x230/0x628
[   35.227146]  test_out_of_bounds_write+0xc8/0x240
[   35.227190]  kunit_try_run_case+0x170/0x3f0
[   35.227354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.227420]  kthread+0x328/0x630
[   35.227723]  ret_from_fork+0x10/0x20
[   35.227885] 
[   35.227940] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   35.228167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.228351] Hardware name: linux,dummy-virt (DT)
[   35.228567] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   34.184756] ==================================================================
[   34.184884] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   34.184884] 
[   34.184993] Out-of-bounds read at 0x0000000016e61c86 (1B left of kfence-#117):
[   34.185160]  test_out_of_bounds_read+0x114/0x3e0
[   34.185213]  kunit_try_run_case+0x170/0x3f0
[   34.185372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.185463]  kthread+0x328/0x630
[   34.185566]  ret_from_fork+0x10/0x20
[   34.185611] 
[   34.185661] kfence-#117: 0x000000008a2cd43a-0x00000000239fc527, size=32, cache=test
[   34.185661] 
[   34.185754] allocated by task 320 on cpu 0 at 34.184645s (0.001098s ago):
[   34.185914]  test_alloc+0x230/0x628
[   34.186019]  test_out_of_bounds_read+0xdc/0x3e0
[   34.186063]  kunit_try_run_case+0x170/0x3f0
[   34.186106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.186153]  kthread+0x328/0x630
[   34.186190]  ret_from_fork+0x10/0x20
[   34.186474] 
[   34.186604] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   34.186842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.186889] Hardware name: linux,dummy-virt (DT)
[   34.186983] ==================================================================
[   33.976939] ==================================================================
[   33.977024] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   33.977024] 
[   33.977124] Out-of-bounds read at 0x000000002ae1be92 (32B right of kfence-#115):
[   33.977241]  test_out_of_bounds_read+0x1c8/0x3e0
[   33.977314]  kunit_try_run_case+0x170/0x3f0
[   33.977361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.977727]  kthread+0x328/0x630
[   33.977792]  ret_from_fork+0x10/0x20
[   33.977834] 
[   33.977859] kfence-#115: 0x00000000db71380c-0x00000000fb1f2b57, size=32, cache=kmalloc-32
[   33.977859] 
[   33.977920] allocated by task 318 on cpu 0 at 33.976643s (0.001273s ago):
[   33.977995]  test_alloc+0x29c/0x628
[   33.978037]  test_out_of_bounds_read+0x198/0x3e0
[   33.978078]  kunit_try_run_case+0x170/0x3f0
[   33.978119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.978164]  kthread+0x328/0x630
[   33.978199]  ret_from_fork+0x10/0x20
[   33.978241] 
[   33.978280] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.978377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.978409] Hardware name: linux,dummy-virt (DT)
[   33.978444] ==================================================================
[   34.809632] ==================================================================
[   34.809774] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   34.809774] 
[   34.809915] Out-of-bounds read at 0x000000005eb2fed1 (32B right of kfence-#123):
[   34.810306]  test_out_of_bounds_read+0x1c8/0x3e0
[   34.810361]  kunit_try_run_case+0x170/0x3f0
[   34.810416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.810464]  kthread+0x328/0x630
[   34.810517]  ret_from_fork+0x10/0x20
[   34.810561] 
[   34.810586] kfence-#123: 0x00000000ff8a08d0-0x00000000865f9bf7, size=32, cache=test
[   34.810586] 
[   34.810644] allocated by task 320 on cpu 0 at 34.809133s (0.001507s ago):
[   34.810733]  test_alloc+0x230/0x628
[   34.810779]  test_out_of_bounds_read+0x198/0x3e0
[   34.810821]  kunit_try_run_case+0x170/0x3f0
[   34.810929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.810976]  kthread+0x328/0x630
[   34.811013]  ret_from_fork+0x10/0x20
[   34.811052] 
[   34.811094] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   34.811180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.811211] Hardware name: linux,dummy-virt (DT)
[   34.811245] ==================================================================
[   33.874732] ==================================================================
[   33.874835] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   33.874835] 
[   33.874957] Out-of-bounds read at 0x0000000034cff0f0 (1B left of kfence-#114):
[   33.875168]  test_out_of_bounds_read+0x114/0x3e0
[   33.875221]  kunit_try_run_case+0x170/0x3f0
[   33.875266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.875310]  kthread+0x328/0x630
[   33.875484]  ret_from_fork+0x10/0x20
[   33.876901] 
[   33.877589] kfence-#114: 0x00000000f9258f6d-0x0000000015a8d339, size=32, cache=kmalloc-32
[   33.877589] 
[   33.877955] allocated by task 318 on cpu 0 at 33.873312s (0.004539s ago):
[   33.879662]  test_alloc+0x29c/0x628
[   33.880054]  test_out_of_bounds_read+0xdc/0x3e0
[   33.880262]  kunit_try_run_case+0x170/0x3f0
[   33.880418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.880843]  kthread+0x328/0x630
[   33.880984]  ret_from_fork+0x10/0x20
[   33.881523] 
[   33.881767] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.882180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.882400] Hardware name: linux,dummy-virt (DT)
[   33.882578] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   33.730477] ==================================================================
[   33.730544] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   33.730599] Write of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.730653] 
[   33.730685] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.730773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.730801] Hardware name: linux,dummy-virt (DT)
[   33.730835] Call trace:
[   33.730858]  show_stack+0x20/0x38 (C)
[   33.730917]  dump_stack_lvl+0x8c/0xd0
[   33.730967]  print_report+0x118/0x5d0
[   33.731022]  kasan_report+0xdc/0x128
[   33.731072]  kasan_check_range+0x100/0x1a8
[   33.731123]  __kasan_check_write+0x20/0x30
[   33.731172]  strncpy_from_user+0x3c/0x2a0
[   33.731235]  copy_user_test_oob+0x5c0/0xec8
[   33.731297]  kunit_try_run_case+0x170/0x3f0
[   33.731346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.731399]  kthread+0x328/0x630
[   33.731444]  ret_from_fork+0x10/0x20
[   33.731492] 
[   33.732575] Allocated by task 316:
[   33.732667]  kasan_save_stack+0x3c/0x68
[   33.732740]  kasan_save_track+0x20/0x40
[   33.732820]  kasan_save_alloc_info+0x40/0x58
[   33.732893]  __kasan_kmalloc+0xd4/0xd8
[   33.732960]  __kmalloc_noprof+0x198/0x4c8
[   33.733031]  kunit_kmalloc_array+0x34/0x88
[   33.733383]  copy_user_test_oob+0xac/0xec8
[   33.733773]  kunit_try_run_case+0x170/0x3f0
[   33.734108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.734213]  kthread+0x328/0x630
[   33.734271]  ret_from_fork+0x10/0x20
[   33.734346] 
[   33.734633] The buggy address belongs to the object at fff00000c9bb7300
[   33.734633]  which belongs to the cache kmalloc-128 of size 128
[   33.734944] The buggy address is located 0 bytes inside of
[   33.734944]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.735345] 
[   33.735385] The buggy address belongs to the physical page:
[   33.735517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.735864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.736196] page_type: f5(slab)
[   33.736364] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.736691] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.736803] page dumped because: kasan: bad access detected
[   33.736880] 
[   33.737179] Memory state around the buggy address:
[   33.737277]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.737576]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.737801] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.738107]                                                                 ^
[   33.738254]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.738439]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.738551] ==================================================================
[   33.739615] ==================================================================
[   33.739670] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   33.740114] Write of size 1 at addr fff00000c9bb7378 by task kunit_try_catch/316
[   33.740237] 
[   33.740383] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.740612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.740644] Hardware name: linux,dummy-virt (DT)
[   33.740991] Call trace:
[   33.741099]  show_stack+0x20/0x38 (C)
[   33.741444]  dump_stack_lvl+0x8c/0xd0
[   33.741533]  print_report+0x118/0x5d0
[   33.741651]  kasan_report+0xdc/0x128
[   33.741866]  __asan_report_store1_noabort+0x20/0x30
[   33.742037]  strncpy_from_user+0x270/0x2a0
[   33.742108]  copy_user_test_oob+0x5c0/0xec8
[   33.742422]  kunit_try_run_case+0x170/0x3f0
[   33.742528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.742861]  kthread+0x328/0x630
[   33.742996]  ret_from_fork+0x10/0x20
[   33.743205] 
[   33.743325] Allocated by task 316:
[   33.743374]  kasan_save_stack+0x3c/0x68
[   33.743544]  kasan_save_track+0x20/0x40
[   33.743742]  kasan_save_alloc_info+0x40/0x58
[   33.743944]  __kasan_kmalloc+0xd4/0xd8
[   33.743994]  __kmalloc_noprof+0x198/0x4c8
[   33.744037]  kunit_kmalloc_array+0x34/0x88
[   33.744085]  copy_user_test_oob+0xac/0xec8
[   33.744127]  kunit_try_run_case+0x170/0x3f0
[   33.744550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.744836]  kthread+0x328/0x630
[   33.744886]  ret_from_fork+0x10/0x20
[   33.745161] 
[   33.745233] The buggy address belongs to the object at fff00000c9bb7300
[   33.745233]  which belongs to the cache kmalloc-128 of size 128
[   33.745608] The buggy address is located 0 bytes to the right of
[   33.745608]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.745718] 
[   33.745741] The buggy address belongs to the physical page:
[   33.745776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.745995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.746200] page_type: f5(slab)
[   33.746659] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.746734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.746944] page dumped because: kasan: bad access detected
[   33.747086] 
[   33.747155] Memory state around the buggy address:
[   33.747204]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.747253]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.747466] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.747633]                                                                 ^
[   33.747993]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.748131]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.748246] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   33.702927] ==================================================================
[   33.703053] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   33.703110] Read of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.703417] 
[   33.703465] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.703572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.703982] Hardware name: linux,dummy-virt (DT)
[   33.704062] Call trace:
[   33.704175]  show_stack+0x20/0x38 (C)
[   33.704385]  dump_stack_lvl+0x8c/0xd0
[   33.704456]  print_report+0x118/0x5d0
[   33.704503]  kasan_report+0xdc/0x128
[   33.704711]  kasan_check_range+0x100/0x1a8
[   33.705131]  __kasan_check_read+0x20/0x30
[   33.705310]  copy_user_test_oob+0x3c8/0xec8
[   33.705482]  kunit_try_run_case+0x170/0x3f0
[   33.705714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.705953]  kthread+0x328/0x630
[   33.706159]  ret_from_fork+0x10/0x20
[   33.706346] 
[   33.706427] Allocated by task 316:
[   33.706586]  kasan_save_stack+0x3c/0x68
[   33.706656]  kasan_save_track+0x20/0x40
[   33.706723]  kasan_save_alloc_info+0x40/0x58
[   33.706765]  __kasan_kmalloc+0xd4/0xd8
[   33.706804]  __kmalloc_noprof+0x198/0x4c8
[   33.706846]  kunit_kmalloc_array+0x34/0x88
[   33.706928]  copy_user_test_oob+0xac/0xec8
[   33.706983]  kunit_try_run_case+0x170/0x3f0
[   33.707024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.707068]  kthread+0x328/0x630
[   33.707105]  ret_from_fork+0x10/0x20
[   33.707142] 
[   33.707166] The buggy address belongs to the object at fff00000c9bb7300
[   33.707166]  which belongs to the cache kmalloc-128 of size 128
[   33.707237] The buggy address is located 0 bytes inside of
[   33.707237]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.707314] 
[   33.707351] The buggy address belongs to the physical page:
[   33.707384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.707439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.707489] page_type: f5(slab)
[   33.707548] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.707613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.707658] page dumped because: kasan: bad access detected
[   33.707702] 
[   33.707737] Memory state around the buggy address:
[   33.707772]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.708449]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.708537] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.708600]                                                                 ^
[   33.708668]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.708848]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.709250] ==================================================================
[   33.657947] ==================================================================
[   33.658064] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   33.658298] Write of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.658354] 
[   33.658724] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.659147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.659678] Hardware name: linux,dummy-virt (DT)
[   33.659761] Call trace:
[   33.659842]  show_stack+0x20/0x38 (C)
[   33.660006]  dump_stack_lvl+0x8c/0xd0
[   33.660110]  print_report+0x118/0x5d0
[   33.660223]  kasan_report+0xdc/0x128
[   33.660523]  kasan_check_range+0x100/0x1a8
[   33.660795]  __kasan_check_write+0x20/0x30
[   33.660988]  copy_user_test_oob+0x234/0xec8
[   33.661044]  kunit_try_run_case+0x170/0x3f0
[   33.661247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.661492]  kthread+0x328/0x630
[   33.661607]  ret_from_fork+0x10/0x20
[   33.661761] 
[   33.661847] Allocated by task 316:
[   33.662107]  kasan_save_stack+0x3c/0x68
[   33.662324]  kasan_save_track+0x20/0x40
[   33.662396]  kasan_save_alloc_info+0x40/0x58
[   33.662437]  __kasan_kmalloc+0xd4/0xd8
[   33.662487]  __kmalloc_noprof+0x198/0x4c8
[   33.662542]  kunit_kmalloc_array+0x34/0x88
[   33.662584]  copy_user_test_oob+0xac/0xec8
[   33.662625]  kunit_try_run_case+0x170/0x3f0
[   33.662666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.662713]  kthread+0x328/0x630
[   33.662750]  ret_from_fork+0x10/0x20
[   33.662788] 
[   33.662811] The buggy address belongs to the object at fff00000c9bb7300
[   33.662811]  which belongs to the cache kmalloc-128 of size 128
[   33.662886] The buggy address is located 0 bytes inside of
[   33.662886]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.662956] 
[   33.662990] The buggy address belongs to the physical page:
[   33.663032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.663099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.663163] page_type: f5(slab)
[   33.663219] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.663282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.663353] page dumped because: kasan: bad access detected
[   33.663389] 
[   33.663418] Memory state around the buggy address:
[   33.663480]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.663538]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.664132] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.664204]                                                                 ^
[   33.664314]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.664536]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.664891] ==================================================================
[   33.721614] ==================================================================
[   33.721669] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   33.721721] Read of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.721774] 
[   33.722106] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.722357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.722822] Hardware name: linux,dummy-virt (DT)
[   33.723083] Call trace:
[   33.723338]  show_stack+0x20/0x38 (C)
[   33.723413]  dump_stack_lvl+0x8c/0xd0
[   33.723471]  print_report+0x118/0x5d0
[   33.723701]  kasan_report+0xdc/0x128
[   33.723766]  kasan_check_range+0x100/0x1a8
[   33.724010]  __kasan_check_read+0x20/0x30
[   33.724167]  copy_user_test_oob+0x4a0/0xec8
[   33.724274]  kunit_try_run_case+0x170/0x3f0
[   33.724625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.724783]  kthread+0x328/0x630
[   33.724972]  ret_from_fork+0x10/0x20
[   33.725140] 
[   33.725246] Allocated by task 316:
[   33.725335]  kasan_save_stack+0x3c/0x68
[   33.725739]  kasan_save_track+0x20/0x40
[   33.725799]  kasan_save_alloc_info+0x40/0x58
[   33.726015]  __kasan_kmalloc+0xd4/0xd8
[   33.726080]  __kmalloc_noprof+0x198/0x4c8
[   33.726263]  kunit_kmalloc_array+0x34/0x88
[   33.726394]  copy_user_test_oob+0xac/0xec8
[   33.726892]  kunit_try_run_case+0x170/0x3f0
[   33.726970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.727435]  kthread+0x328/0x630
[   33.727801]  ret_from_fork+0x10/0x20
[   33.727939] 
[   33.728036] The buggy address belongs to the object at fff00000c9bb7300
[   33.728036]  which belongs to the cache kmalloc-128 of size 128
[   33.728260] The buggy address is located 0 bytes inside of
[   33.728260]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.728341] 
[   33.728364] The buggy address belongs to the physical page:
[   33.728858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.729190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.729248] page_type: f5(slab)
[   33.729291] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.729373] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.729418] page dumped because: kasan: bad access detected
[   33.729453] 
[   33.729483] Memory state around the buggy address:
[   33.729531]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.729583]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.729641] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.729682]                                                                 ^
[   33.729727]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.729771]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.729814] ==================================================================
[   33.674145] ==================================================================
[   33.674454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   33.674599] Read of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.674684] 
[   33.675584] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.675696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.675740] Hardware name: linux,dummy-virt (DT)
[   33.675775] Call trace:
[   33.676081]  show_stack+0x20/0x38 (C)
[   33.676186]  dump_stack_lvl+0x8c/0xd0
[   33.676284]  print_report+0x118/0x5d0
[   33.676580]  kasan_report+0xdc/0x128
[   33.676635]  kasan_check_range+0x100/0x1a8
[   33.676961]  __kasan_check_read+0x20/0x30
[   33.677218]  copy_user_test_oob+0x728/0xec8
[   33.677343]  kunit_try_run_case+0x170/0x3f0
[   33.677474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.677546]  kthread+0x328/0x630
[   33.677694]  ret_from_fork+0x10/0x20
[   33.677750] 
[   33.678090] Allocated by task 316:
[   33.678207]  kasan_save_stack+0x3c/0x68
[   33.678396]  kasan_save_track+0x20/0x40
[   33.678471]  kasan_save_alloc_info+0x40/0x58
[   33.678597]  __kasan_kmalloc+0xd4/0xd8
[   33.678673]  __kmalloc_noprof+0x198/0x4c8
[   33.678771]  kunit_kmalloc_array+0x34/0x88
[   33.678850]  copy_user_test_oob+0xac/0xec8
[   33.679004]  kunit_try_run_case+0x170/0x3f0
[   33.679202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.679348]  kthread+0x328/0x630
[   33.679489]  ret_from_fork+0x10/0x20
[   33.679539] 
[   33.679561] The buggy address belongs to the object at fff00000c9bb7300
[   33.679561]  which belongs to the cache kmalloc-128 of size 128
[   33.679691] The buggy address is located 0 bytes inside of
[   33.679691]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.679918] 
[   33.680242] The buggy address belongs to the physical page:
[   33.680651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.680735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.681049] page_type: f5(slab)
[   33.681157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.681314] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.681529] page dumped because: kasan: bad access detected
[   33.681824] 
[   33.681923] Memory state around the buggy address:
[   33.681964]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.682521]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.682686] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.682774]                                                                 ^
[   33.682823]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.682869]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.683194] ==================================================================
[   33.710766] ==================================================================
[   33.710839] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   33.710892] Write of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.711240] 
[   33.711448] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.711804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.711865] Hardware name: linux,dummy-virt (DT)
[   33.712086] Call trace:
[   33.712169]  show_stack+0x20/0x38 (C)
[   33.712545]  dump_stack_lvl+0x8c/0xd0
[   33.712638]  print_report+0x118/0x5d0
[   33.712825]  kasan_report+0xdc/0x128
[   33.713030]  kasan_check_range+0x100/0x1a8
[   33.713215]  __kasan_check_write+0x20/0x30
[   33.713300]  copy_user_test_oob+0x434/0xec8
[   33.713546]  kunit_try_run_case+0x170/0x3f0
[   33.713798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.713938]  kthread+0x328/0x630
[   33.714057]  ret_from_fork+0x10/0x20
[   33.714130] 
[   33.714351] Allocated by task 316:
[   33.714427]  kasan_save_stack+0x3c/0x68
[   33.714634]  kasan_save_track+0x20/0x40
[   33.714845]  kasan_save_alloc_info+0x40/0x58
[   33.715033]  __kasan_kmalloc+0xd4/0xd8
[   33.715209]  __kmalloc_noprof+0x198/0x4c8
[   33.715393]  kunit_kmalloc_array+0x34/0x88
[   33.715437]  copy_user_test_oob+0xac/0xec8
[   33.715666]  kunit_try_run_case+0x170/0x3f0
[   33.716034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.716198]  kthread+0x328/0x630
[   33.716367]  ret_from_fork+0x10/0x20
[   33.716593] 
[   33.716638] The buggy address belongs to the object at fff00000c9bb7300
[   33.716638]  which belongs to the cache kmalloc-128 of size 128
[   33.716975] The buggy address is located 0 bytes inside of
[   33.716975]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.717059] 
[   33.717081] The buggy address belongs to the physical page:
[   33.717326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.717497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.717892] page_type: f5(slab)
[   33.717939] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.718247] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.718358] page dumped because: kasan: bad access detected
[   33.718847] 
[   33.718876] Memory state around the buggy address:
[   33.719220]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.719317]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.719578] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.719764]                                                                 ^
[   33.720035]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.720306]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.720359] ==================================================================
[   33.693207] ==================================================================
[   33.693349] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   33.693414] Write of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.693744] 
[   33.693829] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.693926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.693976] Hardware name: linux,dummy-virt (DT)
[   33.694073] Call trace:
[   33.694099]  show_stack+0x20/0x38 (C)
[   33.694300]  dump_stack_lvl+0x8c/0xd0
[   33.694391]  print_report+0x118/0x5d0
[   33.694720]  kasan_report+0xdc/0x128
[   33.694802]  kasan_check_range+0x100/0x1a8
[   33.694855]  __kasan_check_write+0x20/0x30
[   33.694947]  copy_user_test_oob+0x35c/0xec8
[   33.695001]  kunit_try_run_case+0x170/0x3f0
[   33.695054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.695153]  kthread+0x328/0x630
[   33.695197]  ret_from_fork+0x10/0x20
[   33.695264] 
[   33.695566] Allocated by task 316:
[   33.695647]  kasan_save_stack+0x3c/0x68
[   33.695734]  kasan_save_track+0x20/0x40
[   33.695789]  kasan_save_alloc_info+0x40/0x58
[   33.695941]  __kasan_kmalloc+0xd4/0xd8
[   33.696027]  __kmalloc_noprof+0x198/0x4c8
[   33.696123]  kunit_kmalloc_array+0x34/0x88
[   33.696370]  copy_user_test_oob+0xac/0xec8
[   33.696571]  kunit_try_run_case+0x170/0x3f0
[   33.696718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.696947]  kthread+0x328/0x630
[   33.697127]  ret_from_fork+0x10/0x20
[   33.697319] 
[   33.697351] The buggy address belongs to the object at fff00000c9bb7300
[   33.697351]  which belongs to the cache kmalloc-128 of size 128
[   33.698024] The buggy address is located 0 bytes inside of
[   33.698024]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.698128] 
[   33.698183] The buggy address belongs to the physical page:
[   33.698237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.698874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.699096] page_type: f5(slab)
[   33.699312] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.699463] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.699649] page dumped because: kasan: bad access detected
[   33.699906] 
[   33.700066] Memory state around the buggy address:
[   33.700253]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.700319]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.700504] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.700893]                                                                 ^
[   33.700998]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.701131]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.701502] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   33.614170] ==================================================================
[   33.614591] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   33.614673] Read of size 8 at addr fff00000c9bb7278 by task kunit_try_catch/312
[   33.614815] 
[   33.614894] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.615030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.615174] Hardware name: linux,dummy-virt (DT)
[   33.615392] Call trace:
[   33.615435]  show_stack+0x20/0x38 (C)
[   33.615574]  dump_stack_lvl+0x8c/0xd0
[   33.615670]  print_report+0x118/0x5d0
[   33.615725]  kasan_report+0xdc/0x128
[   33.615769]  __asan_report_load8_noabort+0x20/0x30
[   33.616232]  copy_to_kernel_nofault+0x204/0x250
[   33.616326]  copy_to_kernel_nofault_oob+0x158/0x418
[   33.616392]  kunit_try_run_case+0x170/0x3f0
[   33.616604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.616866]  kthread+0x328/0x630
[   33.617128]  ret_from_fork+0x10/0x20
[   33.617342] 
[   33.617400] Allocated by task 312:
[   33.617471]  kasan_save_stack+0x3c/0x68
[   33.617527]  kasan_save_track+0x20/0x40
[   33.617818]  kasan_save_alloc_info+0x40/0x58
[   33.618005]  __kasan_kmalloc+0xd4/0xd8
[   33.618224]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.618325]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.618700]  kunit_try_run_case+0x170/0x3f0
[   33.618811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.618909]  kthread+0x328/0x630
[   33.618992]  ret_from_fork+0x10/0x20
[   33.619137] 
[   33.619197] The buggy address belongs to the object at fff00000c9bb7200
[   33.619197]  which belongs to the cache kmalloc-128 of size 128
[   33.619319] The buggy address is located 0 bytes to the right of
[   33.619319]  allocated 120-byte region [fff00000c9bb7200, fff00000c9bb7278)
[   33.619396] 
[   33.619427] The buggy address belongs to the physical page:
[   33.619463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.619540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.619596] page_type: f5(slab)
[   33.619650] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.619714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.619760] page dumped because: kasan: bad access detected
[   33.619795] 
[   33.619816] Memory state around the buggy address:
[   33.620204]  fff00000c9bb7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.620270]  fff00000c9bb7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.620318] >fff00000c9bb7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.620764]                                                                 ^
[   33.620861]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.620986]  fff00000c9bb7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.621074] ==================================================================
[   33.622080] ==================================================================
[   33.622258] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   33.622312] Write of size 8 at addr fff00000c9bb7278 by task kunit_try_catch/312
[   33.622650] 
[   33.622760] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.622867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.622946] Hardware name: linux,dummy-virt (DT)
[   33.622982] Call trace:
[   33.623006]  show_stack+0x20/0x38 (C)
[   33.623198]  dump_stack_lvl+0x8c/0xd0
[   33.623247]  print_report+0x118/0x5d0
[   33.623690]  kasan_report+0xdc/0x128
[   33.623799]  kasan_check_range+0x100/0x1a8
[   33.623857]  __kasan_check_write+0x20/0x30
[   33.623932]  copy_to_kernel_nofault+0x8c/0x250
[   33.623987]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   33.624040]  kunit_try_run_case+0x170/0x3f0
[   33.624352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.624485]  kthread+0x328/0x630
[   33.624545]  ret_from_fork+0x10/0x20
[   33.624605] 
[   33.624629] Allocated by task 312:
[   33.624663]  kasan_save_stack+0x3c/0x68
[   33.624726]  kasan_save_track+0x20/0x40
[   33.624763]  kasan_save_alloc_info+0x40/0x58
[   33.624803]  __kasan_kmalloc+0xd4/0xd8
[   33.624852]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.624905]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.624958]  kunit_try_run_case+0x170/0x3f0
[   33.624996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.625043]  kthread+0x328/0x630
[   33.625086]  ret_from_fork+0x10/0x20
[   33.625134] 
[   33.625164] The buggy address belongs to the object at fff00000c9bb7200
[   33.625164]  which belongs to the cache kmalloc-128 of size 128
[   33.625236] The buggy address is located 0 bytes to the right of
[   33.625236]  allocated 120-byte region [fff00000c9bb7200, fff00000c9bb7278)
[   33.625304] 
[   33.625335] The buggy address belongs to the physical page:
[   33.625378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.625435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.625485] page_type: f5(slab)
[   33.626042] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.626121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.626185] page dumped because: kasan: bad access detected
[   33.626443] 
[   33.627384] Memory state around the buggy address:
[   33.627444]  fff00000c9bb7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.627557]  fff00000c9bb7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.627628] >fff00000c9bb7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.627703]                                                                 ^
[   33.627975]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.628024]  fff00000c9bb7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.628068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   33.569838] ==================================================================
[   33.569921] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   33.569979] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300
[   33.570032] 
[   33.570105] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.570290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.570328] Hardware name: linux,dummy-virt (DT)
[   33.570373] Call trace:
[   33.570632]  show_stack+0x20/0x38 (C)
[   33.570718]  dump_stack_lvl+0x8c/0xd0
[   33.570771]  print_report+0x310/0x5d0
[   33.570816]  kasan_report+0xdc/0x128
[   33.570880]  __asan_report_load1_noabort+0x20/0x30
[   33.570933]  vmalloc_oob+0x578/0x5d0
[   33.571009]  kunit_try_run_case+0x170/0x3f0
[   33.571106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.571163]  kthread+0x328/0x630
[   33.571208]  ret_from_fork+0x10/0x20
[   33.571257] 
[   33.571280] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   33.571339] The buggy address belongs to the physical page:
[   33.571374] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c51
[   33.571429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.571494] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.571560] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.571607] page dumped because: kasan: bad access detected
[   33.571643] 
[   33.571663] Memory state around the buggy address:
[   33.571700]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.571747]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.571793] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.571836]                                                              ^
[   33.571878]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.572119]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.572203] ==================================================================
[   33.572967] ==================================================================
[   33.573053] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   33.573105] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300
[   33.573170] 
[   33.573396] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.573524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.573592] Hardware name: linux,dummy-virt (DT)
[   33.573648] Call trace:
[   33.573678]  show_stack+0x20/0x38 (C)
[   33.573730]  dump_stack_lvl+0x8c/0xd0
[   33.573795]  print_report+0x310/0x5d0
[   33.573861]  kasan_report+0xdc/0x128
[   33.573905]  __asan_report_load1_noabort+0x20/0x30
[   33.573968]  vmalloc_oob+0x51c/0x5d0
[   33.574035]  kunit_try_run_case+0x170/0x3f0
[   33.574100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.574183]  kthread+0x328/0x630
[   33.574227]  ret_from_fork+0x10/0x20
[   33.574283] 
[   33.574305] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   33.574348] The buggy address belongs to the physical page:
[   33.574387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c51
[   33.574440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.574583] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.574642] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.574815] page dumped because: kasan: bad access detected
[   33.574859] 
[   33.574899] Memory state around the buggy address:
[   33.574960]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.575089]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.575211] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.575265]                                                                 ^
[   33.575353]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.575428]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.575471] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.546725] ==================================================================
[   33.546777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   33.546829] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.546881] 
[   33.546911] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.546999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.547027] Hardware name: linux,dummy-virt (DT)
[   33.547061] Call trace:
[   33.547151]  show_stack+0x20/0x38 (C)
[   33.547206]  dump_stack_lvl+0x8c/0xd0
[   33.547290]  print_report+0x118/0x5d0
[   33.547367]  kasan_report+0xdc/0x128
[   33.547424]  __asan_report_load8_noabort+0x20/0x30
[   33.547528]  kasan_atomics_helper+0x3e20/0x4858
[   33.547617]  kasan_atomics+0x198/0x2e0
[   33.547666]  kunit_try_run_case+0x170/0x3f0
[   33.547715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.547770]  kthread+0x328/0x630
[   33.547818]  ret_from_fork+0x10/0x20
[   33.547868] 
[   33.547888] Allocated by task 296:
[   33.547919]  kasan_save_stack+0x3c/0x68
[   33.547959]  kasan_save_track+0x20/0x40
[   33.547999]  kasan_save_alloc_info+0x40/0x58
[   33.548040]  __kasan_kmalloc+0xd4/0xd8
[   33.548081]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.548125]  kasan_atomics+0xb8/0x2e0
[   33.548181]  kunit_try_run_case+0x170/0x3f0
[   33.548220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.548266]  kthread+0x328/0x630
[   33.549277]  ret_from_fork+0x10/0x20
[   33.549410] 
[   33.549491] The buggy address belongs to the object at fff00000c9bb2f80
[   33.549491]  which belongs to the cache kmalloc-64 of size 64
[   33.549581] The buggy address is located 0 bytes to the right of
[   33.549581]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.549658] 
[   33.549679] The buggy address belongs to the physical page:
[   33.549714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.549770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.549822] page_type: f5(slab)
[   33.549860] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.549914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.549956] page dumped because: kasan: bad access detected
[   33.549991] 
[   33.550011] Memory state around the buggy address:
[   33.550046]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.550094]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.550178] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.550266]                                      ^
[   33.550411]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.550555]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.550632] ==================================================================
[   33.503600] ==================================================================
[   33.503666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   33.503845] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.503918] 
[   33.503977] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.504194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.504274] Hardware name: linux,dummy-virt (DT)
[   33.504364] Call trace:
[   33.504389]  show_stack+0x20/0x38 (C)
[   33.504463]  dump_stack_lvl+0x8c/0xd0
[   33.504527]  print_report+0x118/0x5d0
[   33.504573]  kasan_report+0xdc/0x128
[   33.504617]  kasan_check_range+0x100/0x1a8
[   33.504781]  __kasan_check_write+0x20/0x30
[   33.504944]  kasan_atomics_helper+0x14e4/0x4858
[   33.505067]  kasan_atomics+0x198/0x2e0
[   33.505146]  kunit_try_run_case+0x170/0x3f0
[   33.505204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.505261]  kthread+0x328/0x630
[   33.505451]  ret_from_fork+0x10/0x20
[   33.505587] 
[   33.505631] Allocated by task 296:
[   33.505757]  kasan_save_stack+0x3c/0x68
[   33.505797]  kasan_save_track+0x20/0x40
[   33.505860]  kasan_save_alloc_info+0x40/0x58
[   33.505902]  __kasan_kmalloc+0xd4/0xd8
[   33.506088]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.506167]  kasan_atomics+0xb8/0x2e0
[   33.506273]  kunit_try_run_case+0x170/0x3f0
[   33.506349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.506617]  kthread+0x328/0x630
[   33.506717]  ret_from_fork+0x10/0x20
[   33.506788] 
[   33.506810] The buggy address belongs to the object at fff00000c9bb2f80
[   33.506810]  which belongs to the cache kmalloc-64 of size 64
[   33.506883] The buggy address is located 0 bytes to the right of
[   33.506883]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.506951] 
[   33.506974] The buggy address belongs to the physical page:
[   33.507009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.507070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.507121] page_type: f5(slab)
[   33.507176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.507230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.507284] page dumped because: kasan: bad access detected
[   33.507327] 
[   33.507357] Memory state around the buggy address:
[   33.507412]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.507459]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.507514] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.507556]                                      ^
[   33.507592]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.507638]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.507695] ==================================================================
[   33.489915] ==================================================================
[   33.489966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   33.490037] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.490091] 
[   33.490123] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.490323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.490523] Hardware name: linux,dummy-virt (DT)
[   33.490631] Call trace:
[   33.490717]  show_stack+0x20/0x38 (C)
[   33.490769]  dump_stack_lvl+0x8c/0xd0
[   33.490820]  print_report+0x118/0x5d0
[   33.490994]  kasan_report+0xdc/0x128
[   33.491174]  __asan_report_load8_noabort+0x20/0x30
[   33.491273]  kasan_atomics_helper+0x3f04/0x4858
[   33.491377]  kasan_atomics+0x198/0x2e0
[   33.491453]  kunit_try_run_case+0x170/0x3f0
[   33.491574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.491669]  kthread+0x328/0x630
[   33.491783]  ret_from_fork+0x10/0x20
[   33.491836] 
[   33.491856] Allocated by task 296:
[   33.491901]  kasan_save_stack+0x3c/0x68
[   33.492021]  kasan_save_track+0x20/0x40
[   33.492116]  kasan_save_alloc_info+0x40/0x58
[   33.492276]  __kasan_kmalloc+0xd4/0xd8
[   33.492317]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.492378]  kasan_atomics+0xb8/0x2e0
[   33.492418]  kunit_try_run_case+0x170/0x3f0
[   33.492628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.492695]  kthread+0x328/0x630
[   33.492815]  ret_from_fork+0x10/0x20
[   33.492922] 
[   33.493000] The buggy address belongs to the object at fff00000c9bb2f80
[   33.493000]  which belongs to the cache kmalloc-64 of size 64
[   33.493284] The buggy address is located 0 bytes to the right of
[   33.493284]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.493410] 
[   33.493462] The buggy address belongs to the physical page:
[   33.493496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.493585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.493678] page_type: f5(slab)
[   33.493717] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.493768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.493814] page dumped because: kasan: bad access detected
[   33.493847] 
[   33.493867] Memory state around the buggy address:
[   33.494135]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.494249]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.494303] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.494380]                                      ^
[   33.494437]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.494593]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.494738] ==================================================================
[   33.350590] ==================================================================
[   33.350645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.350698] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.350780] 
[   33.350818] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.350906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.350970] Hardware name: linux,dummy-virt (DT)
[   33.351019] Call trace:
[   33.351044]  show_stack+0x20/0x38 (C)
[   33.351111]  dump_stack_lvl+0x8c/0xd0
[   33.351172]  print_report+0x118/0x5d0
[   33.351217]  kasan_report+0xdc/0x128
[   33.351270]  kasan_check_range+0x100/0x1a8
[   33.351319]  __kasan_check_write+0x20/0x30
[   33.351365]  kasan_atomics_helper+0x99c/0x4858
[   33.351416]  kasan_atomics+0x198/0x2e0
[   33.351462]  kunit_try_run_case+0x170/0x3f0
[   33.351665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.351759]  kthread+0x328/0x630
[   33.351868]  ret_from_fork+0x10/0x20
[   33.352029] 
[   33.352139] Allocated by task 296:
[   33.352226]  kasan_save_stack+0x3c/0x68
[   33.352320]  kasan_save_track+0x20/0x40
[   33.352447]  kasan_save_alloc_info+0x40/0x58
[   33.352603]  __kasan_kmalloc+0xd4/0xd8
[   33.352667]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.352711]  kasan_atomics+0xb8/0x2e0
[   33.352773]  kunit_try_run_case+0x170/0x3f0
[   33.352814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.353009]  kthread+0x328/0x630
[   33.353212]  ret_from_fork+0x10/0x20
[   33.353309] 
[   33.353332] The buggy address belongs to the object at fff00000c9bb2f80
[   33.353332]  which belongs to the cache kmalloc-64 of size 64
[   33.353427] The buggy address is located 0 bytes to the right of
[   33.353427]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.353591] 
[   33.353661] The buggy address belongs to the physical page:
[   33.353723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.353846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.354030] page_type: f5(slab)
[   33.354171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.354235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.354316] page dumped because: kasan: bad access detected
[   33.354350] 
[   33.354377] Memory state around the buggy address:
[   33.354480]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.355239] ==================================================================
[   33.495313] ==================================================================
[   33.495366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   33.495433] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.495494] 
[   33.495538] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.495789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.495845] Hardware name: linux,dummy-virt (DT)
[   33.495880] Call trace:
[   33.495903]  show_stack+0x20/0x38 (C)
[   33.496063]  dump_stack_lvl+0x8c/0xd0
[   33.496117]  print_report+0x118/0x5d0
[   33.496232]  kasan_report+0xdc/0x128
[   33.496559]  kasan_check_range+0x100/0x1a8
[   33.496680]  __kasan_check_write+0x20/0x30
[   33.496786]  kasan_atomics_helper+0x1414/0x4858
[   33.496867]  kasan_atomics+0x198/0x2e0
[   33.497009]  kunit_try_run_case+0x170/0x3f0
[   33.497123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.497201]  kthread+0x328/0x630
[   33.497253]  ret_from_fork+0x10/0x20
[   33.497303] 
[   33.497324] Allocated by task 296:
[   33.497379]  kasan_save_stack+0x3c/0x68
[   33.497420]  kasan_save_track+0x20/0x40
[   33.497459]  kasan_save_alloc_info+0x40/0x58
[   33.497500]  __kasan_kmalloc+0xd4/0xd8
[   33.497552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.497596]  kasan_atomics+0xb8/0x2e0
[   33.497636]  kunit_try_run_case+0x170/0x3f0
[   33.497677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.497722]  kthread+0x328/0x630
[   33.497847]  ret_from_fork+0x10/0x20
[   33.498119] 
[   33.498196] The buggy address belongs to the object at fff00000c9bb2f80
[   33.498196]  which belongs to the cache kmalloc-64 of size 64
[   33.498376] The buggy address is located 0 bytes to the right of
[   33.498376]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.498686] 
[   33.498772] The buggy address belongs to the physical page:
[   33.498816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.498870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.498920] page_type: f5(slab)
[   33.498987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.499245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.499310] page dumped because: kasan: bad access detected
[   33.499378] 
[   33.499428] Memory state around the buggy address:
[   33.499474]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.499724]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.499784] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.499826]                                      ^
[   33.500016]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.500104]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.500231] ==================================================================
[   33.531523] ==================================================================
[   33.531571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   33.531620] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.531736] 
[   33.531831] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.531980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.532054] Hardware name: linux,dummy-virt (DT)
[   33.532141] Call trace:
[   33.532209]  show_stack+0x20/0x38 (C)
[   33.532257]  dump_stack_lvl+0x8c/0xd0
[   33.532306]  print_report+0x118/0x5d0
[   33.532351]  kasan_report+0xdc/0x128
[   33.532667]  __asan_report_load8_noabort+0x20/0x30
[   33.532812]  kasan_atomics_helper+0x3e10/0x4858
[   33.532930]  kasan_atomics+0x198/0x2e0
[   33.532999]  kunit_try_run_case+0x170/0x3f0
[   33.533049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.533289]  kthread+0x328/0x630
[   33.533384]  ret_from_fork+0x10/0x20
[   33.533434] 
[   33.533455] Allocated by task 296:
[   33.533527]  kasan_save_stack+0x3c/0x68
[   33.533569]  kasan_save_track+0x20/0x40
[   33.533608]  kasan_save_alloc_info+0x40/0x58
[   33.533649]  __kasan_kmalloc+0xd4/0xd8
[   33.533806]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.533963]  kasan_atomics+0xb8/0x2e0
[   33.534028]  kunit_try_run_case+0x170/0x3f0
[   33.534319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.534440]  kthread+0x328/0x630
[   33.534545]  ret_from_fork+0x10/0x20
[   33.534624] 
[   33.534664] The buggy address belongs to the object at fff00000c9bb2f80
[   33.534664]  which belongs to the cache kmalloc-64 of size 64
[   33.534726] The buggy address is located 0 bytes to the right of
[   33.534726]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.534991] 
[   33.535015] The buggy address belongs to the physical page:
[   33.535066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.535156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.535288] page_type: f5(slab)
[   33.535354] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.535407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.535451] page dumped because: kasan: bad access detected
[   33.535589] 
[   33.535650] Memory state around the buggy address:
[   33.535801]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.535897]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.536005] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.536074]                                      ^
[   33.536133]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.536356]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.536409] ==================================================================
[   33.501226] ==================================================================
[   33.501284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   33.501334] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.501386] 
[   33.501418] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.501518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.501548] Hardware name: linux,dummy-virt (DT)
[   33.501580] Call trace:
[   33.501605]  show_stack+0x20/0x38 (C)
[   33.501652]  dump_stack_lvl+0x8c/0xd0
[   33.501702]  print_report+0x118/0x5d0
[   33.501746]  kasan_report+0xdc/0x128
[   33.501790]  kasan_check_range+0x100/0x1a8
[   33.501838]  __kasan_check_write+0x20/0x30
[   33.501886]  kasan_atomics_helper+0x147c/0x4858
[   33.501938]  kasan_atomics+0x198/0x2e0
[   33.501987]  kunit_try_run_case+0x170/0x3f0
[   33.502035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.502090]  kthread+0x328/0x630
[   33.502133]  ret_from_fork+0x10/0x20
[   33.502180] 
[   33.502202] Allocated by task 296:
[   33.502232]  kasan_save_stack+0x3c/0x68
[   33.502271]  kasan_save_track+0x20/0x40
[   33.502309]  kasan_save_alloc_info+0x40/0x58
[   33.502350]  __kasan_kmalloc+0xd4/0xd8
[   33.502395]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.502438]  kasan_atomics+0xb8/0x2e0
[   33.502477]  kunit_try_run_case+0x170/0x3f0
[   33.502529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.502575]  kthread+0x328/0x630
[   33.502610]  ret_from_fork+0x10/0x20
[   33.502648] 
[   33.502669] The buggy address belongs to the object at fff00000c9bb2f80
[   33.502669]  which belongs to the cache kmalloc-64 of size 64
[   33.502730] The buggy address is located 0 bytes to the right of
[   33.502730]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.502797] 
[   33.502820] The buggy address belongs to the physical page:
[   33.502854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.502904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.502954] page_type: f5(slab)
[   33.502991] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.503045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.503088] page dumped because: kasan: bad access detected
[   33.503122] 
[   33.503142] Memory state around the buggy address:
[   33.503176]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.503221]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.503266] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.503307]                                      ^
[   33.503342]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.503387]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.503428] ==================================================================
[   33.401627] ==================================================================
[   33.401678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.401884] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.401958] 
[   33.402008] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.402154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.402212] Hardware name: linux,dummy-virt (DT)
[   33.402246] Call trace:
[   33.402298]  show_stack+0x20/0x38 (C)
[   33.402372]  dump_stack_lvl+0x8c/0xd0
[   33.402422]  print_report+0x118/0x5d0
[   33.402469]  kasan_report+0xdc/0x128
[   33.402552]  kasan_check_range+0x100/0x1a8
[   33.402778]  __kasan_check_write+0x20/0x30
[   33.402851]  kasan_atomics_helper+0xd3c/0x4858
[   33.402910]  kasan_atomics+0x198/0x2e0
[   33.402960]  kunit_try_run_case+0x170/0x3f0
[   33.403009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.403064]  kthread+0x328/0x630
[   33.403105]  ret_from_fork+0x10/0x20
[   33.403155] 
[   33.403175] Allocated by task 296:
[   33.403205]  kasan_save_stack+0x3c/0x68
[   33.403246]  kasan_save_track+0x20/0x40
[   33.403286]  kasan_save_alloc_info+0x40/0x58
[   33.403328]  __kasan_kmalloc+0xd4/0xd8
[   33.403368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.403422]  kasan_atomics+0xb8/0x2e0
[   33.403462]  kunit_try_run_case+0x170/0x3f0
[   33.403522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.403570]  kthread+0x328/0x630
[   33.403605]  ret_from_fork+0x10/0x20
[   33.403644] 
[   33.403665] The buggy address belongs to the object at fff00000c9bb2f80
[   33.403665]  which belongs to the cache kmalloc-64 of size 64
[   33.403910] The buggy address is located 0 bytes to the right of
[   33.403910]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.404161] 
[   33.404196] The buggy address belongs to the physical page:
[   33.404229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.404403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.406008] page_type: f5(slab)
[   33.406063] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.406117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.406161] page dumped because: kasan: bad access detected
[   33.406197] 
[   33.406217] Memory state around the buggy address:
[   33.406253]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.406300]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.406346] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.406393]                                      ^
[   33.406429]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.406474]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.406527] ==================================================================
[   33.406935] ==================================================================
[   33.406985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.407037] Read of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.407091] 
[   33.407122] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.407208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.407237] Hardware name: linux,dummy-virt (DT)
[   33.407272] Call trace:
[   33.407295]  show_stack+0x20/0x38 (C)
[   33.407345]  dump_stack_lvl+0x8c/0xd0
[   33.407395]  print_report+0x118/0x5d0
[   33.407441]  kasan_report+0xdc/0x128
[   33.407487]  __asan_report_load4_noabort+0x20/0x30
[   33.407556]  kasan_atomics_helper+0x3e04/0x4858
[   33.407608]  kasan_atomics+0x198/0x2e0
[   33.407658]  kunit_try_run_case+0x170/0x3f0
[   33.407708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.407763]  kthread+0x328/0x630
[   33.407807]  ret_from_fork+0x10/0x20
[   33.407855] 
[   33.407893] Allocated by task 296:
[   33.407925]  kasan_save_stack+0x3c/0x68
[   33.407965]  kasan_save_track+0x20/0x40
[   33.408014]  kasan_save_alloc_info+0x40/0x58
[   33.408062]  __kasan_kmalloc+0xd4/0xd8
[   33.408103]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.408149]  kasan_atomics+0xb8/0x2e0
[   33.408188]  kunit_try_run_case+0x170/0x3f0
[   33.408228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.408280]  kthread+0x328/0x630
[   33.408320]  ret_from_fork+0x10/0x20
[   33.408359] 
[   33.408380] The buggy address belongs to the object at fff00000c9bb2f80
[   33.408380]  which belongs to the cache kmalloc-64 of size 64
[   33.408441] The buggy address is located 0 bytes to the right of
[   33.408441]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.408526] 
[   33.408553] The buggy address belongs to the physical page:
[   33.408595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.408650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.408701] page_type: f5(slab)
[   33.408741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.408802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.408846] page dumped because: kasan: bad access detected
[   33.408880] 
[   33.408908] Memory state around the buggy address:
[   33.408951]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.408997]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.409043] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.409083]                                      ^
[   33.409118]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.409164]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.409205] ==================================================================
[   33.364777] ==================================================================
[   33.364879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.364931] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.364983] 
[   33.365012] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.365101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.365277] Hardware name: linux,dummy-virt (DT)
[   33.365529]  kasan_report+0xdc/0x128
[   33.365933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.366585]  __kasan_kmalloc+0xd4/0xd8
[   33.366966] The buggy address is located 0 bytes to the right of
[   33.366966]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.367033] 
[   33.367069] The buggy address belongs to the physical page:
[   33.367103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.367157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.367209] page_type: f5(slab)
[   33.367248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.367311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.367369] page dumped because: kasan: bad access detected
[   33.367402] 
[   33.367424] Memory state around the buggy address:
[   33.367468]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.367525]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.367576] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.367617]                                      ^
[   33.367652]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.367697]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.367740] ==================================================================
[   33.421087] ==================================================================
[   33.421170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.421221] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.421311] 
[   33.421370] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.421487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.421529] Hardware name: linux,dummy-virt (DT)
[   33.421561] Call trace:
[   33.421586]  show_stack+0x20/0x38 (C)
[   33.421675]  dump_stack_lvl+0x8c/0xd0
[   33.421724]  print_report+0x118/0x5d0
[   33.421771]  kasan_report+0xdc/0x128
[   33.421816]  kasan_check_range+0x100/0x1a8
[   33.421864]  __kasan_check_write+0x20/0x30
[   33.422018]  kasan_atomics_helper+0xe44/0x4858
[   33.422150]  kasan_atomics+0x198/0x2e0
[   33.422203]  kunit_try_run_case+0x170/0x3f0
[   33.422269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.422337]  kthread+0x328/0x630
[   33.422411]  ret_from_fork+0x10/0x20
[   33.422691] 
[   33.422753] Allocated by task 296:
[   33.422787]  kasan_save_stack+0x3c/0x68
[   33.422832]  kasan_save_track+0x20/0x40
[   33.422891]  kasan_save_alloc_info+0x40/0x58
[   33.423012]  __kasan_kmalloc+0xd4/0xd8
[   33.423055]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.423098]  kasan_atomics+0xb8/0x2e0
[   33.423151]  kunit_try_run_case+0x170/0x3f0
[   33.423192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.423238]  kthread+0x328/0x630
[   33.423445]  ret_from_fork+0x10/0x20
[   33.423498] 
[   33.423607] The buggy address belongs to the object at fff00000c9bb2f80
[   33.423607]  which belongs to the cache kmalloc-64 of size 64
[   33.423727] The buggy address is located 0 bytes to the right of
[   33.423727]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.423943] 
[   33.424071] The buggy address belongs to the physical page:
[   33.424106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.424201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.424324] page_type: f5(slab)
[   33.424383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.424437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.424481] page dumped because: kasan: bad access detected
[   33.424699] 
[   33.424842] Memory state around the buggy address:
[   33.424946]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.425012]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.425103] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.425402]                                      ^
[   33.425481]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.425663]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.425759] ==================================================================
[   33.551760] ==================================================================
[   33.551844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   33.551949] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.552049] 
[   33.552436] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.552600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.552659] Hardware name: linux,dummy-virt (DT)
[   33.552816] Call trace:
[   33.552904]  show_stack+0x20/0x38 (C)
[   33.553083]  dump_stack_lvl+0x8c/0xd0
[   33.553189]  print_report+0x118/0x5d0
[   33.553344]  kasan_report+0xdc/0x128
[   33.553442]  kasan_check_range+0x100/0x1a8
[   33.553488]  __kasan_check_write+0x20/0x30
[   33.553559]  kasan_atomics_helper+0x17ec/0x4858
[   33.553609]  kasan_atomics+0x198/0x2e0
[   33.553656]  kunit_try_run_case+0x170/0x3f0
[   33.553704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.554112]  kthread+0x328/0x630
[   33.554220]  ret_from_fork+0x10/0x20
[   33.554297] 
[   33.554382] Allocated by task 296:
[   33.554554]  kasan_save_stack+0x3c/0x68
[   33.554639]  kasan_save_track+0x20/0x40
[   33.554974]  kasan_save_alloc_info+0x40/0x58
[   33.555058]  __kasan_kmalloc+0xd4/0xd8
[   33.555188]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.555256]  kasan_atomics+0xb8/0x2e0
[   33.555328]  kunit_try_run_case+0x170/0x3f0
[   33.555368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.555415]  kthread+0x328/0x630
[   33.555595]  ret_from_fork+0x10/0x20
[   33.555751] 
[   33.555879] The buggy address belongs to the object at fff00000c9bb2f80
[   33.555879]  which belongs to the cache kmalloc-64 of size 64
[   33.556021] The buggy address is located 0 bytes to the right of
[   33.556021]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.556170] 
[   33.556385] The buggy address belongs to the physical page:
[   33.556478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.556685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.556803] page_type: f5(slab)
[   33.556865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.556919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.557109] page dumped because: kasan: bad access detected
[   33.557145] 
[   33.557166] Memory state around the buggy address:
[   33.557201]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.557404]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.557559] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.557629]                                      ^
[   33.557666]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.557748]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.557854] ==================================================================
[   33.512665] ==================================================================
[   33.512754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   33.512810] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.512863] 
[   33.512923] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.513035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.513073] Hardware name: linux,dummy-virt (DT)
[   33.513122] Call trace:
[   33.513148]  show_stack+0x20/0x38 (C)
[   33.513196]  dump_stack_lvl+0x8c/0xd0
[   33.513245]  print_report+0x118/0x5d0
[   33.513289]  kasan_report+0xdc/0x128
[   33.513333]  kasan_check_range+0x100/0x1a8
[   33.513381]  __kasan_check_write+0x20/0x30
[   33.513429]  kasan_atomics_helper+0x15b4/0x4858
[   33.513651]  kasan_atomics+0x198/0x2e0
[   33.513738]  kunit_try_run_case+0x170/0x3f0
[   33.513791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.513863]  kthread+0x328/0x630
[   33.513935]  ret_from_fork+0x10/0x20
[   33.514067] 
[   33.514220] Allocated by task 296:
[   33.514277]  kasan_save_stack+0x3c/0x68
[   33.514320]  kasan_save_track+0x20/0x40
[   33.514382]  kasan_save_alloc_info+0x40/0x58
[   33.514425]  __kasan_kmalloc+0xd4/0xd8
[   33.514467]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.514522]  kasan_atomics+0xb8/0x2e0
[   33.514563]  kunit_try_run_case+0x170/0x3f0
[   33.514604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.514755]  kthread+0x328/0x630
[   33.514802]  ret_from_fork+0x10/0x20
[   33.514840] 
[   33.514880] The buggy address belongs to the object at fff00000c9bb2f80
[   33.514880]  which belongs to the cache kmalloc-64 of size 64
[   33.514974] The buggy address is located 0 bytes to the right of
[   33.514974]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.515044] 
[   33.515072] The buggy address belongs to the physical page:
[   33.515106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.515158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.515305] page_type: f5(slab)
[   33.515350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.515404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.515448] page dumped because: kasan: bad access detected
[   33.515494] 
[   33.515527] Memory state around the buggy address:
[   33.515562]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.515607]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.515662] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.515704]                                      ^
[   33.515741]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.515814]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.515857] ==================================================================
[   33.457597] ==================================================================
[   33.457651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.457701] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.457753] 
[   33.457821] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.457922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.457951] Hardware name: linux,dummy-virt (DT)
[   33.457983] Call trace:
[   33.458014]  show_stack+0x20/0x38 (C)
[   33.458181]  dump_stack_lvl+0x8c/0xd0
[   33.458234]  print_report+0x118/0x5d0
[   33.458344]  kasan_report+0xdc/0x128
[   33.458455]  kasan_check_range+0x100/0x1a8
[   33.458545]  __kasan_check_write+0x20/0x30
[   33.458632]  kasan_atomics_helper+0x10c0/0x4858
[   33.458686]  kasan_atomics+0x198/0x2e0
[   33.458752]  kunit_try_run_case+0x170/0x3f0
[   33.458827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.458981]  kthread+0x328/0x630
[   33.459027]  ret_from_fork+0x10/0x20
[   33.459074] 
[   33.459200] Allocated by task 296:
[   33.459286]  kasan_save_stack+0x3c/0x68
[   33.459361]  kasan_save_track+0x20/0x40
[   33.459419]  kasan_save_alloc_info+0x40/0x58
[   33.459477]  __kasan_kmalloc+0xd4/0xd8
[   33.459527]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.459570]  kasan_atomics+0xb8/0x2e0
[   33.459675]  kunit_try_run_case+0x170/0x3f0
[   33.459804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.459947]  kthread+0x328/0x630
[   33.460001]  ret_from_fork+0x10/0x20
[   33.460136] 
[   33.460186] The buggy address belongs to the object at fff00000c9bb2f80
[   33.460186]  which belongs to the cache kmalloc-64 of size 64
[   33.460318] The buggy address is located 0 bytes to the right of
[   33.460318]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.460434] 
[   33.460535] The buggy address belongs to the physical page:
[   33.460619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.460713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.460799] page_type: f5(slab)
[   33.460900] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.460953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.461022] page dumped because: kasan: bad access detected
[   33.461057] 
[   33.461077] Memory state around the buggy address:
[   33.461111]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.461157]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.461202] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.461477]                                      ^
[   33.461525]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.461608]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.461736] ==================================================================
[   33.453395] ==================================================================
[   33.453446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.453496] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.453562] 
[   33.453592] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.453679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.453708] Hardware name: linux,dummy-virt (DT)
[   33.453782] Call trace:
[   33.453936]  show_stack+0x20/0x38 (C)
[   33.454011]  dump_stack_lvl+0x8c/0xd0
[   33.454064]  print_report+0x118/0x5d0
[   33.454116]  kasan_report+0xdc/0x128
[   33.454161]  kasan_check_range+0x100/0x1a8
[   33.454225]  __kasan_check_write+0x20/0x30
[   33.454274]  kasan_atomics_helper+0x1058/0x4858
[   33.454326]  kasan_atomics+0x198/0x2e0
[   33.454543]  kunit_try_run_case+0x170/0x3f0
[   33.454609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.454687]  kthread+0x328/0x630
[   33.454732]  ret_from_fork+0x10/0x20
[   33.454807] 
[   33.454866] Allocated by task 296:
[   33.454923]  kasan_save_stack+0x3c/0x68
[   33.454965]  kasan_save_track+0x20/0x40
[   33.455004]  kasan_save_alloc_info+0x40/0x58
[   33.455063]  __kasan_kmalloc+0xd4/0xd8
[   33.455119]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.455165]  kasan_atomics+0xb8/0x2e0
[   33.455223]  kunit_try_run_case+0x170/0x3f0
[   33.455270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.455317]  kthread+0x328/0x630
[   33.455352]  ret_from_fork+0x10/0x20
[   33.455389] 
[   33.455411] The buggy address belongs to the object at fff00000c9bb2f80
[   33.455411]  which belongs to the cache kmalloc-64 of size 64
[   33.455495] The buggy address is located 0 bytes to the right of
[   33.455495]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.455690] 
[   33.455739] The buggy address belongs to the physical page:
[   33.455855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.456038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.456149] page_type: f5(slab)
[   33.456292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.456486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.456584] page dumped because: kasan: bad access detected
[   33.456668] 
[   33.456762] Memory state around the buggy address:
[   33.456839]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.456888]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.456964] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.457006]                                      ^
[   33.457066]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.457114]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.457155] ==================================================================
[   33.341828] ==================================================================
[   33.341899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   33.341952] Read of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.342005] 
[   33.342035] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.342883]  kasan_save_stack+0x3c/0x68
[   33.343530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.345440] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.346744]  kasan_save_track+0x20/0x40
[   33.346811]  kasan_save_alloc_info+0x40/0x58
[   33.346858]  __kasan_kmalloc+0xd4/0xd8
[   33.346945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.346989]  kasan_atomics+0xb8/0x2e0
[   33.347045]  kunit_try_run_case+0x170/0x3f0
[   33.347141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.347186]  kthread+0x328/0x630
[   33.347220]  ret_from_fork+0x10/0x20
[   33.347336] 
[   33.347384] The buggy address belongs to the object at fff00000c9bb2f80
[   33.347384]  which belongs to the cache kmalloc-64 of size 64
[   33.347447] The buggy address is located 0 bytes to the right of
[   33.347447]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.347758] 
[   33.347798] The buggy address belongs to the physical page:
[   33.347889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.347978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.348167] page_type: f5(slab)
[   33.348244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.348441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.348487] page dumped because: kasan: bad access detected
[   33.348561] 
[   33.348582] Memory state around the buggy address:
[   33.348861]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.348990]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.349057] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.349355]                                      ^
[   33.349440]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.349566]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.349676] ==================================================================
[   33.397061] ==================================================================
[   33.397314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.397386] Read of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.397455] 
[   33.397542] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.397707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.397814] Hardware name: linux,dummy-virt (DT)
[   33.397854] Call trace:
[   33.397877]  show_stack+0x20/0x38 (C)
[   33.397931]  dump_stack_lvl+0x8c/0xd0
[   33.398007]  print_report+0x118/0x5d0
[   33.398092]  kasan_report+0xdc/0x128
[   33.398157]  __asan_report_load4_noabort+0x20/0x30
[   33.398236]  kasan_atomics_helper+0x3dd8/0x4858
[   33.398289]  kasan_atomics+0x198/0x2e0
[   33.398376]  kunit_try_run_case+0x170/0x3f0
[   33.398433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.398517]  kthread+0x328/0x630
[   33.398589]  ret_from_fork+0x10/0x20
[   33.398639] 
[   33.398659] Allocated by task 296:
[   33.398690]  kasan_save_stack+0x3c/0x68
[   33.398731]  kasan_save_track+0x20/0x40
[   33.398798]  kasan_save_alloc_info+0x40/0x58
[   33.398938]  __kasan_kmalloc+0xd4/0xd8
[   33.398983]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.399110]  kasan_atomics+0xb8/0x2e0
[   33.399206]  kunit_try_run_case+0x170/0x3f0
[   33.399254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.399349]  kthread+0x328/0x630
[   33.399422]  ret_from_fork+0x10/0x20
[   33.399628] 
[   33.399659] The buggy address belongs to the object at fff00000c9bb2f80
[   33.399659]  which belongs to the cache kmalloc-64 of size 64
[   33.399723] The buggy address is located 0 bytes to the right of
[   33.399723]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.399804] 
[   33.399845] The buggy address belongs to the physical page:
[   33.399879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.399960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.400013] page_type: f5(slab)
[   33.400051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.400105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.400148] page dumped because: kasan: bad access detected
[   33.400305] 
[   33.400405] Memory state around the buggy address:
[   33.400522]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.400588]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.400653] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.400840]                                      ^
[   33.400892]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.400941]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.401162] ==================================================================
[   33.426719] ==================================================================
[   33.426771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.426937] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.427002] 
[   33.427061] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.427197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.427426] Hardware name: linux,dummy-virt (DT)
[   33.427484] Call trace:
[   33.427575]  show_stack+0x20/0x38 (C)
[   33.427628]  dump_stack_lvl+0x8c/0xd0
[   33.427695]  print_report+0x118/0x5d0
[   33.427792]  kasan_report+0xdc/0x128
[   33.427887]  __asan_report_store8_noabort+0x20/0x30
[   33.428040]  kasan_atomics_helper+0x3e5c/0x4858
[   33.428137]  kasan_atomics+0x198/0x2e0
[   33.428187]  kunit_try_run_case+0x170/0x3f0
[   33.428270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.428325]  kthread+0x328/0x630
[   33.428592]  ret_from_fork+0x10/0x20
[   33.428648] 
[   33.428671] Allocated by task 296:
[   33.428701]  kasan_save_stack+0x3c/0x68
[   33.428741]  kasan_save_track+0x20/0x40
[   33.428780]  kasan_save_alloc_info+0x40/0x58
[   33.428821]  __kasan_kmalloc+0xd4/0xd8
[   33.428946]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.429032]  kasan_atomics+0xb8/0x2e0
[   33.429140]  kunit_try_run_case+0x170/0x3f0
[   33.429248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.429460]  kthread+0x328/0x630
[   33.429600]  ret_from_fork+0x10/0x20
[   33.429647] 
[   33.429688] The buggy address belongs to the object at fff00000c9bb2f80
[   33.429688]  which belongs to the cache kmalloc-64 of size 64
[   33.429774] The buggy address is located 0 bytes to the right of
[   33.429774]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.429843] 
[   33.429864] The buggy address belongs to the physical page:
[   33.429897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.429949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.430000] page_type: f5(slab)
[   33.430102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.430291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.430349] page dumped because: kasan: bad access detected
[   33.430417] 
[   33.430488] Memory state around the buggy address:
[   33.430540]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.430587]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.430833] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.430923]                                      ^
[   33.431075]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.431172]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.431214] ==================================================================
[   33.416421] ==================================================================
[   33.416619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.416685] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.416762] 
[   33.416810] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.416898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.416927] Hardware name: linux,dummy-virt (DT)
[   33.416961] Call trace:
[   33.416984]  show_stack+0x20/0x38 (C)
[   33.417216]  dump_stack_lvl+0x8c/0xd0
[   33.417321]  print_report+0x118/0x5d0
[   33.417370]  kasan_report+0xdc/0x128
[   33.417416]  __asan_report_load8_noabort+0x20/0x30
[   33.417470]  kasan_atomics_helper+0x3f58/0x4858
[   33.417566]  kasan_atomics+0x198/0x2e0
[   33.417643]  kunit_try_run_case+0x170/0x3f0
[   33.417710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.417767]  kthread+0x328/0x630
[   33.417812]  ret_from_fork+0x10/0x20
[   33.417878] 
[   33.417907] Allocated by task 296:
[   33.417939]  kasan_save_stack+0x3c/0x68
[   33.417980]  kasan_save_track+0x20/0x40
[   33.418018]  kasan_save_alloc_info+0x40/0x58
[   33.418059]  __kasan_kmalloc+0xd4/0xd8
[   33.418108]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.418152]  kasan_atomics+0xb8/0x2e0
[   33.418192]  kunit_try_run_case+0x170/0x3f0
[   33.418441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.418545]  kthread+0x328/0x630
[   33.418644]  ret_from_fork+0x10/0x20
[   33.418720] 
[   33.418749] The buggy address belongs to the object at fff00000c9bb2f80
[   33.418749]  which belongs to the cache kmalloc-64 of size 64
[   33.418919] The buggy address is located 0 bytes to the right of
[   33.418919]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.418989] 
[   33.419010] The buggy address belongs to the physical page:
[   33.419122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.419184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.419304] page_type: f5(slab)
[   33.419369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.419424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.419467] page dumped because: kasan: bad access detected
[   33.419691] 
[   33.419721] Memory state around the buggy address:
[   33.419759]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.419997]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.420094] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.420154]                                      ^
[   33.420190]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.420454]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.420598] ==================================================================
[   33.516742] ==================================================================
[   33.516924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   33.516983] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.517036] 
[   33.517073] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.517159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.517189] Hardware name: linux,dummy-virt (DT)
[   33.517221] Call trace:
[   33.517245]  show_stack+0x20/0x38 (C)
[   33.517321]  dump_stack_lvl+0x8c/0xd0
[   33.517395]  print_report+0x118/0x5d0
[   33.517441]  kasan_report+0xdc/0x128
[   33.517485]  __asan_report_load8_noabort+0x20/0x30
[   33.517550]  kasan_atomics_helper+0x3db0/0x4858
[   33.517602]  kasan_atomics+0x198/0x2e0
[   33.517760]  kunit_try_run_case+0x170/0x3f0
[   33.517826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.518099]  kthread+0x328/0x630
[   33.518190]  ret_from_fork+0x10/0x20
[   33.518242] 
[   33.518262] Allocated by task 296:
[   33.518334]  kasan_save_stack+0x3c/0x68
[   33.518389]  kasan_save_track+0x20/0x40
[   33.518446]  kasan_save_alloc_info+0x40/0x58
[   33.518555]  __kasan_kmalloc+0xd4/0xd8
[   33.518614]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.518659]  kasan_atomics+0xb8/0x2e0
[   33.518699]  kunit_try_run_case+0x170/0x3f0
[   33.518849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.518936]  kthread+0x328/0x630
[   33.519042]  ret_from_fork+0x10/0x20
[   33.519086] 
[   33.519126] The buggy address belongs to the object at fff00000c9bb2f80
[   33.519126]  which belongs to the cache kmalloc-64 of size 64
[   33.519222] The buggy address is located 0 bytes to the right of
[   33.519222]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.519292] 
[   33.519320] The buggy address belongs to the physical page:
[   33.519354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.519571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.519629] page_type: f5(slab)
[   33.519668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.519722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.519778] page dumped because: kasan: bad access detected
[   33.519812] 
[   33.519832] Memory state around the buggy address:
[   33.520248]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.520300]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.520347] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.520389]                                      ^
[   33.520426]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.520472]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.520531] ==================================================================
[   33.523633] ==================================================================
[   33.523673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   33.523718] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.523769] 
[   33.523797] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.523882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.523910] Hardware name: linux,dummy-virt (DT)
[   33.523943] Call trace:
[   33.523965]  show_stack+0x20/0x38 (C)
[   33.524013]  dump_stack_lvl+0x8c/0xd0
[   33.524060]  print_report+0x118/0x5d0
[   33.524125]  kasan_report+0xdc/0x128
[   33.524171]  __asan_report_load8_noabort+0x20/0x30
[   33.524221]  kasan_atomics_helper+0x3df4/0x4858
[   33.524284]  kasan_atomics+0x198/0x2e0
[   33.524341]  kunit_try_run_case+0x170/0x3f0
[   33.524390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.524446]  kthread+0x328/0x630
[   33.524489]  ret_from_fork+0x10/0x20
[   33.524550] 
[   33.524569] Allocated by task 296:
[   33.524599]  kasan_save_stack+0x3c/0x68
[   33.524638]  kasan_save_track+0x20/0x40
[   33.524676]  kasan_save_alloc_info+0x40/0x58
[   33.524717]  __kasan_kmalloc+0xd4/0xd8
[   33.524757]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.524800]  kasan_atomics+0xb8/0x2e0
[   33.524838]  kunit_try_run_case+0x170/0x3f0
[   33.524890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.524937]  kthread+0x328/0x630
[   33.524973]  ret_from_fork+0x10/0x20
[   33.525011] 
[   33.525032] The buggy address belongs to the object at fff00000c9bb2f80
[   33.525032]  which belongs to the cache kmalloc-64 of size 64
[   33.525093] The buggy address is located 0 bytes to the right of
[   33.525093]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.525161] 
[   33.525183] The buggy address belongs to the physical page:
[   33.525215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.525270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.525317] page_type: f5(slab)
[   33.525354] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.525407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.525452] page dumped because: kasan: bad access detected
[   33.525485] 
[   33.525516] Memory state around the buggy address:
[   33.525550]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.525596]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.525642] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.525683]                                      ^
[   33.525718]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.525764]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.525865] ==================================================================
[   33.467598] ==================================================================
[   33.467693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   33.467748] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.467832] 
[   33.467868] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.467965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.467995] Hardware name: linux,dummy-virt (DT)
[   33.468027] Call trace:
[   33.468052]  show_stack+0x20/0x38 (C)
[   33.468101]  dump_stack_lvl+0x8c/0xd0
[   33.468177]  print_report+0x118/0x5d0
[   33.468222]  kasan_report+0xdc/0x128
[   33.468268]  kasan_check_range+0x100/0x1a8
[   33.468315]  __kasan_check_write+0x20/0x30
[   33.468503]  kasan_atomics_helper+0x1190/0x4858
[   33.468629]  kasan_atomics+0x198/0x2e0
[   33.468808]  kunit_try_run_case+0x170/0x3f0
[   33.469012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.469170]  kthread+0x328/0x630
[   33.469251]  ret_from_fork+0x10/0x20
[   33.469312] 
[   33.469340] Allocated by task 296:
[   33.469439]  kasan_save_stack+0x3c/0x68
[   33.469492]  kasan_save_track+0x20/0x40
[   33.469581]  kasan_save_alloc_info+0x40/0x58
[   33.469643]  __kasan_kmalloc+0xd4/0xd8
[   33.469683]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.469726]  kasan_atomics+0xb8/0x2e0
[   33.469766]  kunit_try_run_case+0x170/0x3f0
[   33.469806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.469973]  kthread+0x328/0x630
[   33.470066]  ret_from_fork+0x10/0x20
[   33.470209] 
[   33.470268] The buggy address belongs to the object at fff00000c9bb2f80
[   33.470268]  which belongs to the cache kmalloc-64 of size 64
[   33.470564] The buggy address is located 0 bytes to the right of
[   33.470564]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.470730] 
[   33.470763] The buggy address belongs to the physical page:
[   33.470844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.470959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.471071] page_type: f5(slab)
[   33.471125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.471177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.471222] page dumped because: kasan: bad access detected
[   33.471255] 
[   33.471286] Memory state around the buggy address:
[   33.471329]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.471377]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.471431] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.471473]                                      ^
[   33.471528]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.471574]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.471616] ==================================================================
[   33.442417] ==================================================================
[   33.442490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.442591] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.442644] 
[   33.442675] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.442790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.443073] Hardware name: linux,dummy-virt (DT)
[   33.443116] Call trace:
[   33.443142]  show_stack+0x20/0x38 (C)
[   33.443272]  dump_stack_lvl+0x8c/0xd0
[   33.443564]  print_report+0x118/0x5d0
[   33.443625]  kasan_report+0xdc/0x128
[   33.443673]  kasan_check_range+0x100/0x1a8
[   33.443747]  __kasan_check_write+0x20/0x30
[   33.444294]  kasan_atomics_helper+0xf88/0x4858
[   33.444386]  kasan_atomics+0x198/0x2e0
[   33.444537]  kunit_try_run_case+0x170/0x3f0
[   33.444661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.444809]  kthread+0x328/0x630
[   33.444921]  ret_from_fork+0x10/0x20
[   33.445008] 
[   33.445029] Allocated by task 296:
[   33.445081]  kasan_save_stack+0x3c/0x68
[   33.445125]  kasan_save_track+0x20/0x40
[   33.445163]  kasan_save_alloc_info+0x40/0x58
[   33.445204]  __kasan_kmalloc+0xd4/0xd8
[   33.445245]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.445290]  kasan_atomics+0xb8/0x2e0
[   33.445332]  kunit_try_run_case+0x170/0x3f0
[   33.445540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.445925]  kthread+0x328/0x630
[   33.446120]  ret_from_fork+0x10/0x20
[   33.446169] 
[   33.446191] The buggy address belongs to the object at fff00000c9bb2f80
[   33.446191]  which belongs to the cache kmalloc-64 of size 64
[   33.446384] The buggy address is located 0 bytes to the right of
[   33.446384]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.446595] 
[   33.446668] The buggy address belongs to the physical page:
[   33.446706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.446768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.446817] page_type: f5(slab)
[   33.446999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.447094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.447188] page dumped because: kasan: bad access detected
[   33.447252] 
[   33.447275] Memory state around the buggy address:
[   33.447309]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.447534]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.447717] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.447818]                                      ^
[   33.447886]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.448170]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.448232] ==================================================================
[   33.537427] ==================================================================
[   33.537480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   33.537577] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.537631] 
[   33.537733] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.537849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.537923] Hardware name: linux,dummy-virt (DT)
[   33.537974] Call trace:
[   33.537998]  show_stack+0x20/0x38 (C)
[   33.538047]  dump_stack_lvl+0x8c/0xd0
[   33.538130]  print_report+0x118/0x5d0
[   33.538262]  kasan_report+0xdc/0x128
[   33.538463]  kasan_check_range+0x100/0x1a8
[   33.540730]  __kasan_check_write+0x20/0x30
[   33.541084]  kasan_atomics_helper+0x175c/0x4858
[   33.541151]  kasan_atomics+0x198/0x2e0
[   33.542786]  kunit_try_run_case+0x170/0x3f0
[   33.542851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.543305]  kthread+0x328/0x630
[   33.543385]  ret_from_fork+0x10/0x20
[   33.543447] 
[   33.543471] Allocated by task 296:
[   33.543544]  kasan_save_stack+0x3c/0x68
[   33.543602]  kasan_save_track+0x20/0x40
[   33.543650]  kasan_save_alloc_info+0x40/0x58
[   33.543692]  __kasan_kmalloc+0xd4/0xd8
[   33.543743]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.543792]  kasan_atomics+0xb8/0x2e0
[   33.543833]  kunit_try_run_case+0x170/0x3f0
[   33.543890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.543938]  kthread+0x328/0x630
[   33.543973]  ret_from_fork+0x10/0x20
[   33.544021] 
[   33.544044] The buggy address belongs to the object at fff00000c9bb2f80
[   33.544044]  which belongs to the cache kmalloc-64 of size 64
[   33.544106] The buggy address is located 0 bytes to the right of
[   33.544106]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.544182] 
[   33.544213] The buggy address belongs to the physical page:
[   33.544247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.544313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.544364] page_type: f5(slab)
[   33.544411] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.544473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.544541] page dumped because: kasan: bad access detected
[   33.544576] 
[   33.544597] Memory state around the buggy address:
[   33.544631]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.544676]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.544723] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.544764]                                      ^
[   33.544798]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.544844]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.544886] ==================================================================
[   33.476817] ==================================================================
[   33.476876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   33.476926] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.476979] 
[   33.477019] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.477116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.477144] Hardware name: linux,dummy-virt (DT)
[   33.477190] Call trace:
[   33.477214]  show_stack+0x20/0x38 (C)
[   33.477263]  dump_stack_lvl+0x8c/0xd0
[   33.477311]  print_report+0x118/0x5d0
[   33.477358]  kasan_report+0xdc/0x128
[   33.477410]  kasan_check_range+0x100/0x1a8
[   33.477465]  __kasan_check_write+0x20/0x30
[   33.477527]  kasan_atomics_helper+0x126c/0x4858
[   33.477579]  kasan_atomics+0x198/0x2e0
[   33.477628]  kunit_try_run_case+0x170/0x3f0
[   33.477681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.477737]  kthread+0x328/0x630
[   33.477781]  ret_from_fork+0x10/0x20
[   33.477830] 
[   33.477850] Allocated by task 296:
[   33.477888]  kasan_save_stack+0x3c/0x68
[   33.477929]  kasan_save_track+0x20/0x40
[   33.477966]  kasan_save_alloc_info+0x40/0x58
[   33.478020]  __kasan_kmalloc+0xd4/0xd8
[   33.478060]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.478109]  kasan_atomics+0xb8/0x2e0
[   33.478157]  kunit_try_run_case+0x170/0x3f0
[   33.478206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.478254]  kthread+0x328/0x630
[   33.478289]  ret_from_fork+0x10/0x20
[   33.478327] 
[   33.478349] The buggy address belongs to the object at fff00000c9bb2f80
[   33.478349]  which belongs to the cache kmalloc-64 of size 64
[   33.478420] The buggy address is located 0 bytes to the right of
[   33.478420]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.478489] 
[   33.478520] The buggy address belongs to the physical page:
[   33.478554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.478608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.478699] page_type: f5(slab)
[   33.478750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.478800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.478845] page dumped because: kasan: bad access detected
[   33.478877] 
[   33.478897] Memory state around the buggy address:
[   33.478931]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.479356]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.479444] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.479490]                                      ^
[   33.479538]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.479794]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.479931] ==================================================================
[   33.431502] ==================================================================
[   33.431576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.431627] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.431679] 
[   33.431736] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.431825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.431913] Hardware name: linux,dummy-virt (DT)
[   33.431951] Call trace:
[   33.431974]  show_stack+0x20/0x38 (C)
[   33.432023]  dump_stack_lvl+0x8c/0xd0
[   33.432070]  print_report+0x118/0x5d0
[   33.432176]  kasan_report+0xdc/0x128
[   33.432226]  kasan_check_range+0x100/0x1a8
[   33.432276]  __kasan_check_write+0x20/0x30
[   33.432325]  kasan_atomics_helper+0xeb8/0x4858
[   33.432377]  kasan_atomics+0x198/0x2e0
[   33.432425]  kunit_try_run_case+0x170/0x3f0
[   33.432621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.432705]  kthread+0x328/0x630
[   33.432777]  ret_from_fork+0x10/0x20
[   33.432847] 
[   33.432869] Allocated by task 296:
[   33.432898]  kasan_save_stack+0x3c/0x68
[   33.432940]  kasan_save_track+0x20/0x40
[   33.433115]  kasan_save_alloc_info+0x40/0x58
[   33.433269]  __kasan_kmalloc+0xd4/0xd8
[   33.433365]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.433431]  kasan_atomics+0xb8/0x2e0
[   33.433472]  kunit_try_run_case+0x170/0x3f0
[   33.433525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.433572]  kthread+0x328/0x630
[   33.433614]  ret_from_fork+0x10/0x20
[   33.433674] 
[   33.433703] The buggy address belongs to the object at fff00000c9bb2f80
[   33.433703]  which belongs to the cache kmalloc-64 of size 64
[   33.433789] The buggy address is located 0 bytes to the right of
[   33.433789]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.433871] 
[   33.433897] The buggy address belongs to the physical page:
[   33.433952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.434003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.434054] page_type: f5(slab)
[   33.434092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.434155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.434206] page dumped because: kasan: bad access detected
[   33.434251] 
[   33.434287] Memory state around the buggy address:
[   33.434337]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.434395]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.434448] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.434901]                                      ^
[   33.434954]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.435030]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.435119] ==================================================================
[   33.521284] ==================================================================
[   33.521333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   33.521383] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.521436] 
[   33.521465] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.521566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.521594] Hardware name: linux,dummy-virt (DT)
[   33.521628] Call trace:
[   33.521651]  show_stack+0x20/0x38 (C)
[   33.521699]  dump_stack_lvl+0x8c/0xd0
[   33.521746]  print_report+0x118/0x5d0
[   33.521793]  kasan_report+0xdc/0x128
[   33.521836]  kasan_check_range+0x100/0x1a8
[   33.521883]  __kasan_check_write+0x20/0x30
[   33.521931]  kasan_atomics_helper+0x1644/0x4858
[   33.521982]  kasan_atomics+0x198/0x2e0
[   33.522031]  kunit_try_run_case+0x170/0x3f0
[   33.522079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.522134]  kthread+0x328/0x630
[   33.522177]  ret_from_fork+0x10/0x20
[   33.522225] 
[   33.522245] Allocated by task 296:
[   33.522274]  kasan_save_stack+0x3c/0x68
[   33.522314]  kasan_save_track+0x20/0x40
[   33.522350]  kasan_save_alloc_info+0x40/0x58
[   33.522397]  __kasan_kmalloc+0xd4/0xd8
[   33.522436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.522479]  kasan_atomics+0xb8/0x2e0
[   33.522530]  kunit_try_run_case+0x170/0x3f0
[   33.522583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.522630]  kthread+0x328/0x630
[   33.522665]  ret_from_fork+0x10/0x20
[   33.522703] 
[   33.522725] The buggy address belongs to the object at fff00000c9bb2f80
[   33.522725]  which belongs to the cache kmalloc-64 of size 64
[   33.522785] The buggy address is located 0 bytes to the right of
[   33.522785]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.522874] 
[   33.522897] The buggy address belongs to the physical page:
[   33.522931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.522985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.523043] page_type: f5(slab)
[   33.523080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.523130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.523175] page dumped because: kasan: bad access detected
[   33.523208] 
[   33.523237] Memory state around the buggy address:
[   33.523280]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.523327]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.523382] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.523423]                                      ^
[   33.523467]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.523523]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.523564] ==================================================================
[   33.508549] ==================================================================
[   33.508604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   33.508655] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.508708] 
[   33.508740] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.509009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.509076] Hardware name: linux,dummy-virt (DT)
[   33.509114] Call trace:
[   33.509141]  show_stack+0x20/0x38 (C)
[   33.509196]  dump_stack_lvl+0x8c/0xd0
[   33.509246]  print_report+0x118/0x5d0
[   33.509290]  kasan_report+0xdc/0x128
[   33.509430]  kasan_check_range+0x100/0x1a8
[   33.509567]  __kasan_check_write+0x20/0x30
[   33.509625]  kasan_atomics_helper+0x154c/0x4858
[   33.509678]  kasan_atomics+0x198/0x2e0
[   33.509743]  kunit_try_run_case+0x170/0x3f0
[   33.509843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.509955]  kthread+0x328/0x630
[   33.510000]  ret_from_fork+0x10/0x20
[   33.510075] 
[   33.510098] Allocated by task 296:
[   33.510129]  kasan_save_stack+0x3c/0x68
[   33.510195]  kasan_save_track+0x20/0x40
[   33.510261]  kasan_save_alloc_info+0x40/0x58
[   33.510304]  __kasan_kmalloc+0xd4/0xd8
[   33.510345]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.510396]  kasan_atomics+0xb8/0x2e0
[   33.510451]  kunit_try_run_case+0x170/0x3f0
[   33.510494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.510706]  kthread+0x328/0x630
[   33.510783]  ret_from_fork+0x10/0x20
[   33.510829] 
[   33.510876] The buggy address belongs to the object at fff00000c9bb2f80
[   33.510876]  which belongs to the cache kmalloc-64 of size 64
[   33.510966] The buggy address is located 0 bytes to the right of
[   33.510966]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.511038] 
[   33.511062] The buggy address belongs to the physical page:
[   33.511120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.511173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.511223] page_type: f5(slab)
[   33.511344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.511416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.511460] page dumped because: kasan: bad access detected
[   33.511495] 
[   33.511533] Memory state around the buggy address:
[   33.511596]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.511642]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.511688] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.511838]                                      ^
[   33.511996]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.512090]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.512169] ==================================================================
[   33.360308] ==================================================================
[   33.360377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.360610] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.360673] 
[   33.360705] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.360882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.361012] Hardware name: linux,dummy-virt (DT)
[   33.361068] Call trace:
[   33.361094]  show_stack+0x20/0x38 (C)
[   33.361144]  dump_stack_lvl+0x8c/0xd0
[   33.361220]  print_report+0x118/0x5d0
[   33.361285]  kasan_report+0xdc/0x128
[   33.361694]  kasan_check_range+0x100/0x1a8
[   33.361792]  __kasan_check_write+0x20/0x30
[   33.361843]  kasan_atomics_helper+0xa6c/0x4858
[   33.361903]  kasan_atomics+0x198/0x2e0
[   33.361969]  kunit_try_run_case+0x170/0x3f0
[   33.362022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.362097]  kthread+0x328/0x630
[   33.362140]  ret_from_fork+0x10/0x20
[   33.362196] 
[   33.362250] Allocated by task 296:
[   33.362374]  kasan_save_stack+0x3c/0x68
[   33.362420]  kasan_save_track+0x20/0x40
[   33.362459]  kasan_save_alloc_info+0x40/0x58
[   33.362500]  __kasan_kmalloc+0xd4/0xd8
[   33.362628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.362715]  kasan_atomics+0xb8/0x2e0
[   33.362761]  kunit_try_run_case+0x170/0x3f0
[   33.362829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.362875]  kthread+0x328/0x630
[   33.362910]  ret_from_fork+0x10/0x20
[   33.362971] 
[   33.363005] The buggy address belongs to the object at fff00000c9bb2f80
[   33.363005]  which belongs to the cache kmalloc-64 of size 64
[   33.363068] The buggy address is located 0 bytes to the right of
[   33.363068]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.363201] 
[   33.363223] The buggy address belongs to the physical page:
[   33.363257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.363345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.363396] page_type: f5(slab)
[   33.363435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.363497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.363712] page dumped because: kasan: bad access detected
[   33.363757] 
[   33.363777] Memory state around the buggy address:
[   33.363896]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.363952]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.364048] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.364106]                                      ^
[   33.364143]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.364277]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.364376] ==================================================================
[   33.472675] ==================================================================
[   33.472755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   33.472808] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.472953] 
[   33.473059] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.473170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.473218] Hardware name: linux,dummy-virt (DT)
[   33.473252] Call trace:
[   33.473309]  show_stack+0x20/0x38 (C)
[   33.473362]  dump_stack_lvl+0x8c/0xd0
[   33.473437]  print_report+0x118/0x5d0
[   33.473487]  kasan_report+0xdc/0x128
[   33.473632]  kasan_check_range+0x100/0x1a8
[   33.473780]  __kasan_check_write+0x20/0x30
[   33.473848]  kasan_atomics_helper+0x11f8/0x4858
[   33.473901]  kasan_atomics+0x198/0x2e0
[   33.473966]  kunit_try_run_case+0x170/0x3f0
[   33.474021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.474095]  kthread+0x328/0x630
[   33.474159]  ret_from_fork+0x10/0x20
[   33.474245] 
[   33.474293] Allocated by task 296:
[   33.474325]  kasan_save_stack+0x3c/0x68
[   33.474400]  kasan_save_track+0x20/0x40
[   33.474457]  kasan_save_alloc_info+0x40/0x58
[   33.474500]  __kasan_kmalloc+0xd4/0xd8
[   33.474550]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.474593]  kasan_atomics+0xb8/0x2e0
[   33.474633]  kunit_try_run_case+0x170/0x3f0
[   33.474762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.474911]  kthread+0x328/0x630
[   33.474956]  ret_from_fork+0x10/0x20
[   33.475023] 
[   33.475048] The buggy address belongs to the object at fff00000c9bb2f80
[   33.475048]  which belongs to the cache kmalloc-64 of size 64
[   33.475137] The buggy address is located 0 bytes to the right of
[   33.475137]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.475227] 
[   33.475361] The buggy address belongs to the physical page:
[   33.475457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.475528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.475643] page_type: f5(slab)
[   33.475718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.475804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.475869] page dumped because: kasan: bad access detected
[   33.475902] 
[   33.475922] Memory state around the buggy address:
[   33.475958]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.476004]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.476081] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.476123]                                      ^
[   33.476272]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.476364]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.476504] ==================================================================
[   33.483852] ==================================================================
[   33.483969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   33.484066] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.484223] 
[   33.484406] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.484599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.484701] Hardware name: linux,dummy-virt (DT)
[   33.484807] Call trace:
[   33.484867]  show_stack+0x20/0x38 (C)
[   33.484921]  dump_stack_lvl+0x8c/0xd0
[   33.484968]  print_report+0x118/0x5d0
[   33.485016]  kasan_report+0xdc/0x128
[   33.485059]  kasan_check_range+0x100/0x1a8
[   33.485148]  __kasan_check_write+0x20/0x30
[   33.485200]  kasan_atomics_helper+0x1384/0x4858
[   33.485413]  kasan_atomics+0x198/0x2e0
[   33.485504]  kunit_try_run_case+0x170/0x3f0
[   33.485605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.485700]  kthread+0x328/0x630
[   33.485795]  ret_from_fork+0x10/0x20
[   33.486056] 
[   33.486078] Allocated by task 296:
[   33.486173]  kasan_save_stack+0x3c/0x68
[   33.486245]  kasan_save_track+0x20/0x40
[   33.486284]  kasan_save_alloc_info+0x40/0x58
[   33.486395]  __kasan_kmalloc+0xd4/0xd8
[   33.486448]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.486536]  kasan_atomics+0xb8/0x2e0
[   33.486593]  kunit_try_run_case+0x170/0x3f0
[   33.486634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.486680]  kthread+0x328/0x630
[   33.486716]  ret_from_fork+0x10/0x20
[   33.486754] 
[   33.486775] The buggy address belongs to the object at fff00000c9bb2f80
[   33.486775]  which belongs to the cache kmalloc-64 of size 64
[   33.486991] The buggy address is located 0 bytes to the right of
[   33.486991]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.487174] 
[   33.487271] The buggy address belongs to the physical page:
[   33.487471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.487694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.487834] page_type: f5(slab)
[   33.487923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.487979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.488023] page dumped because: kasan: bad access detected
[   33.488190] 
[   33.488211] Memory state around the buggy address:
[   33.488367]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.488554]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.488689] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.488741]                                      ^
[   33.488778]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.488943]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.488988] ==================================================================
[   33.409369] ==================================================================
[   33.409413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.409470] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.410090] 
[   33.410191] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.410328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.410482] Hardware name: linux,dummy-virt (DT)
[   33.410567] Call trace:
[   33.410700]  show_stack+0x20/0x38 (C)
[   33.410843]  dump_stack_lvl+0x8c/0xd0
[   33.410912]  print_report+0x118/0x5d0
[   33.410968]  kasan_report+0xdc/0x128
[   33.411014]  kasan_check_range+0x100/0x1a8
[   33.411062]  __kasan_check_read+0x20/0x30
[   33.411110]  kasan_atomics_helper+0xdd4/0x4858
[   33.411160]  kasan_atomics+0x198/0x2e0
[   33.411404]  kunit_try_run_case+0x170/0x3f0
[   33.411476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.411592]  kthread+0x328/0x630
[   33.411768]  ret_from_fork+0x10/0x20
[   33.412057] 
[   33.412176] Allocated by task 296:
[   33.412265]  kasan_save_stack+0x3c/0x68
[   33.412382]  kasan_save_track+0x20/0x40
[   33.412479]  kasan_save_alloc_info+0x40/0x58
[   33.412553]  __kasan_kmalloc+0xd4/0xd8
[   33.412809]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.412900]  kasan_atomics+0xb8/0x2e0
[   33.413040]  kunit_try_run_case+0x170/0x3f0
[   33.413154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.413313]  kthread+0x328/0x630
[   33.413428]  ret_from_fork+0x10/0x20
[   33.413693] 
[   33.413786] The buggy address belongs to the object at fff00000c9bb2f80
[   33.413786]  which belongs to the cache kmalloc-64 of size 64
[   33.413936] The buggy address is located 0 bytes to the right of
[   33.413936]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.414025] 
[   33.414048] The buggy address belongs to the physical page:
[   33.414081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.414334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.414485] page_type: f5(slab)
[   33.414612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.414710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.415014] page dumped because: kasan: bad access detected
[   33.415115] 
[   33.415175] Memory state around the buggy address:
[   33.415288]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.415404]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.415554] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.415668]                                      ^
[   33.415750]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.415804]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.415880] ==================================================================
[   33.462269] ==================================================================
[   33.462320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.462421] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.462475] 
[   33.462516] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.462633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.462711] Hardware name: linux,dummy-virt (DT)
[   33.462765] Call trace:
[   33.462835]  show_stack+0x20/0x38 (C)
[   33.462911]  dump_stack_lvl+0x8c/0xd0
[   33.462962]  print_report+0x118/0x5d0
[   33.463008]  kasan_report+0xdc/0x128
[   33.463167]  kasan_check_range+0x100/0x1a8
[   33.463236]  __kasan_check_write+0x20/0x30
[   33.463305]  kasan_atomics_helper+0x1128/0x4858
[   33.463412]  kasan_atomics+0x198/0x2e0
[   33.463496]  kunit_try_run_case+0x170/0x3f0
[   33.463594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.463651]  kthread+0x328/0x630
[   33.463695]  ret_from_fork+0x10/0x20
[   33.463777] 
[   33.463818] Allocated by task 296:
[   33.463954]  kasan_save_stack+0x3c/0x68
[   33.464038]  kasan_save_track+0x20/0x40
[   33.464078]  kasan_save_alloc_info+0x40/0x58
[   33.464213]  __kasan_kmalloc+0xd4/0xd8
[   33.464255]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.464299]  kasan_atomics+0xb8/0x2e0
[   33.464338]  kunit_try_run_case+0x170/0x3f0
[   33.464398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.464445]  kthread+0x328/0x630
[   33.464481]  ret_from_fork+0x10/0x20
[   33.464529] 
[   33.464552] The buggy address belongs to the object at fff00000c9bb2f80
[   33.464552]  which belongs to the cache kmalloc-64 of size 64
[   33.464614] The buggy address is located 0 bytes to the right of
[   33.464614]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.464764] 
[   33.464988] The buggy address belongs to the physical page:
[   33.465069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.465172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.465266] page_type: f5(slab)
[   33.465439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.465630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.465713] page dumped because: kasan: bad access detected
[   33.465839] 
[   33.465940] Memory state around the buggy address:
[   33.466000]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.466046]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.466358] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.466456]                                      ^
[   33.466595]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.466682]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.466723] ==================================================================
[   33.436992] ==================================================================
[   33.437077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.437186] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.437240] 
[   33.437277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.437366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.437414] Hardware name: linux,dummy-virt (DT)
[   33.437449] Call trace:
[   33.437489]  show_stack+0x20/0x38 (C)
[   33.437577]  dump_stack_lvl+0x8c/0xd0
[   33.437626]  print_report+0x118/0x5d0
[   33.437672]  kasan_report+0xdc/0x128
[   33.437717]  kasan_check_range+0x100/0x1a8
[   33.437765]  __kasan_check_write+0x20/0x30
[   33.437814]  kasan_atomics_helper+0xf20/0x4858
[   33.438089]  kasan_atomics+0x198/0x2e0
[   33.438174]  kunit_try_run_case+0x170/0x3f0
[   33.438226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.438301]  kthread+0x328/0x630
[   33.438383]  ret_from_fork+0x10/0x20
[   33.438446] 
[   33.438469] Allocated by task 296:
[   33.438499]  kasan_save_stack+0x3c/0x68
[   33.438552]  kasan_save_track+0x20/0x40
[   33.438736]  kasan_save_alloc_info+0x40/0x58
[   33.438785]  __kasan_kmalloc+0xd4/0xd8
[   33.438908]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.438954]  kasan_atomics+0xb8/0x2e0
[   33.439030]  kunit_try_run_case+0x170/0x3f0
[   33.439071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.439117]  kthread+0x328/0x630
[   33.439153]  ret_from_fork+0x10/0x20
[   33.439192] 
[   33.439348] The buggy address belongs to the object at fff00000c9bb2f80
[   33.439348]  which belongs to the cache kmalloc-64 of size 64
[   33.439547] The buggy address is located 0 bytes to the right of
[   33.439547]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.439651] 
[   33.439679] The buggy address belongs to the physical page:
[   33.439748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.439804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.439986] page_type: f5(slab)
[   33.440109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.440205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.440283] page dumped because: kasan: bad access detected
[   33.440413] 
[   33.440474] Memory state around the buggy address:
[   33.440599]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.440647]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.440692] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.440734]                                      ^
[   33.441029]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.441126]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.441286] ==================================================================
[   33.449473] ==================================================================
[   33.449574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.449627] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.449680] 
[   33.449711] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.449798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.449837] Hardware name: linux,dummy-virt (DT)
[   33.449869] Call trace:
[   33.449893]  show_stack+0x20/0x38 (C)
[   33.449943]  dump_stack_lvl+0x8c/0xd0
[   33.449991]  print_report+0x118/0x5d0
[   33.450036]  kasan_report+0xdc/0x128
[   33.450082]  kasan_check_range+0x100/0x1a8
[   33.450141]  __kasan_check_write+0x20/0x30
[   33.450190]  kasan_atomics_helper+0xff0/0x4858
[   33.450250]  kasan_atomics+0x198/0x2e0
[   33.450299]  kunit_try_run_case+0x170/0x3f0
[   33.450352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.450415]  kthread+0x328/0x630
[   33.450468]  ret_from_fork+0x10/0x20
[   33.450528] 
[   33.450549] Allocated by task 296:
[   33.450587]  kasan_save_stack+0x3c/0x68
[   33.450629]  kasan_save_track+0x20/0x40
[   33.450676]  kasan_save_alloc_info+0x40/0x58
[   33.450727]  __kasan_kmalloc+0xd4/0xd8
[   33.450772]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.450817]  kasan_atomics+0xb8/0x2e0
[   33.450865]  kunit_try_run_case+0x170/0x3f0
[   33.450907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.450953]  kthread+0x328/0x630
[   33.450988]  ret_from_fork+0x10/0x20
[   33.451026] 
[   33.451055] The buggy address belongs to the object at fff00000c9bb2f80
[   33.451055]  which belongs to the cache kmalloc-64 of size 64
[   33.451116] The buggy address is located 0 bytes to the right of
[   33.451116]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.451193] 
[   33.451220] The buggy address belongs to the physical page:
[   33.451256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.451308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.451357] page_type: f5(slab)
[   33.451395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.451449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.451498] page dumped because: kasan: bad access detected
[   33.452073] 
[   33.452109] Memory state around the buggy address:
[   33.452247]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.452464]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.452586] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.452685]                                      ^
[   33.452780]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.452876]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.452957] ==================================================================
[   33.480486] ==================================================================
[   33.480556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   33.480607] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.480673] 
[   33.480714] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.480808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.480855] Hardware name: linux,dummy-virt (DT)
[   33.480890] Call trace:
[   33.480913]  show_stack+0x20/0x38 (C)
[   33.480962]  dump_stack_lvl+0x8c/0xd0
[   33.481009]  print_report+0x118/0x5d0
[   33.481084]  kasan_report+0xdc/0x128
[   33.481205]  kasan_check_range+0x100/0x1a8
[   33.481299]  __kasan_check_write+0x20/0x30
[   33.481349]  kasan_atomics_helper+0x12d8/0x4858
[   33.481402]  kasan_atomics+0x198/0x2e0
[   33.481455]  kunit_try_run_case+0x170/0x3f0
[   33.481568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.481645]  kthread+0x328/0x630
[   33.481689]  ret_from_fork+0x10/0x20
[   33.481738] 
[   33.481758] Allocated by task 296:
[   33.481789]  kasan_save_stack+0x3c/0x68
[   33.481856]  kasan_save_track+0x20/0x40
[   33.481970]  kasan_save_alloc_info+0x40/0x58
[   33.482035]  __kasan_kmalloc+0xd4/0xd8
[   33.482112]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.482158]  kasan_atomics+0xb8/0x2e0
[   33.482198]  kunit_try_run_case+0x170/0x3f0
[   33.482255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.482331]  kthread+0x328/0x630
[   33.482372]  ret_from_fork+0x10/0x20
[   33.482410] 
[   33.482434] The buggy address belongs to the object at fff00000c9bb2f80
[   33.482434]  which belongs to the cache kmalloc-64 of size 64
[   33.482495] The buggy address is located 0 bytes to the right of
[   33.482495]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.482574] 
[   33.482705] The buggy address belongs to the physical page:
[   33.482741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.482884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.482958] page_type: f5(slab)
[   33.483005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.483056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.483102] page dumped because: kasan: bad access detected
[   33.483151] 
[   33.483172] Memory state around the buggy address:
[   33.483206]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.483253]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.483298] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.483339]                                      ^
[   33.483375]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.483535]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.483616] ==================================================================
[   33.526401] ==================================================================
[   33.526453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   33.526518] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.526571] 
[   33.526621] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.526710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.526758] Hardware name: linux,dummy-virt (DT)
[   33.526831] Call trace:
[   33.526857]  show_stack+0x20/0x38 (C)
[   33.526905]  dump_stack_lvl+0x8c/0xd0
[   33.526954]  print_report+0x118/0x5d0
[   33.526998]  kasan_report+0xdc/0x128
[   33.527044]  kasan_check_range+0x100/0x1a8
[   33.527091]  __kasan_check_write+0x20/0x30
[   33.527137]  kasan_atomics_helper+0x16d0/0x4858
[   33.527189]  kasan_atomics+0x198/0x2e0
[   33.527238]  kunit_try_run_case+0x170/0x3f0
[   33.527286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.527341]  kthread+0x328/0x630
[   33.527384]  ret_from_fork+0x10/0x20
[   33.527440] 
[   33.527531] Allocated by task 296:
[   33.527579]  kasan_save_stack+0x3c/0x68
[   33.527621]  kasan_save_track+0x20/0x40
[   33.527660]  kasan_save_alloc_info+0x40/0x58
[   33.527727]  __kasan_kmalloc+0xd4/0xd8
[   33.527769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.527821]  kasan_atomics+0xb8/0x2e0
[   33.527906]  kunit_try_run_case+0x170/0x3f0
[   33.528216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.528422]  kthread+0x328/0x630
[   33.528536]  ret_from_fork+0x10/0x20
[   33.528594] 
[   33.528617] The buggy address belongs to the object at fff00000c9bb2f80
[   33.528617]  which belongs to the cache kmalloc-64 of size 64
[   33.528680] The buggy address is located 0 bytes to the right of
[   33.528680]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.528746] 
[   33.529015] The buggy address belongs to the physical page:
[   33.529118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.529285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.529371] page_type: f5(slab)
[   33.529572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.529767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.529963] page dumped because: kasan: bad access detected
[   33.530038] 
[   33.530136] Memory state around the buggy address:
[   33.530239]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.530407]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.530455] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.530497]                                      ^
[   33.530814]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.530875]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.530999] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   33.031502] ==================================================================
[   33.031578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   33.031636] Read of size 8 at addr fff00000c6360328 by task kunit_try_catch/292
[   33.031707] 
[   33.031748] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.031866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.031894] Hardware name: linux,dummy-virt (DT)
[   33.031928] Call trace:
[   33.031951]  show_stack+0x20/0x38 (C)
[   33.032002]  dump_stack_lvl+0x8c/0xd0
[   33.032051]  print_report+0x118/0x5d0
[   33.032098]  kasan_report+0xdc/0x128
[   33.032142]  __asan_report_load8_noabort+0x20/0x30
[   33.032194]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   33.032249]  kasan_bitops_generic+0x110/0x1c8
[   33.032318]  kunit_try_run_case+0x170/0x3f0
[   33.032368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.032423]  kthread+0x328/0x630
[   33.032571]  ret_from_fork+0x10/0x20
[   33.032704] 
[   33.032765] Allocated by task 292:
[   33.033425]  kasan_bitops_generic+0xa0/0x1c8
[   33.035580] >fff00000c6360300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.038031]  ret_from_fork+0x10/0x20
[   33.039043] The buggy address is located 8 bytes inside of
[   33.039043]  allocated 9-byte region [fff00000c6360320, fff00000c6360329)
[   33.040473] Hardware name: linux,dummy-virt (DT)
[   33.041680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.042693] ==================================================================
[   33.023416] ==================================================================
[   33.023477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   33.023560] Write of size 8 at addr fff00000c6360328 by task kunit_try_catch/292
[   33.023613] 
[   33.023645] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.023734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.023763] Hardware name: linux,dummy-virt (DT)
[   33.023796] Call trace:
[   33.023821]  show_stack+0x20/0x38 (C)
[   33.023869]  dump_stack_lvl+0x8c/0xd0
[   33.023917]  print_report+0x118/0x5d0
[   33.023963]  kasan_report+0xdc/0x128
[   33.024008]  kasan_check_range+0x100/0x1a8
[   33.024056]  __kasan_check_write+0x20/0x30
[   33.024105]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   33.024159]  kasan_bitops_generic+0x110/0x1c8
[   33.024209]  kunit_try_run_case+0x170/0x3f0
[   33.024258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.024312]  kthread+0x328/0x630
[   33.024354]  ret_from_fork+0x10/0x20
[   33.024403] 
[   33.024423] Allocated by task 292:
[   33.024451]  kasan_save_stack+0x3c/0x68
[   33.024491]  kasan_save_track+0x20/0x40
[   33.028618]  kasan_save_alloc_info+0x40/0x58
[   33.028666]  __kasan_kmalloc+0xd4/0xd8
[   33.028706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.028751]  kasan_bitops_generic+0xa0/0x1c8
[   33.028793]  kunit_try_run_case+0x170/0x3f0
[   33.028834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.028880]  kthread+0x328/0x630
[   33.028919]  ret_from_fork+0x10/0x20
[   33.028957] 
[   33.028981] The buggy address belongs to the object at fff00000c6360320
[   33.028981]  which belongs to the cache kmalloc-16 of size 16
[   33.029045] The buggy address is located 8 bytes inside of
[   33.029045]  allocated 9-byte region [fff00000c6360320, fff00000c6360329)
[   33.029110] 
[   33.029245] The buggy address belongs to the physical page:
[   33.029294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360
[   33.029456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.029532] page_type: f5(slab)
[   33.029609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.029689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.029763] page dumped because: kasan: bad access detected
[   33.029799] 
[   33.029848] Memory state around the buggy address:
[   33.029897]  fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.029944]  fff00000c6360280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.029990] >fff00000c6360300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.030031]                                   ^
[   33.030066]  fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.030111]  fff00000c6360400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.030203] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   33.006333] ==================================================================
[   33.006422] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   33.006749] Read of size 1 at addr fff00000c9bb4890 by task kunit_try_catch/290
[   33.006918] 
[   33.007067] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.007183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.007218] Hardware name: linux,dummy-virt (DT)
[   33.007287] Call trace:
[   33.007313]  show_stack+0x20/0x38 (C)
[   33.007535]  dump_stack_lvl+0x8c/0xd0
[   33.007589]  print_report+0x118/0x5d0
[   33.007910]  kasan_report+0xdc/0x128
[   33.008023]  __asan_report_load1_noabort+0x20/0x30
[   33.008173]  strnlen+0x80/0x88
[   33.008298]  kasan_strings+0x478/0xb00
[   33.008350]  kunit_try_run_case+0x170/0x3f0
[   33.008734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.008882]  kthread+0x328/0x630
[   33.008999]  ret_from_fork+0x10/0x20
[   33.009169] 
[   33.009290] Allocated by task 290:
[   33.009365]  kasan_save_stack+0x3c/0x68
[   33.009449]  kasan_save_track+0x20/0x40
[   33.009680]  kasan_save_alloc_info+0x40/0x58
[   33.009935]  __kasan_kmalloc+0xd4/0xd8
[   33.010074]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.010204]  kasan_strings+0xc8/0xb00
[   33.010334]  kunit_try_run_case+0x170/0x3f0
[   33.010582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.010753]  kthread+0x328/0x630
[   33.010975]  ret_from_fork+0x10/0x20
[   33.011080] 
[   33.011169] Freed by task 290:
[   33.011311]  kasan_save_stack+0x3c/0x68
[   33.011382]  kasan_save_track+0x20/0x40
[   33.011648]  kasan_save_free_info+0x4c/0x78
[   33.011817]  __kasan_slab_free+0x6c/0x98
[   33.011936]  kfree+0x214/0x3c8
[   33.012016]  kasan_strings+0x24c/0xb00
[   33.012058]  kunit_try_run_case+0x170/0x3f0
[   33.012097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.012337]  kthread+0x328/0x630
[   33.012686]  ret_from_fork+0x10/0x20
[   33.012829] 
[   33.013114] The buggy address belongs to the object at fff00000c9bb4880
[   33.013114]  which belongs to the cache kmalloc-32 of size 32
[   33.013251] The buggy address is located 16 bytes inside of
[   33.013251]  freed 32-byte region [fff00000c9bb4880, fff00000c9bb48a0)
[   33.013632] 
[   33.013762] The buggy address belongs to the physical page:
[   33.013889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4
[   33.014236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.014438] page_type: f5(slab)
[   33.014516] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.014695] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.014768] page dumped because: kasan: bad access detected
[   33.014999] 
[   33.015184] Memory state around the buggy address:
[   33.015344]  fff00000c9bb4780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.015418]  fff00000c9bb4800: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.015564] >fff00000c9bb4880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.015639]                          ^
[   33.015674]  fff00000c9bb4900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.016140]  fff00000c9bb4980: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.016201] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   32.995693] ==================================================================
[   32.996124] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   32.996189] Read of size 1 at addr fff00000c9bb4890 by task kunit_try_catch/290
[   32.996422] 
[   32.996649] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.996860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.997015] Hardware name: linux,dummy-virt (DT)
[   32.997094] Call trace:
[   32.997365]  show_stack+0x20/0x38 (C)
[   32.997690]  dump_stack_lvl+0x8c/0xd0
[   32.997865]  print_report+0x118/0x5d0
[   32.997995]  kasan_report+0xdc/0x128
[   32.998296]  __asan_report_load1_noabort+0x20/0x30
[   32.998540]  strlen+0xa8/0xb0
[   32.998631]  kasan_strings+0x418/0xb00
[   32.998821]  kunit_try_run_case+0x170/0x3f0
[   32.999051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.999151]  kthread+0x328/0x630
[   32.999277]  ret_from_fork+0x10/0x20
[   32.999586] 
[   32.999663] Allocated by task 290:
[   32.999960]  kasan_save_stack+0x3c/0x68
[   33.000063]  kasan_save_track+0x20/0x40
[   33.000108]  kasan_save_alloc_info+0x40/0x58
[   33.000151]  __kasan_kmalloc+0xd4/0xd8
[   33.000190]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.000693]  kasan_strings+0xc8/0xb00
[   33.000755]  kunit_try_run_case+0x170/0x3f0
[   33.000926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.001148]  kthread+0x328/0x630
[   33.001230]  ret_from_fork+0x10/0x20
[   33.001403] 
[   33.001429] Freed by task 290:
[   33.001680]  kasan_save_stack+0x3c/0x68
[   33.001840]  kasan_save_track+0x20/0x40
[   33.002062]  kasan_save_free_info+0x4c/0x78
[   33.002306]  __kasan_slab_free+0x6c/0x98
[   33.002419]  kfree+0x214/0x3c8
[   33.002719]  kasan_strings+0x24c/0xb00
[   33.002876]  kunit_try_run_case+0x170/0x3f0
[   33.003104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.003366]  kthread+0x328/0x630
[   33.003451]  ret_from_fork+0x10/0x20
[   33.003702] 
[   33.003882] The buggy address belongs to the object at fff00000c9bb4880
[   33.003882]  which belongs to the cache kmalloc-32 of size 32
[   33.004081] The buggy address is located 16 bytes inside of
[   33.004081]  freed 32-byte region [fff00000c9bb4880, fff00000c9bb48a0)
[   33.004162] 
[   33.004236] The buggy address belongs to the physical page:
[   33.004272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4
[   33.004330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.004643] page_type: f5(slab)
[   33.004706] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.004761] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.004807] page dumped because: kasan: bad access detected
[   33.004843] 
[   33.004863] Memory state around the buggy address:
[   33.004916]  fff00000c9bb4780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.004979]  fff00000c9bb4800: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.005027] >fff00000c9bb4880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.005068]                          ^
[   33.005100]  fff00000c9bb4900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.005175]  fff00000c9bb4980: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.005218] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   32.985287] ==================================================================
[   32.985563] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   32.985735] Read of size 1 at addr fff00000c9bb4890 by task kunit_try_catch/290
[   32.985828] 
[   32.985863] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.986152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.986196] Hardware name: linux,dummy-virt (DT)
[   32.986425] Call trace:
[   32.986461]  show_stack+0x20/0x38 (C)
[   32.986574]  dump_stack_lvl+0x8c/0xd0
[   32.986628]  print_report+0x118/0x5d0
[   32.986691]  kasan_report+0xdc/0x128
[   32.987049]  __asan_report_load1_noabort+0x20/0x30
[   32.987124]  kasan_strings+0x95c/0xb00
[   32.987308]  kunit_try_run_case+0x170/0x3f0
[   32.987520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.987636]  kthread+0x328/0x630
[   32.987796]  ret_from_fork+0x10/0x20
[   32.987874] 
[   32.988022] Allocated by task 290:
[   32.988054]  kasan_save_stack+0x3c/0x68
[   32.988096]  kasan_save_track+0x20/0x40
[   32.988154]  kasan_save_alloc_info+0x40/0x58
[   32.988316]  __kasan_kmalloc+0xd4/0xd8
[   32.988398]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.988596]  kasan_strings+0xc8/0xb00
[   32.988645]  kunit_try_run_case+0x170/0x3f0
[   32.988698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.988749]  kthread+0x328/0x630
[   32.988799]  ret_from_fork+0x10/0x20
[   32.988839] 
[   32.988869] Freed by task 290:
[   32.988909]  kasan_save_stack+0x3c/0x68
[   32.988948]  kasan_save_track+0x20/0x40
[   32.988992]  kasan_save_free_info+0x4c/0x78
[   32.989032]  __kasan_slab_free+0x6c/0x98
[   32.989071]  kfree+0x214/0x3c8
[   32.989116]  kasan_strings+0x24c/0xb00
[   32.989157]  kunit_try_run_case+0x170/0x3f0
[   32.989201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.989258]  kthread+0x328/0x630
[   32.989294]  ret_from_fork+0x10/0x20
[   32.989339] 
[   32.989361] The buggy address belongs to the object at fff00000c9bb4880
[   32.989361]  which belongs to the cache kmalloc-32 of size 32
[   32.989432] The buggy address is located 16 bytes inside of
[   32.989432]  freed 32-byte region [fff00000c9bb4880, fff00000c9bb48a0)
[   32.989496] 
[   32.989565] The buggy address belongs to the physical page:
[   32.989618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4
[   32.990040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.990493] page_type: f5(slab)
[   32.991530] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.991621] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.991694] page dumped because: kasan: bad access detected
[   32.991755] 
[   32.991811] Memory state around the buggy address:
[   32.992065]  fff00000c9bb4780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.992252]  fff00000c9bb4800: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.992872] >fff00000c9bb4880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.993099]                          ^
[   32.993359]  fff00000c9bb4900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.993584]  fff00000c9bb4980: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.993681] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   32.970879] ==================================================================
[   32.971251] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   32.971344] Read of size 1 at addr fff00000c9bb4890 by task kunit_try_catch/290
[   32.971520] 
[   32.971554] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.972038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.972132] Hardware name: linux,dummy-virt (DT)
[   32.972178] Call trace:
[   32.972464]  show_stack+0x20/0x38 (C)
[   32.972637]  dump_stack_lvl+0x8c/0xd0
[   32.973015]  print_report+0x118/0x5d0
[   32.973168]  kasan_report+0xdc/0x128
[   32.973358]  __asan_report_load1_noabort+0x20/0x30
[   32.973466]  strcmp+0xc0/0xc8
[   32.973817]  kasan_strings+0x340/0xb00
[   32.973893]  kunit_try_run_case+0x170/0x3f0
[   32.974201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.974431]  kthread+0x328/0x630
[   32.974887]  ret_from_fork+0x10/0x20
[   32.975177] 
[   32.975261] Allocated by task 290:
[   32.975366]  kasan_save_stack+0x3c/0x68
[   32.975660]  kasan_save_track+0x20/0x40
[   32.975843]  kasan_save_alloc_info+0x40/0x58
[   32.975968]  __kasan_kmalloc+0xd4/0xd8
[   32.976112]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.976159]  kasan_strings+0xc8/0xb00
[   32.976199]  kunit_try_run_case+0x170/0x3f0
[   32.976240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.976724]  kthread+0x328/0x630
[   32.976795]  ret_from_fork+0x10/0x20
[   32.976974] 
[   32.977233] Freed by task 290:
[   32.977419]  kasan_save_stack+0x3c/0x68
[   32.977557]  kasan_save_track+0x20/0x40
[   32.977773]  kasan_save_free_info+0x4c/0x78
[   32.977917]  __kasan_slab_free+0x6c/0x98
[   32.978060]  kfree+0x214/0x3c8
[   32.978564]  kasan_strings+0x24c/0xb00
[   32.978627]  kunit_try_run_case+0x170/0x3f0
[   32.978964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.979141]  kthread+0x328/0x630
[   32.979319]  ret_from_fork+0x10/0x20
[   32.979534] 
[   32.979600] The buggy address belongs to the object at fff00000c9bb4880
[   32.979600]  which belongs to the cache kmalloc-32 of size 32
[   32.979808] The buggy address is located 16 bytes inside of
[   32.979808]  freed 32-byte region [fff00000c9bb4880, fff00000c9bb48a0)
[   32.980079] 
[   32.980215] The buggy address belongs to the physical page:
[   32.980297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4
[   32.980392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.980446] page_type: f5(slab)
[   32.980487] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.980902] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.981131] page dumped because: kasan: bad access detected
[   32.981383] 
[   32.981459] Memory state around the buggy address:
[   32.981875]  fff00000c9bb4780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.982004]  fff00000c9bb4800: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.982243] >fff00000c9bb4880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.982361]                          ^
[   32.982520]  fff00000c9bb4900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.982616]  fff00000c9bb4980: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.982886] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   32.945636] ==================================================================
[   32.945741] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   32.945897] Read of size 1 at addr fff00000c9bb46d8 by task kunit_try_catch/288
[   32.945955] 
[   32.946251] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.946482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.946536] Hardware name: linux,dummy-virt (DT)
[   32.946636] Call trace:
[   32.946685]  show_stack+0x20/0x38 (C)
[   32.946779]  dump_stack_lvl+0x8c/0xd0
[   32.946839]  print_report+0x118/0x5d0
[   32.947144]  kasan_report+0xdc/0x128
[   32.947216]  __asan_report_load1_noabort+0x20/0x30
[   32.947334]  memcmp+0x198/0x1d8
[   32.947409]  kasan_memcmp+0x16c/0x300
[   32.947460]  kunit_try_run_case+0x170/0x3f0
[   32.947575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.947634]  kthread+0x328/0x630
[   32.947679]  ret_from_fork+0x10/0x20
[   32.947729] 
[   32.947759] Allocated by task 288:
[   32.948048]  kasan_save_stack+0x3c/0x68
[   32.948168]  kasan_save_track+0x20/0x40
[   32.948211]  kasan_save_alloc_info+0x40/0x58
[   32.948254]  __kasan_kmalloc+0xd4/0xd8
[   32.948295]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.948672]  kasan_memcmp+0xbc/0x300
[   32.948743]  kunit_try_run_case+0x170/0x3f0
[   32.948944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.949124]  kthread+0x328/0x630
[   32.949359]  ret_from_fork+0x10/0x20
[   32.949687] 
[   32.949837] The buggy address belongs to the object at fff00000c9bb46c0
[   32.949837]  which belongs to the cache kmalloc-32 of size 32
[   32.950003] The buggy address is located 0 bytes to the right of
[   32.950003]  allocated 24-byte region [fff00000c9bb46c0, fff00000c9bb46d8)
[   32.950078] 
[   32.950129] The buggy address belongs to the physical page:
[   32.950339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4
[   32.950691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.950835] page_type: f5(slab)
[   32.950926] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.951025] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.951313] page dumped because: kasan: bad access detected
[   32.951352] 
[   32.951519] Memory state around the buggy address:
[   32.951562]  fff00000c9bb4580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.951666]  fff00000c9bb4600: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   32.951725] >fff00000c9bb4680: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.951768]                                                     ^
[   32.952223]  fff00000c9bb4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.952281]  fff00000c9bb4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.952430] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   32.918393] ==================================================================
[   32.918454] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   32.918869] Read of size 1 at addr ffff800080b47b4a by task kunit_try_catch/284
[   32.918940] 
[   32.919132] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.919308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.919341] Hardware name: linux,dummy-virt (DT)
[   32.919430] Call trace:
[   32.919596]  show_stack+0x20/0x38 (C)
[   32.919769]  dump_stack_lvl+0x8c/0xd0
[   32.920071]  print_report+0x310/0x5d0
[   32.920166]  kasan_report+0xdc/0x128
[   32.920345]  __asan_report_load1_noabort+0x20/0x30
[   32.920437]  kasan_alloca_oob_right+0x2dc/0x340
[   32.920780]  kunit_try_run_case+0x170/0x3f0
[   32.920901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.921024]  kthread+0x328/0x630
[   32.921213]  ret_from_fork+0x10/0x20
[   32.921367] 
[   32.921436] The buggy address belongs to stack of task kunit_try_catch/284
[   32.921598] 
[   32.921622] The buggy address ffff800080b47b4a belongs to a vmalloc virtual mapping
[   32.921710] The buggy address belongs to the physical page:
[   32.921888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb1
[   32.922160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.922265] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.922439] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.922578] page dumped because: kasan: bad access detected
[   32.922958] 
[   32.923080] Memory state around the buggy address:
[   32.923222]  ffff800080b47a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.923406]  ffff800080b47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.923629] >ffff800080b47b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   32.923893]                                               ^
[   32.924044]  ffff800080b47b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   32.924225]  ffff800080b47c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.924288] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   32.902837] ==================================================================
[   32.902936] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   32.903242] Read of size 1 at addr ffff800080b27b5f by task kunit_try_catch/282
[   32.903304] 
[   32.903337] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.903427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.903856] Hardware name: linux,dummy-virt (DT)
[   32.904010] Call trace:
[   32.904108]  show_stack+0x20/0x38 (C)
[   32.904281]  dump_stack_lvl+0x8c/0xd0
[   32.904720]  print_report+0x310/0x5d0
[   32.904930]  kasan_report+0xdc/0x128
[   32.905093]  __asan_report_load1_noabort+0x20/0x30
[   32.905207]  kasan_alloca_oob_left+0x2b8/0x310
[   32.905333]  kunit_try_run_case+0x170/0x3f0
[   32.905541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.905633]  kthread+0x328/0x630
[   32.905795]  ret_from_fork+0x10/0x20
[   32.905881] 
[   32.906156] The buggy address belongs to stack of task kunit_try_catch/282
[   32.906338] 
[   32.906390] The buggy address ffff800080b27b5f belongs to a vmalloc virtual mapping
[   32.906680] The buggy address belongs to the physical page:
[   32.906899] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1a
[   32.906975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.907339] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.907635] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.907839] page dumped because: kasan: bad access detected
[   32.908048] 
[   32.908205] Memory state around the buggy address:
[   32.908413]  ffff800080b27a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.908482]  ffff800080b27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.908782] >ffff800080b27b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   32.908932]                                                     ^
[   32.909159]  ffff800080b27b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   32.909369]  ffff800080b27c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.909515] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   32.884962] ==================================================================
[   32.885037] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   32.885092] Read of size 1 at addr ffff800080b27c2a by task kunit_try_catch/280
[   32.885144] 
[   32.885174] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.885267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.885297] Hardware name: linux,dummy-virt (DT)
[   32.885330] Call trace:
[   32.885356]  show_stack+0x20/0x38 (C)
[   32.885405]  dump_stack_lvl+0x8c/0xd0
[   32.885455]  print_report+0x310/0x5d0
[   32.885501]  kasan_report+0xdc/0x128
[   32.885683]  __asan_report_load1_noabort+0x20/0x30
[   32.885925]  kasan_stack_oob+0x238/0x270
[   32.886203]  kunit_try_run_case+0x170/0x3f0
[   32.886336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.886417]  kthread+0x328/0x630
[   32.886543]  ret_from_fork+0x10/0x20
[   32.886882] 
[   32.886971] The buggy address belongs to stack of task kunit_try_catch/280
[   32.887801]  and is located at offset 138 in frame:
[   32.888001]  kasan_stack_oob+0x0/0x270
[   32.888814] 
[   32.889195] This frame has 4 objects:
[   32.889740]  [48, 49) '__assertion'
[   32.889883]  [64, 72) 'array'
[   32.889930]  [96, 112) '__assertion'
[   32.889978]  [128, 138) 'stack_array'
[   32.890110] 
[   32.890142] The buggy address ffff800080b27c2a belongs to a vmalloc virtual mapping
[   32.890213] The buggy address belongs to the physical page:
[   32.890265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1a
[   32.890322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.890400] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.890455] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.890499] page dumped because: kasan: bad access detected
[   32.891205] 
[   32.891286] Memory state around the buggy address:
[   32.891482]  ffff800080b27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.891725]  ffff800080b27b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   32.891779] >ffff800080b27c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   32.891934]                                   ^
[   32.892119]  ffff800080b27c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   32.892230]  ffff800080b27d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.892301] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   32.869684] ==================================================================
[   32.870008] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   32.870078] Read of size 1 at addr ffff9420b897a70d by task kunit_try_catch/276
[   32.870134] 
[   32.870218] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.870327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.870371] Hardware name: linux,dummy-virt (DT)
[   32.870406] Call trace:
[   32.870436]  show_stack+0x20/0x38 (C)
[   32.870489]  dump_stack_lvl+0x8c/0xd0
[   32.870769]  print_report+0x310/0x5d0
[   32.870831]  kasan_report+0xdc/0x128
[   32.870886]  __asan_report_load1_noabort+0x20/0x30
[   32.870996]  kasan_global_oob_right+0x230/0x270
[   32.871050]  kunit_try_run_case+0x170/0x3f0
[   32.871142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.871199]  kthread+0x328/0x630
[   32.871275]  ret_from_fork+0x10/0x20
[   32.871336] 
[   32.871521] The buggy address belongs to the variable:
[   32.871565]  global_array+0xd/0x40
[   32.871802] 
[   32.872032] The buggy address ffff9420b897a70d belongs to a vmalloc virtual mapping
[   32.872133] The buggy address belongs to the physical page:
[   32.872170] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d7a
[   32.872589] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   32.872755] raw: 03fffe0000002000 ffffc1ffc01f5e88 ffffc1ffc01f5e88 0000000000000000
[   32.872876] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.872993] page dumped because: kasan: bad access detected
[   32.873029] 
[   32.873049] Memory state around the buggy address:
[   32.873303]  ffff9420b897a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.873470]  ffff9420b897a680: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   32.873608] >ffff9420b897a700: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   32.873717]                       ^
[   32.873749]  ffff9420b897a780: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   32.873795]  ffff9420b897a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.873838] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   32.857013] ==================================================================
[   32.857071] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.857128] Free of addr fff00000c9bfc001 by task kunit_try_catch/274
[   32.857705] 
[   32.857739] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.857826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.857855] Hardware name: linux,dummy-virt (DT)
[   32.857889] Call trace:
[   32.857911]  show_stack+0x20/0x38 (C)
[   32.857961]  dump_stack_lvl+0x8c/0xd0
[   32.858009]  print_report+0x118/0x5d0
[   32.858061]  kasan_report_invalid_free+0xc0/0xe8
[   32.858246]  __kasan_mempool_poison_object+0xfc/0x150
[   32.858394]  mempool_free+0x28c/0x328
[   32.858537]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.858592]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   32.858985]  kunit_try_run_case+0x170/0x3f0
[   32.859040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.859650]  kthread+0x328/0x630
[   32.859807]  ret_from_fork+0x10/0x20
[   32.859858] 
[   32.859879] The buggy address belongs to the physical page:
[   32.859913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bfc
[   32.860298] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.860397] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.860513] page_type: f8(unknown)
[   32.860733] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.860821] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.861104] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.861182] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.861233] head: 0bfffe0000000002 ffffc1ffc326ff01 00000000ffffffff 00000000ffffffff
[   32.861285] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.861328] page dumped because: kasan: bad access detected
[   32.861360] 
[   32.861388] Memory state around the buggy address:
[   32.861426]  fff00000c9bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.861878]  fff00000c9bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.861976] >fff00000c9bfc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.862016]                    ^
[   32.862043]  fff00000c9bfc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.862438]  fff00000c9bfc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.862582] ==================================================================
[   32.839229] ==================================================================
[   32.839288] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.839341] Free of addr fff00000c9ba2e01 by task kunit_try_catch/272
[   32.839738] 
[   32.839802] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.840119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.840336] Hardware name: linux,dummy-virt (DT)
[   32.840500] Call trace:
[   32.840532]  show_stack+0x20/0x38 (C)
[   32.840582]  dump_stack_lvl+0x8c/0xd0
[   32.840649]  print_report+0x118/0x5d0
[   32.840864]  kasan_report_invalid_free+0xc0/0xe8
[   32.841035]  check_slab_allocation+0xfc/0x108
[   32.841161]  __kasan_mempool_poison_object+0x78/0x150
[   32.841261]  mempool_free+0x28c/0x328
[   32.841385]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.841440]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.841492]  kunit_try_run_case+0x170/0x3f0
[   32.841548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.841647]  kthread+0x328/0x630
[   32.841767]  ret_from_fork+0x10/0x20
[   32.841922] 
[   32.841943] Allocated by task 272:
[   32.841997]  kasan_save_stack+0x3c/0x68
[   32.842105]  kasan_save_track+0x20/0x40
[   32.842186]  kasan_save_alloc_info+0x40/0x58
[   32.842297]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.842394]  remove_element+0x130/0x1f8
[   32.842432]  mempool_alloc_preallocated+0x58/0xc0
[   32.842473]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   32.843073]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.843128]  kunit_try_run_case+0x170/0x3f0
[   32.843403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.843540]  kthread+0x328/0x630
[   32.843879]  ret_from_fork+0x10/0x20
[   32.843965] 
[   32.843990] The buggy address belongs to the object at fff00000c9ba2e00
[   32.843990]  which belongs to the cache kmalloc-128 of size 128
[   32.844050] The buggy address is located 1 bytes inside of
[   32.844050]  128-byte region [fff00000c9ba2e00, fff00000c9ba2e80)
[   32.844270] 
[   32.844318] The buggy address belongs to the physical page:
[   32.844371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba2
[   32.844516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.844567] page_type: f5(slab)
[   32.844604] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.844656] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.844698] page dumped because: kasan: bad access detected
[   32.844730] 
[   32.844748] Memory state around the buggy address:
[   32.844810]  fff00000c9ba2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.844856]  fff00000c9ba2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.844936] >fff00000c9ba2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.844979]                    ^
[   32.845007]  fff00000c9ba2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.845251]  fff00000c9ba2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.845459] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   32.826022] ==================================================================
[   32.826080] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.826377] Free of addr fff00000c9bfc000 by task kunit_try_catch/270
[   32.826580] 
[   32.826885] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.827060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.827176] Hardware name: linux,dummy-virt (DT)
[   32.827211] Call trace:
[   32.827235]  show_stack+0x20/0x38 (C)
[   32.827285]  dump_stack_lvl+0x8c/0xd0
[   32.827340]  print_report+0x118/0x5d0
[   32.827564]  kasan_report_invalid_free+0xc0/0xe8
[   32.827640]  __kasan_mempool_poison_pages+0xe0/0xe8
[   32.827852]  mempool_free+0x24c/0x328
[   32.827900]  mempool_double_free_helper+0x150/0x2e8
[   32.827952]  mempool_page_alloc_double_free+0xbc/0x118
[   32.828151]  kunit_try_run_case+0x170/0x3f0
[   32.828406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.828463]  kthread+0x328/0x630
[   32.828791]  ret_from_fork+0x10/0x20
[   32.828878] 
[   32.828949] The buggy address belongs to the physical page:
[   32.829049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bfc
[   32.829148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.829266] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.829377] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.829420] page dumped because: kasan: bad access detected
[   32.829451] 
[   32.829469] Memory state around the buggy address:
[   32.829581]  fff00000c9bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.829765]  fff00000c9bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.829810] >fff00000c9bfc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.829850]                    ^
[   32.829878]  fff00000c9bfc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.829922]  fff00000c9bfc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.829989] ==================================================================
[   32.809853] ==================================================================
[   32.809926] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.809984] Free of addr fff00000c9bf8000 by task kunit_try_catch/268
[   32.810238] 
[   32.810397] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.810758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.810937] Hardware name: linux,dummy-virt (DT)
[   32.811003] Call trace:
[   32.811026]  show_stack+0x20/0x38 (C)
[   32.811079]  dump_stack_lvl+0x8c/0xd0
[   32.811129]  print_report+0x118/0x5d0
[   32.811173]  kasan_report_invalid_free+0xc0/0xe8
[   32.811228]  __kasan_mempool_poison_object+0x14c/0x150
[   32.811468]  mempool_free+0x28c/0x328
[   32.811562]  mempool_double_free_helper+0x150/0x2e8
[   32.811815]  mempool_kmalloc_large_double_free+0xc0/0x118
[   32.811871]  kunit_try_run_case+0x170/0x3f0
[   32.812157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.812347]  kthread+0x328/0x630
[   32.812395]  ret_from_fork+0x10/0x20
[   32.812778] 
[   32.812817] The buggy address belongs to the physical page:
[   32.812858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8
[   32.812958] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.813190] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.813252] page_type: f8(unknown)
[   32.813526] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.813587] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.813645] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.813696] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.814050] head: 0bfffe0000000002 ffffc1ffc326fe01 00000000ffffffff 00000000ffffffff
[   32.814105] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.814148] page dumped because: kasan: bad access detected
[   32.814179] 
[   32.814546] Memory state around the buggy address:
[   32.814622]  fff00000c9bf7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.814668]  fff00000c9bf7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.815039] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.815087]                    ^
[   32.815117]  fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.815224]  fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.815308] ==================================================================
[   32.787875] ==================================================================
[   32.787944] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.787997] Free of addr fff00000c9ba2a00 by task kunit_try_catch/266
[   32.788320] 
[   32.788394] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.788494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.788601] Hardware name: linux,dummy-virt (DT)
[   32.788638] Call trace:
[   32.788660]  show_stack+0x20/0x38 (C)
[   32.788713]  dump_stack_lvl+0x8c/0xd0
[   32.788760]  print_report+0x118/0x5d0
[   32.789132]  kasan_report_invalid_free+0xc0/0xe8
[   32.789185]  check_slab_allocation+0xd4/0x108
[   32.789254]  __kasan_mempool_poison_object+0x78/0x150
[   32.789320]  mempool_free+0x28c/0x328
[   32.789365]  mempool_double_free_helper+0x150/0x2e8
[   32.789417]  mempool_kmalloc_double_free+0xc0/0x118
[   32.789469]  kunit_try_run_case+0x170/0x3f0
[   32.789526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.789580]  kthread+0x328/0x630
[   32.790008]  ret_from_fork+0x10/0x20
[   32.790223] 
[   32.790267] Allocated by task 266:
[   32.790370]  kasan_save_stack+0x3c/0x68
[   32.790411]  kasan_save_track+0x20/0x40
[   32.790469]  kasan_save_alloc_info+0x40/0x58
[   32.790794]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.790846]  remove_element+0x130/0x1f8
[   32.791138]  mempool_alloc_preallocated+0x58/0xc0
[   32.791250]  mempool_double_free_helper+0x94/0x2e8
[   32.791319]  mempool_kmalloc_double_free+0xc0/0x118
[   32.791492]  kunit_try_run_case+0x170/0x3f0
[   32.791548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.791605]  kthread+0x328/0x630
[   32.791639]  ret_from_fork+0x10/0x20
[   32.791674] 
[   32.791695] Freed by task 266:
[   32.791749]  kasan_save_stack+0x3c/0x68
[   32.791828]  kasan_save_track+0x20/0x40
[   32.791864]  kasan_save_free_info+0x4c/0x78
[   32.792581]  __kasan_mempool_poison_object+0xc0/0x150
[   32.792641]  mempool_free+0x28c/0x328
[   32.792678]  mempool_double_free_helper+0x100/0x2e8
[   32.792722]  mempool_kmalloc_double_free+0xc0/0x118
[   32.793056]  kunit_try_run_case+0x170/0x3f0
[   32.793101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.793146]  kthread+0x328/0x630
[   32.793378]  ret_from_fork+0x10/0x20
[   32.793428] 
[   32.793532] The buggy address belongs to the object at fff00000c9ba2a00
[   32.793532]  which belongs to the cache kmalloc-128 of size 128
[   32.793600] The buggy address is located 0 bytes inside of
[   32.793600]  128-byte region [fff00000c9ba2a00, fff00000c9ba2a80)
[   32.793838] 
[   32.793858] The buggy address belongs to the physical page:
[   32.793947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba2
[   32.794028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.794127] page_type: f5(slab)
[   32.794249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.794399] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.794513] page dumped because: kasan: bad access detected
[   32.794544] 
[   32.794563] Memory state around the buggy address:
[   32.794595]  fff00000c9ba2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.794802]  fff00000c9ba2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.795206] >fff00000c9ba2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.795495]                    ^
[   32.795803]  fff00000c9ba2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.795879]  fff00000c9ba2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.795920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   32.706355] ==================================================================
[   32.706421] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.706481] Read of size 1 at addr fff00000c9bf4000 by task kunit_try_catch/260
[   32.706592] 
[   32.706739] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.706970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.706998] Hardware name: linux,dummy-virt (DT)
[   32.707030] Call trace:
[   32.707058]  show_stack+0x20/0x38 (C)
[   32.707293]  dump_stack_lvl+0x8c/0xd0
[   32.707360]  print_report+0x118/0x5d0
[   32.707487]  kasan_report+0xdc/0x128
[   32.707612]  __asan_report_load1_noabort+0x20/0x30
[   32.707661]  mempool_uaf_helper+0x314/0x340
[   32.707709]  mempool_kmalloc_large_uaf+0xc4/0x120
[   32.707761]  kunit_try_run_case+0x170/0x3f0
[   32.707843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.707920]  kthread+0x328/0x630
[   32.707963]  ret_from_fork+0x10/0x20
[   32.708011] 
[   32.708031] The buggy address belongs to the physical page:
[   32.708064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf4
[   32.708427] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.708965] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.709353] page_type: f8(unknown)
[   32.709445] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.709497] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.709559] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.709608] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.709658] head: 0bfffe0000000002 ffffc1ffc326fd01 00000000ffffffff 00000000ffffffff
[   32.709708] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.709750] page dumped because: kasan: bad access detected
[   32.709781] 
[   32.709799] Memory state around the buggy address:
[   32.709833]  fff00000c9bf3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.710128]  fff00000c9bf3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.710186] >fff00000c9bf4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.710271]                    ^
[   32.710397]  fff00000c9bf4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.710464]  fff00000c9bf4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.710515] ==================================================================
[   32.769991] ==================================================================
[   32.770050] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.770114] Read of size 1 at addr fff00000c9bf8000 by task kunit_try_catch/264
[   32.770165] 
[   32.770200] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.770288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.770316] Hardware name: linux,dummy-virt (DT)
[   32.770348] Call trace:
[   32.770381]  show_stack+0x20/0x38 (C)
[   32.770430]  dump_stack_lvl+0x8c/0xd0
[   32.770479]  print_report+0x118/0x5d0
[   32.770688]  kasan_report+0xdc/0x128
[   32.770735]  __asan_report_load1_noabort+0x20/0x30
[   32.770790]  mempool_uaf_helper+0x314/0x340
[   32.772534]  mempool_page_alloc_uaf+0xc0/0x118
[   32.773134]  kunit_try_run_case+0x170/0x3f0
[   32.773469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.774227]  kthread+0x328/0x630
[   32.774358]  ret_from_fork+0x10/0x20
[   32.775046] 
[   32.775763] The buggy address belongs to the physical page:
[   32.775878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8
[   32.775937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.776269] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.776936] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.777062] page dumped because: kasan: bad access detected
[   32.777108] 
[   32.777127] Memory state around the buggy address:
[   32.777163]  fff00000c9bf7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.777210]  fff00000c9bf7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.777265] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.777304]                    ^
[   32.777838]  fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.777914]  fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.777996] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   32.723451] ==================================================================
[   32.723522] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.723577] Read of size 1 at addr fff00000c9ba6240 by task kunit_try_catch/262
[   32.723627] 
[   32.723658] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.723757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.723792] Hardware name: linux,dummy-virt (DT)
[   32.723822] Call trace:
[   32.724543]  show_stack+0x20/0x38 (C)
[   32.724685]  dump_stack_lvl+0x8c/0xd0
[   32.724736]  print_report+0x118/0x5d0
[   32.724781]  kasan_report+0xdc/0x128
[   32.724823]  __asan_report_load1_noabort+0x20/0x30
[   32.724874]  mempool_uaf_helper+0x314/0x340
[   32.724923]  mempool_slab_uaf+0xc0/0x118
[   32.724970]  kunit_try_run_case+0x170/0x3f0
[   32.726031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.726172]  kthread+0x328/0x630
[   32.726256]  ret_from_fork+0x10/0x20
[   32.726322] 
[   32.726341] Allocated by task 262:
[   32.726382]  kasan_save_stack+0x3c/0x68
[   32.726471]  kasan_save_track+0x20/0x40
[   32.726839]  kasan_save_alloc_info+0x40/0x58
[   32.726892]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.726937]  remove_element+0x16c/0x1f8
[   32.726977]  mempool_alloc_preallocated+0x58/0xc0
[   32.727301]  mempool_uaf_helper+0xa4/0x340
[   32.727427]  mempool_slab_uaf+0xc0/0x118
[   32.727468]  kunit_try_run_case+0x170/0x3f0
[   32.727517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.727564]  kthread+0x328/0x630
[   32.727597]  ret_from_fork+0x10/0x20
[   32.728046] 
[   32.728161] Freed by task 262:
[   32.728239]  kasan_save_stack+0x3c/0x68
[   32.728282]  kasan_save_track+0x20/0x40
[   32.728347]  kasan_save_free_info+0x4c/0x78
[   32.728388]  __kasan_mempool_poison_object+0xc0/0x150
[   32.728430]  mempool_free+0x28c/0x328
[   32.728738]  mempool_uaf_helper+0x104/0x340
[   32.728830]  mempool_slab_uaf+0xc0/0x118
[   32.728871]  kunit_try_run_case+0x170/0x3f0
[   32.728911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.728954]  kthread+0x328/0x630
[   32.728989]  ret_from_fork+0x10/0x20
[   32.729026] 
[   32.729056] The buggy address belongs to the object at fff00000c9ba6240
[   32.729056]  which belongs to the cache test_cache of size 123
[   32.729316] The buggy address is located 0 bytes inside of
[   32.729316]  freed 123-byte region [fff00000c9ba6240, fff00000c9ba62bb)
[   32.729785] 
[   32.729807] The buggy address belongs to the physical page:
[   32.729866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba6
[   32.729919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.730237] page_type: f5(slab)
[   32.730280] raw: 0bfffe0000000000 fff00000c56a1dc0 dead000000000122 0000000000000000
[   32.730332] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.730691] page dumped because: kasan: bad access detected
[   32.730733] 
[   32.730751] Memory state around the buggy address:
[   32.730784]  fff00000c9ba6100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.730828]  fff00000c9ba6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.730881] >fff00000c9ba6200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.730920]                                            ^
[   32.731200]  fff00000c9ba6280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.731248]  fff00000c9ba6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.731754] ==================================================================
[   32.689993] ==================================================================
[   32.690339] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.690409] Read of size 1 at addr fff00000c9ba2600 by task kunit_try_catch/258
[   32.690460] 
[   32.690497] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.690597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.690625] Hardware name: linux,dummy-virt (DT)
[   32.690659] Call trace:
[   32.690694]  show_stack+0x20/0x38 (C)
[   32.690742]  dump_stack_lvl+0x8c/0xd0
[   32.691113]  print_report+0x118/0x5d0
[   32.691463]  kasan_report+0xdc/0x128
[   32.691520]  __asan_report_load1_noabort+0x20/0x30
[   32.691837]  mempool_uaf_helper+0x314/0x340
[   32.692243]  mempool_kmalloc_uaf+0xc4/0x120
[   32.692297]  kunit_try_run_case+0x170/0x3f0
[   32.692347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.692426]  kthread+0x328/0x630
[   32.692672]  ret_from_fork+0x10/0x20
[   32.692725] 
[   32.692743] Allocated by task 258:
[   32.692877]  kasan_save_stack+0x3c/0x68
[   32.693239]  kasan_save_track+0x20/0x40
[   32.693291]  kasan_save_alloc_info+0x40/0x58
[   32.693433]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.693478]  remove_element+0x130/0x1f8
[   32.693527]  mempool_alloc_preallocated+0x58/0xc0
[   32.693579]  mempool_uaf_helper+0xa4/0x340
[   32.693787]  mempool_kmalloc_uaf+0xc4/0x120
[   32.693827]  kunit_try_run_case+0x170/0x3f0
[   32.693866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.693909]  kthread+0x328/0x630
[   32.693941]  ret_from_fork+0x10/0x20
[   32.693978] 
[   32.694008] Freed by task 258:
[   32.694034]  kasan_save_stack+0x3c/0x68
[   32.694070]  kasan_save_track+0x20/0x40
[   32.694403]  kasan_save_free_info+0x4c/0x78
[   32.694487]  __kasan_mempool_poison_object+0xc0/0x150
[   32.694538]  mempool_free+0x28c/0x328
[   32.694579]  mempool_uaf_helper+0x104/0x340
[   32.694617]  mempool_kmalloc_uaf+0xc4/0x120
[   32.694657]  kunit_try_run_case+0x170/0x3f0
[   32.694693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.694742]  kthread+0x328/0x630
[   32.694933]  ret_from_fork+0x10/0x20
[   32.694970] 
[   32.695016] The buggy address belongs to the object at fff00000c9ba2600
[   32.695016]  which belongs to the cache kmalloc-128 of size 128
[   32.695115] The buggy address is located 0 bytes inside of
[   32.695115]  freed 128-byte region [fff00000c9ba2600, fff00000c9ba2680)
[   32.695178] 
[   32.695236] The buggy address belongs to the physical page:
[   32.695269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba2
[   32.695483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.695561] page_type: f5(slab)
[   32.695599] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.695649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.695691] page dumped because: kasan: bad access detected
[   32.695847] 
[   32.695868] Memory state around the buggy address:
[   32.695901]  fff00000c9ba2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.696324]  fff00000c9ba2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.696497] >fff00000c9ba2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.696552]                    ^
[   32.696633]  fff00000c9ba2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.696785]  fff00000c9ba2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.697062] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   32.638202] ==================================================================
[   32.638270] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.638526] Read of size 1 at addr fff00000c9bf2001 by task kunit_try_catch/254
[   32.638578] 
[   32.639161] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.639370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.639436] Hardware name: linux,dummy-virt (DT)
[   32.639468] Call trace:
[   32.639493]  show_stack+0x20/0x38 (C)
[   32.639925]  dump_stack_lvl+0x8c/0xd0
[   32.639978]  print_report+0x118/0x5d0
[   32.640023]  kasan_report+0xdc/0x128
[   32.640067]  __asan_report_load1_noabort+0x20/0x30
[   32.640114]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.640388]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   32.640862]  kunit_try_run_case+0x170/0x3f0
[   32.640923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.640976]  kthread+0x328/0x630
[   32.641392]  ret_from_fork+0x10/0x20
[   32.641488] 
[   32.641529] The buggy address belongs to the physical page:
[   32.641562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf0
[   32.641920] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.641974] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.642175] page_type: f8(unknown)
[   32.642379] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.642435] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.642486] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.642612] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.642879] head: 0bfffe0000000002 ffffc1ffc326fc01 00000000ffffffff 00000000ffffffff
[   32.642967] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.643016] page dumped because: kasan: bad access detected
[   32.643202] 
[   32.643222] Memory state around the buggy address:
[   32.643298]  fff00000c9bf1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.643373]  fff00000c9bf1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.643431] >fff00000c9bf2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.643816]                    ^
[   32.643951]  fff00000c9bf2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.643998]  fff00000c9bf2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.644038] ==================================================================
[   32.626891] ==================================================================
[   32.626961] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.627035] Read of size 1 at addr fff00000c9ba2273 by task kunit_try_catch/252
[   32.627087] 
[   32.627128] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.627219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.627247] Hardware name: linux,dummy-virt (DT)
[   32.627282] Call trace:
[   32.627308]  show_stack+0x20/0x38 (C)
[   32.627359]  dump_stack_lvl+0x8c/0xd0
[   32.627409]  print_report+0x118/0x5d0
[   32.627453]  kasan_report+0xdc/0x128
[   32.627495]  __asan_report_load1_noabort+0x20/0x30
[   32.627560]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.627610]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.627660]  kunit_try_run_case+0x170/0x3f0
[   32.627712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.627775]  kthread+0x328/0x630
[   32.628026]  ret_from_fork+0x10/0x20
[   32.628076] 
[   32.628096] Allocated by task 252:
[   32.628126]  kasan_save_stack+0x3c/0x68
[   32.628168]  kasan_save_track+0x20/0x40
[   32.628204]  kasan_save_alloc_info+0x40/0x58
[   32.628244]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.628291]  remove_element+0x130/0x1f8
[   32.628333]  mempool_alloc_preallocated+0x58/0xc0
[   32.628375]  mempool_oob_right_helper+0x98/0x2f0
[   32.628416]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.628459]  kunit_try_run_case+0x170/0x3f0
[   32.628496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.628555]  kthread+0x328/0x630
[   32.628588]  ret_from_fork+0x10/0x20
[   32.628623] 
[   32.628644] The buggy address belongs to the object at fff00000c9ba2200
[   32.628644]  which belongs to the cache kmalloc-128 of size 128
[   32.628705] The buggy address is located 0 bytes to the right of
[   32.628705]  allocated 115-byte region [fff00000c9ba2200, fff00000c9ba2273)
[   32.628771] 
[   32.628794] The buggy address belongs to the physical page:
[   32.628828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba2
[   32.628887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.628940] page_type: f5(slab)
[   32.628987] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.629039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.629084] page dumped because: kasan: bad access detected
[   32.629118] 
[   32.629136] Memory state around the buggy address:
[   32.629172]  fff00000c9ba2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.629217]  fff00000c9ba2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.629260] >fff00000c9ba2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.629301]                                                              ^
[   32.629344]  fff00000c9ba2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.629388]  fff00000c9ba2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.629427] ==================================================================
[   32.654890] ==================================================================
[   32.655153] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.655393] Read of size 1 at addr fff00000c9b0a2bb by task kunit_try_catch/256
[   32.655640] 
[   32.655922] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.656198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.656395] Hardware name: linux,dummy-virt (DT)
[   32.656535] Call trace:
[   32.656569]  show_stack+0x20/0x38 (C)
[   32.656649]  dump_stack_lvl+0x8c/0xd0
[   32.656955]  print_report+0x118/0x5d0
[   32.657245]  kasan_report+0xdc/0x128
[   32.657483]  __asan_report_load1_noabort+0x20/0x30
[   32.657548]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.657599]  mempool_slab_oob_right+0xc0/0x118
[   32.657690]  kunit_try_run_case+0x170/0x3f0
[   32.657917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.657972]  kthread+0x328/0x630
[   32.658014]  ret_from_fork+0x10/0x20
[   32.658114] 
[   32.658133] Allocated by task 256:
[   32.658184]  kasan_save_stack+0x3c/0x68
[   32.658234]  kasan_save_track+0x20/0x40
[   32.658270]  kasan_save_alloc_info+0x40/0x58
[   32.658308]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.658350]  remove_element+0x16c/0x1f8
[   32.658438]  mempool_alloc_preallocated+0x58/0xc0
[   32.658652]  mempool_oob_right_helper+0x98/0x2f0
[   32.658693]  mempool_slab_oob_right+0xc0/0x118
[   32.658734]  kunit_try_run_case+0x170/0x3f0
[   32.658810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.659014]  kthread+0x328/0x630
[   32.659143]  ret_from_fork+0x10/0x20
[   32.659181] 
[   32.659200] The buggy address belongs to the object at fff00000c9b0a240
[   32.659200]  which belongs to the cache test_cache of size 123
[   32.659303] The buggy address is located 0 bytes to the right of
[   32.659303]  allocated 123-byte region [fff00000c9b0a240, fff00000c9b0a2bb)
[   32.659461] 
[   32.659481] The buggy address belongs to the physical page:
[   32.659527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b0a
[   32.659580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.659627] page_type: f5(slab)
[   32.659665] raw: 0bfffe0000000000 fff00000c56a1c80 dead000000000122 0000000000000000
[   32.659717] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.660016] page dumped because: kasan: bad access detected
[   32.660189] 
[   32.660383] Memory state around the buggy address:
[   32.660423]  fff00000c9b0a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.660490]  fff00000c9b0a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.660545] >fff00000c9b0a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.660584]                                         ^
[   32.660618]  fff00000c9b0a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.660875]  fff00000c9b0a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.660973] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   32.062524] ==================================================================
[   32.062614] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   32.062691] Read of size 1 at addr fff00000c459e3c0 by task kunit_try_catch/246
[   32.062746] 
[   32.062790] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.062882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.062908] Hardware name: linux,dummy-virt (DT)
[   32.062943] Call trace:
[   32.062969]  show_stack+0x20/0x38 (C)
[   32.063024]  dump_stack_lvl+0x8c/0xd0
[   32.063076]  print_report+0x118/0x5d0
[   32.063121]  kasan_report+0xdc/0x128
[   32.063164]  __kasan_check_byte+0x54/0x70
[   32.063210]  kmem_cache_destroy+0x34/0x218
[   32.063260]  kmem_cache_double_destroy+0x174/0x300
[   32.063311]  kunit_try_run_case+0x170/0x3f0
[   32.063361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.063414]  kthread+0x328/0x630
[   32.063458]  ret_from_fork+0x10/0x20
[   32.063519] 
[   32.063538] Allocated by task 246:
[   32.063569]  kasan_save_stack+0x3c/0x68
[   32.063608]  kasan_save_track+0x20/0x40
[   32.063644]  kasan_save_alloc_info+0x40/0x58
[   32.063683]  __kasan_slab_alloc+0xa8/0xb0
[   32.063718]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.063763]  __kmem_cache_create_args+0x178/0x280
[   32.063808]  kmem_cache_double_destroy+0xc0/0x300
[   32.063849]  kunit_try_run_case+0x170/0x3f0
[   32.063889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.063933]  kthread+0x328/0x630
[   32.063968]  ret_from_fork+0x10/0x20
[   32.064005] 
[   32.064024] Freed by task 246:
[   32.064050]  kasan_save_stack+0x3c/0x68
[   32.064086]  kasan_save_track+0x20/0x40
[   32.064120]  kasan_save_free_info+0x4c/0x78
[   32.064159]  __kasan_slab_free+0x6c/0x98
[   32.064194]  kmem_cache_free+0x260/0x468
[   32.064233]  slab_kmem_cache_release+0x38/0x50
[   32.064273]  kmem_cache_release+0x1c/0x30
[   32.064312]  kobject_put+0x17c/0x420
[   32.064348]  sysfs_slab_release+0x1c/0x30
[   32.064388]  kmem_cache_destroy+0x118/0x218
[   32.064429]  kmem_cache_double_destroy+0x128/0x300
[   32.064470]  kunit_try_run_case+0x170/0x3f0
[   32.064516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.064561]  kthread+0x328/0x630
[   32.064597]  ret_from_fork+0x10/0x20
[   32.064632] 
[   32.064652] The buggy address belongs to the object at fff00000c459e3c0
[   32.064652]  which belongs to the cache kmem_cache of size 208
[   32.064731] The buggy address is located 0 bytes inside of
[   32.064731]  freed 208-byte region [fff00000c459e3c0, fff00000c459e490)
[   32.064794] 
[   32.064817] The buggy address belongs to the physical page:
[   32.064853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10459e
[   32.064911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.064965] page_type: f5(slab)
[   32.065010] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122
[   32.065061] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   32.065106] page dumped because: kasan: bad access detected
[   32.065139] 
[   32.065159] Memory state around the buggy address:
[   32.065194]  fff00000c459e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.065241]  fff00000c459e300: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[   32.065286] >fff00000c459e380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.065327]                                            ^
[   32.065362]  fff00000c459e400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.065407]  fff00000c459e480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.065447] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   31.928334] ==================================================================
[   31.929013] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   31.929245] Read of size 1 at addr fff00000c9b0e000 by task kunit_try_catch/244
[   31.930286] 
[   31.930585] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   31.931570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.931619] Hardware name: linux,dummy-virt (DT)
[   31.931664] Call trace:
[   31.931690]  show_stack+0x20/0x38 (C)
[   31.931746]  dump_stack_lvl+0x8c/0xd0
[   31.931800]  print_report+0x118/0x5d0
[   31.931843]  kasan_report+0xdc/0x128
[   31.931885]  __asan_report_load1_noabort+0x20/0x30
[   31.931935]  kmem_cache_rcu_uaf+0x388/0x468
[   31.931984]  kunit_try_run_case+0x170/0x3f0
[   31.932036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.932090]  kthread+0x328/0x630
[   31.934603]  ret_from_fork+0x10/0x20
[   31.934970] 
[   31.934992] Allocated by task 244:
[   31.935716]  kasan_save_stack+0x3c/0x68
[   31.936198]  kasan_save_track+0x20/0x40
[   31.937011]  kasan_save_alloc_info+0x40/0x58
[   31.937061]  __kasan_slab_alloc+0xa8/0xb0
[   31.937097]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.937722]  kmem_cache_rcu_uaf+0x12c/0x468
[   31.937775]  kunit_try_run_case+0x170/0x3f0
[   31.938391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.938914]  kthread+0x328/0x630
[   31.939393]  ret_from_fork+0x10/0x20
[   31.939663] 
[   31.939683] Freed by task 0:
[   31.939714]  kasan_save_stack+0x3c/0x68
[   31.939954]  kasan_save_track+0x20/0x40
[   31.939996]  kasan_save_free_info+0x4c/0x78
[   31.940800]  __kasan_slab_free+0x6c/0x98
[   31.940923]  slab_free_after_rcu_debug+0xd4/0x2f8
[   31.941988]  rcu_core+0x9f4/0x1e20
[   31.942399]  rcu_core_si+0x18/0x30
[   31.942792]  handle_softirqs+0x374/0xb28
[   31.943520]  __do_softirq+0x1c/0x28
[   31.943832] 
[   31.943858] Last potentially related work creation:
[   31.943898]  kasan_save_stack+0x3c/0x68
[   31.943939]  kasan_record_aux_stack+0xb4/0xc8
[   31.944759]  kmem_cache_free+0x120/0x468
[   31.945050]  kmem_cache_rcu_uaf+0x16c/0x468
[   31.945584]  kunit_try_run_case+0x170/0x3f0
[   31.946059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.946460]  kthread+0x328/0x630
[   31.946819]  ret_from_fork+0x10/0x20
[   31.946925] 
[   31.946945] The buggy address belongs to the object at fff00000c9b0e000
[   31.946945]  which belongs to the cache test_cache of size 200
[   31.947307] The buggy address is located 0 bytes inside of
[   31.947307]  freed 200-byte region [fff00000c9b0e000, fff00000c9b0e0c8)
[   31.947405] 
[   31.947434] The buggy address belongs to the physical page:
[   31.947480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b0e
[   31.948534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.948599] page_type: f5(slab)
[   31.948772] raw: 0bfffe0000000000 fff00000c56a1b40 dead000000000122 0000000000000000
[   31.949129] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.949339] page dumped because: kasan: bad access detected
[   31.949758] 
[   31.949785] Memory state around the buggy address:
[   31.949848]  fff00000c9b0df00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.950196]  fff00000c9b0df80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.950453] >fff00000c9b0e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.950738]                    ^
[   31.950810]  fff00000c9b0e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.950855]  fff00000c9b0e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.951349] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.198799] ==================================================================
[   31.199079] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   31.199152] Free of addr fff00000c9a59001 by task kunit_try_catch/242
[   31.199197] 
[   31.199412] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   31.199588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.199625] Hardware name: linux,dummy-virt (DT)
[   31.199684] Call trace:
[   31.199709]  show_stack+0x20/0x38 (C)
[   31.199836]  dump_stack_lvl+0x8c/0xd0
[   31.199893]  print_report+0x118/0x5d0
[   31.199936]  kasan_report_invalid_free+0xc0/0xe8
[   31.199984]  check_slab_allocation+0xfc/0x108
[   31.200035]  __kasan_slab_pre_free+0x2c/0x48
[   31.200373]  kmem_cache_free+0xf0/0x468
[   31.200521]  kmem_cache_invalid_free+0x184/0x3c8
[   31.200606]  kunit_try_run_case+0x170/0x3f0
[   31.200722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.200811]  kthread+0x328/0x630
[   31.200909]  ret_from_fork+0x10/0x20
[   31.200990] 
[   31.201008] Allocated by task 242:
[   31.201037]  kasan_save_stack+0x3c/0x68
[   31.201118]  kasan_save_track+0x20/0x40
[   31.201673]  kasan_save_alloc_info+0x40/0x58
[   31.201714]  __kasan_slab_alloc+0xa8/0xb0
[   31.201751]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.203954]  kmem_cache_invalid_free+0x12c/0x3c8
[   31.204025]  kunit_try_run_case+0x170/0x3f0
[   31.205428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.207790]  kthread+0x328/0x630
[   31.207853]  ret_from_fork+0x10/0x20
[   31.207892] 
[   31.207912] The buggy address belongs to the object at fff00000c9a59000
[   31.207912]  which belongs to the cache test_cache of size 200
[   31.207974] The buggy address is located 1 bytes inside of
[   31.207974]  200-byte region [fff00000c9a59000, fff00000c9a590c8)
[   31.208035] 
[   31.208058] The buggy address belongs to the physical page:
[   31.208092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a59
[   31.208150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.208201] page_type: f5(slab)
[   31.208240] raw: 0bfffe0000000000 fff00000c56a1a00 dead000000000122 0000000000000000
[   31.208291] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.208333] page dumped because: kasan: bad access detected
[   31.208366] 
[   31.208383] Memory state around the buggy address:
[   31.208415]  fff00000c9a58f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.208461]  fff00000c9a58f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.208522] >fff00000c9a59000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.208563]                    ^
[   31.208589]  fff00000c9a59080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.208632]  fff00000c9a59100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.209405] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   31.175738] ==================================================================
[   31.176052] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.176203] Free of addr fff00000c9a5a000 by task kunit_try_catch/240
[   31.176282] 
[   31.176400] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   31.176521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.176705] Hardware name: linux,dummy-virt (DT)
[   31.176751] Call trace:
[   31.176775]  show_stack+0x20/0x38 (C)
[   31.176848]  dump_stack_lvl+0x8c/0xd0
[   31.176902]  print_report+0x118/0x5d0
[   31.176946]  kasan_report_invalid_free+0xc0/0xe8
[   31.176995]  check_slab_allocation+0xd4/0x108
[   31.177102]  __kasan_slab_pre_free+0x2c/0x48
[   31.177321]  kmem_cache_free+0xf0/0x468
[   31.177433]  kmem_cache_double_free+0x190/0x3c8
[   31.177577]  kunit_try_run_case+0x170/0x3f0
[   31.177698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.177844]  kthread+0x328/0x630
[   31.177921]  ret_from_fork+0x10/0x20
[   31.177990] 
[   31.178014] Allocated by task 240:
[   31.178043]  kasan_save_stack+0x3c/0x68
[   31.178083]  kasan_save_track+0x20/0x40
[   31.178129]  kasan_save_alloc_info+0x40/0x58
[   31.178178]  __kasan_slab_alloc+0xa8/0xb0
[   31.178227]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.178271]  kmem_cache_double_free+0x12c/0x3c8
[   31.178312]  kunit_try_run_case+0x170/0x3f0
[   31.178363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.178424]  kthread+0x328/0x630
[   31.178463]  ret_from_fork+0x10/0x20
[   31.178500] 
[   31.178538] Freed by task 240:
[   31.178565]  kasan_save_stack+0x3c/0x68
[   31.178610]  kasan_save_track+0x20/0x40
[   31.178644]  kasan_save_free_info+0x4c/0x78
[   31.178691]  __kasan_slab_free+0x6c/0x98
[   31.178735]  kmem_cache_free+0x260/0x468
[   31.178783]  kmem_cache_double_free+0x140/0x3c8
[   31.178831]  kunit_try_run_case+0x170/0x3f0
[   31.178868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.178920]  kthread+0x328/0x630
[   31.178953]  ret_from_fork+0x10/0x20
[   31.178997] 
[   31.179016] The buggy address belongs to the object at fff00000c9a5a000
[   31.179016]  which belongs to the cache test_cache of size 200
[   31.179075] The buggy address is located 0 bytes inside of
[   31.179075]  200-byte region [fff00000c9a5a000, fff00000c9a5a0c8)
[   31.179135] 
[   31.179157] The buggy address belongs to the physical page:
[   31.179190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5a
[   31.179248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.179303] page_type: f5(slab)
[   31.179356] raw: 0bfffe0000000000 fff00000c56a18c0 dead000000000122 0000000000000000
[   31.179408] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.179459] page dumped because: kasan: bad access detected
[   31.179491] 
[   31.179519] Memory state around the buggy address:
[   31.179554]  fff00000c9a59f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.179599]  fff00000c9a59f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.179845] >fff00000c9a5a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.180172]                    ^
[   31.180207]  fff00000c9a5a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.180254]  fff00000c9a5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.180556] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   31.034130] ==================================================================
[   31.034343] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   31.034562] Read of size 1 at addr fff00000c9a5d0c8 by task kunit_try_catch/238
[   31.034627] 
[   31.034658] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   31.034784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.034811] Hardware name: linux,dummy-virt (DT)
[   31.034844] Call trace:
[   31.034885]  show_stack+0x20/0x38 (C)
[   31.034950]  dump_stack_lvl+0x8c/0xd0
[   31.035058]  print_report+0x118/0x5d0
[   31.035123]  kasan_report+0xdc/0x128
[   31.035200]  __asan_report_load1_noabort+0x20/0x30
[   31.035251]  kmem_cache_oob+0x344/0x430
[   31.035296]  kunit_try_run_case+0x170/0x3f0
[   31.035374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.035525]  kthread+0x328/0x630
[   31.035570]  ret_from_fork+0x10/0x20
[   31.035978] 
[   31.036011] Allocated by task 238:
[   31.036291]  kasan_save_stack+0x3c/0x68
[   31.036378]  kasan_save_track+0x20/0x40
[   31.036488]  kasan_save_alloc_info+0x40/0x58
[   31.036589]  __kasan_slab_alloc+0xa8/0xb0
[   31.036681]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.036782]  kmem_cache_oob+0x12c/0x430
[   31.036923]  kunit_try_run_case+0x170/0x3f0
[   31.036979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.037022]  kthread+0x328/0x630
[   31.037076]  ret_from_fork+0x10/0x20
[   31.037114] 
[   31.037133] The buggy address belongs to the object at fff00000c9a5d000
[   31.037133]  which belongs to the cache test_cache of size 200
[   31.037193] The buggy address is located 0 bytes to the right of
[   31.037193]  allocated 200-byte region [fff00000c9a5d000, fff00000c9a5d0c8)
[   31.037479] 
[   31.037566] The buggy address belongs to the physical page:
[   31.037665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5d
[   31.037796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.037861] page_type: f5(slab)
[   31.037898] raw: 0bfffe0000000000 fff00000c56a1780 dead000000000122 0000000000000000
[   31.037972] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.038028] page dumped because: kasan: bad access detected
[   31.038263] 
[   31.038306] Memory state around the buggy address:
[   31.038422]  fff00000c9a5cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.038529]  fff00000c9a5d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.038573] >fff00000c9a5d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.038612]                                               ^
[   31.038758]  fff00000c9a5d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.038892]  fff00000c9a5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.038971] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   31.013428] ==================================================================
[   31.013489] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   31.013601] Read of size 8 at addr fff00000c9a5f000 by task kunit_try_catch/231
[   31.013654] 
[   31.013748] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   31.013837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.013864] Hardware name: linux,dummy-virt (DT)
[   31.013897] Call trace:
[   31.013972]  show_stack+0x20/0x38 (C)
[   31.014048]  dump_stack_lvl+0x8c/0xd0
[   31.014129]  print_report+0x118/0x5d0
[   31.014181]  kasan_report+0xdc/0x128
[   31.014224]  __asan_report_load8_noabort+0x20/0x30
[   31.014274]  workqueue_uaf+0x480/0x4a8
[   31.014325]  kunit_try_run_case+0x170/0x3f0
[   31.014477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.014543]  kthread+0x328/0x630
[   31.014585]  ret_from_fork+0x10/0x20
[   31.014642] 
[   31.014704] Allocated by task 231:
[   31.014763]  kasan_save_stack+0x3c/0x68
[   31.014803]  kasan_save_track+0x20/0x40
[   31.014866]  kasan_save_alloc_info+0x40/0x58
[   31.014912]  __kasan_kmalloc+0xd4/0xd8
[   31.014958]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.015033]  workqueue_uaf+0x13c/0x4a8
[   31.015109]  kunit_try_run_case+0x170/0x3f0
[   31.015164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.015250]  kthread+0x328/0x630
[   31.015308]  ret_from_fork+0x10/0x20
[   31.015344] 
[   31.015362] Freed by task 75:
[   31.015459]  kasan_save_stack+0x3c/0x68
[   31.015531]  kasan_save_track+0x20/0x40
[   31.015566]  kasan_save_free_info+0x4c/0x78
[   31.015604]  __kasan_slab_free+0x6c/0x98
[   31.015653]  kfree+0x214/0x3c8
[   31.015697]  workqueue_uaf_work+0x18/0x30
[   31.015734]  process_one_work+0x530/0xf98
[   31.015782]  worker_thread+0x618/0xf38
[   31.015837]  kthread+0x328/0x630
[   31.015872]  ret_from_fork+0x10/0x20
[   31.015908] 
[   31.015926] Last potentially related work creation:
[   31.016127]  kasan_save_stack+0x3c/0x68
[   31.016267]  kasan_record_aux_stack+0xb4/0xc8
[   31.016331]  __queue_work+0x65c/0xfe0
[   31.016492]  queue_work_on+0xbc/0xf8
[   31.016626]  workqueue_uaf+0x210/0x4a8
[   31.016712]  kunit_try_run_case+0x170/0x3f0
[   31.016770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.016950]  kthread+0x328/0x630
[   31.016983]  ret_from_fork+0x10/0x20
[   31.017019] 
[   31.017037] The buggy address belongs to the object at fff00000c9a5f000
[   31.017037]  which belongs to the cache kmalloc-32 of size 32
[   31.017098] The buggy address is located 0 bytes inside of
[   31.017098]  freed 32-byte region [fff00000c9a5f000, fff00000c9a5f020)
[   31.017176] 
[   31.017196] The buggy address belongs to the physical page:
[   31.017228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5f
[   31.017280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.017330] page_type: f5(slab)
[   31.017368] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.017476] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.017655] page dumped because: kasan: bad access detected
[   31.017732] 
[   31.017920] Memory state around the buggy address:
[   31.018031]  fff00000c9a5ef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.018140]  fff00000c9a5ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.018258] >fff00000c9a5f000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.018370]                    ^
[   31.018397]  fff00000c9a5f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.018450]  fff00000c9a5f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.018498] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   30.982008] ==================================================================
[   30.982662] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   30.982757] Read of size 4 at addr fff00000c9b16e80 by task ksoftirqd/0/15
[   30.982807] 
[   30.982846] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.982934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.983322] Hardware name: linux,dummy-virt (DT)
[   30.983371] Call trace:
[   30.983409]  show_stack+0x20/0x38 (C)
[   30.983831]  dump_stack_lvl+0x8c/0xd0
[   30.984038]  print_report+0x118/0x5d0
[   30.984095]  kasan_report+0xdc/0x128
[   30.984171]  __asan_report_load4_noabort+0x20/0x30
[   30.984300]  rcu_uaf_reclaim+0x64/0x70
[   30.984346]  rcu_core+0x9f4/0x1e20
[   30.984871]  rcu_core_si+0x18/0x30
[   30.984980]  handle_softirqs+0x374/0xb28
[   30.985029]  run_ksoftirqd+0x80/0xb0
[   30.985074]  smpboot_thread_fn+0x2e8/0x760
[   30.985550]  kthread+0x328/0x630
[   30.985615]  ret_from_fork+0x10/0x20
[   30.985663] 
[   30.985855] Allocated by task 229:
[   30.986138]  kasan_save_stack+0x3c/0x68
[   30.986200]  kasan_save_track+0x20/0x40
[   30.986469]  kasan_save_alloc_info+0x40/0x58
[   30.986714]  __kasan_kmalloc+0xd4/0xd8
[   30.986756]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.986799]  rcu_uaf+0xb0/0x2d8
[   30.986835]  kunit_try_run_case+0x170/0x3f0
[   30.986875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.986919]  kthread+0x328/0x630
[   30.987134]  ret_from_fork+0x10/0x20
[   30.987181] 
[   30.987214] Freed by task 15:
[   30.987242]  kasan_save_stack+0x3c/0x68
[   30.987802]  kasan_save_track+0x20/0x40
[   30.988054]  kasan_save_free_info+0x4c/0x78
[   30.988097]  __kasan_slab_free+0x6c/0x98
[   30.988611]  kfree+0x214/0x3c8
[   30.988650]  rcu_uaf_reclaim+0x28/0x70
[   30.988953]  rcu_core+0x9f4/0x1e20
[   30.989007]  rcu_core_si+0x18/0x30
[   30.989043]  handle_softirqs+0x374/0xb28
[   30.989083]  run_ksoftirqd+0x80/0xb0
[   30.989120]  smpboot_thread_fn+0x2e8/0x760
[   30.989161]  kthread+0x328/0x630
[   30.989196]  ret_from_fork+0x10/0x20
[   30.989244] 
[   30.989291] Last potentially related work creation:
[   30.989328]  kasan_save_stack+0x3c/0x68
[   30.989367]  kasan_record_aux_stack+0xb4/0xc8
[   30.989407]  __call_rcu_common.constprop.0+0x74/0x8c8
[   30.989450]  call_rcu+0x18/0x30
[   30.989486]  rcu_uaf+0x14c/0x2d8
[   30.989535]  kunit_try_run_case+0x170/0x3f0
[   30.989626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.989736]  kthread+0x328/0x630
[   30.989784]  ret_from_fork+0x10/0x20
[   30.990195] 
[   30.990730] The buggy address belongs to the object at fff00000c9b16e80
[   30.990730]  which belongs to the cache kmalloc-32 of size 32
[   30.991294] The buggy address is located 0 bytes inside of
[   30.991294]  freed 32-byte region [fff00000c9b16e80, fff00000c9b16ea0)
[   30.991959] 
[   30.992132] The buggy address belongs to the physical page:
[   30.992168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b16
[   30.992226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.992711] page_type: f5(slab)
[   30.992782] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   30.993539] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   30.993901] page dumped because: kasan: bad access detected
[   30.994189] 
[   30.994213] Memory state around the buggy address:
[   30.994686]  fff00000c9b16d80: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   30.995022]  fff00000c9b16e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   30.995410] >fff00000c9b16e80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   30.995896]                    ^
[   30.996054]  fff00000c9b16f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.996194]  fff00000c9b16f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.996946] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   30.827164] ==================================================================
[   30.827222] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   30.827274] Read of size 1 at addr fff00000c6361f00 by task kunit_try_catch/227
[   30.827325] 
[   30.827364] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.827464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.827493] Hardware name: linux,dummy-virt (DT)
[   30.827910] Call trace:
[   30.828251]  show_stack+0x20/0x38 (C)
[   30.828308]  dump_stack_lvl+0x8c/0xd0
[   30.828376]  print_report+0x118/0x5d0
[   30.828579]  kasan_report+0xdc/0x128
[   30.828686]  __kasan_check_byte+0x54/0x70
[   30.828791]  ksize+0x30/0x88
[   30.828875]  ksize_uaf+0x168/0x5f8
[   30.829098]  kunit_try_run_case+0x170/0x3f0
[   30.829236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.829360]  kthread+0x328/0x630
[   30.829500]  ret_from_fork+0x10/0x20
[   30.829696] 
[   30.829787] Allocated by task 227:
[   30.829911]  kasan_save_stack+0x3c/0x68
[   30.830000]  kasan_save_track+0x20/0x40
[   30.830146]  kasan_save_alloc_info+0x40/0x58
[   30.830212]  __kasan_kmalloc+0xd4/0xd8
[   30.830360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.830607]  ksize_uaf+0xb8/0x5f8
[   30.830687]  kunit_try_run_case+0x170/0x3f0
[   30.830823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.830901]  kthread+0x328/0x630
[   30.830933]  ret_from_fork+0x10/0x20
[   30.831119] 
[   30.831204] Freed by task 227:
[   30.831466]  kasan_save_stack+0x3c/0x68
[   30.831523]  kasan_save_track+0x20/0x40
[   30.831721]  kasan_save_free_info+0x4c/0x78
[   30.831925]  __kasan_slab_free+0x6c/0x98
[   30.832063]  kfree+0x214/0x3c8
[   30.832252]  ksize_uaf+0x11c/0x5f8
[   30.832387]  kunit_try_run_case+0x170/0x3f0
[   30.832548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.832689]  kthread+0x328/0x630
[   30.832786]  ret_from_fork+0x10/0x20
[   30.832888] 
[   30.832940] The buggy address belongs to the object at fff00000c6361f00
[   30.832940]  which belongs to the cache kmalloc-128 of size 128
[   30.833050] The buggy address is located 0 bytes inside of
[   30.833050]  freed 128-byte region [fff00000c6361f00, fff00000c6361f80)
[   30.833501] 
[   30.833588] The buggy address belongs to the physical page:
[   30.833629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.833876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.833985] page_type: f5(slab)
[   30.834043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.834169] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.834417] page dumped because: kasan: bad access detected
[   30.834622] 
[   30.834835] Memory state around the buggy address:
[   30.834942]  fff00000c6361e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.835035]  fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.835269] >fff00000c6361f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.835409]                    ^
[   30.835540]  fff00000c6361f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.835621]  fff00000c6362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.835806] ==================================================================
[   30.836982] ==================================================================
[   30.837034] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   30.837083] Read of size 1 at addr fff00000c6361f00 by task kunit_try_catch/227
[   30.837334] 
[   30.837448] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.837718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.837883] Hardware name: linux,dummy-virt (DT)
[   30.837949] Call trace:
[   30.838016]  show_stack+0x20/0x38 (C)
[   30.838068]  dump_stack_lvl+0x8c/0xd0
[   30.838143]  print_report+0x118/0x5d0
[   30.838193]  kasan_report+0xdc/0x128
[   30.838237]  __asan_report_load1_noabort+0x20/0x30
[   30.838568]  ksize_uaf+0x598/0x5f8
[   30.838677]  kunit_try_run_case+0x170/0x3f0
[   30.838732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.838815]  kthread+0x328/0x630
[   30.838861]  ret_from_fork+0x10/0x20
[   30.838945] 
[   30.839124] Allocated by task 227:
[   30.839220]  kasan_save_stack+0x3c/0x68
[   30.839384]  kasan_save_track+0x20/0x40
[   30.839426]  kasan_save_alloc_info+0x40/0x58
[   30.839698]  __kasan_kmalloc+0xd4/0xd8
[   30.839813]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.839904]  ksize_uaf+0xb8/0x5f8
[   30.840027]  kunit_try_run_case+0x170/0x3f0
[   30.840085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.840131]  kthread+0x328/0x630
[   30.840184]  ret_from_fork+0x10/0x20
[   30.840222] 
[   30.840383] Freed by task 227:
[   30.840530]  kasan_save_stack+0x3c/0x68
[   30.840679]  kasan_save_track+0x20/0x40
[   30.840793]  kasan_save_free_info+0x4c/0x78
[   30.840863]  __kasan_slab_free+0x6c/0x98
[   30.840901]  kfree+0x214/0x3c8
[   30.840936]  ksize_uaf+0x11c/0x5f8
[   30.840984]  kunit_try_run_case+0x170/0x3f0
[   30.841032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.841077]  kthread+0x328/0x630
[   30.841110]  ret_from_fork+0x10/0x20
[   30.841147] 
[   30.841166] The buggy address belongs to the object at fff00000c6361f00
[   30.841166]  which belongs to the cache kmalloc-128 of size 128
[   30.841250] The buggy address is located 0 bytes inside of
[   30.841250]  freed 128-byte region [fff00000c6361f00, fff00000c6361f80)
[   30.841325] 
[   30.841356] The buggy address belongs to the physical page:
[   30.841388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.841448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.841497] page_type: f5(slab)
[   30.841554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.841615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.841662] page dumped because: kasan: bad access detected
[   30.841694] 
[   30.841711] Memory state around the buggy address:
[   30.841755]  fff00000c6361e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.841818]  fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.841872] >fff00000c6361f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.841919]                    ^
[   30.841953]  fff00000c6361f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.842012]  fff00000c6362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.842051] ==================================================================
[   30.842923] ==================================================================
[   30.842984] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   30.843041] Read of size 1 at addr fff00000c6361f78 by task kunit_try_catch/227
[   30.843215] 
[   30.843336] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.843467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.843525] Hardware name: linux,dummy-virt (DT)
[   30.843719] Call trace:
[   30.843767]  show_stack+0x20/0x38 (C)
[   30.843920]  dump_stack_lvl+0x8c/0xd0
[   30.844097]  print_report+0x118/0x5d0
[   30.844215]  kasan_report+0xdc/0x128
[   30.844345]  __asan_report_load1_noabort+0x20/0x30
[   30.844455]  ksize_uaf+0x544/0x5f8
[   30.844536]  kunit_try_run_case+0x170/0x3f0
[   30.844714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.844897]  kthread+0x328/0x630
[   30.844959]  ret_from_fork+0x10/0x20
[   30.845185] 
[   30.845272] Allocated by task 227:
[   30.845438]  kasan_save_stack+0x3c/0x68
[   30.845530]  kasan_save_track+0x20/0x40
[   30.845603]  kasan_save_alloc_info+0x40/0x58
[   30.845741]  __kasan_kmalloc+0xd4/0xd8
[   30.845787]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.845961]  ksize_uaf+0xb8/0x5f8
[   30.846111]  kunit_try_run_case+0x170/0x3f0
[   30.846244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.846324]  kthread+0x328/0x630
[   30.846490]  ret_from_fork+0x10/0x20
[   30.846660] 
[   30.846739] Freed by task 227:
[   30.846976]  kasan_save_stack+0x3c/0x68
[   30.847060]  kasan_save_track+0x20/0x40
[   30.847217]  kasan_save_free_info+0x4c/0x78
[   30.847372]  __kasan_slab_free+0x6c/0x98
[   30.847462]  kfree+0x214/0x3c8
[   30.847619]  ksize_uaf+0x11c/0x5f8
[   30.847720]  kunit_try_run_case+0x170/0x3f0
[   30.847862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.847909]  kthread+0x328/0x630
[   30.848134]  ret_from_fork+0x10/0x20
[   30.848307] 
[   30.848340] The buggy address belongs to the object at fff00000c6361f00
[   30.848340]  which belongs to the cache kmalloc-128 of size 128
[   30.848501] The buggy address is located 120 bytes inside of
[   30.848501]  freed 128-byte region [fff00000c6361f00, fff00000c6361f80)
[   30.848726] 
[   30.848859] The buggy address belongs to the physical page:
[   30.848950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.849015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.849188] page_type: f5(slab)
[   30.849262] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.849373] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.849440] page dumped because: kasan: bad access detected
[   30.849609] 
[   30.849834] Memory state around the buggy address:
[   30.849922]  fff00000c6361e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.850102]  fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.850185] >fff00000c6361f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.850297]                                                                 ^
[   30.850400]  fff00000c6361f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.850502]  fff00000c6362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.850553] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   30.801420] ==================================================================
[   30.801484] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.801733] Read of size 1 at addr fff00000c6361e73 by task kunit_try_catch/225
[   30.801827] 
[   30.801940] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.802030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.802058] Hardware name: linux,dummy-virt (DT)
[   30.802160] Call trace:
[   30.802185]  show_stack+0x20/0x38 (C)
[   30.802252]  dump_stack_lvl+0x8c/0xd0
[   30.802360]  print_report+0x118/0x5d0
[   30.802409]  kasan_report+0xdc/0x128
[   30.802590]  __asan_report_load1_noabort+0x20/0x30
[   30.802826]  ksize_unpoisons_memory+0x628/0x740
[   30.802895]  kunit_try_run_case+0x170/0x3f0
[   30.802963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.803083]  kthread+0x328/0x630
[   30.803130]  ret_from_fork+0x10/0x20
[   30.803187] 
[   30.803206] Allocated by task 225:
[   30.803386]  kasan_save_stack+0x3c/0x68
[   30.803438]  kasan_save_track+0x20/0x40
[   30.803595]  kasan_save_alloc_info+0x40/0x58
[   30.803704]  __kasan_kmalloc+0xd4/0xd8
[   30.803769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.803851]  ksize_unpoisons_memory+0xc0/0x740
[   30.803894]  kunit_try_run_case+0x170/0x3f0
[   30.804040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.804137]  kthread+0x328/0x630
[   30.804301]  ret_from_fork+0x10/0x20
[   30.804339] 
[   30.804359] The buggy address belongs to the object at fff00000c6361e00
[   30.804359]  which belongs to the cache kmalloc-128 of size 128
[   30.804438] The buggy address is located 0 bytes to the right of
[   30.804438]  allocated 115-byte region [fff00000c6361e00, fff00000c6361e73)
[   30.804668] 
[   30.804864] The buggy address belongs to the physical page:
[   30.804920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.805083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.805264] page_type: f5(slab)
[   30.805382] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.805447] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.805553] page dumped because: kasan: bad access detected
[   30.805587] 
[   30.805629] Memory state around the buggy address:
[   30.805874]  fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.805968]  fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.806105] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.806288]                                                              ^
[   30.806389]  fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.806619]  fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.806690] ==================================================================
[   30.807758] ==================================================================
[   30.808054] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.808279] Read of size 1 at addr fff00000c6361e78 by task kunit_try_catch/225
[   30.808436] 
[   30.808514] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.808688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.808767] Hardware name: linux,dummy-virt (DT)
[   30.808887] Call trace:
[   30.808988]  show_stack+0x20/0x38 (C)
[   30.809067]  dump_stack_lvl+0x8c/0xd0
[   30.809245]  print_report+0x118/0x5d0
[   30.809395]  kasan_report+0xdc/0x128
[   30.809593]  __asan_report_load1_noabort+0x20/0x30
[   30.809757]  ksize_unpoisons_memory+0x618/0x740
[   30.809947]  kunit_try_run_case+0x170/0x3f0
[   30.810020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.810073]  kthread+0x328/0x630
[   30.810277]  ret_from_fork+0x10/0x20
[   30.810420] 
[   30.810565] Allocated by task 225:
[   30.810635]  kasan_save_stack+0x3c/0x68
[   30.810806]  kasan_save_track+0x20/0x40
[   30.810848]  kasan_save_alloc_info+0x40/0x58
[   30.810952]  __kasan_kmalloc+0xd4/0xd8
[   30.810994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.811035]  ksize_unpoisons_memory+0xc0/0x740
[   30.811076]  kunit_try_run_case+0x170/0x3f0
[   30.811124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.811178]  kthread+0x328/0x630
[   30.811224]  ret_from_fork+0x10/0x20
[   30.811261] 
[   30.811296] The buggy address belongs to the object at fff00000c6361e00
[   30.811296]  which belongs to the cache kmalloc-128 of size 128
[   30.811356] The buggy address is located 5 bytes to the right of
[   30.811356]  allocated 115-byte region [fff00000c6361e00, fff00000c6361e73)
[   30.811438] 
[   30.811457] The buggy address belongs to the physical page:
[   30.811489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.811768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.811859] page_type: f5(slab)
[   30.812058] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.812240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.812331] page dumped because: kasan: bad access detected
[   30.812528] 
[   30.812601] Memory state around the buggy address:
[   30.812635]  fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.812796]  fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.813108] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.813229]                                                                 ^
[   30.813318]  fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.813481]  fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.813611] ==================================================================
[   30.815074] ==================================================================
[   30.815172] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   30.815346] Read of size 1 at addr fff00000c6361e7f by task kunit_try_catch/225
[   30.815440] 
[   30.815551] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.815641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.815895] Hardware name: linux,dummy-virt (DT)
[   30.816067] Call trace:
[   30.816137]  show_stack+0x20/0x38 (C)
[   30.816297]  dump_stack_lvl+0x8c/0xd0
[   30.816388]  print_report+0x118/0x5d0
[   30.816465]  kasan_report+0xdc/0x128
[   30.816639]  __asan_report_load1_noabort+0x20/0x30
[   30.816693]  ksize_unpoisons_memory+0x690/0x740
[   30.816924]  kunit_try_run_case+0x170/0x3f0
[   30.817123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.817265]  kthread+0x328/0x630
[   30.817364]  ret_from_fork+0x10/0x20
[   30.817589] 
[   30.817649] Allocated by task 225:
[   30.817739]  kasan_save_stack+0x3c/0x68
[   30.817796]  kasan_save_track+0x20/0x40
[   30.817850]  kasan_save_alloc_info+0x40/0x58
[   30.817895]  __kasan_kmalloc+0xd4/0xd8
[   30.817942]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.817991]  ksize_unpoisons_memory+0xc0/0x740
[   30.818032]  kunit_try_run_case+0x170/0x3f0
[   30.818069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.818115]  kthread+0x328/0x630
[   30.818148]  ret_from_fork+0x10/0x20
[   30.818184] 
[   30.818203] The buggy address belongs to the object at fff00000c6361e00
[   30.818203]  which belongs to the cache kmalloc-128 of size 128
[   30.818276] The buggy address is located 12 bytes to the right of
[   30.818276]  allocated 115-byte region [fff00000c6361e00, fff00000c6361e73)
[   30.818345] 
[   30.818371] The buggy address belongs to the physical page:
[   30.818422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.818478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.818747] page_type: f5(slab)
[   30.818844] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.819062] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.819203] page dumped because: kasan: bad access detected
[   30.819285] 
[   30.819366] Memory state around the buggy address:
[   30.819561]  fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.819632]  fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.819964] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.820157]                                                                 ^
[   30.820310]  fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.820379]  fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.820468] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   30.789364] ==================================================================
[   30.789440] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   30.789632] Free of addr fff00000c6360300 by task kunit_try_catch/223
[   30.789740] 
[   30.789801] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.789953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.790011] Hardware name: linux,dummy-virt (DT)
[   30.790057] Call trace:
[   30.790081]  show_stack+0x20/0x38 (C)
[   30.790271]  dump_stack_lvl+0x8c/0xd0
[   30.790560]  print_report+0x118/0x5d0
[   30.790634]  kasan_report_invalid_free+0xc0/0xe8
[   30.790685]  check_slab_allocation+0xd4/0x108
[   30.790875]  __kasan_slab_pre_free+0x2c/0x48
[   30.791012]  kfree+0xe8/0x3c8
[   30.791090]  kfree_sensitive+0x3c/0xb0
[   30.791142]  kmalloc_double_kzfree+0x168/0x308
[   30.791248]  kunit_try_run_case+0x170/0x3f0
[   30.791328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.791539]  kthread+0x328/0x630
[   30.791592]  ret_from_fork+0x10/0x20
[   30.791646] 
[   30.791665] Allocated by task 223:
[   30.791770]  kasan_save_stack+0x3c/0x68
[   30.791907]  kasan_save_track+0x20/0x40
[   30.792031]  kasan_save_alloc_info+0x40/0x58
[   30.792071]  __kasan_kmalloc+0xd4/0xd8
[   30.792290]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.792419]  kmalloc_double_kzfree+0xb8/0x308
[   30.792491]  kunit_try_run_case+0x170/0x3f0
[   30.792662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.792722]  kthread+0x328/0x630
[   30.792860]  ret_from_fork+0x10/0x20
[   30.792986] 
[   30.793018] Freed by task 223:
[   30.793047]  kasan_save_stack+0x3c/0x68
[   30.793090]  kasan_save_track+0x20/0x40
[   30.793130]  kasan_save_free_info+0x4c/0x78
[   30.793169]  __kasan_slab_free+0x6c/0x98
[   30.793206]  kfree+0x214/0x3c8
[   30.793241]  kfree_sensitive+0x80/0xb0
[   30.793283]  kmalloc_double_kzfree+0x11c/0x308
[   30.793338]  kunit_try_run_case+0x170/0x3f0
[   30.793383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.793427]  kthread+0x328/0x630
[   30.793469]  ret_from_fork+0x10/0x20
[   30.793517] 
[   30.793538] The buggy address belongs to the object at fff00000c6360300
[   30.793538]  which belongs to the cache kmalloc-16 of size 16
[   30.793598] The buggy address is located 0 bytes inside of
[   30.793598]  16-byte region [fff00000c6360300, fff00000c6360310)
[   30.793659] 
[   30.793679] The buggy address belongs to the physical page:
[   30.793719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360
[   30.793771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.793821] page_type: f5(slab)
[   30.793869] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.793920] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.793962] page dumped because: kasan: bad access detected
[   30.794004] 
[   30.794024] Memory state around the buggy address:
[   30.794066]  fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.794113]  fff00000c6360280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.794164] >fff00000c6360300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.794204]                    ^
[   30.794232]  fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.794281]  fff00000c6360400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.794326] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   30.781860] ==================================================================
[   30.782016] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.782080] Read of size 1 at addr fff00000c6360300 by task kunit_try_catch/223
[   30.782140] 
[   30.782394] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.782534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.782601] Hardware name: linux,dummy-virt (DT)
[   30.782636] Call trace:
[   30.782712]  show_stack+0x20/0x38 (C)
[   30.782870]  dump_stack_lvl+0x8c/0xd0
[   30.782938]  print_report+0x118/0x5d0
[   30.782984]  kasan_report+0xdc/0x128
[   30.783027]  __kasan_check_byte+0x54/0x70
[   30.783109]  kfree_sensitive+0x30/0xb0
[   30.783162]  kmalloc_double_kzfree+0x168/0x308
[   30.783308]  kunit_try_run_case+0x170/0x3f0
[   30.783363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.783417]  kthread+0x328/0x630
[   30.783470]  ret_from_fork+0x10/0x20
[   30.783529] 
[   30.783761] Allocated by task 223:
[   30.784002]  kasan_save_stack+0x3c/0x68
[   30.784139]  kasan_save_track+0x20/0x40
[   30.784274]  kasan_save_alloc_info+0x40/0x58
[   30.784437]  __kasan_kmalloc+0xd4/0xd8
[   30.784529]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.784663]  kmalloc_double_kzfree+0xb8/0x308
[   30.784703]  kunit_try_run_case+0x170/0x3f0
[   30.784749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.784813]  kthread+0x328/0x630
[   30.784848]  ret_from_fork+0x10/0x20
[   30.784883] 
[   30.785033] Freed by task 223:
[   30.785156]  kasan_save_stack+0x3c/0x68
[   30.785297]  kasan_save_track+0x20/0x40
[   30.785409]  kasan_save_free_info+0x4c/0x78
[   30.785498]  __kasan_slab_free+0x6c/0x98
[   30.785616]  kfree+0x214/0x3c8
[   30.785650]  kfree_sensitive+0x80/0xb0
[   30.785814]  kmalloc_double_kzfree+0x11c/0x308
[   30.785998]  kunit_try_run_case+0x170/0x3f0
[   30.786167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.786263]  kthread+0x328/0x630
[   30.786300]  ret_from_fork+0x10/0x20
[   30.786552] 
[   30.786734] The buggy address belongs to the object at fff00000c6360300
[   30.786734]  which belongs to the cache kmalloc-16 of size 16
[   30.786998] The buggy address is located 0 bytes inside of
[   30.786998]  freed 16-byte region [fff00000c6360300, fff00000c6360310)
[   30.787180] 
[   30.787260] The buggy address belongs to the physical page:
[   30.787293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360
[   30.787378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.787428] page_type: f5(slab)
[   30.787475] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.787537] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.787580] page dumped because: kasan: bad access detected
[   30.787624] 
[   30.787641] Memory state around the buggy address:
[   30.787674]  fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.787723]  fff00000c6360280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.787767] >fff00000c6360300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.787992]                    ^
[   30.788025]  fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.788145]  fff00000c6360400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.788421] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   30.760670] ==================================================================
[   30.760884] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   30.761051] Read of size 1 at addr fff00000c637afa8 by task kunit_try_catch/219
[   30.761127] 
[   30.761230] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.761331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.761358] Hardware name: linux,dummy-virt (DT)
[   30.761392] Call trace:
[   30.761450]  show_stack+0x20/0x38 (C)
[   30.761660]  dump_stack_lvl+0x8c/0xd0
[   30.761780]  print_report+0x118/0x5d0
[   30.761865]  kasan_report+0xdc/0x128
[   30.761956]  __asan_report_load1_noabort+0x20/0x30
[   30.762010]  kmalloc_uaf2+0x3f4/0x468
[   30.762056]  kunit_try_run_case+0x170/0x3f0
[   30.762110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.762244]  kthread+0x328/0x630
[   30.762319]  ret_from_fork+0x10/0x20
[   30.762462] 
[   30.762482] Allocated by task 219:
[   30.762523]  kasan_save_stack+0x3c/0x68
[   30.762726]  kasan_save_track+0x20/0x40
[   30.762885]  kasan_save_alloc_info+0x40/0x58
[   30.762951]  __kasan_kmalloc+0xd4/0xd8
[   30.763091]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.763185]  kmalloc_uaf2+0xc4/0x468
[   30.763229]  kunit_try_run_case+0x170/0x3f0
[   30.763310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.763356]  kthread+0x328/0x630
[   30.763390]  ret_from_fork+0x10/0x20
[   30.763426] 
[   30.763455] Freed by task 219:
[   30.763625]  kasan_save_stack+0x3c/0x68
[   30.763733]  kasan_save_track+0x20/0x40
[   30.763795]  kasan_save_free_info+0x4c/0x78
[   30.763926]  __kasan_slab_free+0x6c/0x98
[   30.764144]  kfree+0x214/0x3c8
[   30.764231]  kmalloc_uaf2+0x134/0x468
[   30.764362]  kunit_try_run_case+0x170/0x3f0
[   30.764436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.764487]  kthread+0x328/0x630
[   30.764649]  ret_from_fork+0x10/0x20
[   30.764761] 
[   30.764936] The buggy address belongs to the object at fff00000c637af80
[   30.764936]  which belongs to the cache kmalloc-64 of size 64
[   30.765082] The buggy address is located 40 bytes inside of
[   30.765082]  freed 64-byte region [fff00000c637af80, fff00000c637afc0)
[   30.765348] 
[   30.765560] The buggy address belongs to the physical page:
[   30.765672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   30.765818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.765976] page_type: f5(slab)
[   30.766073] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.766285] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   30.766429] page dumped because: kasan: bad access detected
[   30.766592] 
[   30.766634] Memory state around the buggy address:
[   30.766780]  fff00000c637ae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.766876]  fff00000c637af00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.767011] >fff00000c637af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.767108]                                   ^
[   30.767231]  fff00000c637b000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   30.767276]  fff00000c637b080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   30.767349] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   30.746117] ==================================================================
[   30.746540] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   30.746613] Write of size 33 at addr fff00000c637ad80 by task kunit_try_catch/217
[   30.746668] 
[   30.746803] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.746897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.746930] Hardware name: linux,dummy-virt (DT)
[   30.746996] Call trace:
[   30.747029]  show_stack+0x20/0x38 (C)
[   30.747081]  dump_stack_lvl+0x8c/0xd0
[   30.747127]  print_report+0x118/0x5d0
[   30.747171]  kasan_report+0xdc/0x128
[   30.747213]  kasan_check_range+0x100/0x1a8
[   30.747260]  __asan_memset+0x34/0x78
[   30.747304]  kmalloc_uaf_memset+0x170/0x310
[   30.747351]  kunit_try_run_case+0x170/0x3f0
[   30.747399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.747453]  kthread+0x328/0x630
[   30.747495]  ret_from_fork+0x10/0x20
[   30.747554] 
[   30.747574] Allocated by task 217:
[   30.747601]  kasan_save_stack+0x3c/0x68
[   30.747650]  kasan_save_track+0x20/0x40
[   30.747686]  kasan_save_alloc_info+0x40/0x58
[   30.747725]  __kasan_kmalloc+0xd4/0xd8
[   30.747764]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.748146]  kmalloc_uaf_memset+0xb8/0x310
[   30.748480]  kunit_try_run_case+0x170/0x3f0
[   30.748659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.748727]  kthread+0x328/0x630
[   30.748863]  ret_from_fork+0x10/0x20
[   30.749063] 
[   30.749153] Freed by task 217:
[   30.749321]  kasan_save_stack+0x3c/0x68
[   30.749475]  kasan_save_track+0x20/0x40
[   30.749614]  kasan_save_free_info+0x4c/0x78
[   30.749768]  __kasan_slab_free+0x6c/0x98
[   30.749864]  kfree+0x214/0x3c8
[   30.750186]  kmalloc_uaf_memset+0x11c/0x310
[   30.750239]  kunit_try_run_case+0x170/0x3f0
[   30.750417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.750530]  kthread+0x328/0x630
[   30.750689]  ret_from_fork+0x10/0x20
[   30.750771] 
[   30.750793] The buggy address belongs to the object at fff00000c637ad80
[   30.750793]  which belongs to the cache kmalloc-64 of size 64
[   30.751051] The buggy address is located 0 bytes inside of
[   30.751051]  freed 64-byte region [fff00000c637ad80, fff00000c637adc0)
[   30.751278] 
[   30.751329] The buggy address belongs to the physical page:
[   30.751361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   30.751587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.751782] page_type: f5(slab)
[   30.751933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.752007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.752187] page dumped because: kasan: bad access detected
[   30.752363] 
[   30.752424] Memory state around the buggy address:
[   30.752563]  fff00000c637ac80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.752629]  fff00000c637ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.752838] >fff00000c637ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.753004]                    ^
[   30.753064]  fff00000c637ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.753186]  fff00000c637ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.753256] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   30.731026] ==================================================================
[   30.731088] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   30.731140] Read of size 1 at addr fff00000c63602e8 by task kunit_try_catch/215
[   30.731191] 
[   30.731236] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.731325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.731353] Hardware name: linux,dummy-virt (DT)
[   30.731386] Call trace:
[   30.731407]  show_stack+0x20/0x38 (C)
[   30.731455]  dump_stack_lvl+0x8c/0xd0
[   30.731501]  print_report+0x118/0x5d0
[   30.731557]  kasan_report+0xdc/0x128
[   30.731609]  __asan_report_load1_noabort+0x20/0x30
[   30.731672]  kmalloc_uaf+0x300/0x338
[   30.731717]  kunit_try_run_case+0x170/0x3f0
[   30.731982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.732127]  kthread+0x328/0x630
[   30.732184]  ret_from_fork+0x10/0x20
[   30.732447] 
[   30.732471] Allocated by task 215:
[   30.732518]  kasan_save_stack+0x3c/0x68
[   30.732727]  kasan_save_track+0x20/0x40
[   30.732890]  kasan_save_alloc_info+0x40/0x58
[   30.733043]  __kasan_kmalloc+0xd4/0xd8
[   30.733169]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.733372]  kmalloc_uaf+0xb8/0x338
[   30.733434]  kunit_try_run_case+0x170/0x3f0
[   30.733733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.733824]  kthread+0x328/0x630
[   30.733983]  ret_from_fork+0x10/0x20
[   30.734193] 
[   30.734267] Freed by task 215:
[   30.734566]  kasan_save_stack+0x3c/0x68
[   30.734736]  kasan_save_track+0x20/0x40
[   30.734884]  kasan_save_free_info+0x4c/0x78
[   30.734995]  __kasan_slab_free+0x6c/0x98
[   30.735190]  kfree+0x214/0x3c8
[   30.735448]  kmalloc_uaf+0x11c/0x338
[   30.735640]  kunit_try_run_case+0x170/0x3f0
[   30.735783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.735866]  kthread+0x328/0x630
[   30.735942]  ret_from_fork+0x10/0x20
[   30.735996] 
[   30.736133] The buggy address belongs to the object at fff00000c63602e0
[   30.736133]  which belongs to the cache kmalloc-16 of size 16
[   30.736232] The buggy address is located 8 bytes inside of
[   30.736232]  freed 16-byte region [fff00000c63602e0, fff00000c63602f0)
[   30.736447] 
[   30.736470] The buggy address belongs to the physical page:
[   30.736725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360
[   30.736878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.736983] page_type: f5(slab)
[   30.737051] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.737172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.737258] page dumped because: kasan: bad access detected
[   30.737348] 
[   30.737446] Memory state around the buggy address:
[   30.737481]  fff00000c6360180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.737761]  fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.737824] >fff00000c6360280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.738207]                                                           ^
[   30.738465]  fff00000c6360300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.738571]  fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.738615] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   30.716672] ==================================================================
[   30.716732] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   30.716787] Read of size 64 at addr fff00000c637aa84 by task kunit_try_catch/213
[   30.716839] 
[   30.716870] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.716992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.717020] Hardware name: linux,dummy-virt (DT)
[   30.717051] Call trace:
[   30.717081]  show_stack+0x20/0x38 (C)
[   30.717139]  dump_stack_lvl+0x8c/0xd0
[   30.717195]  print_report+0x118/0x5d0
[   30.717239]  kasan_report+0xdc/0x128
[   30.717283]  kasan_check_range+0x100/0x1a8
[   30.717334]  __asan_memmove+0x3c/0x98
[   30.717380]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   30.717442]  kunit_try_run_case+0x170/0x3f0
[   30.717494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.717740]  kthread+0x328/0x630
[   30.717808]  ret_from_fork+0x10/0x20
[   30.717999] 
[   30.718128] Allocated by task 213:
[   30.718321]  kasan_save_stack+0x3c/0x68
[   30.718580]  kasan_save_track+0x20/0x40
[   30.718634]  kasan_save_alloc_info+0x40/0x58
[   30.718751]  __kasan_kmalloc+0xd4/0xd8
[   30.718858]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.718996]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   30.719068]  kunit_try_run_case+0x170/0x3f0
[   30.719106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.719444]  kthread+0x328/0x630
[   30.719610]  ret_from_fork+0x10/0x20
[   30.719753] 
[   30.719806] The buggy address belongs to the object at fff00000c637aa80
[   30.719806]  which belongs to the cache kmalloc-64 of size 64
[   30.719913] The buggy address is located 4 bytes inside of
[   30.719913]  allocated 64-byte region [fff00000c637aa80, fff00000c637aac0)
[   30.720126] 
[   30.720162] The buggy address belongs to the physical page:
[   30.720194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   30.720409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.720566] page_type: f5(slab)
[   30.720741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.720844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.720932] page dumped because: kasan: bad access detected
[   30.721022] 
[   30.721085] Memory state around the buggy address:
[   30.721217]  fff00000c637a980: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   30.721313]  fff00000c637aa00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.721364] >fff00000c637aa80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.721631]                                            ^
[   30.721773]  fff00000c637ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.721852]  fff00000c637ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.722015] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   30.702449] ==================================================================
[   30.702841] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   30.702978] Read of size 18446744073709551614 at addr fff00000c637a904 by task kunit_try_catch/211
[   30.703096] 
[   30.703137] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.703225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.703251] Hardware name: linux,dummy-virt (DT)
[   30.703449] Call trace:
[   30.703484]  show_stack+0x20/0x38 (C)
[   30.703567]  dump_stack_lvl+0x8c/0xd0
[   30.703733]  print_report+0x118/0x5d0
[   30.703821]  kasan_report+0xdc/0x128
[   30.703894]  kasan_check_range+0x100/0x1a8
[   30.704050]  __asan_memmove+0x3c/0x98
[   30.704197]  kmalloc_memmove_negative_size+0x154/0x2e0
[   30.704294]  kunit_try_run_case+0x170/0x3f0
[   30.704402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.704633]  kthread+0x328/0x630
[   30.704796]  ret_from_fork+0x10/0x20
[   30.704930] 
[   30.704991] Allocated by task 211:
[   30.705133]  kasan_save_stack+0x3c/0x68
[   30.705209]  kasan_save_track+0x20/0x40
[   30.705246]  kasan_save_alloc_info+0x40/0x58
[   30.705597]  __kasan_kmalloc+0xd4/0xd8
[   30.705747]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.706060]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   30.706137]  kunit_try_run_case+0x170/0x3f0
[   30.706193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.706239]  kthread+0x328/0x630
[   30.706273]  ret_from_fork+0x10/0x20
[   30.706310] 
[   30.706330] The buggy address belongs to the object at fff00000c637a900
[   30.706330]  which belongs to the cache kmalloc-64 of size 64
[   30.706441] The buggy address is located 4 bytes inside of
[   30.706441]  64-byte region [fff00000c637a900, fff00000c637a940)
[   30.706784] 
[   30.707068] The buggy address belongs to the physical page:
[   30.707200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   30.707279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.707352] page_type: f5(slab)
[   30.707543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.707736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.707840] page dumped because: kasan: bad access detected
[   30.707888] 
[   30.707918] Memory state around the buggy address:
[   30.707960]  fff00000c637a800: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   30.708006]  fff00000c637a880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.708316] >fff00000c637a900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.708453]                    ^
[   30.708680]  fff00000c637a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.708812]  fff00000c637aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.709023] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   30.676810] ==================================================================
[   30.676874] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.676928] Write of size 16 at addr fff00000c6361d69 by task kunit_try_catch/209
[   30.677448] 
[   30.677619] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.677717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.677743] Hardware name: linux,dummy-virt (DT)
[   30.678214] Call trace:
[   30.678256]  show_stack+0x20/0x38 (C)
[   30.678390]  dump_stack_lvl+0x8c/0xd0
[   30.678575]  print_report+0x118/0x5d0
[   30.678638]  kasan_report+0xdc/0x128
[   30.678890]  kasan_check_range+0x100/0x1a8
[   30.678956]  __asan_memset+0x34/0x78
[   30.679000]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.679204]  kunit_try_run_case+0x170/0x3f0
[   30.679257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.679311]  kthread+0x328/0x630
[   30.679355]  ret_from_fork+0x10/0x20
[   30.679403] 
[   30.679421] Allocated by task 209:
[   30.679800]  kasan_save_stack+0x3c/0x68
[   30.679928]  kasan_save_track+0x20/0x40
[   30.680101]  kasan_save_alloc_info+0x40/0x58
[   30.680143]  __kasan_kmalloc+0xd4/0xd8
[   30.680187]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.680606]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.680659]  kunit_try_run_case+0x170/0x3f0
[   30.680947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.681055]  kthread+0x328/0x630
[   30.681094]  ret_from_fork+0x10/0x20
[   30.681130] 
[   30.681171] The buggy address belongs to the object at fff00000c6361d00
[   30.681171]  which belongs to the cache kmalloc-128 of size 128
[   30.681255] The buggy address is located 105 bytes inside of
[   30.681255]  allocated 120-byte region [fff00000c6361d00, fff00000c6361d78)
[   30.681337] 
[   30.681366] The buggy address belongs to the physical page:
[   30.681413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.681493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.681936] page_type: f5(slab)
[   30.681977] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.682045] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.683048] page dumped because: kasan: bad access detected
[   30.684271] 
[   30.684618] Memory state around the buggy address:
[   30.684715]  fff00000c6361c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.686007]  fff00000c6361c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.686114] >fff00000c6361d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.686208]                                                                 ^
[   30.686279]  fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.687563]  fff00000c6361e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.687613] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   30.658645] ==================================================================
[   30.658706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   30.658792] Write of size 8 at addr fff00000c6361c71 by task kunit_try_catch/207
[   30.658845] 
[   30.658922] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.659342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.659477] Hardware name: linux,dummy-virt (DT)
[   30.659624] Call trace:
[   30.659650]  show_stack+0x20/0x38 (C)
[   30.659716]  dump_stack_lvl+0x8c/0xd0
[   30.659809]  print_report+0x118/0x5d0
[   30.659905]  kasan_report+0xdc/0x128
[   30.659947]  kasan_check_range+0x100/0x1a8
[   30.660127]  __asan_memset+0x34/0x78
[   30.660329]  kmalloc_oob_memset_8+0x150/0x2f8
[   30.660549]  kunit_try_run_case+0x170/0x3f0
[   30.660675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.660808]  kthread+0x328/0x630
[   30.660937]  ret_from_fork+0x10/0x20
[   30.661066] 
[   30.661086] Allocated by task 207:
[   30.661376]  kasan_save_stack+0x3c/0x68
[   30.661653]  kasan_save_track+0x20/0x40
[   30.661898]  kasan_save_alloc_info+0x40/0x58
[   30.661998]  __kasan_kmalloc+0xd4/0xd8
[   30.662213]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.662432]  kmalloc_oob_memset_8+0xb0/0x2f8
[   30.662675]  kunit_try_run_case+0x170/0x3f0
[   30.662744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.663000]  kthread+0x328/0x630
[   30.663185]  ret_from_fork+0x10/0x20
[   30.663297] 
[   30.663418] The buggy address belongs to the object at fff00000c6361c00
[   30.663418]  which belongs to the cache kmalloc-128 of size 128
[   30.663538] The buggy address is located 113 bytes inside of
[   30.663538]  allocated 120-byte region [fff00000c6361c00, fff00000c6361c78)
[   30.663811] 
[   30.663907] The buggy address belongs to the physical page:
[   30.663986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.664390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.664459] page_type: f5(slab)
[   30.664496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.664693] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.664812] page dumped because: kasan: bad access detected
[   30.664988] 
[   30.665031] Memory state around the buggy address:
[   30.665179]  fff00000c6361b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.665457]  fff00000c6361b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.665667] >fff00000c6361c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.665758]                                                                 ^
[   30.665916]  fff00000c6361c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.665989]  fff00000c6361d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.666204] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   30.641874] ==================================================================
[   30.641939] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   30.642202] Write of size 4 at addr fff00000c6361b75 by task kunit_try_catch/205
[   30.642441] 
[   30.642523] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.642967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.643364] Hardware name: linux,dummy-virt (DT)
[   30.643411] Call trace:
[   30.643637]  show_stack+0x20/0x38 (C)
[   30.644016]  dump_stack_lvl+0x8c/0xd0
[   30.644567]  print_report+0x118/0x5d0
[   30.644893]  kasan_report+0xdc/0x128
[   30.644969]  kasan_check_range+0x100/0x1a8
[   30.645146]  __asan_memset+0x34/0x78
[   30.645485]  kmalloc_oob_memset_4+0x150/0x300
[   30.645611]  kunit_try_run_case+0x170/0x3f0
[   30.645830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.646064]  kthread+0x328/0x630
[   30.646111]  ret_from_fork+0x10/0x20
[   30.646159] 
[   30.646220] Allocated by task 205:
[   30.646270]  kasan_save_stack+0x3c/0x68
[   30.646310]  kasan_save_track+0x20/0x40
[   30.646345]  kasan_save_alloc_info+0x40/0x58
[   30.646397]  __kasan_kmalloc+0xd4/0xd8
[   30.646446]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.646485]  kmalloc_oob_memset_4+0xb0/0x300
[   30.646982]  kunit_try_run_case+0x170/0x3f0
[   30.647330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.647560]  kthread+0x328/0x630
[   30.647834]  ret_from_fork+0x10/0x20
[   30.648033] 
[   30.648100] The buggy address belongs to the object at fff00000c6361b00
[   30.648100]  which belongs to the cache kmalloc-128 of size 128
[   30.648228] The buggy address is located 117 bytes inside of
[   30.648228]  allocated 120-byte region [fff00000c6361b00, fff00000c6361b78)
[   30.648319] 
[   30.648707] The buggy address belongs to the physical page:
[   30.648761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.648864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.649085] page_type: f5(slab)
[   30.649359] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.649763] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.650029] page dumped because: kasan: bad access detected
[   30.650202] 
[   30.650351] Memory state around the buggy address:
[   30.650546]  fff00000c6361a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.650925]  fff00000c6361a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.651045] >fff00000c6361b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.651083]                                                                 ^
[   30.651400]  fff00000c6361b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.651585]  fff00000c6361c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.651739] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   30.400329] ==================================================================
[   30.400383] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   30.400432] Read of size 1 at addr fff00000c9b40000 by task kunit_try_catch/185
[   30.400481] 
[   30.400526] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.400609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.400636] Hardware name: linux,dummy-virt (DT)
[   30.400690] Call trace:
[   30.400713]  show_stack+0x20/0x38 (C)
[   30.400760]  dump_stack_lvl+0x8c/0xd0
[   30.400814]  print_report+0x118/0x5d0
[   30.400866]  kasan_report+0xdc/0x128
[   30.400910]  __asan_report_load1_noabort+0x20/0x30
[   30.400958]  page_alloc_uaf+0x328/0x350
[   30.401003]  kunit_try_run_case+0x170/0x3f0
[   30.401055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.401107]  kthread+0x328/0x630
[   30.401148]  ret_from_fork+0x10/0x20
[   30.401194] 
[   30.401212] The buggy address belongs to the physical page:
[   30.401242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b40
[   30.401293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.401340] page_type: f0(buddy)
[   30.401376] raw: 0bfffe0000000000 fff00000ff6161b0 fff00000ff6161b0 0000000000000000
[   30.401430] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   30.401471] page dumped because: kasan: bad access detected
[   30.401501] 
[   30.401528] Memory state around the buggy address:
[   30.401560]  fff00000c9b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.401604]  fff00000c9b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.401646] >fff00000c9b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.401684]                    ^
[   30.401719]  fff00000c9b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.401762]  fff00000c9b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.401799] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   30.625012] ==================================================================
[   30.625544] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   30.625616] Write of size 2 at addr fff00000c6361a77 by task kunit_try_catch/203
[   30.625930] 
[   30.625981] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.626070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.626097] Hardware name: linux,dummy-virt (DT)
[   30.626464] Call trace:
[   30.626599]  show_stack+0x20/0x38 (C)
[   30.626673]  dump_stack_lvl+0x8c/0xd0
[   30.626727]  print_report+0x118/0x5d0
[   30.626986]  kasan_report+0xdc/0x128
[   30.627051]  kasan_check_range+0x100/0x1a8
[   30.627541]  __asan_memset+0x34/0x78
[   30.627649]  kmalloc_oob_memset_2+0x150/0x2f8
[   30.627725]  kunit_try_run_case+0x170/0x3f0
[   30.627953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.628164]  kthread+0x328/0x630
[   30.628367]  ret_from_fork+0x10/0x20
[   30.628497] 
[   30.628705] Allocated by task 203:
[   30.628851]  kasan_save_stack+0x3c/0x68
[   30.629007]  kasan_save_track+0x20/0x40
[   30.629066]  kasan_save_alloc_info+0x40/0x58
[   30.629268]  __kasan_kmalloc+0xd4/0xd8
[   30.629488]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.629564]  kmalloc_oob_memset_2+0xb0/0x2f8
[   30.629727]  kunit_try_run_case+0x170/0x3f0
[   30.629892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.630038]  kthread+0x328/0x630
[   30.630076]  ret_from_fork+0x10/0x20
[   30.630112] 
[   30.630148] The buggy address belongs to the object at fff00000c6361a00
[   30.630148]  which belongs to the cache kmalloc-128 of size 128
[   30.630208] The buggy address is located 119 bytes inside of
[   30.630208]  allocated 120-byte region [fff00000c6361a00, fff00000c6361a78)
[   30.630281] 
[   30.630317] The buggy address belongs to the physical page:
[   30.630362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.630419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.630485] page_type: f5(slab)
[   30.630547] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.630606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.630652] page dumped because: kasan: bad access detected
[   30.630689] 
[   30.630707] Memory state around the buggy address:
[   30.630756]  fff00000c6361900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.630799]  fff00000c6361980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.630857] >fff00000c6361a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.630895]                                                                 ^
[   30.630935]  fff00000c6361a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.630995]  fff00000c6361b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.631033] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   30.606915] ==================================================================
[   30.606972] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   30.607033] Write of size 128 at addr fff00000c6361900 by task kunit_try_catch/201
[   30.607084] 
[   30.607114] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.607198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.607224] Hardware name: linux,dummy-virt (DT)
[   30.607265] Call trace:
[   30.607288]  show_stack+0x20/0x38 (C)
[   30.607335]  dump_stack_lvl+0x8c/0xd0
[   30.607380]  print_report+0x118/0x5d0
[   30.607423]  kasan_report+0xdc/0x128
[   30.607464]  kasan_check_range+0x100/0x1a8
[   30.607522]  __asan_memset+0x34/0x78
[   30.607567]  kmalloc_oob_in_memset+0x144/0x2d0
[   30.607614]  kunit_try_run_case+0x170/0x3f0
[   30.607660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.607710]  kthread+0x328/0x630
[   30.607750]  ret_from_fork+0x10/0x20
[   30.608608] 
[   30.608765] Allocated by task 201:
[   30.608797]  kasan_save_stack+0x3c/0x68
[   30.608859]  kasan_save_track+0x20/0x40
[   30.608894]  kasan_save_alloc_info+0x40/0x58
[   30.608931]  __kasan_kmalloc+0xd4/0xd8
[   30.609516]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.609601]  kmalloc_oob_in_memset+0xb0/0x2d0
[   30.609757]  kunit_try_run_case+0x170/0x3f0
[   30.609863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.610133]  kthread+0x328/0x630
[   30.610310]  ret_from_fork+0x10/0x20
[   30.610579] 
[   30.610693] The buggy address belongs to the object at fff00000c6361900
[   30.610693]  which belongs to the cache kmalloc-128 of size 128
[   30.611146] The buggy address is located 0 bytes inside of
[   30.611146]  allocated 120-byte region [fff00000c6361900, fff00000c6361978)
[   30.611441] 
[   30.611523] The buggy address belongs to the physical page:
[   30.611588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.611869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.612308] page_type: f5(slab)
[   30.612395] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.612599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.612670] page dumped because: kasan: bad access detected
[   30.612882] 
[   30.613047] Memory state around the buggy address:
[   30.613190]  fff00000c6361800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.613313]  fff00000c6361880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.613485] >fff00000c6361900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.613535]                                                                 ^
[   30.613714]  fff00000c6361980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.613940]  fff00000c6361a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.614056] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   30.585639] ==================================================================
[   30.586091] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   30.586210] Read of size 16 at addr fff00000c63602c0 by task kunit_try_catch/199
[   30.586282] 
[   30.586315] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.586711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.586784] Hardware name: linux,dummy-virt (DT)
[   30.586818] Call trace:
[   30.586850]  show_stack+0x20/0x38 (C)
[   30.586902]  dump_stack_lvl+0x8c/0xd0
[   30.587039]  print_report+0x118/0x5d0
[   30.587151]  kasan_report+0xdc/0x128
[   30.587344]  __asan_report_load16_noabort+0x20/0x30
[   30.587479]  kmalloc_uaf_16+0x3bc/0x438
[   30.587549]  kunit_try_run_case+0x170/0x3f0
[   30.587597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.587984]  kthread+0x328/0x630
[   30.588186]  ret_from_fork+0x10/0x20
[   30.588303] 
[   30.588454] Allocated by task 199:
[   30.588495]  kasan_save_stack+0x3c/0x68
[   30.588713]  kasan_save_track+0x20/0x40
[   30.588919]  kasan_save_alloc_info+0x40/0x58
[   30.589074]  __kasan_kmalloc+0xd4/0xd8
[   30.589181]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.589315]  kmalloc_uaf_16+0x140/0x438
[   30.589430]  kunit_try_run_case+0x170/0x3f0
[   30.589476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.589676]  kthread+0x328/0x630
[   30.589826]  ret_from_fork+0x10/0x20
[   30.589955] 
[   30.590012] Freed by task 199:
[   30.590115]  kasan_save_stack+0x3c/0x68
[   30.590211]  kasan_save_track+0x20/0x40
[   30.590589]  kasan_save_free_info+0x4c/0x78
[   30.590674]  __kasan_slab_free+0x6c/0x98
[   30.590820]  kfree+0x214/0x3c8
[   30.590888]  kmalloc_uaf_16+0x190/0x438
[   30.591334]  kunit_try_run_case+0x170/0x3f0
[   30.591729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.591831]  kthread+0x328/0x630
[   30.591898]  ret_from_fork+0x10/0x20
[   30.591953] 
[   30.592007] The buggy address belongs to the object at fff00000c63602c0
[   30.592007]  which belongs to the cache kmalloc-16 of size 16
[   30.592607] The buggy address is located 0 bytes inside of
[   30.592607]  freed 16-byte region [fff00000c63602c0, fff00000c63602d0)
[   30.592799] 
[   30.593153] The buggy address belongs to the physical page:
[   30.593367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360
[   30.593605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.593734] page_type: f5(slab)
[   30.593774] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.594005] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.594109] page dumped because: kasan: bad access detected
[   30.594429] 
[   30.594613] Memory state around the buggy address:
[   30.594767]  fff00000c6360180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.594986]  fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.595111] >fff00000c6360280: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   30.595198]                                            ^
[   30.595303]  fff00000c6360300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.595347]  fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.595848] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   30.566490] ==================================================================
[   30.566603] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   30.566791] Write of size 16 at addr fff00000c6360260 by task kunit_try_catch/197
[   30.566843] 
[   30.567082] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.567243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.567281] Hardware name: linux,dummy-virt (DT)
[   30.567472] Call trace:
[   30.567499]  show_stack+0x20/0x38 (C)
[   30.567756]  dump_stack_lvl+0x8c/0xd0
[   30.568048]  print_report+0x118/0x5d0
[   30.568176]  kasan_report+0xdc/0x128
[   30.568247]  __asan_report_store16_noabort+0x20/0x30
[   30.568299]  kmalloc_oob_16+0x3a0/0x3f8
[   30.568648]  kunit_try_run_case+0x170/0x3f0
[   30.568728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.568854]  kthread+0x328/0x630
[   30.568927]  ret_from_fork+0x10/0x20
[   30.569322] 
[   30.569367] Allocated by task 197:
[   30.569527]  kasan_save_stack+0x3c/0x68
[   30.569573]  kasan_save_track+0x20/0x40
[   30.569731]  kasan_save_alloc_info+0x40/0x58
[   30.570079]  __kasan_kmalloc+0xd4/0xd8
[   30.570348]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.570673]  kmalloc_oob_16+0xb4/0x3f8
[   30.570877]  kunit_try_run_case+0x170/0x3f0
[   30.571114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.571472]  kthread+0x328/0x630
[   30.571709]  ret_from_fork+0x10/0x20
[   30.571979] 
[   30.572189] The buggy address belongs to the object at fff00000c6360260
[   30.572189]  which belongs to the cache kmalloc-16 of size 16
[   30.572375] The buggy address is located 0 bytes inside of
[   30.572375]  allocated 13-byte region [fff00000c6360260, fff00000c636026d)
[   30.572604] 
[   30.572660] The buggy address belongs to the physical page:
[   30.572842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360
[   30.573059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.573208] page_type: f5(slab)
[   30.573413] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.573576] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.573727] page dumped because: kasan: bad access detected
[   30.573935] 
[   30.574160] Memory state around the buggy address:
[   30.574258]  fff00000c6360100: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   30.574497]  fff00000c6360180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.574682] >fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   30.574878]                                                           ^
[   30.574935]  fff00000c6360280: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.575093]  fff00000c6360300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.575408] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   30.542345] ==================================================================
[   30.542796] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   30.543324] Read of size 1 at addr fff00000c1d5d400 by task kunit_try_catch/195
[   30.543545] 
[   30.543660] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.543825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.543896] Hardware name: linux,dummy-virt (DT)
[   30.544045] Call trace:
[   30.544124]  show_stack+0x20/0x38 (C)
[   30.544200]  dump_stack_lvl+0x8c/0xd0
[   30.544248]  print_report+0x118/0x5d0
[   30.544291]  kasan_report+0xdc/0x128
[   30.544534]  __asan_report_load1_noabort+0x20/0x30
[   30.544759]  krealloc_uaf+0x4c8/0x520
[   30.544872]  kunit_try_run_case+0x170/0x3f0
[   30.545045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.545330]  kthread+0x328/0x630
[   30.545737]  ret_from_fork+0x10/0x20
[   30.545968] 
[   30.546040] Allocated by task 195:
[   30.546150]  kasan_save_stack+0x3c/0x68
[   30.546318]  kasan_save_track+0x20/0x40
[   30.546383]  kasan_save_alloc_info+0x40/0x58
[   30.546480]  __kasan_kmalloc+0xd4/0xd8
[   30.546589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.546762]  krealloc_uaf+0xc8/0x520
[   30.547000]  kunit_try_run_case+0x170/0x3f0
[   30.547062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.547178]  kthread+0x328/0x630
[   30.547319]  ret_from_fork+0x10/0x20
[   30.547544] 
[   30.547798] Freed by task 195:
[   30.547921]  kasan_save_stack+0x3c/0x68
[   30.548085]  kasan_save_track+0x20/0x40
[   30.548179]  kasan_save_free_info+0x4c/0x78
[   30.548224]  __kasan_slab_free+0x6c/0x98
[   30.548259]  kfree+0x214/0x3c8
[   30.548293]  krealloc_uaf+0x12c/0x520
[   30.548328]  kunit_try_run_case+0x170/0x3f0
[   30.548575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.548628]  kthread+0x328/0x630
[   30.549158]  ret_from_fork+0x10/0x20
[   30.549528] 
[   30.549623] The buggy address belongs to the object at fff00000c1d5d400
[   30.549623]  which belongs to the cache kmalloc-256 of size 256
[   30.549720] The buggy address is located 0 bytes inside of
[   30.549720]  freed 256-byte region [fff00000c1d5d400, fff00000c1d5d500)
[   30.549931] 
[   30.550033] The buggy address belongs to the physical page:
[   30.550096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c
[   30.550155] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.550202] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.550316] page_type: f5(slab)
[   30.550377] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.550435] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.550494] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.550552] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.550606] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff
[   30.550655] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.550700] page dumped because: kasan: bad access detected
[   30.550731] 
[   30.550763] Memory state around the buggy address:
[   30.550813]  fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.550857]  fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.550909] >fff00000c1d5d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.550953]                    ^
[   30.550980]  fff00000c1d5d480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.551029]  fff00000c1d5d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.551066] ==================================================================
[   30.527957] ==================================================================
[   30.528068] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   30.528398] Read of size 1 at addr fff00000c1d5d400 by task kunit_try_catch/195
[   30.528459] 
[   30.528499] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.528910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.529074] Hardware name: linux,dummy-virt (DT)
[   30.529125] Call trace:
[   30.529148]  show_stack+0x20/0x38 (C)
[   30.529694]  dump_stack_lvl+0x8c/0xd0
[   30.529833]  print_report+0x118/0x5d0
[   30.530017]  kasan_report+0xdc/0x128
[   30.530226]  __kasan_check_byte+0x54/0x70
[   30.530316]  krealloc_noprof+0x44/0x360
[   30.530370]  krealloc_uaf+0x180/0x520
[   30.530540]  kunit_try_run_case+0x170/0x3f0
[   30.530888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.530966]  kthread+0x328/0x630
[   30.531310]  ret_from_fork+0x10/0x20
[   30.531528] 
[   30.531550] Allocated by task 195:
[   30.531758]  kasan_save_stack+0x3c/0x68
[   30.531951]  kasan_save_track+0x20/0x40
[   30.532062]  kasan_save_alloc_info+0x40/0x58
[   30.532374]  __kasan_kmalloc+0xd4/0xd8
[   30.532476]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.532835]  krealloc_uaf+0xc8/0x520
[   30.532891]  kunit_try_run_case+0x170/0x3f0
[   30.533183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.533372]  kthread+0x328/0x630
[   30.533616]  ret_from_fork+0x10/0x20
[   30.533774] 
[   30.533870] Freed by task 195:
[   30.533901]  kasan_save_stack+0x3c/0x68
[   30.534137]  kasan_save_track+0x20/0x40
[   30.534334]  kasan_save_free_info+0x4c/0x78
[   30.534408]  __kasan_slab_free+0x6c/0x98
[   30.534614]  kfree+0x214/0x3c8
[   30.534922]  krealloc_uaf+0x12c/0x520
[   30.535346]  kunit_try_run_case+0x170/0x3f0
[   30.535503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.535652]  kthread+0x328/0x630
[   30.535688]  ret_from_fork+0x10/0x20
[   30.535893] 
[   30.536127] The buggy address belongs to the object at fff00000c1d5d400
[   30.536127]  which belongs to the cache kmalloc-256 of size 256
[   30.536395] The buggy address is located 0 bytes inside of
[   30.536395]  freed 256-byte region [fff00000c1d5d400, fff00000c1d5d500)
[   30.536470] 
[   30.536652] The buggy address belongs to the physical page:
[   30.536968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c
[   30.537030] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.537299] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.537469] page_type: f5(slab)
[   30.537667] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.538119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.538182] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.538638] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.538721] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff
[   30.538907] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.539133] page dumped because: kasan: bad access detected
[   30.539330] 
[   30.539433] Memory state around the buggy address:
[   30.539574]  fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.539810]  fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.540134] >fff00000c1d5d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.540260]                    ^
[   30.540425]  fff00000c1d5d480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.540470]  fff00000c1d5d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.540524] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   30.499758] ==================================================================
[   30.500186] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.500256] Write of size 1 at addr fff00000c9b260da by task kunit_try_catch/193
[   30.500314] 
[   30.500345] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.500427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.500454] Hardware name: linux,dummy-virt (DT)
[   30.500486] Call trace:
[   30.500819]  show_stack+0x20/0x38 (C)
[   30.500920]  dump_stack_lvl+0x8c/0xd0
[   30.500982]  print_report+0x118/0x5d0
[   30.501027]  kasan_report+0xdc/0x128
[   30.501079]  __asan_report_store1_noabort+0x20/0x30
[   30.501130]  krealloc_less_oob_helper+0xa80/0xc50
[   30.501180]  krealloc_large_less_oob+0x20/0x38
[   30.501230]  kunit_try_run_case+0x170/0x3f0
[   30.501287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.501339]  kthread+0x328/0x630
[   30.501380]  ret_from_fork+0x10/0x20
[   30.501440] 
[   30.501480] The buggy address belongs to the physical page:
[   30.501522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   30.501576] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.501622] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.501672] page_type: f8(unknown)
[   30.501720] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.501786] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.501844] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.501921] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.501980] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   30.502037] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.502077] page dumped because: kasan: bad access detected
[   30.502115] 
[   30.502138] Memory state around the buggy address:
[   30.502175]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.502232]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.502273] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.502310]                                                     ^
[   30.502346]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.502393]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.502432] ==================================================================
[   30.455469] ==================================================================
[   30.455632] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.455694] Write of size 1 at addr fff00000c1d5d2ea by task kunit_try_catch/189
[   30.455743] 
[   30.455821] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.455945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.455972] Hardware name: linux,dummy-virt (DT)
[   30.456002] Call trace:
[   30.456023]  show_stack+0x20/0x38 (C)
[   30.456214]  dump_stack_lvl+0x8c/0xd0
[   30.456401]  print_report+0x118/0x5d0
[   30.456591]  kasan_report+0xdc/0x128
[   30.456799]  __asan_report_store1_noabort+0x20/0x30
[   30.456880]  krealloc_less_oob_helper+0xae4/0xc50
[   30.456930]  krealloc_less_oob+0x20/0x38
[   30.456998]  kunit_try_run_case+0x170/0x3f0
[   30.457051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.457103]  kthread+0x328/0x630
[   30.457143]  ret_from_fork+0x10/0x20
[   30.457203] 
[   30.457222] Allocated by task 189:
[   30.457249]  kasan_save_stack+0x3c/0x68
[   30.457314]  kasan_save_track+0x20/0x40
[   30.457361]  kasan_save_alloc_info+0x40/0x58
[   30.457398]  __kasan_krealloc+0x118/0x178
[   30.457460]  krealloc_noprof+0x128/0x360
[   30.458008]  krealloc_less_oob_helper+0x168/0xc50
[   30.458128]  krealloc_less_oob+0x20/0x38
[   30.458168]  kunit_try_run_case+0x170/0x3f0
[   30.458205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.458247]  kthread+0x328/0x630
[   30.458421]  ret_from_fork+0x10/0x20
[   30.458550] 
[   30.458607] The buggy address belongs to the object at fff00000c1d5d200
[   30.458607]  which belongs to the cache kmalloc-256 of size 256
[   30.458707] The buggy address is located 33 bytes to the right of
[   30.458707]  allocated 201-byte region [fff00000c1d5d200, fff00000c1d5d2c9)
[   30.458834] 
[   30.458854] The buggy address belongs to the physical page:
[   30.458885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c
[   30.458955] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.459001] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.459052] page_type: f5(slab)
[   30.459134] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.459362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.459468] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.459617] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.459695] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff
[   30.459744] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.459783] page dumped because: kasan: bad access detected
[   30.459814] 
[   30.459867] Memory state around the buggy address:
[   30.460032]  fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.460107]  fff00000c1d5d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.460206] >fff00000c1d5d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.460323]                                                           ^
[   30.460445]  fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.460527]  fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.460565] ==================================================================
[   30.483738] ==================================================================
[   30.483834] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.483906] Write of size 1 at addr fff00000c9b260c9 by task kunit_try_catch/193
[   30.484021] 
[   30.484132] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.484254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.484281] Hardware name: linux,dummy-virt (DT)
[   30.484311] Call trace:
[   30.484332]  show_stack+0x20/0x38 (C)
[   30.484378]  dump_stack_lvl+0x8c/0xd0
[   30.484646]  print_report+0x118/0x5d0
[   30.484752]  kasan_report+0xdc/0x128
[   30.484923]  __asan_report_store1_noabort+0x20/0x30
[   30.484994]  krealloc_less_oob_helper+0xa48/0xc50
[   30.485080]  krealloc_large_less_oob+0x20/0x38
[   30.485147]  kunit_try_run_case+0x170/0x3f0
[   30.485376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.485533]  kthread+0x328/0x630
[   30.485680]  ret_from_fork+0x10/0x20
[   30.485795] 
[   30.485943] The buggy address belongs to the physical page:
[   30.486068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   30.486209] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.486291] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.486343] page_type: f8(unknown)
[   30.486664] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.486817] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.486904] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.486977] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.487153] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   30.487256] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.487416] page dumped because: kasan: bad access detected
[   30.487469] 
[   30.487487] Memory state around the buggy address:
[   30.487531]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.487696]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.487947] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.488048]                                               ^
[   30.488168]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.488262]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.488315] ==================================================================
[   30.503544] ==================================================================
[   30.503846] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.503934] Write of size 1 at addr fff00000c9b260ea by task kunit_try_catch/193
[   30.504005] 
[   30.504054] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.504173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.504356] Hardware name: linux,dummy-virt (DT)
[   30.504391] Call trace:
[   30.504414]  show_stack+0x20/0x38 (C)
[   30.504629]  dump_stack_lvl+0x8c/0xd0
[   30.504847]  print_report+0x118/0x5d0
[   30.505229]  kasan_report+0xdc/0x128
[   30.505599]  __asan_report_store1_noabort+0x20/0x30
[   30.505802]  krealloc_less_oob_helper+0xae4/0xc50
[   30.506247]  krealloc_large_less_oob+0x20/0x38
[   30.507052]  kunit_try_run_case+0x170/0x3f0
[   30.507608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.507911]  kthread+0x328/0x630
[   30.508021]  ret_from_fork+0x10/0x20
[   30.508107] 
[   30.508288] The buggy address belongs to the physical page:
[   30.508561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   30.508752] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.508824] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.509181] page_type: f8(unknown)
[   30.509382] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.509448] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.509799] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.509893] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.510343] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   30.510497] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.510613] page dumped because: kasan: bad access detected
[   30.510746] 
[   30.510825] Memory state around the buggy address:
[   30.511069]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.511405]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.511518] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.511653]                                                           ^
[   30.511739]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.511912]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.512178] ==================================================================
[   30.513020] ==================================================================
[   30.513104] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.513393] Write of size 1 at addr fff00000c9b260eb by task kunit_try_catch/193
[   30.513501] 
[   30.513545] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.513800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.513885] Hardware name: linux,dummy-virt (DT)
[   30.513922] Call trace:
[   30.514028]  show_stack+0x20/0x38 (C)
[   30.514081]  dump_stack_lvl+0x8c/0xd0
[   30.514313]  print_report+0x118/0x5d0
[   30.514496]  kasan_report+0xdc/0x128
[   30.514565]  __asan_report_store1_noabort+0x20/0x30
[   30.514713]  krealloc_less_oob_helper+0xa58/0xc50
[   30.514818]  krealloc_large_less_oob+0x20/0x38
[   30.515043]  kunit_try_run_case+0x170/0x3f0
[   30.515098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.515446]  kthread+0x328/0x630
[   30.515526]  ret_from_fork+0x10/0x20
[   30.515875] 
[   30.515986] The buggy address belongs to the physical page:
[   30.516142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   30.516356] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.516540] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.516624] page_type: f8(unknown)
[   30.516663] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.516714] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.516764] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.517204] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.517357] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   30.517504] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.517615] page dumped because: kasan: bad access detected
[   30.517647] 
[   30.517792] Memory state around the buggy address:
[   30.518006]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.518296]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.518435] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.518517]                                                           ^
[   30.518557]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.518772]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.519033] ==================================================================
[   30.461400] ==================================================================
[   30.461447] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.461496] Write of size 1 at addr fff00000c1d5d2eb by task kunit_try_catch/189
[   30.461689] 
[   30.461751] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.461839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.461865] Hardware name: linux,dummy-virt (DT)
[   30.461979] Call trace:
[   30.462008]  show_stack+0x20/0x38 (C)
[   30.462072]  dump_stack_lvl+0x8c/0xd0
[   30.462136]  print_report+0x118/0x5d0
[   30.462179]  kasan_report+0xdc/0x128
[   30.462238]  __asan_report_store1_noabort+0x20/0x30
[   30.462287]  krealloc_less_oob_helper+0xa58/0xc50
[   30.462336]  krealloc_less_oob+0x20/0x38
[   30.462594]  kunit_try_run_case+0x170/0x3f0
[   30.462694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.462779]  kthread+0x328/0x630
[   30.462845]  ret_from_fork+0x10/0x20
[   30.462893] 
[   30.462937] Allocated by task 189:
[   30.463074]  kasan_save_stack+0x3c/0x68
[   30.463116]  kasan_save_track+0x20/0x40
[   30.463234]  kasan_save_alloc_info+0x40/0x58
[   30.463278]  __kasan_krealloc+0x118/0x178
[   30.463313]  krealloc_noprof+0x128/0x360
[   30.463351]  krealloc_less_oob_helper+0x168/0xc50
[   30.463420]  krealloc_less_oob+0x20/0x38
[   30.463458]  kunit_try_run_case+0x170/0x3f0
[   30.463494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.463659]  kthread+0x328/0x630
[   30.463694]  ret_from_fork+0x10/0x20
[   30.463729] 
[   30.463747] The buggy address belongs to the object at fff00000c1d5d200
[   30.463747]  which belongs to the cache kmalloc-256 of size 256
[   30.463914] The buggy address is located 34 bytes to the right of
[   30.463914]  allocated 201-byte region [fff00000c1d5d200, fff00000c1d5d2c9)
[   30.463985] 
[   30.464004] The buggy address belongs to the physical page:
[   30.464035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c
[   30.464284] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.464475] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.464619] page_type: f5(slab)
[   30.464739] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.464836] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.464960] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.465024] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.465347] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff
[   30.465417] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.465521] page dumped because: kasan: bad access detected
[   30.465589] 
[   30.465652] Memory state around the buggy address:
[   30.465783]  fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.465839]  fff00000c1d5d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.465881] >fff00000c1d5d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.465919]                                                           ^
[   30.465957]  fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.466010]  fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.466047] ==================================================================
[   30.445578] ==================================================================
[   30.445681] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.445833] Write of size 1 at addr fff00000c1d5d2da by task kunit_try_catch/189
[   30.445890] 
[   30.445919] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.446209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.446256] Hardware name: linux,dummy-virt (DT)
[   30.446294] Call trace:
[   30.446332]  show_stack+0x20/0x38 (C)
[   30.446414]  dump_stack_lvl+0x8c/0xd0
[   30.446479]  print_report+0x118/0x5d0
[   30.446539]  kasan_report+0xdc/0x128
[   30.446582]  __asan_report_store1_noabort+0x20/0x30
[   30.446660]  krealloc_less_oob_helper+0xa80/0xc50
[   30.446712]  krealloc_less_oob+0x20/0x38
[   30.446775]  kunit_try_run_case+0x170/0x3f0
[   30.446840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.446902]  kthread+0x328/0x630
[   30.446964]  ret_from_fork+0x10/0x20
[   30.447030] 
[   30.447049] Allocated by task 189:
[   30.447119]  kasan_save_stack+0x3c/0x68
[   30.447185]  kasan_save_track+0x20/0x40
[   30.447242]  kasan_save_alloc_info+0x40/0x58
[   30.447282]  __kasan_krealloc+0x118/0x178
[   30.447337]  krealloc_noprof+0x128/0x360
[   30.447381]  krealloc_less_oob_helper+0x168/0xc50
[   30.447423]  krealloc_less_oob+0x20/0x38
[   30.447459]  kunit_try_run_case+0x170/0x3f0
[   30.447495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.447547]  kthread+0x328/0x630
[   30.447579]  ret_from_fork+0x10/0x20
[   30.447658] 
[   30.447676] The buggy address belongs to the object at fff00000c1d5d200
[   30.447676]  which belongs to the cache kmalloc-256 of size 256
[   30.447885] The buggy address is located 17 bytes to the right of
[   30.447885]  allocated 201-byte region [fff00000c1d5d200, fff00000c1d5d2c9)
[   30.448012] 
[   30.448092] The buggy address belongs to the physical page:
[   30.448132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c
[   30.448184] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.448375] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.449632] page_type: f5(slab)
[   30.449681] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.449847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.449905] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.450404] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.450548] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff
[   30.450618] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.451720] page dumped because: kasan: bad access detected
[   30.452050] 
[   30.452361] Memory state around the buggy address:
[   30.452401]  fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.453472]  fff00000c1d5d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.453859] >fff00000c1d5d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.454179]                                                     ^
[   30.454231]  fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.454363]  fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.454498] ==================================================================
[   30.489813] ==================================================================
[   30.489865] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.489995] Write of size 1 at addr fff00000c9b260d0 by task kunit_try_catch/193
[   30.490255] 
[   30.490300] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.490610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.490718] Hardware name: linux,dummy-virt (DT)
[   30.490753] Call trace:
[   30.490808]  show_stack+0x20/0x38 (C)
[   30.490859]  dump_stack_lvl+0x8c/0xd0
[   30.491109]  print_report+0x118/0x5d0
[   30.491177]  kasan_report+0xdc/0x128
[   30.491221]  __asan_report_store1_noabort+0x20/0x30
[   30.491270]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.491320]  krealloc_large_less_oob+0x20/0x38
[   30.491368]  kunit_try_run_case+0x170/0x3f0
[   30.491415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.491467]  kthread+0x328/0x630
[   30.491606]  ret_from_fork+0x10/0x20
[   30.491661] 
[   30.491692] The buggy address belongs to the physical page:
[   30.491723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   30.491907] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.492082] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.492413] page_type: f8(unknown)
[   30.492496] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.493049] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.493342] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.493499] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.493622] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   30.493692] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.493752] page dumped because: kasan: bad access detected
[   30.493928] 
[   30.494233] Memory state around the buggy address:
[   30.494600]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.494669]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.494792] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.494866]                                                  ^
[   30.495087]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.495425]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.495484] ==================================================================
[   30.431756] ==================================================================
[   30.431935] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.431991] Write of size 1 at addr fff00000c1d5d2c9 by task kunit_try_catch/189
[   30.432113] 
[   30.432163] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.432248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.432421] Hardware name: linux,dummy-virt (DT)
[   30.432453] Call trace:
[   30.432474]  show_stack+0x20/0x38 (C)
[   30.432606]  dump_stack_lvl+0x8c/0xd0
[   30.432784]  print_report+0x118/0x5d0
[   30.432829]  kasan_report+0xdc/0x128
[   30.433170]  __asan_report_store1_noabort+0x20/0x30
[   30.433312]  krealloc_less_oob_helper+0xa48/0xc50
[   30.433467]  krealloc_less_oob+0x20/0x38
[   30.433578]  kunit_try_run_case+0x170/0x3f0
[   30.433637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.433822]  kthread+0x328/0x630
[   30.434067]  ret_from_fork+0x10/0x20
[   30.434192] 
[   30.434262] Allocated by task 189:
[   30.434357]  kasan_save_stack+0x3c/0x68
[   30.434456]  kasan_save_track+0x20/0x40
[   30.434542]  kasan_save_alloc_info+0x40/0x58
[   30.434616]  __kasan_krealloc+0x118/0x178
[   30.434717]  krealloc_noprof+0x128/0x360
[   30.434814]  krealloc_less_oob_helper+0x168/0xc50
[   30.434875]  krealloc_less_oob+0x20/0x38
[   30.434912]  kunit_try_run_case+0x170/0x3f0
[   30.435243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.435395]  kthread+0x328/0x630
[   30.435465]  ret_from_fork+0x10/0x20
[   30.435576] 
[   30.435721] The buggy address belongs to the object at fff00000c1d5d200
[   30.435721]  which belongs to the cache kmalloc-256 of size 256
[   30.435875] The buggy address is located 0 bytes to the right of
[   30.435875]  allocated 201-byte region [fff00000c1d5d200, fff00000c1d5d2c9)
[   30.436007] 
[   30.436098] The buggy address belongs to the physical page:
[   30.436146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c
[   30.436210] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.436257] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.436311] page_type: f5(slab)
[   30.436523] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.436620] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.436840] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.436957] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.437114] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff
[   30.437230] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.437405] page dumped because: kasan: bad access detected
[   30.437484] 
[   30.437540] Memory state around the buggy address:
[   30.437573]  fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.437956]  fff00000c1d5d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.438011] >fff00000c1d5d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.438144]                                               ^
[   30.438250]  fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.438399]  fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.438481] ==================================================================
[   30.439466] ==================================================================
[   30.439527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.439575] Write of size 1 at addr fff00000c1d5d2d0 by task kunit_try_catch/189
[   30.439627] 
[   30.439783] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.440077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.440135] Hardware name: linux,dummy-virt (DT)
[   30.440237] Call trace:
[   30.440350]  show_stack+0x20/0x38 (C)
[   30.440470]  dump_stack_lvl+0x8c/0xd0
[   30.440654]  print_report+0x118/0x5d0
[   30.440717]  kasan_report+0xdc/0x128
[   30.440784]  __asan_report_store1_noabort+0x20/0x30
[   30.440833]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.441179]  krealloc_less_oob+0x20/0x38
[   30.441294]  kunit_try_run_case+0x170/0x3f0
[   30.441436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.441625]  kthread+0x328/0x630
[   30.441758]  ret_from_fork+0x10/0x20
[   30.441892] 
[   30.442033] Allocated by task 189:
[   30.442071]  kasan_save_stack+0x3c/0x68
[   30.442108]  kasan_save_track+0x20/0x40
[   30.442187]  kasan_save_alloc_info+0x40/0x58
[   30.442420]  __kasan_krealloc+0x118/0x178
[   30.442684]  krealloc_noprof+0x128/0x360
[   30.442796]  krealloc_less_oob_helper+0x168/0xc50
[   30.442857]  krealloc_less_oob+0x20/0x38
[   30.442935]  kunit_try_run_case+0x170/0x3f0
[   30.442972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.443014]  kthread+0x328/0x630
[   30.443058]  ret_from_fork+0x10/0x20
[   30.443093] 
[   30.443112] The buggy address belongs to the object at fff00000c1d5d200
[   30.443112]  which belongs to the cache kmalloc-256 of size 256
[   30.443180] The buggy address is located 7 bytes to the right of
[   30.443180]  allocated 201-byte region [fff00000c1d5d200, fff00000c1d5d2c9)
[   30.443244] 
[   30.443263] The buggy address belongs to the physical page:
[   30.443294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c
[   30.443346] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.443393] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.443443] page_type: f5(slab)
[   30.443478] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.443540] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.443591] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.443656] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.443715] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff
[   30.443772] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.443811] page dumped because: kasan: bad access detected
[   30.443841] 
[   30.443858] Memory state around the buggy address:
[   30.443889]  fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.443931]  fff00000c1d5d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.444400] >fff00000c1d5d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.444456]                                                  ^
[   30.444668]  fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.444791]  fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.444889] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   30.405655] ==================================================================
[   30.405767] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.405817] Write of size 1 at addr fff00000c1d5d0eb by task kunit_try_catch/187
[   30.405867] 
[   30.406099] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.406198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.406225] Hardware name: linux,dummy-virt (DT)
[   30.406292] Call trace:
[   30.406331]  show_stack+0x20/0x38 (C)
[   30.406392]  dump_stack_lvl+0x8c/0xd0
[   30.406457]  print_report+0x118/0x5d0
[   30.406500]  kasan_report+0xdc/0x128
[   30.406571]  __asan_report_store1_noabort+0x20/0x30
[   30.406621]  krealloc_more_oob_helper+0x60c/0x678
[   30.406688]  krealloc_more_oob+0x20/0x38
[   30.406738]  kunit_try_run_case+0x170/0x3f0
[   30.406785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.407004]  kthread+0x328/0x630
[   30.407050]  ret_from_fork+0x10/0x20
[   30.407097] 
[   30.407114] Allocated by task 187:
[   30.407190]  kasan_save_stack+0x3c/0x68
[   30.407258]  kasan_save_track+0x20/0x40
[   30.407315]  kasan_save_alloc_info+0x40/0x58
[   30.407377]  __kasan_krealloc+0x118/0x178
[   30.407412]  krealloc_noprof+0x128/0x360
[   30.407450]  krealloc_more_oob_helper+0x168/0x678
[   30.407727]  krealloc_more_oob+0x20/0x38
[   30.407820]  kunit_try_run_case+0x170/0x3f0
[   30.407918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.408035]  kthread+0x328/0x630
[   30.408145]  ret_from_fork+0x10/0x20
[   30.408279] 
[   30.408338] The buggy address belongs to the object at fff00000c1d5d000
[   30.408338]  which belongs to the cache kmalloc-256 of size 256
[   30.408396] The buggy address is located 0 bytes to the right of
[   30.408396]  allocated 235-byte region [fff00000c1d5d000, fff00000c1d5d0eb)
[   30.408459] 
[   30.408478] The buggy address belongs to the physical page:
[   30.408519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c
[   30.408571] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.408617] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.408666] page_type: f5(slab)
[   30.408743] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.408834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.408963] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.409065] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.409218] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff
[   30.409311] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.409400] page dumped because: kasan: bad access detected
[   30.409531] 
[   30.409549] Memory state around the buggy address:
[   30.409580]  fff00000c1d5cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.409757]  fff00000c1d5d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.409872] >fff00000c1d5d080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.410003]                                                           ^
[   30.410109]  fff00000c1d5d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.410171]  fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.410289] ==================================================================
[   30.474348] ==================================================================
[   30.474468] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.474531] Write of size 1 at addr fff00000c9b220f0 by task kunit_try_catch/191
[   30.474595] 
[   30.474624] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.474806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.474835] Hardware name: linux,dummy-virt (DT)
[   30.475006] Call trace:
[   30.475064]  show_stack+0x20/0x38 (C)
[   30.475155]  dump_stack_lvl+0x8c/0xd0
[   30.475231]  print_report+0x118/0x5d0
[   30.475294]  kasan_report+0xdc/0x128
[   30.475359]  __asan_report_store1_noabort+0x20/0x30
[   30.475425]  krealloc_more_oob_helper+0x5c0/0x678
[   30.475501]  krealloc_large_more_oob+0x20/0x38
[   30.475594]  kunit_try_run_case+0x170/0x3f0
[   30.475649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.475701]  kthread+0x328/0x630
[   30.475742]  ret_from_fork+0x10/0x20
[   30.475787] 
[   30.475930] The buggy address belongs to the physical page:
[   30.475963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b20
[   30.476155] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.476267] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.476354] page_type: f8(unknown)
[   30.476456] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.476581] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.476675] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.476781] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.476897] head: 0bfffe0000000002 ffffc1ffc326c801 00000000ffffffff 00000000ffffffff
[   30.477017] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.477094] page dumped because: kasan: bad access detected
[   30.477124] 
[   30.477142] Memory state around the buggy address:
[   30.477173]  fff00000c9b21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.477226]  fff00000c9b22000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.477268] >fff00000c9b22080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.477620]                                                              ^
[   30.477754]  fff00000c9b22100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.477857]  fff00000c9b22180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.477975] ==================================================================
[   30.470230] ==================================================================
[   30.470283] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.470334] Write of size 1 at addr fff00000c9b220eb by task kunit_try_catch/191
[   30.470389] 
[   30.470418] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.470501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.470541] Hardware name: linux,dummy-virt (DT)
[   30.470571] Call trace:
[   30.470591]  show_stack+0x20/0x38 (C)
[   30.470886]  dump_stack_lvl+0x8c/0xd0
[   30.470980]  print_report+0x118/0x5d0
[   30.471026]  kasan_report+0xdc/0x128
[   30.471068]  __asan_report_store1_noabort+0x20/0x30
[   30.471311]  krealloc_more_oob_helper+0x60c/0x678
[   30.471396]  krealloc_large_more_oob+0x20/0x38
[   30.471454]  kunit_try_run_case+0x170/0x3f0
[   30.471541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.471594]  kthread+0x328/0x630
[   30.471636]  ret_from_fork+0x10/0x20
[   30.471682] 
[   30.471702] The buggy address belongs to the physical page:
[   30.471733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b20
[   30.471983] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.472081] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.472196] page_type: f8(unknown)
[   30.472252] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.472351] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.472448] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.472538] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.472633] head: 0bfffe0000000002 ffffc1ffc326c801 00000000ffffffff 00000000ffffffff
[   30.472694] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.472794] page dumped because: kasan: bad access detected
[   30.472846] 
[   30.472864] Memory state around the buggy address:
[   30.472945]  fff00000c9b21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.473018]  fff00000c9b22000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.473062] >fff00000c9b22080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.473099]                                                           ^
[   30.473175]  fff00000c9b22100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.473217]  fff00000c9b22180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.473254] ==================================================================
[   30.411156] ==================================================================
[   30.411220] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.411282] Write of size 1 at addr fff00000c1d5d0f0 by task kunit_try_catch/187
[   30.411348] 
[   30.411395] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.411478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.411640] Hardware name: linux,dummy-virt (DT)
[   30.411676] Call trace:
[   30.411713]  show_stack+0x20/0x38 (C)
[   30.411838]  dump_stack_lvl+0x8c/0xd0
[   30.411955]  print_report+0x118/0x5d0
[   30.412078]  kasan_report+0xdc/0x128
[   30.412159]  __asan_report_store1_noabort+0x20/0x30
[   30.412209]  krealloc_more_oob_helper+0x5c0/0x678
[   30.412402]  krealloc_more_oob+0x20/0x38
[   30.412622]  kunit_try_run_case+0x170/0x3f0
[   30.412742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.412850]  kthread+0x328/0x630
[   30.412976]  ret_from_fork+0x10/0x20
[   30.413041] 
[   30.413069] Allocated by task 187:
[   30.413415]  kasan_save_stack+0x3c/0x68
[   30.413776]  kasan_save_track+0x20/0x40
[   30.413856]  kasan_save_alloc_info+0x40/0x58
[   30.413973]  __kasan_krealloc+0x118/0x178
[   30.414019]  krealloc_noprof+0x128/0x360
[   30.414066]  krealloc_more_oob_helper+0x168/0x678
[   30.414231]  krealloc_more_oob+0x20/0x38
[   30.414430]  kunit_try_run_case+0x170/0x3f0
[   30.414508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.414639]  kthread+0x328/0x630
[   30.414697]  ret_from_fork+0x10/0x20
[   30.414733] 
[   30.414863] The buggy address belongs to the object at fff00000c1d5d000
[   30.414863]  which belongs to the cache kmalloc-256 of size 256
[   30.415036] The buggy address is located 5 bytes to the right of
[   30.415036]  allocated 235-byte region [fff00000c1d5d000, fff00000c1d5d0eb)
[   30.415194] 
[   30.415272] The buggy address belongs to the physical page:
[   30.415338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c
[   30.415390] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.415669] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.415786] page_type: f5(slab)
[   30.415881] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.415977] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.416138] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.416188] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.416375] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff
[   30.416429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.416676] page dumped because: kasan: bad access detected
[   30.416839] 
[   30.417242] Memory state around the buggy address:
[   30.417423]  fff00000c1d5cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.417642]  fff00000c1d5d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.417865] >fff00000c1d5d080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.417930]                                                              ^
[   30.417986]  fff00000c1d5d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.418465]  fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.418614] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   30.386323] ==================================================================
[   30.386526] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   30.386620] Free of addr fff00000c9b20001 by task kunit_try_catch/181
[   30.386676] 
[   30.386725] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.386819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.386846] Hardware name: linux,dummy-virt (DT)
[   30.386894] Call trace:
[   30.386933]  show_stack+0x20/0x38 (C)
[   30.386982]  dump_stack_lvl+0x8c/0xd0
[   30.387029]  print_report+0x118/0x5d0
[   30.387072]  kasan_report_invalid_free+0xc0/0xe8
[   30.387119]  __kasan_kfree_large+0x5c/0xa8
[   30.387163]  free_large_kmalloc+0x68/0x150
[   30.387209]  kfree+0x270/0x3c8
[   30.387278]  kmalloc_large_invalid_free+0x108/0x270
[   30.387346]  kunit_try_run_case+0x170/0x3f0
[   30.387402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.387479]  kthread+0x328/0x630
[   30.387563]  ret_from_fork+0x10/0x20
[   30.387610] 
[   30.387637] The buggy address belongs to the physical page:
[   30.387703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b20
[   30.387821] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.388038] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.388126] page_type: f8(unknown)
[   30.388236] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.388344] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.388593] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.388836] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.388988] head: 0bfffe0000000002 ffffc1ffc326c801 00000000ffffffff 00000000ffffffff
[   30.389071] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.389112] page dumped because: kasan: bad access detected
[   30.389164] 
[   30.389183] Memory state around the buggy address:
[   30.389215]  fff00000c9b1ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.389258]  fff00000c9b1ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.389337] >fff00000c9b20000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.389564]                    ^
[   30.389873]  fff00000c9b20080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.389959]  fff00000c9b20100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.390257] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   30.380930] ==================================================================
[   30.380995] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   30.381124] Read of size 1 at addr fff00000c9a08000 by task kunit_try_catch/179
[   30.381190] 
[   30.381220] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.381303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.381349] Hardware name: linux,dummy-virt (DT)
[   30.381385] Call trace:
[   30.381407]  show_stack+0x20/0x38 (C)
[   30.381452]  dump_stack_lvl+0x8c/0xd0
[   30.381498]  print_report+0x118/0x5d0
[   30.381553]  kasan_report+0xdc/0x128
[   30.381594]  __asan_report_load1_noabort+0x20/0x30
[   30.381641]  kmalloc_large_uaf+0x2cc/0x2f8
[   30.381686]  kunit_try_run_case+0x170/0x3f0
[   30.381732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.381787]  kthread+0x328/0x630
[   30.381829]  ret_from_fork+0x10/0x20
[   30.381880] 
[   30.381905] The buggy address belongs to the physical page:
[   30.381935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a08
[   30.381986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.382054] raw: 0bfffe0000000000 fff00000da450d00 fff00000da450d00 0000000000000000
[   30.382103] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   30.382142] page dumped because: kasan: bad access detected
[   30.382173] 
[   30.382190] Memory state around the buggy address:
[   30.382220]  fff00000c9a07f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.382262]  fff00000c9a07f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.382304] >fff00000c9a08000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.382341]                    ^
[   30.382374]  fff00000c9a08080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.382427]  fff00000c9a08100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.382465] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   30.372813] ==================================================================
[   30.372878] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   30.372953] Write of size 1 at addr fff00000c9a0a00a by task kunit_try_catch/177
[   30.373002] 
[   30.373032] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.373121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.373147] Hardware name: linux,dummy-virt (DT)
[   30.373177] Call trace:
[   30.373198]  show_stack+0x20/0x38 (C)
[   30.373243]  dump_stack_lvl+0x8c/0xd0
[   30.373289]  print_report+0x118/0x5d0
[   30.373361]  kasan_report+0xdc/0x128
[   30.373402]  __asan_report_store1_noabort+0x20/0x30
[   30.373449]  kmalloc_large_oob_right+0x278/0x2b8
[   30.373497]  kunit_try_run_case+0x170/0x3f0
[   30.373554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.373621]  kthread+0x328/0x630
[   30.373679]  ret_from_fork+0x10/0x20
[   30.373725] 
[   30.373790] The buggy address belongs to the physical page:
[   30.373857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a08
[   30.373909] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.373981] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.374075] page_type: f8(unknown)
[   30.374171] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.374226] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.374280] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.374328] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.374419] head: 0bfffe0000000002 ffffc1ffc3268201 00000000ffffffff 00000000ffffffff
[   30.374484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.374595] page dumped because: kasan: bad access detected
[   30.374645] 
[   30.374671] Memory state around the buggy address:
[   30.374704]  fff00000c9a09f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.374747]  fff00000c9a09f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.374887] >fff00000c9a0a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.374947]                       ^
[   30.375030]  fff00000c9a0a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.375126]  fff00000c9a0a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.375163] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   30.365391] ==================================================================
[   30.365478] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   30.365544] Write of size 1 at addr fff00000c6465f00 by task kunit_try_catch/175
[   30.365592] 
[   30.365620] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.365704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.365730] Hardware name: linux,dummy-virt (DT)
[   30.365760] Call trace:
[   30.365781]  show_stack+0x20/0x38 (C)
[   30.365987]  dump_stack_lvl+0x8c/0xd0
[   30.366036]  print_report+0x118/0x5d0
[   30.366112]  kasan_report+0xdc/0x128
[   30.366176]  __asan_report_store1_noabort+0x20/0x30
[   30.366243]  kmalloc_big_oob_right+0x2a4/0x2f0
[   30.366309]  kunit_try_run_case+0x170/0x3f0
[   30.366354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.366436]  kthread+0x328/0x630
[   30.366502]  ret_from_fork+0x10/0x20
[   30.366559] 
[   30.366576] Allocated by task 175:
[   30.366603]  kasan_save_stack+0x3c/0x68
[   30.366641]  kasan_save_track+0x20/0x40
[   30.366676]  kasan_save_alloc_info+0x40/0x58
[   30.366811]  __kasan_kmalloc+0xd4/0xd8
[   30.366917]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.366977]  kmalloc_big_oob_right+0xb8/0x2f0
[   30.367073]  kunit_try_run_case+0x170/0x3f0
[   30.367109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.367171]  kthread+0x328/0x630
[   30.367229]  ret_from_fork+0x10/0x20
[   30.367265] 
[   30.367283] The buggy address belongs to the object at fff00000c6464000
[   30.367283]  which belongs to the cache kmalloc-8k of size 8192
[   30.367387] The buggy address is located 0 bytes to the right of
[   30.367387]  allocated 7936-byte region [fff00000c6464000, fff00000c6465f00)
[   30.367490] 
[   30.367540] The buggy address belongs to the physical page:
[   30.367590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460
[   30.367647] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.367693] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.367743] page_type: f5(slab)
[   30.367810] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.367907] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.367968] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.368015] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.368082] head: 0bfffe0000000003 ffffc1ffc3191801 00000000ffffffff 00000000ffffffff
[   30.368130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.368169] page dumped because: kasan: bad access detected
[   30.368200] 
[   30.368217] Memory state around the buggy address:
[   30.368248]  fff00000c6465e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.368311]  fff00000c6465e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.368353] >fff00000c6465f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.368524]                    ^
[   30.368552]  fff00000c6465f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.368634]  fff00000c6466000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.368735] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   30.346145] ==================================================================
[   30.346195] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   30.346247] Write of size 1 at addr fff00000c6361878 by task kunit_try_catch/173
[   30.346297] 
[   30.346328] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.346419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.349366] Hardware name: linux,dummy-virt (DT)
[   30.349811] Call trace:
[   30.349836]  show_stack+0x20/0x38 (C)
[   30.350355]  dump_stack_lvl+0x8c/0xd0
[   30.350780]  print_report+0x118/0x5d0
[   30.350833]  kasan_report+0xdc/0x128
[   30.351543]  __asan_report_store1_noabort+0x20/0x30
[   30.352059]  kmalloc_track_caller_oob_right+0x418/0x488
[   30.352567]  kunit_try_run_case+0x170/0x3f0
[   30.352839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.352986]  kthread+0x328/0x630
[   30.353030]  ret_from_fork+0x10/0x20
[   30.353621] 
[   30.353933] Allocated by task 173:
[   30.354300]  kasan_save_stack+0x3c/0x68
[   30.354591]  kasan_save_track+0x20/0x40
[   30.355056]  kasan_save_alloc_info+0x40/0x58
[   30.355385]  __kasan_kmalloc+0xd4/0xd8
[   30.355876]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.356230]  kmalloc_track_caller_oob_right+0x184/0x488
[   30.356274]  kunit_try_run_case+0x170/0x3f0
[   30.357071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.357127]  kthread+0x328/0x630
[   30.358027]  ret_from_fork+0x10/0x20
[   30.358223] 
[   30.358242] The buggy address belongs to the object at fff00000c6361800
[   30.358242]  which belongs to the cache kmalloc-128 of size 128
[   30.358641] The buggy address is located 0 bytes to the right of
[   30.358641]  allocated 120-byte region [fff00000c6361800, fff00000c6361878)
[   30.358859] 
[   30.359328] The buggy address belongs to the physical page:
[   30.359383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.359438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.360482] page_type: f5(slab)
[   30.360568] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.360624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.360665] page dumped because: kasan: bad access detected
[   30.360697] 
[   30.360714] Memory state around the buggy address:
[   30.360746]  fff00000c6361700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.360789]  fff00000c6361780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.361359] >fff00000c6361800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.361398]                                                                 ^
[   30.361440]  fff00000c6361880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.361484]  fff00000c6361900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.361531] ==================================================================
[   30.331476] ==================================================================
[   30.332076] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   30.332143] Write of size 1 at addr fff00000c6361778 by task kunit_try_catch/173
[   30.332270] 
[   30.332302] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.332388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.332414] Hardware name: linux,dummy-virt (DT)
[   30.332446] Call trace:
[   30.332468]  show_stack+0x20/0x38 (C)
[   30.332528]  dump_stack_lvl+0x8c/0xd0
[   30.332574]  print_report+0x118/0x5d0
[   30.332629]  kasan_report+0xdc/0x128
[   30.332671]  __asan_report_store1_noabort+0x20/0x30
[   30.332970]  kmalloc_track_caller_oob_right+0x40c/0x488
[   30.333481]  kunit_try_run_case+0x170/0x3f0
[   30.333544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.333596]  kthread+0x328/0x630
[   30.333636]  ret_from_fork+0x10/0x20
[   30.334007] 
[   30.334046] Allocated by task 173:
[   30.334075]  kasan_save_stack+0x3c/0x68
[   30.334146]  kasan_save_track+0x20/0x40
[   30.334181]  kasan_save_alloc_info+0x40/0x58
[   30.334217]  __kasan_kmalloc+0xd4/0xd8
[   30.334296]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.334456]  kmalloc_track_caller_oob_right+0xa8/0x488
[   30.334596]  kunit_try_run_case+0x170/0x3f0
[   30.334632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.334674]  kthread+0x328/0x630
[   30.334706]  ret_from_fork+0x10/0x20
[   30.335065] 
[   30.335127] The buggy address belongs to the object at fff00000c6361700
[   30.335127]  which belongs to the cache kmalloc-128 of size 128
[   30.335192] The buggy address is located 0 bytes to the right of
[   30.335192]  allocated 120-byte region [fff00000c6361700, fff00000c6361778)
[   30.335256] 
[   30.335275] The buggy address belongs to the physical page:
[   30.335306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.335357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.335404] page_type: f5(slab)
[   30.336093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.336852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.337361] page dumped because: kasan: bad access detected
[   30.337774] 
[   30.337797] Memory state around the buggy address:
[   30.338607]  fff00000c6361600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.338918]  fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.339010] >fff00000c6361700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.339296]                                                                 ^
[   30.339346]  fff00000c6361780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.339831]  fff00000c6361800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.340420] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   30.317998] ==================================================================
[   30.318120] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   30.318225] Read of size 1 at addr fff00000c99ed000 by task kunit_try_catch/171
[   30.318274] 
[   30.318359] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.318783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.318916] Hardware name: linux,dummy-virt (DT)
[   30.318949] Call trace:
[   30.318970]  show_stack+0x20/0x38 (C)
[   30.319026]  dump_stack_lvl+0x8c/0xd0
[   30.319090]  print_report+0x118/0x5d0
[   30.319144]  kasan_report+0xdc/0x128
[   30.319247]  __asan_report_load1_noabort+0x20/0x30
[   30.319295]  kmalloc_node_oob_right+0x2f4/0x330
[   30.319345]  kunit_try_run_case+0x170/0x3f0
[   30.319649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.319805]  kthread+0x328/0x630
[   30.319848]  ret_from_fork+0x10/0x20
[   30.319895] 
[   30.319913] Allocated by task 171:
[   30.319993]  kasan_save_stack+0x3c/0x68
[   30.320048]  kasan_save_track+0x20/0x40
[   30.320090]  kasan_save_alloc_info+0x40/0x58
[   30.320128]  __kasan_kmalloc+0xd4/0xd8
[   30.320165]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   30.320206]  kmalloc_node_oob_right+0xbc/0x330
[   30.320245]  kunit_try_run_case+0x170/0x3f0
[   30.320318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.320362]  kthread+0x328/0x630
[   30.320607]  ret_from_fork+0x10/0x20
[   30.320644] 
[   30.320663] The buggy address belongs to the object at fff00000c99ec000
[   30.320663]  which belongs to the cache kmalloc-4k of size 4096
[   30.320721] The buggy address is located 0 bytes to the right of
[   30.320721]  allocated 4096-byte region [fff00000c99ec000, fff00000c99ed000)
[   30.320785] 
[   30.320805] The buggy address belongs to the physical page:
[   30.320878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099e8
[   30.321140] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.321189] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.321607] page_type: f5(slab)
[   30.321682] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   30.321803] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.321912] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   30.321967] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.322198] head: 0bfffe0000000003 ffffc1ffc3267a01 00000000ffffffff 00000000ffffffff
[   30.322340] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.322390] page dumped because: kasan: bad access detected
[   30.322441] 
[   30.322551] Memory state around the buggy address:
[   30.322638]  fff00000c99ecf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.322753]  fff00000c99ecf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.322856] >fff00000c99ed000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.322987]                    ^
[   30.323031]  fff00000c99ed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.323110]  fff00000c99ed100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.323290] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   30.301890] ==================================================================
[   30.301983] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   30.302120] Read of size 1 at addr fff00000c636023f by task kunit_try_catch/169
[   30.302322] 
[   30.302354] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.302442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.302468] Hardware name: linux,dummy-virt (DT)
[   30.302517] Call trace:
[   30.302539]  show_stack+0x20/0x38 (C)
[   30.302586]  dump_stack_lvl+0x8c/0xd0
[   30.303018]  print_report+0x118/0x5d0
[   30.303369]  kasan_report+0xdc/0x128
[   30.303419]  __asan_report_load1_noabort+0x20/0x30
[   30.303736]  kmalloc_oob_left+0x2ec/0x320
[   30.304122]  kunit_try_run_case+0x170/0x3f0
[   30.304211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.304289]  kthread+0x328/0x630
[   30.304379]  ret_from_fork+0x10/0x20
[   30.304536] 
[   30.304757] Allocated by task 108:
[   30.304941]  kasan_save_stack+0x3c/0x68
[   30.305011]  kasan_save_track+0x20/0x40
[   30.305077]  kasan_save_alloc_info+0x40/0x58
[   30.305114]  __kasan_kmalloc+0xd4/0xd8
[   30.305151]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.305400]  kvasprintf+0xe0/0x180
[   30.305471]  kasprintf+0xd0/0x110
[   30.305768]  miscdev_test_can_open+0xac/0x2c8
[   30.305921]  miscdev_test_conflict_reverse+0x330/0x620
[   30.305973]  kunit_try_run_case+0x170/0x3f0
[   30.306009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.306052]  kthread+0x328/0x630
[   30.306263]  ret_from_fork+0x10/0x20
[   30.306298] 
[   30.306334] Freed by task 108:
[   30.306379]  kasan_save_stack+0x3c/0x68
[   30.306416]  kasan_save_track+0x20/0x40
[   30.306875]  kasan_save_free_info+0x4c/0x78
[   30.306923]  __kasan_slab_free+0x6c/0x98
[   30.306988]  kfree+0x214/0x3c8
[   30.307043]  miscdev_test_can_open+0x138/0x2c8
[   30.307148]  miscdev_test_conflict_reverse+0x330/0x620
[   30.307188]  kunit_try_run_case+0x170/0x3f0
[   30.307225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.307267]  kthread+0x328/0x630
[   30.307299]  ret_from_fork+0x10/0x20
[   30.307347] 
[   30.307371] The buggy address belongs to the object at fff00000c6360220
[   30.307371]  which belongs to the cache kmalloc-16 of size 16
[   30.307476] The buggy address is located 15 bytes to the right of
[   30.307476]  allocated 16-byte region [fff00000c6360220, fff00000c6360230)
[   30.307852] 
[   30.308221] The buggy address belongs to the physical page:
[   30.308256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360
[   30.308309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.308675] page_type: f5(slab)
[   30.308921] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.309030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.309071] page dumped because: kasan: bad access detected
[   30.309102] 
[   30.309120] Memory state around the buggy address:
[   30.309170]  fff00000c6360100: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   30.309214]  fff00000c6360180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.309256] >fff00000c6360200: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   30.309294]                                         ^
[   30.309327]  fff00000c6360280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.309369]  fff00000c6360300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.309407] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   30.287059] ==================================================================
[   30.287097] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.287138] Read of size 1 at addr fff00000c6361680 by task kunit_try_catch/167
[   30.287185] 
[   30.287214] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.287294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.287320] Hardware name: linux,dummy-virt (DT)
[   30.287349] Call trace:
[   30.287369]  show_stack+0x20/0x38 (C)
[   30.287414]  dump_stack_lvl+0x8c/0xd0
[   30.287460]  print_report+0x118/0x5d0
[   30.287503]  kasan_report+0xdc/0x128
[   30.287557]  __asan_report_load1_noabort+0x20/0x30
[   30.287605]  kmalloc_oob_right+0x5d0/0x660
[   30.287651]  kunit_try_run_case+0x170/0x3f0
[   30.287757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.287949]  kthread+0x328/0x630
[   30.288020]  ret_from_fork+0x10/0x20
[   30.288066] 
[   30.288084] Allocated by task 167:
[   30.288111]  kasan_save_stack+0x3c/0x68
[   30.288222]  kasan_save_track+0x20/0x40
[   30.288291]  kasan_save_alloc_info+0x40/0x58
[   30.288483]  __kasan_kmalloc+0xd4/0xd8
[   30.288670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.288728]  kmalloc_oob_right+0xb0/0x660
[   30.288765]  kunit_try_run_case+0x170/0x3f0
[   30.288801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.288843]  kthread+0x328/0x630
[   30.288874]  ret_from_fork+0x10/0x20
[   30.288909] 
[   30.288981] The buggy address belongs to the object at fff00000c6361600
[   30.288981]  which belongs to the cache kmalloc-128 of size 128
[   30.289294] The buggy address is located 13 bytes to the right of
[   30.289294]  allocated 115-byte region [fff00000c6361600, fff00000c6361673)
[   30.289414] 
[   30.289469] The buggy address belongs to the physical page:
[   30.289572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.289622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.290466] page_type: f5(slab)
[   30.290614] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.290760] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.290863] page dumped because: kasan: bad access detected
[   30.290943] 
[   30.290961] Memory state around the buggy address:
[   30.290993]  fff00000c6361580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.291317]  fff00000c6361600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.291374] >fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.291668]                    ^
[   30.291794]  fff00000c6361700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.291901]  fff00000c6361780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.292027] ==================================================================
[   30.277349] ==================================================================
[   30.277699] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.278536] Write of size 1 at addr fff00000c6361673 by task kunit_try_catch/167
[   30.278646] 
[   30.279436] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.279615] Tainted: [N]=TEST
[   30.279648] Hardware name: linux,dummy-virt (DT)
[   30.279933] Call trace:
[   30.280115]  show_stack+0x20/0x38 (C)
[   30.280256]  dump_stack_lvl+0x8c/0xd0
[   30.280310]  print_report+0x118/0x5d0
[   30.280354]  kasan_report+0xdc/0x128
[   30.280397]  __asan_report_store1_noabort+0x20/0x30
[   30.280446]  kmalloc_oob_right+0x5a4/0x660
[   30.280493]  kunit_try_run_case+0x170/0x3f0
[   30.280556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.280608]  kthread+0x328/0x630
[   30.280652]  ret_from_fork+0x10/0x20
[   30.280811] 
[   30.280849] Allocated by task 167:
[   30.280962]  kasan_save_stack+0x3c/0x68
[   30.281025]  kasan_save_track+0x20/0x40
[   30.281061]  kasan_save_alloc_info+0x40/0x58
[   30.281099]  __kasan_kmalloc+0xd4/0xd8
[   30.281137]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.281179]  kmalloc_oob_right+0xb0/0x660
[   30.281217]  kunit_try_run_case+0x170/0x3f0
[   30.281252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.281295]  kthread+0x328/0x630
[   30.281326]  ret_from_fork+0x10/0x20
[   30.281378] 
[   30.281435] The buggy address belongs to the object at fff00000c6361600
[   30.281435]  which belongs to the cache kmalloc-128 of size 128
[   30.281538] The buggy address is located 0 bytes to the right of
[   30.281538]  allocated 115-byte region [fff00000c6361600, fff00000c6361673)
[   30.281608] 
[   30.281690] The buggy address belongs to the physical page:
[   30.281858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.282122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.282410] page_type: f5(slab)
[   30.282714] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.282791] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.282898] page dumped because: kasan: bad access detected
[   30.282937] 
[   30.282962] Memory state around the buggy address:
[   30.283178]  fff00000c6361500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.283242]  fff00000c6361580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.283296] >fff00000c6361600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.283350]                                                              ^
[   30.283435]  fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.283478]  fff00000c6361700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.283555] ==================================================================
[   30.284638] ==================================================================
[   30.284677] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.284725] Write of size 1 at addr fff00000c6361678 by task kunit_try_catch/167
[   30.284773] 
[   30.284802] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.284884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.284910] Hardware name: linux,dummy-virt (DT)
[   30.284939] Call trace:
[   30.284959]  show_stack+0x20/0x38 (C)
[   30.285005]  dump_stack_lvl+0x8c/0xd0
[   30.285050]  print_report+0x118/0x5d0
[   30.285093]  kasan_report+0xdc/0x128
[   30.285136]  __asan_report_store1_noabort+0x20/0x30
[   30.285185]  kmalloc_oob_right+0x538/0x660
[   30.285231]  kunit_try_run_case+0x170/0x3f0
[   30.285277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.285329]  kthread+0x328/0x630
[   30.285370]  ret_from_fork+0x10/0x20
[   30.285415] 
[   30.285432] Allocated by task 167:
[   30.285458]  kasan_save_stack+0x3c/0x68
[   30.285496]  kasan_save_track+0x20/0x40
[   30.285561]  kasan_save_alloc_info+0x40/0x58
[   30.285600]  __kasan_kmalloc+0xd4/0xd8
[   30.285636]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.285704]  kmalloc_oob_right+0xb0/0x660
[   30.285816]  kunit_try_run_case+0x170/0x3f0
[   30.285852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.285895]  kthread+0x328/0x630
[   30.285946]  ret_from_fork+0x10/0x20
[   30.286041] 
[   30.286125] The buggy address belongs to the object at fff00000c6361600
[   30.286125]  which belongs to the cache kmalloc-128 of size 128
[   30.286249] The buggy address is located 5 bytes to the right of
[   30.286249]  allocated 115-byte region [fff00000c6361600, fff00000c6361673)
[   30.286339] 
[   30.286359] The buggy address belongs to the physical page:
[   30.286393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.286444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.286489] page_type: f5(slab)
[   30.286535] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.286584] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.286623] page dumped because: kasan: bad access detected
[   30.286653] 
[   30.286671] Memory state around the buggy address:
[   30.286702]  fff00000c6361500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.286744]  fff00000c6361580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.286786] >fff00000c6361600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.286823]                                                                 ^
[   30.286861]  fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.286902]  fff00000c6361700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.286939] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  109.867184] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689
[  109.869091] Modules linked in:
[  109.869536] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[  109.870867] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  109.871443] Hardware name: linux,dummy-virt (DT)
[  109.871907] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.872199] pc : intlog10+0x38/0x48
[  109.872379] lr : intlog10_test+0xe4/0x200
[  109.872662] sp : ffff800082357c10
[  109.872997] x29: ffff800082357c90 x28: 0000000000000000 x27: 0000000000000000
[  109.873747] x26: 1ffe0000191edb21 x25: 0000000000000000 x24: ffff800082357ce0
[  109.874493] x23: ffff800082357d00 x22: 0000000000000000 x21: 1ffff0001046af82
[  109.875237] x20: ffff9420b4a416a0 x19: ffff800080087990 x18: 0000000054f6d338
[  109.876097] x17: 000000008c675fcd x16: fff00000c9a0cc3c x15: 00000000b029b3a1
[  109.876858] x14: 000000004e4d7479 x13: 1ffe00001b48dddd x12: ffff728417128989
[  109.877232] x11: 1ffff28417128988 x10: ffff728417128988 x9 : ffff9420b2055c2c
[  109.877579] x8 : ffff9420b8944c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.877913] x5 : ffff70001046af82 x4 : 1ffff00010010f3b x3 : 1ffff284169482d4
[  109.878246] x2 : 1ffff284169482d4 x1 : 0000000000000003 x0 : 0000000000000000
[  109.878719] Call trace:
[  109.878990]  intlog10+0x38/0x48 (P)
[  109.879365]  kunit_try_run_case+0x170/0x3f0
[  109.879807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.880430]  kthread+0x328/0x630
[  109.880807]  ret_from_fork+0x10/0x20
[  109.881208] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  109.818604] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671
[  109.820463] Modules linked in:
[  109.820943] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[  109.821695] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  109.821901] Hardware name: linux,dummy-virt (DT)
[  109.822096] pstate: 11400009 (nzcV daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[  109.822368] pc : intlog2+0xd8/0xf8
[  109.822566] lr : intlog2_test+0xe4/0x200
[  109.822750] sp : ffff800082287c10
[  109.822902] x29: ffff800082287c90 x28: 0000000000000000 x27: 0000000000000000
[  109.823247] x26: 1ffe0000193481e1 x25: 0000000000000000 x24: ffff800082287ce0
[  109.823760] x23: ffff800082287d00 x22: 0000000000000000 x21: 1ffff00010450f82
[  109.824963] x20: ffff9420b4a415a0 x19: ffff800080087990 x18: 00000000e2ffed71
[  109.825731] x17: 000000004a25e5c9 x16: 0000000055e4976c x15: 0000000012b2e2ff
[  109.826475] x14: 00000000c9d885e5 x13: 000000004e97caf9 x12: ffff728417128989
[  109.827235] x11: 1ffff28417128988 x10: ffff728417128988 x9 : ffff9420b2055e2c
[  109.828149] x8 : ffff9420b8944c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.829017] x5 : ffff700010450f82 x4 : 1ffff00010010f3b x3 : 1ffff284169482b4
[  109.829777] x2 : 1ffff284169482b4 x1 : 0000000000000003 x0 : 0000000000000000
[  109.830542] Call trace:
[  109.830843]  intlog2+0xd8/0xf8 (P)
[  109.831247]  kunit_try_run_case+0x170/0x3f0
[  109.831714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.832677]  kthread+0x328/0x630
[  109.833095]  ret_from_fork+0x10/0x20
[  109.833538] ---[ end trace 0000000000000000 ]---