Hay
Date
July 17, 2025, 10:12 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   32.007515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   32.073972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   31.961575] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   31.956789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[  111.223920] Internal error: Oops: 0000000096000005 [#1]  SMP
[  111.228828] Modules linked in:
[  111.230313] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[  111.231604] Tainted: [B]=BAD_PAGE, [N]=TEST
[  111.232152] Hardware name: linux,dummy-virt (DT)
[  111.232982] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  111.233719] pc : kunit_test_null_dereference+0x70/0x170
[  111.234507] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  111.235212] sp : ffff8000820c7d30
[  111.235708] x29: ffff8000820c7d90 x28: 0000000000000000 x27: 0000000000000000
[  111.236622] x26: 1ffe0000187e7b61 x25: 0000000000000000 x24: 0000000000000004
[  111.237423] x23: fff00000c3f3db0c x22: ffffad48b3842488 x21: fff00000c3e19008
[  111.238175] x20: 1ffff00010418fa6 x19: ffff800080087990 x18: 00000000f99d63e3
[  111.238931] x17: 0000000000000001 x16: fff00000c642543c x15: fff00000ff616b48
[  111.239659] x14: 0000000000018fff x13: 1ffe00001b4899dd x12: fffd800018ed18b4
[  111.240403] x11: 1ffe000018ed18b3 x10: fffd800018ed18b3 x9 : ffffad48b3839c18
[  111.240946] x8 : ffff8000820c7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  111.241671] x5 : ffff700010418fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  111.242378] x2 : dfff800000000000 x1 : fff00000c768bcc0 x0 : ffff800080087990
[  111.242901] Call trace:
[  111.243078]  kunit_test_null_dereference+0x70/0x170 (P)
[  111.243324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  111.243557]  kthread+0x328/0x630
[  111.243733]  ret_from_fork+0x10/0x20
[  111.244161] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  111.245148] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   65.469382] ==================================================================
[   65.469469] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   65.469469] 
[   65.469551] Use-after-free read at 0x00000000035ab68f (in kfence-#218):
[   65.469604]  test_krealloc+0x51c/0x830
[   65.469649]  kunit_try_run_case+0x170/0x3f0
[   65.469693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.469737]  kthread+0x328/0x630
[   65.469775]  ret_from_fork+0x10/0x20
[   65.469815] 
[   65.469841] kfence-#218: 0x00000000035ab68f-0x000000003b642baa, size=32, cache=kmalloc-32
[   65.469841] 
[   65.469895] allocated by task 368 on cpu 1 at 65.468745s (0.001146s ago):
[   65.469966]  test_alloc+0x29c/0x628
[   65.470005]  test_krealloc+0xc0/0x830
[   65.470041]  kunit_try_run_case+0x170/0x3f0
[   65.470098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.470143]  kthread+0x328/0x630
[   65.470179]  ret_from_fork+0x10/0x20
[   65.470218] 
[   65.470240] freed by task 368 on cpu 1 at 65.468967s (0.001270s ago):
[   65.470307]  krealloc_noprof+0x148/0x360
[   65.470349]  test_krealloc+0x1dc/0x830
[   65.470384]  kunit_try_run_case+0x170/0x3f0
[   65.470424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.470466]  kthread+0x328/0x630
[   65.470501]  ret_from_fork+0x10/0x20
[   65.470539] 
[   65.470582] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   65.470660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.470690] Hardware name: linux,dummy-virt (DT)
[   65.470722] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   65.304848] ==================================================================
[   65.304938] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   65.304938] 
[   65.305028] Use-after-free read at 0x00000000ca58501b (in kfence-#216):
[   65.305097]  test_memcache_typesafe_by_rcu+0x280/0x560
[   65.305145]  kunit_try_run_case+0x170/0x3f0
[   65.305187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.305232]  kthread+0x328/0x630
[   65.305270]  ret_from_fork+0x10/0x20
[   65.305310] 
[   65.305334] kfence-#216: 0x00000000ca58501b-0x000000000562a0ef, size=32, cache=test
[   65.305334] 
[   65.305386] allocated by task 366 on cpu 1 at 65.264674s (0.040708s ago):
[   65.305463]  test_alloc+0x230/0x628
[   65.305500]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   65.305541]  kunit_try_run_case+0x170/0x3f0
[   65.305578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.305620]  kthread+0x328/0x630
[   65.305655]  ret_from_fork+0x10/0x20
[   65.305695] 
[   65.305718] freed by task 366 on cpu 1 at 65.264782s (0.040932s ago):
[   65.305776]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   65.305816]  kunit_try_run_case+0x170/0x3f0
[   65.305853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.305895]  kthread+0x328/0x630
[   65.305932]  ret_from_fork+0x10/0x20
[   65.305970] 
[   65.306013] CPU: 1 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   65.306101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.306131] Hardware name: linux,dummy-virt (DT)
[   65.306164] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   42.712252] ==================================================================
[   42.712405] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   42.712405] 
[   42.712507] Invalid read at 0x00000000a644a9b4:
[   42.713015]  test_invalid_access+0xdc/0x1f0
[   42.713092]  kunit_try_run_case+0x170/0x3f0
[   42.713145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.713216]  kthread+0x328/0x630
[   42.713262]  ret_from_fork+0x10/0x20
[   42.713473] 
[   42.713700] CPU: 1 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   42.713789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.713823] Hardware name: linux,dummy-virt (DT)
[   42.713863] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   42.485095] ==================================================================
[   42.485196] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   42.485196] 
[   42.485262] Corrupted memory at 0x00000000df05bd2d [ ! . . . . . . . . . . . . . . . ] (in kfence-#212):
[   42.485577]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   42.485625]  kunit_try_run_case+0x170/0x3f0
[   42.485666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.485709]  kthread+0x328/0x630
[   42.485748]  ret_from_fork+0x10/0x20
[   42.485788] 
[   42.485812] kfence-#212: 0x000000007dea4894-0x000000003c1a0da0, size=73, cache=kmalloc-96
[   42.485812] 
[   42.485866] allocated by task 356 on cpu 1 at 42.484836s (0.001026s ago):
[   42.485932]  test_alloc+0x29c/0x628
[   42.485970]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   42.486010]  kunit_try_run_case+0x170/0x3f0
[   42.486050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.486106]  kthread+0x328/0x630
[   42.486143]  ret_from_fork+0x10/0x20
[   42.486183] 
[   42.486206] freed by task 356 on cpu 1 at 42.484985s (0.001218s ago):
[   42.486272]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   42.486313]  kunit_try_run_case+0x170/0x3f0
[   42.486353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.486395]  kthread+0x328/0x630
[   42.486432]  ret_from_fork+0x10/0x20
[   42.486472] 
[   42.486514] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   42.486595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.486627] Hardware name: linux,dummy-virt (DT)
[   42.486660] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   41.964951] ==================================================================
[   41.965020] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   41.965020] 
[   41.965128] Out-of-bounds read at 0x00000000be69f390 (105B right of kfence-#207):
[   41.965189]  test_kmalloc_aligned_oob_read+0x238/0x468
[   41.965236]  kunit_try_run_case+0x170/0x3f0
[   41.965280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.965324]  kthread+0x328/0x630
[   41.965365]  ret_from_fork+0x10/0x20
[   41.965404] 
[   41.965428] kfence-#207: 0x00000000717a17ae-0x000000007b3acd41, size=73, cache=kmalloc-96
[   41.965428] 
[   41.965481] allocated by task 354 on cpu 1 at 41.964725s (0.000752s ago):
[   41.965554]  test_alloc+0x29c/0x628
[   41.965593]  test_kmalloc_aligned_oob_read+0x100/0x468
[   41.965634]  kunit_try_run_case+0x170/0x3f0
[   41.965673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.965715]  kthread+0x328/0x630
[   41.965751]  ret_from_fork+0x10/0x20
[   41.965790] 
[   41.965836] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   41.965919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.965947] Hardware name: linux,dummy-virt (DT)
[   41.965982] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   36.452944] ==================================================================
[   36.453069] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   36.453069] 
[   36.453139] Corrupted memory at 0x00000000a2f53f86 [ ! . . . . . . . . . . . . . . . ] (in kfence-#154):
[   36.453458]  test_corruption+0x120/0x378
[   36.453504]  kunit_try_run_case+0x170/0x3f0
[   36.453551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.453597]  kthread+0x328/0x630
[   36.453637]  ret_from_fork+0x10/0x20
[   36.453678] 
[   36.453701] kfence-#154: 0x00000000f4c408e3-0x00000000e3981f8f, size=32, cache=test
[   36.453701] 
[   36.453761] allocated by task 344 on cpu 0 at 36.452781s (0.000977s ago):
[   36.453830]  test_alloc+0x230/0x628
[   36.453868]  test_corruption+0xdc/0x378
[   36.453906]  kunit_try_run_case+0x170/0x3f0
[   36.453947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.453991]  kthread+0x328/0x630
[   36.454028]  ret_from_fork+0x10/0x20
[   36.454076] 
[   36.454099] freed by task 344 on cpu 0 at 36.452842s (0.001254s ago):
[   36.454168]  test_corruption+0x120/0x378
[   36.454208]  kunit_try_run_case+0x170/0x3f0
[   36.454248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.454292]  kthread+0x328/0x630
[   36.454328]  ret_from_fork+0x10/0x20
[   36.454367] 
[   36.454410] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   36.454498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.454528] Hardware name: linux,dummy-virt (DT)
[   36.454564] ==================================================================
[   36.556981] ==================================================================
[   36.557092] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   36.557092] 
[   36.557156] Corrupted memory at 0x00000000c0204352 [ ! ] (in kfence-#155):
[   36.557275]  test_corruption+0x1d8/0x378
[   36.557321]  kunit_try_run_case+0x170/0x3f0
[   36.557365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.557411]  kthread+0x328/0x630
[   36.557449]  ret_from_fork+0x10/0x20
[   36.557490] 
[   36.557513] kfence-#155: 0x000000001ed096f6-0x0000000043487ab5, size=32, cache=test
[   36.557513] 
[   36.557577] allocated by task 344 on cpu 0 at 36.556818s (0.000755s ago):
[   36.557647]  test_alloc+0x230/0x628
[   36.557687]  test_corruption+0x198/0x378
[   36.557728]  kunit_try_run_case+0x170/0x3f0
[   36.557769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.557816]  kthread+0x328/0x630
[   36.557854]  ret_from_fork+0x10/0x20
[   36.557895] 
[   36.557918] freed by task 344 on cpu 0 at 36.556891s (0.001024s ago):
[   36.557989]  test_corruption+0x1d8/0x378
[   36.558028]  kunit_try_run_case+0x170/0x3f0
[   36.558080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.558128]  kthread+0x328/0x630
[   36.558164]  ret_from_fork+0x10/0x20
[   36.558205] 
[   36.558243] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   36.558336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.558368] Hardware name: linux,dummy-virt (DT)
[   36.558405] ==================================================================
[   35.413069] ==================================================================
[   35.413186] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   35.413186] 
[   35.413259] Corrupted memory at 0x00000000d0f082c4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#144):
[   35.414418]  test_corruption+0x278/0x378
[   35.414473]  kunit_try_run_case+0x170/0x3f0
[   35.414520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.414568]  kthread+0x328/0x630
[   35.414611]  ret_from_fork+0x10/0x20
[   35.414655] 
[   35.414681] kfence-#144: 0x0000000089d0b6f1-0x0000000073aa3ecd, size=32, cache=kmalloc-32
[   35.414681] 
[   35.414744] allocated by task 342 on cpu 0 at 35.412768s (0.001973s ago):
[   35.414821]  test_alloc+0x29c/0x628
[   35.414864]  test_corruption+0xdc/0x378
[   35.414905]  kunit_try_run_case+0x170/0x3f0
[   35.414946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.414990]  kthread+0x328/0x630
[   35.415028]  ret_from_fork+0x10/0x20
[   35.415080] 
[   35.415103] freed by task 342 on cpu 0 at 35.412872s (0.002227s ago):
[   35.415172]  test_corruption+0x278/0x378
[   35.415210]  kunit_try_run_case+0x170/0x3f0
[   35.415251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.415294]  kthread+0x328/0x630
[   35.415330]  ret_from_fork+0x10/0x20
[   35.415371] 
[   35.415418] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   35.415505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.415537] Hardware name: linux,dummy-virt (DT)
[   35.415573] ==================================================================
[   35.517086] ==================================================================
[   35.517180] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   35.517180] 
[   35.517244] Corrupted memory at 0x0000000004324241 [ ! ] (in kfence-#145):
[   35.517380]  test_corruption+0x284/0x378
[   35.517426]  kunit_try_run_case+0x170/0x3f0
[   35.517469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.517515]  kthread+0x328/0x630
[   35.517555]  ret_from_fork+0x10/0x20
[   35.517594] 
[   35.517619] kfence-#145: 0x000000005a0f271f-0x00000000a5e6e6a8, size=32, cache=kmalloc-32
[   35.517619] 
[   35.517680] allocated by task 342 on cpu 0 at 35.516790s (0.000887s ago):
[   35.517749]  test_alloc+0x29c/0x628
[   35.517788]  test_corruption+0x198/0x378
[   35.517828]  kunit_try_run_case+0x170/0x3f0
[   35.517867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.517912]  kthread+0x328/0x630
[   35.517948]  ret_from_fork+0x10/0x20
[   35.517990] 
[   35.518013] freed by task 342 on cpu 0 at 35.516903s (0.001106s ago):
[   35.518095]  test_corruption+0x284/0x378
[   35.518134]  kunit_try_run_case+0x170/0x3f0
[   35.518173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.518218]  kthread+0x328/0x630
[   35.518255]  ret_from_fork+0x10/0x20
[   35.518295] 
[   35.518334] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   35.518422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.518453] Hardware name: linux,dummy-virt (DT)
[   35.518488] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   35.204874] ==================================================================
[   35.204954] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   35.204954] 
[   35.205016] Invalid free of 0x0000000038fa978d (in kfence-#142):
[   35.205088]  test_invalid_addr_free+0x1ac/0x238
[   35.205134]  kunit_try_run_case+0x170/0x3f0
[   35.205178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.205224]  kthread+0x328/0x630
[   35.205266]  ret_from_fork+0x10/0x20
[   35.205307] 
[   35.205331] kfence-#142: 0x0000000054b67fc4-0x0000000054eb5d6f, size=32, cache=kmalloc-32
[   35.205331] 
[   35.205385] allocated by task 338 on cpu 1 at 35.204733s (0.000648s ago):
[   35.205452]  test_alloc+0x29c/0x628
[   35.205491]  test_invalid_addr_free+0xd4/0x238
[   35.205531]  kunit_try_run_case+0x170/0x3f0
[   35.205571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.205614]  kthread+0x328/0x630
[   35.205651]  ret_from_fork+0x10/0x20
[   35.205692] 
[   35.205736] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   35.205815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.205844] Hardware name: linux,dummy-virt (DT)
[   35.205877] ==================================================================
[   35.308858] ==================================================================
[   35.308946] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   35.308946] 
[   35.309005] Invalid free of 0x000000005edac6bc (in kfence-#143):
[   35.309077]  test_invalid_addr_free+0xec/0x238
[   35.309121]  kunit_try_run_case+0x170/0x3f0
[   35.309165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.309209]  kthread+0x328/0x630
[   35.309247]  ret_from_fork+0x10/0x20
[   35.309287] 
[   35.309311] kfence-#143: 0x0000000019d546bd-0x0000000026079be3, size=32, cache=test
[   35.309311] 
[   35.309363] allocated by task 340 on cpu 1 at 35.308735s (0.000624s ago):
[   35.309428]  test_alloc+0x230/0x628
[   35.309467]  test_invalid_addr_free+0xd4/0x238
[   35.309504]  kunit_try_run_case+0x170/0x3f0
[   35.309544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.309587]  kthread+0x328/0x630
[   35.309622]  ret_from_fork+0x10/0x20
[   35.309661] 
[   35.309701] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   35.309782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.309813] Hardware name: linux,dummy-virt (DT)
[   35.309844] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   34.997052] ==================================================================
[   34.997211] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   34.997211] 
[   34.997283] Invalid free of 0x000000009583b782 (in kfence-#140):
[   34.997355]  test_double_free+0x1bc/0x238
[   34.997401]  kunit_try_run_case+0x170/0x3f0
[   34.997446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.997494]  kthread+0x328/0x630
[   34.997533]  ret_from_fork+0x10/0x20
[   34.997577] 
[   34.997605] kfence-#140: 0x000000009583b782-0x0000000012423584, size=32, cache=kmalloc-32
[   34.997605] 
[   34.997668] allocated by task 334 on cpu 0 at 34.996749s (0.000915s ago):
[   34.997742]  test_alloc+0x29c/0x628
[   34.997782]  test_double_free+0xd4/0x238
[   34.997821]  kunit_try_run_case+0x170/0x3f0
[   34.997862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.997907]  kthread+0x328/0x630
[   34.997945]  ret_from_fork+0x10/0x20
[   34.997985] 
[   34.998009] freed by task 334 on cpu 0 at 34.996829s (0.001177s ago):
[   34.998093]  test_double_free+0x1ac/0x238
[   34.998133]  kunit_try_run_case+0x170/0x3f0
[   34.998174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.998220]  kthread+0x328/0x630
[   34.998257]  ret_from_fork+0x10/0x20
[   34.998297] 
[   34.998341] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   34.998430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.998459] Hardware name: linux,dummy-virt (DT)
[   34.998492] ==================================================================
[   35.100996] ==================================================================
[   35.101105] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   35.101105] 
[   35.101172] Invalid free of 0x0000000062d1ec6e (in kfence-#141):
[   35.101231]  test_double_free+0x100/0x238
[   35.101278]  kunit_try_run_case+0x170/0x3f0
[   35.101321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.101367]  kthread+0x328/0x630
[   35.101409]  ret_from_fork+0x10/0x20
[   35.101448] 
[   35.101473] kfence-#141: 0x0000000062d1ec6e-0x0000000036b72e47, size=32, cache=test
[   35.101473] 
[   35.101530] allocated by task 336 on cpu 0 at 35.100773s (0.000752s ago):
[   35.101599]  test_alloc+0x230/0x628
[   35.101638]  test_double_free+0xd4/0x238
[   35.101678]  kunit_try_run_case+0x170/0x3f0
[   35.101717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.101762]  kthread+0x328/0x630
[   35.101800]  ret_from_fork+0x10/0x20
[   35.101839] 
[   35.101862] freed by task 336 on cpu 0 at 35.100847s (0.001012s ago):
[   35.101931]  test_double_free+0xf0/0x238
[   35.101971]  kunit_try_run_case+0x170/0x3f0
[   35.102010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.102065]  kthread+0x328/0x630
[   35.102102]  ret_from_fork+0x10/0x20
[   35.102142] 
[   35.102183] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   35.102270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.102299] Hardware name: linux,dummy-virt (DT)
[   35.102335] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   34.581107] ==================================================================
[   34.581216] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   34.581216] 
[   34.581316] Use-after-free read at 0x00000000c3e386c6 (in kfence-#136):
[   34.581371]  test_use_after_free_read+0x114/0x248
[   34.581417]  kunit_try_run_case+0x170/0x3f0
[   34.581461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.581503]  kthread+0x328/0x630
[   34.581544]  ret_from_fork+0x10/0x20
[   34.581582] 
[   34.581606] kfence-#136: 0x00000000c3e386c6-0x000000007eeb7709, size=32, cache=kmalloc-32
[   34.581606] 
[   34.581659] allocated by task 326 on cpu 1 at 34.580788s (0.000867s ago):
[   34.581733]  test_alloc+0x29c/0x628
[   34.581770]  test_use_after_free_read+0xd0/0x248
[   34.581811]  kunit_try_run_case+0x170/0x3f0
[   34.581848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.581891]  kthread+0x328/0x630
[   34.581926]  ret_from_fork+0x10/0x20
[   34.581970] 
[   34.582115] freed by task 326 on cpu 1 at 34.580867s (0.001148s ago):
[   34.582232]  test_use_after_free_read+0x1c0/0x248
[   34.582275]  kunit_try_run_case+0x170/0x3f0
[   34.582317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.582358]  kthread+0x328/0x630
[   34.582394]  ret_from_fork+0x10/0x20
[   34.582446] 
[   34.582495] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   34.582577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.582607] Hardware name: linux,dummy-virt (DT)
[   34.582643] ==================================================================
[   34.684995] ==================================================================
[   34.685106] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   34.685106] 
[   34.685198] Use-after-free read at 0x00000000f5ed2f20 (in kfence-#137):
[   34.685253]  test_use_after_free_read+0x114/0x248
[   34.685299]  kunit_try_run_case+0x170/0x3f0
[   34.685343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.685386]  kthread+0x328/0x630
[   34.685426]  ret_from_fork+0x10/0x20
[   34.685466] 
[   34.685491] kfence-#137: 0x00000000f5ed2f20-0x0000000041e8e864, size=32, cache=test
[   34.685491] 
[   34.685542] allocated by task 328 on cpu 0 at 34.684782s (0.000757s ago):
[   34.685614]  test_alloc+0x230/0x628
[   34.685653]  test_use_after_free_read+0xd0/0x248
[   34.685691]  kunit_try_run_case+0x170/0x3f0
[   34.685728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.685772]  kthread+0x328/0x630
[   34.685807]  ret_from_fork+0x10/0x20
[   34.685846] 
[   34.685869] freed by task 328 on cpu 0 at 34.684852s (0.001014s ago):
[   34.685971]  test_use_after_free_read+0xf0/0x248
[   34.686011]  kunit_try_run_case+0x170/0x3f0
[   34.686051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.686107]  kthread+0x328/0x630
[   34.686144]  ret_from_fork+0x10/0x20
[   34.686181] 
[   34.686226] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   34.686307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.686337] Hardware name: linux,dummy-virt (DT)
[   34.686370] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   33.745625] ==================================================================
[   33.745799] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   33.745799] 
[   33.745895] Out-of-bounds write at 0x0000000078fb2b03 (1B left of kfence-#128):
[   33.746098]  test_out_of_bounds_write+0x100/0x240
[   33.746161]  kunit_try_run_case+0x170/0x3f0
[   33.746208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.746409]  kthread+0x328/0x630
[   33.746482]  ret_from_fork+0x10/0x20
[   33.746524] 
[   33.746550] kfence-#128: 0x00000000a89ff8d1-0x000000001e2194de, size=32, cache=kmalloc-32
[   33.746550] 
[   33.746659] allocated by task 322 on cpu 0 at 33.745114s (0.001540s ago):
[   33.746735]  test_alloc+0x29c/0x628
[   33.746779]  test_out_of_bounds_write+0xc8/0x240
[   33.746819]  kunit_try_run_case+0x170/0x3f0
[   33.746858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.746913]  kthread+0x328/0x630
[   33.746959]  ret_from_fork+0x10/0x20
[   33.746997] 
[   33.747050] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   33.747155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.747183] Hardware name: linux,dummy-virt (DT)
[   33.747215] ==================================================================
[   34.476899] ==================================================================
[   34.477002] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   34.477002] 
[   34.477110] Out-of-bounds write at 0x0000000080ee08af (1B left of kfence-#135):
[   34.477170]  test_out_of_bounds_write+0x100/0x240
[   34.477217]  kunit_try_run_case+0x170/0x3f0
[   34.477262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.477307]  kthread+0x328/0x630
[   34.477346]  ret_from_fork+0x10/0x20
[   34.477384] 
[   34.477410] kfence-#135: 0x00000000ac9ead87-0x0000000086b81259, size=32, cache=test
[   34.477410] 
[   34.477462] allocated by task 324 on cpu 0 at 34.476806s (0.000652s ago):
[   34.477536]  test_alloc+0x230/0x628
[   34.477575]  test_out_of_bounds_write+0xc8/0x240
[   34.477616]  kunit_try_run_case+0x170/0x3f0
[   34.477656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.477698]  kthread+0x328/0x630
[   34.477734]  ret_from_fork+0x10/0x20
[   34.477772] 
[   34.477816] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   34.477895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.477924] Hardware name: linux,dummy-virt (DT)
[   34.477959] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   32.602305] ==================================================================
[   32.602427] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   32.602427] 
[   32.602554] Out-of-bounds read at 0x0000000064bb840d (1B left of kfence-#117):
[   32.602999]  test_out_of_bounds_read+0x114/0x3e0
[   32.603104]  kunit_try_run_case+0x170/0x3f0
[   32.603177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.603228]  kthread+0x328/0x630
[   32.603299]  ret_from_fork+0x10/0x20
[   32.603372] 
[   32.603564] kfence-#117: 0x00000000a8e2d72b-0x00000000a2593e13, size=32, cache=kmalloc-32
[   32.603564] 
[   32.603738] allocated by task 318 on cpu 0 at 32.601199s (0.002483s ago):
[   32.604097]  test_alloc+0x29c/0x628
[   32.604159]  test_out_of_bounds_read+0xdc/0x3e0
[   32.604345]  kunit_try_run_case+0x170/0x3f0
[   32.604413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.604456]  kthread+0x328/0x630
[   32.604639]  ret_from_fork+0x10/0x20
[   32.605084] 
[   32.605215] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.605331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.605360] Hardware name: linux,dummy-virt (DT)
[   32.605399] ==================================================================
[   33.225185] ==================================================================
[   33.225302] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   33.225302] 
[   33.225386] Out-of-bounds read at 0x000000000dba6bbf (32B right of kfence-#123):
[   33.225444]  test_out_of_bounds_read+0x1c8/0x3e0
[   33.225491]  kunit_try_run_case+0x170/0x3f0
[   33.225532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.225574]  kthread+0x328/0x630
[   33.225613]  ret_from_fork+0x10/0x20
[   33.225652] 
[   33.225699] kfence-#123: 0x0000000054bcea64-0x0000000092510b3a, size=32, cache=test
[   33.225699] 
[   33.225870] allocated by task 320 on cpu 0 at 33.225043s (0.000705s ago):
[   33.225970]  test_alloc+0x230/0x628
[   33.226010]  test_out_of_bounds_read+0x198/0x3e0
[   33.228090]  kunit_try_run_case+0x170/0x3f0
[   33.228143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.228184]  kthread+0x328/0x630
[   33.228219]  ret_from_fork+0x10/0x20
[   33.228259] 
[   33.228298] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   33.228377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.228403] Hardware name: linux,dummy-virt (DT)
[   33.228436] ==================================================================
[   33.121197] ==================================================================
[   33.121275] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   33.121275] 
[   33.121455] Out-of-bounds read at 0x000000004bd28133 (1B left of kfence-#122):
[   33.121629]  test_out_of_bounds_read+0x114/0x3e0
[   33.121702]  kunit_try_run_case+0x170/0x3f0
[   33.121780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.121823]  kthread+0x328/0x630
[   33.121891]  ret_from_fork+0x10/0x20
[   33.121959] 
[   33.121984] kfence-#122: 0x0000000026db3f89-0x0000000009c30ab1, size=32, cache=test
[   33.121984] 
[   33.122036] allocated by task 320 on cpu 0 at 33.120982s (0.001050s ago):
[   33.122163]  test_alloc+0x230/0x628
[   33.122229]  test_out_of_bounds_read+0xdc/0x3e0
[   33.122356]  kunit_try_run_case+0x170/0x3f0
[   33.122437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.122481]  kthread+0x328/0x630
[   33.122545]  ret_from_fork+0x10/0x20
[   33.122585] 
[   33.122659] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   33.122741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.122779] Hardware name: linux,dummy-virt (DT)
[   33.122812] ==================================================================
[   32.811218] ==================================================================
[   32.811315] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   32.811315] 
[   32.811494] Out-of-bounds read at 0x000000009c637b7b (32B right of kfence-#119):
[   32.811558]  test_out_of_bounds_read+0x1c8/0x3e0
[   32.811615]  kunit_try_run_case+0x170/0x3f0
[   32.811659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.811702]  kthread+0x328/0x630
[   32.811739]  ret_from_fork+0x10/0x20
[   32.811778] 
[   32.811809] kfence-#119: 0x000000006d72e308-0x00000000c2dd7477, size=32, cache=kmalloc-32
[   32.811809] 
[   32.811877] allocated by task 318 on cpu 0 at 32.810952s (0.000920s ago):
[   32.811950]  test_alloc+0x29c/0x628
[   32.811997]  test_out_of_bounds_read+0x198/0x3e0
[   32.812041]  kunit_try_run_case+0x170/0x3f0
[   32.812100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.812143]  kthread+0x328/0x630
[   32.812178]  ret_from_fork+0x10/0x20
[   32.812215] 
[   32.812259] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.812341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.812370] Hardware name: linux,dummy-virt (DT)
[   32.812401] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   32.460230] ==================================================================
[   32.460281] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   32.460338] Write of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316
[   32.460391] 
[   32.460423] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.460506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.460536] Hardware name: linux,dummy-virt (DT)
[   32.460569] Call trace:
[   32.460591]  show_stack+0x20/0x38 (C)
[   32.460639]  dump_stack_lvl+0x8c/0xd0
[   32.460689]  print_report+0x118/0x5d0
[   32.460733]  kasan_report+0xdc/0x128
[   32.460779]  kasan_check_range+0x100/0x1a8
[   32.460826]  __kasan_check_write+0x20/0x30
[   32.460874]  strncpy_from_user+0x3c/0x2a0
[   32.460923]  copy_user_test_oob+0x5c0/0xec8
[   32.460973]  kunit_try_run_case+0x170/0x3f0
[   32.461019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.461714]  kthread+0x328/0x630
[   32.461834]  ret_from_fork+0x10/0x20
[   32.461941] 
[   32.462077] Allocated by task 316:
[   32.462126]  kasan_save_stack+0x3c/0x68
[   32.462318]  kasan_save_track+0x20/0x40
[   32.462390]  kasan_save_alloc_info+0x40/0x58
[   32.462455]  __kasan_kmalloc+0xd4/0xd8
[   32.462531]  __kmalloc_noprof+0x198/0x4c8
[   32.462645]  kunit_kmalloc_array+0x34/0x88
[   32.462789]  copy_user_test_oob+0xac/0xec8
[   32.462968]  kunit_try_run_case+0x170/0x3f0
[   32.463015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.463318]  kthread+0x328/0x630
[   32.463418]  ret_from_fork+0x10/0x20
[   32.463478] 
[   32.463713] The buggy address belongs to the object at fff00000c98f2e00
[   32.463713]  which belongs to the cache kmalloc-128 of size 128
[   32.463825] The buggy address is located 0 bytes inside of
[   32.463825]  allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78)
[   32.464005] 
[   32.464083] The buggy address belongs to the physical page:
[   32.464239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   32.464297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.464538] page_type: f5(slab)
[   32.464702] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.464814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.465097] page dumped because: kasan: bad access detected
[   32.465238] 
[   32.465274] Memory state around the buggy address:
[   32.465310]  fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.465466]  fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.465632] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.465736]                                                                 ^
[   32.465826]  fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.466086]  fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.466145] ==================================================================
[   32.467393] ==================================================================
[   32.467664] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   32.467729] Write of size 1 at addr fff00000c98f2e78 by task kunit_try_catch/316
[   32.467836] 
[   32.467870] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.467958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.467985] Hardware name: linux,dummy-virt (DT)
[   32.468018] Call trace:
[   32.468201]  show_stack+0x20/0x38 (C)
[   32.468279]  dump_stack_lvl+0x8c/0xd0
[   32.468400]  print_report+0x118/0x5d0
[   32.468466]  kasan_report+0xdc/0x128
[   32.468635]  __asan_report_store1_noabort+0x20/0x30
[   32.468728]  strncpy_from_user+0x270/0x2a0
[   32.468814]  copy_user_test_oob+0x5c0/0xec8
[   32.468997]  kunit_try_run_case+0x170/0x3f0
[   32.469085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.469147]  kthread+0x328/0x630
[   32.469190]  ret_from_fork+0x10/0x20
[   32.469239] 
[   32.469259] Allocated by task 316:
[   32.469495]  kasan_save_stack+0x3c/0x68
[   32.469681]  kasan_save_track+0x20/0x40
[   32.469776]  kasan_save_alloc_info+0x40/0x58
[   32.470076]  __kasan_kmalloc+0xd4/0xd8
[   32.470114]  __kmalloc_noprof+0x198/0x4c8
[   32.470246]  kunit_kmalloc_array+0x34/0x88
[   32.470343]  copy_user_test_oob+0xac/0xec8
[   32.470486]  kunit_try_run_case+0x170/0x3f0
[   32.470526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.470571]  kthread+0x328/0x630
[   32.470613]  ret_from_fork+0x10/0x20
[   32.470708] 
[   32.470731] The buggy address belongs to the object at fff00000c98f2e00
[   32.470731]  which belongs to the cache kmalloc-128 of size 128
[   32.470811] The buggy address is located 0 bytes to the right of
[   32.470811]  allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78)
[   32.470886] 
[   32.470909] The buggy address belongs to the physical page:
[   32.470954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   32.471009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.471068] page_type: f5(slab)
[   32.471109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.471613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.471682] page dumped because: kasan: bad access detected
[   32.471914] 
[   32.471987] Memory state around the buggy address:
[   32.472154]  fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.472228]  fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.472294] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.472334]                                                                 ^
[   32.472662]  fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.472826]  fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.473011] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   32.455734] ==================================================================
[   32.455784] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   32.456507] Read of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316
[   32.456578] 
[   32.456610] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.457283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.457316] Hardware name: linux,dummy-virt (DT)
[   32.457349] Call trace:
[   32.457384]  show_stack+0x20/0x38 (C)
[   32.457434]  dump_stack_lvl+0x8c/0xd0
[   32.457485]  print_report+0x118/0x5d0
[   32.457531]  kasan_report+0xdc/0x128
[   32.457576]  kasan_check_range+0x100/0x1a8
[   32.457624]  __kasan_check_read+0x20/0x30
[   32.457671]  copy_user_test_oob+0x4a0/0xec8
[   32.457721]  kunit_try_run_case+0x170/0x3f0
[   32.457767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.457820]  kthread+0x328/0x630
[   32.457861]  ret_from_fork+0x10/0x20
[   32.457910] 
[   32.457931] Allocated by task 316:
[   32.457961]  kasan_save_stack+0x3c/0x68
[   32.458001]  kasan_save_track+0x20/0x40
[   32.458040]  kasan_save_alloc_info+0x40/0x58
[   32.458091]  __kasan_kmalloc+0xd4/0xd8
[   32.458128]  __kmalloc_noprof+0x198/0x4c8
[   32.458168]  kunit_kmalloc_array+0x34/0x88
[   32.458208]  copy_user_test_oob+0xac/0xec8
[   32.458247]  kunit_try_run_case+0x170/0x3f0
[   32.458285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.458329]  kthread+0x328/0x630
[   32.458365]  ret_from_fork+0x10/0x20
[   32.458401] 
[   32.458423] The buggy address belongs to the object at fff00000c98f2e00
[   32.458423]  which belongs to the cache kmalloc-128 of size 128
[   32.458482] The buggy address is located 0 bytes inside of
[   32.458482]  allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78)
[   32.458546] 
[   32.458568] The buggy address belongs to the physical page:
[   32.458601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   32.458652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.458702] page_type: f5(slab)
[   32.458742] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.458801] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.458843] page dumped because: kasan: bad access detected
[   32.458878] 
[   32.458898] Memory state around the buggy address:
[   32.458931]  fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.458976]  fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.459020] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.459131]                                                                 ^
[   32.459174]  fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.459218]  fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.459258] ==================================================================
[   32.450456] ==================================================================
[   32.450650] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   32.450723] Write of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316
[   32.450788] 
[   32.450889] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.450998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.451033] Hardware name: linux,dummy-virt (DT)
[   32.451076] Call trace:
[   32.451101]  show_stack+0x20/0x38 (C)
[   32.451286]  dump_stack_lvl+0x8c/0xd0
[   32.451344]  print_report+0x118/0x5d0
[   32.451390]  kasan_report+0xdc/0x128
[   32.451482]  kasan_check_range+0x100/0x1a8
[   32.451554]  __kasan_check_write+0x20/0x30
[   32.451639]  copy_user_test_oob+0x434/0xec8
[   32.451849]  kunit_try_run_case+0x170/0x3f0
[   32.451917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.451994]  kthread+0x328/0x630
[   32.452050]  ret_from_fork+0x10/0x20
[   32.452149] 
[   32.452197] Allocated by task 316:
[   32.452244]  kasan_save_stack+0x3c/0x68
[   32.452287]  kasan_save_track+0x20/0x40
[   32.452333]  kasan_save_alloc_info+0x40/0x58
[   32.452435]  __kasan_kmalloc+0xd4/0xd8
[   32.452515]  __kmalloc_noprof+0x198/0x4c8
[   32.452633]  kunit_kmalloc_array+0x34/0x88
[   32.452674]  copy_user_test_oob+0xac/0xec8
[   32.452724]  kunit_try_run_case+0x170/0x3f0
[   32.452764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.453128]  kthread+0x328/0x630
[   32.453222]  ret_from_fork+0x10/0x20
[   32.453301] 
[   32.453512] The buggy address belongs to the object at fff00000c98f2e00
[   32.453512]  which belongs to the cache kmalloc-128 of size 128
[   32.453587] The buggy address is located 0 bytes inside of
[   32.453587]  allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78)
[   32.453653] 
[   32.453735] The buggy address belongs to the physical page:
[   32.453769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   32.453822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.453871] page_type: f5(slab)
[   32.453919] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.453984] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.454033] page dumped because: kasan: bad access detected
[   32.454101] 
[   32.454336] Memory state around the buggy address:
[   32.454486]  fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.454579]  fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.454720] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.454793]                                                                 ^
[   32.454841]  fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.455043]  fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.455227] ==================================================================
[   32.430365] ==================================================================
[   32.430438] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   32.430512] Read of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316
[   32.430567] 
[   32.430613] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.430701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.430728] Hardware name: linux,dummy-virt (DT)
[   32.430761] Call trace:
[   32.430792]  show_stack+0x20/0x38 (C)
[   32.430841]  dump_stack_lvl+0x8c/0xd0
[   32.430890]  print_report+0x118/0x5d0
[   32.430935]  kasan_report+0xdc/0x128
[   32.430980]  kasan_check_range+0x100/0x1a8
[   32.431043]  __kasan_check_read+0x20/0x30
[   32.431109]  copy_user_test_oob+0x728/0xec8
[   32.431194]  kunit_try_run_case+0x170/0x3f0
[   32.431259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.431332]  kthread+0x328/0x630
[   32.431396]  ret_from_fork+0x10/0x20
[   32.431479] 
[   32.431793] Allocated by task 316:
[   32.431825]  kasan_save_stack+0x3c/0x68
[   32.431883]  kasan_save_track+0x20/0x40
[   32.431938]  kasan_save_alloc_info+0x40/0x58
[   32.432007]  __kasan_kmalloc+0xd4/0xd8
[   32.432090]  __kmalloc_noprof+0x198/0x4c8
[   32.432135]  kunit_kmalloc_array+0x34/0x88
[   32.432175]  copy_user_test_oob+0xac/0xec8
[   32.432215]  kunit_try_run_case+0x170/0x3f0
[   32.432272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.432317]  kthread+0x328/0x630
[   32.432363]  ret_from_fork+0x10/0x20
[   32.432402] 
[   32.432423] The buggy address belongs to the object at fff00000c98f2e00
[   32.432423]  which belongs to the cache kmalloc-128 of size 128
[   32.432484] The buggy address is located 0 bytes inside of
[   32.432484]  allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78)
[   32.432547] 
[   32.432568] The buggy address belongs to the physical page:
[   32.432601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   32.432654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.432703] page_type: f5(slab)
[   32.432741] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.432807] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.432888] page dumped because: kasan: bad access detected
[   32.432981] 
[   32.433062] Memory state around the buggy address:
[   32.433118]  fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.433270]  fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.433330] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.433371]                                                                 ^
[   32.433414]  fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.433456]  fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.433495] ==================================================================
[   32.438283] ==================================================================
[   32.438357] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   32.438429] Write of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316
[   32.438499] 
[   32.438562] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.438648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.438677] Hardware name: linux,dummy-virt (DT)
[   32.438710] Call trace:
[   32.438909]  show_stack+0x20/0x38 (C)
[   32.438959]  dump_stack_lvl+0x8c/0xd0
[   32.439162]  print_report+0x118/0x5d0
[   32.439253]  kasan_report+0xdc/0x128
[   32.439306]  kasan_check_range+0x100/0x1a8
[   32.439370]  __kasan_check_write+0x20/0x30
[   32.439607]  copy_user_test_oob+0x35c/0xec8
[   32.439694]  kunit_try_run_case+0x170/0x3f0
[   32.439746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.439798]  kthread+0x328/0x630
[   32.439842]  ret_from_fork+0x10/0x20
[   32.439982] 
[   32.440007] Allocated by task 316:
[   32.440036]  kasan_save_stack+0x3c/0x68
[   32.440281]  kasan_save_track+0x20/0x40
[   32.440389]  kasan_save_alloc_info+0x40/0x58
[   32.440434]  __kasan_kmalloc+0xd4/0xd8
[   32.440489]  __kmalloc_noprof+0x198/0x4c8
[   32.440606]  kunit_kmalloc_array+0x34/0x88
[   32.440863]  copy_user_test_oob+0xac/0xec8
[   32.440927]  kunit_try_run_case+0x170/0x3f0
[   32.440968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.441040]  kthread+0x328/0x630
[   32.441146]  ret_from_fork+0x10/0x20
[   32.441235] 
[   32.441259] The buggy address belongs to the object at fff00000c98f2e00
[   32.441259]  which belongs to the cache kmalloc-128 of size 128
[   32.441319] The buggy address is located 0 bytes inside of
[   32.441319]  allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78)
[   32.441426] 
[   32.441448] The buggy address belongs to the physical page:
[   32.441482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   32.441534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.441591] page_type: f5(slab)
[   32.441645] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.441702] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.441755] page dumped because: kasan: bad access detected
[   32.441804] 
[   32.441829] Memory state around the buggy address:
[   32.441878]  fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.441923]  fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.441967] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.442007]                                                                 ^
[   32.442076]  fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.442117]  fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.442166] ==================================================================
[   32.419725] ==================================================================
[   32.419946] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   32.420066] Write of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316
[   32.420153] 
[   32.420220] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.420312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.420339] Hardware name: linux,dummy-virt (DT)
[   32.420384] Call trace:
[   32.420485]  show_stack+0x20/0x38 (C)
[   32.420563]  dump_stack_lvl+0x8c/0xd0
[   32.420651]  print_report+0x118/0x5d0
[   32.420698]  kasan_report+0xdc/0x128
[   32.420874]  kasan_check_range+0x100/0x1a8
[   32.420924]  __kasan_check_write+0x20/0x30
[   32.420972]  copy_user_test_oob+0x234/0xec8
[   32.421211]  kunit_try_run_case+0x170/0x3f0
[   32.421373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.421428]  kthread+0x328/0x630
[   32.421481]  ret_from_fork+0x10/0x20
[   32.421577] 
[   32.421608] Allocated by task 316:
[   32.421656]  kasan_save_stack+0x3c/0x68
[   32.421702]  kasan_save_track+0x20/0x40
[   32.421745]  kasan_save_alloc_info+0x40/0x58
[   32.421792]  __kasan_kmalloc+0xd4/0xd8
[   32.421830]  __kmalloc_noprof+0x198/0x4c8
[   32.421880]  kunit_kmalloc_array+0x34/0x88
[   32.421929]  copy_user_test_oob+0xac/0xec8
[   32.421969]  kunit_try_run_case+0x170/0x3f0
[   32.422008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.422068]  kthread+0x328/0x630
[   32.422102]  ret_from_fork+0x10/0x20
[   32.422139] 
[   32.422161] The buggy address belongs to the object at fff00000c98f2e00
[   32.422161]  which belongs to the cache kmalloc-128 of size 128
[   32.422223] The buggy address is located 0 bytes inside of
[   32.422223]  allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78)
[   32.422487] 
[   32.422783] The buggy address belongs to the physical page:
[   32.422914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   32.426093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.426154] page_type: f5(slab)
[   32.426200] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.426252] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.426297] page dumped because: kasan: bad access detected
[   32.426330] 
[   32.426352] Memory state around the buggy address:
[   32.426386]  fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.426430]  fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.426476] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.426515]                                                                 ^
[   32.426559]  fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.426601]  fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.426642] ==================================================================
[   32.443375] ==================================================================
[   32.443460] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   32.443514] Read of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316
[   32.443573] 
[   32.443675] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.443770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.443798] Hardware name: linux,dummy-virt (DT)
[   32.443831] Call trace:
[   32.443958]  show_stack+0x20/0x38 (C)
[   32.444255]  dump_stack_lvl+0x8c/0xd0
[   32.444348]  print_report+0x118/0x5d0
[   32.444450]  kasan_report+0xdc/0x128
[   32.444553]  kasan_check_range+0x100/0x1a8
[   32.444621]  __kasan_check_read+0x20/0x30
[   32.444808]  copy_user_test_oob+0x3c8/0xec8
[   32.444858]  kunit_try_run_case+0x170/0x3f0
[   32.445017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.445202]  kthread+0x328/0x630
[   32.445306]  ret_from_fork+0x10/0x20
[   32.445542] 
[   32.445563] Allocated by task 316:
[   32.445602]  kasan_save_stack+0x3c/0x68
[   32.445683]  kasan_save_track+0x20/0x40
[   32.445778]  kasan_save_alloc_info+0x40/0x58
[   32.445864]  __kasan_kmalloc+0xd4/0xd8
[   32.445992]  __kmalloc_noprof+0x198/0x4c8
[   32.446037]  kunit_kmalloc_array+0x34/0x88
[   32.446130]  copy_user_test_oob+0xac/0xec8
[   32.446469]  kunit_try_run_case+0x170/0x3f0
[   32.446542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.446725]  kthread+0x328/0x630
[   32.446946]  ret_from_fork+0x10/0x20
[   32.447029] 
[   32.447126] The buggy address belongs to the object at fff00000c98f2e00
[   32.447126]  which belongs to the cache kmalloc-128 of size 128
[   32.447267] The buggy address is located 0 bytes inside of
[   32.447267]  allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78)
[   32.447389] 
[   32.447488] The buggy address belongs to the physical page:
[   32.447521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   32.447575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.447805] page_type: f5(slab)
[   32.447947] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.448051] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.448288] page dumped because: kasan: bad access detected
[   32.448427] 
[   32.448477] Memory state around the buggy address:
[   32.448663]  fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.448731]  fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.448778] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.448825]                                                                 ^
[   32.448868]  fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.449079]  fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.449239] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   32.394638] ==================================================================
[   32.394745] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   32.394832] Read of size 8 at addr fff00000c98f2d78 by task kunit_try_catch/312
[   32.394901] 
[   32.394977] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.395078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.395107] Hardware name: linux,dummy-virt (DT)
[   32.395140] Call trace:
[   32.395322]  show_stack+0x20/0x38 (C)
[   32.395375]  dump_stack_lvl+0x8c/0xd0
[   32.395427]  print_report+0x118/0x5d0
[   32.395510]  kasan_report+0xdc/0x128
[   32.395569]  __asan_report_load8_noabort+0x20/0x30
[   32.395621]  copy_to_kernel_nofault+0x204/0x250
[   32.395693]  copy_to_kernel_nofault_oob+0x158/0x418
[   32.395746]  kunit_try_run_case+0x170/0x3f0
[   32.395820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.395901]  kthread+0x328/0x630
[   32.395961]  ret_from_fork+0x10/0x20
[   32.396010] 
[   32.396032] Allocated by task 312:
[   32.396072]  kasan_save_stack+0x3c/0x68
[   32.396235]  kasan_save_track+0x20/0x40
[   32.396284]  kasan_save_alloc_info+0x40/0x58
[   32.396335]  __kasan_kmalloc+0xd4/0xd8
[   32.396392]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.396444]  copy_to_kernel_nofault_oob+0xc8/0x418
[   32.396587]  kunit_try_run_case+0x170/0x3f0
[   32.396671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.396782]  kthread+0x328/0x630
[   32.396893]  ret_from_fork+0x10/0x20
[   32.397028] 
[   32.397122] The buggy address belongs to the object at fff00000c98f2d00
[   32.397122]  which belongs to the cache kmalloc-128 of size 128
[   32.397224] The buggy address is located 0 bytes to the right of
[   32.397224]  allocated 120-byte region [fff00000c98f2d00, fff00000c98f2d78)
[   32.397321] 
[   32.397344] The buggy address belongs to the physical page:
[   32.397378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   32.397662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.397712] page_type: f5(slab)
[   32.397755] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.397884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.397979] page dumped because: kasan: bad access detected
[   32.398061] 
[   32.398089] Memory state around the buggy address:
[   32.398135]  fff00000c98f2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.398181]  fff00000c98f2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.398233] >fff00000c98f2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.398282]                                                                 ^
[   32.398335]  fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.398379]  fff00000c98f2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.398420] ==================================================================
[   32.398657] ==================================================================
[   32.398856] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   32.399082] Write of size 8 at addr fff00000c98f2d78 by task kunit_try_catch/312
[   32.399136] 
[   32.399184] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.399287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.399420] Hardware name: linux,dummy-virt (DT)
[   32.399463] Call trace:
[   32.399597]  show_stack+0x20/0x38 (C)
[   32.399649]  dump_stack_lvl+0x8c/0xd0
[   32.399714]  print_report+0x118/0x5d0
[   32.399813]  kasan_report+0xdc/0x128
[   32.399885]  kasan_check_range+0x100/0x1a8
[   32.399936]  __kasan_check_write+0x20/0x30
[   32.399989]  copy_to_kernel_nofault+0x8c/0x250
[   32.400090]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   32.400163]  kunit_try_run_case+0x170/0x3f0
[   32.400227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.400297]  kthread+0x328/0x630
[   32.400379]  ret_from_fork+0x10/0x20
[   32.400586] 
[   32.400715] Allocated by task 312:
[   32.400775]  kasan_save_stack+0x3c/0x68
[   32.400851]  kasan_save_track+0x20/0x40
[   32.400994]  kasan_save_alloc_info+0x40/0x58
[   32.401429]  __kasan_kmalloc+0xd4/0xd8
[   32.401476]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.401520]  copy_to_kernel_nofault_oob+0xc8/0x418
[   32.401561]  kunit_try_run_case+0x170/0x3f0
[   32.401600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.401645]  kthread+0x328/0x630
[   32.401678]  ret_from_fork+0x10/0x20
[   32.401716] 
[   32.401739] The buggy address belongs to the object at fff00000c98f2d00
[   32.401739]  which belongs to the cache kmalloc-128 of size 128
[   32.401799] The buggy address is located 0 bytes to the right of
[   32.401799]  allocated 120-byte region [fff00000c98f2d00, fff00000c98f2d78)
[   32.401867] 
[   32.401888] The buggy address belongs to the physical page:
[   32.401920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   32.401974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.402022] page_type: f5(slab)
[   32.402076] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.402129] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.402171] page dumped because: kasan: bad access detected
[   32.402204] 
[   32.402269] Memory state around the buggy address:
[   32.402318]  fff00000c98f2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.402365]  fff00000c98f2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.402422] >fff00000c98f2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.402471]                                                                 ^
[   32.402514]  fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.402573]  fff00000c98f2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.402630] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   32.368231] ==================================================================
[   32.368279] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   32.368330] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300
[   32.368380] 
[   32.368421] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.368507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.368537] Hardware name: linux,dummy-virt (DT)
[   32.368569] Call trace:
[   32.368593]  show_stack+0x20/0x38 (C)
[   32.368643]  dump_stack_lvl+0x8c/0xd0
[   32.368691]  print_report+0x310/0x5d0
[   32.368737]  kasan_report+0xdc/0x128
[   32.368781]  __asan_report_load1_noabort+0x20/0x30
[   32.368831]  vmalloc_oob+0x51c/0x5d0
[   32.368878]  kunit_try_run_case+0x170/0x3f0
[   32.368924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.368978]  kthread+0x328/0x630
[   32.369020]  ret_from_fork+0x10/0x20
[   32.369081] 
[   32.369145] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   32.369188] The buggy address belongs to the physical page:
[   32.369220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b30
[   32.369289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.369360] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.369419] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.369462] page dumped because: kasan: bad access detected
[   32.369496] 
[   32.369516] Memory state around the buggy address:
[   32.369556]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.369601]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.369644] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   32.369685]                                                                 ^
[   32.369727]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.369795]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.369850] ==================================================================
[   32.362438] ==================================================================
[   32.362516] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   32.362873] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300
[   32.362967] 
[   32.363138] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.363232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.363380] Hardware name: linux,dummy-virt (DT)
[   32.363424] Call trace:
[   32.363451]  show_stack+0x20/0x38 (C)
[   32.363508]  dump_stack_lvl+0x8c/0xd0
[   32.363617]  print_report+0x310/0x5d0
[   32.363700]  kasan_report+0xdc/0x128
[   32.363965]  __asan_report_load1_noabort+0x20/0x30
[   32.364049]  vmalloc_oob+0x578/0x5d0
[   32.364113]  kunit_try_run_case+0x170/0x3f0
[   32.364227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.364322]  kthread+0x328/0x630
[   32.364482]  ret_from_fork+0x10/0x20
[   32.364690] 
[   32.364857] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   32.364960] The buggy address belongs to the physical page:
[   32.365038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b30
[   32.365224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.365295] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.365349] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.365391] page dumped because: kasan: bad access detected
[   32.365654] 
[   32.365765] Memory state around the buggy address:
[   32.365855]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.366139]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.366193] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   32.366234]                                                              ^
[   32.366276]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.366319]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.366361] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   32.184694] ==================================================================
[   32.184988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   32.185103] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.185203] 
[   32.185260] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.185347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.185377] Hardware name: linux,dummy-virt (DT)
[   32.185410] Call trace:
[   32.185432]  show_stack+0x20/0x38 (C)
[   32.185497]  dump_stack_lvl+0x8c/0xd0
[   32.185703]  print_report+0x118/0x5d0
[   32.185790]  kasan_report+0xdc/0x128
[   32.185839]  __asan_report_load4_noabort+0x20/0x30
[   32.186052]  kasan_atomics_helper+0x3e04/0x4858
[   32.186127]  kasan_atomics+0x198/0x2e0
[   32.186177]  kunit_try_run_case+0x170/0x3f0
[   32.186225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.186279]  kthread+0x328/0x630
[   32.186324]  ret_from_fork+0x10/0x20
[   32.186387] 
[   32.186407] Allocated by task 296:
[   32.186455]  kasan_save_stack+0x3c/0x68
[   32.186502]  kasan_save_track+0x20/0x40
[   32.186541]  kasan_save_alloc_info+0x40/0x58
[   32.186581]  __kasan_kmalloc+0xd4/0xd8
[   32.186634]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.186677]  kasan_atomics+0xb8/0x2e0
[   32.186715]  kunit_try_run_case+0x170/0x3f0
[   32.186827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.186892]  kthread+0x328/0x630
[   32.186926]  ret_from_fork+0x10/0x20
[   32.186964] 
[   32.187240] The buggy address belongs to the object at fff00000c9abb900
[   32.187240]  which belongs to the cache kmalloc-64 of size 64
[   32.187308] The buggy address is located 0 bytes to the right of
[   32.187308]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.187374] 
[   32.187414] The buggy address belongs to the physical page:
[   32.187533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.187627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.187751] page_type: f5(slab)
[   32.187798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.187850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.187892] page dumped because: kasan: bad access detected
[   32.187926] 
[   32.187947] Memory state around the buggy address:
[   32.187979]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.188024]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.188079] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.188119]                                      ^
[   32.188154]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.188199]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.188239] ==================================================================
[   32.325877] ==================================================================
[   32.325927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   32.325997] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.326210] 
[   32.326243] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.326408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.326609] Hardware name: linux,dummy-virt (DT)
[   32.326666] Call trace:
[   32.326799]  show_stack+0x20/0x38 (C)
[   32.326873]  dump_stack_lvl+0x8c/0xd0
[   32.326925]  print_report+0x118/0x5d0
[   32.326988]  kasan_report+0xdc/0x128
[   32.327083]  __asan_report_load8_noabort+0x20/0x30
[   32.327139]  kasan_atomics_helper+0x3e10/0x4858
[   32.327192]  kasan_atomics+0x198/0x2e0
[   32.327250]  kunit_try_run_case+0x170/0x3f0
[   32.327300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.327354]  kthread+0x328/0x630
[   32.327408]  ret_from_fork+0x10/0x20
[   32.327458] 
[   32.327478] Allocated by task 296:
[   32.327516]  kasan_save_stack+0x3c/0x68
[   32.327557]  kasan_save_track+0x20/0x40
[   32.327595]  kasan_save_alloc_info+0x40/0x58
[   32.327644]  __kasan_kmalloc+0xd4/0xd8
[   32.327681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.327724]  kasan_atomics+0xb8/0x2e0
[   32.327780]  kunit_try_run_case+0x170/0x3f0
[   32.327828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.327879]  kthread+0x328/0x630
[   32.327914]  ret_from_fork+0x10/0x20
[   32.327952] 
[   32.327972] The buggy address belongs to the object at fff00000c9abb900
[   32.327972]  which belongs to the cache kmalloc-64 of size 64
[   32.328030] The buggy address is located 0 bytes to the right of
[   32.328030]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.328344] 
[   32.328396] The buggy address belongs to the physical page:
[   32.328446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.328515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.328562] page_type: f5(slab)
[   32.328603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.328653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.328826] page dumped because: kasan: bad access detected
[   32.329013] 
[   32.329112] Memory state around the buggy address:
[   32.329247]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.329311]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.329355] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.329538]                                      ^
[   32.329586]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.329748]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.329931] ==================================================================
[   32.188375] ==================================================================
[   32.188638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   32.188692] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.188743] 
[   32.188811] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.189203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.189233] Hardware name: linux,dummy-virt (DT)
[   32.189266] Call trace:
[   32.189291]  show_stack+0x20/0x38 (C)
[   32.189343]  dump_stack_lvl+0x8c/0xd0
[   32.189391]  print_report+0x118/0x5d0
[   32.189437]  kasan_report+0xdc/0x128
[   32.189482]  kasan_check_range+0x100/0x1a8
[   32.189530]  __kasan_check_read+0x20/0x30
[   32.189578]  kasan_atomics_helper+0xdd4/0x4858
[   32.189630]  kasan_atomics+0x198/0x2e0
[   32.189676]  kunit_try_run_case+0x170/0x3f0
[   32.189725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.189778]  kthread+0x328/0x630
[   32.189823]  ret_from_fork+0x10/0x20
[   32.189872] 
[   32.189893] Allocated by task 296:
[   32.189922]  kasan_save_stack+0x3c/0x68
[   32.189963]  kasan_save_track+0x20/0x40
[   32.190001]  kasan_save_alloc_info+0x40/0x58
[   32.190042]  __kasan_kmalloc+0xd4/0xd8
[   32.190146]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.190212]  kasan_atomics+0xb8/0x2e0
[   32.190411]  kunit_try_run_case+0x170/0x3f0
[   32.190495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.190562]  kthread+0x328/0x630
[   32.190598]  ret_from_fork+0x10/0x20
[   32.190636] 
[   32.190667] The buggy address belongs to the object at fff00000c9abb900
[   32.190667]  which belongs to the cache kmalloc-64 of size 64
[   32.190724] The buggy address is located 0 bytes to the right of
[   32.190724]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.191089] 
[   32.191211] The buggy address belongs to the physical page:
[   32.191270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.191368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.191694] page_type: f5(slab)
[   32.191765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.191843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.191997] page dumped because: kasan: bad access detected
[   32.192098] 
[   32.192158] Memory state around the buggy address:
[   32.192286]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.192471]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.192544] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.192706]                                      ^
[   32.192791]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.192847]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.192887] ==================================================================
[   32.247860] ==================================================================
[   32.247929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   32.248010] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.248072] 
[   32.248130] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.248243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.248301] Hardware name: linux,dummy-virt (DT)
[   32.248383] Call trace:
[   32.248593]  show_stack+0x20/0x38 (C)
[   32.248721]  dump_stack_lvl+0x8c/0xd0
[   32.248830]  print_report+0x118/0x5d0
[   32.248976]  kasan_report+0xdc/0x128
[   32.249121]  kasan_check_range+0x100/0x1a8
[   32.249189]  __kasan_check_write+0x20/0x30
[   32.249250]  kasan_atomics_helper+0x12d8/0x4858
[   32.249302]  kasan_atomics+0x198/0x2e0
[   32.249350]  kunit_try_run_case+0x170/0x3f0
[   32.249399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.249452]  kthread+0x328/0x630
[   32.249496]  ret_from_fork+0x10/0x20
[   32.249554] 
[   32.249574] Allocated by task 296:
[   32.249604]  kasan_save_stack+0x3c/0x68
[   32.249645]  kasan_save_track+0x20/0x40
[   32.249723]  kasan_save_alloc_info+0x40/0x58
[   32.249801]  __kasan_kmalloc+0xd4/0xd8
[   32.249890]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.249968]  kasan_atomics+0xb8/0x2e0
[   32.250040]  kunit_try_run_case+0x170/0x3f0
[   32.250145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.250203]  kthread+0x328/0x630
[   32.250238]  ret_from_fork+0x10/0x20
[   32.250274] 
[   32.250296] The buggy address belongs to the object at fff00000c9abb900
[   32.250296]  which belongs to the cache kmalloc-64 of size 64
[   32.250355] The buggy address is located 0 bytes to the right of
[   32.250355]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.250420] 
[   32.250478] The buggy address belongs to the physical page:
[   32.250556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.250615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.250719] page_type: f5(slab)
[   32.250784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.250864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.250907] page dumped because: kasan: bad access detected
[   32.250941] 
[   32.250961] Memory state around the buggy address:
[   32.250995]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.251037]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.251091] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.251131]                                      ^
[   32.251166]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.251210]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.251250] ==================================================================
[   32.173498] ==================================================================
[   32.173551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   32.173603] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.173656] 
[   32.173685] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.173769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.173798] Hardware name: linux,dummy-virt (DT)
[   32.173832] Call trace:
[   32.173855]  show_stack+0x20/0x38 (C)
[   32.173904]  dump_stack_lvl+0x8c/0xd0
[   32.173954]  print_report+0x118/0x5d0
[   32.174001]  kasan_report+0xdc/0x128
[   32.174046]  __asan_report_load4_noabort+0x20/0x30
[   32.174113]  kasan_atomics_helper+0x3dd8/0x4858
[   32.174165]  kasan_atomics+0x198/0x2e0
[   32.174214]  kunit_try_run_case+0x170/0x3f0
[   32.174262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.174317]  kthread+0x328/0x630
[   32.174360]  ret_from_fork+0x10/0x20
[   32.174411] 
[   32.174430] Allocated by task 296:
[   32.174459]  kasan_save_stack+0x3c/0x68
[   32.174498]  kasan_save_track+0x20/0x40
[   32.174536]  kasan_save_alloc_info+0x40/0x58
[   32.174574]  __kasan_kmalloc+0xd4/0xd8
[   32.174609]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.174652]  kasan_atomics+0xb8/0x2e0
[   32.174691]  kunit_try_run_case+0x170/0x3f0
[   32.174729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.174777]  kthread+0x328/0x630
[   32.174810]  ret_from_fork+0x10/0x20
[   32.174848] 
[   32.174868] The buggy address belongs to the object at fff00000c9abb900
[   32.174868]  which belongs to the cache kmalloc-64 of size 64
[   32.174925] The buggy address is located 0 bytes to the right of
[   32.174925]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.174992] 
[   32.175014] The buggy address belongs to the physical page:
[   32.175046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.175174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.175252] page_type: f5(slab)
[   32.175292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.175344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.175386] page dumped because: kasan: bad access detected
[   32.175420] 
[   32.175440] Memory state around the buggy address:
[   32.175473]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.176022]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.176436] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.176491]                                      ^
[   32.176530]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.176736]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.177217] ==================================================================
[   32.238239] ==================================================================
[   32.238277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   32.238323] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.238371] 
[   32.238399] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.238491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.238521] Hardware name: linux,dummy-virt (DT)
[   32.238551] Call trace:
[   32.238574]  show_stack+0x20/0x38 (C)
[   32.238622]  dump_stack_lvl+0x8c/0xd0
[   32.238669]  print_report+0x118/0x5d0
[   32.238716]  kasan_report+0xdc/0x128
[   32.238760]  kasan_check_range+0x100/0x1a8
[   32.238813]  __kasan_check_write+0x20/0x30
[   32.238861]  kasan_atomics_helper+0x1190/0x4858
[   32.238912]  kasan_atomics+0x198/0x2e0
[   32.238961]  kunit_try_run_case+0x170/0x3f0
[   32.239009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.239132]  kthread+0x328/0x630
[   32.239239]  ret_from_fork+0x10/0x20
[   32.239325] 
[   32.239394] Allocated by task 296:
[   32.239435]  kasan_save_stack+0x3c/0x68
[   32.239475]  kasan_save_track+0x20/0x40
[   32.239513]  kasan_save_alloc_info+0x40/0x58
[   32.239553]  __kasan_kmalloc+0xd4/0xd8
[   32.239588]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.239631]  kasan_atomics+0xb8/0x2e0
[   32.239671]  kunit_try_run_case+0x170/0x3f0
[   32.239710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.239755]  kthread+0x328/0x630
[   32.239791]  ret_from_fork+0x10/0x20
[   32.239847] 
[   32.239880] The buggy address belongs to the object at fff00000c9abb900
[   32.239880]  which belongs to the cache kmalloc-64 of size 64
[   32.239939] The buggy address is located 0 bytes to the right of
[   32.239939]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.240004] 
[   32.240084] The buggy address belongs to the physical page:
[   32.240162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.240261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.240405] page_type: f5(slab)
[   32.240480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.240866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.240935] page dumped because: kasan: bad access detected
[   32.240990] 
[   32.241021] Memory state around the buggy address:
[   32.241064]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.241106]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.241149] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.241189]                                      ^
[   32.241223]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.241266]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.241305] ==================================================================
[   32.215953] ==================================================================
[   32.215992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   32.216038] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.216099] 
[   32.216128] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.216211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.216238] Hardware name: linux,dummy-virt (DT)
[   32.216270] Call trace:
[   32.216292]  show_stack+0x20/0x38 (C)
[   32.216339]  dump_stack_lvl+0x8c/0xd0
[   32.216403]  print_report+0x118/0x5d0
[   32.216449]  kasan_report+0xdc/0x128
[   32.216495]  kasan_check_range+0x100/0x1a8
[   32.216614]  __kasan_check_write+0x20/0x30
[   32.216731]  kasan_atomics_helper+0xf88/0x4858
[   32.216884]  kasan_atomics+0x198/0x2e0
[   32.216954]  kunit_try_run_case+0x170/0x3f0
[   32.217003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.217066]  kthread+0x328/0x630
[   32.217111]  ret_from_fork+0x10/0x20
[   32.217172] 
[   32.217241] Allocated by task 296:
[   32.217347]  kasan_save_stack+0x3c/0x68
[   32.217446]  kasan_save_track+0x20/0x40
[   32.217545]  kasan_save_alloc_info+0x40/0x58
[   32.217875]  __kasan_kmalloc+0xd4/0xd8
[   32.217915]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.217991]  kasan_atomics+0xb8/0x2e0
[   32.218037]  kunit_try_run_case+0x170/0x3f0
[   32.218086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.218193]  kthread+0x328/0x630
[   32.218280]  ret_from_fork+0x10/0x20
[   32.218402] 
[   32.218462] The buggy address belongs to the object at fff00000c9abb900
[   32.218462]  which belongs to the cache kmalloc-64 of size 64
[   32.218555] The buggy address is located 0 bytes to the right of
[   32.218555]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.218669] 
[   32.218956] The buggy address belongs to the physical page:
[   32.219024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.219152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.219256] page_type: f5(slab)
[   32.219371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.219423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.219464] page dumped because: kasan: bad access detected
[   32.219724] 
[   32.219768] Memory state around the buggy address:
[   32.219892]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.219973]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.220039] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.220135]                                      ^
[   32.220215]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.220415]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.220613] ==================================================================
[   32.244908] ==================================================================
[   32.244954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   32.245003] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.245067] 
[   32.245096] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.245179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.245207] Hardware name: linux,dummy-virt (DT)
[   32.245261] Call trace:
[   32.245291]  show_stack+0x20/0x38 (C)
[   32.245366]  dump_stack_lvl+0x8c/0xd0
[   32.245436]  print_report+0x118/0x5d0
[   32.245481]  kasan_report+0xdc/0x128
[   32.245525]  kasan_check_range+0x100/0x1a8
[   32.245573]  __kasan_check_write+0x20/0x30
[   32.245656]  kasan_atomics_helper+0x126c/0x4858
[   32.245710]  kasan_atomics+0x198/0x2e0
[   32.246074]  kunit_try_run_case+0x170/0x3f0
[   32.246124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.246178]  kthread+0x328/0x630
[   32.246238]  ret_from_fork+0x10/0x20
[   32.246295] 
[   32.246344] Allocated by task 296:
[   32.246392]  kasan_save_stack+0x3c/0x68
[   32.246439]  kasan_save_track+0x20/0x40
[   32.246477]  kasan_save_alloc_info+0x40/0x58
[   32.246519]  __kasan_kmalloc+0xd4/0xd8
[   32.246554]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.246598]  kasan_atomics+0xb8/0x2e0
[   32.246637]  kunit_try_run_case+0x170/0x3f0
[   32.246676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.246721]  kthread+0x328/0x630
[   32.246756]  ret_from_fork+0x10/0x20
[   32.246803] 
[   32.246825] The buggy address belongs to the object at fff00000c9abb900
[   32.246825]  which belongs to the cache kmalloc-64 of size 64
[   32.246883] The buggy address is located 0 bytes to the right of
[   32.246883]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.246982] 
[   32.247032] The buggy address belongs to the physical page:
[   32.247075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.247154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.247220] page_type: f5(slab)
[   32.247297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.247366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.247408] page dumped because: kasan: bad access detected
[   32.247441] 
[   32.247461] Memory state around the buggy address:
[   32.247495]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.247537]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.247581] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.247621]                                      ^
[   32.247655]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.247698]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.247737] ==================================================================
[   32.318384] ==================================================================
[   32.318436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   32.318664] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.318822] 
[   32.318857] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.318945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.319210] Hardware name: linux,dummy-virt (DT)
[   32.319256] Call trace:
[   32.319383]  show_stack+0x20/0x38 (C)
[   32.319458]  dump_stack_lvl+0x8c/0xd0
[   32.319526]  print_report+0x118/0x5d0
[   32.319827]  kasan_report+0xdc/0x128
[   32.319904]  kasan_check_range+0x100/0x1a8
[   32.320185]  __kasan_check_write+0x20/0x30
[   32.320251]  kasan_atomics_helper+0x16d0/0x4858
[   32.320304]  kasan_atomics+0x198/0x2e0
[   32.320385]  kunit_try_run_case+0x170/0x3f0
[   32.320557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.320677]  kthread+0x328/0x630
[   32.320836]  ret_from_fork+0x10/0x20
[   32.321041] 
[   32.321155] Allocated by task 296:
[   32.321286]  kasan_save_stack+0x3c/0x68
[   32.321335]  kasan_save_track+0x20/0x40
[   32.321396]  kasan_save_alloc_info+0x40/0x58
[   32.321443]  __kasan_kmalloc+0xd4/0xd8
[   32.321757]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.321918]  kasan_atomics+0xb8/0x2e0
[   32.322171]  kunit_try_run_case+0x170/0x3f0
[   32.322268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.322415]  kthread+0x328/0x630
[   32.322593]  ret_from_fork+0x10/0x20
[   32.322672] 
[   32.322700] The buggy address belongs to the object at fff00000c9abb900
[   32.322700]  which belongs to the cache kmalloc-64 of size 64
[   32.323000] The buggy address is located 0 bytes to the right of
[   32.323000]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.323181] 
[   32.323278] The buggy address belongs to the physical page:
[   32.323571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.323689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.323740] page_type: f5(slab)
[   32.323790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.324022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.324213] page dumped because: kasan: bad access detected
[   32.324405] 
[   32.324439] Memory state around the buggy address:
[   32.324474]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.324520]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.324805] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.324939]                                      ^
[   32.324986]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.325187]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.325399] ==================================================================
[   32.101897] ==================================================================
[   32.101955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   32.102044] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.102110] 
[   32.102142] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.102226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.102256] Hardware name: linux,dummy-virt (DT)
[   32.102288] Call trace:
[   32.102312]  show_stack+0x20/0x38 (C)
[   32.102369]  dump_stack_lvl+0x8c/0xd0
[   32.102421]  print_report+0x118/0x5d0
[   32.102467]  kasan_report+0xdc/0x128
[   32.102513]  __asan_report_load4_noabort+0x20/0x30
[   32.102574]  kasan_atomics_helper+0x42d8/0x4858
[   32.102637]  kasan_atomics+0x198/0x2e0
[   32.102702]  kunit_try_run_case+0x170/0x3f0
[   32.102751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.103135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.103640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.103689] page_type: f5(slab)
[   32.103729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.106267]  kasan_atomics_helper+0x934/0x4858
[   32.107144]  kasan_save_alloc_info+0x40/0x58
[   32.107230]  __kasan_kmalloc+0xd4/0xd8
[   32.107561]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.107700]  kasan_atomics+0xb8/0x2e0
[   32.107744]  kunit_try_run_case+0x170/0x3f0
[   32.107818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.107921]  kthread+0x328/0x630
[   32.107958]  ret_from_fork+0x10/0x20
[   32.107996] 
[   32.108019] The buggy address belongs to the object at fff00000c9abb900
[   32.108019]  which belongs to the cache kmalloc-64 of size 64
[   32.108093] The buggy address is located 0 bytes to the right of
[   32.108093]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.108264] 
[   32.108326] The buggy address belongs to the physical page:
[   32.108485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.108569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.108756] page_type: f5(slab)
[   32.109095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.109207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.109281] page dumped because: kasan: bad access detected
[   32.109316] 
[   32.109383] Memory state around the buggy address:
[   32.109442]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.109490]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.109535] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.109573]                                      ^
[   32.109608]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.112617]  kasan_atomics_helper+0x99c/0x4858
[   32.114952] The buggy address is located 0 bytes to the right of
[   32.114952]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.124347]  ret_from_fork+0x10/0x20
[   32.125255] The buggy address is located 0 bytes to the right of
[   32.125255]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.125341] 
[   32.125364] The buggy address belongs to the physical page:
[   32.125397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.125450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.125536] page_type: f5(slab)
[   32.125959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.126025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.126127] page dumped because: kasan: bad access detected
[   32.126192] 
[   32.126339] Memory state around the buggy address:
[   32.126483]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.126591]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.126637] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.126677]                                      ^
[   32.126712]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.127619] ==================================================================
[   32.274455] ==================================================================
[   32.274506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   32.274557] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.274608] 
[   32.274648] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.274735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.274764] Hardware name: linux,dummy-virt (DT)
[   32.274809] Call trace:
[   32.274833]  show_stack+0x20/0x38 (C)
[   32.274885]  dump_stack_lvl+0x8c/0xd0
[   32.274934]  print_report+0x118/0x5d0
[   32.274985]  kasan_report+0xdc/0x128
[   32.275033]  kasan_check_range+0x100/0x1a8
[   32.275102]  __kasan_check_write+0x20/0x30
[   32.275157]  kasan_atomics_helper+0x14e4/0x4858
[   32.275218]  kasan_atomics+0x198/0x2e0
[   32.275275]  kunit_try_run_case+0x170/0x3f0
[   32.275324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.275377]  kthread+0x328/0x630
[   32.275421]  ret_from_fork+0x10/0x20
[   32.275469] 
[   32.275489] Allocated by task 296:
[   32.275519]  kasan_save_stack+0x3c/0x68
[   32.275559]  kasan_save_track+0x20/0x40
[   32.275597]  kasan_save_alloc_info+0x40/0x58
[   32.275644]  __kasan_kmalloc+0xd4/0xd8
[   32.275682]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.275733]  kasan_atomics+0xb8/0x2e0
[   32.275773]  kunit_try_run_case+0x170/0x3f0
[   32.275812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.275858]  kthread+0x328/0x630
[   32.275894]  ret_from_fork+0x10/0x20
[   32.275932] 
[   32.275953] The buggy address belongs to the object at fff00000c9abb900
[   32.275953]  which belongs to the cache kmalloc-64 of size 64
[   32.276012] The buggy address is located 0 bytes to the right of
[   32.276012]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.276538] 
[   32.276634] The buggy address belongs to the physical page:
[   32.276672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.276727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.276775] page_type: f5(slab)
[   32.277196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.277290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.277488] page dumped because: kasan: bad access detected
[   32.277604] 
[   32.277674] Memory state around the buggy address:
[   32.277882]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.277928]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.277972] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.278047]                                      ^
[   32.278130]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.278189]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.278301] ==================================================================
[   32.208766] ==================================================================
[   32.208817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   32.208869] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.208921] 
[   32.208951] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.209035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.209078] Hardware name: linux,dummy-virt (DT)
[   32.209111] Call trace:
[   32.209136]  show_stack+0x20/0x38 (C)
[   32.209187]  dump_stack_lvl+0x8c/0xd0
[   32.209252]  print_report+0x118/0x5d0
[   32.209299]  kasan_report+0xdc/0x128
[   32.209343]  kasan_check_range+0x100/0x1a8
[   32.209408]  __kasan_check_write+0x20/0x30
[   32.209473]  kasan_atomics_helper+0xeb8/0x4858
[   32.209526]  kasan_atomics+0x198/0x2e0
[   32.209585]  kunit_try_run_case+0x170/0x3f0
[   32.209633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.209687]  kthread+0x328/0x630
[   32.209731]  ret_from_fork+0x10/0x20
[   32.209779] 
[   32.209801] Allocated by task 296:
[   32.209831]  kasan_save_stack+0x3c/0x68
[   32.212070]  kasan_save_track+0x20/0x40
[   32.212124]  kasan_save_alloc_info+0x40/0x58
[   32.212165]  __kasan_kmalloc+0xd4/0xd8
[   32.212202]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.212245]  kasan_atomics+0xb8/0x2e0
[   32.212283]  kunit_try_run_case+0x170/0x3f0
[   32.212323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.212369]  kthread+0x328/0x630
[   32.212416]  ret_from_fork+0x10/0x20
[   32.212455] 
[   32.212476] The buggy address belongs to the object at fff00000c9abb900
[   32.212476]  which belongs to the cache kmalloc-64 of size 64
[   32.212533] The buggy address is located 0 bytes to the right of
[   32.212533]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.212598] 
[   32.212619] The buggy address belongs to the physical page:
[   32.212651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.212704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.212753] page_type: f5(slab)
[   32.212791] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.212841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.212882] page dumped because: kasan: bad access detected
[   32.212916] 
[   32.212936] Memory state around the buggy address:
[   32.212968]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.213014]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.213067] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.213184]                                      ^
[   32.213271]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.213329]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.213369] ==================================================================
[   32.330550] ==================================================================
[   32.330664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   32.330750] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.330810] 
[   32.331123] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.331221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.331258] Hardware name: linux,dummy-virt (DT)
[   32.331323] Call trace:
[   32.331349]  show_stack+0x20/0x38 (C)
[   32.331437]  dump_stack_lvl+0x8c/0xd0
[   32.331504]  print_report+0x118/0x5d0
[   32.331659]  kasan_report+0xdc/0x128
[   32.331721]  kasan_check_range+0x100/0x1a8
[   32.331863]  __kasan_check_write+0x20/0x30
[   32.331926]  kasan_atomics_helper+0x175c/0x4858
[   32.331985]  kasan_atomics+0x198/0x2e0
[   32.332119]  kunit_try_run_case+0x170/0x3f0
[   32.332193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.332452]  kthread+0x328/0x630
[   32.332763]  ret_from_fork+0x10/0x20
[   32.333221] 
[   32.333288] Allocated by task 296:
[   32.333428]  kasan_save_stack+0x3c/0x68
[   32.333515]  kasan_save_track+0x20/0x40
[   32.333656]  kasan_save_alloc_info+0x40/0x58
[   32.333777]  __kasan_kmalloc+0xd4/0xd8
[   32.333930]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.334081]  kasan_atomics+0xb8/0x2e0
[   32.334185]  kunit_try_run_case+0x170/0x3f0
[   32.334397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.334559]  kthread+0x328/0x630
[   32.334639]  ret_from_fork+0x10/0x20
[   32.334696] 
[   32.334719] The buggy address belongs to the object at fff00000c9abb900
[   32.334719]  which belongs to the cache kmalloc-64 of size 64
[   32.334988] The buggy address is located 0 bytes to the right of
[   32.334988]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.335174] 
[   32.335245] The buggy address belongs to the physical page:
[   32.335544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.335688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.335774] page_type: f5(slab)
[   32.335920] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.336142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.336284] page dumped because: kasan: bad access detected
[   32.336351] 
[   32.336559] Memory state around the buggy address:
[   32.336607]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.336653]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.336890] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.337027]                                      ^
[   32.337106]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.337382]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.337490] ==================================================================
[   32.231434] ==================================================================
[   32.231487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   32.231538] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.231589] 
[   32.231618] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.231703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.231731] Hardware name: linux,dummy-virt (DT)
[   32.231764] Call trace:
[   32.231789]  show_stack+0x20/0x38 (C)
[   32.231836]  dump_stack_lvl+0x8c/0xd0
[   32.231883]  print_report+0x118/0x5d0
[   32.231929]  kasan_report+0xdc/0x128
[   32.231973]  kasan_check_range+0x100/0x1a8
[   32.232022]  __kasan_check_write+0x20/0x30
[   32.232086]  kasan_atomics_helper+0x10c0/0x4858
[   32.232138]  kasan_atomics+0x198/0x2e0
[   32.232186]  kunit_try_run_case+0x170/0x3f0
[   32.232233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.232287]  kthread+0x328/0x630
[   32.232330]  ret_from_fork+0x10/0x20
[   32.232637] 
[   32.232734] Allocated by task 296:
[   32.232914]  kasan_save_stack+0x3c/0x68
[   32.232982]  kasan_save_track+0x20/0x40
[   32.233030]  kasan_save_alloc_info+0x40/0x58
[   32.233079]  __kasan_kmalloc+0xd4/0xd8
[   32.233116]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.233160]  kasan_atomics+0xb8/0x2e0
[   32.233298]  kunit_try_run_case+0x170/0x3f0
[   32.233418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.233498]  kthread+0x328/0x630
[   32.233556]  ret_from_fork+0x10/0x20
[   32.233684] 
[   32.233754] The buggy address belongs to the object at fff00000c9abb900
[   32.233754]  which belongs to the cache kmalloc-64 of size 64
[   32.233855] The buggy address is located 0 bytes to the right of
[   32.233855]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.233921] 
[   32.233942] The buggy address belongs to the physical page:
[   32.233973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.234024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.234082] page_type: f5(slab)
[   32.234121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.234295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.234444] page dumped because: kasan: bad access detected
[   32.234534] 
[   32.234594] Memory state around the buggy address:
[   32.234692]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.234791]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.235006] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.235077]                                      ^
[   32.235255]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.235334]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.235406] ==================================================================
[   32.251994] ==================================================================
[   32.252044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   32.252128] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.252186] 
[   32.252233] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.252344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.252403] Hardware name: linux,dummy-virt (DT)
[   32.252507] Call trace:
[   32.252633]  show_stack+0x20/0x38 (C)
[   32.252741]  dump_stack_lvl+0x8c/0xd0
[   32.252849]  print_report+0x118/0x5d0
[   32.252929]  kasan_report+0xdc/0x128
[   32.252999]  kasan_check_range+0x100/0x1a8
[   32.253048]  __kasan_check_write+0x20/0x30
[   32.253106]  kasan_atomics_helper+0x1384/0x4858
[   32.253157]  kasan_atomics+0x198/0x2e0
[   32.253205]  kunit_try_run_case+0x170/0x3f0
[   32.253254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.253307]  kthread+0x328/0x630
[   32.253352]  ret_from_fork+0x10/0x20
[   32.253408] 
[   32.253428] Allocated by task 296:
[   32.253458]  kasan_save_stack+0x3c/0x68
[   32.253499]  kasan_save_track+0x20/0x40
[   32.253561]  kasan_save_alloc_info+0x40/0x58
[   32.253652]  __kasan_kmalloc+0xd4/0xd8
[   32.253710]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.253786]  kasan_atomics+0xb8/0x2e0
[   32.253914]  kunit_try_run_case+0x170/0x3f0
[   32.254001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.254069]  kthread+0x328/0x630
[   32.254103]  ret_from_fork+0x10/0x20
[   32.254141] 
[   32.254164] The buggy address belongs to the object at fff00000c9abb900
[   32.254164]  which belongs to the cache kmalloc-64 of size 64
[   32.254223] The buggy address is located 0 bytes to the right of
[   32.254223]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.254306] 
[   32.254385] The buggy address belongs to the physical page:
[   32.254484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.254564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.254657] page_type: f5(slab)
[   32.254746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.254805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.254847] page dumped because: kasan: bad access detected
[   32.254879] 
[   32.254899] Memory state around the buggy address:
[   32.254932]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.254975]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.255019] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.255068]                                      ^
[   32.255102]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.255201]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.255298] ==================================================================
[   32.203914] ==================================================================
[   32.203966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   32.204019] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.204088] 
[   32.204121] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.204208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.204248] Hardware name: linux,dummy-virt (DT)
[   32.204292] Call trace:
[   32.204323]  show_stack+0x20/0x38 (C)
[   32.204373]  dump_stack_lvl+0x8c/0xd0
[   32.204429]  print_report+0x118/0x5d0
[   32.204476]  kasan_report+0xdc/0x128
[   32.204521]  __asan_report_store8_noabort+0x20/0x30
[   32.204574]  kasan_atomics_helper+0x3e5c/0x4858
[   32.204625]  kasan_atomics+0x198/0x2e0
[   32.204673]  kunit_try_run_case+0x170/0x3f0
[   32.204730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.204799]  kthread+0x328/0x630
[   32.204849]  ret_from_fork+0x10/0x20
[   32.204898] 
[   32.204928] Allocated by task 296:
[   32.204974]  kasan_save_stack+0x3c/0x68
[   32.205024]  kasan_save_track+0x20/0x40
[   32.205075]  kasan_save_alloc_info+0x40/0x58
[   32.205115]  __kasan_kmalloc+0xd4/0xd8
[   32.205151]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.205193]  kasan_atomics+0xb8/0x2e0
[   32.205234]  kunit_try_run_case+0x170/0x3f0
[   32.205274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.205319]  kthread+0x328/0x630
[   32.205355]  ret_from_fork+0x10/0x20
[   32.205405] 
[   32.205450] The buggy address belongs to the object at fff00000c9abb900
[   32.205450]  which belongs to the cache kmalloc-64 of size 64
[   32.205509] The buggy address is located 0 bytes to the right of
[   32.205509]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.205575] 
[   32.205595] The buggy address belongs to the physical page:
[   32.205625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.205679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.206035] page_type: f5(slab)
[   32.206094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.206183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.206272] page dumped because: kasan: bad access detected
[   32.206366] 
[   32.206613] Memory state around the buggy address:
[   32.206671]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.206759]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.206841] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.206977]                                      ^
[   32.207042]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.207127]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.207291] ==================================================================
[   32.268373] ==================================================================
[   32.268441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   32.268493] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.268544] 
[   32.268573] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.268659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.268687] Hardware name: linux,dummy-virt (DT)
[   32.268719] Call trace:
[   32.268741]  show_stack+0x20/0x38 (C)
[   32.268790]  dump_stack_lvl+0x8c/0xd0
[   32.268838]  print_report+0x118/0x5d0
[   32.268882]  kasan_report+0xdc/0x128
[   32.268927]  kasan_check_range+0x100/0x1a8
[   32.268975]  __kasan_check_write+0x20/0x30
[   32.269076]  kasan_atomics_helper+0x147c/0x4858
[   32.269184]  kasan_atomics+0x198/0x2e0
[   32.269280]  kunit_try_run_case+0x170/0x3f0
[   32.269329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.269382]  kthread+0x328/0x630
[   32.269427]  ret_from_fork+0x10/0x20
[   32.269638] 
[   32.270047] Allocated by task 296:
[   32.270391]  kasan_save_stack+0x3c/0x68
[   32.270454]  kasan_save_track+0x20/0x40
[   32.270541]  kasan_save_alloc_info+0x40/0x58
[   32.270645]  __kasan_kmalloc+0xd4/0xd8
[   32.270754]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.271018]  kasan_atomics+0xb8/0x2e0
[   32.271133]  kunit_try_run_case+0x170/0x3f0
[   32.271222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.271271]  kthread+0x328/0x630
[   32.271313]  ret_from_fork+0x10/0x20
[   32.271559] 
[   32.271654] The buggy address belongs to the object at fff00000c9abb900
[   32.271654]  which belongs to the cache kmalloc-64 of size 64
[   32.271762] The buggy address is located 0 bytes to the right of
[   32.271762]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.271964] 
[   32.272135] The buggy address belongs to the physical page:
[   32.272201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.272289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.272385] page_type: f5(slab)
[   32.272449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.272503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.272552] page dumped because: kasan: bad access detected
[   32.272585] 
[   32.272605] Memory state around the buggy address:
[   32.272639]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.272933]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.273073] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.273170]                                      ^
[   32.273480]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.273557]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.273644] ==================================================================
[   32.255729] ==================================================================
[   32.255774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   32.255823] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.255874] 
[   32.255903] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.256005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.256035] Hardware name: linux,dummy-virt (DT)
[   32.256096] Call trace:
[   32.256121]  show_stack+0x20/0x38 (C)
[   32.256177]  dump_stack_lvl+0x8c/0xd0
[   32.256249]  print_report+0x118/0x5d0
[   32.256335]  kasan_report+0xdc/0x128
[   32.256415]  __asan_report_load8_noabort+0x20/0x30
[   32.256518]  kasan_atomics_helper+0x3f04/0x4858
[   32.256627]  kasan_atomics+0x198/0x2e0
[   32.256750]  kunit_try_run_case+0x170/0x3f0
[   32.256813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.256888]  kthread+0x328/0x630
[   32.256933]  ret_from_fork+0x10/0x20
[   32.256983] 
[   32.257003] Allocated by task 296:
[   32.257032]  kasan_save_stack+0x3c/0x68
[   32.257081]  kasan_save_track+0x20/0x40
[   32.257119]  kasan_save_alloc_info+0x40/0x58
[   32.257159]  __kasan_kmalloc+0xd4/0xd8
[   32.257194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.257238]  kasan_atomics+0xb8/0x2e0
[   32.257277]  kunit_try_run_case+0x170/0x3f0
[   32.257351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.257421]  kthread+0x328/0x630
[   32.257477]  ret_from_fork+0x10/0x20
[   32.257572] 
[   32.257650] The buggy address belongs to the object at fff00000c9abb900
[   32.257650]  which belongs to the cache kmalloc-64 of size 64
[   32.257750] The buggy address is located 0 bytes to the right of
[   32.257750]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.258099] 
[   32.258168] The buggy address belongs to the physical page:
[   32.258263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.258400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.258468] page_type: f5(slab)
[   32.258507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.258559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.258755] page dumped because: kasan: bad access detected
[   32.258900] 
[   32.258976] Memory state around the buggy address:
[   32.259078]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.259177]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.259276] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.259518]                                      ^
[   32.259661]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.259730]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.259813] ==================================================================
[   32.289650] ==================================================================
[   32.289702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   32.290003] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.291213] 
[   32.291300] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.291411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.291508] Hardware name: linux,dummy-virt (DT)
[   32.291543] Call trace:
[   32.291567]  show_stack+0x20/0x38 (C)
[   32.291624]  dump_stack_lvl+0x8c/0xd0
[   32.291680]  print_report+0x118/0x5d0
[   32.291726]  kasan_report+0xdc/0x128
[   32.291772]  kasan_check_range+0x100/0x1a8
[   32.292086]  __kasan_check_write+0x20/0x30
[   32.292289]  kasan_atomics_helper+0x15b4/0x4858
[   32.292390]  kasan_atomics+0x198/0x2e0
[   32.292521]  kunit_try_run_case+0x170/0x3f0
[   32.292702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.292763]  kthread+0x328/0x630
[   32.292940]  ret_from_fork+0x10/0x20
[   32.293000] 
[   32.293021] Allocated by task 296:
[   32.293052]  kasan_save_stack+0x3c/0x68
[   32.293200]  kasan_save_track+0x20/0x40
[   32.293395]  kasan_save_alloc_info+0x40/0x58
[   32.293480]  __kasan_kmalloc+0xd4/0xd8
[   32.293872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.293989]  kasan_atomics+0xb8/0x2e0
[   32.294291]  kunit_try_run_case+0x170/0x3f0
[   32.294404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.294504]  kthread+0x328/0x630
[   32.294590]  ret_from_fork+0x10/0x20
[   32.294881] 
[   32.294927] The buggy address belongs to the object at fff00000c9abb900
[   32.294927]  which belongs to the cache kmalloc-64 of size 64
[   32.295081] The buggy address is located 0 bytes to the right of
[   32.295081]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.295152] 
[   32.295176] The buggy address belongs to the physical page:
[   32.295370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.295448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.295610] page_type: f5(slab)
[   32.295672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.295739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.295910] page dumped because: kasan: bad access detected
[   32.296085] 
[   32.296146] Memory state around the buggy address:
[   32.296253]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.296402]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.296474] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.296809]                                      ^
[   32.296924]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.297040]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.297241] ==================================================================
[   32.235827] ==================================================================
[   32.235876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   32.235924] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.235974] 
[   32.236005] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.236104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.236132] Hardware name: linux,dummy-virt (DT)
[   32.236164] Call trace:
[   32.236186]  show_stack+0x20/0x38 (C)
[   32.236250]  dump_stack_lvl+0x8c/0xd0
[   32.236301]  print_report+0x118/0x5d0
[   32.236345]  kasan_report+0xdc/0x128
[   32.236399]  kasan_check_range+0x100/0x1a8
[   32.236446]  __kasan_check_write+0x20/0x30
[   32.236493]  kasan_atomics_helper+0x1128/0x4858
[   32.236553]  kasan_atomics+0x198/0x2e0
[   32.236603]  kunit_try_run_case+0x170/0x3f0
[   32.236652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.236705]  kthread+0x328/0x630
[   32.236757]  ret_from_fork+0x10/0x20
[   32.236814] 
[   32.236834] Allocated by task 296:
[   32.236863]  kasan_save_stack+0x3c/0x68
[   32.236904]  kasan_save_track+0x20/0x40
[   32.236941]  kasan_save_alloc_info+0x40/0x58
[   32.236981]  __kasan_kmalloc+0xd4/0xd8
[   32.237018]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.237069]  kasan_atomics+0xb8/0x2e0
[   32.237110]  kunit_try_run_case+0x170/0x3f0
[   32.237150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.237211]  kthread+0x328/0x630
[   32.237247]  ret_from_fork+0x10/0x20
[   32.237285] 
[   32.237305] The buggy address belongs to the object at fff00000c9abb900
[   32.237305]  which belongs to the cache kmalloc-64 of size 64
[   32.237371] The buggy address is located 0 bytes to the right of
[   32.237371]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.237436] 
[   32.237459] The buggy address belongs to the physical page:
[   32.237491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.237541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.237588] page_type: f5(slab)
[   32.237655] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.237706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.237759] page dumped because: kasan: bad access detected
[   32.237791] 
[   32.237811] Memory state around the buggy address:
[   32.237842]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.237886]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.237952] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.238013]                                      ^
[   32.238048]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.238100]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.238139] ==================================================================
[   32.342665] ==================================================================
[   32.342876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   32.342950] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.343077] 
[   32.343136] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.343300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.343544] Hardware name: linux,dummy-virt (DT)
[   32.343620] Call trace:
[   32.343645]  show_stack+0x20/0x38 (C)
[   32.343783]  dump_stack_lvl+0x8c/0xd0
[   32.343837]  print_report+0x118/0x5d0
[   32.343884]  kasan_report+0xdc/0x128
[   32.343927]  kasan_check_range+0x100/0x1a8
[   32.344101]  __kasan_check_write+0x20/0x30
[   32.344320]  kasan_atomics_helper+0x17ec/0x4858
[   32.344543]  kasan_atomics+0x198/0x2e0
[   32.344621]  kunit_try_run_case+0x170/0x3f0
[   32.344801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.344880]  kthread+0x328/0x630
[   32.345032]  ret_from_fork+0x10/0x20
[   32.345151] 
[   32.345267] Allocated by task 296:
[   32.345365]  kasan_save_stack+0x3c/0x68
[   32.345567]  kasan_save_track+0x20/0x40
[   32.345628]  kasan_save_alloc_info+0x40/0x58
[   32.345715]  __kasan_kmalloc+0xd4/0xd8
[   32.345835]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.345906]  kasan_atomics+0xb8/0x2e0
[   32.346205]  kunit_try_run_case+0x170/0x3f0
[   32.346320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.346416]  kthread+0x328/0x630
[   32.346671]  ret_from_fork+0x10/0x20
[   32.346802] 
[   32.346873] The buggy address belongs to the object at fff00000c9abb900
[   32.346873]  which belongs to the cache kmalloc-64 of size 64
[   32.347008] The buggy address is located 0 bytes to the right of
[   32.347008]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.347088] 
[   32.347110] The buggy address belongs to the physical page:
[   32.347143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.347317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.347406] page_type: f5(slab)
[   32.347454] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.347523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.347762] page dumped because: kasan: bad access detected
[   32.347929] 
[   32.347998] Memory state around the buggy address:
[   32.348081]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.348219]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.348273] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.348312]                                      ^
[   32.348459]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.348666]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.348787] ==================================================================
[   32.193695] ==================================================================
[   32.193880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   32.193944] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.194000] 
[   32.194120] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.194251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.194318] Hardware name: linux,dummy-virt (DT)
[   32.194352] Call trace:
[   32.194447]  show_stack+0x20/0x38 (C)
[   32.194515]  dump_stack_lvl+0x8c/0xd0
[   32.194567]  print_report+0x118/0x5d0
[   32.194614]  kasan_report+0xdc/0x128
[   32.194659]  __asan_report_load8_noabort+0x20/0x30
[   32.194818]  kasan_atomics_helper+0x3f58/0x4858
[   32.194894]  kasan_atomics+0x198/0x2e0
[   32.194945]  kunit_try_run_case+0x170/0x3f0
[   32.194994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.195047]  kthread+0x328/0x630
[   32.195104]  ret_from_fork+0x10/0x20
[   32.195338] 
[   32.195440] Allocated by task 296:
[   32.195482]  kasan_save_stack+0x3c/0x68
[   32.195525]  kasan_save_track+0x20/0x40
[   32.195563]  kasan_save_alloc_info+0x40/0x58
[   32.195603]  __kasan_kmalloc+0xd4/0xd8
[   32.195639]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.195682]  kasan_atomics+0xb8/0x2e0
[   32.195856]  kunit_try_run_case+0x170/0x3f0
[   32.196004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.196099]  kthread+0x328/0x630
[   32.196219]  ret_from_fork+0x10/0x20
[   32.196256] 
[   32.196294] The buggy address belongs to the object at fff00000c9abb900
[   32.196294]  which belongs to the cache kmalloc-64 of size 64
[   32.196355] The buggy address is located 0 bytes to the right of
[   32.196355]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.196456] 
[   32.196738] The buggy address belongs to the physical page:
[   32.196822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.196878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.196927] page_type: f5(slab)
[   32.196979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.197073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.197116] page dumped because: kasan: bad access detected
[   32.197148] 
[   32.197177] Memory state around the buggy address:
[   32.197216]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.197261]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.197314] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.197355]                                      ^
[   32.197388]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.197431]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.197808] ==================================================================
[   32.213576] ==================================================================
[   32.213622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   32.213695] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.213752] 
[   32.213785] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.213869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.213897] Hardware name: linux,dummy-virt (DT)
[   32.213929] Call trace:
[   32.213954]  show_stack+0x20/0x38 (C)
[   32.214011]  dump_stack_lvl+0x8c/0xd0
[   32.214075]  print_report+0x118/0x5d0
[   32.214121]  kasan_report+0xdc/0x128
[   32.214175]  kasan_check_range+0x100/0x1a8
[   32.214223]  __kasan_check_write+0x20/0x30
[   32.214271]  kasan_atomics_helper+0xf20/0x4858
[   32.214326]  kasan_atomics+0x198/0x2e0
[   32.214375]  kunit_try_run_case+0x170/0x3f0
[   32.214423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.214476]  kthread+0x328/0x630
[   32.214530]  ret_from_fork+0x10/0x20
[   32.214588] 
[   32.214617] Allocated by task 296:
[   32.214656]  kasan_save_stack+0x3c/0x68
[   32.214706]  kasan_save_track+0x20/0x40
[   32.214744]  kasan_save_alloc_info+0x40/0x58
[   32.214791]  __kasan_kmalloc+0xd4/0xd8
[   32.214829]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.214871]  kasan_atomics+0xb8/0x2e0
[   32.214911]  kunit_try_run_case+0x170/0x3f0
[   32.214951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.214996]  kthread+0x328/0x630
[   32.215062]  ret_from_fork+0x10/0x20
[   32.215102] 
[   32.215122] The buggy address belongs to the object at fff00000c9abb900
[   32.215122]  which belongs to the cache kmalloc-64 of size 64
[   32.215179] The buggy address is located 0 bytes to the right of
[   32.215179]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.215242] 
[   32.215263] The buggy address belongs to the physical page:
[   32.215296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.215347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.215394] page_type: f5(slab)
[   32.215431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.215485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.215526] page dumped because: kasan: bad access detected
[   32.215559] 
[   32.215578] Memory state around the buggy address:
[   32.215612]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.215655]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.215698] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.215737]                                      ^
[   32.215771]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.215813]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.215853] ==================================================================
[   32.337953] ==================================================================
[   32.338028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   32.338095] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.338146] 
[   32.338177] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.338526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.338570] Hardware name: linux,dummy-virt (DT)
[   32.338605] Call trace:
[   32.338654]  show_stack+0x20/0x38 (C)
[   32.338834]  dump_stack_lvl+0x8c/0xd0
[   32.338885]  print_report+0x118/0x5d0
[   32.338930]  kasan_report+0xdc/0x128
[   32.338977]  __asan_report_load8_noabort+0x20/0x30
[   32.339027]  kasan_atomics_helper+0x3e20/0x4858
[   32.339091]  kasan_atomics+0x198/0x2e0
[   32.339140]  kunit_try_run_case+0x170/0x3f0
[   32.339189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.339243]  kthread+0x328/0x630
[   32.339288]  ret_from_fork+0x10/0x20
[   32.339367] 
[   32.339390] Allocated by task 296:
[   32.339434]  kasan_save_stack+0x3c/0x68
[   32.339476]  kasan_save_track+0x20/0x40
[   32.339513]  kasan_save_alloc_info+0x40/0x58
[   32.339553]  __kasan_kmalloc+0xd4/0xd8
[   32.339589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.339632]  kasan_atomics+0xb8/0x2e0
[   32.339671]  kunit_try_run_case+0x170/0x3f0
[   32.339710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.339754]  kthread+0x328/0x630
[   32.339790]  ret_from_fork+0x10/0x20
[   32.339828] 
[   32.339847] The buggy address belongs to the object at fff00000c9abb900
[   32.339847]  which belongs to the cache kmalloc-64 of size 64
[   32.339906] The buggy address is located 0 bytes to the right of
[   32.339906]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.339972] 
[   32.340009] The buggy address belongs to the physical page:
[   32.340046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.340589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.340714] page_type: f5(slab)
[   32.340954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.341140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.341318] page dumped because: kasan: bad access detected
[   32.341357] 
[   32.341377] Memory state around the buggy address:
[   32.341442]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.341502]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.341557] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.341676]                                      ^
[   32.341818]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.342096]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.342195] ==================================================================
[   32.198169] ==================================================================
[   32.198245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   32.198294] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.198346] 
[   32.198401] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.198489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.198534] Hardware name: linux,dummy-virt (DT)
[   32.198686] Call trace:
[   32.198729]  show_stack+0x20/0x38 (C)
[   32.198801]  dump_stack_lvl+0x8c/0xd0
[   32.198850]  print_report+0x118/0x5d0
[   32.198896]  kasan_report+0xdc/0x128
[   32.199139]  kasan_check_range+0x100/0x1a8
[   32.199243]  __kasan_check_write+0x20/0x30
[   32.199354]  kasan_atomics_helper+0xe44/0x4858
[   32.199407]  kasan_atomics+0x198/0x2e0
[   32.199473]  kunit_try_run_case+0x170/0x3f0
[   32.199557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.199821]  kthread+0x328/0x630
[   32.199889]  ret_from_fork+0x10/0x20
[   32.199986] 
[   32.200015] Allocated by task 296:
[   32.200083]  kasan_save_stack+0x3c/0x68
[   32.200127]  kasan_save_track+0x20/0x40
[   32.200182]  kasan_save_alloc_info+0x40/0x58
[   32.200384]  __kasan_kmalloc+0xd4/0xd8
[   32.200438]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.200482]  kasan_atomics+0xb8/0x2e0
[   32.200600]  kunit_try_run_case+0x170/0x3f0
[   32.200642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.200687]  kthread+0x328/0x630
[   32.200723]  ret_from_fork+0x10/0x20
[   32.200817] 
[   32.200920] The buggy address belongs to the object at fff00000c9abb900
[   32.200920]  which belongs to the cache kmalloc-64 of size 64
[   32.201100] The buggy address is located 0 bytes to the right of
[   32.201100]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.201239] 
[   32.201433] The buggy address belongs to the physical page:
[   32.201486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.201537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.201586] page_type: f5(slab)
[   32.201771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.202038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.202151] page dumped because: kasan: bad access detected
[   32.202255] 
[   32.202438] Memory state around the buggy address:
[   32.202617]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.202734]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.202863] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.202941]                                      ^
[   32.203016]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.203166]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.203254] ==================================================================
[   32.241750] ==================================================================
[   32.241828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   32.241914] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.241968] 
[   32.242015] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.242351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.242398] Hardware name: linux,dummy-virt (DT)
[   32.242435] Call trace:
[   32.242464]  show_stack+0x20/0x38 (C)
[   32.242513]  dump_stack_lvl+0x8c/0xd0
[   32.242603]  print_report+0x118/0x5d0
[   32.242669]  kasan_report+0xdc/0x128
[   32.242760]  kasan_check_range+0x100/0x1a8
[   32.242820]  __kasan_check_write+0x20/0x30
[   32.242870]  kasan_atomics_helper+0x11f8/0x4858
[   32.242922]  kasan_atomics+0x198/0x2e0
[   32.242970]  kunit_try_run_case+0x170/0x3f0
[   32.243019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.243082]  kthread+0x328/0x630
[   32.243126]  ret_from_fork+0x10/0x20
[   32.243174] 
[   32.243195] Allocated by task 296:
[   32.243224]  kasan_save_stack+0x3c/0x68
[   32.243283]  kasan_save_track+0x20/0x40
[   32.243340]  kasan_save_alloc_info+0x40/0x58
[   32.243386]  __kasan_kmalloc+0xd4/0xd8
[   32.243422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.243483]  kasan_atomics+0xb8/0x2e0
[   32.243550]  kunit_try_run_case+0x170/0x3f0
[   32.243629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.243702]  kthread+0x328/0x630
[   32.243771]  ret_from_fork+0x10/0x20
[   32.243809] 
[   32.243831] The buggy address belongs to the object at fff00000c9abb900
[   32.243831]  which belongs to the cache kmalloc-64 of size 64
[   32.243889] The buggy address is located 0 bytes to the right of
[   32.243889]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.243954] 
[   32.243974] The buggy address belongs to the physical page:
[   32.244007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.244065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.244130] page_type: f5(slab)
[   32.244187] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.244240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.244293] page dumped because: kasan: bad access detected
[   32.244327] 
[   32.244346] Memory state around the buggy address:
[   32.244396]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.244483]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.244563] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.244603]                                      ^
[   32.244637]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.244681]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.244721] ==================================================================
[   32.178869] ==================================================================
[   32.178922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   32.178977] Write of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.179932] 
[   32.179987] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.180294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.180324] Hardware name: linux,dummy-virt (DT)
[   32.180355] Call trace:
[   32.180713]  show_stack+0x20/0x38 (C)
[   32.180791]  dump_stack_lvl+0x8c/0xd0
[   32.180921]  print_report+0x118/0x5d0
[   32.181286]  kasan_report+0xdc/0x128
[   32.181509]  kasan_check_range+0x100/0x1a8
[   32.181561]  __kasan_check_write+0x20/0x30
[   32.181614]  kasan_atomics_helper+0xd3c/0x4858
[   32.181665]  kasan_atomics+0x198/0x2e0
[   32.181715]  kunit_try_run_case+0x170/0x3f0
[   32.181763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.181816]  kthread+0x328/0x630
[   32.181860]  ret_from_fork+0x10/0x20
[   32.181909] 
[   32.181929] Allocated by task 296:
[   32.181961]  kasan_save_stack+0x3c/0x68
[   32.182000]  kasan_save_track+0x20/0x40
[   32.182038]  kasan_save_alloc_info+0x40/0x58
[   32.182143]  __kasan_kmalloc+0xd4/0xd8
[   32.182232]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.182378]  kasan_atomics+0xb8/0x2e0
[   32.182475]  kunit_try_run_case+0x170/0x3f0
[   32.182565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.182785]  kthread+0x328/0x630
[   32.182970]  ret_from_fork+0x10/0x20
[   32.183031] 
[   32.183074] The buggy address belongs to the object at fff00000c9abb900
[   32.183074]  which belongs to the cache kmalloc-64 of size 64
[   32.183134] The buggy address is located 0 bytes to the right of
[   32.183134]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.183199] 
[   32.183241] The buggy address belongs to the physical page:
[   32.183280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.183348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.183406] page_type: f5(slab)
[   32.183455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.183506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.183548] page dumped because: kasan: bad access detected
[   32.183581] 
[   32.183607] Memory state around the buggy address:
[   32.183638]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.183683]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.183727] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.183767]                                      ^
[   32.183809]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.183855]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.183894] ==================================================================
[   32.221423] ==================================================================
[   32.221472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   32.221522] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.221573] 
[   32.221601] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.221688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.221715] Hardware name: linux,dummy-virt (DT)
[   32.221746] Call trace:
[   32.221770]  show_stack+0x20/0x38 (C)
[   32.221817]  dump_stack_lvl+0x8c/0xd0
[   32.221866]  print_report+0x118/0x5d0
[   32.221913]  kasan_report+0xdc/0x128
[   32.221958]  kasan_check_range+0x100/0x1a8
[   32.222005]  __kasan_check_write+0x20/0x30
[   32.222068]  kasan_atomics_helper+0xff0/0x4858
[   32.222120]  kasan_atomics+0x198/0x2e0
[   32.222169]  kunit_try_run_case+0x170/0x3f0
[   32.222250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.222304]  kthread+0x328/0x630
[   32.222348]  ret_from_fork+0x10/0x20
[   32.222431] 
[   32.222469] Allocated by task 296:
[   32.222528]  kasan_save_stack+0x3c/0x68
[   32.222569]  kasan_save_track+0x20/0x40
[   32.222905]  kasan_save_alloc_info+0x40/0x58
[   32.222957]  __kasan_kmalloc+0xd4/0xd8
[   32.223014]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.223100]  kasan_atomics+0xb8/0x2e0
[   32.223188]  kunit_try_run_case+0x170/0x3f0
[   32.223276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.223372]  kthread+0x328/0x630
[   32.223419]  ret_from_fork+0x10/0x20
[   32.223478] 
[   32.223517] The buggy address belongs to the object at fff00000c9abb900
[   32.223517]  which belongs to the cache kmalloc-64 of size 64
[   32.223610] The buggy address is located 0 bytes to the right of
[   32.223610]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.223691] 
[   32.223713] The buggy address belongs to the physical page:
[   32.223745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.223798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.224070] page_type: f5(slab)
[   32.224146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.224256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.224300] page dumped because: kasan: bad access detected
[   32.224359] 
[   32.224419] Memory state around the buggy address:
[   32.224483]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.224818]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.224933] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.225047]                                      ^
[   32.225132]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.225195]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.225273] ==================================================================
[   32.260336] ==================================================================
[   32.263086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   32.263144] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.263195] 
[   32.263225] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.263310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.263339] Hardware name: linux,dummy-virt (DT)
[   32.263371] Call trace:
[   32.263394]  show_stack+0x20/0x38 (C)
[   32.263441]  dump_stack_lvl+0x8c/0xd0
[   32.263491]  print_report+0x118/0x5d0
[   32.263536]  kasan_report+0xdc/0x128
[   32.263580]  kasan_check_range+0x100/0x1a8
[   32.263627]  __kasan_check_write+0x20/0x30
[   32.263675]  kasan_atomics_helper+0x1414/0x4858
[   32.263727]  kasan_atomics+0x198/0x2e0
[   32.263775]  kunit_try_run_case+0x170/0x3f0
[   32.263824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.263877]  kthread+0x328/0x630
[   32.263921]  ret_from_fork+0x10/0x20
[   32.263970] 
[   32.263990] Allocated by task 296:
[   32.264019]  kasan_save_stack+0x3c/0x68
[   32.264070]  kasan_save_track+0x20/0x40
[   32.264166]  kasan_save_alloc_info+0x40/0x58
[   32.264206]  __kasan_kmalloc+0xd4/0xd8
[   32.264243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.264288]  kasan_atomics+0xb8/0x2e0
[   32.264328]  kunit_try_run_case+0x170/0x3f0
[   32.264368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.264429]  kthread+0x328/0x630
[   32.264480]  ret_from_fork+0x10/0x20
[   32.264526] 
[   32.264558] The buggy address belongs to the object at fff00000c9abb900
[   32.264558]  which belongs to the cache kmalloc-64 of size 64
[   32.264616] The buggy address is located 0 bytes to the right of
[   32.264616]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.264692] 
[   32.264733] The buggy address belongs to the physical page:
[   32.264764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.264822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.264868] page_type: f5(slab)
[   32.264918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.264970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.265013] page dumped because: kasan: bad access detected
[   32.265064] 
[   32.265100] Memory state around the buggy address:
[   32.265134]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.265178]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.265222] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.265273]                                      ^
[   32.265316]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.265361]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.265401] ==================================================================
[   32.306021] ==================================================================
[   32.306099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   32.306212] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.306265] 
[   32.306306] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.306401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.306439] Hardware name: linux,dummy-virt (DT)
[   32.306472] Call trace:
[   32.306495]  show_stack+0x20/0x38 (C)
[   32.306544]  dump_stack_lvl+0x8c/0xd0
[   32.306595]  print_report+0x118/0x5d0
[   32.306640]  kasan_report+0xdc/0x128
[   32.306693]  kasan_check_range+0x100/0x1a8
[   32.306749]  __kasan_check_write+0x20/0x30
[   32.306805]  kasan_atomics_helper+0x1644/0x4858
[   32.306857]  kasan_atomics+0x198/0x2e0
[   32.306906]  kunit_try_run_case+0x170/0x3f0
[   32.306955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.307017]  kthread+0x328/0x630
[   32.307074]  ret_from_fork+0x10/0x20
[   32.307123] 
[   32.307143] Allocated by task 296:
[   32.307173]  kasan_save_stack+0x3c/0x68
[   32.307222]  kasan_save_track+0x20/0x40
[   32.307270]  kasan_save_alloc_info+0x40/0x58
[   32.307311]  __kasan_kmalloc+0xd4/0xd8
[   32.307355]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.307401]  kasan_atomics+0xb8/0x2e0
[   32.307442]  kunit_try_run_case+0x170/0x3f0
[   32.307482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.307528]  kthread+0x328/0x630
[   32.307564]  ret_from_fork+0x10/0x20
[   32.307601] 
[   32.307623] The buggy address belongs to the object at fff00000c9abb900
[   32.307623]  which belongs to the cache kmalloc-64 of size 64
[   32.307682] The buggy address is located 0 bytes to the right of
[   32.307682]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.307747] 
[   32.307776] The buggy address belongs to the physical page:
[   32.307810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.307860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.307916] page_type: f5(slab)
[   32.307954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.308006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.308047] page dumped because: kasan: bad access detected
[   32.308100] 
[   32.308553] Memory state around the buggy address:
[   32.309079]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.309135]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.309298] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.309396]                                      ^
[   32.309526]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.309633]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.309789] ==================================================================
[   32.278979] ==================================================================
[   32.279052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   32.279117] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.279168] 
[   32.279398] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.279587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.279622] Hardware name: linux,dummy-virt (DT)
[   32.279672] Call trace:
[   32.279768]  show_stack+0x20/0x38 (C)
[   32.279841]  dump_stack_lvl+0x8c/0xd0
[   32.279909]  print_report+0x118/0x5d0
[   32.279955]  kasan_report+0xdc/0x128
[   32.280036]  kasan_check_range+0x100/0x1a8
[   32.280097]  __kasan_check_write+0x20/0x30
[   32.280145]  kasan_atomics_helper+0x154c/0x4858
[   32.280286]  kasan_atomics+0x198/0x2e0
[   32.280499]  kunit_try_run_case+0x170/0x3f0
[   32.280639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.280747]  kthread+0x328/0x630
[   32.281646]  ret_from_fork+0x10/0x20
[   32.281716] 
[   32.281738] Allocated by task 296:
[   32.281770]  kasan_save_stack+0x3c/0x68
[   32.281812]  kasan_save_track+0x20/0x40
[   32.281851]  kasan_save_alloc_info+0x40/0x58
[   32.284190]  __kasan_kmalloc+0xd4/0xd8
[   32.284902]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.285043]  kasan_atomics+0xb8/0x2e0
[   32.286182]  kunit_try_run_case+0x170/0x3f0
[   32.286325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.286377]  kthread+0x328/0x630
[   32.286412]  ret_from_fork+0x10/0x20
[   32.286451] 
[   32.286482] The buggy address belongs to the object at fff00000c9abb900
[   32.286482]  which belongs to the cache kmalloc-64 of size 64
[   32.286543] The buggy address is located 0 bytes to the right of
[   32.286543]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.286608] 
[   32.286631] The buggy address belongs to the physical page:
[   32.286663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.286715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.286762] page_type: f5(slab)
[   32.286812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.286866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.286909] page dumped because: kasan: bad access detected
[   32.286942] 
[   32.286962] Memory state around the buggy address:
[   32.286995]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.287039]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.287173] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.287214]                                      ^
[   32.287249]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.287292]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.287331] ==================================================================
[   32.309982] ==================================================================
[   32.310028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   32.310093] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.310329] 
[   32.310414] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.310660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.311025] Hardware name: linux,dummy-virt (DT)
[   32.311078] Call trace:
[   32.311138]  show_stack+0x20/0x38 (C)
[   32.311199]  dump_stack_lvl+0x8c/0xd0
[   32.311320]  print_report+0x118/0x5d0
[   32.311396]  kasan_report+0xdc/0x128
[   32.311442]  __asan_report_load8_noabort+0x20/0x30
[   32.311702]  kasan_atomics_helper+0x3df4/0x4858
[   32.311797]  kasan_atomics+0x198/0x2e0
[   32.312051]  kunit_try_run_case+0x170/0x3f0
[   32.312261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.312354]  kthread+0x328/0x630
[   32.312419]  ret_from_fork+0x10/0x20
[   32.312472] 
[   32.312492] Allocated by task 296:
[   32.312523]  kasan_save_stack+0x3c/0x68
[   32.312563]  kasan_save_track+0x20/0x40
[   32.312601]  kasan_save_alloc_info+0x40/0x58
[   32.313010]  __kasan_kmalloc+0xd4/0xd8
[   32.313360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.313529]  kasan_atomics+0xb8/0x2e0
[   32.313785]  kunit_try_run_case+0x170/0x3f0
[   32.314020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.314131]  kthread+0x328/0x630
[   32.314415]  ret_from_fork+0x10/0x20
[   32.314641] 
[   32.314691] The buggy address belongs to the object at fff00000c9abb900
[   32.314691]  which belongs to the cache kmalloc-64 of size 64
[   32.314816] The buggy address is located 0 bytes to the right of
[   32.314816]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.315167] 
[   32.315318] The buggy address belongs to the physical page:
[   32.315407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.315716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.315819] page_type: f5(slab)
[   32.315983] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.316338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.316391] page dumped because: kasan: bad access detected
[   32.316531] 
[   32.316611] Memory state around the buggy address:
[   32.316743]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.316848]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.316933] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.317131]                                      ^
[   32.317383]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.317581]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.317648] ==================================================================
[   32.225684] ==================================================================
[   32.225753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   32.225810] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.225897] 
[   32.225976] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.226094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.226122] Hardware name: linux,dummy-virt (DT)
[   32.226169] Call trace:
[   32.226192]  show_stack+0x20/0x38 (C)
[   32.226240]  dump_stack_lvl+0x8c/0xd0
[   32.226289]  print_report+0x118/0x5d0
[   32.226333]  kasan_report+0xdc/0x128
[   32.226378]  kasan_check_range+0x100/0x1a8
[   32.226428]  __kasan_check_write+0x20/0x30
[   32.226476]  kasan_atomics_helper+0x1058/0x4858
[   32.226527]  kasan_atomics+0x198/0x2e0
[   32.226575]  kunit_try_run_case+0x170/0x3f0
[   32.226622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.226675]  kthread+0x328/0x630
[   32.226735]  ret_from_fork+0x10/0x20
[   32.226818] 
[   32.226857] Allocated by task 296:
[   32.226913]  kasan_save_stack+0x3c/0x68
[   32.226992]  kasan_save_track+0x20/0x40
[   32.227095]  kasan_save_alloc_info+0x40/0x58
[   32.227139]  __kasan_kmalloc+0xd4/0xd8
[   32.227205]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.227535]  kasan_atomics+0xb8/0x2e0
[   32.227575]  kunit_try_run_case+0x170/0x3f0
[   32.227635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.227701]  kthread+0x328/0x630
[   32.227755]  ret_from_fork+0x10/0x20
[   32.227832] 
[   32.227870] The buggy address belongs to the object at fff00000c9abb900
[   32.227870]  which belongs to the cache kmalloc-64 of size 64
[   32.227949] The buggy address is located 0 bytes to the right of
[   32.227949]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.228041] 
[   32.228072] The buggy address belongs to the physical page:
[   32.228103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.228153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.228201] page_type: f5(slab)
[   32.228240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.228289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.228331] page dumped because: kasan: bad access detected
[   32.228364] 
[   32.228392] Memory state around the buggy address:
[   32.228425]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.228468]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.228541] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.228641]                                      ^
[   32.228748]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.228836]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.228948] ==================================================================
[   32.298584] ==================================================================
[   32.298636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   32.298690] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.298893] 
[   32.298928] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.299152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.299234] Hardware name: linux,dummy-virt (DT)
[   32.299270] Call trace:
[   32.299311]  show_stack+0x20/0x38 (C)
[   32.299374]  dump_stack_lvl+0x8c/0xd0
[   32.299472]  print_report+0x118/0x5d0
[   32.299520]  kasan_report+0xdc/0x128
[   32.299566]  __asan_report_load8_noabort+0x20/0x30
[   32.299617]  kasan_atomics_helper+0x3db0/0x4858
[   32.299668]  kasan_atomics+0x198/0x2e0
[   32.299717]  kunit_try_run_case+0x170/0x3f0
[   32.299767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.299836]  kthread+0x328/0x630
[   32.299882]  ret_from_fork+0x10/0x20
[   32.299931] 
[   32.299964] Allocated by task 296:
[   32.299996]  kasan_save_stack+0x3c/0x68
[   32.300044]  kasan_save_track+0x20/0x40
[   32.300346]  kasan_save_alloc_info+0x40/0x58
[   32.300407]  __kasan_kmalloc+0xd4/0xd8
[   32.300850]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.300973]  kasan_atomics+0xb8/0x2e0
[   32.301036]  kunit_try_run_case+0x170/0x3f0
[   32.301195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.301525]  kthread+0x328/0x630
[   32.301849]  ret_from_fork+0x10/0x20
[   32.301920] 
[   32.302048] The buggy address belongs to the object at fff00000c9abb900
[   32.302048]  which belongs to the cache kmalloc-64 of size 64
[   32.302296] The buggy address is located 0 bytes to the right of
[   32.302296]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.302452] 
[   32.302584] The buggy address belongs to the physical page:
[   32.302682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.302744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.303031] page_type: f5(slab)
[   32.303257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.303616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.303827] page dumped because: kasan: bad access detected
[   32.303965] 
[   32.304044] Memory state around the buggy address:
[   32.304125]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.304385]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.304561] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.304733]                                      ^
[   32.304801]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.304882]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.304924] ==================================================================
[   32.035785] ==================================================================
[   32.035871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   32.038380]  kasan_save_track+0x20/0x40
[   32.038981] 
[   32.040012] page dumped because: kasan: bad access detected
[   32.041252]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.041318]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.041462] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   31.814917] ==================================================================
[   31.814994] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   31.815091] Read of size 1 at addr ffff800080bf7c2a by task kunit_try_catch/280
[   31.815172] 
[   31.815205] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.815303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.815360] Hardware name: linux,dummy-virt (DT)
[   31.815394] Call trace:
[   31.815420]  show_stack+0x20/0x38 (C)
[   31.815473]  dump_stack_lvl+0x8c/0xd0
[   31.815615]  print_report+0x310/0x5d0
[   31.815666]  kasan_report+0xdc/0x128
[   31.815712]  __asan_report_load1_noabort+0x20/0x30
[   31.815790]  kasan_stack_oob+0x238/0x270
[   31.815865]  kunit_try_run_case+0x170/0x3f0
[   31.815930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.816002]  kthread+0x328/0x630
[   31.816045]  ret_from_fork+0x10/0x20
[   31.816153] 
[   31.816244] The buggy address belongs to stack of task kunit_try_catch/280
[   31.816401]  and is located at offset 138 in frame:
[   31.816450]  kasan_stack_oob+0x0/0x270
[   31.816733] 
[   31.816766] This frame has 4 objects:
[   31.816853]  [48, 49) '__assertion'
[   31.817181]  [64, 72) 'array'
[   31.817223]  [96, 112) '__assertion'
[   31.817375]  [128, 138) 'stack_array'
[   31.817527] 
[   31.817579] The buggy address ffff800080bf7c2a belongs to a vmalloc virtual mapping
[   31.817627] The buggy address belongs to the physical page:
[   31.817684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b35
[   31.817856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.817920] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.818038] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.818189] page dumped because: kasan: bad access detected
[   31.818671]                                   ^
[   31.823526] 
[   31.823701] Call trace:
[   31.825223] The buggy address belongs to the physical page:
[   31.826131]                                                     ^
[   31.832461] Read of size 1 at addr ffff800080c17b4a by task kunit_try_catch/284
[   31.833812]  kthread+0x328/0x630
[   31.835301] 
[   31.835559]                                               ^
[   31.851660] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   31.800222] ==================================================================
[   31.800284] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   31.800338] Read of size 1 at addr ffffad48ba17b70d by task kunit_try_catch/276
[   31.800609] 
[   31.800696] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.800826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.800911] Hardware name: linux,dummy-virt (DT)
[   31.801001] Call trace:
[   31.801050]  show_stack+0x20/0x38 (C)
[   31.801179]  dump_stack_lvl+0x8c/0xd0
[   31.801228]  print_report+0x310/0x5d0
[   31.801385]  kasan_report+0xdc/0x128
[   31.801433]  __asan_report_load1_noabort+0x20/0x30
[   31.801483]  kasan_global_oob_right+0x230/0x270
[   31.801535]  kunit_try_run_case+0x170/0x3f0
[   31.801584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.801740]  kthread+0x328/0x630
[   31.801825]  ret_from_fork+0x10/0x20
[   31.801966] 
[   31.802076] The buggy address belongs to the variable:
[   31.802153]  global_array+0xd/0x40
[   31.802217] 
[   31.802296] The buggy address ffffad48ba17b70d belongs to a vmalloc virtual mapping
[   31.802419] The buggy address belongs to the physical page:
[   31.802453] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d7b
[   31.802508] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   31.802577] raw: 03fffe0000002000 ffffc1ffc01f5ec8 ffffc1ffc01f5ec8 0000000000000000
[   31.802772] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.802884] page dumped because: kasan: bad access detected
[   31.802934] 
[   31.802954] Memory state around the buggy address:
[   31.802988]  ffffad48ba17b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.803044]  ffffad48ba17b680: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   31.803194] >ffffad48ba17b700: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   31.803234]                       ^
[   31.803265]  ffffad48ba17b780: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   31.803361]  ffffad48ba17b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.803499] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   31.791818] ==================================================================
[   31.791878] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.791932] Free of addr fff00000c9bd4001 by task kunit_try_catch/274
[   31.791974] 
[   31.792002] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.792386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.792454] Hardware name: linux,dummy-virt (DT)
[   31.792484] Call trace:
[   31.792505]  show_stack+0x20/0x38 (C)
[   31.792557]  dump_stack_lvl+0x8c/0xd0
[   31.792604]  print_report+0x118/0x5d0
[   31.792702]  kasan_report_invalid_free+0xc0/0xe8
[   31.792922]  __kasan_mempool_poison_object+0xfc/0x150
[   31.793065]  mempool_free+0x28c/0x328
[   31.793150]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.793453]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   31.793507]  kunit_try_run_case+0x170/0x3f0
[   31.793554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.793605]  kthread+0x328/0x630
[   31.793709]  ret_from_fork+0x10/0x20
[   31.793759] 
[   31.793827] The buggy address belongs to the physical page:
[   31.793897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd4
[   31.793958] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.794101] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.794181] page_type: f8(unknown)
[   31.794255] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.794369] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.794441] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.794491] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.794542] head: 0bfffe0000000002 ffffc1ffc326f501 00000000ffffffff 00000000ffffffff
[   31.794631] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.794675] page dumped because: kasan: bad access detected
[   31.794708] 
[   31.794728] Memory state around the buggy address:
[   31.794787]  fff00000c9bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.794851]  fff00000c9bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.794913] >fff00000c9bd4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.795011]                    ^
[   31.795063]  fff00000c9bd4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.795131]  fff00000c9bd4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.795230] ==================================================================
[   31.781556] ==================================================================
[   31.781612] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.781666] Free of addr fff00000c98f2901 by task kunit_try_catch/272
[   31.781705] 
[   31.781755] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.781861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.781889] Hardware name: linux,dummy-virt (DT)
[   31.781925] Call trace:
[   31.781948]  show_stack+0x20/0x38 (C)
[   31.782005]  dump_stack_lvl+0x8c/0xd0
[   31.782067]  print_report+0x118/0x5d0
[   31.782113]  kasan_report_invalid_free+0xc0/0xe8
[   31.782171]  check_slab_allocation+0xfc/0x108
[   31.782218]  __kasan_mempool_poison_object+0x78/0x150
[   31.782276]  mempool_free+0x28c/0x328
[   31.782329]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.782390]  mempool_kmalloc_invalid_free+0xc0/0x118
[   31.782451]  kunit_try_run_case+0x170/0x3f0
[   31.782499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.782549]  kthread+0x328/0x630
[   31.782591]  ret_from_fork+0x10/0x20
[   31.782637] 
[   31.782664] Allocated by task 272:
[   31.782703]  kasan_save_stack+0x3c/0x68
[   31.782740]  kasan_save_track+0x20/0x40
[   31.782797]  kasan_save_alloc_info+0x40/0x58
[   31.782835]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.782875]  remove_element+0x130/0x1f8
[   31.782910]  mempool_alloc_preallocated+0x58/0xc0
[   31.782950]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   31.782992]  mempool_kmalloc_invalid_free+0xc0/0x118
[   31.783033]  kunit_try_run_case+0x170/0x3f0
[   31.783078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.783121]  kthread+0x328/0x630
[   31.783152]  ret_from_fork+0x10/0x20
[   31.783187] 
[   31.783206] The buggy address belongs to the object at fff00000c98f2900
[   31.783206]  which belongs to the cache kmalloc-128 of size 128
[   31.783264] The buggy address is located 1 bytes inside of
[   31.783264]  128-byte region [fff00000c98f2900, fff00000c98f2980)
[   31.783322] 
[   31.783342] The buggy address belongs to the physical page:
[   31.783370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   31.783420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.783466] page_type: f5(slab)
[   31.783957] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.784018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.784121] page dumped because: kasan: bad access detected
[   31.784169] 
[   31.784187] Memory state around the buggy address:
[   31.784225]  fff00000c98f2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.784326]  fff00000c98f2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.784368] >fff00000c98f2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.784440]                    ^
[   31.784468]  fff00000c98f2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.784512]  fff00000c98f2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.784552] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   31.755593] ==================================================================
[   31.755653] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.756010] Free of addr fff00000c9bd4000 by task kunit_try_catch/268
[   31.756306] 
[   31.756347] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.756673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.756836] Hardware name: linux,dummy-virt (DT)
[   31.756868] Call trace:
[   31.756969]  show_stack+0x20/0x38 (C)
[   31.757229]  dump_stack_lvl+0x8c/0xd0
[   31.757322]  print_report+0x118/0x5d0
[   31.757687]  kasan_report_invalid_free+0xc0/0xe8
[   31.757884]  __kasan_mempool_poison_object+0x14c/0x150
[   31.757972]  mempool_free+0x28c/0x328
[   31.758343]  mempool_double_free_helper+0x150/0x2e8
[   31.758455]  mempool_kmalloc_large_double_free+0xc0/0x118
[   31.758549]  kunit_try_run_case+0x170/0x3f0
[   31.758937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.759049]  kthread+0x328/0x630
[   31.759177]  ret_from_fork+0x10/0x20
[   31.759268] 
[   31.759581] The buggy address belongs to the physical page:
[   31.759648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd4
[   31.759706] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.760045] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.760246] page_type: f8(unknown)
[   31.760307] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.760784] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.760844] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.762123] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.762183] head: 0bfffe0000000002 ffffc1ffc326f501 00000000ffffffff 00000000ffffffff
[   31.762233] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.762275] page dumped because: kasan: bad access detected
[   31.762305] 
[   31.762325] Memory state around the buggy address:
[   31.762357]  fff00000c9bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.762401]  fff00000c9bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.762443] >fff00000c9bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.762481]                    ^
[   31.762509]  fff00000c9bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.762550]  fff00000c9bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.762588] ==================================================================
[   31.736412] ==================================================================
[   31.736641] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.737382] Free of addr fff00000c98f2500 by task kunit_try_catch/266
[   31.737484] 
[   31.737786] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.737887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.737938] Hardware name: linux,dummy-virt (DT)
[   31.738114] Call trace:
[   31.738203]  show_stack+0x20/0x38 (C)
[   31.738376]  dump_stack_lvl+0x8c/0xd0
[   31.738432]  print_report+0x118/0x5d0
[   31.738502]  kasan_report_invalid_free+0xc0/0xe8
[   31.738597]  check_slab_allocation+0xd4/0x108
[   31.738661]  __kasan_mempool_poison_object+0x78/0x150
[   31.738711]  mempool_free+0x28c/0x328
[   31.738763]  mempool_double_free_helper+0x150/0x2e8
[   31.738818]  mempool_kmalloc_double_free+0xc0/0x118
[   31.738868]  kunit_try_run_case+0x170/0x3f0
[   31.738916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.738970]  kthread+0x328/0x630
[   31.739013]  ret_from_fork+0x10/0x20
[   31.739088] 
[   31.739117] Allocated by task 266:
[   31.739164]  kasan_save_stack+0x3c/0x68
[   31.739215]  kasan_save_track+0x20/0x40
[   31.739251]  kasan_save_alloc_info+0x40/0x58
[   31.739289]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.739329]  remove_element+0x130/0x1f8
[   31.739366]  mempool_alloc_preallocated+0x58/0xc0
[   31.739409]  mempool_double_free_helper+0x94/0x2e8
[   31.739450]  mempool_kmalloc_double_free+0xc0/0x118
[   31.739491]  kunit_try_run_case+0x170/0x3f0
[   31.739529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.739582]  kthread+0x328/0x630
[   31.739613]  ret_from_fork+0x10/0x20
[   31.739659] 
[   31.739693] Freed by task 266:
[   31.739727]  kasan_save_stack+0x3c/0x68
[   31.739770]  kasan_save_track+0x20/0x40
[   31.739820]  kasan_save_free_info+0x4c/0x78
[   31.739857]  __kasan_mempool_poison_object+0xc0/0x150
[   31.739906]  mempool_free+0x28c/0x328
[   31.739942]  mempool_double_free_helper+0x100/0x2e8
[   31.739984]  mempool_kmalloc_double_free+0xc0/0x118
[   31.740024]  kunit_try_run_case+0x170/0x3f0
[   31.740793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.740872]  kthread+0x328/0x630
[   31.740925]  ret_from_fork+0x10/0x20
[   31.741345] 
[   31.741396] The buggy address belongs to the object at fff00000c98f2500
[   31.741396]  which belongs to the cache kmalloc-128 of size 128
[   31.741462] The buggy address is located 0 bytes inside of
[   31.741462]  128-byte region [fff00000c98f2500, fff00000c98f2580)
[   31.741592] 
[   31.742014] The buggy address belongs to the physical page:
[   31.742548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   31.742811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.743070] page_type: f5(slab)
[   31.743211] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.743787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.743862] page dumped because: kasan: bad access detected
[   31.744205] 
[   31.744262] Memory state around the buggy address:
[   31.744316]  fff00000c98f2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.744515]  fff00000c98f2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.744579] >fff00000c98f2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.744695]                    ^
[   31.744727]  fff00000c98f2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.744790]  fff00000c98f2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.745128] ==================================================================
[   31.773403] ==================================================================
[   31.773464] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.773520] Free of addr fff00000c9bd4000 by task kunit_try_catch/270
[   31.773561] 
[   31.773593] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.773676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.773703] Hardware name: linux,dummy-virt (DT)
[   31.773786] Call trace:
[   31.773810]  show_stack+0x20/0x38 (C)
[   31.773860]  dump_stack_lvl+0x8c/0xd0
[   31.773916]  print_report+0x118/0x5d0
[   31.773972]  kasan_report_invalid_free+0xc0/0xe8
[   31.774032]  __kasan_mempool_poison_pages+0xe0/0xe8
[   31.774104]  mempool_free+0x24c/0x328
[   31.774226]  mempool_double_free_helper+0x150/0x2e8
[   31.774278]  mempool_page_alloc_double_free+0xbc/0x118
[   31.774367]  kunit_try_run_case+0x170/0x3f0
[   31.774422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.774475]  kthread+0x328/0x630
[   31.774523]  ret_from_fork+0x10/0x20
[   31.774573] 
[   31.774593] The buggy address belongs to the physical page:
[   31.774764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd4
[   31.774827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.774902] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.774969] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.775012] page dumped because: kasan: bad access detected
[   31.775113] 
[   31.775131] Memory state around the buggy address:
[   31.775189]  fff00000c9bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.775233]  fff00000c9bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.775275] >fff00000c9bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.775312]                    ^
[   31.775339]  fff00000c9bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.775505]  fff00000c9bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.775548] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   31.722641] ==================================================================
[   31.722978] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   31.723179] Read of size 1 at addr fff00000c9bd4000 by task kunit_try_catch/264
[   31.723324] 
[   31.723408] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.723499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.723783] Hardware name: linux,dummy-virt (DT)
[   31.723912] Call trace:
[   31.723942]  show_stack+0x20/0x38 (C)
[   31.723999]  dump_stack_lvl+0x8c/0xd0
[   31.724192]  print_report+0x118/0x5d0
[   31.724254]  kasan_report+0xdc/0x128
[   31.724298]  __asan_report_load1_noabort+0x20/0x30
[   31.724534]  mempool_uaf_helper+0x314/0x340
[   31.724660]  mempool_page_alloc_uaf+0xc0/0x118
[   31.724813]  kunit_try_run_case+0x170/0x3f0
[   31.724929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.724985]  kthread+0x328/0x630
[   31.725362]  ret_from_fork+0x10/0x20
[   31.725638] 
[   31.725696] The buggy address belongs to the physical page:
[   31.725830] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd4
[   31.725916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.726040] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.726435] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.726555] page dumped because: kasan: bad access detected
[   31.726658] 
[   31.726694] Memory state around the buggy address:
[   31.726741]  fff00000c9bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.726817]  fff00000c9bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.726860] >fff00000c9bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.726897]                    ^
[   31.726925]  fff00000c9bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.726976]  fff00000c9bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.727014] ==================================================================
[   31.662738] ==================================================================
[   31.662804] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   31.662857] Read of size 1 at addr fff00000c9bd0000 by task kunit_try_catch/260
[   31.662905] 
[   31.662934] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.663020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.663048] Hardware name: linux,dummy-virt (DT)
[   31.663096] Call trace:
[   31.663117]  show_stack+0x20/0x38 (C)
[   31.663167]  dump_stack_lvl+0x8c/0xd0
[   31.663217]  print_report+0x118/0x5d0
[   31.663261]  kasan_report+0xdc/0x128
[   31.663304]  __asan_report_load1_noabort+0x20/0x30
[   31.663351]  mempool_uaf_helper+0x314/0x340
[   31.663398]  mempool_kmalloc_large_uaf+0xc4/0x120
[   31.663465]  kunit_try_run_case+0x170/0x3f0
[   31.663527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.663579]  kthread+0x328/0x630
[   31.663620]  ret_from_fork+0x10/0x20
[   31.663665] 
[   31.663702] The buggy address belongs to the physical page:
[   31.663739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd0
[   31.663791] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.663845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.663898] page_type: f8(unknown)
[   31.663950] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.663999] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.664050] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.664869] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.664950] head: 0bfffe0000000002 ffffc1ffc326f401 00000000ffffffff 00000000ffffffff
[   31.665033] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.665085] page dumped because: kasan: bad access detected
[   31.665117] 
[   31.665136] Memory state around the buggy address:
[   31.665464]  fff00000c9bcff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.665725]  fff00000c9bcff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.665884] >fff00000c9bd0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.666334]                    ^
[   31.666403]  fff00000c9bd0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.666869]  fff00000c9bd0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.667226] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   31.642683] ==================================================================
[   31.642779] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   31.642855] Read of size 1 at addr fff00000c98f2100 by task kunit_try_catch/258
[   31.642916] 
[   31.642989] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.643100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.643140] Hardware name: linux,dummy-virt (DT)
[   31.643173] Call trace:
[   31.643208]  show_stack+0x20/0x38 (C)
[   31.643258]  dump_stack_lvl+0x8c/0xd0
[   31.643319]  print_report+0x118/0x5d0
[   31.643375]  kasan_report+0xdc/0x128
[   31.643419]  __asan_report_load1_noabort+0x20/0x30
[   31.643480]  mempool_uaf_helper+0x314/0x340
[   31.643539]  mempool_kmalloc_uaf+0xc4/0x120
[   31.643605]  kunit_try_run_case+0x170/0x3f0
[   31.643667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.643731]  kthread+0x328/0x630
[   31.643786]  ret_from_fork+0x10/0x20
[   31.643845] 
[   31.643874] Allocated by task 258:
[   31.643923]  kasan_save_stack+0x3c/0x68
[   31.643961]  kasan_save_track+0x20/0x40
[   31.644008]  kasan_save_alloc_info+0x40/0x58
[   31.644046]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.644199]  remove_element+0x130/0x1f8
[   31.644242]  mempool_alloc_preallocated+0x58/0xc0
[   31.645020]  mempool_uaf_helper+0xa4/0x340
[   31.645108]  mempool_kmalloc_uaf+0xc4/0x120
[   31.645189]  kunit_try_run_case+0x170/0x3f0
[   31.645230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.645561]  kthread+0x328/0x630
[   31.645762]  ret_from_fork+0x10/0x20
[   31.646032] 
[   31.646472] Freed by task 258:
[   31.646533]  kasan_save_stack+0x3c/0x68
[   31.646745]  kasan_save_track+0x20/0x40
[   31.646825]  kasan_save_free_info+0x4c/0x78
[   31.646990]  __kasan_mempool_poison_object+0xc0/0x150
[   31.647160]  mempool_free+0x28c/0x328
[   31.647202]  mempool_uaf_helper+0x104/0x340
[   31.647403]  mempool_kmalloc_uaf+0xc4/0x120
[   31.647566]  kunit_try_run_case+0x170/0x3f0
[   31.647749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.647838]  kthread+0x328/0x630
[   31.648081]  ret_from_fork+0x10/0x20
[   31.648222] 
[   31.648426] The buggy address belongs to the object at fff00000c98f2100
[   31.648426]  which belongs to the cache kmalloc-128 of size 128
[   31.648503] The buggy address is located 0 bytes inside of
[   31.648503]  freed 128-byte region [fff00000c98f2100, fff00000c98f2180)
[   31.648731] 
[   31.649220] The buggy address belongs to the physical page:
[   31.649272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   31.649463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.649652] page_type: f5(slab)
[   31.649758] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.649838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.650073] page dumped because: kasan: bad access detected
[   31.650191] 
[   31.650289] Memory state around the buggy address:
[   31.650325]  fff00000c98f2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.650749]  fff00000c98f2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.650810] >fff00000c98f2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.650974]                    ^
[   31.651404]  fff00000c98f2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.651510]  fff00000c98f2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.651611] ==================================================================
[   31.683025] ==================================================================
[   31.683535] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   31.683638] Read of size 1 at addr fff00000c98df240 by task kunit_try_catch/262
[   31.684031] 
[   31.684084] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.684291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.684329] Hardware name: linux,dummy-virt (DT)
[   31.684712] Call trace:
[   31.685165]  show_stack+0x20/0x38 (C)
[   31.685240]  dump_stack_lvl+0x8c/0xd0
[   31.685331]  print_report+0x118/0x5d0
[   31.685533]  kasan_report+0xdc/0x128
[   31.685833]  __asan_report_load1_noabort+0x20/0x30
[   31.686092]  mempool_uaf_helper+0x314/0x340
[   31.686255]  mempool_slab_uaf+0xc0/0x118
[   31.686343]  kunit_try_run_case+0x170/0x3f0
[   31.686403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.686463]  kthread+0x328/0x630
[   31.686509]  ret_from_fork+0x10/0x20
[   31.686556] 
[   31.686577] Allocated by task 262:
[   31.686605]  kasan_save_stack+0x3c/0x68
[   31.686645]  kasan_save_track+0x20/0x40
[   31.686693]  kasan_save_alloc_info+0x40/0x58
[   31.686740]  __kasan_mempool_unpoison_object+0xbc/0x180
[   31.686790]  remove_element+0x16c/0x1f8
[   31.686828]  mempool_alloc_preallocated+0x58/0xc0
[   31.686879]  mempool_uaf_helper+0xa4/0x340
[   31.686925]  mempool_slab_uaf+0xc0/0x118
[   31.686971]  kunit_try_run_case+0x170/0x3f0
[   31.687028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.687091]  kthread+0x328/0x630
[   31.687134]  ret_from_fork+0x10/0x20
[   31.687168] 
[   31.687189] Freed by task 262:
[   31.687225]  kasan_save_stack+0x3c/0x68
[   31.687261]  kasan_save_track+0x20/0x40
[   31.687302]  kasan_save_free_info+0x4c/0x78
[   31.687354]  __kasan_mempool_poison_object+0xc0/0x150
[   31.687395]  mempool_free+0x28c/0x328
[   31.687438]  mempool_uaf_helper+0x104/0x340
[   31.687482]  mempool_slab_uaf+0xc0/0x118
[   31.687527]  kunit_try_run_case+0x170/0x3f0
[   31.687565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.687614]  kthread+0x328/0x630
[   31.687661]  ret_from_fork+0x10/0x20
[   31.687698] 
[   31.687719] The buggy address belongs to the object at fff00000c98df240
[   31.687719]  which belongs to the cache test_cache of size 123
[   31.687784] The buggy address is located 0 bytes inside of
[   31.687784]  freed 123-byte region [fff00000c98df240, fff00000c98df2bb)
[   31.687855] 
[   31.687876] The buggy address belongs to the physical page:
[   31.687915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098df
[   31.687969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.688018] page_type: f5(slab)
[   31.688066] raw: 0bfffe0000000000 fff00000c3f2ddc0 dead000000000122 0000000000000000
[   31.688322] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   31.688682] page dumped because: kasan: bad access detected
[   31.688724] 
[   31.688766] Memory state around the buggy address:
[   31.689381]  fff00000c98df100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.689754]  fff00000c98df180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.690094] >fff00000c98df200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   31.690337]                                            ^
[   31.690542]  fff00000c98df280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.690702]  fff00000c98df300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.690743] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   31.607403] ==================================================================
[   31.607465] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.607521] Read of size 1 at addr fff00000c99f02bb by task kunit_try_catch/256
[   31.607571] 
[   31.607604] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.607693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.607721] Hardware name: linux,dummy-virt (DT)
[   31.607752] Call trace:
[   31.607776]  show_stack+0x20/0x38 (C)
[   31.607844]  dump_stack_lvl+0x8c/0xd0
[   31.607897]  print_report+0x118/0x5d0
[   31.607942]  kasan_report+0xdc/0x128
[   31.607985]  __asan_report_load1_noabort+0x20/0x30
[   31.608065]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.608828]  mempool_slab_oob_right+0xc0/0x118
[   31.609037]  kunit_try_run_case+0x170/0x3f0
[   31.609299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.609477]  kthread+0x328/0x630
[   31.609557]  ret_from_fork+0x10/0x20
[   31.609706] 
[   31.609855] Allocated by task 256:
[   31.609885]  kasan_save_stack+0x3c/0x68
[   31.610077]  kasan_save_track+0x20/0x40
[   31.610217]  kasan_save_alloc_info+0x40/0x58
[   31.610322]  __kasan_mempool_unpoison_object+0xbc/0x180
[   31.610448]  remove_element+0x16c/0x1f8
[   31.610533]  mempool_alloc_preallocated+0x58/0xc0
[   31.610719]  mempool_oob_right_helper+0x98/0x2f0
[   31.610838]  mempool_slab_oob_right+0xc0/0x118
[   31.610974]  kunit_try_run_case+0x170/0x3f0
[   31.611268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.611420]  kthread+0x328/0x630
[   31.611575]  ret_from_fork+0x10/0x20
[   31.611716] 
[   31.611766] The buggy address belongs to the object at fff00000c99f0240
[   31.611766]  which belongs to the cache test_cache of size 123
[   31.611982] The buggy address is located 0 bytes to the right of
[   31.611982]  allocated 123-byte region [fff00000c99f0240, fff00000c99f02bb)
[   31.612186] 
[   31.612430] The buggy address belongs to the physical page:
[   31.612558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0
[   31.612693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.612836] page_type: f5(slab)
[   31.612897] raw: 0bfffe0000000000 fff00000c3f2dc80 dead000000000122 0000000000000000
[   31.612969] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   31.613173] page dumped because: kasan: bad access detected
[   31.613294] 
[   31.613349] Memory state around the buggy address:
[   31.613529]  fff00000c99f0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.613652]  fff00000c99f0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   31.613723] >fff00000c99f0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   31.613815]                                         ^
[   31.613878]  fff00000c99f0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.613953]  fff00000c99f0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.614119] ==================================================================
[   31.587938] ==================================================================
[   31.589379] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.589510] Read of size 1 at addr fff00000c9b86001 by task kunit_try_catch/254
[   31.589566] 
[   31.589597] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.589969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.590001] Hardware name: linux,dummy-virt (DT)
[   31.590163] Call trace:
[   31.590243]  show_stack+0x20/0x38 (C)
[   31.590661]  dump_stack_lvl+0x8c/0xd0
[   31.591045]  print_report+0x118/0x5d0
[   31.591100]  kasan_report+0xdc/0x128
[   31.591635]  __asan_report_load1_noabort+0x20/0x30
[   31.591758]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.592005]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   31.592259]  kunit_try_run_case+0x170/0x3f0
[   31.592309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.592361]  kthread+0x328/0x630
[   31.592760]  ret_from_fork+0x10/0x20
[   31.593015] 
[   31.593038] The buggy address belongs to the physical page:
[   31.593083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b84
[   31.593483] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.593752] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.593865] page_type: f8(unknown)
[   31.594291] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.594563] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.594617] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.595008] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.595319] head: 0bfffe0000000002 ffffc1ffc326e101 00000000ffffffff 00000000ffffffff
[   31.595400] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.595487] page dumped because: kasan: bad access detected
[   31.595539] 
[   31.595612] Memory state around the buggy address:
[   31.595752]  fff00000c9b85f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.595880]  fff00000c9b85f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.595972] >fff00000c9b86000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.596097]                    ^
[   31.596150]  fff00000c9b86080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.596193]  fff00000c9b86100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.596461] ==================================================================
[   31.567014] ==================================================================
[   31.567100] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.567172] Read of size 1 at addr fff00000c3f63d73 by task kunit_try_catch/252
[   31.567224] 
[   31.567265] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.567355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.567381] Hardware name: linux,dummy-virt (DT)
[   31.567415] Call trace:
[   31.567439]  show_stack+0x20/0x38 (C)
[   31.567492]  dump_stack_lvl+0x8c/0xd0
[   31.567544]  print_report+0x118/0x5d0
[   31.567587]  kasan_report+0xdc/0x128
[   31.567631]  __asan_report_load1_noabort+0x20/0x30
[   31.567679]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.567728]  mempool_kmalloc_oob_right+0xc4/0x120
[   31.567779]  kunit_try_run_case+0x170/0x3f0
[   31.567830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.567882]  kthread+0x328/0x630
[   31.567924]  ret_from_fork+0x10/0x20
[   31.567971] 
[   31.567991] Allocated by task 252:
[   31.568021]  kasan_save_stack+0x3c/0x68
[   31.568072]  kasan_save_track+0x20/0x40
[   31.568106]  kasan_save_alloc_info+0x40/0x58
[   31.568145]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.568186]  remove_element+0x130/0x1f8
[   31.568230]  mempool_alloc_preallocated+0x58/0xc0
[   31.568272]  mempool_oob_right_helper+0x98/0x2f0
[   31.568313]  mempool_kmalloc_oob_right+0xc4/0x120
[   31.568354]  kunit_try_run_case+0x170/0x3f0
[   31.568417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.568460]  kthread+0x328/0x630
[   31.568492]  ret_from_fork+0x10/0x20
[   31.568528] 
[   31.568550] The buggy address belongs to the object at fff00000c3f63d00
[   31.568550]  which belongs to the cache kmalloc-128 of size 128
[   31.568609] The buggy address is located 0 bytes to the right of
[   31.568609]  allocated 115-byte region [fff00000c3f63d00, fff00000c3f63d73)
[   31.568671] 
[   31.568694] The buggy address belongs to the physical page:
[   31.568726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f63
[   31.568784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.568836] page_type: f5(slab)
[   31.568879] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.568930] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.568971] page dumped because: kasan: bad access detected
[   31.569003] 
[   31.569021] Memory state around the buggy address:
[   31.569069]  fff00000c3f63c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.569113]  fff00000c3f63c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.569157] >fff00000c3f63d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.569196]                                                              ^
[   31.569236]  fff00000c3f63d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.569278]  fff00000c3f63e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.569316] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   31.007415] ==================================================================
[   31.007489] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   31.007564] Read of size 1 at addr fff00000c3f2da00 by task kunit_try_catch/246
[   31.007616] 
[   31.007658] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.007749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.007774] Hardware name: linux,dummy-virt (DT)
[   31.007809] Call trace:
[   31.007835]  show_stack+0x20/0x38 (C)
[   31.007888]  dump_stack_lvl+0x8c/0xd0
[   31.007943]  print_report+0x118/0x5d0
[   31.007990]  kasan_report+0xdc/0x128
[   31.008035]  __kasan_check_byte+0x54/0x70
[   31.008095]  kmem_cache_destroy+0x34/0x218
[   31.008146]  kmem_cache_double_destroy+0x174/0x300
[   31.008195]  kunit_try_run_case+0x170/0x3f0
[   31.008243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.008295]  kthread+0x328/0x630
[   31.008338]  ret_from_fork+0x10/0x20
[   31.008404] 
[   31.008423] Allocated by task 246:
[   31.008453]  kasan_save_stack+0x3c/0x68
[   31.008493]  kasan_save_track+0x20/0x40
[   31.008528]  kasan_save_alloc_info+0x40/0x58
[   31.008567]  __kasan_slab_alloc+0xa8/0xb0
[   31.008603]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.008645]  __kmem_cache_create_args+0x178/0x280
[   31.008686]  kmem_cache_double_destroy+0xc0/0x300
[   31.008726]  kunit_try_run_case+0x170/0x3f0
[   31.008763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.008806]  kthread+0x328/0x630
[   31.008838]  ret_from_fork+0x10/0x20
[   31.008875] 
[   31.008893] Freed by task 246:
[   31.008918]  kasan_save_stack+0x3c/0x68
[   31.008955]  kasan_save_track+0x20/0x40
[   31.008990]  kasan_save_free_info+0x4c/0x78
[   31.009027]  __kasan_slab_free+0x6c/0x98
[   31.009073]  kmem_cache_free+0x260/0x468
[   31.009113]  slab_kmem_cache_release+0x38/0x50
[   31.009154]  kmem_cache_release+0x1c/0x30
[   31.009190]  kobject_put+0x17c/0x420
[   31.009226]  sysfs_slab_release+0x1c/0x30
[   31.009262]  kmem_cache_destroy+0x118/0x218
[   31.009301]  kmem_cache_double_destroy+0x128/0x300
[   31.009341]  kunit_try_run_case+0x170/0x3f0
[   31.009377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.009419]  kthread+0x328/0x630
[   31.009451]  ret_from_fork+0x10/0x20
[   31.009487] 
[   31.009507] The buggy address belongs to the object at fff00000c3f2da00
[   31.009507]  which belongs to the cache kmem_cache of size 208
[   31.009567] The buggy address is located 0 bytes inside of
[   31.009567]  freed 208-byte region [fff00000c3f2da00, fff00000c3f2dad0)
[   31.009627] 
[   31.009649] The buggy address belongs to the physical page:
[   31.009685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f2d
[   31.009742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.009795] page_type: f5(slab)
[   31.009838] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   31.009888] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   31.009929] page dumped because: kasan: bad access detected
[   31.009961] 
[   31.009978] Memory state around the buggy address:
[   31.010013]  fff00000c3f2d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.010063]  fff00000c3f2d980: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.010107] >fff00000c3f2da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.010147]                    ^
[   31.010173]  fff00000c3f2da80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   31.010212]  fff00000c3f2db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.010250] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   30.920918] ==================================================================
[   30.921024] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   30.921122] Read of size 1 at addr fff00000c9b29000 by task kunit_try_catch/244
[   30.921174] 
[   30.921217] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   30.921305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.921332] Hardware name: linux,dummy-virt (DT)
[   30.921367] Call trace:
[   30.921394]  show_stack+0x20/0x38 (C)
[   30.921448]  dump_stack_lvl+0x8c/0xd0
[   30.921502]  print_report+0x118/0x5d0
[   30.921548]  kasan_report+0xdc/0x128
[   30.921592]  __asan_report_load1_noabort+0x20/0x30
[   30.921642]  kmem_cache_rcu_uaf+0x388/0x468
[   30.921690]  kunit_try_run_case+0x170/0x3f0
[   30.921740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.921793]  kthread+0x328/0x630
[   30.921838]  ret_from_fork+0x10/0x20
[   30.921889] 
[   30.921907] Allocated by task 244:
[   30.921939]  kasan_save_stack+0x3c/0x68
[   30.921979]  kasan_save_track+0x20/0x40
[   30.922013]  kasan_save_alloc_info+0x40/0x58
[   30.922051]  __kasan_slab_alloc+0xa8/0xb0
[   30.922152]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.922197]  kmem_cache_rcu_uaf+0x12c/0x468
[   30.922235]  kunit_try_run_case+0x170/0x3f0
[   30.922272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.922315]  kthread+0x328/0x630
[   30.922348]  ret_from_fork+0x10/0x20
[   30.922385] 
[   30.922405] Freed by task 0:
[   30.922431]  kasan_save_stack+0x3c/0x68
[   30.922468]  kasan_save_track+0x20/0x40
[   30.922501]  kasan_save_free_info+0x4c/0x78
[   30.922538]  __kasan_slab_free+0x6c/0x98
[   30.922572]  slab_free_after_rcu_debug+0xd4/0x2f8
[   30.922613]  rcu_core+0x9f4/0x1e58
[   30.922650]  rcu_core_si+0x18/0x30
[   30.922686]  handle_softirqs+0x374/0xb28
[   30.922725]  __do_softirq+0x1c/0x28
[   30.922757] 
[   30.922790] Last potentially related work creation:
[   30.922815]  kasan_save_stack+0x3c/0x68
[   30.922852]  kasan_record_aux_stack+0xb4/0xc8
[   30.922889]  kmem_cache_free+0x120/0x468
[   30.922928]  kmem_cache_rcu_uaf+0x16c/0x468
[   30.922967]  kunit_try_run_case+0x170/0x3f0
[   30.923004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.923046]  kthread+0x328/0x630
[   30.923091]  ret_from_fork+0x10/0x20
[   30.923125] 
[   30.923143] The buggy address belongs to the object at fff00000c9b29000
[   30.923143]  which belongs to the cache test_cache of size 200
[   30.923203] The buggy address is located 0 bytes inside of
[   30.923203]  freed 200-byte region [fff00000c9b29000, fff00000c9b290c8)
[   30.923265] 
[   30.923294] The buggy address belongs to the physical page:
[   30.923329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b29
[   30.923388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.923441] page_type: f5(slab)
[   30.923485] raw: 0bfffe0000000000 fff00000c5817500 dead000000000122 0000000000000000
[   30.923536] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.923577] page dumped because: kasan: bad access detected
[   30.923609] 
[   30.923628] Memory state around the buggy address:
[   30.923662]  fff00000c9b28f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.923706]  fff00000c9b28f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.923749] >fff00000c9b29000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.923788]                    ^
[   30.923816]  fff00000c9b29080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   30.923858]  fff00000c9b29100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.923897] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   30.423644] ==================================================================
[   30.423938] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   30.424413] Free of addr fff00000c9b27001 by task kunit_try_catch/242
[   30.424478] 
[   30.424658] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   30.424754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.424780] Hardware name: linux,dummy-virt (DT)
[   30.424814] Call trace:
[   30.424838]  show_stack+0x20/0x38 (C)
[   30.424892]  dump_stack_lvl+0x8c/0xd0
[   30.424945]  print_report+0x118/0x5d0
[   30.424988]  kasan_report_invalid_free+0xc0/0xe8
[   30.425036]  check_slab_allocation+0xfc/0x108
[   30.426437]  __kasan_slab_pre_free+0x2c/0x48
[   30.426557]  kmem_cache_free+0xf0/0x468
[   30.426610]  kmem_cache_invalid_free+0x184/0x3c8
[   30.426660]  kunit_try_run_case+0x170/0x3f0
[   30.426746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.426852]  kthread+0x328/0x630
[   30.426997]  ret_from_fork+0x10/0x20
[   30.427078] 
[   30.427099] Allocated by task 242:
[   30.427129]  kasan_save_stack+0x3c/0x68
[   30.427553]  kasan_save_track+0x20/0x40
[   30.428076]  kasan_save_alloc_info+0x40/0x58
[   30.428125]  __kasan_slab_alloc+0xa8/0xb0
[   30.428162]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.428203]  kmem_cache_invalid_free+0x12c/0x3c8
[   30.428244]  kunit_try_run_case+0x170/0x3f0
[   30.428282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.428332]  kthread+0x328/0x630
[   30.428492]  ret_from_fork+0x10/0x20
[   30.428559] 
[   30.428579] The buggy address belongs to the object at fff00000c9b27000
[   30.428579]  which belongs to the cache test_cache of size 200
[   30.428655] The buggy address is located 1 bytes inside of
[   30.428655]  200-byte region [fff00000c9b27000, fff00000c9b270c8)
[   30.428717] 
[   30.428739] The buggy address belongs to the physical page:
[   30.428824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b27
[   30.429239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.429330] page_type: f5(slab)
[   30.429714] raw: 0bfffe0000000000 fff00000c58173c0 dead000000000122 0000000000000000
[   30.429869] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.429913] page dumped because: kasan: bad access detected
[   30.429944] 
[   30.429963] Memory state around the buggy address:
[   30.430284]  fff00000c9b26f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.430342]  fff00000c9b26f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.430658] >fff00000c9b27000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.430719]                    ^
[   30.430748]  fff00000c9b27080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   30.430847]  fff00000c9b27100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.430886] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   30.372910] ==================================================================
[   30.373093] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   30.373370] Free of addr fff00000c9b25000 by task kunit_try_catch/240
[   30.373478] 
[   30.373669] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   30.373764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.373789] Hardware name: linux,dummy-virt (DT)
[   30.373823] Call trace:
[   30.373847]  show_stack+0x20/0x38 (C)
[   30.373907]  dump_stack_lvl+0x8c/0xd0
[   30.374105]  print_report+0x118/0x5d0
[   30.374209]  kasan_report_invalid_free+0xc0/0xe8
[   30.374434]  check_slab_allocation+0xd4/0x108
[   30.374607]  __kasan_slab_pre_free+0x2c/0x48
[   30.374704]  kmem_cache_free+0xf0/0x468
[   30.374928]  kmem_cache_double_free+0x190/0x3c8
[   30.375029]  kunit_try_run_case+0x170/0x3f0
[   30.375383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.375499]  kthread+0x328/0x630
[   30.375562]  ret_from_fork+0x10/0x20
[   30.375938] 
[   30.375978] Allocated by task 240:
[   30.376013]  kasan_save_stack+0x3c/0x68
[   30.376262]  kasan_save_track+0x20/0x40
[   30.376462]  kasan_save_alloc_info+0x40/0x58
[   30.376685]  __kasan_slab_alloc+0xa8/0xb0
[   30.376722]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.376765]  kmem_cache_double_free+0x12c/0x3c8
[   30.376805]  kunit_try_run_case+0x170/0x3f0
[   30.376842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.376884]  kthread+0x328/0x630
[   30.376916]  ret_from_fork+0x10/0x20
[   30.377580] 
[   30.377701] Freed by task 240:
[   30.377777]  kasan_save_stack+0x3c/0x68
[   30.377834]  kasan_save_track+0x20/0x40
[   30.377886]  kasan_save_free_info+0x4c/0x78
[   30.377928]  __kasan_slab_free+0x6c/0x98
[   30.378069]  kmem_cache_free+0x260/0x468
[   30.378148]  kmem_cache_double_free+0x140/0x3c8
[   30.378201]  kunit_try_run_case+0x170/0x3f0
[   30.378238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.378590]  kthread+0x328/0x630
[   30.378714]  ret_from_fork+0x10/0x20
[   30.378751] 
[   30.378775] The buggy address belongs to the object at fff00000c9b25000
[   30.378775]  which belongs to the cache test_cache of size 200
[   30.378848] The buggy address is located 0 bytes inside of
[   30.378848]  200-byte region [fff00000c9b25000, fff00000c9b250c8)
[   30.378983] 
[   30.379005] The buggy address belongs to the physical page:
[   30.379040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b25
[   30.379197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.379477] page_type: f5(slab)
[   30.379530] raw: 0bfffe0000000000 fff00000c5817280 dead000000000122 0000000000000000
[   30.379816] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.379951] page dumped because: kasan: bad access detected
[   30.379997] 
[   30.380014] Memory state around the buggy address:
[   30.380067]  fff00000c9b24f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.380110]  fff00000c9b24f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.380194] >fff00000c9b25000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.380298]                    ^
[   30.380529]  fff00000c9b25080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   30.380687]  fff00000c9b25100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.380725] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   30.084027] ==================================================================
[   30.085027] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   30.085160] Read of size 1 at addr fff00000c9ace0c8 by task kunit_try_catch/238
[   30.085213] 
[   30.085250] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   30.085337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.085364] Hardware name: linux,dummy-virt (DT)
[   30.085398] Call trace:
[   30.085517]  show_stack+0x20/0x38 (C)
[   30.085608]  dump_stack_lvl+0x8c/0xd0
[   30.086235]  print_report+0x118/0x5d0
[   30.086312]  kasan_report+0xdc/0x128
[   30.087006]  __asan_report_load1_noabort+0x20/0x30
[   30.087625]  kmem_cache_oob+0x344/0x430
[   30.087730]  kunit_try_run_case+0x170/0x3f0
[   30.088414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.088638]  kthread+0x328/0x630
[   30.088685]  ret_from_fork+0x10/0x20
[   30.088735] 
[   30.088754] Allocated by task 238:
[   30.088783]  kasan_save_stack+0x3c/0x68
[   30.089049]  kasan_save_track+0x20/0x40
[   30.089193]  kasan_save_alloc_info+0x40/0x58
[   30.089545]  __kasan_slab_alloc+0xa8/0xb0
[   30.089624]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.089670]  kmem_cache_oob+0x12c/0x430
[   30.090243]  kunit_try_run_case+0x170/0x3f0
[   30.090622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.090695]  kthread+0x328/0x630
[   30.091110]  ret_from_fork+0x10/0x20
[   30.091152] 
[   30.091427] The buggy address belongs to the object at fff00000c9ace000
[   30.091427]  which belongs to the cache test_cache of size 200
[   30.091823] The buggy address is located 0 bytes to the right of
[   30.091823]  allocated 200-byte region [fff00000c9ace000, fff00000c9ace0c8)
[   30.092024] 
[   30.092048] The buggy address belongs to the physical page:
[   30.092401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ace
[   30.092504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.092563] page_type: f5(slab)
[   30.092842] raw: 0bfffe0000000000 fff00000c5817140 dead000000000122 0000000000000000
[   30.093049] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.093389] page dumped because: kasan: bad access detected
[   30.093426] 
[   30.093691] Memory state around the buggy address:
[   30.094228]  fff00000c9acdf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.094468]  fff00000c9ace000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.094731] >fff00000c9ace080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   30.094778]                                               ^
[   30.095320]  fff00000c9ace100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.095631]  fff00000c9ace180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.095679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   30.022691] ==================================================================
[   30.022765] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   30.022837] Read of size 8 at addr fff00000c9ab5b00 by task kunit_try_catch/231
[   30.022889] 
[   30.022925] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   30.023015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.023370] Hardware name: linux,dummy-virt (DT)
[   30.023750] Call trace:
[   30.024220]  show_stack+0x20/0x38 (C)
[   30.024446]  dump_stack_lvl+0x8c/0xd0
[   30.024498]  print_report+0x118/0x5d0
[   30.024550]  kasan_report+0xdc/0x128
[   30.024947]  __asan_report_load8_noabort+0x20/0x30
[   30.025305]  workqueue_uaf+0x480/0x4a8
[   30.025368]  kunit_try_run_case+0x170/0x3f0
[   30.025419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.025888]  kthread+0x328/0x630
[   30.026159]  ret_from_fork+0x10/0x20
[   30.026212] 
[   30.026588] Allocated by task 231:
[   30.026635]  kasan_save_stack+0x3c/0x68
[   30.026680]  kasan_save_track+0x20/0x40
[   30.026715]  kasan_save_alloc_info+0x40/0x58
[   30.026752]  __kasan_kmalloc+0xd4/0xd8
[   30.026794]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.026836]  workqueue_uaf+0x13c/0x4a8
[   30.027550]  kunit_try_run_case+0x170/0x3f0
[   30.027809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.028171]  kthread+0x328/0x630
[   30.028351]  ret_from_fork+0x10/0x20
[   30.028462] 
[   30.028494] Freed by task 75:
[   30.028521]  kasan_save_stack+0x3c/0x68
[   30.028665]  kasan_save_track+0x20/0x40
[   30.028706]  kasan_save_free_info+0x4c/0x78
[   30.028745]  __kasan_slab_free+0x6c/0x98
[   30.028890]  kfree+0x214/0x3c8
[   30.028927]  workqueue_uaf_work+0x18/0x30
[   30.028965]  process_one_work+0x530/0xf88
[   30.029005]  worker_thread+0x618/0xf38
[   30.029041]  kthread+0x328/0x630
[   30.029086]  ret_from_fork+0x10/0x20
[   30.029120] 
[   30.029140] Last potentially related work creation:
[   30.029167]  kasan_save_stack+0x3c/0x68
[   30.030017]  kasan_record_aux_stack+0xb4/0xc8
[   30.030084]  __queue_work+0x65c/0xfe0
[   30.030123]  queue_work_on+0xbc/0xf8
[   30.030164]  workqueue_uaf+0x210/0x4a8
[   30.030202]  kunit_try_run_case+0x170/0x3f0
[   30.030511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.030766]  kthread+0x328/0x630
[   30.030984]  ret_from_fork+0x10/0x20
[   30.031023] 
[   30.031043] The buggy address belongs to the object at fff00000c9ab5b00
[   30.031043]  which belongs to the cache kmalloc-32 of size 32
[   30.031508] The buggy address is located 0 bytes inside of
[   30.031508]  freed 32-byte region [fff00000c9ab5b00, fff00000c9ab5b20)
[   30.031576] 
[   30.031599] The buggy address belongs to the physical page:
[   30.031854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ab5
[   30.032072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.032220] page_type: f5(slab)
[   30.032290] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   30.032658] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   30.032718] page dumped because: kasan: bad access detected
[   30.032775] 
[   30.032803] Memory state around the buggy address:
[   30.032839]  fff00000c9ab5a00: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   30.033136]  fff00000c9ab5a80: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   30.033184] >fff00000c9ab5b00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   30.033530]                    ^
[   30.033632]  fff00000c9ab5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.033675]  fff00000c9ab5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.033714] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   29.954379] ==================================================================
[   29.954515] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   29.954587] Read of size 4 at addr fff00000c9ab5900 by task swapper/1/0
[   29.954634] 
[   29.954672] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.954757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.955049] Hardware name: linux,dummy-virt (DT)
[   29.955474] Call trace:
[   29.955557]  show_stack+0x20/0x38 (C)
[   29.956643]  dump_stack_lvl+0x8c/0xd0
[   29.956796]  print_report+0x118/0x5d0
[   29.956846]  kasan_report+0xdc/0x128
[   29.956898]  __asan_report_load4_noabort+0x20/0x30
[   29.956950]  rcu_uaf_reclaim+0x64/0x70
[   29.956995]  rcu_core+0x9f4/0x1e58
[   29.957043]  rcu_core_si+0x18/0x30
[   29.957100]  handle_softirqs+0x374/0xb28
[   29.957148]  __do_softirq+0x1c/0x28
[   29.957190]  ____do_softirq+0x18/0x30
[   29.957233]  call_on_irq_stack+0x24/0x30
[   29.957281]  do_softirq_own_stack+0x24/0x38
[   29.957326]  __irq_exit_rcu+0x1fc/0x318
[   29.957371]  irq_exit_rcu+0x1c/0x80
[   29.957415]  el1_interrupt+0x38/0x58
[   29.957460]  el1h_64_irq_handler+0x18/0x28
[   29.957506]  el1h_64_irq+0x6c/0x70
[   29.957606]  arch_local_irq_enable+0x4/0x8 (P)
[   29.957658]  do_idle+0x384/0x4e8
[   29.957703]  cpu_startup_entry+0x64/0x80
[   29.957749]  secondary_start_kernel+0x28c/0x340
[   29.957796]  __secondary_switched+0xc0/0xc8
[   29.957849] 
[   29.957868] Allocated by task 229:
[   29.961012]  kasan_save_stack+0x3c/0x68
[   29.961097]  kasan_save_track+0x20/0x40
[   29.961134]  kasan_save_alloc_info+0x40/0x58
[   29.961181]  __kasan_kmalloc+0xd4/0xd8
[   29.961216]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.961262]  rcu_uaf+0xb0/0x2d8
[   29.961300]  kunit_try_run_case+0x170/0x3f0
[   29.961343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.961386]  kthread+0x328/0x630
[   29.961421]  ret_from_fork+0x10/0x20
[   29.961456] 
[   29.961476] Freed by task 0:
[   29.961503]  kasan_save_stack+0x3c/0x68
[   29.961540]  kasan_save_track+0x20/0x40
[   29.961575]  kasan_save_free_info+0x4c/0x78
[   29.961611]  __kasan_slab_free+0x6c/0x98
[   29.961648]  kfree+0x214/0x3c8
[   29.961681]  rcu_uaf_reclaim+0x28/0x70
[   29.961719]  rcu_core+0x9f4/0x1e58
[   29.961753]  rcu_core_si+0x18/0x30
[   29.961788]  handle_softirqs+0x374/0xb28
[   29.961823]  __do_softirq+0x1c/0x28
[   29.961857] 
[   29.961891] Last potentially related work creation:
[   29.961924]  kasan_save_stack+0x3c/0x68
[   29.961963]  kasan_record_aux_stack+0xb4/0xc8
[   29.962000]  __call_rcu_common.constprop.0+0x74/0x8c8
[   29.962042]  call_rcu+0x18/0x30
[   29.963200]  rcu_uaf+0x14c/0x2d8
[   29.963447]  kunit_try_run_case+0x170/0x3f0
[   29.963604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.964125]  kthread+0x328/0x630
[   29.964168]  ret_from_fork+0x10/0x20
[   29.965016] 
[   29.965072] The buggy address belongs to the object at fff00000c9ab5900
[   29.965072]  which belongs to the cache kmalloc-32 of size 32
[   29.966014] The buggy address is located 0 bytes inside of
[   29.966014]  freed 32-byte region [fff00000c9ab5900, fff00000c9ab5920)
[   29.966439] 
[   29.966472] The buggy address belongs to the physical page:
[   29.966711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ab5
[   29.967653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.967860] page_type: f5(slab)
[   29.968089] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.968700] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.968787] page dumped because: kasan: bad access detected
[   29.968819] 
[   29.969431] Memory state around the buggy address:
[   29.969632]  fff00000c9ab5800: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   29.969680]  fff00000c9ab5880: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   29.970417] >fff00000c9ab5900: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   29.970691]                    ^
[   29.971228]  fff00000c9ab5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.971334]  fff00000c9ab5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.971404] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   29.812090] ==================================================================
[   29.812143] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   29.812426] Read of size 1 at addr fff00000c9b1e478 by task kunit_try_catch/227
[   29.812600] 
[   29.812715] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.812835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.812864] Hardware name: linux,dummy-virt (DT)
[   29.812893] Call trace:
[   29.812930]  show_stack+0x20/0x38 (C)
[   29.813176]  dump_stack_lvl+0x8c/0xd0
[   29.813338]  print_report+0x118/0x5d0
[   29.813491]  kasan_report+0xdc/0x128
[   29.813603]  __asan_report_load1_noabort+0x20/0x30
[   29.813689]  ksize_uaf+0x544/0x5f8
[   29.813837]  kunit_try_run_case+0x170/0x3f0
[   29.813888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.814119]  kthread+0x328/0x630
[   29.814169]  ret_from_fork+0x10/0x20
[   29.814241] 
[   29.814297] Allocated by task 227:
[   29.814327]  kasan_save_stack+0x3c/0x68
[   29.814373]  kasan_save_track+0x20/0x40
[   29.814409]  kasan_save_alloc_info+0x40/0x58
[   29.814462]  __kasan_kmalloc+0xd4/0xd8
[   29.814505]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.814547]  ksize_uaf+0xb8/0x5f8
[   29.814598]  kunit_try_run_case+0x170/0x3f0
[   29.814635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.814685]  kthread+0x328/0x630
[   29.814718]  ret_from_fork+0x10/0x20
[   29.814754] 
[   29.814779] Freed by task 227:
[   29.814806]  kasan_save_stack+0x3c/0x68
[   29.814841]  kasan_save_track+0x20/0x40
[   29.814874]  kasan_save_free_info+0x4c/0x78
[   29.814922]  __kasan_slab_free+0x6c/0x98
[   29.814958]  kfree+0x214/0x3c8
[   29.815001]  ksize_uaf+0x11c/0x5f8
[   29.815037]  kunit_try_run_case+0x170/0x3f0
[   29.815087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.815138]  kthread+0x328/0x630
[   29.815181]  ret_from_fork+0x10/0x20
[   29.815216] 
[   29.815235] The buggy address belongs to the object at fff00000c9b1e400
[   29.815235]  which belongs to the cache kmalloc-128 of size 128
[   29.815301] The buggy address is located 120 bytes inside of
[   29.815301]  freed 128-byte region [fff00000c9b1e400, fff00000c9b1e480)
[   29.815365] 
[   29.815394] The buggy address belongs to the physical page:
[   29.815423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.815474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.815529] page_type: f5(slab)
[   29.815575] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.815626] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.815675] page dumped because: kasan: bad access detected
[   29.815713] 
[   29.815731] Memory state around the buggy address:
[   29.815772]  fff00000c9b1e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.815830]  fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.815871] >fff00000c9b1e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.815908]                                                                 ^
[   29.815954]  fff00000c9b1e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.815996]  fff00000c9b1e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.816034] ==================================================================
[   29.795545] ==================================================================
[   29.795791] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   29.796142] Read of size 1 at addr fff00000c9b1e400 by task kunit_try_catch/227
[   29.796284] 
[   29.796317] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.796456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.796512] Hardware name: linux,dummy-virt (DT)
[   29.796550] Call trace:
[   29.796574]  show_stack+0x20/0x38 (C)
[   29.796633]  dump_stack_lvl+0x8c/0xd0
[   29.796683]  print_report+0x118/0x5d0
[   29.796967]  kasan_report+0xdc/0x128
[   29.797332]  __kasan_check_byte+0x54/0x70
[   29.797521]  ksize+0x30/0x88
[   29.797576]  ksize_uaf+0x168/0x5f8
[   29.797631]  kunit_try_run_case+0x170/0x3f0
[   29.797680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.797801]  kthread+0x328/0x630
[   29.797864]  ret_from_fork+0x10/0x20
[   29.797917] 
[   29.797944] Allocated by task 227:
[   29.797974]  kasan_save_stack+0x3c/0x68
[   29.798014]  kasan_save_track+0x20/0x40
[   29.798081]  kasan_save_alloc_info+0x40/0x58
[   29.798131]  __kasan_kmalloc+0xd4/0xd8
[   29.798164]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.798205]  ksize_uaf+0xb8/0x5f8
[   29.798242]  kunit_try_run_case+0x170/0x3f0
[   29.798279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.798331]  kthread+0x328/0x630
[   29.798364]  ret_from_fork+0x10/0x20
[   29.798407] 
[   29.798427] Freed by task 227:
[   29.798453]  kasan_save_stack+0x3c/0x68
[   29.798487]  kasan_save_track+0x20/0x40
[   29.798529]  kasan_save_free_info+0x4c/0x78
[   29.798575]  __kasan_slab_free+0x6c/0x98
[   29.798627]  kfree+0x214/0x3c8
[   29.798667]  ksize_uaf+0x11c/0x5f8
[   29.798704]  kunit_try_run_case+0x170/0x3f0
[   29.798750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.798798]  kthread+0x328/0x630
[   29.798831]  ret_from_fork+0x10/0x20
[   29.798868] 
[   29.798895] The buggy address belongs to the object at fff00000c9b1e400
[   29.798895]  which belongs to the cache kmalloc-128 of size 128
[   29.798953] The buggy address is located 0 bytes inside of
[   29.798953]  freed 128-byte region [fff00000c9b1e400, fff00000c9b1e480)
[   29.799024] 
[   29.799044] The buggy address belongs to the physical page:
[   29.799433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.800008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.800124] page_type: f5(slab)
[   29.800200] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.800326] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.800418] page dumped because: kasan: bad access detected
[   29.800529] 
[   29.800572] Memory state around the buggy address:
[   29.800606]  fff00000c9b1e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.801074]  fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801200] >fff00000c9b1e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.801305]                    ^
[   29.801382]  fff00000c9b1e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801492]  fff00000c9b1e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801606] ==================================================================
[   29.803086] ==================================================================
[   29.803289] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   29.803362] Read of size 1 at addr fff00000c9b1e400 by task kunit_try_catch/227
[   29.803413] 
[   29.803499] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.803587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.803776] Hardware name: linux,dummy-virt (DT)
[   29.803819] Call trace:
[   29.803865]  show_stack+0x20/0x38 (C)
[   29.803918]  dump_stack_lvl+0x8c/0xd0
[   29.804104]  print_report+0x118/0x5d0
[   29.804217]  kasan_report+0xdc/0x128
[   29.804311]  __asan_report_load1_noabort+0x20/0x30
[   29.804362]  ksize_uaf+0x598/0x5f8
[   29.804514]  kunit_try_run_case+0x170/0x3f0
[   29.804607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.804661]  kthread+0x328/0x630
[   29.804721]  ret_from_fork+0x10/0x20
[   29.805123] 
[   29.805165] Allocated by task 227:
[   29.805248]  kasan_save_stack+0x3c/0x68
[   29.805375]  kasan_save_track+0x20/0x40
[   29.805450]  kasan_save_alloc_info+0x40/0x58
[   29.805596]  __kasan_kmalloc+0xd4/0xd8
[   29.805687]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.805730]  ksize_uaf+0xb8/0x5f8
[   29.806016]  kunit_try_run_case+0x170/0x3f0
[   29.806250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.806352]  kthread+0x328/0x630
[   29.806467]  ret_from_fork+0x10/0x20
[   29.806505] 
[   29.806651] Freed by task 227:
[   29.806725]  kasan_save_stack+0x3c/0x68
[   29.807015]  kasan_save_track+0x20/0x40
[   29.807193]  kasan_save_free_info+0x4c/0x78
[   29.807273]  __kasan_slab_free+0x6c/0x98
[   29.807385]  kfree+0x214/0x3c8
[   29.807423]  ksize_uaf+0x11c/0x5f8
[   29.807578]  kunit_try_run_case+0x170/0x3f0
[   29.807860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.807945]  kthread+0x328/0x630
[   29.808112]  ret_from_fork+0x10/0x20
[   29.808198] 
[   29.808272] The buggy address belongs to the object at fff00000c9b1e400
[   29.808272]  which belongs to the cache kmalloc-128 of size 128
[   29.808623] The buggy address is located 0 bytes inside of
[   29.808623]  freed 128-byte region [fff00000c9b1e400, fff00000c9b1e480)
[   29.808778] 
[   29.808853] The buggy address belongs to the physical page:
[   29.808939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.809104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.809322] page_type: f5(slab)
[   29.809541] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.809613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.809773] page dumped because: kasan: bad access detected
[   29.809841] 
[   29.809988] Memory state around the buggy address:
[   29.810069]  fff00000c9b1e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.810198]  fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.810287] >fff00000c9b1e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.810347]                    ^
[   29.810731]  fff00000c9b1e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.810790]  fff00000c9b1e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.810968] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   29.766705] ==================================================================
[   29.766900] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   29.766983] Read of size 1 at addr fff00000c9b1e373 by task kunit_try_catch/225
[   29.767034] 
[   29.767305] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.767414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.767787] Hardware name: linux,dummy-virt (DT)
[   29.767868] Call trace:
[   29.767894]  show_stack+0x20/0x38 (C)
[   29.767946]  dump_stack_lvl+0x8c/0xd0
[   29.768281]  print_report+0x118/0x5d0
[   29.768359]  kasan_report+0xdc/0x128
[   29.768539]  __asan_report_load1_noabort+0x20/0x30
[   29.768626]  ksize_unpoisons_memory+0x628/0x740
[   29.768760]  kunit_try_run_case+0x170/0x3f0
[   29.768842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.768898]  kthread+0x328/0x630
[   29.768939]  ret_from_fork+0x10/0x20
[   29.768987] 
[   29.769005] Allocated by task 225:
[   29.769033]  kasan_save_stack+0x3c/0x68
[   29.769434]  kasan_save_track+0x20/0x40
[   29.769508]  kasan_save_alloc_info+0x40/0x58
[   29.769546]  __kasan_kmalloc+0xd4/0xd8
[   29.769579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.769627]  ksize_unpoisons_memory+0xc0/0x740
[   29.769686]  kunit_try_run_case+0x170/0x3f0
[   29.769724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.769765]  kthread+0x328/0x630
[   29.769796]  ret_from_fork+0x10/0x20
[   29.769832] 
[   29.769862] The buggy address belongs to the object at fff00000c9b1e300
[   29.769862]  which belongs to the cache kmalloc-128 of size 128
[   29.769930] The buggy address is located 0 bytes to the right of
[   29.769930]  allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373)
[   29.769994] 
[   29.770021] The buggy address belongs to the physical page:
[   29.770064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.770134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.770182] page_type: f5(slab)
[   29.770221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.770282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.770323] page dumped because: kasan: bad access detected
[   29.770356] 
[   29.770381] Memory state around the buggy address:
[   29.770421]  fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.770465]  fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.770519] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.770568]                                                              ^
[   29.770617]  fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.770662]  fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.770710] ==================================================================
[   29.773355] ==================================================================
[   29.773418] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   29.773792] Read of size 1 at addr fff00000c9b1e378 by task kunit_try_catch/225
[   29.774450] 
[   29.774507] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.774607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.774646] Hardware name: linux,dummy-virt (DT)
[   29.774685] Call trace:
[   29.774708]  show_stack+0x20/0x38 (C)
[   29.774760]  dump_stack_lvl+0x8c/0xd0
[   29.774937]  print_report+0x118/0x5d0
[   29.774999]  kasan_report+0xdc/0x128
[   29.775197]  __asan_report_load1_noabort+0x20/0x30
[   29.775261]  ksize_unpoisons_memory+0x618/0x740
[   29.775313]  kunit_try_run_case+0x170/0x3f0
[   29.775639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.775736]  kthread+0x328/0x630
[   29.775979]  ret_from_fork+0x10/0x20
[   29.776046] 
[   29.776117] Allocated by task 225:
[   29.776303]  kasan_save_stack+0x3c/0x68
[   29.776632]  kasan_save_track+0x20/0x40
[   29.776685]  kasan_save_alloc_info+0x40/0x58
[   29.776790]  __kasan_kmalloc+0xd4/0xd8
[   29.776867]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.777008]  ksize_unpoisons_memory+0xc0/0x740
[   29.777115]  kunit_try_run_case+0x170/0x3f0
[   29.777195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.777239]  kthread+0x328/0x630
[   29.777421]  ret_from_fork+0x10/0x20
[   29.777601] 
[   29.777629] The buggy address belongs to the object at fff00000c9b1e300
[   29.777629]  which belongs to the cache kmalloc-128 of size 128
[   29.778082] The buggy address is located 5 bytes to the right of
[   29.778082]  allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373)
[   29.778226] 
[   29.778285] The buggy address belongs to the physical page:
[   29.778350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.778480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.778559] page_type: f5(slab)
[   29.778613] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.778738] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.778885] page dumped because: kasan: bad access detected
[   29.778943] 
[   29.778989] Memory state around the buggy address:
[   29.779027]  fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.779228]  fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.779446] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.779540]                                                                 ^
[   29.779613]  fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.780097]  fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.780236] ==================================================================
[   29.781719] ==================================================================
[   29.781843] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   29.781928] Read of size 1 at addr fff00000c9b1e37f by task kunit_try_catch/225
[   29.781978] 
[   29.782139] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.782225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.782251] Hardware name: linux,dummy-virt (DT)
[   29.782575] Call trace:
[   29.782635]  show_stack+0x20/0x38 (C)
[   29.782748]  dump_stack_lvl+0x8c/0xd0
[   29.782804]  print_report+0x118/0x5d0
[   29.782850]  kasan_report+0xdc/0x128
[   29.783089]  __asan_report_load1_noabort+0x20/0x30
[   29.783220]  ksize_unpoisons_memory+0x690/0x740
[   29.783280]  kunit_try_run_case+0x170/0x3f0
[   29.783477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.783561]  kthread+0x328/0x630
[   29.783605]  ret_from_fork+0x10/0x20
[   29.783891] 
[   29.783922] Allocated by task 225:
[   29.783961]  kasan_save_stack+0x3c/0x68
[   29.784100]  kasan_save_track+0x20/0x40
[   29.784141]  kasan_save_alloc_info+0x40/0x58
[   29.784205]  __kasan_kmalloc+0xd4/0xd8
[   29.784363]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.784571]  ksize_unpoisons_memory+0xc0/0x740
[   29.784652]  kunit_try_run_case+0x170/0x3f0
[   29.784715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.784761]  kthread+0x328/0x630
[   29.784795]  ret_from_fork+0x10/0x20
[   29.785274] 
[   29.785379] The buggy address belongs to the object at fff00000c9b1e300
[   29.785379]  which belongs to the cache kmalloc-128 of size 128
[   29.785452] The buggy address is located 12 bytes to the right of
[   29.785452]  allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373)
[   29.785531] 
[   29.785586] The buggy address belongs to the physical page:
[   29.785624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.785680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.785727] page_type: f5(slab)
[   29.785767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.785817] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.785859] page dumped because: kasan: bad access detected
[   29.785898] 
[   29.785917] Memory state around the buggy address:
[   29.785946]  fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.785990]  fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.786042] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.786106]                                                                 ^
[   29.786148]  fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.786190]  fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.786228] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   29.750680] ==================================================================
[   29.750765] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   29.750828] Free of addr fff00000c7ac9380 by task kunit_try_catch/223
[   29.751155] 
[   29.751260] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.751365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.751391] Hardware name: linux,dummy-virt (DT)
[   29.751541] Call trace:
[   29.751576]  show_stack+0x20/0x38 (C)
[   29.751656]  dump_stack_lvl+0x8c/0xd0
[   29.751709]  print_report+0x118/0x5d0
[   29.751754]  kasan_report_invalid_free+0xc0/0xe8
[   29.751961]  check_slab_allocation+0xd4/0x108
[   29.752038]  __kasan_slab_pre_free+0x2c/0x48
[   29.752357]  kfree+0xe8/0x3c8
[   29.752443]  kfree_sensitive+0x3c/0xb0
[   29.752527]  kmalloc_double_kzfree+0x168/0x308
[   29.752855]  kunit_try_run_case+0x170/0x3f0
[   29.752981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.753113]  kthread+0x328/0x630
[   29.753183]  ret_from_fork+0x10/0x20
[   29.753494] 
[   29.753556] Allocated by task 223:
[   29.753998]  kasan_save_stack+0x3c/0x68
[   29.754089]  kasan_save_track+0x20/0x40
[   29.754241]  kasan_save_alloc_info+0x40/0x58
[   29.754311]  __kasan_kmalloc+0xd4/0xd8
[   29.754604]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.754739]  kmalloc_double_kzfree+0xb8/0x308
[   29.754887]  kunit_try_run_case+0x170/0x3f0
[   29.754971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.755074]  kthread+0x328/0x630
[   29.755107]  ret_from_fork+0x10/0x20
[   29.755517] 
[   29.755580] Freed by task 223:
[   29.755646]  kasan_save_stack+0x3c/0x68
[   29.755786]  kasan_save_track+0x20/0x40
[   29.755873]  kasan_save_free_info+0x4c/0x78
[   29.756046]  __kasan_slab_free+0x6c/0x98
[   29.756130]  kfree+0x214/0x3c8
[   29.756185]  kfree_sensitive+0x80/0xb0
[   29.756231]  kmalloc_double_kzfree+0x11c/0x308
[   29.756272]  kunit_try_run_case+0x170/0x3f0
[   29.756315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.756375]  kthread+0x328/0x630
[   29.756415]  ret_from_fork+0x10/0x20
[   29.756451] 
[   29.756471] The buggy address belongs to the object at fff00000c7ac9380
[   29.756471]  which belongs to the cache kmalloc-16 of size 16
[   29.756528] The buggy address is located 0 bytes inside of
[   29.756528]  16-byte region [fff00000c7ac9380, fff00000c7ac9390)
[   29.756587] 
[   29.756627] The buggy address belongs to the physical page:
[   29.756665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9
[   29.756718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.756773] page_type: f5(slab)
[   29.756813] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   29.756872] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.756920] page dumped because: kasan: bad access detected
[   29.756959] 
[   29.756976] Memory state around the buggy address:
[   29.757016]  fff00000c7ac9280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.757070]  fff00000c7ac9300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.757124] >fff00000c7ac9380: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.757171]                    ^
[   29.757199]  fff00000c7ac9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.757239]  fff00000c7ac9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.757277] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   29.738944] ==================================================================
[   29.739003] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   29.739340] Read of size 1 at addr fff00000c7ac9380 by task kunit_try_catch/223
[   29.739513] 
[   29.739547] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.739638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.739665] Hardware name: linux,dummy-virt (DT)
[   29.739911] Call trace:
[   29.740088]  show_stack+0x20/0x38 (C)
[   29.740150]  dump_stack_lvl+0x8c/0xd0
[   29.740344]  print_report+0x118/0x5d0
[   29.740582]  kasan_report+0xdc/0x128
[   29.740638]  __kasan_check_byte+0x54/0x70
[   29.740681]  kfree_sensitive+0x30/0xb0
[   29.740989]  kmalloc_double_kzfree+0x168/0x308
[   29.741188]  kunit_try_run_case+0x170/0x3f0
[   29.741244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.741513]  kthread+0x328/0x630
[   29.741733]  ret_from_fork+0x10/0x20
[   29.741791] 
[   29.741976] Allocated by task 223:
[   29.742604]  kasan_save_stack+0x3c/0x68
[   29.742693]  kasan_save_track+0x20/0x40
[   29.742810]  kasan_save_alloc_info+0x40/0x58
[   29.742881]  __kasan_kmalloc+0xd4/0xd8
[   29.743098]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.743269]  kmalloc_double_kzfree+0xb8/0x308
[   29.743333]  kunit_try_run_case+0x170/0x3f0
[   29.743371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.743450]  kthread+0x328/0x630
[   29.743483]  ret_from_fork+0x10/0x20
[   29.743519] 
[   29.743540] Freed by task 223:
[   29.743577]  kasan_save_stack+0x3c/0x68
[   29.743620]  kasan_save_track+0x20/0x40
[   29.743656]  kasan_save_free_info+0x4c/0x78
[   29.743693]  __kasan_slab_free+0x6c/0x98
[   29.743729]  kfree+0x214/0x3c8
[   29.743764]  kfree_sensitive+0x80/0xb0
[   29.743801]  kmalloc_double_kzfree+0x11c/0x308
[   29.743848]  kunit_try_run_case+0x170/0x3f0
[   29.743896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.743938]  kthread+0x328/0x630
[   29.743979]  ret_from_fork+0x10/0x20
[   29.744016] 
[   29.744035] The buggy address belongs to the object at fff00000c7ac9380
[   29.744035]  which belongs to the cache kmalloc-16 of size 16
[   29.744104] The buggy address is located 0 bytes inside of
[   29.744104]  freed 16-byte region [fff00000c7ac9380, fff00000c7ac9390)
[   29.744166] 
[   29.744197] The buggy address belongs to the physical page:
[   29.744229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9
[   29.744283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.744341] page_type: f5(slab)
[   29.744381] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   29.744748] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.745173] page dumped because: kasan: bad access detected
[   29.745348] 
[   29.745520] Memory state around the buggy address:
[   29.745969]  fff00000c7ac9280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.746022]  fff00000c7ac9300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.746277] >fff00000c7ac9380: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.746419]                    ^
[   29.746570]  fff00000c7ac9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.746753]  fff00000c7ac9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.746825] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   29.713657] ==================================================================
[   29.713720] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   29.713779] Read of size 1 at addr fff00000c9b1cb28 by task kunit_try_catch/219
[   29.713850] 
[   29.713886] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.713980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.714008] Hardware name: linux,dummy-virt (DT)
[   29.714040] Call trace:
[   29.714434]  show_stack+0x20/0x38 (C)
[   29.714531]  dump_stack_lvl+0x8c/0xd0
[   29.714938]  print_report+0x118/0x5d0
[   29.715332]  kasan_report+0xdc/0x128
[   29.715651]  __asan_report_load1_noabort+0x20/0x30
[   29.715732]  kmalloc_uaf2+0x3f4/0x468
[   29.715833]  kunit_try_run_case+0x170/0x3f0
[   29.715889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.715942]  kthread+0x328/0x630
[   29.716091]  ret_from_fork+0x10/0x20
[   29.716163] 
[   29.716188] Allocated by task 219:
[   29.716367]  kasan_save_stack+0x3c/0x68
[   29.716586]  kasan_save_track+0x20/0x40
[   29.716708]  kasan_save_alloc_info+0x40/0x58
[   29.716798]  __kasan_kmalloc+0xd4/0xd8
[   29.716971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.717026]  kmalloc_uaf2+0xc4/0x468
[   29.717226]  kunit_try_run_case+0x170/0x3f0
[   29.717400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.717452]  kthread+0x328/0x630
[   29.717484]  ret_from_fork+0x10/0x20
[   29.717697] 
[   29.717905] Freed by task 219:
[   29.718026]  kasan_save_stack+0x3c/0x68
[   29.718158]  kasan_save_track+0x20/0x40
[   29.718220]  kasan_save_free_info+0x4c/0x78
[   29.718258]  __kasan_slab_free+0x6c/0x98
[   29.718318]  kfree+0x214/0x3c8
[   29.718774]  kmalloc_uaf2+0x134/0x468
[   29.718874]  kunit_try_run_case+0x170/0x3f0
[   29.718953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.719105]  kthread+0x328/0x630
[   29.719177]  ret_from_fork+0x10/0x20
[   29.719358] 
[   29.719557] The buggy address belongs to the object at fff00000c9b1cb00
[   29.719557]  which belongs to the cache kmalloc-64 of size 64
[   29.719655] The buggy address is located 40 bytes inside of
[   29.719655]  freed 64-byte region [fff00000c9b1cb00, fff00000c9b1cb40)
[   29.719803] 
[   29.719879] The buggy address belongs to the physical page:
[   29.719957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1c
[   29.720050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.720191] page_type: f5(slab)
[   29.720385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.720645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.720700] page dumped because: kasan: bad access detected
[   29.720838] 
[   29.720915] Memory state around the buggy address:
[   29.721034]  fff00000c9b1ca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.721101]  fff00000c9b1ca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.721151] >fff00000c9b1cb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.721189]                                   ^
[   29.721219]  fff00000c9b1cb80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   29.721397]  fff00000c9b1cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.721620] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   29.683382] ==================================================================
[   29.683446] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   29.683503] Write of size 33 at addr fff00000c9b1c980 by task kunit_try_catch/217
[   29.683554] 
[   29.683586] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.683671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.683716] Hardware name: linux,dummy-virt (DT)
[   29.683764] Call trace:
[   29.683788]  show_stack+0x20/0x38 (C)
[   29.683838]  dump_stack_lvl+0x8c/0xd0
[   29.683918]  print_report+0x118/0x5d0
[   29.683964]  kasan_report+0xdc/0x128
[   29.684008]  kasan_check_range+0x100/0x1a8
[   29.684065]  __asan_memset+0x34/0x78
[   29.684119]  kmalloc_uaf_memset+0x170/0x310
[   29.684168]  kunit_try_run_case+0x170/0x3f0
[   29.684217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.684269]  kthread+0x328/0x630
[   29.684311]  ret_from_fork+0x10/0x20
[   29.684363] 
[   29.685219] Allocated by task 217:
[   29.685286]  kasan_save_stack+0x3c/0x68
[   29.685428]  kasan_save_track+0x20/0x40
[   29.685526]  kasan_save_alloc_info+0x40/0x58
[   29.685691]  __kasan_kmalloc+0xd4/0xd8
[   29.685778]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.685920]  kmalloc_uaf_memset+0xb8/0x310
[   29.685959]  kunit_try_run_case+0x170/0x3f0
[   29.686202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.686529]  kthread+0x328/0x630
[   29.686597]  ret_from_fork+0x10/0x20
[   29.686722] 
[   29.686784] Freed by task 217:
[   29.686843]  kasan_save_stack+0x3c/0x68
[   29.687318]  kasan_save_track+0x20/0x40
[   29.687403]  kasan_save_free_info+0x4c/0x78
[   29.687537]  __kasan_slab_free+0x6c/0x98
[   29.687597]  kfree+0x214/0x3c8
[   29.687645]  kmalloc_uaf_memset+0x11c/0x310
[   29.687750]  kunit_try_run_case+0x170/0x3f0
[   29.687789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.690709]  kthread+0x328/0x630
[   29.691118]  ret_from_fork+0x10/0x20
[   29.691268] 
[   29.691368] The buggy address belongs to the object at fff00000c9b1c980
[   29.691368]  which belongs to the cache kmalloc-64 of size 64
[   29.692857] The buggy address is located 0 bytes inside of
[   29.692857]  freed 64-byte region [fff00000c9b1c980, fff00000c9b1c9c0)
[   29.694575] 
[   29.694615] The buggy address belongs to the physical page:
[   29.694651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1c
[   29.696629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.697095] page_type: f5(slab)
[   29.697365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.699508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.699769] page dumped because: kasan: bad access detected
[   29.700728] 
[   29.700770] Memory state around the buggy address:
[   29.700809]  fff00000c9b1c880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.700855]  fff00000c9b1c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.701183] >fff00000c9b1c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.701428]                    ^
[   29.701464]  fff00000c9b1ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.701904]  fff00000c9b1ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.701952] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   29.666530] ==================================================================
[   29.666595] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   29.666653] Read of size 1 at addr fff00000c7ac9368 by task kunit_try_catch/215
[   29.666704] 
[   29.666736] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.666832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.666888] Hardware name: linux,dummy-virt (DT)
[   29.666923] Call trace:
[   29.666948]  show_stack+0x20/0x38 (C)
[   29.666997]  dump_stack_lvl+0x8c/0xd0
[   29.667046]  print_report+0x118/0x5d0
[   29.667112]  kasan_report+0xdc/0x128
[   29.667156]  __asan_report_load1_noabort+0x20/0x30
[   29.667205]  kmalloc_uaf+0x300/0x338
[   29.667249]  kunit_try_run_case+0x170/0x3f0
[   29.667304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.667355]  kthread+0x328/0x630
[   29.667396]  ret_from_fork+0x10/0x20
[   29.667442] 
[   29.667460] Allocated by task 215:
[   29.667489]  kasan_save_stack+0x3c/0x68
[   29.667527]  kasan_save_track+0x20/0x40
[   29.667562]  kasan_save_alloc_info+0x40/0x58
[   29.667600]  __kasan_kmalloc+0xd4/0xd8
[   29.667633]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.667673]  kmalloc_uaf+0xb8/0x338
[   29.667707]  kunit_try_run_case+0x170/0x3f0
[   29.667762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.667815]  kthread+0x328/0x630
[   29.667848]  ret_from_fork+0x10/0x20
[   29.667883] 
[   29.667903] Freed by task 215:
[   29.667934]  kasan_save_stack+0x3c/0x68
[   29.667970]  kasan_save_track+0x20/0x40
[   29.668004]  kasan_save_free_info+0x4c/0x78
[   29.668040]  __kasan_slab_free+0x6c/0x98
[   29.668411]  kfree+0x214/0x3c8
[   29.668628]  kmalloc_uaf+0x11c/0x338
[   29.668683]  kunit_try_run_case+0x170/0x3f0
[   29.668723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.669301]  kthread+0x328/0x630
[   29.669590]  ret_from_fork+0x10/0x20
[   29.669935] 
[   29.670304] The buggy address belongs to the object at fff00000c7ac9360
[   29.670304]  which belongs to the cache kmalloc-16 of size 16
[   29.670681] The buggy address is located 8 bytes inside of
[   29.670681]  freed 16-byte region [fff00000c7ac9360, fff00000c7ac9370)
[   29.670943] 
[   29.671063] The buggy address belongs to the physical page:
[   29.671104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9
[   29.671200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.671314] page_type: f5(slab)
[   29.671403] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   29.671803] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.671886] page dumped because: kasan: bad access detected
[   29.672314] 
[   29.672408] Memory state around the buggy address:
[   29.672468]  fff00000c7ac9200: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   29.672536]  fff00000c7ac9280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.672593] >fff00000c7ac9300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.672849]                                                           ^
[   29.673316]  fff00000c7ac9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.673373]  fff00000c7ac9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.673414] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   29.648523] ==================================================================
[   29.648730] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   29.648980] Read of size 64 at addr fff00000c9b1c684 by task kunit_try_catch/213
[   29.649125] 
[   29.649221] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.649366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.649779] Hardware name: linux,dummy-virt (DT)
[   29.649850] Call trace:
[   29.649941]  show_stack+0x20/0x38 (C)
[   29.650005]  dump_stack_lvl+0x8c/0xd0
[   29.650190]  print_report+0x118/0x5d0
[   29.650395]  kasan_report+0xdc/0x128
[   29.650471]  kasan_check_range+0x100/0x1a8
[   29.650603]  __asan_memmove+0x3c/0x98
[   29.650698]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   29.651068]  kunit_try_run_case+0x170/0x3f0
[   29.651179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.651269]  kthread+0x328/0x630
[   29.651457]  ret_from_fork+0x10/0x20
[   29.651685] 
[   29.651709] Allocated by task 213:
[   29.651761]  kasan_save_stack+0x3c/0x68
[   29.651946]  kasan_save_track+0x20/0x40
[   29.652104]  kasan_save_alloc_info+0x40/0x58
[   29.652316]  __kasan_kmalloc+0xd4/0xd8
[   29.652461]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.652507]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   29.652550]  kunit_try_run_case+0x170/0x3f0
[   29.652588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.652630]  kthread+0x328/0x630
[   29.652664]  ret_from_fork+0x10/0x20
[   29.652699] 
[   29.652848] The buggy address belongs to the object at fff00000c9b1c680
[   29.652848]  which belongs to the cache kmalloc-64 of size 64
[   29.653085] The buggy address is located 4 bytes inside of
[   29.653085]  allocated 64-byte region [fff00000c9b1c680, fff00000c9b1c6c0)
[   29.653157] 
[   29.653179] The buggy address belongs to the physical page:
[   29.653396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1c
[   29.653607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.653770] page_type: f5(slab)
[   29.653901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.654047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.654232] page dumped because: kasan: bad access detected
[   29.654302] 
[   29.654320] Memory state around the buggy address:
[   29.654354]  fff00000c9b1c580: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   29.654603]  fff00000c9b1c600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.654887] >fff00000c9b1c680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.655081]                                            ^
[   29.655172]  fff00000c9b1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.655291]  fff00000c9b1c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.655333] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   29.630304] ==================================================================
[   29.630406] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   29.630631] Read of size 18446744073709551614 at addr fff00000c9b1c484 by task kunit_try_catch/211
[   29.630730] 
[   29.630925] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.631029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.631128] Hardware name: linux,dummy-virt (DT)
[   29.631163] Call trace:
[   29.631193]  show_stack+0x20/0x38 (C)
[   29.631246]  dump_stack_lvl+0x8c/0xd0
[   29.631390]  print_report+0x118/0x5d0
[   29.631441]  kasan_report+0xdc/0x128
[   29.631484]  kasan_check_range+0x100/0x1a8
[   29.631538]  __asan_memmove+0x3c/0x98
[   29.631581]  kmalloc_memmove_negative_size+0x154/0x2e0
[   29.631634]  kunit_try_run_case+0x170/0x3f0
[   29.631941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.632073]  kthread+0x328/0x630
[   29.632118]  ret_from_fork+0x10/0x20
[   29.632312] 
[   29.632405] Allocated by task 211:
[   29.632696]  kasan_save_stack+0x3c/0x68
[   29.632860]  kasan_save_track+0x20/0x40
[   29.632941]  kasan_save_alloc_info+0x40/0x58
[   29.633131]  __kasan_kmalloc+0xd4/0xd8
[   29.633242]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.633355]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   29.633402]  kunit_try_run_case+0x170/0x3f0
[   29.633450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.633783]  kthread+0x328/0x630
[   29.633963]  ret_from_fork+0x10/0x20
[   29.634048] 
[   29.634179] The buggy address belongs to the object at fff00000c9b1c480
[   29.634179]  which belongs to the cache kmalloc-64 of size 64
[   29.634415] The buggy address is located 4 bytes inside of
[   29.634415]  64-byte region [fff00000c9b1c480, fff00000c9b1c4c0)
[   29.634637] 
[   29.634716] The buggy address belongs to the physical page:
[   29.634857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1c
[   29.634952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.635094] page_type: f5(slab)
[   29.635211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.635289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.635716] page dumped because: kasan: bad access detected
[   29.635788] 
[   29.635882] Memory state around the buggy address:
[   29.635973]  fff00000c9b1c380: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   29.636046]  fff00000c9b1c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.636202] >fff00000c9b1c480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.636268]                    ^
[   29.636410]  fff00000c9b1c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.636595]  fff00000c9b1c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.636675] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   29.611786] ==================================================================
[   29.611850] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   29.612137] Write of size 16 at addr fff00000c9b1e269 by task kunit_try_catch/209
[   29.612403] 
[   29.612478] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.612681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.612882] Hardware name: linux,dummy-virt (DT)
[   29.613293] Call trace:
[   29.613357]  show_stack+0x20/0x38 (C)
[   29.613516]  dump_stack_lvl+0x8c/0xd0
[   29.613608]  print_report+0x118/0x5d0
[   29.613764]  kasan_report+0xdc/0x128
[   29.613835]  kasan_check_range+0x100/0x1a8
[   29.614089]  __asan_memset+0x34/0x78
[   29.614155]  kmalloc_oob_memset_16+0x150/0x2f8
[   29.614399]  kunit_try_run_case+0x170/0x3f0
[   29.614501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.614663]  kthread+0x328/0x630
[   29.614746]  ret_from_fork+0x10/0x20
[   29.615775] 
[   29.615827] Allocated by task 209:
[   29.615892]  kasan_save_stack+0x3c/0x68
[   29.615974]  kasan_save_track+0x20/0x40
[   29.616103]  kasan_save_alloc_info+0x40/0x58
[   29.616204]  __kasan_kmalloc+0xd4/0xd8
[   29.616287]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.616502]  kmalloc_oob_memset_16+0xb0/0x2f8
[   29.616667]  kunit_try_run_case+0x170/0x3f0
[   29.616823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.616907]  kthread+0x328/0x630
[   29.617216]  ret_from_fork+0x10/0x20
[   29.617264] 
[   29.617970] The buggy address belongs to the object at fff00000c9b1e200
[   29.617970]  which belongs to the cache kmalloc-128 of size 128
[   29.618353] The buggy address is located 105 bytes inside of
[   29.618353]  allocated 120-byte region [fff00000c9b1e200, fff00000c9b1e278)
[   29.618581] 
[   29.618602] The buggy address belongs to the physical page:
[   29.618896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.619002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.619174] page_type: f5(slab)
[   29.619276] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.619379] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.619476] page dumped because: kasan: bad access detected
[   29.619544] 
[   29.619652] Memory state around the buggy address:
[   29.619722]  fff00000c9b1e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.619851]  fff00000c9b1e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.619925] >fff00000c9b1e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.619972]                                                                 ^
[   29.620383]  fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.620494]  fff00000c9b1e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.620580] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   29.596039] ==================================================================
[   29.596120] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   29.596229] Write of size 8 at addr fff00000c9b1e171 by task kunit_try_catch/207
[   29.596283] 
[   29.596317] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.596878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.596909] Hardware name: linux,dummy-virt (DT)
[   29.597343] Call trace:
[   29.597499]  show_stack+0x20/0x38 (C)
[   29.597602]  dump_stack_lvl+0x8c/0xd0
[   29.597909]  print_report+0x118/0x5d0
[   29.597985]  kasan_report+0xdc/0x128
[   29.598399]  kasan_check_range+0x100/0x1a8
[   29.598714]  __asan_memset+0x34/0x78
[   29.598917]  kmalloc_oob_memset_8+0x150/0x2f8
[   29.599010]  kunit_try_run_case+0x170/0x3f0
[   29.599148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.599223]  kthread+0x328/0x630
[   29.599603]  ret_from_fork+0x10/0x20
[   29.599762] 
[   29.599839] Allocated by task 207:
[   29.600008]  kasan_save_stack+0x3c/0x68
[   29.600169]  kasan_save_track+0x20/0x40
[   29.600209]  kasan_save_alloc_info+0x40/0x58
[   29.600271]  __kasan_kmalloc+0xd4/0xd8
[   29.600637]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.600763]  kmalloc_oob_memset_8+0xb0/0x2f8
[   29.600868]  kunit_try_run_case+0x170/0x3f0
[   29.601018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.601183]  kthread+0x328/0x630
[   29.601221]  ret_from_fork+0x10/0x20
[   29.601256] 
[   29.601305] The buggy address belongs to the object at fff00000c9b1e100
[   29.601305]  which belongs to the cache kmalloc-128 of size 128
[   29.601664] The buggy address is located 113 bytes inside of
[   29.601664]  allocated 120-byte region [fff00000c9b1e100, fff00000c9b1e178)
[   29.601814] 
[   29.601901] The buggy address belongs to the physical page:
[   29.602017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.602116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.602208] page_type: f5(slab)
[   29.602372] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.602630] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.602939] page dumped because: kasan: bad access detected
[   29.602995] 
[   29.603097] Memory state around the buggy address:
[   29.603181]  fff00000c9b1e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.603304]  fff00000c9b1e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.603408] >fff00000c9b1e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.603525]                                                                 ^
[   29.603606]  fff00000c9b1e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.603682]  fff00000c9b1e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.603991] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   29.578794] ==================================================================
[   29.578851] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   29.578903] Write of size 4 at addr fff00000c9b1e075 by task kunit_try_catch/205
[   29.578950] 
[   29.578981] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.579079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.579104] Hardware name: linux,dummy-virt (DT)
[   29.579711] Call trace:
[   29.579753]  show_stack+0x20/0x38 (C)
[   29.579806]  dump_stack_lvl+0x8c/0xd0
[   29.579854]  print_report+0x118/0x5d0
[   29.579933]  kasan_report+0xdc/0x128
[   29.580100]  kasan_check_range+0x100/0x1a8
[   29.580162]  __asan_memset+0x34/0x78
[   29.580207]  kmalloc_oob_memset_4+0x150/0x300
[   29.580372]  kunit_try_run_case+0x170/0x3f0
[   29.580577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.580884]  kthread+0x328/0x630
[   29.581088]  ret_from_fork+0x10/0x20
[   29.581312] 
[   29.581379] Allocated by task 205:
[   29.581495]  kasan_save_stack+0x3c/0x68
[   29.581590]  kasan_save_track+0x20/0x40
[   29.581660]  kasan_save_alloc_info+0x40/0x58
[   29.581791]  __kasan_kmalloc+0xd4/0xd8
[   29.581827]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.581876]  kmalloc_oob_memset_4+0xb0/0x300
[   29.582154]  kunit_try_run_case+0x170/0x3f0
[   29.582314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.582484]  kthread+0x328/0x630
[   29.582648]  ret_from_fork+0x10/0x20
[   29.582742] 
[   29.582763] The buggy address belongs to the object at fff00000c9b1e000
[   29.582763]  which belongs to the cache kmalloc-128 of size 128
[   29.583162] The buggy address is located 117 bytes inside of
[   29.583162]  allocated 120-byte region [fff00000c9b1e000, fff00000c9b1e078)
[   29.583327] 
[   29.583624] The buggy address belongs to the physical page:
[   29.583914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.584084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.584166] page_type: f5(slab)
[   29.584423] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.584694] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.584778] page dumped because: kasan: bad access detected
[   29.584926] 
[   29.585004] Memory state around the buggy address:
[   29.585214]  fff00000c9b1df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.585261]  fff00000c9b1df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.585442] >fff00000c9b1e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.585536]                                                                 ^
[   29.585731]  fff00000c9b1e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.585812]  fff00000c9b1e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.585893] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   29.566166] ==================================================================
[   29.566538] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   29.566622] Write of size 2 at addr fff00000c59f9f77 by task kunit_try_catch/203
[   29.566671] 
[   29.566706] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.567045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.567165] Hardware name: linux,dummy-virt (DT)
[   29.567223] Call trace:
[   29.567249]  show_stack+0x20/0x38 (C)
[   29.567386]  dump_stack_lvl+0x8c/0xd0
[   29.567456]  print_report+0x118/0x5d0
[   29.567506]  kasan_report+0xdc/0x128
[   29.567771]  kasan_check_range+0x100/0x1a8
[   29.567848]  __asan_memset+0x34/0x78
[   29.567967]  kmalloc_oob_memset_2+0x150/0x2f8
[   29.568039]  kunit_try_run_case+0x170/0x3f0
[   29.568165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.568219]  kthread+0x328/0x630
[   29.568475]  ret_from_fork+0x10/0x20
[   29.568721] 
[   29.568779] Allocated by task 203:
[   29.568902]  kasan_save_stack+0x3c/0x68
[   29.569023]  kasan_save_track+0x20/0x40
[   29.569350]  kasan_save_alloc_info+0x40/0x58
[   29.569452]  __kasan_kmalloc+0xd4/0xd8
[   29.569579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.569705]  kmalloc_oob_memset_2+0xb0/0x2f8
[   29.569825]  kunit_try_run_case+0x170/0x3f0
[   29.570013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.570079]  kthread+0x328/0x630
[   29.570118]  ret_from_fork+0x10/0x20
[   29.570260] 
[   29.570335] The buggy address belongs to the object at fff00000c59f9f00
[   29.570335]  which belongs to the cache kmalloc-128 of size 128
[   29.570668] The buggy address is located 119 bytes inside of
[   29.570668]  allocated 120-byte region [fff00000c59f9f00, fff00000c59f9f78)
[   29.570835] 
[   29.570903] The buggy address belongs to the physical page:
[   29.570995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9
[   29.571083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.571304] page_type: f5(slab)
[   29.571484] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.571679] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.571790] page dumped because: kasan: bad access detected
[   29.571849] 
[   29.571868] Memory state around the buggy address:
[   29.571910]  fff00000c59f9e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.571951]  fff00000c59f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.572013] >fff00000c59f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.572049]                                                                 ^
[   29.572107]  fff00000c59f9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.572148]  fff00000c59fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.572184] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   29.548230] ==================================================================
[   29.548320] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   29.548685] Write of size 128 at addr fff00000c59f9e00 by task kunit_try_catch/201
[   29.549154] 
[   29.549197] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.549281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.549306] Hardware name: linux,dummy-virt (DT)
[   29.549336] Call trace:
[   29.549360]  show_stack+0x20/0x38 (C)
[   29.549411]  dump_stack_lvl+0x8c/0xd0
[   29.549795]  print_report+0x118/0x5d0
[   29.549862]  kasan_report+0xdc/0x128
[   29.549906]  kasan_check_range+0x100/0x1a8
[   29.549950]  __asan_memset+0x34/0x78
[   29.549993]  kmalloc_oob_in_memset+0x144/0x2d0
[   29.550040]  kunit_try_run_case+0x170/0x3f0
[   29.550099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.550539]  kthread+0x328/0x630
[   29.550856]  ret_from_fork+0x10/0x20
[   29.550927] 
[   29.550947] Allocated by task 201:
[   29.551161]  kasan_save_stack+0x3c/0x68
[   29.551440]  kasan_save_track+0x20/0x40
[   29.551519]  kasan_save_alloc_info+0x40/0x58
[   29.551671]  __kasan_kmalloc+0xd4/0xd8
[   29.551751]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.552123]  kmalloc_oob_in_memset+0xb0/0x2d0
[   29.552177]  kunit_try_run_case+0x170/0x3f0
[   29.552437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.552566]  kthread+0x328/0x630
[   29.552669]  ret_from_fork+0x10/0x20
[   29.552752] 
[   29.552809] The buggy address belongs to the object at fff00000c59f9e00
[   29.552809]  which belongs to the cache kmalloc-128 of size 128
[   29.552948] The buggy address is located 0 bytes inside of
[   29.552948]  allocated 120-byte region [fff00000c59f9e00, fff00000c59f9e78)
[   29.553072] 
[   29.553194] The buggy address belongs to the physical page:
[   29.553251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9
[   29.553363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.553489] page_type: f5(slab)
[   29.553534] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.553583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.553621] page dumped because: kasan: bad access detected
[   29.553914] 
[   29.553958] Memory state around the buggy address:
[   29.554010]  fff00000c59f9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.554161]  fff00000c59f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.554246] >fff00000c59f9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.554396]                                                                 ^
[   29.554573]  fff00000c59f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.554716]  fff00000c59f9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.554807] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   29.534637] ==================================================================
[   29.534699] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   29.535129] Read of size 16 at addr fff00000c7ac9340 by task kunit_try_catch/199
[   29.535223] 
[   29.535332] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.535556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.535593] Hardware name: linux,dummy-virt (DT)
[   29.535719] Call trace:
[   29.535771]  show_stack+0x20/0x38 (C)
[   29.535826]  dump_stack_lvl+0x8c/0xd0
[   29.536155]  print_report+0x118/0x5d0
[   29.536221]  kasan_report+0xdc/0x128
[   29.536265]  __asan_report_load16_noabort+0x20/0x30
[   29.536423]  kmalloc_uaf_16+0x3bc/0x438
[   29.536479]  kunit_try_run_case+0x170/0x3f0
[   29.536886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.536962]  kthread+0x328/0x630
[   29.537045]  ret_from_fork+0x10/0x20
[   29.537229] 
[   29.537288] Allocated by task 199:
[   29.537400]  kasan_save_stack+0x3c/0x68
[   29.537482]  kasan_save_track+0x20/0x40
[   29.537550]  kasan_save_alloc_info+0x40/0x58
[   29.537918]  __kasan_kmalloc+0xd4/0xd8
[   29.537974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.538080]  kmalloc_uaf_16+0x140/0x438
[   29.538120]  kunit_try_run_case+0x170/0x3f0
[   29.538157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.538211]  kthread+0x328/0x630
[   29.538243]  ret_from_fork+0x10/0x20
[   29.538278] 
[   29.538297] Freed by task 199:
[   29.538340]  kasan_save_stack+0x3c/0x68
[   29.538375]  kasan_save_track+0x20/0x40
[   29.538408]  kasan_save_free_info+0x4c/0x78
[   29.538444]  __kasan_slab_free+0x6c/0x98
[   29.538477]  kfree+0x214/0x3c8
[   29.538520]  kmalloc_uaf_16+0x190/0x438
[   29.538556]  kunit_try_run_case+0x170/0x3f0
[   29.538601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.538641]  kthread+0x328/0x630
[   29.538674]  ret_from_fork+0x10/0x20
[   29.538709] 
[   29.538729] The buggy address belongs to the object at fff00000c7ac9340
[   29.538729]  which belongs to the cache kmalloc-16 of size 16
[   29.538798] The buggy address is located 0 bytes inside of
[   29.538798]  freed 16-byte region [fff00000c7ac9340, fff00000c7ac9350)
[   29.538873] 
[   29.538906] The buggy address belongs to the physical page:
[   29.538941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9
[   29.538994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.539040] page_type: f5(slab)
[   29.539479] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   29.539599] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.539695] page dumped because: kasan: bad access detected
[   29.539821] 
[   29.539863] Memory state around the buggy address:
[   29.539896]  fff00000c7ac9200: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   29.539946]  fff00000c7ac9280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.540003] >fff00000c7ac9300: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   29.540340]                                            ^
[   29.540425]  fff00000c7ac9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540470]  fff00000c7ac9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540572] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   29.518731] ==================================================================
[   29.518826] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   29.518882] Write of size 16 at addr fff00000c7ac92e0 by task kunit_try_catch/197
[   29.518930] 
[   29.518981] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.519077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.519103] Hardware name: linux,dummy-virt (DT)
[   29.519133] Call trace:
[   29.519155]  show_stack+0x20/0x38 (C)
[   29.519218]  dump_stack_lvl+0x8c/0xd0
[   29.519274]  print_report+0x118/0x5d0
[   29.519319]  kasan_report+0xdc/0x128
[   29.519362]  __asan_report_store16_noabort+0x20/0x30
[   29.519410]  kmalloc_oob_16+0x3a0/0x3f8
[   29.519455]  kunit_try_run_case+0x170/0x3f0
[   29.519511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.519576]  kthread+0x328/0x630
[   29.519618]  ret_from_fork+0x10/0x20
[   29.519664] 
[   29.519681] Allocated by task 197:
[   29.519709]  kasan_save_stack+0x3c/0x68
[   29.519746]  kasan_save_track+0x20/0x40
[   29.519780]  kasan_save_alloc_info+0x40/0x58
[   29.519817]  __kasan_kmalloc+0xd4/0xd8
[   29.519850]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.519898]  kmalloc_oob_16+0xb4/0x3f8
[   29.519934]  kunit_try_run_case+0x170/0x3f0
[   29.519978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.520019]  kthread+0x328/0x630
[   29.520050]  ret_from_fork+0x10/0x20
[   29.520753] 
[   29.520929] The buggy address belongs to the object at fff00000c7ac92e0
[   29.520929]  which belongs to the cache kmalloc-16 of size 16
[   29.521178] The buggy address is located 0 bytes inside of
[   29.521178]  allocated 13-byte region [fff00000c7ac92e0, fff00000c7ac92ed)
[   29.521301] 
[   29.521322] The buggy address belongs to the physical page:
[   29.521369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9
[   29.521739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.521823] page_type: f5(slab)
[   29.521910] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   29.521974] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.522345] page dumped because: kasan: bad access detected
[   29.522430] 
[   29.522507] Memory state around the buggy address:
[   29.522604]  fff00000c7ac9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.522656]  fff00000c7ac9200: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   29.522721] >fff00000c7ac9280: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   29.523083]                                                           ^
[   29.523179]  fff00000c7ac9300: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.523253]  fff00000c7ac9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.523527] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   29.505720] ==================================================================
[   29.505861] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   29.505916] Read of size 1 at addr fff00000c7809800 by task kunit_try_catch/195
[   29.505964] 
[   29.506194] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.506350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.506389] Hardware name: linux,dummy-virt (DT)
[   29.506427] Call trace:
[   29.506469]  show_stack+0x20/0x38 (C)
[   29.506573]  dump_stack_lvl+0x8c/0xd0
[   29.506624]  print_report+0x118/0x5d0
[   29.506667]  kasan_report+0xdc/0x128
[   29.506881]  __asan_report_load1_noabort+0x20/0x30
[   29.506939]  krealloc_uaf+0x4c8/0x520
[   29.507034]  kunit_try_run_case+0x170/0x3f0
[   29.507100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.507151]  kthread+0x328/0x630
[   29.507194]  ret_from_fork+0x10/0x20
[   29.507286] 
[   29.507325] Allocated by task 195:
[   29.507371]  kasan_save_stack+0x3c/0x68
[   29.507416]  kasan_save_track+0x20/0x40
[   29.507541]  kasan_save_alloc_info+0x40/0x58
[   29.507596]  __kasan_kmalloc+0xd4/0xd8
[   29.507629]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.507813]  krealloc_uaf+0xc8/0x520
[   29.507850]  kunit_try_run_case+0x170/0x3f0
[   29.507989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.508034]  kthread+0x328/0x630
[   29.508077]  ret_from_fork+0x10/0x20
[   29.508111] 
[   29.508144] Freed by task 195:
[   29.508222]  kasan_save_stack+0x3c/0x68
[   29.508259]  kasan_save_track+0x20/0x40
[   29.508292]  kasan_save_free_info+0x4c/0x78
[   29.508328]  __kasan_slab_free+0x6c/0x98
[   29.508362]  kfree+0x214/0x3c8
[   29.508473]  krealloc_uaf+0x12c/0x520
[   29.508552]  kunit_try_run_case+0x170/0x3f0
[   29.508616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.508817]  kthread+0x328/0x630
[   29.508965]  ret_from_fork+0x10/0x20
[   29.509188] 
[   29.509244] The buggy address belongs to the object at fff00000c7809800
[   29.509244]  which belongs to the cache kmalloc-256 of size 256
[   29.509397] The buggy address is located 0 bytes inside of
[   29.509397]  freed 256-byte region [fff00000c7809800, fff00000c7809900)
[   29.509500] 
[   29.509557] The buggy address belongs to the physical page:
[   29.509597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808
[   29.509724] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.509788] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.510099] page_type: f5(slab)
[   29.510201] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.510294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.510399] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.510473] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.510604] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff
[   29.510688] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.510827] page dumped because: kasan: bad access detected
[   29.510857] 
[   29.510875] Memory state around the buggy address:
[   29.510921]  fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.511125]  fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.511221] >fff00000c7809800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.511377]                    ^
[   29.511433]  fff00000c7809880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.511587]  fff00000c7809900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.511664] ==================================================================
[   29.498331] ==================================================================
[   29.498397] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   29.498452] Read of size 1 at addr fff00000c7809800 by task kunit_try_catch/195
[   29.498500] 
[   29.498529] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.498610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.498635] Hardware name: linux,dummy-virt (DT)
[   29.498673] Call trace:
[   29.498697]  show_stack+0x20/0x38 (C)
[   29.498744]  dump_stack_lvl+0x8c/0xd0
[   29.498799]  print_report+0x118/0x5d0
[   29.498853]  kasan_report+0xdc/0x128
[   29.498905]  __kasan_check_byte+0x54/0x70
[   29.498948]  krealloc_noprof+0x44/0x360
[   29.498996]  krealloc_uaf+0x180/0x520
[   29.499049]  kunit_try_run_case+0x170/0x3f0
[   29.499109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.499160]  kthread+0x328/0x630
[   29.499200]  ret_from_fork+0x10/0x20
[   29.499246] 
[   29.499265] Allocated by task 195:
[   29.499293]  kasan_save_stack+0x3c/0x68
[   29.499331]  kasan_save_track+0x20/0x40
[   29.499374]  kasan_save_alloc_info+0x40/0x58
[   29.499412]  __kasan_kmalloc+0xd4/0xd8
[   29.499454]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.499508]  krealloc_uaf+0xc8/0x520
[   29.499544]  kunit_try_run_case+0x170/0x3f0
[   29.499588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.499629]  kthread+0x328/0x630
[   29.499661]  ret_from_fork+0x10/0x20
[   29.499696] 
[   29.499715] Freed by task 195:
[   29.499739]  kasan_save_stack+0x3c/0x68
[   29.499779]  kasan_save_track+0x20/0x40
[   29.499817]  kasan_save_free_info+0x4c/0x78
[   29.499854]  __kasan_slab_free+0x6c/0x98
[   29.499896]  kfree+0x214/0x3c8
[   29.499930]  krealloc_uaf+0x12c/0x520
[   29.499965]  kunit_try_run_case+0x170/0x3f0
[   29.500008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.500063]  kthread+0x328/0x630
[   29.500947]  ret_from_fork+0x10/0x20
[   29.501013] 
[   29.501149] The buggy address belongs to the object at fff00000c7809800
[   29.501149]  which belongs to the cache kmalloc-256 of size 256
[   29.501387] The buggy address is located 0 bytes inside of
[   29.501387]  freed 256-byte region [fff00000c7809800, fff00000c7809900)
[   29.501489] 
[   29.501537] The buggy address belongs to the physical page:
[   29.501569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808
[   29.501752] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.501804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.501917] page_type: f5(slab)
[   29.502040] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.502121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.502253] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.502333] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.502387] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff
[   29.502677] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.502742] page dumped because: kasan: bad access detected
[   29.502900] 
[   29.502959] Memory state around the buggy address:
[   29.503021]  fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.503146]  fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.503198] >fff00000c7809800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.503327]                    ^
[   29.503441]  fff00000c7809880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.503481]  fff00000c7809900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.503672] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   29.412251] ==================================================================
[   29.412312] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.412632] Write of size 1 at addr fff00000c78096c9 by task kunit_try_catch/189
[   29.412744] 
[   29.412902] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.413032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.413181] Hardware name: linux,dummy-virt (DT)
[   29.413250] Call trace:
[   29.413382]  show_stack+0x20/0x38 (C)
[   29.413439]  dump_stack_lvl+0x8c/0xd0
[   29.413507]  print_report+0x118/0x5d0
[   29.413551]  kasan_report+0xdc/0x128
[   29.413595]  __asan_report_store1_noabort+0x20/0x30
[   29.413797]  krealloc_less_oob_helper+0xa48/0xc50
[   29.414069]  krealloc_less_oob+0x20/0x38
[   29.414211]  kunit_try_run_case+0x170/0x3f0
[   29.414275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.414558]  kthread+0x328/0x630
[   29.414658]  ret_from_fork+0x10/0x20
[   29.414858] 
[   29.414925] Allocated by task 189:
[   29.415039]  kasan_save_stack+0x3c/0x68
[   29.415137]  kasan_save_track+0x20/0x40
[   29.415275]  kasan_save_alloc_info+0x40/0x58
[   29.415382]  __kasan_krealloc+0x118/0x178
[   29.415522]  krealloc_noprof+0x128/0x360
[   29.415582]  krealloc_less_oob_helper+0x168/0xc50
[   29.415622]  krealloc_less_oob+0x20/0x38
[   29.415694]  kunit_try_run_case+0x170/0x3f0
[   29.416138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.416294]  kthread+0x328/0x630
[   29.416403]  ret_from_fork+0x10/0x20
[   29.416524] 
[   29.416602] The buggy address belongs to the object at fff00000c7809600
[   29.416602]  which belongs to the cache kmalloc-256 of size 256
[   29.416753] The buggy address is located 0 bytes to the right of
[   29.416753]  allocated 201-byte region [fff00000c7809600, fff00000c78096c9)
[   29.416840] 
[   29.416879] The buggy address belongs to the physical page:
[   29.416910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808
[   29.416984] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.417030] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.417090] page_type: f5(slab)
[   29.417129] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.417177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.417279] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.417526] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.417598] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff
[   29.417656] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.417709] page dumped because: kasan: bad access detected
[   29.417745] 
[   29.417764] Memory state around the buggy address:
[   29.417798]  fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.417850]  fff00000c7809600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.417891] >fff00000c7809680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.417938]                                               ^
[   29.417986]  fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.418029]  fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.418085] ==================================================================
[   29.436268] ==================================================================
[   29.436317] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.436396] Write of size 1 at addr fff00000c78096ea by task kunit_try_catch/189
[   29.436445] 
[   29.436478] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.436559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.436584] Hardware name: linux,dummy-virt (DT)
[   29.436785] Call trace:
[   29.436813]  show_stack+0x20/0x38 (C)
[   29.436865]  dump_stack_lvl+0x8c/0xd0
[   29.436913]  print_report+0x118/0x5d0
[   29.436957]  kasan_report+0xdc/0x128
[   29.436999]  __asan_report_store1_noabort+0x20/0x30
[   29.437047]  krealloc_less_oob_helper+0xae4/0xc50
[   29.437111]  krealloc_less_oob+0x20/0x38
[   29.437159]  kunit_try_run_case+0x170/0x3f0
[   29.437203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.437254]  kthread+0x328/0x630
[   29.437295]  ret_from_fork+0x10/0x20
[   29.437341] 
[   29.437359] Allocated by task 189:
[   29.437386]  kasan_save_stack+0x3c/0x68
[   29.437423]  kasan_save_track+0x20/0x40
[   29.437457]  kasan_save_alloc_info+0x40/0x58
[   29.437494]  __kasan_krealloc+0x118/0x178
[   29.437528]  krealloc_noprof+0x128/0x360
[   29.437566]  krealloc_less_oob_helper+0x168/0xc50
[   29.437605]  krealloc_less_oob+0x20/0x38
[   29.437642]  kunit_try_run_case+0x170/0x3f0
[   29.437678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.437719]  kthread+0x328/0x630
[   29.437750]  ret_from_fork+0x10/0x20
[   29.437783] 
[   29.437801] The buggy address belongs to the object at fff00000c7809600
[   29.437801]  which belongs to the cache kmalloc-256 of size 256
[   29.437855] The buggy address is located 33 bytes to the right of
[   29.437855]  allocated 201-byte region [fff00000c7809600, fff00000c78096c9)
[   29.437916] 
[   29.437935] The buggy address belongs to the physical page:
[   29.437964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808
[   29.438015] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.439564] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.439730] page_type: f5(slab)
[   29.439783] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.439866] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.440193] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.440290] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.440408] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff
[   29.440484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.440630] page dumped because: kasan: bad access detected
[   29.440667] 
[   29.440684] Memory state around the buggy address:
[   29.440716]  fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.440757]  fff00000c7809600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.440827] >fff00000c7809680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.440863]                                                           ^
[   29.440900]  fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.440966]  fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.441003] ==================================================================
[   29.487464] ==================================================================
[   29.487661] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.487740] Write of size 1 at addr fff00000c646a0eb by task kunit_try_catch/193
[   29.487808] 
[   29.487838] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.487925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.487952] Hardware name: linux,dummy-virt (DT)
[   29.488170] Call trace:
[   29.488238]  show_stack+0x20/0x38 (C)
[   29.488357]  dump_stack_lvl+0x8c/0xd0
[   29.488410]  print_report+0x118/0x5d0
[   29.488453]  kasan_report+0xdc/0x128
[   29.488501]  __asan_report_store1_noabort+0x20/0x30
[   29.488645]  krealloc_less_oob_helper+0xa58/0xc50
[   29.488758]  krealloc_large_less_oob+0x20/0x38
[   29.488919]  kunit_try_run_case+0x170/0x3f0
[   29.488995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.489156]  kthread+0x328/0x630
[   29.489227]  ret_from_fork+0x10/0x20
[   29.489274] 
[   29.489490] The buggy address belongs to the physical page:
[   29.489581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468
[   29.489673] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.489830] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.489881] page_type: f8(unknown)
[   29.489936] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.490146] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.490304] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.490370] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.490498] head: 0bfffe0000000002 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff
[   29.490546] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.490603] page dumped because: kasan: bad access detected
[   29.490804] 
[   29.490974] Memory state around the buggy address:
[   29.491065]  fff00000c6469f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.491212]  fff00000c646a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.491273] >fff00000c646a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.491493]                                                           ^
[   29.491642]  fff00000c646a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.491706]  fff00000c646a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.491807] ==================================================================
[   29.479317] ==================================================================
[   29.479391] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.479441] Write of size 1 at addr fff00000c646a0da by task kunit_try_catch/193
[   29.479542] 
[   29.479579] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.479697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.479723] Hardware name: linux,dummy-virt (DT)
[   29.479773] Call trace:
[   29.479821]  show_stack+0x20/0x38 (C)
[   29.479872]  dump_stack_lvl+0x8c/0xd0
[   29.479973]  print_report+0x118/0x5d0
[   29.480036]  kasan_report+0xdc/0x128
[   29.480186]  __asan_report_store1_noabort+0x20/0x30
[   29.480238]  krealloc_less_oob_helper+0xa80/0xc50
[   29.480295]  krealloc_large_less_oob+0x20/0x38
[   29.480436]  kunit_try_run_case+0x170/0x3f0
[   29.480483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.480541]  kthread+0x328/0x630
[   29.480586]  ret_from_fork+0x10/0x20
[   29.480977] 
[   29.481017] The buggy address belongs to the physical page:
[   29.481130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468
[   29.481203] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.481412] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.481569] page_type: f8(unknown)
[   29.481645] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.481709] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.481790] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.481855] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.481940] head: 0bfffe0000000002 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff
[   29.482026] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.482084] page dumped because: kasan: bad access detected
[   29.482272] 
[   29.482350] Memory state around the buggy address:
[   29.482471]  fff00000c6469f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.482525]  fff00000c646a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.482571] >fff00000c646a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.482837]                                                     ^
[   29.482930]  fff00000c646a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.482993]  fff00000c646a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.483109] ==================================================================
[   29.473391] ==================================================================
[   29.473434] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.473482] Write of size 1 at addr fff00000c646a0d0 by task kunit_try_catch/193
[   29.473529] 
[   29.473557] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.473641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.473850] Hardware name: linux,dummy-virt (DT)
[   29.474338] Call trace:
[   29.474560]  show_stack+0x20/0x38 (C)
[   29.474661]  dump_stack_lvl+0x8c/0xd0
[   29.474711]  print_report+0x118/0x5d0
[   29.474762]  kasan_report+0xdc/0x128
[   29.474929]  __asan_report_store1_noabort+0x20/0x30
[   29.475004]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.475165]  krealloc_large_less_oob+0x20/0x38
[   29.475244]  kunit_try_run_case+0x170/0x3f0
[   29.475371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.475458]  kthread+0x328/0x630
[   29.475587]  ret_from_fork+0x10/0x20
[   29.475680] 
[   29.475864] The buggy address belongs to the physical page:
[   29.475898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468
[   29.476014] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.476112] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.476244] page_type: f8(unknown)
[   29.476320] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.476607] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.476760] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.476841] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.476968] head: 0bfffe0000000002 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff
[   29.477040] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.477146] page dumped because: kasan: bad access detected
[   29.477177] 
[   29.477194] Memory state around the buggy address:
[   29.477245]  fff00000c6469f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.477286]  fff00000c646a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.477487] >fff00000c646a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.477542]                                                  ^
[   29.478013]  fff00000c646a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.478077]  fff00000c646a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.478179] ==================================================================
[   29.483652] ==================================================================
[   29.483715] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.483771] Write of size 1 at addr fff00000c646a0ea by task kunit_try_catch/193
[   29.483827] 
[   29.483958] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.484162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.484201] Hardware name: linux,dummy-virt (DT)
[   29.484238] Call trace:
[   29.484277]  show_stack+0x20/0x38 (C)
[   29.484330]  dump_stack_lvl+0x8c/0xd0
[   29.484376]  print_report+0x118/0x5d0
[   29.484728]  kasan_report+0xdc/0x128
[   29.484814]  __asan_report_store1_noabort+0x20/0x30
[   29.484946]  krealloc_less_oob_helper+0xae4/0xc50
[   29.485021]  krealloc_large_less_oob+0x20/0x38
[   29.485117]  kunit_try_run_case+0x170/0x3f0
[   29.485163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.485213]  kthread+0x328/0x630
[   29.485256]  ret_from_fork+0x10/0x20
[   29.485307] 
[   29.485342] The buggy address belongs to the physical page:
[   29.485381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468
[   29.485439] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.485484] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.485538] page_type: f8(unknown)
[   29.485586] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.485653] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.485701] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.485747] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.485804] head: 0bfffe0000000002 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff
[   29.485860] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.485898] page dumped because: kasan: bad access detected
[   29.485941] 
[   29.485959] Memory state around the buggy address:
[   29.485988]  fff00000c6469f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.486030]  fff00000c646a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.486082] >fff00000c646a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.486117]                                                           ^
[   29.486153]  fff00000c646a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.486200]  fff00000c646a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.486251] ==================================================================
[   29.442130] ==================================================================
[   29.442206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.442269] Write of size 1 at addr fff00000c78096eb by task kunit_try_catch/189
[   29.442349] 
[   29.442410] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.442493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.442713] Hardware name: linux,dummy-virt (DT)
[   29.442817] Call trace:
[   29.442842]  show_stack+0x20/0x38 (C)
[   29.442895]  dump_stack_lvl+0x8c/0xd0
[   29.442984]  print_report+0x118/0x5d0
[   29.443037]  kasan_report+0xdc/0x128
[   29.443325]  __asan_report_store1_noabort+0x20/0x30
[   29.443446]  krealloc_less_oob_helper+0xa58/0xc50
[   29.443501]  krealloc_less_oob+0x20/0x38
[   29.443547]  kunit_try_run_case+0x170/0x3f0
[   29.443630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.443707]  kthread+0x328/0x630
[   29.443749]  ret_from_fork+0x10/0x20
[   29.444018] 
[   29.444101] Allocated by task 189:
[   29.444134]  kasan_save_stack+0x3c/0x68
[   29.444177]  kasan_save_track+0x20/0x40
[   29.444211]  kasan_save_alloc_info+0x40/0x58
[   29.444262]  __kasan_krealloc+0x118/0x178
[   29.444300]  krealloc_noprof+0x128/0x360
[   29.444439]  krealloc_less_oob_helper+0x168/0xc50
[   29.444494]  krealloc_less_oob+0x20/0x38
[   29.444532]  kunit_try_run_case+0x170/0x3f0
[   29.444642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.444707]  kthread+0x328/0x630
[   29.444874]  ret_from_fork+0x10/0x20
[   29.444920] 
[   29.444940] The buggy address belongs to the object at fff00000c7809600
[   29.444940]  which belongs to the cache kmalloc-256 of size 256
[   29.444996] The buggy address is located 34 bytes to the right of
[   29.444996]  allocated 201-byte region [fff00000c7809600, fff00000c78096c9)
[   29.445076] 
[   29.445095] The buggy address belongs to the physical page:
[   29.445126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808
[   29.445222] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.445270] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.445320] page_type: f5(slab)
[   29.445357] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.445424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.445472] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.445519] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.445566] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff
[   29.445612] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.445651] page dumped because: kasan: bad access detected
[   29.445680] 
[   29.445697] Memory state around the buggy address:
[   29.445736]  fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.445777]  fff00000c7809600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.445826] >fff00000c7809680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.445862]                                                           ^
[   29.445898]  fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.445947]  fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.445982] ==================================================================
[   29.419696] ==================================================================
[   29.419746] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.419796] Write of size 1 at addr fff00000c78096d0 by task kunit_try_catch/189
[   29.419992] 
[   29.420033] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.420350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.420438] Hardware name: linux,dummy-virt (DT)
[   29.420520] Call trace:
[   29.420628]  show_stack+0x20/0x38 (C)
[   29.420726]  dump_stack_lvl+0x8c/0xd0
[   29.420819]  print_report+0x118/0x5d0
[   29.420908]  kasan_report+0xdc/0x128
[   29.420951]  __asan_report_store1_noabort+0x20/0x30
[   29.420999]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.421047]  krealloc_less_oob+0x20/0x38
[   29.421495]  kunit_try_run_case+0x170/0x3f0
[   29.421655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.421770]  kthread+0x328/0x630
[   29.421919]  ret_from_fork+0x10/0x20
[   29.422026] 
[   29.422142] Allocated by task 189:
[   29.422233]  kasan_save_stack+0x3c/0x68
[   29.422283]  kasan_save_track+0x20/0x40
[   29.422317]  kasan_save_alloc_info+0x40/0x58
[   29.422567]  __kasan_krealloc+0x118/0x178
[   29.422720]  krealloc_noprof+0x128/0x360
[   29.422878]  krealloc_less_oob_helper+0x168/0xc50
[   29.423002]  krealloc_less_oob+0x20/0x38
[   29.423187]  kunit_try_run_case+0x170/0x3f0
[   29.423243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.423342]  kthread+0x328/0x630
[   29.423724]  ret_from_fork+0x10/0x20
[   29.423889] 
[   29.423981] The buggy address belongs to the object at fff00000c7809600
[   29.423981]  which belongs to the cache kmalloc-256 of size 256
[   29.424189] The buggy address is located 7 bytes to the right of
[   29.424189]  allocated 201-byte region [fff00000c7809600, fff00000c78096c9)
[   29.424290] 
[   29.424336] The buggy address belongs to the physical page:
[   29.424433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808
[   29.424488] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.424533] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.424597] page_type: f5(slab)
[   29.424635] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.424842] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.425012] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.425105] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.425164] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff
[   29.425212] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.425249] page dumped because: kasan: bad access detected
[   29.425288] 
[   29.425306] Memory state around the buggy address:
[   29.425336]  fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.425376]  fff00000c7809600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.425415] >fff00000c7809680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.425451]                                                  ^
[   29.425485]  fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.425535]  fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.425572] ==================================================================
[   29.427256] ==================================================================
[   29.427305] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.427354] Write of size 1 at addr fff00000c78096da by task kunit_try_catch/189
[   29.427402] 
[   29.427648] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.428127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.428427] Hardware name: linux,dummy-virt (DT)
[   29.428459] Call trace:
[   29.428481]  show_stack+0x20/0x38 (C)
[   29.428531]  dump_stack_lvl+0x8c/0xd0
[   29.429201]  print_report+0x118/0x5d0
[   29.429536]  kasan_report+0xdc/0x128
[   29.430321]  __asan_report_store1_noabort+0x20/0x30
[   29.432740]  krealloc_less_oob_helper+0xa80/0xc50
[   29.432804]  krealloc_less_oob+0x20/0x38
[   29.432851]  kunit_try_run_case+0x170/0x3f0
[   29.432899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.432949]  kthread+0x328/0x630
[   29.432991]  ret_from_fork+0x10/0x20
[   29.433038] 
[   29.433067] Allocated by task 189:
[   29.433096]  kasan_save_stack+0x3c/0x68
[   29.433135]  kasan_save_track+0x20/0x40
[   29.433169]  kasan_save_alloc_info+0x40/0x58
[   29.433205]  __kasan_krealloc+0x118/0x178
[   29.433267]  krealloc_noprof+0x128/0x360
[   29.433305]  krealloc_less_oob_helper+0x168/0xc50
[   29.433344]  krealloc_less_oob+0x20/0x38
[   29.433380]  kunit_try_run_case+0x170/0x3f0
[   29.433870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.433926]  kthread+0x328/0x630
[   29.433959]  ret_from_fork+0x10/0x20
[   29.433994] 
[   29.434014] The buggy address belongs to the object at fff00000c7809600
[   29.434014]  which belongs to the cache kmalloc-256 of size 256
[   29.434085] The buggy address is located 17 bytes to the right of
[   29.434085]  allocated 201-byte region [fff00000c7809600, fff00000c78096c9)
[   29.434147] 
[   29.434167] The buggy address belongs to the physical page:
[   29.434198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808
[   29.434252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.434298] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.434349] page_type: f5(slab)
[   29.434389] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.434437] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.434486] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.434533] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.434579] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff
[   29.434626] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.434664] page dumped because: kasan: bad access detected
[   29.434693] 
[   29.434711] Memory state around the buggy address:
[   29.434741]  fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.434788]  fff00000c7809600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.434828] >fff00000c7809680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.434864]                                                     ^
[   29.434899]  fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.434938]  fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.434973] ==================================================================
[   29.469897] ==================================================================
[   29.469966] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.470025] Write of size 1 at addr fff00000c646a0c9 by task kunit_try_catch/193
[   29.470087] 
[   29.470120] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.470201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.470236] Hardware name: linux,dummy-virt (DT)
[   29.470267] Call trace:
[   29.470290]  show_stack+0x20/0x38 (C)
[   29.470338]  dump_stack_lvl+0x8c/0xd0
[   29.470386]  print_report+0x118/0x5d0
[   29.470430]  kasan_report+0xdc/0x128
[   29.470473]  __asan_report_store1_noabort+0x20/0x30
[   29.470530]  krealloc_less_oob_helper+0xa48/0xc50
[   29.470587]  krealloc_large_less_oob+0x20/0x38
[   29.470635]  kunit_try_run_case+0x170/0x3f0
[   29.470691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.470744]  kthread+0x328/0x630
[   29.470799]  ret_from_fork+0x10/0x20
[   29.470847] 
[   29.470875] The buggy address belongs to the physical page:
[   29.470906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468
[   29.470958] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.471005] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.471394] page_type: f8(unknown)
[   29.471623] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.471753] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.471805] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.471868] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.471934] head: 0bfffe0000000002 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff
[   29.471988] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.472122] page dumped because: kasan: bad access detected
[   29.472191] 
[   29.472219] Memory state around the buggy address:
[   29.472274]  fff00000c6469f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.472544]  fff00000c646a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.472632] >fff00000c646a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.472762]                                               ^
[   29.472819]  fff00000c646a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.472873]  fff00000c646a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.473023] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   29.458881] ==================================================================
[   29.458933] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.458983] Write of size 1 at addr fff00000c91920f0 by task kunit_try_catch/191
[   29.459200] 
[   29.459240] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.459338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.459364] Hardware name: linux,dummy-virt (DT)
[   29.459463] Call trace:
[   29.459489]  show_stack+0x20/0x38 (C)
[   29.459565]  dump_stack_lvl+0x8c/0xd0
[   29.459785]  print_report+0x118/0x5d0
[   29.459940]  kasan_report+0xdc/0x128
[   29.459988]  __asan_report_store1_noabort+0x20/0x30
[   29.460041]  krealloc_more_oob_helper+0x5c0/0x678
[   29.460104]  krealloc_large_more_oob+0x20/0x38
[   29.460191]  kunit_try_run_case+0x170/0x3f0
[   29.460257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.460308]  kthread+0x328/0x630
[   29.460410]  ret_from_fork+0x10/0x20
[   29.460527] 
[   29.460621] The buggy address belongs to the physical page:
[   29.460696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109190
[   29.460804] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.460850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.460901] page_type: f8(unknown)
[   29.460939] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.461123] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.461203] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.461328] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.461480] head: 0bfffe0000000002 ffffc1ffc3246401 00000000ffffffff 00000000ffffffff
[   29.461564] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.461640] page dumped because: kasan: bad access detected
[   29.461760] 
[   29.461819] Memory state around the buggy address:
[   29.461903]  fff00000c9191f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.462017]  fff00000c9192000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.462068] >fff00000c9192080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.462386]                                                              ^
[   29.462473]  fff00000c9192100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.462606]  fff00000c9192180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.462696] ==================================================================
[   29.452369] ==================================================================
[   29.452564] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.452750] Write of size 1 at addr fff00000c91920eb by task kunit_try_catch/191
[   29.452806] 
[   29.452842] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.452987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.453047] Hardware name: linux,dummy-virt (DT)
[   29.453165] Call trace:
[   29.453225]  show_stack+0x20/0x38 (C)
[   29.453351]  dump_stack_lvl+0x8c/0xd0
[   29.453437]  print_report+0x118/0x5d0
[   29.453527]  kasan_report+0xdc/0x128
[   29.453649]  __asan_report_store1_noabort+0x20/0x30
[   29.453722]  krealloc_more_oob_helper+0x60c/0x678
[   29.454022]  krealloc_large_more_oob+0x20/0x38
[   29.454175]  kunit_try_run_case+0x170/0x3f0
[   29.454317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.454442]  kthread+0x328/0x630
[   29.454560]  ret_from_fork+0x10/0x20
[   29.454609] 
[   29.454657] The buggy address belongs to the physical page:
[   29.454897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109190
[   29.455143] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.455227] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.455353] page_type: f8(unknown)
[   29.455448] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.455584] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.455678] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.455894] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.455952] head: 0bfffe0000000002 ffffc1ffc3246401 00000000ffffffff 00000000ffffffff
[   29.456006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.456083] page dumped because: kasan: bad access detected
[   29.456173] 
[   29.456240] Memory state around the buggy address:
[   29.456317]  fff00000c9191f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.456439]  fff00000c9192000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.456502] >fff00000c9192080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.456606]                                                           ^
[   29.456661]  fff00000c9192100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.456718]  fff00000c9192180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.456797] ==================================================================
[   29.397881] ==================================================================
[   29.398279] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.398356] Write of size 1 at addr fff00000c78094f0 by task kunit_try_catch/187
[   29.398566] 
[   29.398609] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.398859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.398887] Hardware name: linux,dummy-virt (DT)
[   29.398925] Call trace:
[   29.399093]  show_stack+0x20/0x38 (C)
[   29.399149]  dump_stack_lvl+0x8c/0xd0
[   29.399337]  print_report+0x118/0x5d0
[   29.399397]  kasan_report+0xdc/0x128
[   29.399729]  __asan_report_store1_noabort+0x20/0x30
[   29.399877]  krealloc_more_oob_helper+0x5c0/0x678
[   29.399950]  krealloc_more_oob+0x20/0x38
[   29.400152]  kunit_try_run_case+0x170/0x3f0
[   29.400381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.400447]  kthread+0x328/0x630
[   29.400637]  ret_from_fork+0x10/0x20
[   29.400996] 
[   29.401017] Allocated by task 187:
[   29.401046]  kasan_save_stack+0x3c/0x68
[   29.401346]  kasan_save_track+0x20/0x40
[   29.401493]  kasan_save_alloc_info+0x40/0x58
[   29.401629]  __kasan_krealloc+0x118/0x178
[   29.401685]  krealloc_noprof+0x128/0x360
[   29.401743]  krealloc_more_oob_helper+0x168/0x678
[   29.401978]  krealloc_more_oob+0x20/0x38
[   29.402190]  kunit_try_run_case+0x170/0x3f0
[   29.402253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.402507]  kthread+0x328/0x630
[   29.402654]  ret_from_fork+0x10/0x20
[   29.402763] 
[   29.402798] The buggy address belongs to the object at fff00000c7809400
[   29.402798]  which belongs to the cache kmalloc-256 of size 256
[   29.402855] The buggy address is located 5 bytes to the right of
[   29.402855]  allocated 235-byte region [fff00000c7809400, fff00000c78094eb)
[   29.402972] 
[   29.403002] The buggy address belongs to the physical page:
[   29.403040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808
[   29.403110] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.403167] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.403223] page_type: f5(slab)
[   29.403282] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.403340] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.403389] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.403436] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.403484] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff
[   29.403540] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.403578] page dumped because: kasan: bad access detected
[   29.403613] 
[   29.403631] Memory state around the buggy address:
[   29.403660]  fff00000c7809380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.403702]  fff00000c7809400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.403751] >fff00000c7809480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.403786]                                                              ^
[   29.403824]  fff00000c7809500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.403864]  fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.403908] ==================================================================
[   29.388157] ==================================================================
[   29.388441] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.388509] Write of size 1 at addr fff00000c78094eb by task kunit_try_catch/187
[   29.388997] 
[   29.389217] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.389315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.389498] Hardware name: linux,dummy-virt (DT)
[   29.389534] Call trace:
[   29.389575]  show_stack+0x20/0x38 (C)
[   29.389651]  dump_stack_lvl+0x8c/0xd0
[   29.389708]  print_report+0x118/0x5d0
[   29.389753]  kasan_report+0xdc/0x128
[   29.389800]  __asan_report_store1_noabort+0x20/0x30
[   29.389848]  krealloc_more_oob_helper+0x60c/0x678
[   29.389913]  krealloc_more_oob+0x20/0x38
[   29.389960]  kunit_try_run_case+0x170/0x3f0
[   29.390015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.390087]  kthread+0x328/0x630
[   29.390129]  ret_from_fork+0x10/0x20
[   29.390188] 
[   29.390212] Allocated by task 187:
[   29.390241]  kasan_save_stack+0x3c/0x68
[   29.390279]  kasan_save_track+0x20/0x40
[   29.390323]  kasan_save_alloc_info+0x40/0x58
[   29.390359]  __kasan_krealloc+0x118/0x178
[   29.390394]  krealloc_noprof+0x128/0x360
[   29.390432]  krealloc_more_oob_helper+0x168/0x678
[   29.390471]  krealloc_more_oob+0x20/0x38
[   29.390516]  kunit_try_run_case+0x170/0x3f0
[   29.390557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.390598]  kthread+0x328/0x630
[   29.390636]  ret_from_fork+0x10/0x20
[   29.390680] 
[   29.390699] The buggy address belongs to the object at fff00000c7809400
[   29.390699]  which belongs to the cache kmalloc-256 of size 256
[   29.390754] The buggy address is located 0 bytes to the right of
[   29.390754]  allocated 235-byte region [fff00000c7809400, fff00000c78094eb)
[   29.390826] 
[   29.390845] The buggy address belongs to the physical page:
[   29.390883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808
[   29.390943] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.390997] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.391047] page_type: f5(slab)
[   29.391788] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.391893] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.392170] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.392232] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.392691] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff
[   29.392802] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.392979] page dumped because: kasan: bad access detected
[   29.393009] 
[   29.393359] Memory state around the buggy address:
[   29.393442]  fff00000c7809380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.393531]  fff00000c7809400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.393732] >fff00000c7809480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.393940]                                                           ^
[   29.394003]  fff00000c7809500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.394121]  fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.394203] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   29.371015] ==================================================================
[   29.371104] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   29.371297] Read of size 1 at addr fff00000c9af0000 by task kunit_try_catch/185
[   29.371394] 
[   29.371429] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.371573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.371599] Hardware name: linux,dummy-virt (DT)
[   29.371646] Call trace:
[   29.371962]  show_stack+0x20/0x38 (C)
[   29.372097]  dump_stack_lvl+0x8c/0xd0
[   29.372172]  print_report+0x118/0x5d0
[   29.372272]  kasan_report+0xdc/0x128
[   29.372317]  __asan_report_load1_noabort+0x20/0x30
[   29.372499]  page_alloc_uaf+0x328/0x350
[   29.372567]  kunit_try_run_case+0x170/0x3f0
[   29.372643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.372920]  kthread+0x328/0x630
[   29.373078]  ret_from_fork+0x10/0x20
[   29.373282] 
[   29.373391] The buggy address belongs to the physical page:
[   29.373494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.373570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.373761] page_type: f0(buddy)
[   29.374030] raw: 0bfffe0000000000 fff00000ff6160e0 fff00000ff6160e0 0000000000000000
[   29.374231] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   29.374402] page dumped because: kasan: bad access detected
[   29.374530] 
[   29.374626] Memory state around the buggy address:
[   29.374703]  fff00000c9aeff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.374797]  fff00000c9aeff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.374905] >fff00000c9af0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.374976]                    ^
[   29.375048]  fff00000c9af0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.375386]  fff00000c9af0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.375510] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   29.344508] ==================================================================
[   29.344823] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   29.344891] Free of addr fff00000c9190001 by task kunit_try_catch/181
[   29.345305] 
[   29.345354] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.345512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.345602] Hardware name: linux,dummy-virt (DT)
[   29.345757] Call trace:
[   29.345838]  show_stack+0x20/0x38 (C)
[   29.346298]  dump_stack_lvl+0x8c/0xd0
[   29.346392]  print_report+0x118/0x5d0
[   29.346464]  kasan_report_invalid_free+0xc0/0xe8
[   29.346818]  __kasan_kfree_large+0x5c/0xa8
[   29.346874]  free_large_kmalloc+0x68/0x150
[   29.347085]  kfree+0x270/0x3c8
[   29.347267]  kmalloc_large_invalid_free+0x108/0x270
[   29.347400]  kunit_try_run_case+0x170/0x3f0
[   29.347672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.347775]  kthread+0x328/0x630
[   29.347996]  ret_from_fork+0x10/0x20
[   29.348445] 
[   29.348652] The buggy address belongs to the physical page:
[   29.348770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109190
[   29.348856] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.348979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.349138] page_type: f8(unknown)
[   29.349233] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.349350] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.349401] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.349448] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.349952] head: 0bfffe0000000002 ffffc1ffc3246401 00000000ffffffff 00000000ffffffff
[   29.350097] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.350180] page dumped because: kasan: bad access detected
[   29.350388] 
[   29.350555] Memory state around the buggy address:
[   29.350604]  fff00000c918ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.350873]  fff00000c918ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.351145] >fff00000c9190000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.351360]                    ^
[   29.351449]  fff00000c9190080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.351540]  fff00000c9190100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.351636] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   29.329275] ==================================================================
[   29.329458] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   29.329745] Read of size 1 at addr fff00000c91b8000 by task kunit_try_catch/179
[   29.330042] 
[   29.330126] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.330275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.330366] Hardware name: linux,dummy-virt (DT)
[   29.330499] Call trace:
[   29.330569]  show_stack+0x20/0x38 (C)
[   29.330935]  dump_stack_lvl+0x8c/0xd0
[   29.331109]  print_report+0x118/0x5d0
[   29.331250]  kasan_report+0xdc/0x128
[   29.331333]  __asan_report_load1_noabort+0x20/0x30
[   29.331383]  kmalloc_large_uaf+0x2cc/0x2f8
[   29.331785]  kunit_try_run_case+0x170/0x3f0
[   29.331890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.331989]  kthread+0x328/0x630
[   29.332168]  ret_from_fork+0x10/0x20
[   29.332250] 
[   29.332469] The buggy address belongs to the physical page:
[   29.332557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b8
[   29.332821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.332966] raw: 0bfffe0000000000 ffffc1ffc3246408 fff00000da472d00 0000000000000000
[   29.333016] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   29.333063] page dumped because: kasan: bad access detected
[   29.333363] 
[   29.333395] Memory state around the buggy address:
[   29.333514]  fff00000c91b7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.333568]  fff00000c91b7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.333610] >fff00000c91b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.333647]                    ^
[   29.333675]  fff00000c91b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.333714]  fff00000c91b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.333751] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   29.318164] ==================================================================
[   29.318231] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   29.318281] Write of size 1 at addr fff00000c91ba00a by task kunit_try_catch/177
[   29.318328] 
[   29.318355] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.318436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.318461] Hardware name: linux,dummy-virt (DT)
[   29.318489] Call trace:
[   29.318511]  show_stack+0x20/0x38 (C)
[   29.318556]  dump_stack_lvl+0x8c/0xd0
[   29.318603]  print_report+0x118/0x5d0
[   29.318645]  kasan_report+0xdc/0x128
[   29.318686]  __asan_report_store1_noabort+0x20/0x30
[   29.318734]  kmalloc_large_oob_right+0x278/0x2b8
[   29.318787]  kunit_try_run_case+0x170/0x3f0
[   29.318832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.318881]  kthread+0x328/0x630
[   29.318922]  ret_from_fork+0x10/0x20
[   29.318967] 
[   29.318996] The buggy address belongs to the physical page:
[   29.319025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b8
[   29.319177] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.319231] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.319300] page_type: f8(unknown)
[   29.319342] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.319390] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.319439] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.319486] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.319533] head: 0bfffe0000000002 ffffc1ffc3246e01 00000000ffffffff 00000000ffffffff
[   29.319580] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.319617] page dumped because: kasan: bad access detected
[   29.319898] 
[   29.319995] Memory state around the buggy address:
[   29.320069]  fff00000c91b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.320421]  fff00000c91b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.320498] >fff00000c91ba000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.320566]                       ^
[   29.320692]  fff00000c91ba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.320733]  fff00000c91ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.320786] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   29.310080] ==================================================================
[   29.310152] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   29.310227] Write of size 1 at addr fff00000c9ad1f00 by task kunit_try_catch/175
[   29.310299] 
[   29.310345] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.310433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.310476] Hardware name: linux,dummy-virt (DT)
[   29.310522] Call trace:
[   29.310570]  show_stack+0x20/0x38 (C)
[   29.310644]  dump_stack_lvl+0x8c/0xd0
[   29.310722]  print_report+0x118/0x5d0
[   29.310791]  kasan_report+0xdc/0x128
[   29.310835]  __asan_report_store1_noabort+0x20/0x30
[   29.311128]  kmalloc_big_oob_right+0x2a4/0x2f0
[   29.311188]  kunit_try_run_case+0x170/0x3f0
[   29.311251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.311301]  kthread+0x328/0x630
[   29.311342]  ret_from_fork+0x10/0x20
[   29.311394] 
[   29.311431] Allocated by task 175:
[   29.311460]  kasan_save_stack+0x3c/0x68
[   29.311497]  kasan_save_track+0x20/0x40
[   29.311532]  kasan_save_alloc_info+0x40/0x58
[   29.311723]  __kasan_kmalloc+0xd4/0xd8
[   29.311760]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.311818]  kmalloc_big_oob_right+0xb8/0x2f0
[   29.311897]  kunit_try_run_case+0x170/0x3f0
[   29.311933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.311974]  kthread+0x328/0x630
[   29.312022]  ret_from_fork+0x10/0x20
[   29.312067] 
[   29.312085] The buggy address belongs to the object at fff00000c9ad0000
[   29.312085]  which belongs to the cache kmalloc-8k of size 8192
[   29.312139] The buggy address is located 0 bytes to the right of
[   29.312139]  allocated 7936-byte region [fff00000c9ad0000, fff00000c9ad1f00)
[   29.312198] 
[   29.312219] The buggy address belongs to the physical page:
[   29.312266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad0
[   29.312315] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.312359] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.312421] page_type: f5(slab)
[   29.312476] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.312607] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.312689] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.312804] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.312909] head: 0bfffe0000000003 ffffc1ffc326b401 00000000ffffffff 00000000ffffffff
[   29.312993] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   29.313043] page dumped because: kasan: bad access detected
[   29.313081] 
[   29.313099] Memory state around the buggy address:
[   29.313128]  fff00000c9ad1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.313295]  fff00000c9ad1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.313336] >fff00000c9ad1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.313371]                    ^
[   29.313405]  fff00000c9ad1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.313444]  fff00000c9ad2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.313518] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   29.301859] ==================================================================
[   29.301927] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   29.301978] Write of size 1 at addr fff00000c59f9d78 by task kunit_try_catch/173
[   29.302077] 
[   29.302124] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.302228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.302284] Hardware name: linux,dummy-virt (DT)
[   29.302354] Call trace:
[   29.302381]  show_stack+0x20/0x38 (C)
[   29.302462]  dump_stack_lvl+0x8c/0xd0
[   29.302510]  print_report+0x118/0x5d0
[   29.302553]  kasan_report+0xdc/0x128
[   29.302606]  __asan_report_store1_noabort+0x20/0x30
[   29.302671]  kmalloc_track_caller_oob_right+0x418/0x488
[   29.302723]  kunit_try_run_case+0x170/0x3f0
[   29.302781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.302832]  kthread+0x328/0x630
[   29.302875]  ret_from_fork+0x10/0x20
[   29.303133] 
[   29.303172] Allocated by task 173:
[   29.303228]  kasan_save_stack+0x3c/0x68
[   29.303289]  kasan_save_track+0x20/0x40
[   29.303353]  kasan_save_alloc_info+0x40/0x58
[   29.303408]  __kasan_kmalloc+0xd4/0xd8
[   29.303461]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.303559]  kmalloc_track_caller_oob_right+0x184/0x488
[   29.303601]  kunit_try_run_case+0x170/0x3f0
[   29.303636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.303693]  kthread+0x328/0x630
[   29.303744]  ret_from_fork+0x10/0x20
[   29.303805] 
[   29.303843] The buggy address belongs to the object at fff00000c59f9d00
[   29.303843]  which belongs to the cache kmalloc-128 of size 128
[   29.303925] The buggy address is located 0 bytes to the right of
[   29.303925]  allocated 120-byte region [fff00000c59f9d00, fff00000c59f9d78)
[   29.304064] 
[   29.304102] The buggy address belongs to the physical page:
[   29.304130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9
[   29.304179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.304242] page_type: f5(slab)
[   29.304993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.305048] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.305442] page dumped because: kasan: bad access detected
[   29.305472] 
[   29.305489] Memory state around the buggy address:
[   29.305518]  fff00000c59f9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.305559]  fff00000c59f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.305599] >fff00000c59f9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.305634]                                                                 ^
[   29.305671]  fff00000c59f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.305710]  fff00000c59f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.305745] ==================================================================
[   29.296600] ==================================================================
[   29.296727] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   29.296809] Write of size 1 at addr fff00000c59f9c78 by task kunit_try_catch/173
[   29.296899] 
[   29.296941] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.297023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.297202] Hardware name: linux,dummy-virt (DT)
[   29.297300] Call trace:
[   29.297449]  show_stack+0x20/0x38 (C)
[   29.297578]  dump_stack_lvl+0x8c/0xd0
[   29.297719]  print_report+0x118/0x5d0
[   29.297788]  kasan_report+0xdc/0x128
[   29.297874]  __asan_report_store1_noabort+0x20/0x30
[   29.297935]  kmalloc_track_caller_oob_right+0x40c/0x488
[   29.298010]  kunit_try_run_case+0x170/0x3f0
[   29.298171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.298332]  kthread+0x328/0x630
[   29.298412]  ret_from_fork+0x10/0x20
[   29.298459] 
[   29.298477] Allocated by task 173:
[   29.298505]  kasan_save_stack+0x3c/0x68
[   29.298542]  kasan_save_track+0x20/0x40
[   29.298576]  kasan_save_alloc_info+0x40/0x58
[   29.298612]  __kasan_kmalloc+0xd4/0xd8
[   29.298644]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.298723]  kmalloc_track_caller_oob_right+0xa8/0x488
[   29.298778]  kunit_try_run_case+0x170/0x3f0
[   29.298812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.298853]  kthread+0x328/0x630
[   29.298896]  ret_from_fork+0x10/0x20
[   29.299020] 
[   29.299108] The buggy address belongs to the object at fff00000c59f9c00
[   29.299108]  which belongs to the cache kmalloc-128 of size 128
[   29.299205] The buggy address is located 0 bytes to the right of
[   29.299205]  allocated 120-byte region [fff00000c59f9c00, fff00000c59f9c78)
[   29.299310] 
[   29.299346] The buggy address belongs to the physical page:
[   29.299394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9
[   29.299497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.299616] page_type: f5(slab)
[   29.299700] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.299840] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.299980] page dumped because: kasan: bad access detected
[   29.300010] 
[   29.300028] Memory state around the buggy address:
[   29.300077]  fff00000c59f9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.300118]  fff00000c59f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.300158] >fff00000c59f9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.300442]                                                                 ^
[   29.300546]  fff00000c59f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.300651]  fff00000c59f9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.300736] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   29.287372] ==================================================================
[   29.287432] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   29.287484] Read of size 1 at addr fff00000c992f000 by task kunit_try_catch/171
[   29.287532] 
[   29.287560] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.287656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.287692] Hardware name: linux,dummy-virt (DT)
[   29.287736] Call trace:
[   29.287765]  show_stack+0x20/0x38 (C)
[   29.287813]  dump_stack_lvl+0x8c/0xd0
[   29.287860]  print_report+0x118/0x5d0
[   29.287903]  kasan_report+0xdc/0x128
[   29.287946]  __asan_report_load1_noabort+0x20/0x30
[   29.287993]  kmalloc_node_oob_right+0x2f4/0x330
[   29.288047]  kunit_try_run_case+0x170/0x3f0
[   29.288420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.288518]  kthread+0x328/0x630
[   29.288646]  ret_from_fork+0x10/0x20
[   29.288755] 
[   29.288774] Allocated by task 171:
[   29.288819]  kasan_save_stack+0x3c/0x68
[   29.288909]  kasan_save_track+0x20/0x40
[   29.289001]  kasan_save_alloc_info+0x40/0x58
[   29.289050]  __kasan_kmalloc+0xd4/0xd8
[   29.289096]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   29.289137]  kmalloc_node_oob_right+0xbc/0x330
[   29.289175]  kunit_try_run_case+0x170/0x3f0
[   29.289210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.289404]  kthread+0x328/0x630
[   29.289441]  ret_from_fork+0x10/0x20
[   29.289508] 
[   29.289565] The buggy address belongs to the object at fff00000c992e000
[   29.289565]  which belongs to the cache kmalloc-4k of size 4096
[   29.289650] The buggy address is located 0 bytes to the right of
[   29.289650]  allocated 4096-byte region [fff00000c992e000, fff00000c992f000)
[   29.289724] 
[   29.289787] The buggy address belongs to the physical page:
[   29.290001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109928
[   29.290389] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.290497] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.290800] page_type: f5(slab)
[   29.290951] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   29.291046] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.291175] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   29.291259] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.291371] head: 0bfffe0000000003 ffffc1ffc3264a01 00000000ffffffff 00000000ffffffff
[   29.291465] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   29.291543] page dumped because: kasan: bad access detected
[   29.291614] 
[   29.291632] Memory state around the buggy address:
[   29.291662]  fff00000c992ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.291721]  fff00000c992ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.292065] >fff00000c992f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.292143]                    ^
[   29.292253]  fff00000c992f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.292296]  fff00000c992f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.292377] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   29.275465] ==================================================================
[   29.275550] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.275605] Read of size 1 at addr fff00000c7ac92bf by task kunit_try_catch/169
[   29.275653] 
[   29.275719] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.275803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.275829] Hardware name: linux,dummy-virt (DT)
[   29.275858] Call trace:
[   29.275880]  show_stack+0x20/0x38 (C)
[   29.275929]  dump_stack_lvl+0x8c/0xd0
[   29.275976]  print_report+0x118/0x5d0
[   29.276019]  kasan_report+0xdc/0x128
[   29.276074]  __asan_report_load1_noabort+0x20/0x30
[   29.276127]  kmalloc_oob_left+0x2ec/0x320
[   29.276174]  kunit_try_run_case+0x170/0x3f0
[   29.276234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.276286]  kthread+0x328/0x630
[   29.276327]  ret_from_fork+0x10/0x20
[   29.276767] 
[   29.276814] Allocated by task 21:
[   29.276847]  kasan_save_stack+0x3c/0x68
[   29.276887]  kasan_save_track+0x20/0x40
[   29.276921]  kasan_save_alloc_info+0x40/0x58
[   29.276958]  __kasan_kmalloc+0xd4/0xd8
[   29.276992]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   29.277034]  build_sched_domains+0x32c/0x36c0
[   29.277088]  partition_sched_domains+0x79c/0x1098
[   29.277125]  rebuild_sched_domains_locked+0x494/0xde0
[   29.277362]  cpuset_handle_hotplug+0xab0/0x1480
[   29.277489]  cpuset_update_active_cpus+0x18/0x30
[   29.277567]  sched_cpu_activate+0x2d0/0x388
[   29.277730]  cpuhp_invoke_callback+0x5b8/0x1630
[   29.277770]  cpuhp_thread_fun+0x230/0x5d8
[   29.278048]  smpboot_thread_fn+0x2e8/0x760
[   29.278165]  kthread+0x328/0x630
[   29.278277]  ret_from_fork+0x10/0x20
[   29.278346] 
[   29.278457] Freed by task 21:
[   29.278551]  kasan_save_stack+0x3c/0x68
[   29.278587]  kasan_save_track+0x20/0x40
[   29.278872]  kasan_save_free_info+0x4c/0x78
[   29.278949]  __kasan_slab_free+0x6c/0x98
[   29.279076]  kfree+0x214/0x3c8
[   29.279176]  destroy_sched_domain+0xdc/0x120
[   29.279294]  cpu_attach_domain+0xff8/0x15c0
[   29.279334]  build_sched_domains+0x299c/0x36c0
[   29.279596]  partition_sched_domains+0x79c/0x1098
[   29.279732]  rebuild_sched_domains_locked+0x494/0xde0
[   29.279813]  cpuset_handle_hotplug+0xab0/0x1480
[   29.279895]  cpuset_update_active_cpus+0x18/0x30
[   29.279983]  sched_cpu_activate+0x2d0/0x388
[   29.280079]  cpuhp_invoke_callback+0x5b8/0x1630
[   29.280134]  cpuhp_thread_fun+0x230/0x5d8
[   29.280169]  smpboot_thread_fn+0x2e8/0x760
[   29.280448]  kthread+0x328/0x630
[   29.280510]  ret_from_fork+0x10/0x20
[   29.280616] 
[   29.280651] The buggy address belongs to the object at fff00000c7ac92a0
[   29.280651]  which belongs to the cache kmalloc-16 of size 16
[   29.280744] The buggy address is located 15 bytes to the right of
[   29.280744]  allocated 16-byte region [fff00000c7ac92a0, fff00000c7ac92b0)
[   29.280821] 
[   29.280840] The buggy address belongs to the physical page:
[   29.280912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9
[   29.280964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.281010] page_type: f5(slab)
[   29.281049] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   29.281112] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.281151] page dumped because: kasan: bad access detected
[   29.281183] 
[   29.281200] Memory state around the buggy address:
[   29.281376]  fff00000c7ac9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.281465]  fff00000c7ac9200: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   29.281562] >fff00000c7ac9280: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   29.281633]                                         ^
[   29.281703]  fff00000c7ac9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.281766]  fff00000c7ac9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.281845] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   29.252367] ==================================================================
[   29.253022] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.255305] Write of size 1 at addr fff00000c59f9773 by task kunit_try_catch/167
[   29.255414] 
[   29.256183] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.256330] Tainted: [N]=TEST
[   29.256362] Hardware name: linux,dummy-virt (DT)
[   29.256621] Call trace:
[   29.256804]  show_stack+0x20/0x38 (C)
[   29.256937]  dump_stack_lvl+0x8c/0xd0
[   29.256992]  print_report+0x118/0x5d0
[   29.257036]  kasan_report+0xdc/0x128
[   29.257093]  __asan_report_store1_noabort+0x20/0x30
[   29.257142]  kmalloc_oob_right+0x5a4/0x660
[   29.257189]  kunit_try_run_case+0x170/0x3f0
[   29.257239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.257291]  kthread+0x328/0x630
[   29.257337]  ret_from_fork+0x10/0x20
[   29.257495] 
[   29.257532] Allocated by task 167:
[   29.257647]  kasan_save_stack+0x3c/0x68
[   29.257710]  kasan_save_track+0x20/0x40
[   29.257746]  kasan_save_alloc_info+0x40/0x58
[   29.257783]  __kasan_kmalloc+0xd4/0xd8
[   29.257818]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.257859]  kmalloc_oob_right+0xb0/0x660
[   29.257896]  kunit_try_run_case+0x170/0x3f0
[   29.257932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.257973]  kthread+0x328/0x630
[   29.258004]  ret_from_fork+0x10/0x20
[   29.258072] 
[   29.258133] The buggy address belongs to the object at fff00000c59f9700
[   29.258133]  which belongs to the cache kmalloc-128 of size 128
[   29.258226] The buggy address is located 0 bytes to the right of
[   29.258226]  allocated 115-byte region [fff00000c59f9700, fff00000c59f9773)
[   29.258291] 
[   29.258374] The buggy address belongs to the physical page:
[   29.258571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9
[   29.258847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.259144] page_type: f5(slab)
[   29.259437] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.259497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.259599] page dumped because: kasan: bad access detected
[   29.259637] 
[   29.259663] Memory state around the buggy address:
[   29.259884]  fff00000c59f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.259948]  fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.260000] >fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.260052]                                                              ^
[   29.260147]  fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.260187]  fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.260247] ==================================================================
[   29.261022] ==================================================================
[   29.261076] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.261125] Write of size 1 at addr fff00000c59f9778 by task kunit_try_catch/167
[   29.261183] 
[   29.261212] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.261292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.261322] Hardware name: linux,dummy-virt (DT)
[   29.261351] Call trace:
[   29.261372]  show_stack+0x20/0x38 (C)
[   29.261434]  dump_stack_lvl+0x8c/0xd0
[   29.261482]  print_report+0x118/0x5d0
[   29.261525]  kasan_report+0xdc/0x128
[   29.261579]  __asan_report_store1_noabort+0x20/0x30
[   29.261637]  kmalloc_oob_right+0x538/0x660
[   29.261683]  kunit_try_run_case+0x170/0x3f0
[   29.261728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.261778]  kthread+0x328/0x630
[   29.261819]  ret_from_fork+0x10/0x20
[   29.261865] 
[   29.261882] Allocated by task 167:
[   29.261908]  kasan_save_stack+0x3c/0x68
[   29.261954]  kasan_save_track+0x20/0x40
[   29.261989]  kasan_save_alloc_info+0x40/0x58
[   29.262025]  __kasan_kmalloc+0xd4/0xd8
[   29.262071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.262110]  kmalloc_oob_right+0xb0/0x660
[   29.262145]  kunit_try_run_case+0x170/0x3f0
[   29.262180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.262220]  kthread+0x328/0x630
[   29.262251]  ret_from_fork+0x10/0x20
[   29.262285] 
[   29.262303] The buggy address belongs to the object at fff00000c59f9700
[   29.262303]  which belongs to the cache kmalloc-128 of size 128
[   29.262356] The buggy address is located 5 bytes to the right of
[   29.262356]  allocated 115-byte region [fff00000c59f9700, fff00000c59f9773)
[   29.262417] 
[   29.262435] The buggy address belongs to the physical page:
[   29.262462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9
[   29.262510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.262554] page_type: f5(slab)
[   29.262591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.262638] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.262676] page dumped because: kasan: bad access detected
[   29.262704] 
[   29.262721] Memory state around the buggy address:
[   29.262749]  fff00000c59f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.262794]  fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.262834] >fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.262870]                                                                 ^
[   29.262907]  fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.262946]  fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.262982] ==================================================================
[   29.263114] ==================================================================
[   29.263165] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.263234] Read of size 1 at addr fff00000c59f9780 by task kunit_try_catch/167
[   29.263342] 
[   29.263369] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.263449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.263475] Hardware name: linux,dummy-virt (DT)
[   29.263503] Call trace:
[   29.263539]  show_stack+0x20/0x38 (C)
[   29.263615]  dump_stack_lvl+0x8c/0xd0
[   29.263684]  print_report+0x118/0x5d0
[   29.263728]  kasan_report+0xdc/0x128
[   29.263807]  __asan_report_load1_noabort+0x20/0x30
[   29.263878]  kmalloc_oob_right+0x5d0/0x660
[   29.263944]  kunit_try_run_case+0x170/0x3f0
[   29.263999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.264089]  kthread+0x328/0x630
[   29.264132]  ret_from_fork+0x10/0x20
[   29.264436] 
[   29.264467] Allocated by task 167:
[   29.264503]  kasan_save_stack+0x3c/0x68
[   29.264540]  kasan_save_track+0x20/0x40
[   29.264580]  kasan_save_alloc_info+0x40/0x58
[   29.264617]  __kasan_kmalloc+0xd4/0xd8
[   29.264650]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.264688]  kmalloc_oob_right+0xb0/0x660
[   29.264725]  kunit_try_run_case+0x170/0x3f0
[   29.264760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.264859]  kthread+0x328/0x630
[   29.264931]  ret_from_fork+0x10/0x20
[   29.264982] 
[   29.265000] The buggy address belongs to the object at fff00000c59f9700
[   29.265000]  which belongs to the cache kmalloc-128 of size 128
[   29.265110] The buggy address is located 13 bytes to the right of
[   29.265110]  allocated 115-byte region [fff00000c59f9700, fff00000c59f9773)
[   29.265212] 
[   29.265258] The buggy address belongs to the physical page:
[   29.265286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9
[   29.265596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.265707] page_type: f5(slab)
[   29.265756] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.265826] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.265901] page dumped because: kasan: bad access detected
[   29.265968] 
[   29.266018] Memory state around the buggy address:
[   29.266124]  fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266198]  fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.266239] >fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266542]                    ^
[   29.266596]  fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.266653]  fff00000c59f9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266717] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  112.176339] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689
[  112.177347] Modules linked in:
[  112.177617] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[  112.178376] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  112.178748] Hardware name: linux,dummy-virt (DT)
[  112.179087] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  112.179414] pc : intlog10+0x38/0x48
[  112.179591] lr : intlog10_test+0xe4/0x200
[  112.179817] sp : ffff8000824a7c10
[  112.180025] x29: ffff8000824a7c90 x28: 0000000000000000 x27: 0000000000000000
[  112.180523] x26: 1ffe00001902be81 x25: 0000000000000000 x24: ffff8000824a7ce0
[  112.180974] x23: ffff8000824a7d00 x22: 0000000000000000 x21: 1ffff00010494f82
[  112.181416] x20: ffffad48b6241d20 x19: ffff800080087990 x18: 00000000a5feda8c
[  112.181881] x17: 000000004dbfd588 x16: fff00000c642583c x15: 00000000ba16e7d6
[  112.182351] x14: 000000007497e445 x13: 1ffe00001b48dddd x12: ffff75a917428b89
[  112.182755] x11: 1ffff5a917428b88 x10: ffff75a917428b88 x9 : ffffad48b38559fc
[  112.183134] x8 : ffffad48ba145c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  112.183570] x5 : ffff700010494f82 x4 : 1ffff00010010f3b x3 : 1ffff5a916c483a4
[  112.183944] x2 : 1ffff5a916c483a4 x1 : 0000000000000003 x0 : 0000000000000000
[  112.184351] Call trace:
[  112.184552]  intlog10+0x38/0x48 (P)
[  112.184791]  kunit_try_run_case+0x170/0x3f0
[  112.185051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.185382]  kthread+0x328/0x630
[  112.185558]  ret_from_fork+0x10/0x20
[  112.185788] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  112.128789] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/671
[  112.132709] Modules linked in:
[  112.133349] CPU: 0 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[  112.134743] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  112.135518] Hardware name: linux,dummy-virt (DT)
[  112.136195] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  112.136880] pc : intlog2+0xd8/0xf8
[  112.137285] lr : intlog2_test+0xe4/0x200
[  112.137841] sp : ffff8000823d7c10
[  112.138157] x29: ffff8000823d7c90 x28: 0000000000000000 x27: 0000000000000000
[  112.138516] x26: 1ffe0000190c8241 x25: 0000000000000000 x24: ffff8000823d7ce0
[  112.138873] x23: ffff8000823d7d00 x22: 0000000000000000 x21: 1ffff0001047af82
[  112.139264] x20: ffffad48b6241c20 x19: ffff800080087990 x18: 000000004004657d
[  112.139682] x17: 0000000030df212a x16: fff00000c642583c x15: fff00000ff616b48
[  112.140132] x14: 0000000000018fff x13: 1ffe00001b48dddd x12: ffff75a917428b89
[  112.140556] x11: 1ffff5a917428b88 x10: ffff75a917428b88 x9 : ffffad48b3855bfc
[  112.140943] x8 : ffffad48ba145c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  112.141402] x5 : ffff70001047af82 x4 : 1ffff00010010f3b x3 : 1ffff5a916c48384
[  112.141828] x2 : 1ffff5a916c48384 x1 : 0000000000000003 x0 : 0000000000000000
[  112.142250] Call trace:
[  112.142419]  intlog2+0xd8/0xf8 (P)
[  112.142637]  kunit_try_run_case+0x170/0x3f0
[  112.142887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.143217]  kthread+0x328/0x630
[  112.143405]  ret_from_fork+0x10/0x20
[  112.143667] ---[ end trace 0000000000000000 ]---