Hay
Date
July 18, 2025, 1:09 p.m.
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure Automatically assigned
[   33.714818] ==================================================================
[   33.715014] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.715185] Free of addr fff00000c3fedd01 by task kunit_try_catch/272
[   33.715235] 
[   33.715266] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.715350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.715601] Hardware name: linux,dummy-virt (DT)
[   33.715656] Call trace:
[   33.715934]  show_stack+0x20/0x38 (C)
[   33.716026]  dump_stack_lvl+0x8c/0xd0
[   33.716147]  print_report+0x118/0x5e8
[   33.716234]  kasan_report_invalid_free+0xc0/0xe8
[   33.716311]  check_slab_allocation+0xfc/0x108
[   33.716610]  __kasan_mempool_poison_object+0x78/0x150
[   33.716782]  mempool_free+0x28c/0x328
[   33.716890]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.717263]  mempool_kmalloc_invalid_free+0xc0/0x118
[   33.717375]  kunit_try_run_case+0x170/0x3f0
[   33.717481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.717607]  kthread+0x328/0x630
[   33.717795]  ret_from_fork+0x10/0x20
[   33.718025] 
[   33.718114] Allocated by task 272:
[   33.718181]  kasan_save_stack+0x3c/0x68
[   33.718250]  kasan_save_track+0x20/0x40
[   33.718285]  kasan_save_alloc_info+0x40/0x58
[   33.718661]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.718754]  remove_element+0x130/0x1f8
[   33.718894]  mempool_alloc_preallocated+0x58/0xc0
[   33.718943]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   33.719269]  mempool_kmalloc_invalid_free+0xc0/0x118
[   33.719322]  kunit_try_run_case+0x170/0x3f0
[   33.719358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.719402]  kthread+0x328/0x630
[   33.719434]  ret_from_fork+0x10/0x20
[   33.719470] 
[   33.719489] The buggy address belongs to the object at fff00000c3fedd00
[   33.719489]  which belongs to the cache kmalloc-128 of size 128
[   33.719583] The buggy address is located 1 bytes inside of
[   33.719583]  128-byte region [fff00000c3fedd00, fff00000c3fedd80)
[   33.719643] 
[   33.719662] The buggy address belongs to the physical page:
[   33.719704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fed
[   33.720179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.720246] page_type: f5(slab)
[   33.720432] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.720531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.720884] page dumped because: kasan: bad access detected
[   33.721182] 
[   33.721225] Memory state around the buggy address:
[   33.721261]  fff00000c3fedc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.721507]  fff00000c3fedc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.721656] >fff00000c3fedd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.721751]                    ^
[   33.721864]  fff00000c3fedd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.722247]  fff00000c3fede00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.722333] ==================================================================
[   33.727634] ==================================================================
[   33.728153] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.728387] Free of addr fff00000c9bb8001 by task kunit_try_catch/274
[   33.728460] 
[   33.728500] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.728583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.728609] Hardware name: linux,dummy-virt (DT)
[   33.728641] Call trace:
[   33.728662]  show_stack+0x20/0x38 (C)
[   33.728713]  dump_stack_lvl+0x8c/0xd0
[   33.728759]  print_report+0x118/0x5e8
[   33.728801]  kasan_report_invalid_free+0xc0/0xe8
[   33.729164]  __kasan_mempool_poison_object+0xfc/0x150
[   33.729262]  mempool_free+0x28c/0x328
[   33.729397]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.729554]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   33.729726]  kunit_try_run_case+0x170/0x3f0
[   33.729778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.730126]  kthread+0x328/0x630
[   33.730292]  ret_from_fork+0x10/0x20
[   33.730476] 
[   33.730525] The buggy address belongs to the physical page:
[   33.730577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb8
[   33.730933] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.731010] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.731420] page_type: f8(unknown)
[   33.731513] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.731583] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.731950] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.732035] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.732179] head: 0bfffe0000000002 ffffc1ffc326ee01 00000000ffffffff 00000000ffffffff
[   33.732275] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.732388] page dumped because: kasan: bad access detected
[   33.732449] 
[   33.732504] Memory state around the buggy address:
[   33.732535]  fff00000c9bb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.732579]  fff00000c9bb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.732622] >fff00000c9bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.732912]                    ^
[   33.733076]  fff00000c9bb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.733151]  fff00000c9bb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.733266] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure Automatically assigned
[   31.466056] ==================================================================
[   31.466137] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   31.466219] Read of size 1 at addr fff00000c8f61e00 by task kunit_try_catch/195
[   31.466268] 
[   31.466298] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.466379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.466421] Hardware name: linux,dummy-virt (DT)
[   31.466451] Call trace:
[   31.466478]  show_stack+0x20/0x38 (C)
[   31.466526]  dump_stack_lvl+0x8c/0xd0
[   31.466571]  print_report+0x118/0x5e8
[   31.466613]  kasan_report+0xdc/0x128
[   31.466663]  __kasan_check_byte+0x54/0x70
[   31.466706]  krealloc_noprof+0x44/0x360
[   31.466752]  krealloc_uaf+0x180/0x520
[   31.466795]  kunit_try_run_case+0x170/0x3f0
[   31.466838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.466887]  kthread+0x328/0x630
[   31.466926]  ret_from_fork+0x10/0x20
[   31.466971] 
[   31.466989] Allocated by task 195:
[   31.467025]  kasan_save_stack+0x3c/0x68
[   31.467063]  kasan_save_track+0x20/0x40
[   31.467107]  kasan_save_alloc_info+0x40/0x58
[   31.467143]  __kasan_kmalloc+0xd4/0xd8
[   31.467176]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.467216]  krealloc_uaf+0xc8/0x520
[   31.467261]  kunit_try_run_case+0x170/0x3f0
[   31.467306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.467347]  kthread+0x328/0x630
[   31.467378]  ret_from_fork+0x10/0x20
[   31.467413] 
[   31.467451] Freed by task 195:
[   31.467497]  kasan_save_stack+0x3c/0x68
[   31.467534]  kasan_save_track+0x20/0x40
[   31.467569]  kasan_save_free_info+0x4c/0x78
[   31.467605]  __kasan_slab_free+0x6c/0x98
[   31.467640]  kfree+0x214/0x3c8
[   31.467674]  krealloc_uaf+0x12c/0x520
[   31.467710]  kunit_try_run_case+0x170/0x3f0
[   31.468629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.468701]  kthread+0x328/0x630
[   31.468757]  ret_from_fork+0x10/0x20
[   31.468821] 
[   31.468905] The buggy address belongs to the object at fff00000c8f61e00
[   31.468905]  which belongs to the cache kmalloc-256 of size 256
[   31.469051] The buggy address is located 0 bytes inside of
[   31.469051]  freed 256-byte region [fff00000c8f61e00, fff00000c8f61f00)
[   31.469340] 
[   31.469497] The buggy address belongs to the physical page:
[   31.469730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.469848] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.469926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.470175] page_type: f5(slab)
[   31.470310] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.470515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.470610] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.470982] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.471073] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.471200] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.471243] page dumped because: kasan: bad access detected
[   31.471273] 
[   31.471438] Memory state around the buggy address:
[   31.471510]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.471566]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.471825] >fff00000c8f61e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.471897]                    ^
[   31.471956]  fff00000c8f61e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.472003]  fff00000c8f61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.472039] ==================================================================
[   31.473884] ==================================================================
[   31.474348] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   31.474718] Read of size 1 at addr fff00000c8f61e00 by task kunit_try_catch/195
[   31.474824] 
[   31.474886] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.474977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.475003] Hardware name: linux,dummy-virt (DT)
[   31.475319] Call trace:
[   31.475389]  show_stack+0x20/0x38 (C)
[   31.475602]  dump_stack_lvl+0x8c/0xd0
[   31.475665]  print_report+0x118/0x5e8
[   31.475709]  kasan_report+0xdc/0x128
[   31.475930]  __asan_report_load1_noabort+0x20/0x30
[   31.476040]  krealloc_uaf+0x4c8/0x520
[   31.476374]  kunit_try_run_case+0x170/0x3f0
[   31.476590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.476710]  kthread+0x328/0x630
[   31.476895]  ret_from_fork+0x10/0x20
[   31.477021] 
[   31.477040] Allocated by task 195:
[   31.477088]  kasan_save_stack+0x3c/0x68
[   31.477144]  kasan_save_track+0x20/0x40
[   31.477354]  kasan_save_alloc_info+0x40/0x58
[   31.477520]  __kasan_kmalloc+0xd4/0xd8
[   31.477706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.477782]  krealloc_uaf+0xc8/0x520
[   31.477998]  kunit_try_run_case+0x170/0x3f0
[   31.478219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.478313]  kthread+0x328/0x630
[   31.478346]  ret_from_fork+0x10/0x20
[   31.478529] 
[   31.478685] Freed by task 195:
[   31.478826]  kasan_save_stack+0x3c/0x68
[   31.478925]  kasan_save_track+0x20/0x40
[   31.479030]  kasan_save_free_info+0x4c/0x78
[   31.479228]  __kasan_slab_free+0x6c/0x98
[   31.479365]  kfree+0x214/0x3c8
[   31.479651]  krealloc_uaf+0x12c/0x520
[   31.479746]  kunit_try_run_case+0x170/0x3f0
[   31.479925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.480010]  kthread+0x328/0x630
[   31.480043]  ret_from_fork+0x10/0x20
[   31.480092] 
[   31.480111] The buggy address belongs to the object at fff00000c8f61e00
[   31.480111]  which belongs to the cache kmalloc-256 of size 256
[   31.480350] The buggy address is located 0 bytes inside of
[   31.480350]  freed 256-byte region [fff00000c8f61e00, fff00000c8f61f00)
[   31.480530] 
[   31.480787] The buggy address belongs to the physical page:
[   31.481151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.481222] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.481501] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.481681] page_type: f5(slab)
[   31.481831] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.481917] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.482040] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.482118] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.482332] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.482596] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.482748] page dumped because: kasan: bad access detected
[   31.482834] 
[   31.483161] Memory state around the buggy address:
[   31.483279]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.483360]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.483449] >fff00000c8f61e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.483572]                    ^
[   31.483640]  fff00000c8f61e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.483687]  fff00000c8f61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.483921] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure Automatically assigned
[   34.252988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   34.116780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   34.122380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   34.086385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure Automatically assigned
[   33.993553] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   33.958452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[  110.021932] Internal error: Oops: 0000000096000005 [#1]  SMP
[  110.031028] Modules linked in:
[  110.031750] CPU: 0 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[  110.033432] Tainted: [B]=BAD_PAGE, [N]=TEST
[  110.033992] Hardware name: linux,dummy-virt (DT)
[  110.034813] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  110.035546] pc : kunit_test_null_dereference+0x70/0x170
[  110.036214] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.036657] sp : ffff800081ff7d30
[  110.037169] x29: ffff800081ff7d90 x28: 0000000000000000 x27: 0000000000000000
[  110.037682] x26: 1ffe0000193a7cc1 x25: 0000000000000000 x24: 0000000000000004
[  110.038033] x23: fff00000c9d3e60c x22: ffffa0dedf444410 x21: fff00000c0b1de88
[  110.038841] x20: 1ffff000103fefa6 x19: ffff800080087990 x18: 00000000450bebd9
[  110.039613] x17: 0000000000000001 x16: fff00000c612a83c x15: fff00000ff616b48
[  110.040513] x14: 0000000000018fff x13: 1ffe00001b48dfdd x12: fffd80001916e62c
[  110.041402] x11: 1ffe00001916e62b x10: fffd80001916e62b x9 : ffffa0dedf43bb98
[  110.042205] x8 : ffff800081ff7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  110.042663] x5 : ffff7000103fefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  110.043003] x2 : dfff800000000000 x1 : fff00000c8b72880 x0 : ffff800080087990
[  110.043780] Call trace:
[  110.044153]  kunit_test_null_dereference+0x70/0x170 (P)
[  110.044860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.045459]  kthread+0x328/0x630
[  110.045876]  ret_from_fork+0x10/0x20
[  110.046519] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  110.047455] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure Automatically assigned
[   64.908807] ==================================================================
[   64.908880] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   64.908880] 
[   64.908965] Use-after-free read at 0x00000000a4e5f289 (in kfence-#182):
[   64.909018]  test_krealloc+0x51c/0x830
[   64.909061]  kunit_try_run_case+0x170/0x3f0
[   64.909123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.909167]  kthread+0x328/0x630
[   64.909207]  ret_from_fork+0x10/0x20
[   64.909248] 
[   64.909273] kfence-#182: 0x00000000a4e5f289-0x000000000a8f2520, size=32, cache=kmalloc-32
[   64.909273] 
[   64.909327] allocated by task 368 on cpu 0 at 64.908191s (0.001133s ago):
[   64.909398]  test_alloc+0x29c/0x628
[   64.909435]  test_krealloc+0xc0/0x830
[   64.909472]  kunit_try_run_case+0x170/0x3f0
[   64.909512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.909554]  kthread+0x328/0x630
[   64.909589]  ret_from_fork+0x10/0x20
[   64.909626] 
[   64.909651] freed by task 368 on cpu 0 at 64.908419s (0.001228s ago):
[   64.909711]  krealloc_noprof+0x148/0x360
[   64.909751]  test_krealloc+0x1dc/0x830
[   64.909789]  kunit_try_run_case+0x170/0x3f0
[   64.909827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.909869]  kthread+0x328/0x630
[   64.909904]  ret_from_fork+0x10/0x20
[   64.909943] 
[   64.909984] CPU: 0 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   64.910069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.910108] Hardware name: linux,dummy-virt (DT)
[   64.910142] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure Automatically assigned
[   64.824245] ==================================================================
[   64.824340] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   64.824340] 
[   64.824435] Use-after-free read at 0x00000000f503c37f (in kfence-#181):
[   64.824489]  test_memcache_typesafe_by_rcu+0x280/0x560
[   64.824535]  kunit_try_run_case+0x170/0x3f0
[   64.824580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.824626]  kthread+0x328/0x630
[   64.824665]  ret_from_fork+0x10/0x20
[   64.824706] 
[   64.824730] kfence-#181: 0x00000000f503c37f-0x000000001f067b0c, size=32, cache=test
[   64.824730] 
[   64.824781] allocated by task 366 on cpu 1 at 64.812125s (0.012652s ago):
[   64.824852]  test_alloc+0x230/0x628
[   64.824890]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   64.824930]  kunit_try_run_case+0x170/0x3f0
[   64.824968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.825010]  kthread+0x328/0x630
[   64.825045]  ret_from_fork+0x10/0x20
[   64.825098] 
[   64.825121] freed by task 366 on cpu 1 at 64.812243s (0.012875s ago):
[   64.825179]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   64.825220]  kunit_try_run_case+0x170/0x3f0
[   64.825257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.825299]  kthread+0x328/0x630
[   64.825334]  ret_from_fork+0x10/0x20
[   64.825374] 
[   64.825419] CPU: 1 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   64.825497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.825527] Hardware name: linux,dummy-virt (DT)
[   64.825564] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure Automatically assigned
[   41.531625] ==================================================================
[   41.531768] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   41.531768] 
[   41.531860] Invalid read at 0x00000000f669ee15:
[   41.532263]  test_invalid_access+0xdc/0x1f0
[   41.532389]  kunit_try_run_case+0x170/0x3f0
[   41.532441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.532510]  kthread+0x328/0x630
[   41.532556]  ret_from_fork+0x10/0x20
[   41.532609] 
[   41.532656] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   41.532757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.532838] Hardware name: linux,dummy-virt (DT)
[   41.532878] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure Automatically assigned
[   35.580483] ==================================================================
[   35.580561] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   35.580561] 
[   35.580641] Out-of-bounds write at 0x00000000baea91f5 (1B left of kfence-#122):
[   35.580853]  test_out_of_bounds_write+0x100/0x240
[   35.580916]  kunit_try_run_case+0x170/0x3f0
[   35.580962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.581011]  kthread+0x328/0x630
[   35.581068]  ret_from_fork+0x10/0x20
[   35.581142] 
[   35.581168] kfence-#122: 0x000000003d53ce57-0x000000002cd07b53, size=32, cache=kmalloc-32
[   35.581168] 
[   35.581219] allocated by task 322 on cpu 0 at 35.580327s (0.000889s ago):
[   35.581450]  test_alloc+0x29c/0x628
[   35.581544]  test_out_of_bounds_write+0xc8/0x240
[   35.581624]  kunit_try_run_case+0x170/0x3f0
[   35.581678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.581738]  kthread+0x328/0x630
[   35.581795]  ret_from_fork+0x10/0x20
[   35.581851] 
[   35.581901] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   35.582111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.582156] Hardware name: linux,dummy-virt (DT)
[   35.582191] ==================================================================
[   35.788652] ==================================================================
[   35.788768] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   35.788768] 
[   35.788864] Out-of-bounds write at 0x00000000fa3750a1 (1B left of kfence-#124):
[   35.788939]  test_out_of_bounds_write+0x100/0x240
[   35.788991]  kunit_try_run_case+0x170/0x3f0
[   35.789053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.789116]  kthread+0x328/0x630
[   35.789157]  ret_from_fork+0x10/0x20
[   35.789203] 
[   35.789228] kfence-#124: 0x000000004ad2eafa-0x00000000b9372008, size=32, cache=test
[   35.789228] 
[   35.789551] allocated by task 324 on cpu 0 at 35.788568s (0.000957s ago):
[   35.789638]  test_alloc+0x230/0x628
[   35.789691]  test_out_of_bounds_write+0xc8/0x240
[   35.789771]  kunit_try_run_case+0x170/0x3f0
[   35.789860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.789903]  kthread+0x328/0x630
[   35.789964]  ret_from_fork+0x10/0x20
[   35.790003] 
[   35.790052] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   35.790144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.790172] Hardware name: linux,dummy-virt (DT)
[   35.790331] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure Automatically assigned
[   41.300417] ==================================================================
[   41.300502] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.300502] 
[   41.300561] Corrupted memory at 0x00000000ac1a6f84 [ ! . . . . . . . . . . . . . . . ] (in kfence-#177):
[   41.300868]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.300914]  kunit_try_run_case+0x170/0x3f0
[   41.300956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.300999]  kthread+0x328/0x630
[   41.301036]  ret_from_fork+0x10/0x20
[   41.301091] 
[   41.301116] kfence-#177: 0x0000000082fb8f60-0x000000008012127b, size=73, cache=kmalloc-96
[   41.301116] 
[   41.301170] allocated by task 356 on cpu 0 at 41.300141s (0.001026s ago):
[   41.301233]  test_alloc+0x29c/0x628
[   41.301270]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   41.301312]  kunit_try_run_case+0x170/0x3f0
[   41.301350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.301393]  kthread+0x328/0x630
[   41.301429]  ret_from_fork+0x10/0x20
[   41.301468] 
[   41.301492] freed by task 356 on cpu 0 at 41.300330s (0.001158s ago):
[   41.301556]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.301597]  kunit_try_run_case+0x170/0x3f0
[   41.301636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.301679]  kthread+0x328/0x630
[   41.301716]  ret_from_fork+0x10/0x20
[   41.301755] 
[   41.301795] CPU: 0 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   41.301878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.301907] Hardware name: linux,dummy-virt (DT)
[   41.301940] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure Automatically assigned
[   41.196406] ==================================================================
[   41.196502] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   41.196502] 
[   41.196598] Out-of-bounds read at 0x000000007685b912 (105B right of kfence-#176):
[   41.196659]  test_kmalloc_aligned_oob_read+0x238/0x468
[   41.196707]  kunit_try_run_case+0x170/0x3f0
[   41.196751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.196794]  kthread+0x328/0x630
[   41.196832]  ret_from_fork+0x10/0x20
[   41.196874] 
[   41.196899] kfence-#176: 0x000000002d0fd72d-0x0000000069fbfcc2, size=73, cache=kmalloc-96
[   41.196899] 
[   41.196953] allocated by task 354 on cpu 0 at 41.196140s (0.000809s ago):
[   41.197023]  test_alloc+0x29c/0x628
[   41.197062]  test_kmalloc_aligned_oob_read+0x100/0x468
[   41.197116]  kunit_try_run_case+0x170/0x3f0
[   41.197156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.197199]  kthread+0x328/0x630
[   41.197236]  ret_from_fork+0x10/0x20
[   41.197274] 
[   41.197319] CPU: 0 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   41.197401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.197430] Hardware name: linux,dummy-virt (DT)
[   41.197465] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure Automatically assigned
[   37.452287] ==================================================================
[   37.452384] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   37.452384] 
[   37.452446] Corrupted memory at 0x000000002eedd708 [ ! . . . . . . . . . . . . . . . ] (in kfence-#140):
[   37.452751]  test_corruption+0x120/0x378
[   37.452795]  kunit_try_run_case+0x170/0x3f0
[   37.452839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.452883]  kthread+0x328/0x630
[   37.452923]  ret_from_fork+0x10/0x20
[   37.452964] 
[   37.452988] kfence-#140: 0x000000000a151139-0x00000000c2e079b5, size=32, cache=test
[   37.452988] 
[   37.453044] allocated by task 344 on cpu 1 at 37.452140s (0.000900s ago):
[   37.453119]  test_alloc+0x230/0x628
[   37.453157]  test_corruption+0xdc/0x378
[   37.453196]  kunit_try_run_case+0x170/0x3f0
[   37.453235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.453276]  kthread+0x328/0x630
[   37.453313]  ret_from_fork+0x10/0x20
[   37.453351] 
[   37.453376] freed by task 344 on cpu 1 at 37.452197s (0.001175s ago):
[   37.453439]  test_corruption+0x120/0x378
[   37.453475]  kunit_try_run_case+0x170/0x3f0
[   37.453514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.453556]  kthread+0x328/0x630
[   37.453591]  ret_from_fork+0x10/0x20
[   37.453631] 
[   37.453674] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   37.453752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.453781] Hardware name: linux,dummy-virt (DT)
[   37.453814] ==================================================================
[   37.140486] ==================================================================
[   37.140584] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   37.140584] 
[   37.140644] Corrupted memory at 0x0000000073e72840 [ ! ] (in kfence-#137):
[   37.140773]  test_corruption+0x284/0x378
[   37.140818]  kunit_try_run_case+0x170/0x3f0
[   37.140861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.140905]  kthread+0x328/0x630
[   37.140942]  ret_from_fork+0x10/0x20
[   37.140982] 
[   37.141007] kfence-#137: 0x00000000df8bbe75-0x00000000f8a5531c, size=32, cache=kmalloc-32
[   37.141007] 
[   37.141061] allocated by task 342 on cpu 1 at 37.140208s (0.000849s ago):
[   37.141137]  test_alloc+0x29c/0x628
[   37.141174]  test_corruption+0x198/0x378
[   37.141212]  kunit_try_run_case+0x170/0x3f0
[   37.141250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.141293]  kthread+0x328/0x630
[   37.141329]  ret_from_fork+0x10/0x20
[   37.141369] 
[   37.141392] freed by task 342 on cpu 1 at 37.140312s (0.001077s ago):
[   37.141453]  test_corruption+0x284/0x378
[   37.141491]  kunit_try_run_case+0x170/0x3f0
[   37.141530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.141572]  kthread+0x328/0x630
[   37.141609]  ret_from_fork+0x10/0x20
[   37.141647] 
[   37.141690] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   37.141769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.141799] Hardware name: linux,dummy-virt (DT)
[   37.141831] ==================================================================
[   36.828478] ==================================================================
[   36.828588] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   36.828588] 
[   36.828654] Corrupted memory at 0x0000000059eaede2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#134):
[   36.829111]  test_corruption+0x278/0x378
[   36.829162]  kunit_try_run_case+0x170/0x3f0
[   36.829207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.829251]  kthread+0x328/0x630
[   36.829292]  ret_from_fork+0x10/0x20
[   36.829332] 
[   36.829356] kfence-#134: 0x0000000099b9a0d7-0x00000000ec63ed5e, size=32, cache=kmalloc-32
[   36.829356] 
[   36.829412] allocated by task 342 on cpu 1 at 36.828195s (0.001213s ago):
[   36.829475]  test_alloc+0x29c/0x628
[   36.829514]  test_corruption+0xdc/0x378
[   36.829551]  kunit_try_run_case+0x170/0x3f0
[   36.829590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.829632]  kthread+0x328/0x630
[   36.829669]  ret_from_fork+0x10/0x20
[   36.829707] 
[   36.829730] freed by task 342 on cpu 1 at 36.828297s (0.001429s ago):
[   36.829791]  test_corruption+0x278/0x378
[   36.829827]  kunit_try_run_case+0x170/0x3f0
[   36.829864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.829907]  kthread+0x328/0x630
[   36.829941]  ret_from_fork+0x10/0x20
[   36.829981] 
[   36.830031] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   36.830119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.830150] Hardware name: linux,dummy-virt (DT)
[   36.830183] ==================================================================
[   37.556305] ==================================================================
[   37.556393] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   37.556393] 
[   37.556452] Corrupted memory at 0x00000000c2c25773 [ ! ] (in kfence-#141):
[   37.556563]  test_corruption+0x1d8/0x378
[   37.556606]  kunit_try_run_case+0x170/0x3f0
[   37.556646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.556690]  kthread+0x328/0x630
[   37.556728]  ret_from_fork+0x10/0x20
[   37.556769] 
[   37.556792] kfence-#141: 0x00000000d76d3239-0x00000000c2b98ad6, size=32, cache=test
[   37.556792] 
[   37.556845] allocated by task 344 on cpu 1 at 37.556165s (0.000676s ago):
[   37.556908]  test_alloc+0x230/0x628
[   37.556947]  test_corruption+0x198/0x378
[   37.556985]  kunit_try_run_case+0x170/0x3f0
[   37.557025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.557068]  kthread+0x328/0x630
[   37.557117]  ret_from_fork+0x10/0x20
[   37.557156] 
[   37.557179] freed by task 344 on cpu 1 at 37.556223s (0.000953s ago):
[   37.557242]  test_corruption+0x1d8/0x378
[   37.557280]  kunit_try_run_case+0x170/0x3f0
[   37.557319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.557362]  kthread+0x328/0x630
[   37.557398]  ret_from_fork+0x10/0x20
[   37.557437] 
[   37.557480] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   37.557558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.557587] Hardware name: linux,dummy-virt (DT)
[   37.557621] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure Automatically assigned
[   36.620306] ==================================================================
[   36.620397] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   36.620397] 
[   36.620456] Invalid free of 0x00000000c2baa3a2 (in kfence-#132):
[   36.620509]  test_invalid_addr_free+0xec/0x238
[   36.620553]  kunit_try_run_case+0x170/0x3f0
[   36.620593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.620636]  kthread+0x328/0x630
[   36.620674]  ret_from_fork+0x10/0x20
[   36.620714] 
[   36.620737] kfence-#132: 0x00000000957a8944-0x0000000001b3a575, size=32, cache=test
[   36.620737] 
[   36.620788] allocated by task 340 on cpu 1 at 36.620188s (0.000597s ago):
[   36.620850]  test_alloc+0x230/0x628
[   36.620890]  test_invalid_addr_free+0xd4/0x238
[   36.620927]  kunit_try_run_case+0x170/0x3f0
[   36.620967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.621009]  kthread+0x328/0x630
[   36.621044]  ret_from_fork+0x10/0x20
[   36.621097] 
[   36.621138] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   36.621216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.621245] Hardware name: linux,dummy-virt (DT)
[   36.621277] ==================================================================
[   36.516228] ==================================================================
[   36.516306] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   36.516306] 
[   36.516367] Invalid free of 0x000000009d499f19 (in kfence-#131):
[   36.516421]  test_invalid_addr_free+0x1ac/0x238
[   36.516466]  kunit_try_run_case+0x170/0x3f0
[   36.516510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.516553]  kthread+0x328/0x630
[   36.516593]  ret_from_fork+0x10/0x20
[   36.516633] 
[   36.516656] kfence-#131: 0x0000000035c139a3-0x00000000ffbecc92, size=32, cache=kmalloc-32
[   36.516656] 
[   36.516711] allocated by task 338 on cpu 1 at 36.516091s (0.000615s ago):
[   36.516774]  test_alloc+0x29c/0x628
[   36.516812]  test_invalid_addr_free+0xd4/0x238
[   36.516851]  kunit_try_run_case+0x170/0x3f0
[   36.516890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.516933]  kthread+0x328/0x630
[   36.516968]  ret_from_fork+0x10/0x20
[   36.517006] 
[   36.517049] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   36.517143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.517173] Hardware name: linux,dummy-virt (DT)
[   36.517207] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure Automatically assigned
[   36.413895] ==================================================================
[   36.413969] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   36.413969] 
[   36.414337] Invalid free of 0x000000003d0a2e56 (in kfence-#130):
[   36.414408]  test_double_free+0x100/0x238
[   36.414455]  kunit_try_run_case+0x170/0x3f0
[   36.414497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.414869]  kthread+0x328/0x630
[   36.414943]  ret_from_fork+0x10/0x20
[   36.415272] 
[   36.415334] kfence-#130: 0x000000003d0a2e56-0x0000000096db33f3, size=32, cache=test
[   36.415334] 
[   36.415656] allocated by task 336 on cpu 0 at 36.413355s (0.002291s ago):
[   36.415736]  test_alloc+0x230/0x628
[   36.415823]  test_double_free+0xd4/0x238
[   36.415921]  kunit_try_run_case+0x170/0x3f0
[   36.416095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.416182]  kthread+0x328/0x630
[   36.416336]  ret_from_fork+0x10/0x20
[   36.416424] 
[   36.416884] freed by task 336 on cpu 0 at 36.413689s (0.003178s ago):
[   36.417009]  test_double_free+0xf0/0x238
[   36.417148]  kunit_try_run_case+0x170/0x3f0
[   36.417269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.417345]  kthread+0x328/0x630
[   36.417382]  ret_from_fork+0x10/0x20
[   36.417422] 
[   36.417491] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   36.417596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.417635] Hardware name: linux,dummy-virt (DT)
[   36.417669] ==================================================================
[   36.310140] ==================================================================
[   36.310285] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   36.310285] 
[   36.310687] Invalid free of 0x00000000581294d8 (in kfence-#129):
[   36.310779]  test_double_free+0x1bc/0x238
[   36.311135]  kunit_try_run_case+0x170/0x3f0
[   36.311227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.311343]  kthread+0x328/0x630
[   36.311388]  ret_from_fork+0x10/0x20
[   36.311435] 
[   36.311462] kfence-#129: 0x00000000581294d8-0x00000000e27e5dc3, size=32, cache=kmalloc-32
[   36.311462] 
[   36.311681] allocated by task 334 on cpu 0 at 36.309434s (0.002087s ago):
[   36.311877]  test_alloc+0x29c/0x628
[   36.311964]  test_double_free+0xd4/0x238
[   36.312005]  kunit_try_run_case+0x170/0x3f0
[   36.312382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.312503]  kthread+0x328/0x630
[   36.312591]  ret_from_fork+0x10/0x20
[   36.312645] 
[   36.312890] freed by task 334 on cpu 0 at 36.309515s (0.003161s ago):
[   36.313214]  test_double_free+0x1ac/0x238
[   36.313339]  kunit_try_run_case+0x170/0x3f0
[   36.313417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.313554]  kthread+0x328/0x630
[   36.313632]  ret_from_fork+0x10/0x20
[   36.313796] 
[   36.313883] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   36.314061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.314304] Hardware name: linux,dummy-virt (DT)
[   36.314403] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure Automatically assigned
[   35.997205] ==================================================================
[   35.997318] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   35.997318] 
[   35.997400] Use-after-free read at 0x0000000089c33237 (in kfence-#126):
[   35.997521]  test_use_after_free_read+0x114/0x248
[   35.997572]  kunit_try_run_case+0x170/0x3f0
[   35.997614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.997939]  kthread+0x328/0x630
[   35.998009]  ret_from_fork+0x10/0x20
[   35.998067] 
[   35.998104] kfence-#126: 0x0000000089c33237-0x0000000003f57add, size=32, cache=test
[   35.998104] 
[   35.998155] allocated by task 328 on cpu 0 at 35.996730s (0.001421s ago):
[   35.998692]  test_alloc+0x230/0x628
[   35.998783]  test_use_after_free_read+0xd0/0x248
[   35.998829]  kunit_try_run_case+0x170/0x3f0
[   35.998928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.998973]  kthread+0x328/0x630
[   35.999009]  ret_from_fork+0x10/0x20
[   35.999218] 
[   35.999356] freed by task 328 on cpu 0 at 35.997061s (0.002287s ago):
[   35.999537]  test_use_after_free_read+0xf0/0x248
[   35.999604]  kunit_try_run_case+0x170/0x3f0
[   35.999650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.999750]  kthread+0x328/0x630
[   35.999787]  ret_from_fork+0x10/0x20
[   35.999920] 
[   36.000322] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   36.000475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.000600] Hardware name: linux,dummy-virt (DT)
[   36.000687] ==================================================================
[   35.893576] ==================================================================
[   35.893909] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   35.893909] 
[   35.894308] Use-after-free read at 0x0000000017f7fd76 (in kfence-#125):
[   35.894431]  test_use_after_free_read+0x114/0x248
[   35.894485]  kunit_try_run_case+0x170/0x3f0
[   35.894543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.894722]  kthread+0x328/0x630
[   35.894766]  ret_from_fork+0x10/0x20
[   35.895040] 
[   35.895093] kfence-#125: 0x0000000017f7fd76-0x0000000018bd24b1, size=32, cache=kmalloc-32
[   35.895093] 
[   35.895168] allocated by task 326 on cpu 0 at 35.892729s (0.002417s ago):
[   35.895248]  test_alloc+0x29c/0x628
[   35.895530]  test_use_after_free_read+0xd0/0x248
[   35.895592]  kunit_try_run_case+0x170/0x3f0
[   35.895649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.895815]  kthread+0x328/0x630
[   35.896041]  ret_from_fork+0x10/0x20
[   35.896134] 
[   35.896759] freed by task 326 on cpu 0 at 35.892803s (0.003455s ago):
[   35.897367]  test_use_after_free_read+0x1c0/0x248
[   35.897528]  kunit_try_run_case+0x170/0x3f0
[   35.897599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.897785]  kthread+0x328/0x630
[   35.897991]  ret_from_fork+0x10/0x20
[   35.898374] 
[   35.898649] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   35.898931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.899095] Hardware name: linux,dummy-virt (DT)
[   35.899205] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure Automatically assigned
[   34.854669] ==================================================================
[   34.854787] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   34.854787] 
[   34.854918] Out-of-bounds read at 0x0000000052747461 (1B left of kfence-#115):
[   34.855607]  test_out_of_bounds_read+0x114/0x3e0
[   34.856227]  kunit_try_run_case+0x170/0x3f0
[   34.856357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.856476]  kthread+0x328/0x630
[   34.856595]  ret_from_fork+0x10/0x20
[   34.856691] 
[   34.857288] kfence-#115: 0x000000009c9607f9-0x0000000062149a67, size=32, cache=kmalloc-32
[   34.857288] 
[   34.858006] allocated by task 318 on cpu 0 at 34.853225s (0.004395s ago):
[   34.859124]  test_alloc+0x29c/0x628
[   34.859241]  test_out_of_bounds_read+0xdc/0x3e0
[   34.859290]  kunit_try_run_case+0x170/0x3f0
[   34.859338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.859400]  kthread+0x328/0x630
[   34.859439]  ret_from_fork+0x10/0x20
[   34.859556] 
[   34.859649] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.859948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.859985] Hardware name: linux,dummy-virt (DT)
[   34.860032] ==================================================================
[   34.957302] ==================================================================
[   34.957388] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   34.957388] 
[   34.957487] Out-of-bounds read at 0x000000000a7cb6b6 (32B right of kfence-#116):
[   34.957811]  test_out_of_bounds_read+0x1c8/0x3e0
[   34.957896]  kunit_try_run_case+0x170/0x3f0
[   34.957939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.957983]  kthread+0x328/0x630
[   34.958037]  ret_from_fork+0x10/0x20
[   34.958090] 
[   34.958123] kfence-#116: 0x000000004c4030a8-0x00000000c4e3a3cf, size=32, cache=kmalloc-32
[   34.958123] 
[   34.958190] allocated by task 318 on cpu 0 at 34.957018s (0.001157s ago):
[   34.958267]  test_alloc+0x29c/0x628
[   34.958317]  test_out_of_bounds_read+0x198/0x3e0
[   34.958365]  kunit_try_run_case+0x170/0x3f0
[   34.958426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.958469]  kthread+0x328/0x630
[   34.958719]  ret_from_fork+0x10/0x20
[   34.958984] 
[   34.959061] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.959163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.959202] Hardware name: linux,dummy-virt (DT)
[   34.959236] ==================================================================
[   35.372542] ==================================================================
[   35.372838] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   35.372838] 
[   35.372927] Out-of-bounds read at 0x00000000c1627424 (32B right of kfence-#120):
[   35.373057]  test_out_of_bounds_read+0x1c8/0x3e0
[   35.373135]  kunit_try_run_case+0x170/0x3f0
[   35.373203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.373247]  kthread+0x328/0x630
[   35.373315]  ret_from_fork+0x10/0x20
[   35.373382] 
[   35.373408] kfence-#120: 0x000000002a008e19-0x00000000c2f688b4, size=32, cache=test
[   35.373408] 
[   35.373512] allocated by task 320 on cpu 0 at 35.372454s (0.001047s ago):
[   35.373597]  test_alloc+0x230/0x628
[   35.373680]  test_out_of_bounds_read+0x198/0x3e0
[   35.373757]  kunit_try_run_case+0x170/0x3f0
[   35.373814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.373857]  kthread+0x328/0x630
[   35.373908]  ret_from_fork+0x10/0x20
[   35.373965] 
[   35.374050] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   35.374139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.374167] Hardware name: linux,dummy-virt (DT)
[   35.374446] ==================================================================
[   35.062040] ==================================================================
[   35.062144] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   35.062144] 
[   35.062279] Out-of-bounds read at 0x000000009e72b143 (1B left of kfence-#117):
[   35.062493]  test_out_of_bounds_read+0x114/0x3e0
[   35.062610]  kunit_try_run_case+0x170/0x3f0
[   35.062676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.062720]  kthread+0x328/0x630
[   35.062942]  ret_from_fork+0x10/0x20
[   35.063026] 
[   35.063052] kfence-#117: 0x00000000e69ca17a-0x00000000a01a161a, size=32, cache=test
[   35.063052] 
[   35.063550] allocated by task 320 on cpu 0 at 35.061643s (0.001470s ago):
[   35.064037]  test_alloc+0x230/0x628
[   35.064267]  test_out_of_bounds_read+0xdc/0x3e0
[   35.064355]  kunit_try_run_case+0x170/0x3f0
[   35.064482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.064617]  kthread+0x328/0x630
[   35.064678]  ret_from_fork+0x10/0x20
[   35.064732] 
[   35.064812] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   35.065276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.065532] Hardware name: linux,dummy-virt (DT)
[   35.065606] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure Automatically assigned
[   34.646179] ==================================================================
[   34.646330] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   34.646384] Write of size 1 at addr fff00000c970b278 by task kunit_try_catch/316
[   34.646436] 
[   34.646467] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.646706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.646790] Hardware name: linux,dummy-virt (DT)
[   34.646836] Call trace:
[   34.646904]  show_stack+0x20/0x38 (C)
[   34.646959]  dump_stack_lvl+0x8c/0xd0
[   34.647009]  print_report+0x118/0x5e8
[   34.647265]  kasan_report+0xdc/0x128
[   34.647353]  __asan_report_store1_noabort+0x20/0x30
[   34.647406]  strncpy_from_user+0x270/0x2a0
[   34.647466]  copy_user_test_oob+0x5c0/0xec8
[   34.647523]  kunit_try_run_case+0x170/0x3f0
[   34.647588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.647642]  kthread+0x328/0x630
[   34.647701]  ret_from_fork+0x10/0x20
[   34.647849] 
[   34.647897] Allocated by task 316:
[   34.647946]  kasan_save_stack+0x3c/0x68
[   34.648143]  kasan_save_track+0x20/0x40
[   34.648183]  kasan_save_alloc_info+0x40/0x58
[   34.648228]  __kasan_kmalloc+0xd4/0xd8
[   34.648306]  __kmalloc_noprof+0x198/0x4c8
[   34.648450]  kunit_kmalloc_array+0x34/0x88
[   34.648530]  copy_user_test_oob+0xac/0xec8
[   34.648625]  kunit_try_run_case+0x170/0x3f0
[   34.648694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.648991]  kthread+0x328/0x630
[   34.649074]  ret_from_fork+0x10/0x20
[   34.649164] 
[   34.649214] The buggy address belongs to the object at fff00000c970b200
[   34.649214]  which belongs to the cache kmalloc-128 of size 128
[   34.649286] The buggy address is located 0 bytes to the right of
[   34.649286]  allocated 120-byte region [fff00000c970b200, fff00000c970b278)
[   34.649506] 
[   34.649555] The buggy address belongs to the physical page:
[   34.649591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b
[   34.649675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.649792] page_type: f5(slab)
[   34.649859] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.650048] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.650220] page dumped because: kasan: bad access detected
[   34.650289] 
[   34.650347] Memory state around the buggy address:
[   34.650521]  fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.650572]  fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.650647] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.650750]                                                                 ^
[   34.650828]  fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.650917]  fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.651139] ==================================================================
[   34.641030] ==================================================================
[   34.641096] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   34.641323] Write of size 121 at addr fff00000c970b200 by task kunit_try_catch/316
[   34.641387] 
[   34.641421] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.641506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.641536] Hardware name: linux,dummy-virt (DT)
[   34.641606] Call trace:
[   34.641632]  show_stack+0x20/0x38 (C)
[   34.641712]  dump_stack_lvl+0x8c/0xd0
[   34.641938]  print_report+0x118/0x5e8
[   34.642004]  kasan_report+0xdc/0x128
[   34.642167]  kasan_check_range+0x100/0x1a8
[   34.642218]  __kasan_check_write+0x20/0x30
[   34.642276]  strncpy_from_user+0x3c/0x2a0
[   34.642370]  copy_user_test_oob+0x5c0/0xec8
[   34.642427]  kunit_try_run_case+0x170/0x3f0
[   34.642474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.642527]  kthread+0x328/0x630
[   34.642579]  ret_from_fork+0x10/0x20
[   34.642637] 
[   34.642657] Allocated by task 316:
[   34.642687]  kasan_save_stack+0x3c/0x68
[   34.642734]  kasan_save_track+0x20/0x40
[   34.642771]  kasan_save_alloc_info+0x40/0x58
[   34.642811]  __kasan_kmalloc+0xd4/0xd8
[   34.642845]  __kmalloc_noprof+0x198/0x4c8
[   34.642884]  kunit_kmalloc_array+0x34/0x88
[   34.642931]  copy_user_test_oob+0xac/0xec8
[   34.642972]  kunit_try_run_case+0x170/0x3f0
[   34.643011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.643055]  kthread+0x328/0x630
[   34.643099]  ret_from_fork+0x10/0x20
[   34.643136] 
[   34.643156] The buggy address belongs to the object at fff00000c970b200
[   34.643156]  which belongs to the cache kmalloc-128 of size 128
[   34.643216] The buggy address is located 0 bytes inside of
[   34.643216]  allocated 120-byte region [fff00000c970b200, fff00000c970b278)
[   34.643280] 
[   34.643303] The buggy address belongs to the physical page:
[   34.643335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b
[   34.643390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.643441] page_type: f5(slab)
[   34.643482] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.643537] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.643580] page dumped because: kasan: bad access detected
[   34.643613] 
[   34.643633] Memory state around the buggy address:
[   34.643666]  fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.643736]  fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.643938] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.643981]                                                                 ^
[   34.644142]  fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.644305]  fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.644539] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure Automatically assigned
[   34.609181] ==================================================================
[   34.609320] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   34.609445] Write of size 121 at addr fff00000c970b200 by task kunit_try_catch/316
[   34.609504] 
[   34.609549] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.609638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.609666] Hardware name: linux,dummy-virt (DT)
[   34.609701] Call trace:
[   34.609729]  show_stack+0x20/0x38 (C)
[   34.609783]  dump_stack_lvl+0x8c/0xd0
[   34.609835]  print_report+0x118/0x5e8
[   34.609881]  kasan_report+0xdc/0x128
[   34.609924]  kasan_check_range+0x100/0x1a8
[   34.609972]  __kasan_check_write+0x20/0x30
[   34.610038]  copy_user_test_oob+0x234/0xec8
[   34.610250]  kunit_try_run_case+0x170/0x3f0
[   34.610307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.610359]  kthread+0x328/0x630
[   34.610403]  ret_from_fork+0x10/0x20
[   34.610496] 
[   34.610524] Allocated by task 316:
[   34.610574]  kasan_save_stack+0x3c/0x68
[   34.610616]  kasan_save_track+0x20/0x40
[   34.610659]  kasan_save_alloc_info+0x40/0x58
[   34.610714]  __kasan_kmalloc+0xd4/0xd8
[   34.610751]  __kmalloc_noprof+0x198/0x4c8
[   34.610793]  kunit_kmalloc_array+0x34/0x88
[   34.610832]  copy_user_test_oob+0xac/0xec8
[   34.610872]  kunit_try_run_case+0x170/0x3f0
[   34.610912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.611804]  kthread+0x328/0x630
[   34.611924]  ret_from_fork+0x10/0x20
[   34.611976] 
[   34.612016] The buggy address belongs to the object at fff00000c970b200
[   34.612016]  which belongs to the cache kmalloc-128 of size 128
[   34.612140] The buggy address is located 0 bytes inside of
[   34.612140]  allocated 120-byte region [fff00000c970b200, fff00000c970b278)
[   34.612232] 
[   34.612288] The buggy address belongs to the physical page:
[   34.612427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b
[   34.612494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.612577] page_type: f5(slab)
[   34.612665] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.612774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.612849] page dumped because: kasan: bad access detected
[   34.612934] 
[   34.613003] Memory state around the buggy address:
[   34.613112]  fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.613187]  fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.613264] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.613340]                                                                 ^
[   34.613403]  fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.613445]  fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.613485] ==================================================================
[   34.624935] ==================================================================
[   34.625010] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   34.625065] Write of size 121 at addr fff00000c970b200 by task kunit_try_catch/316
[   34.625148] 
[   34.625198] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.625284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.625330] Hardware name: linux,dummy-virt (DT)
[   34.625379] Call trace:
[   34.625405]  show_stack+0x20/0x38 (C)
[   34.625471]  dump_stack_lvl+0x8c/0xd0
[   34.625519]  print_report+0x118/0x5e8
[   34.625564]  kasan_report+0xdc/0x128
[   34.625612]  kasan_check_range+0x100/0x1a8
[   34.625698]  __kasan_check_write+0x20/0x30
[   34.625764]  copy_user_test_oob+0x35c/0xec8
[   34.625819]  kunit_try_run_case+0x170/0x3f0
[   34.625867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.625920]  kthread+0x328/0x630
[   34.626088]  ret_from_fork+0x10/0x20
[   34.626142] 
[   34.626164] Allocated by task 316:
[   34.626212]  kasan_save_stack+0x3c/0x68
[   34.626271]  kasan_save_track+0x20/0x40
[   34.626326]  kasan_save_alloc_info+0x40/0x58
[   34.626383]  __kasan_kmalloc+0xd4/0xd8
[   34.626419]  __kmalloc_noprof+0x198/0x4c8
[   34.626465]  kunit_kmalloc_array+0x34/0x88
[   34.626519]  copy_user_test_oob+0xac/0xec8
[   34.626562]  kunit_try_run_case+0x170/0x3f0
[   34.626618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.626661]  kthread+0x328/0x630
[   34.626696]  ret_from_fork+0x10/0x20
[   34.626857] 
[   34.626880] The buggy address belongs to the object at fff00000c970b200
[   34.626880]  which belongs to the cache kmalloc-128 of size 128
[   34.626940] The buggy address is located 0 bytes inside of
[   34.626940]  allocated 120-byte region [fff00000c970b200, fff00000c970b278)
[   34.627044] 
[   34.627068] The buggy address belongs to the physical page:
[   34.627128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b
[   34.627182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.627238] page_type: f5(slab)
[   34.627283] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.627357] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.627399] page dumped because: kasan: bad access detected
[   34.627449] 
[   34.627478] Memory state around the buggy address:
[   34.627512]  fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.627557]  fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.627626] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.627685]                                                                 ^
[   34.627726]  fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.627804]  fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.627841] ==================================================================
[   34.634220] ==================================================================
[   34.634270] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   34.634318] Read of size 121 at addr fff00000c970b200 by task kunit_try_catch/316
[   34.634369] 
[   34.634444] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.634541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.634577] Hardware name: linux,dummy-virt (DT)
[   34.634741] Call trace:
[   34.634783]  show_stack+0x20/0x38 (C)
[   34.634848]  dump_stack_lvl+0x8c/0xd0
[   34.635016]  print_report+0x118/0x5e8
[   34.635270]  kasan_report+0xdc/0x128
[   34.635322]  kasan_check_range+0x100/0x1a8
[   34.635399]  __kasan_check_read+0x20/0x30
[   34.635474]  copy_user_test_oob+0x4a0/0xec8
[   34.635530]  kunit_try_run_case+0x170/0x3f0
[   34.635594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.635692]  kthread+0x328/0x630
[   34.635761]  ret_from_fork+0x10/0x20
[   34.635841] 
[   34.635876] Allocated by task 316:
[   34.635905]  kasan_save_stack+0x3c/0x68
[   34.635943]  kasan_save_track+0x20/0x40
[   34.636221]  kasan_save_alloc_info+0x40/0x58
[   34.636274]  __kasan_kmalloc+0xd4/0xd8
[   34.636489]  __kmalloc_noprof+0x198/0x4c8
[   34.636562]  kunit_kmalloc_array+0x34/0x88
[   34.636661]  copy_user_test_oob+0xac/0xec8
[   34.636747]  kunit_try_run_case+0x170/0x3f0
[   34.636978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.637189]  kthread+0x328/0x630
[   34.637264]  ret_from_fork+0x10/0x20
[   34.637310] 
[   34.637331] The buggy address belongs to the object at fff00000c970b200
[   34.637331]  which belongs to the cache kmalloc-128 of size 128
[   34.637584] The buggy address is located 0 bytes inside of
[   34.637584]  allocated 120-byte region [fff00000c970b200, fff00000c970b278)
[   34.637770] 
[   34.637839] The buggy address belongs to the physical page:
[   34.637917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b
[   34.638138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.638295] page_type: f5(slab)
[   34.638355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.638414] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.638694] page dumped because: kasan: bad access detected
[   34.638754] 
[   34.638798] Memory state around the buggy address:
[   34.638996]  fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.639076]  fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.639205] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.639306]                                                                 ^
[   34.639380]  fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.639575]  fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.639795] ==================================================================
[   34.628618] ==================================================================
[   34.628770] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   34.628825] Read of size 121 at addr fff00000c970b200 by task kunit_try_catch/316
[   34.628877] 
[   34.628906] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.628991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.629019] Hardware name: linux,dummy-virt (DT)
[   34.629051] Call trace:
[   34.629076]  show_stack+0x20/0x38 (C)
[   34.629135]  dump_stack_lvl+0x8c/0xd0
[   34.629184]  print_report+0x118/0x5e8
[   34.629228]  kasan_report+0xdc/0x128
[   34.629274]  kasan_check_range+0x100/0x1a8
[   34.629319]  __kasan_check_read+0x20/0x30
[   34.629366]  copy_user_test_oob+0x3c8/0xec8
[   34.629415]  kunit_try_run_case+0x170/0x3f0
[   34.629460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.629512]  kthread+0x328/0x630
[   34.629553]  ret_from_fork+0x10/0x20
[   34.629601] 
[   34.629621] Allocated by task 316:
[   34.629650]  kasan_save_stack+0x3c/0x68
[   34.629689]  kasan_save_track+0x20/0x40
[   34.629726]  kasan_save_alloc_info+0x40/0x58
[   34.629764]  __kasan_kmalloc+0xd4/0xd8
[   34.629800]  __kmalloc_noprof+0x198/0x4c8
[   34.629839]  kunit_kmalloc_array+0x34/0x88
[   34.629879]  copy_user_test_oob+0xac/0xec8
[   34.629918]  kunit_try_run_case+0x170/0x3f0
[   34.629955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.629999]  kthread+0x328/0x630
[   34.630040]  ret_from_fork+0x10/0x20
[   34.630076] 
[   34.630106] The buggy address belongs to the object at fff00000c970b200
[   34.630106]  which belongs to the cache kmalloc-128 of size 128
[   34.630165] The buggy address is located 0 bytes inside of
[   34.630165]  allocated 120-byte region [fff00000c970b200, fff00000c970b278)
[   34.630231] 
[   34.630259] The buggy address belongs to the physical page:
[   34.630290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b
[   34.630343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.630391] page_type: f5(slab)
[   34.630430] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.630483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.630525] page dumped because: kasan: bad access detected
[   34.630559] 
[   34.630579] Memory state around the buggy address:
[   34.630611]  fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.630656]  fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.630701] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.630740]                                                                 ^
[   34.630779]  fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.630823]  fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.630863] ==================================================================
[   34.617789] ==================================================================
[   34.617843] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   34.617897] Read of size 121 at addr fff00000c970b200 by task kunit_try_catch/316
[   34.617948] 
[   34.618029] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.618146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.618193] Hardware name: linux,dummy-virt (DT)
[   34.618263] Call trace:
[   34.618289]  show_stack+0x20/0x38 (C)
[   34.618356]  dump_stack_lvl+0x8c/0xd0
[   34.618419]  print_report+0x118/0x5e8
[   34.618487]  kasan_report+0xdc/0x128
[   34.618532]  kasan_check_range+0x100/0x1a8
[   34.618577]  __kasan_check_read+0x20/0x30
[   34.618635]  copy_user_test_oob+0x728/0xec8
[   34.618684]  kunit_try_run_case+0x170/0x3f0
[   34.618733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.618786]  kthread+0x328/0x630
[   34.618829]  ret_from_fork+0x10/0x20
[   34.618875] 
[   34.618895] Allocated by task 316:
[   34.618925]  kasan_save_stack+0x3c/0x68
[   34.618973]  kasan_save_track+0x20/0x40
[   34.619012]  kasan_save_alloc_info+0x40/0x58
[   34.619059]  __kasan_kmalloc+0xd4/0xd8
[   34.619105]  __kmalloc_noprof+0x198/0x4c8
[   34.619145]  kunit_kmalloc_array+0x34/0x88
[   34.619183]  copy_user_test_oob+0xac/0xec8
[   34.619222]  kunit_try_run_case+0x170/0x3f0
[   34.619262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.619304]  kthread+0x328/0x630
[   34.619337]  ret_from_fork+0x10/0x20
[   34.619375] 
[   34.619396] The buggy address belongs to the object at fff00000c970b200
[   34.619396]  which belongs to the cache kmalloc-128 of size 128
[   34.619467] The buggy address is located 0 bytes inside of
[   34.619467]  allocated 120-byte region [fff00000c970b200, fff00000c970b278)
[   34.619546] 
[   34.619571] The buggy address belongs to the physical page:
[   34.619605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b
[   34.619660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.619709] page_type: f5(slab)
[   34.619746] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.619799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.619881] page dumped because: kasan: bad access detected
[   34.619941] 
[   34.619961] Memory state around the buggy address:
[   34.619995]  fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.620040]  fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.620122] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.620165]                                                                 ^
[   34.620208]  fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.620252]  fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.620289] ==================================================================
[   34.630968] ==================================================================
[   34.631007] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   34.631052] Write of size 121 at addr fff00000c970b200 by task kunit_try_catch/316
[   34.631178] 
[   34.631226] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.631342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.631380] Hardware name: linux,dummy-virt (DT)
[   34.631428] Call trace:
[   34.631468]  show_stack+0x20/0x38 (C)
[   34.631557]  dump_stack_lvl+0x8c/0xd0
[   34.631623]  print_report+0x118/0x5e8
[   34.631667]  kasan_report+0xdc/0x128
[   34.631739]  kasan_check_range+0x100/0x1a8
[   34.631814]  __kasan_check_write+0x20/0x30
[   34.631902]  copy_user_test_oob+0x434/0xec8
[   34.631999]  kunit_try_run_case+0x170/0x3f0
[   34.632105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.632175]  kthread+0x328/0x630
[   34.632220]  ret_from_fork+0x10/0x20
[   34.632266] 
[   34.632286] Allocated by task 316:
[   34.632315]  kasan_save_stack+0x3c/0x68
[   34.632353]  kasan_save_track+0x20/0x40
[   34.632391]  kasan_save_alloc_info+0x40/0x58
[   34.632431]  __kasan_kmalloc+0xd4/0xd8
[   34.632654]  __kmalloc_noprof+0x198/0x4c8
[   34.632697]  kunit_kmalloc_array+0x34/0x88
[   34.632736]  copy_user_test_oob+0xac/0xec8
[   34.632776]  kunit_try_run_case+0x170/0x3f0
[   34.632849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.632906]  kthread+0x328/0x630
[   34.632952]  ret_from_fork+0x10/0x20
[   34.633046] 
[   34.633125] The buggy address belongs to the object at fff00000c970b200
[   34.633125]  which belongs to the cache kmalloc-128 of size 128
[   34.633196] The buggy address is located 0 bytes inside of
[   34.633196]  allocated 120-byte region [fff00000c970b200, fff00000c970b278)
[   34.633259] 
[   34.633281] The buggy address belongs to the physical page:
[   34.633314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b
[   34.633377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.633427] page_type: f5(slab)
[   34.633474] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.633526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.633584] page dumped because: kasan: bad access detected
[   34.633617] 
[   34.633645] Memory state around the buggy address:
[   34.633679]  fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.633733]  fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.633787] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.633833]                                                                 ^
[   34.633874]  fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.633918]  fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.633975] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure Automatically assigned
[   34.589620] ==================================================================
[   34.589668] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   34.589717] Write of size 8 at addr fff00000c970b178 by task kunit_try_catch/312
[   34.589768] 
[   34.589798] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.589880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.589909] Hardware name: linux,dummy-virt (DT)
[   34.589942] Call trace:
[   34.589964]  show_stack+0x20/0x38 (C)
[   34.590013]  dump_stack_lvl+0x8c/0xd0
[   34.590068]  print_report+0x118/0x5e8
[   34.590127]  kasan_report+0xdc/0x128
[   34.590170]  kasan_check_range+0x100/0x1a8
[   34.590218]  __kasan_check_write+0x20/0x30
[   34.590266]  copy_to_kernel_nofault+0x8c/0x250
[   34.590315]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   34.590366]  kunit_try_run_case+0x170/0x3f0
[   34.590413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.590466]  kthread+0x328/0x630
[   34.590510]  ret_from_fork+0x10/0x20
[   34.590556] 
[   34.590578] Allocated by task 312:
[   34.590606]  kasan_save_stack+0x3c/0x68
[   34.590645]  kasan_save_track+0x20/0x40
[   34.590681]  kasan_save_alloc_info+0x40/0x58
[   34.590720]  __kasan_kmalloc+0xd4/0xd8
[   34.590755]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.590796]  copy_to_kernel_nofault_oob+0xc8/0x418
[   34.590837]  kunit_try_run_case+0x170/0x3f0
[   34.590875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.590919]  kthread+0x328/0x630
[   34.590952]  ret_from_fork+0x10/0x20
[   34.590989] 
[   34.591011] The buggy address belongs to the object at fff00000c970b100
[   34.591011]  which belongs to the cache kmalloc-128 of size 128
[   34.591071] The buggy address is located 0 bytes to the right of
[   34.591071]  allocated 120-byte region [fff00000c970b100, fff00000c970b178)
[   34.591199] 
[   34.591220] The buggy address belongs to the physical page:
[   34.591253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b
[   34.591306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.591356] page_type: f5(slab)
[   34.591407] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.591462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.591506] page dumped because: kasan: bad access detected
[   34.591540] 
[   34.591561] Memory state around the buggy address:
[   34.591602]  fff00000c970b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.591648]  fff00000c970b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.591692] >fff00000c970b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.591743]                                                                 ^
[   34.591785]  fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.591838]  fff00000c970b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.591879] ==================================================================
[   34.584830] ==================================================================
[   34.584900] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   34.584956] Read of size 8 at addr fff00000c970b178 by task kunit_try_catch/312
[   34.585007] 
[   34.585039] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.585246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.585278] Hardware name: linux,dummy-virt (DT)
[   34.585312] Call trace:
[   34.585336]  show_stack+0x20/0x38 (C)
[   34.585388]  dump_stack_lvl+0x8c/0xd0
[   34.585478]  print_report+0x118/0x5e8
[   34.585544]  kasan_report+0xdc/0x128
[   34.585590]  __asan_report_load8_noabort+0x20/0x30
[   34.585641]  copy_to_kernel_nofault+0x204/0x250
[   34.585697]  copy_to_kernel_nofault_oob+0x158/0x418
[   34.585763]  kunit_try_run_case+0x170/0x3f0
[   34.585850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.585903]  kthread+0x328/0x630
[   34.585961]  ret_from_fork+0x10/0x20
[   34.586011] 
[   34.586039] Allocated by task 312:
[   34.586899]  kasan_save_stack+0x3c/0x68
[   34.586949]  kasan_save_track+0x20/0x40
[   34.586988]  kasan_save_alloc_info+0x40/0x58
[   34.587026]  __kasan_kmalloc+0xd4/0xd8
[   34.587063]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.587117]  copy_to_kernel_nofault_oob+0xc8/0x418
[   34.587159]  kunit_try_run_case+0x170/0x3f0
[   34.587197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.587242]  kthread+0x328/0x630
[   34.587277]  ret_from_fork+0x10/0x20
[   34.587314] 
[   34.587335] The buggy address belongs to the object at fff00000c970b100
[   34.587335]  which belongs to the cache kmalloc-128 of size 128
[   34.587395] The buggy address is located 0 bytes to the right of
[   34.587395]  allocated 120-byte region [fff00000c970b100, fff00000c970b178)
[   34.587460] 
[   34.587482] The buggy address belongs to the physical page:
[   34.587516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b
[   34.587570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.587620] page_type: f5(slab)
[   34.587658] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.587710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.587752] page dumped because: kasan: bad access detected
[   34.587785] 
[   34.587806] Memory state around the buggy address:
[   34.587841]  fff00000c970b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.588912]  fff00000c970b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.588963] >fff00000c970b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.589003]                                                                 ^
[   34.589047]  fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.589103]  fff00000c970b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.589145] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure Automatically assigned
[   34.557032] ==================================================================
[   34.557116] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   34.557172] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300
[   34.557273] 
[   34.557307] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.557415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.557463] Hardware name: linux,dummy-virt (DT)
[   34.557513] Call trace:
[   34.557539]  show_stack+0x20/0x38 (C)
[   34.557608]  dump_stack_lvl+0x8c/0xd0
[   34.557664]  print_report+0x310/0x5e8
[   34.557728]  kasan_report+0xdc/0x128
[   34.557773]  __asan_report_load1_noabort+0x20/0x30
[   34.557839]  vmalloc_oob+0x578/0x5d0
[   34.557886]  kunit_try_run_case+0x170/0x3f0
[   34.557934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.557988]  kthread+0x328/0x630
[   34.558076]  ret_from_fork+0x10/0x20
[   34.558134] 
[   34.558157] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0
[   34.558283] The buggy address belongs to the physical page:
[   34.558318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109710
[   34.558371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.558436] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.558489] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.558549] page dumped because: kasan: bad access detected
[   34.558603] 
[   34.558632] Memory state around the buggy address:
[   34.558667]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.558711]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.558756] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   34.558814]                                                              ^
[   34.558855]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.558898]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.558937] ==================================================================
[   34.559111] ==================================================================
[   34.559156] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   34.559204] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300
[   34.559253] 
[   34.559282] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.559394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.559433] Hardware name: linux,dummy-virt (DT)
[   34.559482] Call trace:
[   34.559508]  show_stack+0x20/0x38 (C)
[   34.559554]  dump_stack_lvl+0x8c/0xd0
[   34.559617]  print_report+0x310/0x5e8
[   34.559661]  kasan_report+0xdc/0x128
[   34.559706]  __asan_report_load1_noabort+0x20/0x30
[   34.559754]  vmalloc_oob+0x51c/0x5d0
[   34.559800]  kunit_try_run_case+0x170/0x3f0
[   34.559939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.560064]  kthread+0x328/0x630
[   34.560181]  ret_from_fork+0x10/0x20
[   34.560280] 
[   34.560446] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0
[   34.560535] The buggy address belongs to the physical page:
[   34.560580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109710
[   34.560631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.560692] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.560740] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.560850] page dumped because: kasan: bad access detected
[   34.560940] 
[   34.560981] Memory state around the buggy address:
[   34.561025]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.561106]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.561161] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   34.561228]                                                                 ^
[   34.561328]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.561374]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.561416] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure Automatically assigned
[   34.289131] ==================================================================
[   34.289184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   34.289237] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.289288] 
[   34.289319] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.289403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.289582] Hardware name: linux,dummy-virt (DT)
[   34.289650] Call trace:
[   34.289677]  show_stack+0x20/0x38 (C)
[   34.289963]  dump_stack_lvl+0x8c/0xd0
[   34.290017]  print_report+0x118/0x5e8
[   34.290230]  kasan_report+0xdc/0x128
[   34.290284]  kasan_check_range+0x100/0x1a8
[   34.290423]  __kasan_check_read+0x20/0x30
[   34.290475]  kasan_atomics_helper+0xdd4/0x4858
[   34.290526]  kasan_atomics+0x198/0x2e0
[   34.290580]  kunit_try_run_case+0x170/0x3f0
[   34.290627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.290681]  kthread+0x328/0x630
[   34.290725]  ret_from_fork+0x10/0x20
[   34.290987] 
[   34.291174] Allocated by task 296:
[   34.291212]  kasan_save_stack+0x3c/0x68
[   34.291256]  kasan_save_track+0x20/0x40
[   34.291294]  kasan_save_alloc_info+0x40/0x58
[   34.291407]  __kasan_kmalloc+0xd4/0xd8
[   34.291447]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.291489]  kasan_atomics+0xb8/0x2e0
[   34.291554]  kunit_try_run_case+0x170/0x3f0
[   34.291733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.291821]  kthread+0x328/0x630
[   34.292021]  ret_from_fork+0x10/0x20
[   34.292320] 
[   34.292451] The buggy address belongs to the object at fff00000c9708480
[   34.292451]  which belongs to the cache kmalloc-64 of size 64
[   34.292532] The buggy address is located 0 bytes to the right of
[   34.292532]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.292599] 
[   34.292855] The buggy address belongs to the physical page:
[   34.292958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.293045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.293171] page_type: f5(slab)
[   34.293247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.293495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.293646] page dumped because: kasan: bad access detected
[   34.293713] 
[   34.293764] Memory state around the buggy address:
[   34.293887]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.293954]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.294018] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.294093]                                      ^
[   34.294129]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.294173]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.294420] ==================================================================
[   34.388983] ==================================================================
[   34.389035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   34.389342] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.389507] 
[   34.389614] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.389699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.389727] Hardware name: linux,dummy-virt (DT)
[   34.389760] Call trace:
[   34.389784]  show_stack+0x20/0x38 (C)
[   34.389836]  dump_stack_lvl+0x8c/0xd0
[   34.389884]  print_report+0x118/0x5e8
[   34.389940]  kasan_report+0xdc/0x128
[   34.390107]  __asan_report_load8_noabort+0x20/0x30
[   34.390155]  kasan_atomics_helper+0x3f04/0x4858
[   34.390207]  kasan_atomics+0x198/0x2e0
[   34.390255]  kunit_try_run_case+0x170/0x3f0
[   34.390650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.391128]  kthread+0x328/0x630
[   34.391270]  ret_from_fork+0x10/0x20
[   34.391442] 
[   34.391538] Allocated by task 296:
[   34.391678]  kasan_save_stack+0x3c/0x68
[   34.391799]  kasan_save_track+0x20/0x40
[   34.391836]  kasan_save_alloc_info+0x40/0x58
[   34.391876]  __kasan_kmalloc+0xd4/0xd8
[   34.391912]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.391954]  kasan_atomics+0xb8/0x2e0
[   34.392117]  kunit_try_run_case+0x170/0x3f0
[   34.392157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.392202]  kthread+0x328/0x630
[   34.392236]  ret_from_fork+0x10/0x20
[   34.392273] 
[   34.392296] The buggy address belongs to the object at fff00000c9708480
[   34.392296]  which belongs to the cache kmalloc-64 of size 64
[   34.392355] The buggy address is located 0 bytes to the right of
[   34.392355]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.392761] 
[   34.393033] The buggy address belongs to the physical page:
[   34.393070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.393137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.393580] page_type: f5(slab)
[   34.393817] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.393908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.393978] page dumped because: kasan: bad access detected
[   34.394159] 
[   34.394296] Memory state around the buggy address:
[   34.394344]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.394739]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.394788] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.394828]                                      ^
[   34.394979]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.395112]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.395153] ==================================================================
[   34.416888] ==================================================================
[   34.417065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   34.417347] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.417404] 
[   34.417436] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.417929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.417984] Hardware name: linux,dummy-virt (DT)
[   34.418121] Call trace:
[   34.418336]  show_stack+0x20/0x38 (C)
[   34.418497]  dump_stack_lvl+0x8c/0xd0
[   34.418546]  print_report+0x118/0x5e8
[   34.418592]  kasan_report+0xdc/0x128
[   34.418636]  kasan_check_range+0x100/0x1a8
[   34.418681]  __kasan_check_write+0x20/0x30
[   34.418728]  kasan_atomics_helper+0x154c/0x4858
[   34.418778]  kasan_atomics+0x198/0x2e0
[   34.418826]  kunit_try_run_case+0x170/0x3f0
[   34.418873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.418935]  kthread+0x328/0x630
[   34.418979]  ret_from_fork+0x10/0x20
[   34.419143] 
[   34.419323] Allocated by task 296:
[   34.419636]  kasan_save_stack+0x3c/0x68
[   34.419763]  kasan_save_track+0x20/0x40
[   34.419802]  kasan_save_alloc_info+0x40/0x58
[   34.419878]  __kasan_kmalloc+0xd4/0xd8
[   34.419952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.419994]  kasan_atomics+0xb8/0x2e0
[   34.420034]  kunit_try_run_case+0x170/0x3f0
[   34.420815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.420886]  kthread+0x328/0x630
[   34.420921]  ret_from_fork+0x10/0x20
[   34.421089] 
[   34.421114] The buggy address belongs to the object at fff00000c9708480
[   34.421114]  which belongs to the cache kmalloc-64 of size 64
[   34.421242] The buggy address is located 0 bytes to the right of
[   34.421242]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.421417] 
[   34.421509] The buggy address belongs to the physical page:
[   34.421903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.422014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.422171] page_type: f5(slab)
[   34.422251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.422405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.422475] page dumped because: kasan: bad access detected
[   34.422592] 
[   34.422614] Memory state around the buggy address:
[   34.422712]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.422818]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.422896] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.423063]                                      ^
[   34.423385]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.423559]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.423602] ==================================================================
[   34.295071] ==================================================================
[   34.295147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   34.295201] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.295253] 
[   34.295282] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.295475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.295535] Hardware name: linux,dummy-virt (DT)
[   34.295569] Call trace:
[   34.295600]  show_stack+0x20/0x38 (C)
[   34.295893]  dump_stack_lvl+0x8c/0xd0
[   34.295975]  print_report+0x118/0x5e8
[   34.296150]  kasan_report+0xdc/0x128
[   34.296212]  __asan_report_load8_noabort+0x20/0x30
[   34.296274]  kasan_atomics_helper+0x3f58/0x4858
[   34.296326]  kasan_atomics+0x198/0x2e0
[   34.296437]  kunit_try_run_case+0x170/0x3f0
[   34.296487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.296541]  kthread+0x328/0x630
[   34.296585]  ret_from_fork+0x10/0x20
[   34.296827] 
[   34.296865] Allocated by task 296:
[   34.297065]  kasan_save_stack+0x3c/0x68
[   34.297357]  kasan_save_track+0x20/0x40
[   34.297413]  kasan_save_alloc_info+0x40/0x58
[   34.297461]  __kasan_kmalloc+0xd4/0xd8
[   34.297498]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.297564]  kasan_atomics+0xb8/0x2e0
[   34.297800]  kunit_try_run_case+0x170/0x3f0
[   34.297881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.298061]  kthread+0x328/0x630
[   34.298143]  ret_from_fork+0x10/0x20
[   34.298434] 
[   34.298529] The buggy address belongs to the object at fff00000c9708480
[   34.298529]  which belongs to the cache kmalloc-64 of size 64
[   34.298630] The buggy address is located 0 bytes to the right of
[   34.298630]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.298699] 
[   34.298720] The buggy address belongs to the physical page:
[   34.298789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.299034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.299225] page_type: f5(slab)
[   34.299292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.299559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.299607] page dumped because: kasan: bad access detected
[   34.299649] 
[   34.299695] Memory state around the buggy address:
[   34.299753]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.299915]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.299969] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.300088]                                      ^
[   34.300137]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.300182]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.300222] ==================================================================
[   34.507295] ==================================================================
[   34.507353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   34.507409] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.507461] 
[   34.507496] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.507584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.507616] Hardware name: linux,dummy-virt (DT)
[   34.507650] Call trace:
[   34.507675]  show_stack+0x20/0x38 (C)
[   34.507732]  dump_stack_lvl+0x8c/0xd0
[   34.510851]  print_report+0x118/0x5e8
[   34.511179]  kasan_report+0xdc/0x128
[   34.511230]  kasan_check_range+0x100/0x1a8
[   34.511277]  __kasan_check_write+0x20/0x30
[   34.511327]  kasan_atomics_helper+0x175c/0x4858
[   34.512254]  kasan_atomics+0x198/0x2e0
[   34.512595]  kunit_try_run_case+0x170/0x3f0
[   34.512671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.512726]  kthread+0x328/0x630
[   34.513387]  ret_from_fork+0x10/0x20
[   34.513822] 
[   34.513848] Allocated by task 296:
[   34.514283]  kasan_save_stack+0x3c/0x68
[   34.514329]  kasan_save_track+0x20/0x40
[   34.514366]  kasan_save_alloc_info+0x40/0x58
[   34.514407]  __kasan_kmalloc+0xd4/0xd8
[   34.514445]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.514489]  kasan_atomics+0xb8/0x2e0
[   34.515650]  kunit_try_run_case+0x170/0x3f0
[   34.515711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.517700]  kthread+0x328/0x630
[   34.517802]  ret_from_fork+0x10/0x20
[   34.518005] 
[   34.518053] The buggy address belongs to the object at fff00000c9708480
[   34.518053]  which belongs to the cache kmalloc-64 of size 64
[   34.518196] The buggy address is located 0 bytes to the right of
[   34.518196]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.518314] 
[   34.518466] The buggy address belongs to the physical page:
[   34.518575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.519141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.519621] page_type: f5(slab)
[   34.520619] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.520700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.520770] page dumped because: kasan: bad access detected
[   34.520890] 
[   34.520911] Memory state around the buggy address:
[   34.521051]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.521774]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.521980] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.522198]                                      ^
[   34.522473]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.522635]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.523030] ==================================================================
[   34.439434] ==================================================================
[   34.439679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   34.439801] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.439851] 
[   34.440093] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.440220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.440416] Hardware name: linux,dummy-virt (DT)
[   34.440508] Call trace:
[   34.440533]  show_stack+0x20/0x38 (C)
[   34.440672]  dump_stack_lvl+0x8c/0xd0
[   34.440782]  print_report+0x118/0x5e8
[   34.440826]  kasan_report+0xdc/0x128
[   34.440872]  kasan_check_range+0x100/0x1a8
[   34.441267]  __kasan_check_write+0x20/0x30
[   34.441415]  kasan_atomics_helper+0x1644/0x4858
[   34.441468]  kasan_atomics+0x198/0x2e0
[   34.441555]  kunit_try_run_case+0x170/0x3f0
[   34.441797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.441886]  kthread+0x328/0x630
[   34.441950]  ret_from_fork+0x10/0x20
[   34.442106] 
[   34.442127] Allocated by task 296:
[   34.442157]  kasan_save_stack+0x3c/0x68
[   34.442199]  kasan_save_track+0x20/0x40
[   34.442237]  kasan_save_alloc_info+0x40/0x58
[   34.442277]  __kasan_kmalloc+0xd4/0xd8
[   34.442593]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.442696]  kasan_atomics+0xb8/0x2e0
[   34.442900]  kunit_try_run_case+0x170/0x3f0
[   34.442943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.443213]  kthread+0x328/0x630
[   34.443351]  ret_from_fork+0x10/0x20
[   34.443390] 
[   34.443413] The buggy address belongs to the object at fff00000c9708480
[   34.443413]  which belongs to the cache kmalloc-64 of size 64
[   34.443474] The buggy address is located 0 bytes to the right of
[   34.443474]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.443539] 
[   34.443560] The buggy address belongs to the physical page:
[   34.443593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.443646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.443736] page_type: f5(slab)
[   34.443778] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.443827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.443869] page dumped because: kasan: bad access detected
[   34.444177] 
[   34.444200] Memory state around the buggy address:
[   34.444236]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.444280]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.444324] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.444363]                                      ^
[   34.444398]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.444443]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.444482] ==================================================================
[   34.541037] ==================================================================
[   34.541121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   34.541196] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.541247] 
[   34.541302] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.541405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.541459] Hardware name: linux,dummy-virt (DT)
[   34.541522] Call trace:
[   34.541547]  show_stack+0x20/0x38 (C)
[   34.541614]  dump_stack_lvl+0x8c/0xd0
[   34.541684]  print_report+0x118/0x5e8
[   34.541737]  kasan_report+0xdc/0x128
[   34.541781]  kasan_check_range+0x100/0x1a8
[   34.541828]  __kasan_check_write+0x20/0x30
[   34.541875]  kasan_atomics_helper+0x17ec/0x4858
[   34.541925]  kasan_atomics+0x198/0x2e0
[   34.541971]  kunit_try_run_case+0x170/0x3f0
[   34.542273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.542378]  kthread+0x328/0x630
[   34.542438]  ret_from_fork+0x10/0x20
[   34.542504] 
[   34.542542] Allocated by task 296:
[   34.542608]  kasan_save_stack+0x3c/0x68
[   34.542654]  kasan_save_track+0x20/0x40
[   34.542700]  kasan_save_alloc_info+0x40/0x58
[   34.542746]  __kasan_kmalloc+0xd4/0xd8
[   34.542914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.542960]  kasan_atomics+0xb8/0x2e0
[   34.542999]  kunit_try_run_case+0x170/0x3f0
[   34.543051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.543122]  kthread+0x328/0x630
[   34.543159]  ret_from_fork+0x10/0x20
[   34.543242] 
[   34.543281] The buggy address belongs to the object at fff00000c9708480
[   34.543281]  which belongs to the cache kmalloc-64 of size 64
[   34.543342] The buggy address is located 0 bytes to the right of
[   34.543342]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.543425] 
[   34.543472] The buggy address belongs to the physical page:
[   34.543506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.543558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.543608] page_type: f5(slab)
[   34.543647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.543720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.544006] page dumped because: kasan: bad access detected
[   34.544094] 
[   34.544164] Memory state around the buggy address:
[   34.544221]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.544267]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.544311] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.544351]                                      ^
[   34.544398]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.544445]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.544498] ==================================================================
[   34.153520] ==================================================================
[   34.153584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   34.153636] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.153688] 
[   34.153718] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.153803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.153831] Hardware name: linux,dummy-virt (DT)
[   34.153862] Call trace:
[   34.153887]  show_stack+0x20/0x38 (C)
[   34.153934]  dump_stack_lvl+0x8c/0xd0
[   34.153983]  print_report+0x118/0x5e8
[   34.154034]  kasan_report+0xdc/0x128
[   34.154091]  kasan_check_range+0x100/0x1a8
[   34.154276]  __kasan_check_write+0x20/0x30
[   34.154330]  kasan_atomics_helper+0x760/0x4858
[   34.154735]  kasan_atomics+0x198/0x2e0
[   34.154829]  kunit_try_run_case+0x170/0x3f0
[   34.155133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.155225]  kthread+0x328/0x630
[   34.155283]  ret_from_fork+0x10/0x20
[   34.155340] 
[   34.155362] Allocated by task 296:
[   34.155393]  kasan_save_stack+0x3c/0x68
[   34.155440]  kasan_save_track+0x20/0x40
[   34.155479]  kasan_save_alloc_info+0x40/0x58
[   34.155525]  __kasan_kmalloc+0xd4/0xd8
[   34.155562]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.155603]  kasan_atomics+0xb8/0x2e0
[   34.155643]  kunit_try_run_case+0x170/0x3f0
[   34.155690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.155979]  kthread+0x328/0x630
[   34.156069]  ret_from_fork+0x10/0x20
[   34.156321] 
[   34.156355] The buggy address belongs to the object at fff00000c9708480
[   34.156355]  which belongs to the cache kmalloc-64 of size 64
[   34.156761] The buggy address is located 0 bytes to the right of
[   34.156761]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.156925] 
[   34.157117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.157635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.158475]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.158534]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.158866] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.159027]                                      ^
[   34.159115]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.159244]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.159298] ==================================================================
[   34.348159] ==================================================================
[   34.348256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   34.348357] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.348432] 
[   34.348743] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.348871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.349030] Hardware name: linux,dummy-virt (DT)
[   34.349093] Call trace:
[   34.349117]  show_stack+0x20/0x38 (C)
[   34.349175]  dump_stack_lvl+0x8c/0xd0
[   34.349225]  print_report+0x118/0x5e8
[   34.349494]  kasan_report+0xdc/0x128
[   34.349617]  kasan_check_range+0x100/0x1a8
[   34.349710]  __kasan_check_write+0x20/0x30
[   34.349885]  kasan_atomics_helper+0x1128/0x4858
[   34.350105]  kasan_atomics+0x198/0x2e0
[   34.350185]  kunit_try_run_case+0x170/0x3f0
[   34.350349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.350444]  kthread+0x328/0x630
[   34.350579]  ret_from_fork+0x10/0x20
[   34.350855] 
[   34.350987] Allocated by task 296:
[   34.351046]  kasan_save_stack+0x3c/0x68
[   34.351174]  kasan_save_track+0x20/0x40
[   34.351262]  kasan_save_alloc_info+0x40/0x58
[   34.351503]  __kasan_kmalloc+0xd4/0xd8
[   34.351643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.351721]  kasan_atomics+0xb8/0x2e0
[   34.351807]  kunit_try_run_case+0x170/0x3f0
[   34.352092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.352151]  kthread+0x328/0x630
[   34.352279]  ret_from_fork+0x10/0x20
[   34.352347] 
[   34.352468] The buggy address belongs to the object at fff00000c9708480
[   34.352468]  which belongs to the cache kmalloc-64 of size 64
[   34.352597] The buggy address is located 0 bytes to the right of
[   34.352597]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.352846] 
[   34.352916] The buggy address belongs to the physical page:
[   34.352997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.353219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.353387] page_type: f5(slab)
[   34.353447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.353540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.353621] page dumped because: kasan: bad access detected
[   34.353833] 
[   34.353924] Memory state around the buggy address:
[   34.354057]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.354242]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.354337] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.354445]                                      ^
[   34.354533]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.354598]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.354782] ==================================================================
[   34.282320] ==================================================================
[   34.282371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   34.282423] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.282473] 
[   34.282532] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.282627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.282657] Hardware name: linux,dummy-virt (DT)
[   34.282689] Call trace:
[   34.282722]  show_stack+0x20/0x38 (C)
[   34.282781]  dump_stack_lvl+0x8c/0xd0
[   34.282830]  print_report+0x118/0x5e8
[   34.282877]  kasan_report+0xdc/0x128
[   34.282923]  __asan_report_load4_noabort+0x20/0x30
[   34.282981]  kasan_atomics_helper+0x3e04/0x4858
[   34.283041]  kasan_atomics+0x198/0x2e0
[   34.283484]  kunit_try_run_case+0x170/0x3f0
[   34.283636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.283715]  kthread+0x328/0x630
[   34.283961]  ret_from_fork+0x10/0x20
[   34.284035] 
[   34.284058] Allocated by task 296:
[   34.284295]  kasan_save_stack+0x3c/0x68
[   34.284491]  kasan_save_track+0x20/0x40
[   34.284572]  kasan_save_alloc_info+0x40/0x58
[   34.284667]  __kasan_kmalloc+0xd4/0xd8
[   34.284954]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.285053]  kasan_atomics+0xb8/0x2e0
[   34.285221]  kunit_try_run_case+0x170/0x3f0
[   34.285265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.285317]  kthread+0x328/0x630
[   34.285548]  ret_from_fork+0x10/0x20
[   34.285633] 
[   34.285743] The buggy address belongs to the object at fff00000c9708480
[   34.285743]  which belongs to the cache kmalloc-64 of size 64
[   34.285833] The buggy address is located 0 bytes to the right of
[   34.285833]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.286066] 
[   34.286104] The buggy address belongs to the physical page:
[   34.286138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.286330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.286420] page_type: f5(slab)
[   34.286572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.286670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.286953] page dumped because: kasan: bad access detected
[   34.287146] 
[   34.287228] Memory state around the buggy address:
[   34.287304]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.287443]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.287517] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.287566]                                      ^
[   34.287602]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.288007]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.288102] ==================================================================
[   34.342465] ==================================================================
[   34.342544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   34.342596] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.342727] 
[   34.342759] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.342850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.343055] Hardware name: linux,dummy-virt (DT)
[   34.343126] Call trace:
[   34.343201]  show_stack+0x20/0x38 (C)
[   34.343254]  dump_stack_lvl+0x8c/0xd0
[   34.343321]  print_report+0x118/0x5e8
[   34.343375]  kasan_report+0xdc/0x128
[   34.343418]  kasan_check_range+0x100/0x1a8
[   34.343463]  __kasan_check_write+0x20/0x30
[   34.343510]  kasan_atomics_helper+0x10c0/0x4858
[   34.343677]  kasan_atomics+0x198/0x2e0
[   34.343857]  kunit_try_run_case+0x170/0x3f0
[   34.343943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.344091]  kthread+0x328/0x630
[   34.344160]  ret_from_fork+0x10/0x20
[   34.344255] 
[   34.344277] Allocated by task 296:
[   34.344307]  kasan_save_stack+0x3c/0x68
[   34.344347]  kasan_save_track+0x20/0x40
[   34.344693]  kasan_save_alloc_info+0x40/0x58
[   34.344770]  __kasan_kmalloc+0xd4/0xd8
[   34.344860]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.345016]  kasan_atomics+0xb8/0x2e0
[   34.345242]  kunit_try_run_case+0x170/0x3f0
[   34.345336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.345468]  kthread+0x328/0x630
[   34.345554]  ret_from_fork+0x10/0x20
[   34.345600] 
[   34.345623] The buggy address belongs to the object at fff00000c9708480
[   34.345623]  which belongs to the cache kmalloc-64 of size 64
[   34.345859] The buggy address is located 0 bytes to the right of
[   34.345859]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.346025] 
[   34.346077] The buggy address belongs to the physical page:
[   34.346502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.346596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.346720] page_type: f5(slab)
[   34.346760] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.346814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.346865] page dumped because: kasan: bad access detected
[   34.346897] 
[   34.346937] Memory state around the buggy address:
[   34.346991]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.347037]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.347091] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.347130]                                      ^
[   34.347166]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.347210]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.347250] ==================================================================
[   34.272413] ==================================================================
[   34.272464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   34.272518] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.272570] 
[   34.272602] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.272687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.272717] Hardware name: linux,dummy-virt (DT)
[   34.272750] Call trace:
[   34.272774]  show_stack+0x20/0x38 (C)
[   34.272823]  dump_stack_lvl+0x8c/0xd0
[   34.272872]  print_report+0x118/0x5e8
[   34.272919]  kasan_report+0xdc/0x128
[   34.272963]  __asan_report_load4_noabort+0x20/0x30
[   34.273015]  kasan_atomics_helper+0x3dd8/0x4858
[   34.273066]  kasan_atomics+0x198/0x2e0
[   34.273129]  kunit_try_run_case+0x170/0x3f0
[   34.273177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.273230]  kthread+0x328/0x630
[   34.273274]  ret_from_fork+0x10/0x20
[   34.273419] 
[   34.273462] Allocated by task 296:
[   34.273499]  kasan_save_stack+0x3c/0x68
[   34.273546]  kasan_save_track+0x20/0x40
[   34.273903]  kasan_save_alloc_info+0x40/0x58
[   34.274065]  __kasan_kmalloc+0xd4/0xd8
[   34.274134]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.274177]  kasan_atomics+0xb8/0x2e0
[   34.274381]  kunit_try_run_case+0x170/0x3f0
[   34.274420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.274472]  kthread+0x328/0x630
[   34.274682]  ret_from_fork+0x10/0x20
[   34.274753] 
[   34.274776] The buggy address belongs to the object at fff00000c9708480
[   34.274776]  which belongs to the cache kmalloc-64 of size 64
[   34.274907] The buggy address is located 0 bytes to the right of
[   34.274907]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.274990] 
[   34.275175] The buggy address belongs to the physical page:
[   34.275221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.275388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.275444] page_type: f5(slab)
[   34.275501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.275571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.275615] page dumped because: kasan: bad access detected
[   34.275648] 
[   34.275670] Memory state around the buggy address:
[   34.275702]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.275944]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.276101] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.276146]                                      ^
[   34.276206]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.276258]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.276308] ==================================================================
[   34.487095] ==================================================================
[   34.487147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   34.487989] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.488343] 
[   34.488378] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.488522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.488582] Hardware name: linux,dummy-virt (DT)
[   34.488629] Call trace:
[   34.489371]  show_stack+0x20/0x38 (C)
[   34.489705]  dump_stack_lvl+0x8c/0xd0
[   34.490280]  print_report+0x118/0x5e8
[   34.490955]  kasan_report+0xdc/0x128
[   34.491088]  __asan_report_load8_noabort+0x20/0x30
[   34.491143]  kasan_atomics_helper+0x3e10/0x4858
[   34.491195]  kasan_atomics+0x198/0x2e0
[   34.491242]  kunit_try_run_case+0x170/0x3f0
[   34.492382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.492614]  kthread+0x328/0x630
[   34.493609]  ret_from_fork+0x10/0x20
[   34.493817] 
[   34.493877] Allocated by task 296:
[   34.494047]  kasan_save_stack+0x3c/0x68
[   34.494227]  kasan_save_track+0x20/0x40
[   34.494894]  kasan_save_alloc_info+0x40/0x58
[   34.495013]  __kasan_kmalloc+0xd4/0xd8
[   34.495254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.495692]  kasan_atomics+0xb8/0x2e0
[   34.496120]  kunit_try_run_case+0x170/0x3f0
[   34.496192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.496237]  kthread+0x328/0x630
[   34.496958]  ret_from_fork+0x10/0x20
[   34.497065] 
[   34.497329] The buggy address belongs to the object at fff00000c9708480
[   34.497329]  which belongs to the cache kmalloc-64 of size 64
[   34.497502] The buggy address is located 0 bytes to the right of
[   34.497502]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.497779] 
[   34.497838] The buggy address belongs to the physical page:
[   34.498453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.498611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.498756] page_type: f5(slab)
[   34.498853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.499984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.500123] page dumped because: kasan: bad access detected
[   34.500187] 
[   34.500207] Memory state around the buggy address:
[   34.500426]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.500475]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.500521] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.501462]                                      ^
[   34.501584]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.501769]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.501857] ==================================================================
[   34.305777] ==================================================================
[   34.305825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   34.305884] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.305943] 
[   34.305983] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.306698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.306750] Hardware name: linux,dummy-virt (DT)
[   34.306785] Call trace:
[   34.307199]  show_stack+0x20/0x38 (C)
[   34.307271]  dump_stack_lvl+0x8c/0xd0
[   34.307322]  print_report+0x118/0x5e8
[   34.307565]  kasan_report+0xdc/0x128
[   34.307633]  __asan_report_store8_noabort+0x20/0x30
[   34.307748]  kasan_atomics_helper+0x3e5c/0x4858
[   34.307817]  kasan_atomics+0x198/0x2e0
[   34.307949]  kunit_try_run_case+0x170/0x3f0
[   34.308040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.308149]  kthread+0x328/0x630
[   34.308194]  ret_from_fork+0x10/0x20
[   34.308257] 
[   34.308517] Allocated by task 296:
[   34.308585]  kasan_save_stack+0x3c/0x68
[   34.308693]  kasan_save_track+0x20/0x40
[   34.308772]  kasan_save_alloc_info+0x40/0x58
[   34.309047]  __kasan_kmalloc+0xd4/0xd8
[   34.309130]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.309218]  kasan_atomics+0xb8/0x2e0
[   34.309304]  kunit_try_run_case+0x170/0x3f0
[   34.309374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.309620]  kthread+0x328/0x630
[   34.309718]  ret_from_fork+0x10/0x20
[   34.309796] 
[   34.310049] The buggy address belongs to the object at fff00000c9708480
[   34.310049]  which belongs to the cache kmalloc-64 of size 64
[   34.310206] The buggy address is located 0 bytes to the right of
[   34.310206]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.310302] 
[   34.310385] The buggy address belongs to the physical page:
[   34.310465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.310565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.310618] page_type: f5(slab)
[   34.310657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.310716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.310991] page dumped because: kasan: bad access detected
[   34.311312] 
[   34.311384] Memory state around the buggy address:
[   34.311606]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.311704]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.311806] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.311873]                                      ^
[   34.311965]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.312012]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.312160] ==================================================================
[   34.318844] ==================================================================
[   34.318911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   34.319055] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.319121] 
[   34.319160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.319252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.319310] Hardware name: linux,dummy-virt (DT)
[   34.319343] Call trace:
[   34.319367]  show_stack+0x20/0x38 (C)
[   34.319415]  dump_stack_lvl+0x8c/0xd0
[   34.319464]  print_report+0x118/0x5e8
[   34.319509]  kasan_report+0xdc/0x128
[   34.319554]  kasan_check_range+0x100/0x1a8
[   34.319602]  __kasan_check_write+0x20/0x30
[   34.319649]  kasan_atomics_helper+0xf20/0x4858
[   34.319699]  kasan_atomics+0x198/0x2e0
[   34.320303]  kunit_try_run_case+0x170/0x3f0
[   34.320383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.320521]  kthread+0x328/0x630
[   34.320673]  ret_from_fork+0x10/0x20
[   34.320728] 
[   34.320750] Allocated by task 296:
[   34.321055]  kasan_save_stack+0x3c/0x68
[   34.321222]  kasan_save_track+0x20/0x40
[   34.321323]  kasan_save_alloc_info+0x40/0x58
[   34.321401]  __kasan_kmalloc+0xd4/0xd8
[   34.321648]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.321790]  kasan_atomics+0xb8/0x2e0
[   34.321851]  kunit_try_run_case+0x170/0x3f0
[   34.321930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.322074]  kthread+0x328/0x630
[   34.322182]  ret_from_fork+0x10/0x20
[   34.322221] 
[   34.322266] The buggy address belongs to the object at fff00000c9708480
[   34.322266]  which belongs to the cache kmalloc-64 of size 64
[   34.322548] The buggy address is located 0 bytes to the right of
[   34.322548]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.322700] 
[   34.322750] The buggy address belongs to the physical page:
[   34.322988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.323148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.323236] page_type: f5(slab)
[   34.323348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.323402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.323488] page dumped because: kasan: bad access detected
[   34.323568] 
[   34.323848] Memory state around the buggy address:
[   34.324059]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.324210]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.324287] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.324398]                                      ^
[   34.324443]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.324558]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.324624] ==================================================================
[   34.445667] ==================================================================
[   34.445820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   34.445876] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.445932] 
[   34.446372] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.446724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.446818] Hardware name: linux,dummy-virt (DT)
[   34.447123] Call trace:
[   34.447441]  show_stack+0x20/0x38 (C)
[   34.448067]  dump_stack_lvl+0x8c/0xd0
[   34.448201]  print_report+0x118/0x5e8
[   34.448246]  kasan_report+0xdc/0x128
[   34.448293]  __asan_report_load8_noabort+0x20/0x30
[   34.449271]  kasan_atomics_helper+0x3df4/0x4858
[   34.449935]  kasan_atomics+0x198/0x2e0
[   34.450072]  kunit_try_run_case+0x170/0x3f0
[   34.450132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.450188]  kthread+0x328/0x630
[   34.451582]  ret_from_fork+0x10/0x20
[   34.451942] 
[   34.452001] Allocated by task 296:
[   34.452033]  kasan_save_stack+0x3c/0x68
[   34.452076]  kasan_save_track+0x20/0x40
[   34.452125]  kasan_save_alloc_info+0x40/0x58
[   34.452167]  __kasan_kmalloc+0xd4/0xd8
[   34.452922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.453618]  kasan_atomics+0xb8/0x2e0
[   34.453939]  kunit_try_run_case+0x170/0x3f0
[   34.454209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.454851]  kthread+0x328/0x630
[   34.454896]  ret_from_fork+0x10/0x20
[   34.455108] 
[   34.455626] The buggy address belongs to the object at fff00000c9708480
[   34.455626]  which belongs to the cache kmalloc-64 of size 64
[   34.455983] The buggy address is located 0 bytes to the right of
[   34.455983]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.456052] 
[   34.456075] The buggy address belongs to the physical page:
[   34.456829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.457115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.457175] page_type: f5(slab)
[   34.458046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.459115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.459247] page dumped because: kasan: bad access detected
[   34.459320] 
[   34.459353] Memory state around the buggy address:
[   34.459455]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.459757]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.460300] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.460511]                                      ^
[   34.460557]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.461116]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.463076] ==================================================================
[   34.355649] ==================================================================
[   34.355750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   34.355840] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.355972] 
[   34.356029] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.356284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.356410] Hardware name: linux,dummy-virt (DT)
[   34.356482] Call trace:
[   34.356541]  show_stack+0x20/0x38 (C)
[   34.356710]  dump_stack_lvl+0x8c/0xd0
[   34.356805]  print_report+0x118/0x5e8
[   34.356931]  kasan_report+0xdc/0x128
[   34.356986]  kasan_check_range+0x100/0x1a8
[   34.357051]  __kasan_check_write+0x20/0x30
[   34.357107]  kasan_atomics_helper+0x1190/0x4858
[   34.357157]  kasan_atomics+0x198/0x2e0
[   34.357204]  kunit_try_run_case+0x170/0x3f0
[   34.357252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.357359]  kthread+0x328/0x630
[   34.357404]  ret_from_fork+0x10/0x20
[   34.357469] 
[   34.357490] Allocated by task 296:
[   34.357530]  kasan_save_stack+0x3c/0x68
[   34.357590]  kasan_save_track+0x20/0x40
[   34.357628]  kasan_save_alloc_info+0x40/0x58
[   34.357668]  __kasan_kmalloc+0xd4/0xd8
[   34.357706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.357749]  kasan_atomics+0xb8/0x2e0
[   34.357788]  kunit_try_run_case+0x170/0x3f0
[   34.357833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.357888]  kthread+0x328/0x630
[   34.357922]  ret_from_fork+0x10/0x20
[   34.357960] 
[   34.357990] The buggy address belongs to the object at fff00000c9708480
[   34.357990]  which belongs to the cache kmalloc-64 of size 64
[   34.358053] The buggy address is located 0 bytes to the right of
[   34.358053]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.358654] 
[   34.358695] The buggy address belongs to the physical page:
[   34.358818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.358916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.359213] page_type: f5(slab)
[   34.359280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.359419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.359490] page dumped because: kasan: bad access detected
[   34.359530] 
[   34.359550] Memory state around the buggy address:
[   34.359900]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.360000]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.360269] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.360314]                                      ^
[   34.360380]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.360443]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.360550] ==================================================================
[   34.368787] ==================================================================
[   34.368838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   34.368891] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.368967] 
[   34.368998] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.369550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.369610] Hardware name: linux,dummy-virt (DT)
[   34.369644] Call trace:
[   34.369868]  show_stack+0x20/0x38 (C)
[   34.369943]  dump_stack_lvl+0x8c/0xd0
[   34.370002]  print_report+0x118/0x5e8
[   34.370165]  kasan_report+0xdc/0x128
[   34.370221]  kasan_check_range+0x100/0x1a8
[   34.370340]  __kasan_check_write+0x20/0x30
[   34.370395]  kasan_atomics_helper+0x126c/0x4858
[   34.370447]  kasan_atomics+0x198/0x2e0
[   34.370501]  kunit_try_run_case+0x170/0x3f0
[   34.370624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.370681]  kthread+0x328/0x630
[   34.370724]  ret_from_fork+0x10/0x20
[   34.370910] 
[   34.371043] Allocated by task 296:
[   34.371094]  kasan_save_stack+0x3c/0x68
[   34.371138]  kasan_save_track+0x20/0x40
[   34.371378]  kasan_save_alloc_info+0x40/0x58
[   34.371583]  __kasan_kmalloc+0xd4/0xd8
[   34.371628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.371753]  kasan_atomics+0xb8/0x2e0
[   34.371815]  kunit_try_run_case+0x170/0x3f0
[   34.371878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.371932]  kthread+0x328/0x630
[   34.371966]  ret_from_fork+0x10/0x20
[   34.372219] 
[   34.372353] The buggy address belongs to the object at fff00000c9708480
[   34.372353]  which belongs to the cache kmalloc-64 of size 64
[   34.372438] The buggy address is located 0 bytes to the right of
[   34.372438]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.372701] 
[   34.372771] The buggy address belongs to the physical page:
[   34.372867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.372940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.373048] page_type: f5(slab)
[   34.373102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.373337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.373524] page dumped because: kasan: bad access detected
[   34.373598] 
[   34.373657] Memory state around the buggy address:
[   34.373907]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.374169]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.374235] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.374299]                                      ^
[   34.374408]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.374653]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.374735] ==================================================================
[   34.431891] ==================================================================
[   34.432025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   34.432110] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.432160] 
[   34.432192] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.432552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.432675] Hardware name: linux,dummy-virt (DT)
[   34.432710] Call trace:
[   34.432733]  show_stack+0x20/0x38 (C)
[   34.432786]  dump_stack_lvl+0x8c/0xd0
[   34.432835]  print_report+0x118/0x5e8
[   34.432882]  kasan_report+0xdc/0x128
[   34.433276]  __asan_report_load8_noabort+0x20/0x30
[   34.433402]  kasan_atomics_helper+0x3db0/0x4858
[   34.433591]  kasan_atomics+0x198/0x2e0
[   34.433641]  kunit_try_run_case+0x170/0x3f0
[   34.434074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.434144]  kthread+0x328/0x630
[   34.434190]  ret_from_fork+0x10/0x20
[   34.434240] 
[   34.434508] Allocated by task 296:
[   34.434642]  kasan_save_stack+0x3c/0x68
[   34.434703]  kasan_save_track+0x20/0x40
[   34.434791]  kasan_save_alloc_info+0x40/0x58
[   34.434851]  __kasan_kmalloc+0xd4/0xd8
[   34.434995]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.435090]  kasan_atomics+0xb8/0x2e0
[   34.435129]  kunit_try_run_case+0x170/0x3f0
[   34.435168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.435213]  kthread+0x328/0x630
[   34.435246]  ret_from_fork+0x10/0x20
[   34.435284] 
[   34.435307] The buggy address belongs to the object at fff00000c9708480
[   34.435307]  which belongs to the cache kmalloc-64 of size 64
[   34.435397] The buggy address is located 0 bytes to the right of
[   34.435397]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.435847] 
[   34.436057] The buggy address belongs to the physical page:
[   34.436294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.436490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.436539] page_type: f5(slab)
[   34.436578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.436833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.436882] page dumped because: kasan: bad access detected
[   34.436915] 
[   34.436935] Memory state around the buggy address:
[   34.437354]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.437418]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.437779] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.437902]                                      ^
[   34.437940]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.437985]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.438029] ==================================================================
[   34.424852] ==================================================================
[   34.424946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   34.425297] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.425355] 
[   34.425385] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.425470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.425498] Hardware name: linux,dummy-virt (DT)
[   34.425530] Call trace:
[   34.425553]  show_stack+0x20/0x38 (C)
[   34.425613]  dump_stack_lvl+0x8c/0xd0
[   34.425744]  print_report+0x118/0x5e8
[   34.425832]  kasan_report+0xdc/0x128
[   34.426028]  kasan_check_range+0x100/0x1a8
[   34.426179]  __kasan_check_write+0x20/0x30
[   34.426354]  kasan_atomics_helper+0x15b4/0x4858
[   34.426582]  kasan_atomics+0x198/0x2e0
[   34.426738]  kunit_try_run_case+0x170/0x3f0
[   34.426786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.426847]  kthread+0x328/0x630
[   34.427047]  ret_from_fork+0x10/0x20
[   34.427466] 
[   34.427571] Allocated by task 296:
[   34.427671]  kasan_save_stack+0x3c/0x68
[   34.428511]  kasan_save_track+0x20/0x40
[   34.428741]  kasan_save_alloc_info+0x40/0x58
[   34.428785]  __kasan_kmalloc+0xd4/0xd8
[   34.428822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.428864]  kasan_atomics+0xb8/0x2e0
[   34.428905]  kunit_try_run_case+0x170/0x3f0
[   34.428946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.429137]  kthread+0x328/0x630
[   34.429187]  ret_from_fork+0x10/0x20
[   34.429226] 
[   34.429250] The buggy address belongs to the object at fff00000c9708480
[   34.429250]  which belongs to the cache kmalloc-64 of size 64
[   34.429311] The buggy address is located 0 bytes to the right of
[   34.429311]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.429385] 
[   34.429408] The buggy address belongs to the physical page:
[   34.429441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.429753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.429869] page_type: f5(slab)
[   34.429908] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.430056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.430204] page dumped because: kasan: bad access detected
[   34.430343] 
[   34.430365] Memory state around the buggy address:
[   34.430420]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.430487]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.430531] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.430571]                                      ^
[   34.431021]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.431141]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.431209] ==================================================================
[   34.145697] ==================================================================
[   34.145757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   34.145823] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.145875] 
[   34.145906] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.145992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.146030] Hardware name: linux,dummy-virt (DT)
[   34.146061] Call trace:
[   34.146100]  show_stack+0x20/0x38 (C)
[   34.146148]  dump_stack_lvl+0x8c/0xd0
[   34.146196]  print_report+0x118/0x5e8
[   34.146240]  kasan_report+0xdc/0x128
[   34.146296]  kasan_check_range+0x100/0x1a8
[   34.146342]  __kasan_check_write+0x20/0x30
[   34.146389]  kasan_atomics_helper+0x6ec/0x4858
[   34.146439]  kasan_atomics+0x198/0x2e0
[   34.146485]  kunit_try_run_case+0x170/0x3f0
[   34.146532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.146584]  kthread+0x328/0x630
[   34.146640]  ret_from_fork+0x10/0x20
[   34.146693] 
[   34.146715] Allocated by task 296:
[   34.146743]  kasan_save_stack+0x3c/0x68
[   34.146782]  kasan_save_track+0x20/0x40
[   34.146829]  kasan_save_alloc_info+0x40/0x58
[   34.146867]  __kasan_kmalloc+0xd4/0xd8
[   34.146904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.146945]  kasan_atomics+0xb8/0x2e0
[   34.147071]  kthread+0x328/0x630
[   34.147115]  ret_from_fork+0x10/0x20
[   34.147151] 
[   34.147428] The buggy address is located 0 bytes to the right of
[   34.147428]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.148019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.148874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.149460]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.149510] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.149717]                                      ^
[   34.149784]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.149935]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.152029] ==================================================================
[   34.276645] ==================================================================
[   34.276717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   34.276858] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.276945] 
[   34.276993] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.277312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.277366] Hardware name: linux,dummy-virt (DT)
[   34.277550] Call trace:
[   34.277581]  show_stack+0x20/0x38 (C)
[   34.277633]  dump_stack_lvl+0x8c/0xd0
[   34.277751]  print_report+0x118/0x5e8
[   34.277827]  kasan_report+0xdc/0x128
[   34.277882]  kasan_check_range+0x100/0x1a8
[   34.277937]  __kasan_check_write+0x20/0x30
[   34.278207]  kasan_atomics_helper+0xd3c/0x4858
[   34.278543]  kasan_atomics+0x198/0x2e0
[   34.278639]  kunit_try_run_case+0x170/0x3f0
[   34.278700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.278754]  kthread+0x328/0x630
[   34.278797]  ret_from_fork+0x10/0x20
[   34.278845] 
[   34.279032] Allocated by task 296:
[   34.279118]  kasan_save_stack+0x3c/0x68
[   34.279346]  kasan_save_track+0x20/0x40
[   34.279397]  kasan_save_alloc_info+0x40/0x58
[   34.279474]  __kasan_kmalloc+0xd4/0xd8
[   34.279511]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.279555]  kasan_atomics+0xb8/0x2e0
[   34.279595]  kunit_try_run_case+0x170/0x3f0
[   34.279695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.279909]  kthread+0x328/0x630
[   34.279948]  ret_from_fork+0x10/0x20
[   34.279992] 
[   34.280041] The buggy address belongs to the object at fff00000c9708480
[   34.280041]  which belongs to the cache kmalloc-64 of size 64
[   34.280208] The buggy address is located 0 bytes to the right of
[   34.280208]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.280279] 
[   34.280301] The buggy address belongs to the physical page:
[   34.280343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.280587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.280742] page_type: f5(slab)
[   34.280831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.281108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.281183] page dumped because: kasan: bad access detected
[   34.281248] 
[   34.281292] Memory state around the buggy address:
[   34.281390]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.281475]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.281535] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.281646]                                      ^
[   34.281689]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.281734]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.281780] ==================================================================
[   34.401950] ==================================================================
[   34.401996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   34.402053] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.402115] 
[   34.402494] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.402948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.403520] Hardware name: linux,dummy-virt (DT)
[   34.403558] Call trace:
[   34.403581]  show_stack+0x20/0x38 (C)
[   34.403632]  dump_stack_lvl+0x8c/0xd0
[   34.403679]  print_report+0x118/0x5e8
[   34.403779]  kasan_report+0xdc/0x128
[   34.403823]  kasan_check_range+0x100/0x1a8
[   34.403869]  __kasan_check_write+0x20/0x30
[   34.403916]  kasan_atomics_helper+0x147c/0x4858
[   34.404108]  kasan_atomics+0x198/0x2e0
[   34.404170]  kunit_try_run_case+0x170/0x3f0
[   34.404217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.404503]  kthread+0x328/0x630
[   34.404557]  ret_from_fork+0x10/0x20
[   34.405025] 
[   34.405055] Allocated by task 296:
[   34.405098]  kasan_save_stack+0x3c/0x68
[   34.405141]  kasan_save_track+0x20/0x40
[   34.405195]  kasan_save_alloc_info+0x40/0x58
[   34.405235]  __kasan_kmalloc+0xd4/0xd8
[   34.405380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.405433]  kasan_atomics+0xb8/0x2e0
[   34.405473]  kunit_try_run_case+0x170/0x3f0
[   34.406043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.406357]  kthread+0x328/0x630
[   34.406396]  ret_from_fork+0x10/0x20
[   34.406653] 
[   34.406722] The buggy address belongs to the object at fff00000c9708480
[   34.406722]  which belongs to the cache kmalloc-64 of size 64
[   34.407140] The buggy address is located 0 bytes to the right of
[   34.407140]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.407405] 
[   34.407456] The buggy address belongs to the physical page:
[   34.407548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.407602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.407685] page_type: f5(slab)
[   34.407768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.407820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.407879] page dumped because: kasan: bad access detected
[   34.407911] 
[   34.408093] Memory state around the buggy address:
[   34.408134]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.408181]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.408227] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.408268]                                      ^
[   34.408819]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.408901]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.409131] ==================================================================
[   34.301270] ==================================================================
[   34.301322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   34.301436] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.301491] 
[   34.301549] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.301953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.302003] Hardware name: linux,dummy-virt (DT)
[   34.302042] Call trace:
[   34.302068]  show_stack+0x20/0x38 (C)
[   34.302131]  dump_stack_lvl+0x8c/0xd0
[   34.302181]  print_report+0x118/0x5e8
[   34.302226]  kasan_report+0xdc/0x128
[   34.302467]  kasan_check_range+0x100/0x1a8
[   34.302533]  __kasan_check_write+0x20/0x30
[   34.302641]  kasan_atomics_helper+0xe44/0x4858
[   34.302695]  kasan_atomics+0x198/0x2e0
[   34.302918]  kunit_try_run_case+0x170/0x3f0
[   34.302997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.303107]  kthread+0x328/0x630
[   34.303162]  ret_from_fork+0x10/0x20
[   34.303380] 
[   34.303528] Allocated by task 296:
[   34.303563]  kasan_save_stack+0x3c/0x68
[   34.303608]  kasan_save_track+0x20/0x40
[   34.303711]  kasan_save_alloc_info+0x40/0x58
[   34.303796]  __kasan_kmalloc+0xd4/0xd8
[   34.304030]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.304099]  kasan_atomics+0xb8/0x2e0
[   34.304146]  kunit_try_run_case+0x170/0x3f0
[   34.304270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.304322]  kthread+0x328/0x630
[   34.304576]  ret_from_fork+0x10/0x20
[   34.304637] 
[   34.304662] The buggy address belongs to the object at fff00000c9708480
[   34.304662]  which belongs to the cache kmalloc-64 of size 64
[   34.304727] The buggy address is located 0 bytes to the right of
[   34.304727]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.304811] 
[   34.304836] The buggy address belongs to the physical page:
[   34.304873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.304927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.304977] page_type: f5(slab)
[   34.305029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.305097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.305149] page dumped because: kasan: bad access detected
[   34.305182] 
[   34.305207] Memory state around the buggy address:
[   34.305252]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.305306]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.305355] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.305404]                                      ^
[   34.305455]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.305516]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.305556] ==================================================================
[   34.410641] ==================================================================
[   34.410692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   34.410744] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.410794] 
[   34.410824] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.410909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.410938] Hardware name: linux,dummy-virt (DT)
[   34.410970] Call trace:
[   34.410993]  show_stack+0x20/0x38 (C)
[   34.411203]  dump_stack_lvl+0x8c/0xd0
[   34.411408]  print_report+0x118/0x5e8
[   34.411607]  kasan_report+0xdc/0x128
[   34.411960]  kasan_check_range+0x100/0x1a8
[   34.412011]  __kasan_check_write+0x20/0x30
[   34.412059]  kasan_atomics_helper+0x14e4/0x4858
[   34.412120]  kasan_atomics+0x198/0x2e0
[   34.412168]  kunit_try_run_case+0x170/0x3f0
[   34.412215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.413033]  kthread+0x328/0x630
[   34.413150]  ret_from_fork+0x10/0x20
[   34.413235] 
[   34.413334] Allocated by task 296:
[   34.413393]  kasan_save_stack+0x3c/0x68
[   34.413433]  kasan_save_track+0x20/0x40
[   34.413471]  kasan_save_alloc_info+0x40/0x58
[   34.413551]  __kasan_kmalloc+0xd4/0xd8
[   34.413589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.413642]  kasan_atomics+0xb8/0x2e0
[   34.413743]  kunit_try_run_case+0x170/0x3f0
[   34.413823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.413984]  kthread+0x328/0x630
[   34.414035]  ret_from_fork+0x10/0x20
[   34.414090] 
[   34.414112] The buggy address belongs to the object at fff00000c9708480
[   34.414112]  which belongs to the cache kmalloc-64 of size 64
[   34.414172] The buggy address is located 0 bytes to the right of
[   34.414172]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.414237] 
[   34.414260] The buggy address belongs to the physical page:
[   34.414294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.414346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.414395] page_type: f5(slab)
[   34.414433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.414737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.415019] page dumped because: kasan: bad access detected
[   34.415057] 
[   34.415089] Memory state around the buggy address:
[   34.415321]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.415439]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.415558] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.415639]                                      ^
[   34.415769]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.415814]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.415873] ==================================================================
[   34.325553] ==================================================================
[   34.325614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   34.325664] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.325714] 
[   34.325931] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.326105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.326139] Hardware name: linux,dummy-virt (DT)
[   34.326173] Call trace:
[   34.326199]  show_stack+0x20/0x38 (C)
[   34.326415]  dump_stack_lvl+0x8c/0xd0
[   34.326547]  print_report+0x118/0x5e8
[   34.326614]  kasan_report+0xdc/0x128
[   34.326669]  kasan_check_range+0x100/0x1a8
[   34.326868]  __kasan_check_write+0x20/0x30
[   34.326941]  kasan_atomics_helper+0xf88/0x4858
[   34.327025]  kasan_atomics+0x198/0x2e0
[   34.327095]  kunit_try_run_case+0x170/0x3f0
[   34.327190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.327246]  kthread+0x328/0x630
[   34.327313]  ret_from_fork+0x10/0x20
[   34.327402] 
[   34.327442] Allocated by task 296:
[   34.327490]  kasan_save_stack+0x3c/0x68
[   34.327644]  kasan_save_track+0x20/0x40
[   34.327688]  kasan_save_alloc_info+0x40/0x58
[   34.327749]  __kasan_kmalloc+0xd4/0xd8
[   34.327870]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.327955]  kasan_atomics+0xb8/0x2e0
[   34.328066]  kunit_try_run_case+0x170/0x3f0
[   34.328119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.328164]  kthread+0x328/0x630
[   34.328201]  ret_from_fork+0x10/0x20
[   34.328237] 
[   34.328260] The buggy address belongs to the object at fff00000c9708480
[   34.328260]  which belongs to the cache kmalloc-64 of size 64
[   34.328318] The buggy address is located 0 bytes to the right of
[   34.328318]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.328395] 
[   34.328441] The buggy address belongs to the physical page:
[   34.328481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.328533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.328592] page_type: f5(slab)
[   34.328647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.328699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.328740] page dumped because: kasan: bad access detected
[   34.328774] 
[   34.328794] Memory state around the buggy address:
[   34.328834]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.328888]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.328932] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.328982]                                      ^
[   34.329015]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.329062]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.329510] ==================================================================
[   34.381857] ==================================================================
[   34.382590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   34.382661] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.382721] 
[   34.382882] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.383063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.383182] Hardware name: linux,dummy-virt (DT)
[   34.383222] Call trace:
[   34.383342]  show_stack+0x20/0x38 (C)
[   34.383408]  dump_stack_lvl+0x8c/0xd0
[   34.383464]  print_report+0x118/0x5e8
[   34.383685]  kasan_report+0xdc/0x128
[   34.383790]  kasan_check_range+0x100/0x1a8
[   34.383836]  __kasan_check_write+0x20/0x30
[   34.383882]  kasan_atomics_helper+0x1384/0x4858
[   34.383934]  kasan_atomics+0x198/0x2e0
[   34.384102]  kunit_try_run_case+0x170/0x3f0
[   34.384160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.384214]  kthread+0x328/0x630
[   34.384257]  ret_from_fork+0x10/0x20
[   34.384305] 
[   34.384326] Allocated by task 296:
[   34.384693]  kasan_save_stack+0x3c/0x68
[   34.384792]  kasan_save_track+0x20/0x40
[   34.384831]  kasan_save_alloc_info+0x40/0x58
[   34.384871]  __kasan_kmalloc+0xd4/0xd8
[   34.384908]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.384949]  kasan_atomics+0xb8/0x2e0
[   34.385247]  kunit_try_run_case+0x170/0x3f0
[   34.385337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.385384]  kthread+0x328/0x630
[   34.385417]  ret_from_fork+0x10/0x20
[   34.385455] 
[   34.385488] The buggy address belongs to the object at fff00000c9708480
[   34.385488]  which belongs to the cache kmalloc-64 of size 64
[   34.385549] The buggy address is located 0 bytes to the right of
[   34.385549]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.385794] 
[   34.386218] The buggy address belongs to the physical page:
[   34.386275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.386332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.386405] page_type: f5(slab)
[   34.386503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.386555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.386597] page dumped because: kasan: bad access detected
[   34.386629] 
[   34.386651] Memory state around the buggy address:
[   34.386733]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.386812]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.386892] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.387012]                                      ^
[   34.387373]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.387692]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.387750] ==================================================================
[   34.337419] ==================================================================
[   34.337483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   34.337569] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.337643] 
[   34.337702] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.337925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.337954] Hardware name: linux,dummy-virt (DT)
[   34.338004] Call trace:
[   34.338034]  show_stack+0x20/0x38 (C)
[   34.338096]  dump_stack_lvl+0x8c/0xd0
[   34.338179]  print_report+0x118/0x5e8
[   34.338238]  kasan_report+0xdc/0x128
[   34.338282]  kasan_check_range+0x100/0x1a8
[   34.338356]  __kasan_check_write+0x20/0x30
[   34.338415]  kasan_atomics_helper+0x1058/0x4858
[   34.338475]  kasan_atomics+0x198/0x2e0
[   34.338523]  kunit_try_run_case+0x170/0x3f0
[   34.338570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.338623]  kthread+0x328/0x630
[   34.338674]  ret_from_fork+0x10/0x20
[   34.338722] 
[   34.338744] Allocated by task 296:
[   34.338772]  kasan_save_stack+0x3c/0x68
[   34.338812]  kasan_save_track+0x20/0x40
[   34.338850]  kasan_save_alloc_info+0x40/0x58
[   34.338889]  __kasan_kmalloc+0xd4/0xd8
[   34.338925]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.338968]  kasan_atomics+0xb8/0x2e0
[   34.339016]  kunit_try_run_case+0x170/0x3f0
[   34.339055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.339523]  kthread+0x328/0x630
[   34.339575]  ret_from_fork+0x10/0x20
[   34.339613] 
[   34.339637] The buggy address belongs to the object at fff00000c9708480
[   34.339637]  which belongs to the cache kmalloc-64 of size 64
[   34.339846] The buggy address is located 0 bytes to the right of
[   34.339846]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.340069] 
[   34.340152] The buggy address belongs to the physical page:
[   34.340239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.340324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.340538] page_type: f5(slab)
[   34.340667] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.340757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.340845] page dumped because: kasan: bad access detected
[   34.340979] 
[   34.341000] Memory state around the buggy address:
[   34.341034]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.341233]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.341397] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.341474]                                      ^
[   34.341601]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.341675]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.341897] ==================================================================
[   34.465498] ==================================================================
[   34.465551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   34.467477] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.467628] 
[   34.467663] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.467760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.467789] Hardware name: linux,dummy-virt (DT)
[   34.467822] Call trace:
[   34.467846]  show_stack+0x20/0x38 (C)
[   34.467900]  dump_stack_lvl+0x8c/0xd0
[   34.469558]  print_report+0x118/0x5e8
[   34.469824]  kasan_report+0xdc/0x128
[   34.470348]  kasan_check_range+0x100/0x1a8
[   34.471028]  __kasan_check_write+0x20/0x30
[   34.471225]  kasan_atomics_helper+0x16d0/0x4858
[   34.471277]  kasan_atomics+0x198/0x2e0
[   34.471327]  kunit_try_run_case+0x170/0x3f0
[   34.471375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.472323]  kthread+0x328/0x630
[   34.472846]  ret_from_fork+0x10/0x20
[   34.473473] 
[   34.473734] Allocated by task 296:
[   34.473771]  kasan_save_stack+0x3c/0x68
[   34.474301]  kasan_save_track+0x20/0x40
[   34.474726]  kasan_save_alloc_info+0x40/0x58
[   34.474784]  __kasan_kmalloc+0xd4/0xd8
[   34.474821]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.474864]  kasan_atomics+0xb8/0x2e0
[   34.475763]  kunit_try_run_case+0x170/0x3f0
[   34.475831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.475879]  kthread+0x328/0x630
[   34.475915]  ret_from_fork+0x10/0x20
[   34.475954] 
[   34.475977] The buggy address belongs to the object at fff00000c9708480
[   34.475977]  which belongs to the cache kmalloc-64 of size 64
[   34.476038] The buggy address is located 0 bytes to the right of
[   34.476038]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.477239] 
[   34.477619] The buggy address belongs to the physical page:
[   34.477991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.478523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.478584] page_type: f5(slab)
[   34.478625] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.479216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.479869] page dumped because: kasan: bad access detected
[   34.479914] 
[   34.479936] Memory state around the buggy address:
[   34.481060]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.481368]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.481614] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.482409]                                      ^
[   34.482464]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.482611]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.482785] ==================================================================
[   34.136980] ==================================================================
[   34.137268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   34.137331] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.137386] 
[   34.137491] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.137585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.137862] Hardware name: linux,dummy-virt (DT)
[   34.137923] Call trace:
[   34.137950]  show_stack+0x20/0x38 (C)
[   34.138007]  dump_stack_lvl+0x8c/0xd0
[   34.138353]  print_report+0x118/0x5e8
[   34.138431]  kasan_report+0xdc/0x128
[   34.138700]  kasan_check_range+0x100/0x1a8
[   34.138844]  __kasan_check_write+0x20/0x30
[   34.138899]  kasan_atomics_helper+0x684/0x4858
[   34.138951]  kasan_atomics+0x198/0x2e0
[   34.139157]  kunit_try_run_case+0x170/0x3f0
[   34.139325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.139393]  kthread+0x328/0x630
[   34.139438]  ret_from_fork+0x10/0x20
[   34.139731] 
[   34.139783] Allocated by task 296:
[   34.139924]  kasan_save_stack+0x3c/0x68
[   34.139992]  kasan_save_track+0x20/0x40
[   34.140031]  kasan_save_alloc_info+0x40/0x58
[   34.140076]  __kasan_kmalloc+0xd4/0xd8
[   34.140123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.140710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.140784]  kthread+0x328/0x630
[   34.140826]  ret_from_fork+0x10/0x20
[   34.141125] 
[   34.141213] The buggy address belongs to the object at fff00000c9708480
[   34.141213]  which belongs to the cache kmalloc-64 of size 64
[   34.141554] 
[   34.141684] The buggy address belongs to the physical page:
[   34.141789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.142164] page_type: f5(slab)
[   34.142242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.142621] page dumped because: kasan: bad access detected
[   34.142765] 
[   34.142849] Memory state around the buggy address:
[   34.143164] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.143216]                                      ^
[   34.143295]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.143570]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.143625] ==================================================================
[   34.361639] ==================================================================
[   34.361853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   34.362035] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.362117] 
[   34.362178] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.362350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.362409] Hardware name: linux,dummy-virt (DT)
[   34.362444] Call trace:
[   34.362546]  show_stack+0x20/0x38 (C)
[   34.362599]  dump_stack_lvl+0x8c/0xd0
[   34.362648]  print_report+0x118/0x5e8
[   34.362692]  kasan_report+0xdc/0x128
[   34.362951]  kasan_check_range+0x100/0x1a8
[   34.363107]  __kasan_check_write+0x20/0x30
[   34.363176]  kasan_atomics_helper+0x11f8/0x4858
[   34.363396]  kasan_atomics+0x198/0x2e0
[   34.363593]  kunit_try_run_case+0x170/0x3f0
[   34.363675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.363800]  kthread+0x328/0x630
[   34.363877]  ret_from_fork+0x10/0x20
[   34.364072] 
[   34.364150] Allocated by task 296:
[   34.364387]  kasan_save_stack+0x3c/0x68
[   34.364666]  kasan_save_track+0x20/0x40
[   34.364713]  kasan_save_alloc_info+0x40/0x58
[   34.364762]  __kasan_kmalloc+0xd4/0xd8
[   34.364800]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.364843]  kasan_atomics+0xb8/0x2e0
[   34.364960]  kunit_try_run_case+0x170/0x3f0
[   34.365038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.365180]  kthread+0x328/0x630
[   34.365279]  ret_from_fork+0x10/0x20
[   34.365608] 
[   34.365664] The buggy address belongs to the object at fff00000c9708480
[   34.365664]  which belongs to the cache kmalloc-64 of size 64
[   34.365758] The buggy address is located 0 bytes to the right of
[   34.365758]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.365907] 
[   34.365965] The buggy address belongs to the physical page:
[   34.366192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.366365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.366458] page_type: f5(slab)
[   34.366526] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.366761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.366949] page dumped because: kasan: bad access detected
[   34.367020] 
[   34.367119] Memory state around the buggy address:
[   34.367157]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.367420]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.367558] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.367626]                                      ^
[   34.367873]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.368063]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.368151] ==================================================================
[   34.313160] ==================================================================
[   34.313216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   34.313276] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.313392] 
[   34.313452] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.313569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.313600] Hardware name: linux,dummy-virt (DT)
[   34.313630] Call trace:
[   34.313654]  show_stack+0x20/0x38 (C)
[   34.313877]  dump_stack_lvl+0x8c/0xd0
[   34.313942]  print_report+0x118/0x5e8
[   34.314050]  kasan_report+0xdc/0x128
[   34.314136]  kasan_check_range+0x100/0x1a8
[   34.314353]  __kasan_check_write+0x20/0x30
[   34.314456]  kasan_atomics_helper+0xeb8/0x4858
[   34.314512]  kasan_atomics+0x198/0x2e0
[   34.314558]  kunit_try_run_case+0x170/0x3f0
[   34.314612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.314664]  kthread+0x328/0x630
[   34.314826]  ret_from_fork+0x10/0x20
[   34.314890] 
[   34.315026] Allocated by task 296:
[   34.315075]  kasan_save_stack+0x3c/0x68
[   34.315195]  kasan_save_track+0x20/0x40
[   34.315244]  kasan_save_alloc_info+0x40/0x58
[   34.315299]  __kasan_kmalloc+0xd4/0xd8
[   34.315337]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.315387]  kasan_atomics+0xb8/0x2e0
[   34.315425]  kunit_try_run_case+0x170/0x3f0
[   34.315465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.315609]  kthread+0x328/0x630
[   34.315657]  ret_from_fork+0x10/0x20
[   34.315696] 
[   34.315992] The buggy address belongs to the object at fff00000c9708480
[   34.315992]  which belongs to the cache kmalloc-64 of size 64
[   34.316127] The buggy address is located 0 bytes to the right of
[   34.316127]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.316432] 
[   34.316583] The buggy address belongs to the physical page:
[   34.316642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.316769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.316909] page_type: f5(slab)
[   34.317030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.317093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.317136] page dumped because: kasan: bad access detected
[   34.317175] 
[   34.317195] Memory state around the buggy address:
[   34.317227]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.317491]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.317597] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.317666]                                      ^
[   34.317861]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.318108]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.318197] ==================================================================
[   34.330553] ==================================================================
[   34.330607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   34.330659] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.330719] 
[   34.330749] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.331071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.331192] Hardware name: linux,dummy-virt (DT)
[   34.331248] Call trace:
[   34.331275]  show_stack+0x20/0x38 (C)
[   34.331331]  dump_stack_lvl+0x8c/0xd0
[   34.331524]  print_report+0x118/0x5e8
[   34.331810]  kasan_report+0xdc/0x128
[   34.331874]  kasan_check_range+0x100/0x1a8
[   34.331952]  __kasan_check_write+0x20/0x30
[   34.332040]  kasan_atomics_helper+0xff0/0x4858
[   34.332121]  kasan_atomics+0x198/0x2e0
[   34.332224]  kunit_try_run_case+0x170/0x3f0
[   34.332374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.332471]  kthread+0x328/0x630
[   34.332579]  ret_from_fork+0x10/0x20
[   34.332630] 
[   34.332666] Allocated by task 296:
[   34.332701]  kasan_save_stack+0x3c/0x68
[   34.332977]  kasan_save_track+0x20/0x40
[   34.333050]  kasan_save_alloc_info+0x40/0x58
[   34.333530]  __kasan_kmalloc+0xd4/0xd8
[   34.333614]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.333678]  kasan_atomics+0xb8/0x2e0
[   34.333751]  kunit_try_run_case+0x170/0x3f0
[   34.333979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.334075]  kthread+0x328/0x630
[   34.334205]  ret_from_fork+0x10/0x20
[   34.334246] 
[   34.334275] The buggy address belongs to the object at fff00000c9708480
[   34.334275]  which belongs to the cache kmalloc-64 of size 64
[   34.334552] The buggy address is located 0 bytes to the right of
[   34.334552]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.334675] 
[   34.334724] The buggy address belongs to the physical page:
[   34.334787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.334950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.335138] page_type: f5(slab)
[   34.335213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.335280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.335393] page dumped because: kasan: bad access detected
[   34.335462] 
[   34.335536] Memory state around the buggy address:
[   34.335575]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.335620]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.335908] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.336023]                                      ^
[   34.336102]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.336191]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.336444] ==================================================================
[   34.172580] ==================================================================
[   34.172633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   34.172765] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.172819] 
[   34.172877] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.172969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.172997] Hardware name: linux,dummy-virt (DT)
[   34.173337] Call trace:
[   34.173387]  show_stack+0x20/0x38 (C)
[   34.173453]  dump_stack_lvl+0x8c/0xd0
[   34.173574]  print_report+0x118/0x5e8
[   34.173638]  kasan_report+0xdc/0x128
[   34.173705]  __asan_report_load4_noabort+0x20/0x30
[   34.176866] page_type: f5(slab)
[   34.178033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.181623]  kasan_save_alloc_info+0x40/0x58
[   34.181689]  __kasan_kmalloc+0xd4/0xd8
[   34.182037]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.182161]  kasan_atomics+0xb8/0x2e0
[   34.182218]  kunit_try_run_case+0x170/0x3f0
[   34.182297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.182675]  kthread+0x328/0x630
[   34.182749]  ret_from_fork+0x10/0x20
[   34.183033] 
[   34.183071] The buggy address belongs to the object at fff00000c9708480
[   34.183071]  which belongs to the cache kmalloc-64 of size 64
[   34.183169] The buggy address is located 0 bytes to the right of
[   34.183169]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.183302] 
[   34.183381] The buggy address belongs to the physical page:
[   34.183738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.183816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.183933] page_type: f5(slab)
[   34.184017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.184328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.184541] page dumped because: kasan: bad access detected
[   34.184616] 
[   34.184646] Memory state around the buggy address:
[   34.184932]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.185011]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.185815]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.190271]  kasan_save_alloc_info+0x40/0x58
[   34.194675]  kasan_atomics+0x198/0x2e0
[   34.196971] 
[   34.197032] The buggy address belongs to the physical page:
[   34.197140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.197196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.197248] page_type: f5(slab)
[   34.197287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.197574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.198041] page dumped because: kasan: bad access detected
[   34.198157] 
[   34.198216] Memory state around the buggy address:
[   34.198337]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.198386]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.198456] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.198757]                                      ^
[   34.198825]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.198908]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.198963] ==================================================================
[   34.396860] ==================================================================
[   34.396917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   34.396970] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.397022] 
[   34.397059] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.397461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.397601] Hardware name: linux,dummy-virt (DT)
[   34.397755] Call trace:
[   34.397801]  show_stack+0x20/0x38 (C)
[   34.397850]  dump_stack_lvl+0x8c/0xd0
[   34.397899]  print_report+0x118/0x5e8
[   34.397942]  kasan_report+0xdc/0x128
[   34.397988]  kasan_check_range+0x100/0x1a8
[   34.398046]  __kasan_check_write+0x20/0x30
[   34.398123]  kasan_atomics_helper+0x1414/0x4858
[   34.398173]  kasan_atomics+0x198/0x2e0
[   34.398220]  kunit_try_run_case+0x170/0x3f0
[   34.398267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.398320]  kthread+0x328/0x630
[   34.398457]  ret_from_fork+0x10/0x20
[   34.398680] 
[   34.398736] Allocated by task 296:
[   34.398768]  kasan_save_stack+0x3c/0x68
[   34.398810]  kasan_save_track+0x20/0x40
[   34.398848]  kasan_save_alloc_info+0x40/0x58
[   34.399378]  __kasan_kmalloc+0xd4/0xd8
[   34.399442]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.399574]  kasan_atomics+0xb8/0x2e0
[   34.399673]  kunit_try_run_case+0x170/0x3f0
[   34.399815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.399904]  kthread+0x328/0x630
[   34.399940]  ret_from_fork+0x10/0x20
[   34.400090] 
[   34.400115] The buggy address belongs to the object at fff00000c9708480
[   34.400115]  which belongs to the cache kmalloc-64 of size 64
[   34.400265] The buggy address is located 0 bytes to the right of
[   34.400265]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.400399] 
[   34.400469] The buggy address belongs to the physical page:
[   34.400519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.400572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.400659] page_type: f5(slab)
[   34.400741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.400792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.400933] page dumped because: kasan: bad access detected
[   34.400966] 
[   34.401033] Memory state around the buggy address:
[   34.401138]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.401183]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.401296] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.401473]                                      ^
[   34.401508]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.401564]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.401622] ==================================================================
[   34.160591] ==================================================================
[   34.160645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   34.160858] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.161031] 
[   34.161102] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.161190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.161218] Hardware name: linux,dummy-virt (DT)
[   34.161338] Call trace:
[   34.161396]  show_stack+0x20/0x38 (C)
[   34.161451]  dump_stack_lvl+0x8c/0xd0
[   34.161643]  print_report+0x118/0x5e8
[   34.161693]  kasan_report+0xdc/0x128
[   34.161753]  kasan_check_range+0x100/0x1a8
[   34.161801]  __kasan_check_write+0x20/0x30
[   34.161849]  kasan_atomics_helper+0x7cc/0x4858
[   34.161898]  kasan_atomics+0x198/0x2e0
[   34.161946]  kunit_try_run_case+0x170/0x3f0
[   34.161993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.162049]  kthread+0x328/0x630
[   34.162102]  ret_from_fork+0x10/0x20
[   34.162150] 
[   34.162171] Allocated by task 296:
[   34.162200]  kasan_save_stack+0x3c/0x68
[   34.162241]  kasan_save_track+0x20/0x40
[   34.162278]  kasan_save_alloc_info+0x40/0x58
[   34.162318]  __kasan_kmalloc+0xd4/0xd8
[   34.162408]  kasan_atomics+0xb8/0x2e0
[   34.164060]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.165857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.168835] 
[   34.170094] page dumped because: kasan: bad access detected
[   34.170658]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.170750] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.170860]                                      ^
[   34.170928]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.170981]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.171297] ==================================================================
[   34.526711] ==================================================================
[   34.526763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   34.526819] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.526871] 
[   34.526904] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.528334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.528479] Hardware name: linux,dummy-virt (DT)
[   34.528618] Call trace:
[   34.528877]  show_stack+0x20/0x38 (C)
[   34.528974]  dump_stack_lvl+0x8c/0xd0
[   34.529026]  print_report+0x118/0x5e8
[   34.529071]  kasan_report+0xdc/0x128
[   34.530441]  __asan_report_load8_noabort+0x20/0x30
[   34.530710]  kasan_atomics_helper+0x3e20/0x4858
[   34.531460]  kasan_atomics+0x198/0x2e0
[   34.532444]  kunit_try_run_case+0x170/0x3f0
[   34.532617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.533088]  kthread+0x328/0x630
[   34.533341]  ret_from_fork+0x10/0x20
[   34.533762] 
[   34.533882] Allocated by task 296:
[   34.533980]  kasan_save_stack+0x3c/0x68
[   34.534104]  kasan_save_track+0x20/0x40
[   34.534290]  kasan_save_alloc_info+0x40/0x58
[   34.534910]  __kasan_kmalloc+0xd4/0xd8
[   34.535525]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.535638]  kasan_atomics+0xb8/0x2e0
[   34.535917]  kunit_try_run_case+0x170/0x3f0
[   34.536212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.536568]  kthread+0x328/0x630
[   34.536623]  ret_from_fork+0x10/0x20
[   34.536661] 
[   34.536850] The buggy address belongs to the object at fff00000c9708480
[   34.536850]  which belongs to the cache kmalloc-64 of size 64
[   34.537333] The buggy address is located 0 bytes to the right of
[   34.537333]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.538210] 
[   34.538236] The buggy address belongs to the physical page:
[   34.538272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.538328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.538381] page_type: f5(slab)
[   34.538423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.538473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.538515] page dumped because: kasan: bad access detected
[   34.538546] 
[   34.538567] Memory state around the buggy address:
[   34.538601]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.538645]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.538690] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.538730]                                      ^
[   34.538765]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.538807]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.538848] ==================================================================
[   34.375257] ==================================================================
[   34.375777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   34.375901] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.375989] 
[   34.376149] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.376273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.376408] Hardware name: linux,dummy-virt (DT)
[   34.376453] Call trace:
[   34.376478]  show_stack+0x20/0x38 (C)
[   34.376551]  dump_stack_lvl+0x8c/0xd0
[   34.376606]  print_report+0x118/0x5e8
[   34.376833]  kasan_report+0xdc/0x128
[   34.376937]  kasan_check_range+0x100/0x1a8
[   34.377181]  __kasan_check_write+0x20/0x30
[   34.377290]  kasan_atomics_helper+0x12d8/0x4858
[   34.377347]  kasan_atomics+0x198/0x2e0
[   34.377643]  kunit_try_run_case+0x170/0x3f0
[   34.377742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.377927]  kthread+0x328/0x630
[   34.377997]  ret_from_fork+0x10/0x20
[   34.378107] 
[   34.378137] Allocated by task 296:
[   34.378168]  kasan_save_stack+0x3c/0x68
[   34.378210]  kasan_save_track+0x20/0x40
[   34.378256]  kasan_save_alloc_info+0x40/0x58
[   34.378306]  __kasan_kmalloc+0xd4/0xd8
[   34.378343]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.378388]  kasan_atomics+0xb8/0x2e0
[   34.378425]  kunit_try_run_case+0x170/0x3f0
[   34.378472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.378536]  kthread+0x328/0x630
[   34.378573]  ret_from_fork+0x10/0x20
[   34.378622] 
[   34.378646] The buggy address belongs to the object at fff00000c9708480
[   34.378646]  which belongs to the cache kmalloc-64 of size 64
[   34.378706] The buggy address is located 0 bytes to the right of
[   34.378706]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.378773] 
[   34.378804] The buggy address belongs to the physical page:
[   34.378839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.378903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.378951] page_type: f5(slab)
[   34.379006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.379064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.379568] page dumped because: kasan: bad access detected
[   34.379609] 
[   34.379630] Memory state around the buggy address:
[   34.379666]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.379879]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.379966] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.380373]                                      ^
[   34.380449]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.380533]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.380677] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure Automatically assigned
[   33.846917] ==================================================================
[   33.846973] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   33.847055] Read of size 1 at addr fff00000c907cb50 by task kunit_try_catch/290
[   33.847675] 
[   33.847723] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.847938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.847999] Hardware name: linux,dummy-virt (DT)
[   33.848127] Call trace:
[   33.848187]  show_stack+0x20/0x38 (C)
[   33.848289]  dump_stack_lvl+0x8c/0xd0
[   33.848355]  print_report+0x118/0x5e8
[   33.848545]  kasan_report+0xdc/0x128
[   33.848603]  __asan_report_load1_noabort+0x20/0x30
[   33.848654]  kasan_strings+0x95c/0xb00
[   33.848885]  kunit_try_run_case+0x170/0x3f0
[   33.849045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.849260]  kthread+0x328/0x630
[   33.849356]  ret_from_fork+0x10/0x20
[   33.849511] 
[   33.849599] Allocated by task 290:
[   33.849631]  kasan_save_stack+0x3c/0x68
[   33.850001]  kasan_save_track+0x20/0x40
[   33.850087]  kasan_save_alloc_info+0x40/0x58
[   33.850201]  __kasan_kmalloc+0xd4/0xd8
[   33.850280]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.850358]  kasan_strings+0xc8/0xb00
[   33.850495]  kunit_try_run_case+0x170/0x3f0
[   33.850559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.850900]  kthread+0x328/0x630
[   33.850967]  ret_from_fork+0x10/0x20
[   33.851042] 
[   33.851481] Freed by task 290:
[   33.851847]  kasan_save_stack+0x3c/0x68
[   33.851933]  kasan_save_track+0x20/0x40
[   33.852000]  kasan_save_free_info+0x4c/0x78
[   33.852133]  __kasan_slab_free+0x6c/0x98
[   33.856621]  fff00000c907cb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.861180]  __asan_report_load1_noabort+0x20/0x30
[   33.861532] 
[   33.861957]  ret_from_fork+0x10/0x20
[   33.863052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.863960] 
[   33.864020] The buggy address belongs to the physical page:
[   33.864189] page_type: f5(slab)
[   33.865019] 
[   33.866006]  fff00000c907cb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.868453]  strnlen+0x80/0x88
[   33.869842]  kasan_save_stack+0x3c/0x68
[   33.869931]  kasan_save_track+0x20/0x40
[   33.870067]  kasan_save_alloc_info+0x40/0x58
[   33.870518]  kasan_strings+0xc8/0xb00
[   33.871401]  kasan_save_track+0x20/0x40
[   33.872039]  kunit_try_run_case+0x170/0x3f0
[   33.872277] 
[   33.872584] The buggy address is located 16 bytes inside of
[   33.872584]  freed 32-byte region [fff00000c907cb40, fff00000c907cb60)
[   33.873308] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.876984]     not ok 62 kasan_strings
[   33.881621] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.881959]  dump_stack_lvl+0x8c/0xd0
[   33.882569]  kasan_bitops_generic+0x110/0x1c8
[   33.883341]  kasan_save_stack+0x3c/0x68
[   33.883835]  kunit_try_run_case+0x170/0x3f0
[   33.884562]  ret_from_fork+0x10/0x20
[   33.884693] The buggy address is located 8 bytes inside of
[   33.884693]  allocated 9-byte region [fff00000c907e120, fff00000c907e129)
[   33.886853]  fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.887447] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure Automatically assigned
[   33.835055] ==================================================================
[   33.835615] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   33.835695] Read of size 1 at addr fff00000c907cb50 by task kunit_try_catch/290
[   33.836178] 
[   33.836246] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.836349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.836397] Hardware name: linux,dummy-virt (DT)
[   33.836583] Call trace:
[   33.836650]  show_stack+0x20/0x38 (C)
[   33.836708]  dump_stack_lvl+0x8c/0xd0
[   33.836758]  print_report+0x118/0x5e8
[   33.836804]  kasan_report+0xdc/0x128
[   33.836848]  __asan_report_load1_noabort+0x20/0x30
[   33.837396]  strcmp+0xc0/0xc8
[   33.837487]  kasan_strings+0x340/0xb00
[   33.837571]  kunit_try_run_case+0x170/0x3f0
[   33.837746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.837841]  kthread+0x328/0x630
[   33.837886]  ret_from_fork+0x10/0x20
[   33.838265] 
[   33.838330] Allocated by task 290:
[   33.838421]  kasan_save_stack+0x3c/0x68
[   33.838566]  kasan_save_track+0x20/0x40
[   33.838651]  kasan_save_alloc_info+0x40/0x58
[   33.838718]  __kasan_kmalloc+0xd4/0xd8
[   33.838870]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.838925]  kasan_strings+0xc8/0xb00
[   33.839286]  kunit_try_run_case+0x170/0x3f0
[   33.839373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.839490]  kthread+0x328/0x630
[   33.839600]  ret_from_fork+0x10/0x20
[   33.839736] 
[   33.839779] Freed by task 290:
[   33.839808]  kasan_save_stack+0x3c/0x68
[   33.839860]  kasan_save_track+0x20/0x40
[   33.839904]  kasan_save_free_info+0x4c/0x78
[   33.839944]  __kasan_slab_free+0x6c/0x98
[   33.840303]  kfree+0x214/0x3c8
[   33.840412]  kasan_strings+0x24c/0xb00
[   33.840480]  kunit_try_run_case+0x170/0x3f0
[   33.840825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.840989]  kthread+0x328/0x630
[   33.841066]  ret_from_fork+0x10/0x20
[   33.841225] 
[   33.841278] The buggy address belongs to the object at fff00000c907cb40
[   33.841278]  which belongs to the cache kmalloc-32 of size 32
[   33.841670] The buggy address is located 16 bytes inside of
[   33.841670]  freed 32-byte region [fff00000c907cb40, fff00000c907cb60)
[   33.841854] 
[   33.841913] The buggy address belongs to the physical page:
[   33.841997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10907c
[   33.842112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.842201] page_type: f5(slab)
[   33.842346] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.842398] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.842689] page dumped because: kasan: bad access detected
[   33.842807] 
[   33.842881] Memory state around the buggy address:
[   33.842958]  fff00000c907ca00: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.843110]  fff00000c907ca80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.843167] >fff00000c907cb00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.843253]                                                  ^
[   33.843508]  fff00000c907cb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.843560]  fff00000c907cc00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.843784] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure Automatically assigned
[   33.817673] ==================================================================
[   33.817735] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   33.817790] Read of size 1 at addr fff00000c907ca18 by task kunit_try_catch/288
[   33.817850] 
[   33.817886] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.817973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.818002] Hardware name: linux,dummy-virt (DT)
[   33.818040] Call trace:
[   33.818076]  show_stack+0x20/0x38 (C)
[   33.818427]  dump_stack_lvl+0x8c/0xd0
[   33.818477]  print_report+0x118/0x5e8
[   33.818869]  kasan_report+0xdc/0x128
[   33.819106]  __asan_report_load1_noabort+0x20/0x30
[   33.819177]  memcmp+0x198/0x1d8
[   33.819414]  kasan_memcmp+0x16c/0x300
[   33.819482]  kunit_try_run_case+0x170/0x3f0
[   33.819533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.819613]  kthread+0x328/0x630
[   33.819657]  ret_from_fork+0x10/0x20
[   33.819724] 
[   33.819956] Allocated by task 288:
[   33.819989]  kasan_save_stack+0x3c/0x68
[   33.820050]  kasan_save_track+0x20/0x40
[   33.820105]  kasan_save_alloc_info+0x40/0x58
[   33.820403]  __kasan_kmalloc+0xd4/0xd8
[   33.820482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.820556]  kasan_memcmp+0xbc/0x300
[   33.820596]  kunit_try_run_case+0x170/0x3f0
[   33.820933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.821068]  kthread+0x328/0x630
[   33.821135]  ret_from_fork+0x10/0x20
[   33.821403] 
[   33.821478] The buggy address belongs to the object at fff00000c907ca00
[   33.821478]  which belongs to the cache kmalloc-32 of size 32
[   33.821643] The buggy address is located 0 bytes to the right of
[   33.821643]  allocated 24-byte region [fff00000c907ca00, fff00000c907ca18)
[   33.821731] 
[   33.822045] The buggy address belongs to the physical page:
[   33.822116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10907c
[   33.822345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.822540] page_type: f5(slab)
[   33.822596] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.822747] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.822860] page dumped because: kasan: bad access detected
[   33.822939] 
[   33.822977] Memory state around the buggy address:
[   33.823251]  fff00000c907c900: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   33.823451]  fff00000c907c980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.823539] >fff00000c907ca00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.823608]                             ^
[   33.824012]  fff00000c907ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.824157]  fff00000c907cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.824215] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure Automatically assigned
[   33.797271] ==================================================================
[   33.797353] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   33.797439] Read of size 1 at addr ffff800080a17b4a by task kunit_try_catch/284
[   33.797493] 
[   33.797564] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.797670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.797741] Hardware name: linux,dummy-virt (DT)
[   33.797789] Call trace:
[   33.797816]  show_stack+0x20/0x38 (C)
[   33.798004]  dump_stack_lvl+0x8c/0xd0
[   33.798212]  print_report+0x310/0x5e8
[   33.798259]  kasan_report+0xdc/0x128
[   33.798304]  __asan_report_load1_noabort+0x20/0x30
[   33.798356]  kasan_alloca_oob_right+0x2dc/0x340
[   33.798479]  kunit_try_run_case+0x170/0x3f0
[   33.798532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.798587]  kthread+0x328/0x630
[   33.798723]  ret_from_fork+0x10/0x20
[   33.798782] 
[   33.798808] The buggy address belongs to stack of task kunit_try_catch/284
[   33.798864] 
[   33.799162] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080a10000 allocated at kernel_clone+0x150/0x7b0
[   33.799351] The buggy address belongs to the physical page:
[   33.799388] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f94
[   33.799442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.799542] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.799595] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.799656] page dumped because: kasan: bad access detected
[   33.799698] 
[   33.799729] Memory state around the buggy address:
[   33.800020]  ffff800080a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.800248]  ffff800080a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.800305] >ffff800080a17b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   33.800347]                                               ^
[   33.800387]  ffff800080a17b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   33.800730]  ffff800080a17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   33.800848] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure Automatically assigned
[   33.781427] ==================================================================
[   33.781528] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   33.781936] Read of size 1 at addr ffff800080af7b5f by task kunit_try_catch/282
[   33.782007] 
[   33.782398] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.782670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.782718] Hardware name: linux,dummy-virt (DT)
[   33.782767] Call trace:
[   33.782804]  show_stack+0x20/0x38 (C)
[   33.782869]  dump_stack_lvl+0x8c/0xd0
[   33.783097]  print_report+0x310/0x5e8
[   33.783375]  kasan_report+0xdc/0x128
[   33.783617]  __asan_report_load1_noabort+0x20/0x30
[   33.783813]  kasan_alloca_oob_left+0x2b8/0x310
[   33.783880]  kunit_try_run_case+0x170/0x3f0
[   33.783928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.783981]  kthread+0x328/0x630
[   33.784266]  ret_from_fork+0x10/0x20
[   33.784603] 
[   33.784667] The buggy address belongs to stack of task kunit_try_catch/282
[   33.784833] 
[   33.784917] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080af0000 allocated at kernel_clone+0x150/0x7b0
[   33.785177] The buggy address belongs to the physical page:
[   33.785250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f92
[   33.785388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.785483] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.785579] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.785650] page dumped because: kasan: bad access detected
[   33.785683] 
[   33.786023] Memory state around the buggy address:
[   33.786129]  ffff800080af7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.786206]  ffff800080af7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.786280] >ffff800080af7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   33.786334]                                                     ^
[   33.786663]  ffff800080af7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   33.786810]  ffff800080af7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   33.786873] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure Automatically assigned
[   33.768356] ==================================================================
[   33.768492] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   33.768550] Read of size 1 at addr ffff800080a97c2a by task kunit_try_catch/280
[   33.768611] 
[   33.768647] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.769024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.769138] Hardware name: linux,dummy-virt (DT)
[   33.769416] Call trace:
[   33.769464]  show_stack+0x20/0x38 (C)
[   33.769537]  dump_stack_lvl+0x8c/0xd0
[   33.769598]  print_report+0x310/0x5e8
[   33.769998]  kasan_report+0xdc/0x128
[   33.770097]  __asan_report_load1_noabort+0x20/0x30
[   33.770152]  kasan_stack_oob+0x238/0x270
[   33.770200]  kunit_try_run_case+0x170/0x3f0
[   33.770359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.770425]  kthread+0x328/0x630
[   33.770529]  ret_from_fork+0x10/0x20
[   33.770836] 
[   33.771008] The buggy address belongs to stack of task kunit_try_catch/280
[   33.771192]  and is located at offset 138 in frame:
[   33.771238]  kasan_stack_oob+0x0/0x270
[   33.771379] 
[   33.771413] This frame has 4 objects:
[   33.771511]  [48, 49) '__assertion'
[   33.771547]  [64, 72) 'array'
[   33.771729]  [96, 112) '__assertion'
[   33.772026]  [128, 138) 'stack_array'
[   33.772100] 
[   33.772128] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080a90000 allocated at kernel_clone+0x150/0x7b0
[   33.772815] The buggy address belongs to the physical page:
[   33.772927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9a
[   33.773024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.773478] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.773575] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.773655] page dumped because: kasan: bad access detected
[   33.773773] 
[   33.773831] Memory state around the buggy address:
[   33.773892]  ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.773988]  ffff800080a97b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   33.774061] >ffff800080a97c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   33.774112]                                   ^
[   33.774158]  ffff800080a97c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   33.774204]  ffff800080a97d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   33.774253] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure Automatically assigned
[   33.742908] ==================================================================
[   33.743004] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   33.743067] Read of size 1 at addr ffffa0dee5d7b60d by task kunit_try_catch/276
[   33.743172] 
[   33.743212] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.743602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.743659] Hardware name: linux,dummy-virt (DT)
[   33.743720] Call trace:
[   33.743777]  show_stack+0x20/0x38 (C)
[   33.743843]  dump_stack_lvl+0x8c/0xd0
[   33.744023]  print_report+0x310/0x5e8
[   33.744070]  kasan_report+0xdc/0x128
[   33.744214]  __asan_report_load1_noabort+0x20/0x30
[   33.744417]  kasan_global_oob_right+0x230/0x270
[   33.744539]  kunit_try_run_case+0x170/0x3f0
[   33.744704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.744772]  kthread+0x328/0x630
[   33.745095]  ret_from_fork+0x10/0x20
[   33.745190] 
[   33.745649] The buggy address belongs to the variable:
[   33.745702]  global_array+0xd/0x40
[   33.746141] 
[   33.746264] The buggy address belongs to a vmalloc virtual mapping
[   33.749876] The buggy address belongs to the physical page:
[   33.749949] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d7b
[   33.750045] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   33.750138] raw: 03fffe0000002000 ffffc1ffc01f5ec8 ffffc1ffc01f5ec8 0000000000000000
[   33.750206] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.750248] page dumped because: kasan: bad access detected
[   33.750287] 
[   33.750322] Memory state around the buggy address:
[   33.750371]  ffffa0dee5d7b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.750428]  ffffa0dee5d7b580: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   33.750473] >ffffa0dee5d7b600: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   33.750527]                       ^
[   33.750571]  ffffa0dee5d7b680: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   33.750616]  ffffa0dee5d7b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.750675] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure Automatically assigned
[   33.675520] ==================================================================
[   33.675595] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.675661] Free of addr fff00000c3fed900 by task kunit_try_catch/266
[   33.675834] 
[   33.675878] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.675966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.675993] Hardware name: linux,dummy-virt (DT)
[   33.676025] Call trace:
[   33.676047]  show_stack+0x20/0x38 (C)
[   33.676196]  dump_stack_lvl+0x8c/0xd0
[   33.676354]  print_report+0x118/0x5e8
[   33.676466]  kasan_report_invalid_free+0xc0/0xe8
[   33.676551]  check_slab_allocation+0xd4/0x108
[   33.676693]  __kasan_mempool_poison_object+0x78/0x150
[   33.676754]  mempool_free+0x28c/0x328
[   33.677042]  mempool_double_free_helper+0x150/0x2e8
[   33.677136]  mempool_kmalloc_double_free+0xc0/0x118
[   33.677277]  kunit_try_run_case+0x170/0x3f0
[   33.677327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.677510]  kthread+0x328/0x630
[   33.677571]  ret_from_fork+0x10/0x20
[   33.677685] 
[   33.677729] Allocated by task 266:
[   33.677780]  kasan_save_stack+0x3c/0x68
[   33.677912]  kasan_save_track+0x20/0x40
[   33.677989]  kasan_save_alloc_info+0x40/0x58
[   33.678058]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.678354]  remove_element+0x130/0x1f8
[   33.678449]  mempool_alloc_preallocated+0x58/0xc0
[   33.678546]  mempool_double_free_helper+0x94/0x2e8
[   33.678660]  mempool_kmalloc_double_free+0xc0/0x118
[   33.678736]  kunit_try_run_case+0x170/0x3f0
[   33.678807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.678848]  kthread+0x328/0x630
[   33.679150]  ret_from_fork+0x10/0x20
[   33.679251] 
[   33.679322] Freed by task 266:
[   33.679433]  kasan_save_stack+0x3c/0x68
[   33.679473]  kasan_save_track+0x20/0x40
[   33.679522]  kasan_save_free_info+0x4c/0x78
[   33.679722]  __kasan_mempool_poison_object+0xc0/0x150
[   33.679869]  mempool_free+0x28c/0x328
[   33.679956]  mempool_double_free_helper+0x100/0x2e8
[   33.680116]  mempool_kmalloc_double_free+0xc0/0x118
[   33.680305]  kunit_try_run_case+0x170/0x3f0
[   33.680355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.680409]  kthread+0x328/0x630
[   33.680450]  ret_from_fork+0x10/0x20
[   33.680586] 
[   33.680655] The buggy address belongs to the object at fff00000c3fed900
[   33.680655]  which belongs to the cache kmalloc-128 of size 128
[   33.680760] The buggy address is located 0 bytes inside of
[   33.680760]  128-byte region [fff00000c3fed900, fff00000c3fed980)
[   33.680834] 
[   33.680853] The buggy address belongs to the physical page:
[   33.680884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fed
[   33.680937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.680994] page_type: f5(slab)
[   33.681043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.681107] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.681166] page dumped because: kasan: bad access detected
[   33.681196] 
[   33.681230] Memory state around the buggy address:
[   33.681259]  fff00000c3fed800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.681311]  fff00000c3fed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.681353] >fff00000c3fed900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.681392]                    ^
[   33.681418]  fff00000c3fed980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.681460]  fff00000c3feda00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.681507] ==================================================================
[   33.702545] ==================================================================
[   33.702600] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.702654] Free of addr fff00000c9bb8000 by task kunit_try_catch/270
[   33.702695] 
[   33.702727] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.702809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.702836] Hardware name: linux,dummy-virt (DT)
[   33.702865] Call trace:
[   33.702888]  show_stack+0x20/0x38 (C)
[   33.702934]  dump_stack_lvl+0x8c/0xd0
[   33.702981]  print_report+0x118/0x5e8
[   33.703023]  kasan_report_invalid_free+0xc0/0xe8
[   33.703070]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.703759]  mempool_free+0x24c/0x328
[   33.704124]  mempool_double_free_helper+0x150/0x2e8
[   33.704218]  mempool_page_alloc_double_free+0xbc/0x118
[   33.704396]  kunit_try_run_case+0x170/0x3f0
[   33.704481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.704550]  kthread+0x328/0x630
[   33.704907]  ret_from_fork+0x10/0x20
[   33.705114] 
[   33.705159] The buggy address belongs to the physical page:
[   33.705192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb8
[   33.705527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.705633] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.705704] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.705857] page dumped because: kasan: bad access detected
[   33.705936] 
[   33.706055] Memory state around the buggy address:
[   33.706132]  fff00000c9bb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.706192]  fff00000c9bb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.706258] >fff00000c9bb8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.706527]                    ^
[   33.706640]  fff00000c9bb8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.706714]  fff00000c9bb8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.706881] ==================================================================
[   33.690421] ==================================================================
[   33.690532] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.690591] Free of addr fff00000c9bb8000 by task kunit_try_catch/268
[   33.690633] 
[   33.690690] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.690825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.690863] Hardware name: linux,dummy-virt (DT)
[   33.690909] Call trace:
[   33.690939]  show_stack+0x20/0x38 (C)
[   33.690988]  dump_stack_lvl+0x8c/0xd0
[   33.691035]  print_report+0x118/0x5e8
[   33.691087]  kasan_report_invalid_free+0xc0/0xe8
[   33.691134]  __kasan_mempool_poison_object+0x14c/0x150
[   33.691191]  mempool_free+0x28c/0x328
[   33.691237]  mempool_double_free_helper+0x150/0x2e8
[   33.691287]  mempool_kmalloc_large_double_free+0xc0/0x118
[   33.691338]  kunit_try_run_case+0x170/0x3f0
[   33.691382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.691441]  kthread+0x328/0x630
[   33.691490]  ret_from_fork+0x10/0x20
[   33.691537] 
[   33.691556] The buggy address belongs to the physical page:
[   33.691587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb8
[   33.691640] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.691686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.692149] page_type: f8(unknown)
[   33.692223] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.692436] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.692586] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.692675] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.692835] head: 0bfffe0000000002 ffffc1ffc326ee01 00000000ffffffff 00000000ffffffff
[   33.692926] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.693129] page dumped because: kasan: bad access detected
[   33.693178] 
[   33.693196] Memory state around the buggy address:
[   33.693236]  fff00000c9bb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.693285]  fff00000c9bb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.693327] >fff00000c9bb8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.693363]                    ^
[   33.693392]  fff00000c9bb8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.693535]  fff00000c9bb8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.693616] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   33.622238] ==================================================================
[   33.622293] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.622711] Read of size 1 at addr fff00000c9bb4000 by task kunit_try_catch/260
[   33.623093] 
[   33.623182] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.623271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.623299] Hardware name: linux,dummy-virt (DT)
[   33.623376] Call trace:
[   33.623404]  show_stack+0x20/0x38 (C)
[   33.623483]  dump_stack_lvl+0x8c/0xd0
[   33.623660]  print_report+0x118/0x5e8
[   33.623732]  kasan_report+0xdc/0x128
[   33.623841]  __asan_report_load1_noabort+0x20/0x30
[   33.623927]  mempool_uaf_helper+0x314/0x340
[   33.624016]  mempool_kmalloc_large_uaf+0xc4/0x120
[   33.624104]  kunit_try_run_case+0x170/0x3f0
[   33.624270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.624331]  kthread+0x328/0x630
[   33.624373]  ret_from_fork+0x10/0x20
[   33.624429] 
[   33.624451] The buggy address belongs to the physical page:
[   33.624486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4
[   33.624538] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.624583] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.624745] page_type: f8(unknown)
[   33.624813] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.624915] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.624995] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.625130] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.625181] head: 0bfffe0000000002 ffffc1ffc326ed01 00000000ffffffff 00000000ffffffff
[   33.625263] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.625539] page dumped because: kasan: bad access detected
[   33.625614] 
[   33.625700] Memory state around the buggy address:
[   33.625801]  fff00000c9bb3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.626099]  fff00000c9bb3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.626250] >fff00000c9bb4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.626338]                    ^
[   33.626625]  fff00000c9bb4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.626691]  fff00000c9bb4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.626773] ==================================================================
[   33.664209] ==================================================================
[   33.664279] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.664422] Read of size 1 at addr fff00000c9bb4000 by task kunit_try_catch/264
[   33.664500] 
[   33.664535] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.664653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.664682] Hardware name: linux,dummy-virt (DT)
[   33.664715] Call trace:
[   33.664804]  show_stack+0x20/0x38 (C)
[   33.664858]  dump_stack_lvl+0x8c/0xd0
[   33.664963]  print_report+0x118/0x5e8
[   33.665037]  kasan_report+0xdc/0x128
[   33.665224]  __asan_report_load1_noabort+0x20/0x30
[   33.665286]  mempool_uaf_helper+0x314/0x340
[   33.665334]  mempool_page_alloc_uaf+0xc0/0x118
[   33.665524]  kunit_try_run_case+0x170/0x3f0
[   33.665592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.665668]  kthread+0x328/0x630
[   33.665713]  ret_from_fork+0x10/0x20
[   33.665780] 
[   33.665852] The buggy address belongs to the physical page:
[   33.665888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4
[   33.665942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.666004] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.666056] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.666107] page dumped because: kasan: bad access detected
[   33.666339] 
[   33.666369] Memory state around the buggy address:
[   33.666531]  fff00000c9bb3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.666597]  fff00000c9bb3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.666700] >fff00000c9bb4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.666757]                    ^
[   33.666788]  fff00000c9bb4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.666831]  fff00000c9bb4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.667044] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   33.609443] ==================================================================
[   33.609600] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   33.609689] Read of size 1 at addr fff00000c3fed500 by task kunit_try_catch/258
[   33.610061] 
[   33.610127] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.610272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.610320] Hardware name: linux,dummy-virt (DT)
[   33.610355] Call trace:
[   33.610534]  show_stack+0x20/0x38 (C)
[   33.610648]  dump_stack_lvl+0x8c/0xd0
[   33.610710]  print_report+0x118/0x5e8
[   33.610904]  kasan_report+0xdc/0x128
[   33.610996]  __asan_report_load1_noabort+0x20/0x30
[   33.611063]  mempool_uaf_helper+0x314/0x340
[   33.611163]  mempool_kmalloc_uaf+0xc4/0x120
[   33.611243]  kunit_try_run_case+0x170/0x3f0
[   33.611297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.611385]  kthread+0x328/0x630
[   33.611502]  ret_from_fork+0x10/0x20
[   33.611551] 
[   33.611736] Allocated by task 258:
[   33.611926]  kasan_save_stack+0x3c/0x68
[   33.612010]  kasan_save_track+0x20/0x40
[   33.612075]  kasan_save_alloc_info+0x40/0x58
[   33.612232]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.612308]  remove_element+0x130/0x1f8
[   33.612412]  mempool_alloc_preallocated+0x58/0xc0
[   33.612488]  mempool_uaf_helper+0xa4/0x340
[   33.612691]  mempool_kmalloc_uaf+0xc4/0x120
[   33.612741]  kunit_try_run_case+0x170/0x3f0
[   33.612794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.612840]  kthread+0x328/0x630
[   33.612938]  ret_from_fork+0x10/0x20
[   33.613018] 
[   33.613127] Freed by task 258:
[   33.613185]  kasan_save_stack+0x3c/0x68
[   33.613265]  kasan_save_track+0x20/0x40
[   33.613399]  kasan_save_free_info+0x4c/0x78
[   33.613486]  __kasan_mempool_poison_object+0xc0/0x150
[   33.613643]  mempool_free+0x28c/0x328
[   33.613888]  mempool_uaf_helper+0x104/0x340
[   33.614060]  mempool_kmalloc_uaf+0xc4/0x120
[   33.614143]  kunit_try_run_case+0x170/0x3f0
[   33.614255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.614401]  kthread+0x328/0x630
[   33.614477]  ret_from_fork+0x10/0x20
[   33.614549] 
[   33.614661] The buggy address belongs to the object at fff00000c3fed500
[   33.614661]  which belongs to the cache kmalloc-128 of size 128
[   33.614759] The buggy address is located 0 bytes inside of
[   33.614759]  freed 128-byte region [fff00000c3fed500, fff00000c3fed580)
[   33.615034] 
[   33.615112] The buggy address belongs to the physical page:
[   33.615172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fed
[   33.615264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.615332] page_type: f5(slab)
[   33.615372] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.615665] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.615760] page dumped because: kasan: bad access detected
[   33.615883] 
[   33.615943] Memory state around the buggy address:
[   33.616016]  fff00000c3fed400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.616144]  fff00000c3fed480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.616217] >fff00000c3fed500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.616335]                    ^
[   33.616376]  fff00000c3fed580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.616420]  fff00000c3fed600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.616473] ==================================================================
[   33.635490] ==================================================================
[   33.635600] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   33.635653] Read of size 1 at addr fff00000c9b2e240 by task kunit_try_catch/262
[   33.635767] 
[   33.635828] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.635993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.636022] Hardware name: linux,dummy-virt (DT)
[   33.636068] Call trace:
[   33.636437]  show_stack+0x20/0x38 (C)
[   33.636531]  dump_stack_lvl+0x8c/0xd0
[   33.636648]  print_report+0x118/0x5e8
[   33.636727]  kasan_report+0xdc/0x128
[   33.636990]  __asan_report_load1_noabort+0x20/0x30
[   33.637111]  mempool_uaf_helper+0x314/0x340
[   33.637191]  mempool_slab_uaf+0xc0/0x118
[   33.637356]  kunit_try_run_case+0x170/0x3f0
[   33.637443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.637697]  kthread+0x328/0x630
[   33.637770]  ret_from_fork+0x10/0x20
[   33.637918] 
[   33.637988] Allocated by task 262:
[   33.638119]  kasan_save_stack+0x3c/0x68
[   33.638205]  kasan_save_track+0x20/0x40
[   33.638534]  kasan_save_alloc_info+0x40/0x58
[   33.638604]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.638729]  remove_element+0x16c/0x1f8
[   33.638797]  mempool_alloc_preallocated+0x58/0xc0
[   33.638891]  mempool_uaf_helper+0xa4/0x340
[   33.639049]  mempool_slab_uaf+0xc0/0x118
[   33.639108]  kunit_try_run_case+0x170/0x3f0
[   33.639307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.639394]  kthread+0x328/0x630
[   33.639493]  ret_from_fork+0x10/0x20
[   33.639565] 
[   33.639621] Freed by task 262:
[   33.639654]  kasan_save_stack+0x3c/0x68
[   33.639939]  kasan_save_track+0x20/0x40
[   33.640016]  kasan_save_free_info+0x4c/0x78
[   33.640148]  __kasan_mempool_poison_object+0xc0/0x150
[   33.640309]  mempool_free+0x28c/0x328
[   33.640408]  mempool_uaf_helper+0x104/0x340
[   33.640621]  mempool_slab_uaf+0xc0/0x118
[   33.640674]  kunit_try_run_case+0x170/0x3f0
[   33.640920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.641000]  kthread+0x328/0x630
[   33.641126]  ret_from_fork+0x10/0x20
[   33.641197] 
[   33.641251] The buggy address belongs to the object at fff00000c9b2e240
[   33.641251]  which belongs to the cache test_cache of size 123
[   33.641482] The buggy address is located 0 bytes inside of
[   33.641482]  freed 123-byte region [fff00000c9b2e240, fff00000c9b2e2bb)
[   33.641698] 
[   33.641749] The buggy address belongs to the physical page:
[   33.641798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2e
[   33.641866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.642204] page_type: f5(slab)
[   33.642280] raw: 0bfffe0000000000 fff00000c4743dc0 dead000000000122 0000000000000000
[   33.642346] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   33.642564] page dumped because: kasan: bad access detected
[   33.642688] 
[   33.642748] Memory state around the buggy address:
[   33.642821]  fff00000c9b2e100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.642868]  fff00000c9b2e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.642910] >fff00000c9b2e200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   33.642948]                                            ^
[   33.642984]  fff00000c9b2e280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.643025]  fff00000c9b2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.643063] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure Automatically assigned
[   33.572239] ==================================================================
[   33.572299] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.572351] Read of size 1 at addr fff00000c907a2bb by task kunit_try_catch/256
[   33.572452] 
[   33.572550] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.572636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.572661] Hardware name: linux,dummy-virt (DT)
[   33.572807] Call trace:
[   33.572978]  show_stack+0x20/0x38 (C)
[   33.573212]  dump_stack_lvl+0x8c/0xd0
[   33.573268]  print_report+0x118/0x5e8
[   33.573407]  kasan_report+0xdc/0x128
[   33.573451]  __asan_report_load1_noabort+0x20/0x30
[   33.573504]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.573666]  mempool_slab_oob_right+0xc0/0x118
[   33.573963]  kunit_try_run_case+0x170/0x3f0
[   33.574068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.574131]  kthread+0x328/0x630
[   33.574175]  ret_from_fork+0x10/0x20
[   33.574220] 
[   33.574248] Allocated by task 256:
[   33.574278]  kasan_save_stack+0x3c/0x68
[   33.574315]  kasan_save_track+0x20/0x40
[   33.574425]  kasan_save_alloc_info+0x40/0x58
[   33.574528]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.574825]  remove_element+0x16c/0x1f8
[   33.574893]  mempool_alloc_preallocated+0x58/0xc0
[   33.574934]  mempool_oob_right_helper+0x98/0x2f0
[   33.574973]  mempool_slab_oob_right+0xc0/0x118
[   33.575013]  kunit_try_run_case+0x170/0x3f0
[   33.575049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.575102]  kthread+0x328/0x630
[   33.575144]  ret_from_fork+0x10/0x20
[   33.575180] 
[   33.575199] The buggy address belongs to the object at fff00000c907a240
[   33.575199]  which belongs to the cache test_cache of size 123
[   33.575531] The buggy address is located 0 bytes to the right of
[   33.575531]  allocated 123-byte region [fff00000c907a240, fff00000c907a2bb)
[   33.575706] 
[   33.575729] The buggy address belongs to the physical page:
[   33.575758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10907a
[   33.575852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.576098] page_type: f5(slab)
[   33.576136] raw: 0bfffe0000000000 fff00000c4743c80 dead000000000122 0000000000000000
[   33.576184] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   33.576402] page dumped because: kasan: bad access detected
[   33.576439] 
[   33.576457] Memory state around the buggy address:
[   33.576589]  fff00000c907a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.576701]  fff00000c907a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   33.576758] >fff00000c907a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   33.576829]                                         ^
[   33.576878]  fff00000c907a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.576920]  fff00000c907a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.576975] ==================================================================
[   33.558504] ==================================================================
[   33.558595] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.558647] Read of size 1 at addr fff00000c9bb2001 by task kunit_try_catch/254
[   33.558696] 
[   33.558726] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.558896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.559006] Hardware name: linux,dummy-virt (DT)
[   33.559044] Call trace:
[   33.559148]  show_stack+0x20/0x38 (C)
[   33.559197]  dump_stack_lvl+0x8c/0xd0
[   33.559243]  print_report+0x118/0x5e8
[   33.559294]  kasan_report+0xdc/0x128
[   33.559338]  __asan_report_load1_noabort+0x20/0x30
[   33.559384]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.559551]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   33.559698]  kunit_try_run_case+0x170/0x3f0
[   33.559756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.559812]  kthread+0x328/0x630
[   33.559928]  ret_from_fork+0x10/0x20
[   33.559975] 
[   33.559995] The buggy address belongs to the physical page:
[   33.560027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb0
[   33.560089] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.560135] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.560187] page_type: f8(unknown)
[   33.560225] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.560273] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.560321] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.560368] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.560423] head: 0bfffe0000000002 ffffc1ffc326ec01 00000000ffffffff 00000000ffffffff
[   33.560634] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.560686] page dumped because: kasan: bad access detected
[   33.560722] 
[   33.560786] Memory state around the buggy address:
[   33.560824]  fff00000c9bb1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.560921]  fff00000c9bb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.560970] >fff00000c9bb2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.561029]                    ^
[   33.561091]  fff00000c9bb2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.561134]  fff00000c9bb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.561173] ==================================================================
[   33.550149] ==================================================================
[   33.550226] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.550300] Read of size 1 at addr fff00000c3fed173 by task kunit_try_catch/252
[   33.550350] 
[   33.550391] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.550480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.550509] Hardware name: linux,dummy-virt (DT)
[   33.550542] Call trace:
[   33.550569]  show_stack+0x20/0x38 (C)
[   33.550618]  dump_stack_lvl+0x8c/0xd0
[   33.550670]  print_report+0x118/0x5e8
[   33.550712]  kasan_report+0xdc/0x128
[   33.550756]  __asan_report_load1_noabort+0x20/0x30
[   33.550803]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.550851]  mempool_kmalloc_oob_right+0xc4/0x120
[   33.550899]  kunit_try_run_case+0x170/0x3f0
[   33.550948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.550997]  kthread+0x328/0x630
[   33.551042]  ret_from_fork+0x10/0x20
[   33.551117] 
[   33.551138] Allocated by task 252:
[   33.551167]  kasan_save_stack+0x3c/0x68
[   33.551208]  kasan_save_track+0x20/0x40
[   33.551242]  kasan_save_alloc_info+0x40/0x58
[   33.551280]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.551320]  remove_element+0x130/0x1f8
[   33.551360]  mempool_alloc_preallocated+0x58/0xc0
[   33.551400]  mempool_oob_right_helper+0x98/0x2f0
[   33.551441]  mempool_kmalloc_oob_right+0xc4/0x120
[   33.551480]  kunit_try_run_case+0x170/0x3f0
[   33.551517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.551558]  kthread+0x328/0x630
[   33.551592]  ret_from_fork+0x10/0x20
[   33.551627] 
[   33.551646] The buggy address belongs to the object at fff00000c3fed100
[   33.551646]  which belongs to the cache kmalloc-128 of size 128
[   33.551704] The buggy address is located 0 bytes to the right of
[   33.551704]  allocated 115-byte region [fff00000c3fed100, fff00000c3fed173)
[   33.551790] 
[   33.551821] The buggy address belongs to the physical page:
[   33.551855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fed
[   33.551911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.551964] page_type: f5(slab)
[   33.552006] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.552056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.552110] page dumped because: kasan: bad access detected
[   33.552142] 
[   33.552171] Memory state around the buggy address:
[   33.552206]  fff00000c3fed000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.552249]  fff00000c3fed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.552292] >fff00000c3fed100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.552330]                                                              ^
[   33.552370]  fff00000c3fed180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.552414]  fff00000c3fed200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.552450] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure Automatically assigned
[   32.966498] ==================================================================
[   32.966580] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   32.966652] Read of size 1 at addr fff00000c47438c0 by task kunit_try_catch/246
[   32.966705] 
[   32.966745] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   32.966833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.966862] Hardware name: linux,dummy-virt (DT)
[   32.966895] Call trace:
[   32.966920]  show_stack+0x20/0x38 (C)
[   32.966970]  dump_stack_lvl+0x8c/0xd0
[   32.967021]  print_report+0x118/0x5e8
[   32.967065]  kasan_report+0xdc/0x128
[   32.967120]  __kasan_check_byte+0x54/0x70
[   32.967165]  kmem_cache_destroy+0x34/0x218
[   32.967214]  kmem_cache_double_destroy+0x174/0x300
[   32.967263]  kunit_try_run_case+0x170/0x3f0
[   32.967311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.967360]  kthread+0x328/0x630
[   32.967404]  ret_from_fork+0x10/0x20
[   32.967451] 
[   32.967472] Allocated by task 246:
[   32.967504]  kasan_save_stack+0x3c/0x68
[   32.967545]  kasan_save_track+0x20/0x40
[   32.967581]  kasan_save_alloc_info+0x40/0x58
[   32.967623]  __kasan_slab_alloc+0xa8/0xb0
[   32.967657]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.967700]  __kmem_cache_create_args+0x178/0x280
[   32.967743]  kmem_cache_double_destroy+0xc0/0x300
[   32.967784]  kunit_try_run_case+0x170/0x3f0
[   32.967821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.967862]  kthread+0x328/0x630
[   32.967897]  ret_from_fork+0x10/0x20
[   32.967932] 
[   32.967953] Freed by task 246:
[   32.967979]  kasan_save_stack+0x3c/0x68
[   32.968013]  kasan_save_track+0x20/0x40
[   32.968048]  kasan_save_free_info+0x4c/0x78
[   32.968097]  __kasan_slab_free+0x6c/0x98
[   32.968131]  kmem_cache_free+0x260/0x468
[   32.968169]  slab_kmem_cache_release+0x38/0x50
[   32.968209]  kmem_cache_release+0x1c/0x30
[   32.968247]  kobject_put+0x17c/0x420
[   32.968286]  sysfs_slab_release+0x1c/0x30
[   32.968320]  kmem_cache_destroy+0x118/0x218
[   32.968358]  kmem_cache_double_destroy+0x128/0x300
[   32.968399]  kunit_try_run_case+0x170/0x3f0
[   32.968437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.968480]  kthread+0x328/0x630
[   32.968514]  ret_from_fork+0x10/0x20
[   32.968550] 
[   32.968569] The buggy address belongs to the object at fff00000c47438c0
[   32.968569]  which belongs to the cache kmem_cache of size 208
[   32.968627] The buggy address is located 0 bytes inside of
[   32.968627]  freed 208-byte region [fff00000c47438c0, fff00000c4743990)
[   32.968688] 
[   32.968712] The buggy address belongs to the physical page:
[   32.968746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104743
[   32.968803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.968857] page_type: f5(slab)
[   32.968897] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   32.968947] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   32.968989] page dumped because: kasan: bad access detected
[   32.969021] 
[   32.969039] Memory state around the buggy address:
[   32.969074]  fff00000c4743780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.969129]  fff00000c4743800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   32.969172] >fff00000c4743880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.969209]                                            ^
[   32.969242]  fff00000c4743900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.969284]  fff00000c4743980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.969321] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure Automatically assigned
[   32.734691] ==================================================================
[   32.734792] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   32.734874] Read of size 1 at addr fff00000c3ff1000 by task kunit_try_catch/244
[   32.734924] 
[   32.734968] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   32.735058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.737531] Hardware name: linux,dummy-virt (DT)
[   32.738102] Call trace:
[   32.738343]  show_stack+0x20/0x38 (C)
[   32.738748]  dump_stack_lvl+0x8c/0xd0
[   32.739459]  print_report+0x118/0x5e8
[   32.739908]  kasan_report+0xdc/0x128
[   32.740089]  __asan_report_load1_noabort+0x20/0x30
[   32.740520]  kmem_cache_rcu_uaf+0x388/0x468
[   32.741131]  kunit_try_run_case+0x170/0x3f0
[   32.741683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.742092]  kthread+0x328/0x630
[   32.742686]  ret_from_fork+0x10/0x20
[   32.743125] 
[   32.743150] Allocated by task 244:
[   32.744203]  kasan_save_stack+0x3c/0x68
[   32.744497]  kasan_save_track+0x20/0x40
[   32.744579]  kasan_save_alloc_info+0x40/0x58
[   32.744656]  __kasan_slab_alloc+0xa8/0xb0
[   32.744969]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.745335]  kmem_cache_rcu_uaf+0x12c/0x468
[   32.745392]  kunit_try_run_case+0x170/0x3f0
[   32.745430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.745472]  kthread+0x328/0x630
[   32.745508]  ret_from_fork+0x10/0x20
[   32.745542] 
[   32.745567] Freed by task 0:
[   32.746044]  kasan_save_stack+0x3c/0x68
[   32.746375]  kasan_save_track+0x20/0x40
[   32.746422]  kasan_save_free_info+0x4c/0x78
[   32.746691]  __kasan_slab_free+0x6c/0x98
[   32.746858]  slab_free_after_rcu_debug+0xd4/0x2f8
[   32.746925]  rcu_core+0x9f4/0x1e58
[   32.746967]  rcu_core_si+0x18/0x30
[   32.747009]  handle_softirqs+0x374/0xb28
[   32.747048]  __do_softirq+0x1c/0x28
[   32.747434] 
[   32.747543] Last potentially related work creation:
[   32.747573]  kasan_save_stack+0x3c/0x68
[   32.747615]  kasan_record_aux_stack+0xb4/0xc8
[   32.747653]  kmem_cache_free+0x120/0x468
[   32.747690]  kmem_cache_rcu_uaf+0x16c/0x468
[   32.747737]  kunit_try_run_case+0x170/0x3f0
[   32.748587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.748751]  kthread+0x328/0x630
[   32.748800]  ret_from_fork+0x10/0x20
[   32.748838] 
[   32.748857] The buggy address belongs to the object at fff00000c3ff1000
[   32.748857]  which belongs to the cache test_cache of size 200
[   32.749469] The buggy address is located 0 bytes inside of
[   32.749469]  freed 200-byte region [fff00000c3ff1000, fff00000c3ff10c8)
[   32.749758] 
[   32.749783] The buggy address belongs to the physical page:
[   32.749820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ff1
[   32.749879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.749934] page_type: f5(slab)
[   32.749977] raw: 0bfffe0000000000 fff00000c4743780 dead000000000122 0000000000000000
[   32.750032] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   32.750704] page dumped because: kasan: bad access detected
[   32.751000] 
[   32.751020] Memory state around the buggy address:
[   32.751242]  fff00000c3ff0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.751378]  fff00000c3ff0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.751420] >fff00000c3ff1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.751887]                    ^
[   32.751925]  fff00000c3ff1080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.751970]  fff00000c3ff1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.752009] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure Automatically assigned
[   32.151172] ==================================================================
[   32.151233] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   32.151294] Free of addr fff00000c3ff2001 by task kunit_try_catch/242
[   32.151336] 
[   32.151404] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   32.151566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.151607] Hardware name: linux,dummy-virt (DT)
[   32.151640] Call trace:
[   32.151683]  show_stack+0x20/0x38 (C)
[   32.151818]  dump_stack_lvl+0x8c/0xd0
[   32.151873]  print_report+0x118/0x5e8
[   32.151937]  kasan_report_invalid_free+0xc0/0xe8
[   32.151985]  check_slab_allocation+0xfc/0x108
[   32.152030]  __kasan_slab_pre_free+0x2c/0x48
[   32.152075]  kmem_cache_free+0xf0/0x468
[   32.152135]  kmem_cache_invalid_free+0x184/0x3c8
[   32.152184]  kunit_try_run_case+0x170/0x3f0
[   32.152440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.152499]  kthread+0x328/0x630
[   32.152545]  ret_from_fork+0x10/0x20
[   32.152603] 
[   32.152621] Allocated by task 242:
[   32.152651]  kasan_save_stack+0x3c/0x68
[   32.152700]  kasan_save_track+0x20/0x40
[   32.152734]  kasan_save_alloc_info+0x40/0x58
[   32.152771]  __kasan_slab_alloc+0xa8/0xb0
[   32.152805]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.152856]  kmem_cache_invalid_free+0x12c/0x3c8
[   32.152895]  kunit_try_run_case+0x170/0x3f0
[   32.152931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.152978]  kthread+0x328/0x630
[   32.153021]  ret_from_fork+0x10/0x20
[   32.153055] 
[   32.153073] The buggy address belongs to the object at fff00000c3ff2000
[   32.153073]  which belongs to the cache test_cache of size 200
[   32.153158] The buggy address is located 1 bytes inside of
[   32.153158]  200-byte region [fff00000c3ff2000, fff00000c3ff20c8)
[   32.153226] 
[   32.153266] The buggy address belongs to the physical page:
[   32.153299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ff2
[   32.153361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.153411] page_type: f5(slab)
[   32.153450] raw: 0bfffe0000000000 fff00000c4743640 dead000000000122 0000000000000000
[   32.153516] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   32.153566] page dumped because: kasan: bad access detected
[   32.153612] 
[   32.153631] Memory state around the buggy address:
[   32.153667]  fff00000c3ff1f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.153721]  fff00000c3ff1f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.153764] >fff00000c3ff2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.153802]                    ^
[   32.153828]  fff00000c3ff2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.153870]  fff00000c3ff2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.153908] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure Automatically assigned
[   32.125980] ==================================================================
[   32.126060] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   32.126144] Free of addr fff00000c3f1d000 by task kunit_try_catch/240
[   32.126189] 
[   32.126231] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   32.126703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.126736] Hardware name: linux,dummy-virt (DT)
[   32.126839] Call trace:
[   32.126866]  show_stack+0x20/0x38 (C)
[   32.126918]  dump_stack_lvl+0x8c/0xd0
[   32.126997]  print_report+0x118/0x5e8
[   32.127041]  kasan_report_invalid_free+0xc0/0xe8
[   32.127109]  check_slab_allocation+0xd4/0x108
[   32.127154]  __kasan_slab_pre_free+0x2c/0x48
[   32.127198]  kmem_cache_free+0xf0/0x468
[   32.127245]  kmem_cache_double_free+0x190/0x3c8
[   32.127295]  kunit_try_run_case+0x170/0x3f0
[   32.127344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.127395]  kthread+0x328/0x630
[   32.127598]  ret_from_fork+0x10/0x20
[   32.127649] 
[   32.127697] Allocated by task 240:
[   32.127727]  kasan_save_stack+0x3c/0x68
[   32.127804]  kasan_save_track+0x20/0x40
[   32.127872]  kasan_save_alloc_info+0x40/0x58
[   32.127993]  __kasan_slab_alloc+0xa8/0xb0
[   32.128057]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.128105]  kmem_cache_double_free+0x12c/0x3c8
[   32.128145]  kunit_try_run_case+0x170/0x3f0
[   32.128181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.128224]  kthread+0x328/0x630
[   32.128255]  ret_from_fork+0x10/0x20
[   32.128537] 
[   32.128583] Freed by task 240:
[   32.128641]  kasan_save_stack+0x3c/0x68
[   32.128714]  kasan_save_track+0x20/0x40
[   32.128816]  kasan_save_free_info+0x4c/0x78
[   32.128902]  __kasan_slab_free+0x6c/0x98
[   32.128979]  kmem_cache_free+0x260/0x468
[   32.129040]  kmem_cache_double_free+0x140/0x3c8
[   32.129107]  kunit_try_run_case+0x170/0x3f0
[   32.129161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.129316]  kthread+0x328/0x630
[   32.129349]  ret_from_fork+0x10/0x20
[   32.129384] 
[   32.129404] The buggy address belongs to the object at fff00000c3f1d000
[   32.129404]  which belongs to the cache test_cache of size 200
[   32.129491] The buggy address is located 0 bytes inside of
[   32.129491]  200-byte region [fff00000c3f1d000, fff00000c3f1d0c8)
[   32.129578] 
[   32.129599] The buggy address belongs to the physical page:
[   32.129863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f1d
[   32.129964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.130057] page_type: f5(slab)
[   32.130174] raw: 0bfffe0000000000 fff00000ffec6f00 dead000000000122 0000000000000000
[   32.130251] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   32.130326] page dumped because: kasan: bad access detected
[   32.130357] 
[   32.130373] Memory state around the buggy address:
[   32.130695]  fff00000c3f1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.130749]  fff00000c3f1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.130835] >fff00000c3f1d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.130911]                    ^
[   32.130996]  fff00000c3f1d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.131117]  fff00000c3f1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.131179] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure Automatically assigned
[   31.982920] ==================================================================
[   31.982978] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   31.983066] Read of size 1 at addr fff00000c3f1c0c8 by task kunit_try_catch/238
[   31.983443] 
[   31.983478] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.983562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.983589] Hardware name: linux,dummy-virt (DT)
[   31.984000] Call trace:
[   31.984099]  show_stack+0x20/0x38 (C)
[   31.984470]  dump_stack_lvl+0x8c/0xd0
[   31.984800]  print_report+0x118/0x5e8
[   31.985507]  kasan_report+0xdc/0x128
[   31.985594]  __asan_report_load1_noabort+0x20/0x30
[   31.985678]  kmem_cache_oob+0x344/0x430
[   31.985760]  kunit_try_run_case+0x170/0x3f0
[   31.986009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.986145]  kthread+0x328/0x630
[   31.986258]  ret_from_fork+0x10/0x20
[   31.986337] 
[   31.986367] Allocated by task 238:
[   31.986927]  kasan_save_stack+0x3c/0x68
[   31.987045]  kasan_save_track+0x20/0x40
[   31.987144]  kasan_save_alloc_info+0x40/0x58
[   31.987317]  __kasan_slab_alloc+0xa8/0xb0
[   31.987578]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.987889]  kmem_cache_oob+0x12c/0x430
[   31.988037]  kunit_try_run_case+0x170/0x3f0
[   31.988177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.988272]  kthread+0x328/0x630
[   31.988411]  ret_from_fork+0x10/0x20
[   31.988498] 
[   31.988598] The buggy address belongs to the object at fff00000c3f1c000
[   31.988598]  which belongs to the cache test_cache of size 200
[   31.988694] The buggy address is located 0 bytes to the right of
[   31.988694]  allocated 200-byte region [fff00000c3f1c000, fff00000c3f1c0c8)
[   31.988832] 
[   31.988854] The buggy address belongs to the physical page:
[   31.988903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f1c
[   31.989109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.989332] page_type: f5(slab)
[   31.989412] raw: 0bfffe0000000000 fff00000c4743500 dead000000000122 0000000000000000
[   31.989779] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.989883] page dumped because: kasan: bad access detected
[   31.989962] 
[   31.989998] Memory state around the buggy address:
[   31.990047]  fff00000c3f1bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.990237]  fff00000c3f1c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.990709] >fff00000c3f1c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.991059]                                               ^
[   31.991299]  fff00000c3f1c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.991364]  fff00000c3f1c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.991653] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure Automatically assigned
[   31.946579] ==================================================================
[   31.946649] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   31.946727] Read of size 8 at addr fff00000c401e280 by task kunit_try_catch/231
[   31.946784] 
[   31.946824] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.946911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.946938] Hardware name: linux,dummy-virt (DT)
[   31.946975] Call trace:
[   31.946998]  show_stack+0x20/0x38 (C)
[   31.947046]  dump_stack_lvl+0x8c/0xd0
[   31.947107]  print_report+0x118/0x5e8
[   31.947148]  kasan_report+0xdc/0x128
[   31.947191]  __asan_report_load8_noabort+0x20/0x30
[   31.947239]  workqueue_uaf+0x480/0x4a8
[   31.947284]  kunit_try_run_case+0x170/0x3f0
[   31.947340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.947392]  kthread+0x328/0x630
[   31.947444]  ret_from_fork+0x10/0x20
[   31.947489] 
[   31.947507] Allocated by task 231:
[   31.947542]  kasan_save_stack+0x3c/0x68
[   31.947581]  kasan_save_track+0x20/0x40
[   31.947618]  kasan_save_alloc_info+0x40/0x58
[   31.947655]  __kasan_kmalloc+0xd4/0xd8
[   31.947688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.948096]  workqueue_uaf+0x13c/0x4a8
[   31.948432]  kunit_try_run_case+0x170/0x3f0
[   31.948904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.949259]  kthread+0x328/0x630
[   31.949444]  ret_from_fork+0x10/0x20
[   31.949505] 
[   31.949590] Freed by task 75:
[   31.949669]  kasan_save_stack+0x3c/0x68
[   31.949744]  kasan_save_track+0x20/0x40
[   31.949857]  kasan_save_free_info+0x4c/0x78
[   31.949926]  __kasan_slab_free+0x6c/0x98
[   31.950149]  kfree+0x214/0x3c8
[   31.950389]  workqueue_uaf_work+0x18/0x30
[   31.950459]  process_one_work+0x530/0xf88
[   31.950525]  worker_thread+0x618/0xf38
[   31.950644]  kthread+0x328/0x630
[   31.950722]  ret_from_fork+0x10/0x20
[   31.950800] 
[   31.950830] Last potentially related work creation:
[   31.950858]  kasan_save_stack+0x3c/0x68
[   31.950895]  kasan_record_aux_stack+0xb4/0xc8
[   31.950933]  __queue_work+0x65c/0xfe0
[   31.950978]  queue_work_on+0xbc/0xf8
[   31.951023]  workqueue_uaf+0x210/0x4a8
[   31.951060]  kunit_try_run_case+0x170/0x3f0
[   31.951117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.951160]  kthread+0x328/0x630
[   31.951206]  ret_from_fork+0x10/0x20
[   31.951245] 
[   31.951271] The buggy address belongs to the object at fff00000c401e280
[   31.951271]  which belongs to the cache kmalloc-32 of size 32
[   31.951343] The buggy address is located 0 bytes inside of
[   31.951343]  freed 32-byte region [fff00000c401e280, fff00000c401e2a0)
[   31.951411] 
[   31.951446] The buggy address belongs to the physical page:
[   31.951502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10401e
[   31.951556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.951638] page_type: f5(slab)
[   31.951677] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.951973] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.952197] page dumped because: kasan: bad access detected
[   31.952422] 
[   31.952694] Memory state around the buggy address:
[   31.952768]  fff00000c401e180: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.952990]  fff00000c401e200: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   31.953278] >fff00000c401e280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.953405]                    ^
[   31.953501]  fff00000c401e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.953548]  fff00000c401e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.953766] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure Automatically assigned
[   31.920876] ==================================================================
[   31.921009] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.921093] Read of size 4 at addr fff00000c401e0c0 by task swapper/0/0
[   31.921141] 
[   31.921181] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.921266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.921292] Hardware name: linux,dummy-virt (DT)
[   31.921326] Call trace:
[   31.921350]  show_stack+0x20/0x38 (C)
[   31.921401]  dump_stack_lvl+0x8c/0xd0
[   31.921449]  print_report+0x118/0x5e8
[   31.921493]  kasan_report+0xdc/0x128
[   31.921535]  __asan_report_load4_noabort+0x20/0x30
[   31.921581]  rcu_uaf_reclaim+0x64/0x70
[   31.921625]  rcu_core+0x9f4/0x1e58
[   31.921670]  rcu_core_si+0x18/0x30
[   31.921713]  handle_softirqs+0x374/0xb28
[   31.921758]  __do_softirq+0x1c/0x28
[   31.921801]  ____do_softirq+0x18/0x30
[   31.921842]  call_on_irq_stack+0x24/0x30
[   31.921885]  do_softirq_own_stack+0x24/0x38
[   31.921931]  __irq_exit_rcu+0x1fc/0x318
[   31.921975]  irq_exit_rcu+0x1c/0x80
[   31.922016]  el1_interrupt+0x38/0x58
[   31.922067]  el1h_64_irq_handler+0x18/0x28
[   31.922198]  el1h_64_irq+0x6c/0x70
[   31.922316]  arch_local_irq_enable+0x4/0x8 (P)
[   31.922683]  do_idle+0x384/0x4e8
[   31.922773]  cpu_startup_entry+0x68/0x80
[   31.922831]  rest_init+0x160/0x188
[   31.922874]  start_kernel+0x30c/0x3d0
[   31.922930]  __primary_switched+0x8c/0xa0
[   31.922982] 
[   31.923002] Allocated by task 229:
[   31.923032]  kasan_save_stack+0x3c/0x68
[   31.923072]  kasan_save_track+0x20/0x40
[   31.923122]  kasan_save_alloc_info+0x40/0x58
[   31.923161]  __kasan_kmalloc+0xd4/0xd8
[   31.923195]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.923237]  rcu_uaf+0xb0/0x2d8
[   31.923282]  kunit_try_run_case+0x170/0x3f0
[   31.923321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.923364]  kthread+0x328/0x630
[   31.923396]  ret_from_fork+0x10/0x20
[   31.923432] 
[   31.923451] Freed by task 0:
[   31.923477]  kasan_save_stack+0x3c/0x68
[   31.923511]  kasan_save_track+0x20/0x40
[   31.923546]  kasan_save_free_info+0x4c/0x78
[   31.923584]  __kasan_slab_free+0x6c/0x98
[   31.923821]  kfree+0x214/0x3c8
[   31.923872]  rcu_uaf_reclaim+0x28/0x70
[   31.923910]  rcu_core+0x9f4/0x1e58
[   31.923947]  rcu_core_si+0x18/0x30
[   31.923981]  handle_softirqs+0x374/0xb28
[   31.924215]  __do_softirq+0x1c/0x28
[   31.924307] 
[   31.924535] Last potentially related work creation:
[   31.924596]  kasan_save_stack+0x3c/0x68
[   31.924637]  kasan_record_aux_stack+0xb4/0xc8
[   31.924677]  __call_rcu_common.constprop.0+0x74/0x8c8
[   31.924718]  call_rcu+0x18/0x30
[   31.924754]  rcu_uaf+0x14c/0x2d8
[   31.924793]  kunit_try_run_case+0x170/0x3f0
[   31.924830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.924873]  kthread+0x328/0x630
[   31.924919]  ret_from_fork+0x10/0x20
[   31.924994] 
[   31.925184] The buggy address belongs to the object at fff00000c401e0c0
[   31.925184]  which belongs to the cache kmalloc-32 of size 32
[   31.925405] The buggy address is located 0 bytes inside of
[   31.925405]  freed 32-byte region [fff00000c401e0c0, fff00000c401e0e0)
[   31.925720] 
[   31.925793] The buggy address belongs to the physical page:
[   31.926065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10401e
[   31.926374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.926705] page_type: f5(slab)
[   31.926808] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.927288] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.927360] page dumped because: kasan: bad access detected
[   31.927463] 
[   31.927549] Memory state around the buggy address:
[   31.927603]  fff00000c401df80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.927663]  fff00000c401e000: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.927740] >fff00000c401e080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.927779]                                            ^
[   31.927949]  fff00000c401e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.927996]  fff00000c401e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.928159] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure Automatically assigned
[   31.746860] ==================================================================
[   31.746982] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.747131] Read of size 1 at addr fff00000c3efde00 by task kunit_try_catch/227
[   31.747186] 
[   31.747217] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.747558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.747589] Hardware name: linux,dummy-virt (DT)
[   31.747622] Call trace:
[   31.747772]  show_stack+0x20/0x38 (C)
[   31.747983]  dump_stack_lvl+0x8c/0xd0
[   31.748183]  print_report+0x118/0x5e8
[   31.748253]  kasan_report+0xdc/0x128
[   31.748423]  __kasan_check_byte+0x54/0x70
[   31.748579]  ksize+0x30/0x88
[   31.748648]  ksize_uaf+0x168/0x5f8
[   31.748792]  kunit_try_run_case+0x170/0x3f0
[   31.748877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.749018]  kthread+0x328/0x630
[   31.749098]  ret_from_fork+0x10/0x20
[   31.749220] 
[   31.749239] Allocated by task 227:
[   31.749291]  kasan_save_stack+0x3c/0x68
[   31.749577]  kasan_save_track+0x20/0x40
[   31.749647]  kasan_save_alloc_info+0x40/0x58
[   31.749685]  __kasan_kmalloc+0xd4/0xd8
[   31.749722]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.749821]  ksize_uaf+0xb8/0x5f8
[   31.749860]  kunit_try_run_case+0x170/0x3f0
[   31.749902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.749961]  kthread+0x328/0x630
[   31.749994]  ret_from_fork+0x10/0x20
[   31.750045] 
[   31.750070] Freed by task 227:
[   31.750353]  kasan_save_stack+0x3c/0x68
[   31.750469]  kasan_save_track+0x20/0x40
[   31.750619]  kasan_save_free_info+0x4c/0x78
[   31.750685]  __kasan_slab_free+0x6c/0x98
[   31.751017]  kfree+0x214/0x3c8
[   31.751075]  ksize_uaf+0x11c/0x5f8
[   31.751144]  kunit_try_run_case+0x170/0x3f0
[   31.751486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.751567]  kthread+0x328/0x630
[   31.751652]  ret_from_fork+0x10/0x20
[   31.751755] 
[   31.751799] The buggy address belongs to the object at fff00000c3efde00
[   31.751799]  which belongs to the cache kmalloc-128 of size 128
[   31.751976] The buggy address is located 0 bytes inside of
[   31.751976]  freed 128-byte region [fff00000c3efde00, fff00000c3efde80)
[   31.752092] 
[   31.752329] The buggy address belongs to the physical page:
[   31.752428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.752584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.752670] page_type: f5(slab)
[   31.752727] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.752859] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.752983] page dumped because: kasan: bad access detected
[   31.753043] 
[   31.753106] Memory state around the buggy address:
[   31.753194]  fff00000c3efdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.753265]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.753307] >fff00000c3efde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.753584]                    ^
[   31.753670]  fff00000c3efde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.753757]  fff00000c3efdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.753846] ==================================================================
[   31.754478] ==================================================================
[   31.754742] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.754951] Read of size 1 at addr fff00000c3efde00 by task kunit_try_catch/227
[   31.755027] 
[   31.755086] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.755215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.755253] Hardware name: linux,dummy-virt (DT)
[   31.755284] Call trace:
[   31.755313]  show_stack+0x20/0x38 (C)
[   31.755525]  dump_stack_lvl+0x8c/0xd0
[   31.755686]  print_report+0x118/0x5e8
[   31.755817]  kasan_report+0xdc/0x128
[   31.755926]  __asan_report_load1_noabort+0x20/0x30
[   31.756012]  ksize_uaf+0x598/0x5f8
[   31.756198]  kunit_try_run_case+0x170/0x3f0
[   31.756245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.756294]  kthread+0x328/0x630
[   31.756631]  ret_from_fork+0x10/0x20
[   31.756697] 
[   31.756717] Allocated by task 227:
[   31.756783]  kasan_save_stack+0x3c/0x68
[   31.756825]  kasan_save_track+0x20/0x40
[   31.756859]  kasan_save_alloc_info+0x40/0x58
[   31.756897]  __kasan_kmalloc+0xd4/0xd8
[   31.756941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.756982]  ksize_uaf+0xb8/0x5f8
[   31.757016]  kunit_try_run_case+0x170/0x3f0
[   31.757051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.757320]  kthread+0x328/0x630
[   31.757441]  ret_from_fork+0x10/0x20
[   31.757522] 
[   31.757604] Freed by task 227:
[   31.757685]  kasan_save_stack+0x3c/0x68
[   31.757735]  kasan_save_track+0x20/0x40
[   31.758061]  kasan_save_free_info+0x4c/0x78
[   31.758152]  __kasan_slab_free+0x6c/0x98
[   31.758205]  kfree+0x214/0x3c8
[   31.758258]  ksize_uaf+0x11c/0x5f8
[   31.758512]  kunit_try_run_case+0x170/0x3f0
[   31.758682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.758732]  kthread+0x328/0x630
[   31.758982]  ret_from_fork+0x10/0x20
[   31.759181] 
[   31.759234] The buggy address belongs to the object at fff00000c3efde00
[   31.759234]  which belongs to the cache kmalloc-128 of size 128
[   31.759357] The buggy address is located 0 bytes inside of
[   31.759357]  freed 128-byte region [fff00000c3efde00, fff00000c3efde80)
[   31.759514] 
[   31.759565] The buggy address belongs to the physical page:
[   31.759846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.759990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.760183] page_type: f5(slab)
[   31.760256] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.760392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.760469] page dumped because: kasan: bad access detected
[   31.760615] 
[   31.760653] Memory state around the buggy address:
[   31.760688]  fff00000c3efdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.760733]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.760775] >fff00000c3efde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.761095]                    ^
[   31.761149]  fff00000c3efde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.761214]  fff00000c3efdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.761316] ==================================================================
[   31.761905] ==================================================================
[   31.761954] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   31.762003] Read of size 1 at addr fff00000c3efde78 by task kunit_try_catch/227
[   31.762087] 
[   31.762118] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.762202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.762237] Hardware name: linux,dummy-virt (DT)
[   31.762266] Call trace:
[   31.762289]  show_stack+0x20/0x38 (C)
[   31.762342]  dump_stack_lvl+0x8c/0xd0
[   31.762390]  print_report+0x118/0x5e8
[   31.762433]  kasan_report+0xdc/0x128
[   31.762473]  __asan_report_load1_noabort+0x20/0x30
[   31.762521]  ksize_uaf+0x544/0x5f8
[   31.762563]  kunit_try_run_case+0x170/0x3f0
[   31.762614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.762665]  kthread+0x328/0x630
[   31.762710]  ret_from_fork+0x10/0x20
[   31.762754] 
[   31.762773] Allocated by task 227:
[   31.762810]  kasan_save_stack+0x3c/0x68
[   31.762847]  kasan_save_track+0x20/0x40
[   31.762890]  kasan_save_alloc_info+0x40/0x58
[   31.762930]  __kasan_kmalloc+0xd4/0xd8
[   31.762964]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.763004]  ksize_uaf+0xb8/0x5f8
[   31.763039]  kunit_try_run_case+0x170/0x3f0
[   31.763076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.763128]  kthread+0x328/0x630
[   31.763431]  ret_from_fork+0x10/0x20
[   31.763584] 
[   31.763622] Freed by task 227:
[   31.763799]  kasan_save_stack+0x3c/0x68
[   31.763954]  kasan_save_track+0x20/0x40
[   31.764131]  kasan_save_free_info+0x4c/0x78
[   31.764218]  __kasan_slab_free+0x6c/0x98
[   31.764580]  kfree+0x214/0x3c8
[   31.764651]  ksize_uaf+0x11c/0x5f8
[   31.765189]  kunit_try_run_case+0x170/0x3f0
[   31.765496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.765573]  kthread+0x328/0x630
[   31.765637]  ret_from_fork+0x10/0x20
[   31.765727] 
[   31.765819] The buggy address belongs to the object at fff00000c3efde00
[   31.765819]  which belongs to the cache kmalloc-128 of size 128
[   31.765939] The buggy address is located 120 bytes inside of
[   31.765939]  freed 128-byte region [fff00000c3efde00, fff00000c3efde80)
[   31.766003] 
[   31.766026] The buggy address belongs to the physical page:
[   31.766208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.766330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.766653] page_type: f5(slab)
[   31.766964] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.767030] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.767385] page dumped because: kasan: bad access detected
[   31.767448] 
[   31.767498] Memory state around the buggy address:
[   31.767767]  fff00000c3efdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.767833]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.767884] >fff00000c3efde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.767993]                                                                 ^
[   31.768068]  fff00000c3efde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.768189]  fff00000c3efdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.768257] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure Automatically assigned
[   31.732425] ==================================================================
[   31.732501] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.732553] Read of size 1 at addr fff00000c3efdd7f by task kunit_try_catch/225
[   31.732622] 
[   31.732971] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.733129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.733178] Hardware name: linux,dummy-virt (DT)
[   31.733226] Call trace:
[   31.733253]  show_stack+0x20/0x38 (C)
[   31.733544]  dump_stack_lvl+0x8c/0xd0
[   31.733644]  print_report+0x118/0x5e8
[   31.733727]  kasan_report+0xdc/0x128
[   31.733794]  __asan_report_load1_noabort+0x20/0x30
[   31.733845]  ksize_unpoisons_memory+0x690/0x740
[   31.734150]  kunit_try_run_case+0x170/0x3f0
[   31.734236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.734290]  kthread+0x328/0x630
[   31.734365]  ret_from_fork+0x10/0x20
[   31.734417] 
[   31.734435] Allocated by task 225:
[   31.734492]  kasan_save_stack+0x3c/0x68
[   31.734537]  kasan_save_track+0x20/0x40
[   31.734572]  kasan_save_alloc_info+0x40/0x58
[   31.734867]  __kasan_kmalloc+0xd4/0xd8
[   31.734943]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.735072]  ksize_unpoisons_memory+0xc0/0x740
[   31.735128]  kunit_try_run_case+0x170/0x3f0
[   31.735163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.735210]  kthread+0x328/0x630
[   31.735408]  ret_from_fork+0x10/0x20
[   31.735469] 
[   31.735615] The buggy address belongs to the object at fff00000c3efdd00
[   31.735615]  which belongs to the cache kmalloc-128 of size 128
[   31.735681] The buggy address is located 12 bytes to the right of
[   31.735681]  allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73)
[   31.736057] 
[   31.736156] The buggy address belongs to the physical page:
[   31.736190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.736246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.736304] page_type: f5(slab)
[   31.736342] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.736634] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.736813] page dumped because: kasan: bad access detected
[   31.737016] 
[   31.737074] Memory state around the buggy address:
[   31.737346]  fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.737509]  fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.737643] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.737683]                                                                 ^
[   31.738005]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.738102]  fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.738223] ==================================================================
[   31.727015] ==================================================================
[   31.727065] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   31.727128] Read of size 1 at addr fff00000c3efdd78 by task kunit_try_catch/225
[   31.727384] 
[   31.727426] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.727531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.727567] Hardware name: linux,dummy-virt (DT)
[   31.727598] Call trace:
[   31.727621]  show_stack+0x20/0x38 (C)
[   31.727668]  dump_stack_lvl+0x8c/0xd0
[   31.727717]  print_report+0x118/0x5e8
[   31.727760]  kasan_report+0xdc/0x128
[   31.727803]  __asan_report_load1_noabort+0x20/0x30
[   31.727863]  ksize_unpoisons_memory+0x618/0x740
[   31.727911]  kunit_try_run_case+0x170/0x3f0
[   31.727967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.728020]  kthread+0x328/0x630
[   31.728066]  ret_from_fork+0x10/0x20
[   31.728125] 
[   31.728157] Allocated by task 225:
[   31.728185]  kasan_save_stack+0x3c/0x68
[   31.728231]  kasan_save_track+0x20/0x40
[   31.728275]  kasan_save_alloc_info+0x40/0x58
[   31.728313]  __kasan_kmalloc+0xd4/0xd8
[   31.728353]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.728394]  ksize_unpoisons_memory+0xc0/0x740
[   31.728434]  kunit_try_run_case+0x170/0x3f0
[   31.728471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.728513]  kthread+0x328/0x630
[   31.728559]  ret_from_fork+0x10/0x20
[   31.728597] 
[   31.728624] The buggy address belongs to the object at fff00000c3efdd00
[   31.728624]  which belongs to the cache kmalloc-128 of size 128
[   31.728689] The buggy address is located 5 bytes to the right of
[   31.728689]  allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73)
[   31.728751] 
[   31.728771] The buggy address belongs to the physical page:
[   31.728800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.728852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.728909] page_type: f5(slab)
[   31.728953] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.729003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.729048] page dumped because: kasan: bad access detected
[   31.729089] 
[   31.729435] Memory state around the buggy address:
[   31.729524]  fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.729834]  fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.730070] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.730338]                                                                 ^
[   31.730594]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.730647]  fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.731195] ==================================================================
[   31.720413] ==================================================================
[   31.720500] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   31.720641] Read of size 1 at addr fff00000c3efdd73 by task kunit_try_catch/225
[   31.720697] 
[   31.720728] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.720818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.720845] Hardware name: linux,dummy-virt (DT)
[   31.721177] Call trace:
[   31.721214]  show_stack+0x20/0x38 (C)
[   31.721356]  dump_stack_lvl+0x8c/0xd0
[   31.721410]  print_report+0x118/0x5e8
[   31.721480]  kasan_report+0xdc/0x128
[   31.721602]  __asan_report_load1_noabort+0x20/0x30
[   31.721654]  ksize_unpoisons_memory+0x628/0x740
[   31.721945]  kunit_try_run_case+0x170/0x3f0
[   31.722026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.722309]  kthread+0x328/0x630
[   31.722385]  ret_from_fork+0x10/0x20
[   31.722452] 
[   31.722543] Allocated by task 225:
[   31.722574]  kasan_save_stack+0x3c/0x68
[   31.722614]  kasan_save_track+0x20/0x40
[   31.722649]  kasan_save_alloc_info+0x40/0x58
[   31.722702]  __kasan_kmalloc+0xd4/0xd8
[   31.723002]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.723094]  ksize_unpoisons_memory+0xc0/0x740
[   31.723143]  kunit_try_run_case+0x170/0x3f0
[   31.723192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.723292]  kthread+0x328/0x630
[   31.723327]  ret_from_fork+0x10/0x20
[   31.723384] 
[   31.723425] The buggy address belongs to the object at fff00000c3efdd00
[   31.723425]  which belongs to the cache kmalloc-128 of size 128
[   31.723485] The buggy address is located 0 bytes to the right of
[   31.723485]  allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73)
[   31.723698] 
[   31.723814] The buggy address belongs to the physical page:
[   31.723991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.724143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.724244] page_type: f5(slab)
[   31.724302] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.724425] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.724470] page dumped because: kasan: bad access detected
[   31.724512] 
[   31.724535] Memory state around the buggy address:
[   31.724575]  fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.724936]  fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.724992] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.725759]                                                              ^
[   31.725836]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.725905]  fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.726010] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure Automatically assigned
[   31.705970] ==================================================================
[   31.706104] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   31.706179] Free of addr fff00000c907e100 by task kunit_try_catch/223
[   31.706222] 
[   31.706281] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.706510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.706542] Hardware name: linux,dummy-virt (DT)
[   31.706584] Call trace:
[   31.706609]  show_stack+0x20/0x38 (C)
[   31.706661]  dump_stack_lvl+0x8c/0xd0
[   31.706708]  print_report+0x118/0x5e8
[   31.706750]  kasan_report_invalid_free+0xc0/0xe8
[   31.706802]  check_slab_allocation+0xd4/0x108
[   31.706847]  __kasan_slab_pre_free+0x2c/0x48
[   31.706891]  kfree+0xe8/0x3c8
[   31.706934]  kfree_sensitive+0x3c/0xb0
[   31.706999]  kmalloc_double_kzfree+0x168/0x308
[   31.707047]  kunit_try_run_case+0x170/0x3f0
[   31.707132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.707186]  kthread+0x328/0x630
[   31.707769]  ret_from_fork+0x10/0x20
[   31.707845] 
[   31.707893] Allocated by task 223:
[   31.707937]  kasan_save_stack+0x3c/0x68
[   31.708060]  kasan_save_track+0x20/0x40
[   31.708147]  kasan_save_alloc_info+0x40/0x58
[   31.708282]  __kasan_kmalloc+0xd4/0xd8
[   31.708480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.708550]  kmalloc_double_kzfree+0xb8/0x308
[   31.708711]  kunit_try_run_case+0x170/0x3f0
[   31.708776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.708882]  kthread+0x328/0x630
[   31.708943]  ret_from_fork+0x10/0x20
[   31.709104] 
[   31.709164] Freed by task 223:
[   31.709210]  kasan_save_stack+0x3c/0x68
[   31.709350]  kasan_save_track+0x20/0x40
[   31.709438]  kasan_save_free_info+0x4c/0x78
[   31.709749]  __kasan_slab_free+0x6c/0x98
[   31.709819]  kfree+0x214/0x3c8
[   31.709884]  kfree_sensitive+0x80/0xb0
[   31.710004]  kmalloc_double_kzfree+0x11c/0x308
[   31.710155]  kunit_try_run_case+0x170/0x3f0
[   31.710222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.710300]  kthread+0x328/0x630
[   31.710398]  ret_from_fork+0x10/0x20
[   31.710446] 
[   31.710466] The buggy address belongs to the object at fff00000c907e100
[   31.710466]  which belongs to the cache kmalloc-16 of size 16
[   31.710838] The buggy address is located 0 bytes inside of
[   31.710838]  16-byte region [fff00000c907e100, fff00000c907e110)
[   31.710921] 
[   31.711282] The buggy address belongs to the physical page:
[   31.711346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e
[   31.711513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.711612] page_type: f5(slab)
[   31.711667] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.711791] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000
[   31.711872] page dumped because: kasan: bad access detected
[   31.711922] 
[   31.711940] Memory state around the buggy address:
[   31.711973]  fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.712019]  fff00000c907e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.712067] >fff00000c907e100: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.712114]                    ^
[   31.712541]  fff00000c907e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.712619]  fff00000c907e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.712747] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure Automatically assigned
[   31.694141] ==================================================================
[   31.694214] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   31.694284] Read of size 1 at addr fff00000c907e100 by task kunit_try_catch/223
[   31.694576] 
[   31.694644] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.694733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.694761] Hardware name: linux,dummy-virt (DT)
[   31.694844] Call trace:
[   31.694871]  show_stack+0x20/0x38 (C)
[   31.694924]  dump_stack_lvl+0x8c/0xd0
[   31.695225]  print_report+0x118/0x5e8
[   31.695310]  kasan_report+0xdc/0x128
[   31.695354]  __kasan_check_byte+0x54/0x70
[   31.695564]  kfree_sensitive+0x30/0xb0
[   31.695643]  kmalloc_double_kzfree+0x168/0x308
[   31.695696]  kunit_try_run_case+0x170/0x3f0
[   31.696122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.696301]  kthread+0x328/0x630
[   31.696359]  ret_from_fork+0x10/0x20
[   31.696646] 
[   31.696755] Allocated by task 223:
[   31.696900]  kasan_save_stack+0x3c/0x68
[   31.697221]  kasan_save_track+0x20/0x40
[   31.697346]  kasan_save_alloc_info+0x40/0x58
[   31.697424]  __kasan_kmalloc+0xd4/0xd8
[   31.697478]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.697674]  kmalloc_double_kzfree+0xb8/0x308
[   31.697936]  kunit_try_run_case+0x170/0x3f0
[   31.697986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.698034]  kthread+0x328/0x630
[   31.698414]  ret_from_fork+0x10/0x20
[   31.698534] 
[   31.698577] Freed by task 223:
[   31.698606]  kasan_save_stack+0x3c/0x68
[   31.698785]  kasan_save_track+0x20/0x40
[   31.699007]  kasan_save_free_info+0x4c/0x78
[   31.699134]  __kasan_slab_free+0x6c/0x98
[   31.699171]  kfree+0x214/0x3c8
[   31.699462]  kfree_sensitive+0x80/0xb0
[   31.699601]  kmalloc_double_kzfree+0x11c/0x308
[   31.699690]  kunit_try_run_case+0x170/0x3f0
[   31.699756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.699799]  kthread+0x328/0x630
[   31.699833]  ret_from_fork+0x10/0x20
[   31.699867] 
[   31.700239] The buggy address belongs to the object at fff00000c907e100
[   31.700239]  which belongs to the cache kmalloc-16 of size 16
[   31.700354] The buggy address is located 0 bytes inside of
[   31.700354]  freed 16-byte region [fff00000c907e100, fff00000c907e110)
[   31.700477] 
[   31.700518] The buggy address belongs to the physical page:
[   31.700558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e
[   31.700942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.701070] page_type: f5(slab)
[   31.701143] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.701474] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000
[   31.701542] page dumped because: kasan: bad access detected
[   31.701634] 
[   31.701666] Memory state around the buggy address:
[   31.701699]  fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.701772]  fff00000c907e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.702100] >fff00000c907e100: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.702197]                    ^
[   31.702279]  fff00000c907e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.702358]  fff00000c907e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.702670] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure Automatically assigned
[   31.670424] ==================================================================
[   31.670501] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   31.670555] Read of size 1 at addr fff00000c9a42428 by task kunit_try_catch/219
[   31.670671] 
[   31.670705] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.670790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.670832] Hardware name: linux,dummy-virt (DT)
[   31.671168] Call trace:
[   31.671209]  show_stack+0x20/0x38 (C)
[   31.671497]  dump_stack_lvl+0x8c/0xd0
[   31.671596]  print_report+0x118/0x5e8
[   31.671702]  kasan_report+0xdc/0x128
[   31.671804]  __asan_report_load1_noabort+0x20/0x30
[   31.671884]  kmalloc_uaf2+0x3f4/0x468
[   31.672000]  kunit_try_run_case+0x170/0x3f0
[   31.672063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.672284]  kthread+0x328/0x630
[   31.672430]  ret_from_fork+0x10/0x20
[   31.672642] 
[   31.672702] Allocated by task 219:
[   31.672841]  kasan_save_stack+0x3c/0x68
[   31.672930]  kasan_save_track+0x20/0x40
[   31.673108]  kasan_save_alloc_info+0x40/0x58
[   31.673197]  __kasan_kmalloc+0xd4/0xd8
[   31.673596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.673659]  kmalloc_uaf2+0xc4/0x468
[   31.673791]  kunit_try_run_case+0x170/0x3f0
[   31.673869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.674043]  kthread+0x328/0x630
[   31.674123]  ret_from_fork+0x10/0x20
[   31.674247] 
[   31.674284] Freed by task 219:
[   31.674311]  kasan_save_stack+0x3c/0x68
[   31.674363]  kasan_save_track+0x20/0x40
[   31.674400]  kasan_save_free_info+0x4c/0x78
[   31.674725]  __kasan_slab_free+0x6c/0x98
[   31.674796]  kfree+0x214/0x3c8
[   31.674960]  kmalloc_uaf2+0x134/0x468
[   31.675048]  kunit_try_run_case+0x170/0x3f0
[   31.675124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.675537]  kthread+0x328/0x630
[   31.675626]  ret_from_fork+0x10/0x20
[   31.675690] 
[   31.675781] The buggy address belongs to the object at fff00000c9a42400
[   31.675781]  which belongs to the cache kmalloc-64 of size 64
[   31.675868] The buggy address is located 40 bytes inside of
[   31.675868]  freed 64-byte region [fff00000c9a42400, fff00000c9a42440)
[   31.676013] 
[   31.676071] The buggy address belongs to the physical page:
[   31.676124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a42
[   31.676180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.676228] page_type: f5(slab)
[   31.676265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.676636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.676736] page dumped because: kasan: bad access detected
[   31.676800] 
[   31.676819] Memory state around the buggy address:
[   31.676853]  fff00000c9a42300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.676942]  fff00000c9a42380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.676993] >fff00000c9a42400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.677032]                                   ^
[   31.677074]  fff00000c9a42480: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   31.677127]  fff00000c9a42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.677164] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure Automatically assigned
[   31.653119] ==================================================================
[   31.653192] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   31.653390] Write of size 33 at addr fff00000c9a42280 by task kunit_try_catch/217
[   31.653452] 
[   31.653520] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.653613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.653939] Hardware name: linux,dummy-virt (DT)
[   31.653989] Call trace:
[   31.654112]  show_stack+0x20/0x38 (C)
[   31.654198]  dump_stack_lvl+0x8c/0xd0
[   31.654249]  print_report+0x118/0x5e8
[   31.654553]  kasan_report+0xdc/0x128
[   31.654607]  kasan_check_range+0x100/0x1a8
[   31.654654]  __asan_memset+0x34/0x78
[   31.654697]  kmalloc_uaf_memset+0x170/0x310
[   31.655060]  kunit_try_run_case+0x170/0x3f0
[   31.655167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.655264]  kthread+0x328/0x630
[   31.655307]  ret_from_fork+0x10/0x20
[   31.655498] 
[   31.655517] Allocated by task 217:
[   31.655546]  kasan_save_stack+0x3c/0x68
[   31.655753]  kasan_save_track+0x20/0x40
[   31.655813]  kasan_save_alloc_info+0x40/0x58
[   31.655852]  __kasan_kmalloc+0xd4/0xd8
[   31.655892]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.655932]  kmalloc_uaf_memset+0xb8/0x310
[   31.655968]  kunit_try_run_case+0x170/0x3f0
[   31.656005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.656389]  kthread+0x328/0x630
[   31.656475]  ret_from_fork+0x10/0x20
[   31.656513] 
[   31.656569] Freed by task 217:
[   31.656882]  kasan_save_stack+0x3c/0x68
[   31.657113]  kasan_save_track+0x20/0x40
[   31.657332]  kasan_save_free_info+0x4c/0x78
[   31.657663]  __kasan_slab_free+0x6c/0x98
[   31.657736]  kfree+0x214/0x3c8
[   31.657786]  kmalloc_uaf_memset+0x11c/0x310
[   31.657943]  kunit_try_run_case+0x170/0x3f0
[   31.658103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.658198]  kthread+0x328/0x630
[   31.658335]  ret_from_fork+0x10/0x20
[   31.658375] 
[   31.658411] The buggy address belongs to the object at fff00000c9a42280
[   31.658411]  which belongs to the cache kmalloc-64 of size 64
[   31.658478] The buggy address is located 0 bytes inside of
[   31.658478]  freed 64-byte region [fff00000c9a42280, fff00000c9a422c0)
[   31.658539] 
[   31.658671] The buggy address belongs to the physical page:
[   31.658725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a42
[   31.658779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.658829] page_type: f5(slab)
[   31.658879] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.658927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.658978] page dumped because: kasan: bad access detected
[   31.659016] 
[   31.659042] Memory state around the buggy address:
[   31.659088]  fff00000c9a42180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.659132]  fff00000c9a42200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.659174] >fff00000c9a42280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.659210]                    ^
[   31.659237]  fff00000c9a42300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.659279]  fff00000c9a42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.659318] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure Automatically assigned
[   31.635337] ==================================================================
[   31.635394] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   31.635444] Read of size 1 at addr fff00000c907e0e8 by task kunit_try_catch/215
[   31.635493] 
[   31.635522] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.635605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.635630] Hardware name: linux,dummy-virt (DT)
[   31.635661] Call trace:
[   31.635685]  show_stack+0x20/0x38 (C)
[   31.635732]  dump_stack_lvl+0x8c/0xd0
[   31.635779]  print_report+0x118/0x5e8
[   31.635820]  kasan_report+0xdc/0x128
[   31.635862]  __asan_report_load1_noabort+0x20/0x30
[   31.635910]  kmalloc_uaf+0x300/0x338
[   31.635952]  kunit_try_run_case+0x170/0x3f0
[   31.635998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.636528]  kthread+0x328/0x630
[   31.636835]  ret_from_fork+0x10/0x20
[   31.637096] 
[   31.637226] Allocated by task 215:
[   31.637279]  kasan_save_stack+0x3c/0x68
[   31.637643]  kasan_save_track+0x20/0x40
[   31.637711]  kasan_save_alloc_info+0x40/0x58
[   31.637772]  __kasan_kmalloc+0xd4/0xd8
[   31.637856]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.637958]  kmalloc_uaf+0xb8/0x338
[   31.638126]  kunit_try_run_case+0x170/0x3f0
[   31.638224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.638536]  kthread+0x328/0x630
[   31.638699]  ret_from_fork+0x10/0x20
[   31.638857] 
[   31.638926] Freed by task 215:
[   31.639055]  kasan_save_stack+0x3c/0x68
[   31.639132]  kasan_save_track+0x20/0x40
[   31.639236]  kasan_save_free_info+0x4c/0x78
[   31.639305]  __kasan_slab_free+0x6c/0x98
[   31.639370]  kfree+0x214/0x3c8
[   31.639678]  kmalloc_uaf+0x11c/0x338
[   31.639768]  kunit_try_run_case+0x170/0x3f0
[   31.639842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.639990]  kthread+0x328/0x630
[   31.640156]  ret_from_fork+0x10/0x20
[   31.640242] 
[   31.640568] The buggy address belongs to the object at fff00000c907e0e0
[   31.640568]  which belongs to the cache kmalloc-16 of size 16
[   31.640657] The buggy address is located 8 bytes inside of
[   31.640657]  freed 16-byte region [fff00000c907e0e0, fff00000c907e0f0)
[   31.640820] 
[   31.640869] The buggy address belongs to the physical page:
[   31.640928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e
[   31.641251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.641379] page_type: f5(slab)
[   31.641434] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.641532] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000
[   31.641641] page dumped because: kasan: bad access detected
[   31.641724] 
[   31.641792] Memory state around the buggy address:
[   31.642106]  fff00000c907df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.642211]  fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.642285] >fff00000c907e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.642354]                                                           ^
[   31.642495]  fff00000c907e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.642569]  fff00000c907e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.642725] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure Automatically assigned
[   31.618201] ==================================================================
[   31.618590] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   31.618654] Read of size 64 at addr fff00000c9aa9f84 by task kunit_try_catch/213
[   31.619003] 
[   31.619038] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.619675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.619978] Hardware name: linux,dummy-virt (DT)
[   31.620026] Call trace:
[   31.620070]  show_stack+0x20/0x38 (C)
[   31.620160]  dump_stack_lvl+0x8c/0xd0
[   31.620269]  print_report+0x118/0x5e8
[   31.620373]  kasan_report+0xdc/0x128
[   31.620424]  kasan_check_range+0x100/0x1a8
[   31.620469]  __asan_memmove+0x3c/0x98
[   31.620511]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   31.620850]  kunit_try_run_case+0x170/0x3f0
[   31.621150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.621340]  kthread+0x328/0x630
[   31.621390]  ret_from_fork+0x10/0x20
[   31.621816] 
[   31.621874] Allocated by task 213:
[   31.622336]  kasan_save_stack+0x3c/0x68
[   31.622657]  kasan_save_track+0x20/0x40
[   31.622697]  kasan_save_alloc_info+0x40/0x58
[   31.622754]  __kasan_kmalloc+0xd4/0xd8
[   31.622819]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.622998]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   31.623424]  kunit_try_run_case+0x170/0x3f0
[   31.623602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.623690]  kthread+0x328/0x630
[   31.623799]  ret_from_fork+0x10/0x20
[   31.623929] 
[   31.624011] The buggy address belongs to the object at fff00000c9aa9f80
[   31.624011]  which belongs to the cache kmalloc-64 of size 64
[   31.624126] The buggy address is located 4 bytes inside of
[   31.624126]  allocated 64-byte region [fff00000c9aa9f80, fff00000c9aa9fc0)
[   31.624190] 
[   31.624219] The buggy address belongs to the physical page:
[   31.624250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aa9
[   31.624605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.624759] page_type: f5(slab)
[   31.624819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.625165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.625293] page dumped because: kasan: bad access detected
[   31.625352] 
[   31.625475] Memory state around the buggy address:
[   31.625513]  fff00000c9aa9e80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.625594]  fff00000c9aa9f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.626199] >fff00000c9aa9f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.626287]                                            ^
[   31.626383]  fff00000c9aaa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.626426]  fff00000c9aaa080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   31.626743] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure Automatically assigned
[   31.603338] ==================================================================
[   31.603484] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   31.603544] Read of size 18446744073709551614 at addr fff00000c9aa9d84 by task kunit_try_catch/211
[   31.603675] 
[   31.603741] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.604089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.604129] Hardware name: linux,dummy-virt (DT)
[   31.604289] Call trace:
[   31.604347]  show_stack+0x20/0x38 (C)
[   31.604468]  dump_stack_lvl+0x8c/0xd0
[   31.604547]  print_report+0x118/0x5e8
[   31.604724]  kasan_report+0xdc/0x128
[   31.604818]  kasan_check_range+0x100/0x1a8
[   31.604963]  __asan_memmove+0x3c/0x98
[   31.605041]  kmalloc_memmove_negative_size+0x154/0x2e0
[   31.605465]  kunit_try_run_case+0x170/0x3f0
[   31.605536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.605930]  kthread+0x328/0x630
[   31.606055]  ret_from_fork+0x10/0x20
[   31.606213] 
[   31.606277] Allocated by task 211:
[   31.606348]  kasan_save_stack+0x3c/0x68
[   31.606475]  kasan_save_track+0x20/0x40
[   31.606561]  kasan_save_alloc_info+0x40/0x58
[   31.606921]  __kasan_kmalloc+0xd4/0xd8
[   31.607033]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.607121]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   31.607288]  kunit_try_run_case+0x170/0x3f0
[   31.607377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.607514]  kthread+0x328/0x630
[   31.607579]  ret_from_fork+0x10/0x20
[   31.607869] 
[   31.607933] The buggy address belongs to the object at fff00000c9aa9d80
[   31.607933]  which belongs to the cache kmalloc-64 of size 64
[   31.608098] The buggy address is located 4 bytes inside of
[   31.608098]  64-byte region [fff00000c9aa9d80, fff00000c9aa9dc0)
[   31.608214] 
[   31.608305] The buggy address belongs to the physical page:
[   31.608374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aa9
[   31.608533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.608610] page_type: f5(slab)
[   31.608647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.609117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.609194] page dumped because: kasan: bad access detected
[   31.609329] 
[   31.609388] Memory state around the buggy address:
[   31.609501]  fff00000c9aa9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.609567]  fff00000c9aa9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.609615] >fff00000c9aa9d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.609728]                    ^
[   31.609787]  fff00000c9aa9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.609848]  fff00000c9aa9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.610096] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure Automatically assigned
[   31.586430] ==================================================================
[   31.586679] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   31.586814] Write of size 16 at addr fff00000c3efdc69 by task kunit_try_catch/209
[   31.586879] 
[   31.586938] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.587200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.587437] Hardware name: linux,dummy-virt (DT)
[   31.587483] Call trace:
[   31.587532]  show_stack+0x20/0x38 (C)
[   31.587644]  dump_stack_lvl+0x8c/0xd0
[   31.587692]  print_report+0x118/0x5e8
[   31.587780]  kasan_report+0xdc/0x128
[   31.587924]  kasan_check_range+0x100/0x1a8
[   31.587969]  __asan_memset+0x34/0x78
[   31.588301]  kmalloc_oob_memset_16+0x150/0x2f8
[   31.588405]  kunit_try_run_case+0x170/0x3f0
[   31.588513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.588699]  kthread+0x328/0x630
[   31.588809]  ret_from_fork+0x10/0x20
[   31.588966] 
[   31.589016] Allocated by task 209:
[   31.589045]  kasan_save_stack+0x3c/0x68
[   31.589416]  kasan_save_track+0x20/0x40
[   31.589487]  kasan_save_alloc_info+0x40/0x58
[   31.589966]  __kasan_kmalloc+0xd4/0xd8
[   31.590347]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.590476]  kmalloc_oob_memset_16+0xb0/0x2f8
[   31.590557]  kunit_try_run_case+0x170/0x3f0
[   31.590625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.590717]  kthread+0x328/0x630
[   31.590784]  ret_from_fork+0x10/0x20
[   31.590865] 
[   31.591150] The buggy address belongs to the object at fff00000c3efdc00
[   31.591150]  which belongs to the cache kmalloc-128 of size 128
[   31.591665] The buggy address is located 105 bytes inside of
[   31.591665]  allocated 120-byte region [fff00000c3efdc00, fff00000c3efdc78)
[   31.591760] 
[   31.591828] The buggy address belongs to the physical page:
[   31.591932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.592049] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.592132] page_type: f5(slab)
[   31.592173] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.592337] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.592521] page dumped because: kasan: bad access detected
[   31.592584] 
[   31.592604] Memory state around the buggy address:
[   31.592935]  fff00000c3efdb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.593116]  fff00000c3efdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.593181] >fff00000c3efdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.593296]                                                                 ^
[   31.593365]  fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.593485]  fff00000c3efdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.593573] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure Automatically assigned
[   31.570801] ==================================================================
[   31.570860] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   31.570911] Write of size 8 at addr fff00000c3efdb71 by task kunit_try_catch/207
[   31.571463] 
[   31.571525] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.571670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.571738] Hardware name: linux,dummy-virt (DT)
[   31.571770] Call trace:
[   31.572065]  show_stack+0x20/0x38 (C)
[   31.572175]  dump_stack_lvl+0x8c/0xd0
[   31.572332]  print_report+0x118/0x5e8
[   31.572403]  kasan_report+0xdc/0x128
[   31.572445]  kasan_check_range+0x100/0x1a8
[   31.572746]  __asan_memset+0x34/0x78
[   31.572866]  kmalloc_oob_memset_8+0x150/0x2f8
[   31.572926]  kunit_try_run_case+0x170/0x3f0
[   31.573250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.573374]  kthread+0x328/0x630
[   31.573429]  ret_from_fork+0x10/0x20
[   31.573769] 
[   31.573897] Allocated by task 207:
[   31.573965]  kasan_save_stack+0x3c/0x68
[   31.574089]  kasan_save_track+0x20/0x40
[   31.574146]  kasan_save_alloc_info+0x40/0x58
[   31.574229]  __kasan_kmalloc+0xd4/0xd8
[   31.574579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.574664]  kmalloc_oob_memset_8+0xb0/0x2f8
[   31.574704]  kunit_try_run_case+0x170/0x3f0
[   31.574780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.575154]  kthread+0x328/0x630
[   31.575264]  ret_from_fork+0x10/0x20
[   31.575302] 
[   31.575352] The buggy address belongs to the object at fff00000c3efdb00
[   31.575352]  which belongs to the cache kmalloc-128 of size 128
[   31.575692] The buggy address is located 113 bytes inside of
[   31.575692]  allocated 120-byte region [fff00000c3efdb00, fff00000c3efdb78)
[   31.575844] 
[   31.575904] The buggy address belongs to the physical page:
[   31.576003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.576171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.576236] page_type: f5(slab)
[   31.576339] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.576494] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.576583] page dumped because: kasan: bad access detected
[   31.576898] 
[   31.576966] Memory state around the buggy address:
[   31.577092]  fff00000c3efda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.577149]  fff00000c3efda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.577196] >fff00000c3efdb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.577455]                                                                 ^
[   31.577552]  fff00000c3efdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.577608]  fff00000c3efdc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.577895] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure Automatically assigned
[   31.556622] ==================================================================
[   31.556676] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   31.557086] Write of size 4 at addr fff00000c3efda75 by task kunit_try_catch/205
[   31.557174] 
[   31.557223] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.557369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.557397] Hardware name: linux,dummy-virt (DT)
[   31.557445] Call trace:
[   31.557484]  show_stack+0x20/0x38 (C)
[   31.557586]  dump_stack_lvl+0x8c/0xd0
[   31.557653]  print_report+0x118/0x5e8
[   31.557696]  kasan_report+0xdc/0x128
[   31.558038]  kasan_check_range+0x100/0x1a8
[   31.558125]  __asan_memset+0x34/0x78
[   31.558170]  kmalloc_oob_memset_4+0x150/0x300
[   31.558227]  kunit_try_run_case+0x170/0x3f0
[   31.558272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.558331]  kthread+0x328/0x630
[   31.558386]  ret_from_fork+0x10/0x20
[   31.558433] 
[   31.558451] Allocated by task 205:
[   31.558478]  kasan_save_stack+0x3c/0x68
[   31.558515]  kasan_save_track+0x20/0x40
[   31.558854]  kasan_save_alloc_info+0x40/0x58
[   31.558934]  __kasan_kmalloc+0xd4/0xd8
[   31.558970]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.559157]  kmalloc_oob_memset_4+0xb0/0x300
[   31.559212]  kunit_try_run_case+0x170/0x3f0
[   31.559288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.559339]  kthread+0x328/0x630
[   31.559371]  ret_from_fork+0x10/0x20
[   31.559641] 
[   31.559695] The buggy address belongs to the object at fff00000c3efda00
[   31.559695]  which belongs to the cache kmalloc-128 of size 128
[   31.559864] The buggy address is located 117 bytes inside of
[   31.559864]  allocated 120-byte region [fff00000c3efda00, fff00000c3efda78)
[   31.559973] 
[   31.560056] The buggy address belongs to the physical page:
[   31.560116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.560201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.560379] page_type: f5(slab)
[   31.560555] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.560649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.560760] page dumped because: kasan: bad access detected
[   31.560840] 
[   31.560895] Memory state around the buggy address:
[   31.560993]  fff00000c3efd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.561071]  fff00000c3efd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.561198] >fff00000c3efda00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.561416]                                                                 ^
[   31.561628]  fff00000c3efda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.561698]  fff00000c3efdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.561835] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure Automatically assigned
[   31.542790] ==================================================================
[   31.542851] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   31.543132] Write of size 2 at addr fff00000c3efd977 by task kunit_try_catch/203
[   31.543326] 
[   31.543367] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.543706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.543765] Hardware name: linux,dummy-virt (DT)
[   31.543852] Call trace:
[   31.543902]  show_stack+0x20/0x38 (C)
[   31.543956]  dump_stack_lvl+0x8c/0xd0
[   31.544151]  print_report+0x118/0x5e8
[   31.544281]  kasan_report+0xdc/0x128
[   31.544506]  kasan_check_range+0x100/0x1a8
[   31.544680]  __asan_memset+0x34/0x78
[   31.544846]  kmalloc_oob_memset_2+0x150/0x2f8
[   31.544987]  kunit_try_run_case+0x170/0x3f0
[   31.545126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.545194]  kthread+0x328/0x630
[   31.545465]  ret_from_fork+0x10/0x20
[   31.545637] 
[   31.545681] Allocated by task 203:
[   31.545772]  kasan_save_stack+0x3c/0x68
[   31.545947]  kasan_save_track+0x20/0x40
[   31.546004]  kasan_save_alloc_info+0x40/0x58
[   31.546115]  __kasan_kmalloc+0xd4/0xd8
[   31.546417]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.546490]  kmalloc_oob_memset_2+0xb0/0x2f8
[   31.546586]  kunit_try_run_case+0x170/0x3f0
[   31.546624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.546975]  kthread+0x328/0x630
[   31.547027]  ret_from_fork+0x10/0x20
[   31.547064] 
[   31.547094] The buggy address belongs to the object at fff00000c3efd900
[   31.547094]  which belongs to the cache kmalloc-128 of size 128
[   31.547151] The buggy address is located 119 bytes inside of
[   31.547151]  allocated 120-byte region [fff00000c3efd900, fff00000c3efd978)
[   31.547221] 
[   31.547242] The buggy address belongs to the physical page:
[   31.547285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.547339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.547386] page_type: f5(slab)
[   31.547433] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.547491] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.547529] page dumped because: kasan: bad access detected
[   31.547558] 
[   31.547576] Memory state around the buggy address:
[   31.547606]  fff00000c3efd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.547647]  fff00000c3efd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.547699] >fff00000c3efd900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.548011]                                                                 ^
[   31.548058]  fff00000c3efd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.548345]  fff00000c3efda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.548419] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure Automatically assigned
[   31.524241] ==================================================================
[   31.524298] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   31.524347] Write of size 128 at addr fff00000c3efd800 by task kunit_try_catch/201
[   31.524396] 
[   31.524428] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.524845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.524972] Hardware name: linux,dummy-virt (DT)
[   31.525145] Call trace:
[   31.525215]  show_stack+0x20/0x38 (C)
[   31.525363]  dump_stack_lvl+0x8c/0xd0
[   31.525424]  print_report+0x118/0x5e8
[   31.525752]  kasan_report+0xdc/0x128
[   31.525896]  kasan_check_range+0x100/0x1a8
[   31.526009]  __asan_memset+0x34/0x78
[   31.526188]  kmalloc_oob_in_memset+0x144/0x2d0
[   31.526287]  kunit_try_run_case+0x170/0x3f0
[   31.526409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.526488]  kthread+0x328/0x630
[   31.526755]  ret_from_fork+0x10/0x20
[   31.526860] 
[   31.527103] Allocated by task 201:
[   31.527305]  kasan_save_stack+0x3c/0x68
[   31.527477]  kasan_save_track+0x20/0x40
[   31.527673]  kasan_save_alloc_info+0x40/0x58
[   31.527894]  __kasan_kmalloc+0xd4/0xd8
[   31.527970]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.528036]  kmalloc_oob_in_memset+0xb0/0x2d0
[   31.529242]  kunit_try_run_case+0x170/0x3f0
[   31.529290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.529332]  kthread+0x328/0x630
[   31.529365]  ret_from_fork+0x10/0x20
[   31.529400] 
[   31.529419] The buggy address belongs to the object at fff00000c3efd800
[   31.529419]  which belongs to the cache kmalloc-128 of size 128
[   31.529475] The buggy address is located 0 bytes inside of
[   31.529475]  allocated 120-byte region [fff00000c3efd800, fff00000c3efd878)
[   31.529533] 
[   31.529552] The buggy address belongs to the physical page:
[   31.529581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.529629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.529675] page_type: f5(slab)
[   31.529712] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.529759] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.529796] page dumped because: kasan: bad access detected
[   31.529825] 
[   31.529844] Memory state around the buggy address:
[   31.529875]  fff00000c3efd700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.529915]  fff00000c3efd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.529954] >fff00000c3efd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.529989]                                                                 ^
[   31.530032]  fff00000c3efd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.530071]  fff00000c3efd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.530118] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure Automatically assigned
[   31.508182] ==================================================================
[   31.508373] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   31.508572] Read of size 16 at addr fff00000c907e0c0 by task kunit_try_catch/199
[   31.508681] 
[   31.508744] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.508998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.509175] Hardware name: linux,dummy-virt (DT)
[   31.509280] Call trace:
[   31.509303]  show_stack+0x20/0x38 (C)
[   31.509409]  dump_stack_lvl+0x8c/0xd0
[   31.509678]  print_report+0x118/0x5e8
[   31.509849]  kasan_report+0xdc/0x128
[   31.510044]  __asan_report_load16_noabort+0x20/0x30
[   31.510303]  kmalloc_uaf_16+0x3bc/0x438
[   31.510363]  kunit_try_run_case+0x170/0x3f0
[   31.510587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.510789]  kthread+0x328/0x630
[   31.510997]  ret_from_fork+0x10/0x20
[   31.511266] 
[   31.511414] Allocated by task 199:
[   31.511591]  kasan_save_stack+0x3c/0x68
[   31.511952]  kasan_save_track+0x20/0x40
[   31.512022]  kasan_save_alloc_info+0x40/0x58
[   31.512076]  __kasan_kmalloc+0xd4/0xd8
[   31.512220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.512260]  kmalloc_uaf_16+0x140/0x438
[   31.512312]  kunit_try_run_case+0x170/0x3f0
[   31.512347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.512586]  kthread+0x328/0x630
[   31.512825]  ret_from_fork+0x10/0x20
[   31.512926] 
[   31.513017] Freed by task 199:
[   31.513061]  kasan_save_stack+0x3c/0x68
[   31.513107]  kasan_save_track+0x20/0x40
[   31.513457]  kasan_save_free_info+0x4c/0x78
[   31.513513]  __kasan_slab_free+0x6c/0x98
[   31.513844]  kfree+0x214/0x3c8
[   31.513960]  kmalloc_uaf_16+0x190/0x438
[   31.513999]  kunit_try_run_case+0x170/0x3f0
[   31.514051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.514105]  kthread+0x328/0x630
[   31.514137]  ret_from_fork+0x10/0x20
[   31.514172] 
[   31.514191] The buggy address belongs to the object at fff00000c907e0c0
[   31.514191]  which belongs to the cache kmalloc-16 of size 16
[   31.514374] The buggy address is located 0 bytes inside of
[   31.514374]  freed 16-byte region [fff00000c907e0c0, fff00000c907e0d0)
[   31.514453] 
[   31.514482] The buggy address belongs to the physical page:
[   31.514526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e
[   31.514591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.514646] page_type: f5(slab)
[   31.514700] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.514749] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000
[   31.514787] page dumped because: kasan: bad access detected
[   31.514816] 
[   31.514833] Memory state around the buggy address:
[   31.514863]  fff00000c907df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.514905]  fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.514945] >fff00000c907e080: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   31.514981]                                            ^
[   31.515013]  fff00000c907e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.515062]  fff00000c907e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.515108] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure Automatically assigned
[   31.494013] ==================================================================
[   31.494096] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   31.494147] Write of size 16 at addr fff00000c907e060 by task kunit_try_catch/197
[   31.494196] 
[   31.494229] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.494308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.494336] Hardware name: linux,dummy-virt (DT)
[   31.494378] Call trace:
[   31.494400]  show_stack+0x20/0x38 (C)
[   31.494447]  dump_stack_lvl+0x8c/0xd0
[   31.494494]  print_report+0x118/0x5e8
[   31.494536]  kasan_report+0xdc/0x128
[   31.494578]  __asan_report_store16_noabort+0x20/0x30
[   31.494626]  kmalloc_oob_16+0x3a0/0x3f8
[   31.494681]  kunit_try_run_case+0x170/0x3f0
[   31.494726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.494775]  kthread+0x328/0x630
[   31.494816]  ret_from_fork+0x10/0x20
[   31.494861] 
[   31.494879] Allocated by task 197:
[   31.494906]  kasan_save_stack+0x3c/0x68
[   31.494942]  kasan_save_track+0x20/0x40
[   31.494976]  kasan_save_alloc_info+0x40/0x58
[   31.495020]  __kasan_kmalloc+0xd4/0xd8
[   31.495053]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.495375]  kmalloc_oob_16+0xb4/0x3f8
[   31.495621]  kunit_try_run_case+0x170/0x3f0
[   31.495994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.496227]  kthread+0x328/0x630
[   31.496294]  ret_from_fork+0x10/0x20
[   31.496347] 
[   31.496389] The buggy address belongs to the object at fff00000c907e060
[   31.496389]  which belongs to the cache kmalloc-16 of size 16
[   31.496445] The buggy address is located 0 bytes inside of
[   31.496445]  allocated 13-byte region [fff00000c907e060, fff00000c907e06d)
[   31.496505] 
[   31.496524] The buggy address belongs to the physical page:
[   31.497312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e
[   31.497438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.497487] page_type: f5(slab)
[   31.497542] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.497613] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000
[   31.498094] page dumped because: kasan: bad access detected
[   31.498220] 
[   31.498425] Memory state around the buggy address:
[   31.498473]  fff00000c907df00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   31.498527]  fff00000c907df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.498763] >fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   31.498978]                                                           ^
[   31.499161]  fff00000c907e080: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.499238]  fff00000c907e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.499309] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure Automatically assigned
[   31.381440] ==================================================================
[   31.381557] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   31.381633] Write of size 1 at addr fff00000c8f61cda by task kunit_try_catch/189
[   31.381796] 
[   31.381827] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.381933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.382133] Hardware name: linux,dummy-virt (DT)
[   31.382190] Call trace:
[   31.382220]  show_stack+0x20/0x38 (C)
[   31.382384]  dump_stack_lvl+0x8c/0xd0
[   31.382439]  print_report+0x118/0x5e8
[   31.382531]  kasan_report+0xdc/0x128
[   31.382576]  __asan_report_store1_noabort+0x20/0x30
[   31.382624]  krealloc_less_oob_helper+0xa80/0xc50
[   31.382773]  krealloc_less_oob+0x20/0x38
[   31.382842]  kunit_try_run_case+0x170/0x3f0
[   31.382887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.383195]  kthread+0x328/0x630
[   31.383274]  ret_from_fork+0x10/0x20
[   31.383332] 
[   31.383403] Allocated by task 189:
[   31.383450]  kasan_save_stack+0x3c/0x68
[   31.383507]  kasan_save_track+0x20/0x40
[   31.383541]  kasan_save_alloc_info+0x40/0x58
[   31.383577]  __kasan_krealloc+0x118/0x178
[   31.383697]  krealloc_noprof+0x128/0x360
[   31.383737]  krealloc_less_oob_helper+0x168/0xc50
[   31.383778]  krealloc_less_oob+0x20/0x38
[   31.383814]  kunit_try_run_case+0x170/0x3f0
[   31.384127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.384210]  kthread+0x328/0x630
[   31.384332]  ret_from_fork+0x10/0x20
[   31.384421] 
[   31.384481] The buggy address belongs to the object at fff00000c8f61c00
[   31.384481]  which belongs to the cache kmalloc-256 of size 256
[   31.384860] The buggy address is located 17 bytes to the right of
[   31.384860]  allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9)
[   31.384955] 
[   31.385026] The buggy address belongs to the physical page:
[   31.385122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.385185] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.385300] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.385387] page_type: f5(slab)
[   31.385498] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.385548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.385631] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.385917] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.386097] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.386241] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.386329] page dumped because: kasan: bad access detected
[   31.386457] 
[   31.386477] Memory state around the buggy address:
[   31.386524]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.386617]  fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.386944] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.387008]                                                     ^
[   31.387179]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.387253]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.387375] ==================================================================
[   31.433749] ==================================================================
[   31.433795] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   31.434120] Write of size 1 at addr fff00000c9b120d0 by task kunit_try_catch/193
[   31.434188] 
[   31.434218] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.434415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.434652] Hardware name: linux,dummy-virt (DT)
[   31.434697] Call trace:
[   31.434719]  show_stack+0x20/0x38 (C)
[   31.434780]  dump_stack_lvl+0x8c/0xd0
[   31.434987]  print_report+0x118/0x5e8
[   31.435045]  kasan_report+0xdc/0x128
[   31.435311]  __asan_report_store1_noabort+0x20/0x30
[   31.435384]  krealloc_less_oob_helper+0xb9c/0xc50
[   31.435438]  krealloc_large_less_oob+0x20/0x38
[   31.435621]  kunit_try_run_case+0x170/0x3f0
[   31.435755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.435824]  kthread+0x328/0x630
[   31.436141]  ret_from_fork+0x10/0x20
[   31.436302] 
[   31.436343] The buggy address belongs to the physical page:
[   31.436464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.436518] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.436563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.436613] page_type: f8(unknown)
[   31.436852] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.437091] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.437200] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.437314] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.437362] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.437571] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.437751] page dumped because: kasan: bad access detected
[   31.437841] 
[   31.437905] Memory state around the buggy address:
[   31.437957]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.438323]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.438418] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.438475]                                                  ^
[   31.438533]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.438660]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.438718] ==================================================================
[   31.363450] ==================================================================
[   31.363648] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   31.363839] Write of size 1 at addr fff00000c8f61cc9 by task kunit_try_catch/189
[   31.364069] 
[   31.364123] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.364456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.364495] Hardware name: linux,dummy-virt (DT)
[   31.364526] Call trace:
[   31.364548]  show_stack+0x20/0x38 (C)
[   31.364610]  dump_stack_lvl+0x8c/0xd0
[   31.364788]  print_report+0x118/0x5e8
[   31.364877]  kasan_report+0xdc/0x128
[   31.365002]  __asan_report_store1_noabort+0x20/0x30
[   31.365377]  krealloc_less_oob_helper+0xa48/0xc50
[   31.365466]  krealloc_less_oob+0x20/0x38
[   31.365597]  kunit_try_run_case+0x170/0x3f0
[   31.365672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.365974]  kthread+0x328/0x630
[   31.366062]  ret_from_fork+0x10/0x20
[   31.366208] 
[   31.366267] Allocated by task 189:
[   31.366548]  kasan_save_stack+0x3c/0x68
[   31.366650]  kasan_save_track+0x20/0x40
[   31.366703]  kasan_save_alloc_info+0x40/0x58
[   31.366804]  __kasan_krealloc+0x118/0x178
[   31.366873]  krealloc_noprof+0x128/0x360
[   31.366910]  krealloc_less_oob_helper+0x168/0xc50
[   31.367350]  krealloc_less_oob+0x20/0x38
[   31.367438]  kunit_try_run_case+0x170/0x3f0
[   31.367823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.367906]  kthread+0x328/0x630
[   31.368014]  ret_from_fork+0x10/0x20
[   31.368110] 
[   31.368145] The buggy address belongs to the object at fff00000c8f61c00
[   31.368145]  which belongs to the cache kmalloc-256 of size 256
[   31.368377] The buggy address is located 0 bytes to the right of
[   31.368377]  allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9)
[   31.368538] 
[   31.368624] The buggy address belongs to the physical page:
[   31.368671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.368771] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.369076] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.369173] page_type: f5(slab)
[   31.369255] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.369374] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.369699] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.369783] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.369911] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.369999] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.370161] page dumped because: kasan: bad access detected
[   31.370250] 
[   31.370269] Memory state around the buggy address:
[   31.370300]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.370631]  fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.370689] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.370988]                                               ^
[   31.371061]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.371115]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.371261] ==================================================================
[   31.372764] ==================================================================
[   31.372933] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   31.372986] Write of size 1 at addr fff00000c8f61cd0 by task kunit_try_catch/189
[   31.373092] 
[   31.373139] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.373221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.373246] Hardware name: linux,dummy-virt (DT)
[   31.373276] Call trace:
[   31.373595]  show_stack+0x20/0x38 (C)
[   31.373660]  dump_stack_lvl+0x8c/0xd0
[   31.373745]  print_report+0x118/0x5e8
[   31.373809]  kasan_report+0xdc/0x128
[   31.373879]  __asan_report_store1_noabort+0x20/0x30
[   31.373945]  krealloc_less_oob_helper+0xb9c/0xc50
[   31.374051]  krealloc_less_oob+0x20/0x38
[   31.374106]  kunit_try_run_case+0x170/0x3f0
[   31.374194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.374248]  kthread+0x328/0x630
[   31.374574]  ret_from_fork+0x10/0x20
[   31.374734] 
[   31.374774] Allocated by task 189:
[   31.374821]  kasan_save_stack+0x3c/0x68
[   31.374878]  kasan_save_track+0x20/0x40
[   31.374981]  kasan_save_alloc_info+0x40/0x58
[   31.375038]  __kasan_krealloc+0x118/0x178
[   31.375088]  krealloc_noprof+0x128/0x360
[   31.375365]  krealloc_less_oob_helper+0x168/0xc50
[   31.375444]  krealloc_less_oob+0x20/0x38
[   31.375493]  kunit_try_run_case+0x170/0x3f0
[   31.375661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.375720]  kthread+0x328/0x630
[   31.375752]  ret_from_fork+0x10/0x20
[   31.375905] 
[   31.375925] The buggy address belongs to the object at fff00000c8f61c00
[   31.375925]  which belongs to the cache kmalloc-256 of size 256
[   31.375981] The buggy address is located 7 bytes to the right of
[   31.375981]  allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9)
[   31.376042] 
[   31.376061] The buggy address belongs to the physical page:
[   31.376494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.376612] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.376757] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.376851] page_type: f5(slab)
[   31.376937] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.377025] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.377157] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.377247] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.377341] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.377685] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.377792] page dumped because: kasan: bad access detected
[   31.377873] 
[   31.377943] Memory state around the buggy address:
[   31.378053]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.378124]  fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.378166] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.378212]                                                  ^
[   31.378247]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.378302]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.378361] ==================================================================
[   31.439254] ==================================================================
[   31.439298] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   31.439345] Write of size 1 at addr fff00000c9b120da by task kunit_try_catch/193
[   31.439523] 
[   31.439679] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.439826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.440145] Hardware name: linux,dummy-virt (DT)
[   31.440212] Call trace:
[   31.440233]  show_stack+0x20/0x38 (C)
[   31.440339]  dump_stack_lvl+0x8c/0xd0
[   31.440697]  print_report+0x118/0x5e8
[   31.440989]  kasan_report+0xdc/0x128
[   31.441116]  __asan_report_store1_noabort+0x20/0x30
[   31.441241]  krealloc_less_oob_helper+0xa80/0xc50
[   31.441313]  krealloc_large_less_oob+0x20/0x38
[   31.441587]  kunit_try_run_case+0x170/0x3f0
[   31.441751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.441847]  kthread+0x328/0x630
[   31.442196]  ret_from_fork+0x10/0x20
[   31.442308] 
[   31.442336] The buggy address belongs to the physical page:
[   31.442383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.442434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.442481] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.442532] page_type: f8(unknown)
[   31.442602] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.442663] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.442722] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.442778] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.442826] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.442891] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.442930] page dumped because: kasan: bad access detected
[   31.442968] 
[   31.442986] Memory state around the buggy address:
[   31.443022]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.443063]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.443572] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.443678]                                                     ^
[   31.443766]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.443816]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.443852] ==================================================================
[   31.428614] ==================================================================
[   31.428667] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   31.429134] Write of size 1 at addr fff00000c9b120c9 by task kunit_try_catch/193
[   31.429203] 
[   31.429237] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.429543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.429597] Hardware name: linux,dummy-virt (DT)
[   31.429639] Call trace:
[   31.429664]  show_stack+0x20/0x38 (C)
[   31.429784]  dump_stack_lvl+0x8c/0xd0
[   31.429862]  print_report+0x118/0x5e8
[   31.429906]  kasan_report+0xdc/0x128
[   31.429977]  __asan_report_store1_noabort+0x20/0x30
[   31.430050]  krealloc_less_oob_helper+0xa48/0xc50
[   31.430149]  krealloc_large_less_oob+0x20/0x38
[   31.430199]  kunit_try_run_case+0x170/0x3f0
[   31.430243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.430309]  kthread+0x328/0x630
[   31.430580]  ret_from_fork+0x10/0x20
[   31.430794] 
[   31.430822] The buggy address belongs to the physical page:
[   31.430875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.430927] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.430972] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.431095] page_type: f8(unknown)
[   31.431163] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.431255] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.431323] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.431388] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.431492] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.431559] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.431606] page dumped because: kasan: bad access detected
[   31.431676] 
[   31.431704] Memory state around the buggy address:
[   31.431754]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.431824]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.431872] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.432197]                                               ^
[   31.432373]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.432448]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.432563] ==================================================================
[   31.445117] ==================================================================
[   31.445211] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   31.445287] Write of size 1 at addr fff00000c9b120ea by task kunit_try_catch/193
[   31.445346] 
[   31.445382] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.445759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.445802] Hardware name: linux,dummy-virt (DT)
[   31.445976] Call trace:
[   31.446010]  show_stack+0x20/0x38 (C)
[   31.446382]  dump_stack_lvl+0x8c/0xd0
[   31.446578]  print_report+0x118/0x5e8
[   31.446801]  kasan_report+0xdc/0x128
[   31.447052]  __asan_report_store1_noabort+0x20/0x30
[   31.447131]  krealloc_less_oob_helper+0xae4/0xc50
[   31.447227]  krealloc_large_less_oob+0x20/0x38
[   31.447313]  kunit_try_run_case+0x170/0x3f0
[   31.447544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.447619]  kthread+0x328/0x630
[   31.447726]  ret_from_fork+0x10/0x20
[   31.447933] 
[   31.448008] The buggy address belongs to the physical page:
[   31.448103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.448158] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.448204] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.448655] page_type: f8(unknown)
[   31.448769] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.448855] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.448988] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.449241] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.449305] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.449644] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.449717] page dumped because: kasan: bad access detected
[   31.449814] 
[   31.449874] Memory state around the buggy address:
[   31.449907]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.449962]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.450290] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.450342]                                                           ^
[   31.450503]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.450566]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.450603] ==================================================================
[   31.451340] ==================================================================
[   31.451441] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   31.451524] Write of size 1 at addr fff00000c9b120eb by task kunit_try_catch/193
[   31.451576] 
[   31.451621] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.451879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.451931] Hardware name: linux,dummy-virt (DT)
[   31.452073] Call trace:
[   31.452131]  show_stack+0x20/0x38 (C)
[   31.452310]  dump_stack_lvl+0x8c/0xd0
[   31.452528]  print_report+0x118/0x5e8
[   31.452757]  kasan_report+0xdc/0x128
[   31.452828]  __asan_report_store1_noabort+0x20/0x30
[   31.452987]  krealloc_less_oob_helper+0xa58/0xc50
[   31.453043]  krealloc_large_less_oob+0x20/0x38
[   31.453267]  kunit_try_run_case+0x170/0x3f0
[   31.453490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.453585]  kthread+0x328/0x630
[   31.453726]  ret_from_fork+0x10/0x20
[   31.453836] 
[   31.453995] The buggy address belongs to the physical page:
[   31.454063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.454454] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.454630] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.454747] page_type: f8(unknown)
[   31.454826] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.454938] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.455041] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.455099] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.455459] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.455539] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.455581] page dumped because: kasan: bad access detected
[   31.455612] 
[   31.455631] Memory state around the buggy address:
[   31.455672]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.455714]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.456119] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.456288]                                                           ^
[   31.456373]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.456580]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.456661] ==================================================================
[   31.389248] ==================================================================
[   31.389295] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   31.389583] Write of size 1 at addr fff00000c8f61cea by task kunit_try_catch/189
[   31.390123] 
[   31.390166] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.390249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.390275] Hardware name: linux,dummy-virt (DT)
[   31.390559] Call trace:
[   31.390618]  show_stack+0x20/0x38 (C)
[   31.390670]  dump_stack_lvl+0x8c/0xd0
[   31.390716]  print_report+0x118/0x5e8
[   31.390759]  kasan_report+0xdc/0x128
[   31.391095]  __asan_report_store1_noabort+0x20/0x30
[   31.391185]  krealloc_less_oob_helper+0xae4/0xc50
[   31.391464]  krealloc_less_oob+0x20/0x38
[   31.391702]  kunit_try_run_case+0x170/0x3f0
[   31.391963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.392048]  kthread+0x328/0x630
[   31.392225]  ret_from_fork+0x10/0x20
[   31.392381] 
[   31.392451] Allocated by task 189:
[   31.392609]  kasan_save_stack+0x3c/0x68
[   31.392676]  kasan_save_track+0x20/0x40
[   31.392786]  kasan_save_alloc_info+0x40/0x58
[   31.392872]  __kasan_krealloc+0x118/0x178
[   31.393005]  krealloc_noprof+0x128/0x360
[   31.393206]  krealloc_less_oob_helper+0x168/0xc50
[   31.393262]  krealloc_less_oob+0x20/0x38
[   31.393429]  kunit_try_run_case+0x170/0x3f0
[   31.393511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.393633]  kthread+0x328/0x630
[   31.393747]  ret_from_fork+0x10/0x20
[   31.393823] 
[   31.393842] The buggy address belongs to the object at fff00000c8f61c00
[   31.393842]  which belongs to the cache kmalloc-256 of size 256
[   31.394113] The buggy address is located 33 bytes to the right of
[   31.394113]  allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9)
[   31.394355] 
[   31.394423] The buggy address belongs to the physical page:
[   31.394725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.394813] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.394876] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.395226] page_type: f5(slab)
[   31.395338] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.395401] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.395450] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.395496] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.395558] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.395613] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.395652] page dumped because: kasan: bad access detected
[   31.395681] 
[   31.395698] Memory state around the buggy address:
[   31.395963]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.396161]  fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.396250] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.396318]                                                           ^
[   31.396371]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.396415]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.396636] ==================================================================
[   31.397571] ==================================================================
[   31.397756] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   31.397810] Write of size 1 at addr fff00000c8f61ceb by task kunit_try_catch/189
[   31.397983] 
[   31.398032] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.398159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.398186] Hardware name: linux,dummy-virt (DT)
[   31.398232] Call trace:
[   31.398254]  show_stack+0x20/0x38 (C)
[   31.398551]  dump_stack_lvl+0x8c/0xd0
[   31.398654]  print_report+0x118/0x5e8
[   31.398745]  kasan_report+0xdc/0x128
[   31.398828]  __asan_report_store1_noabort+0x20/0x30
[   31.398886]  krealloc_less_oob_helper+0xa58/0xc50
[   31.399072]  krealloc_less_oob+0x20/0x38
[   31.399224]  kunit_try_run_case+0x170/0x3f0
[   31.399279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.399329]  kthread+0x328/0x630
[   31.399369]  ret_from_fork+0x10/0x20
[   31.399453] 
[   31.399473] Allocated by task 189:
[   31.399500]  kasan_save_stack+0x3c/0x68
[   31.399538]  kasan_save_track+0x20/0x40
[   31.399572]  kasan_save_alloc_info+0x40/0x58
[   31.399607]  __kasan_krealloc+0x118/0x178
[   31.399641]  krealloc_noprof+0x128/0x360
[   31.399678]  krealloc_less_oob_helper+0x168/0xc50
[   31.400128]  krealloc_less_oob+0x20/0x38
[   31.400196]  kunit_try_run_case+0x170/0x3f0
[   31.400238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.400538]  kthread+0x328/0x630
[   31.400864]  ret_from_fork+0x10/0x20
[   31.400940] 
[   31.400977] The buggy address belongs to the object at fff00000c8f61c00
[   31.400977]  which belongs to the cache kmalloc-256 of size 256
[   31.401033] The buggy address is located 34 bytes to the right of
[   31.401033]  allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9)
[   31.401399] 
[   31.401516] The buggy address belongs to the physical page:
[   31.401585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.402108] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.402209] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.402492] page_type: f5(slab)
[   31.402694] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.402792] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.402879] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.403106] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.403254] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.403385] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.403430] page dumped because: kasan: bad access detected
[   31.403628] 
[   31.403780] Memory state around the buggy address:
[   31.403897]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.403971]  fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.404103] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.404142]                                                           ^
[   31.404194]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.404237]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.404275] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure Automatically assigned
[   31.345100] ==================================================================
[   31.345157] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   31.345211] Write of size 1 at addr fff00000c8f61aeb by task kunit_try_catch/187
[   31.345258] 
[   31.345289] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.345369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.345394] Hardware name: linux,dummy-virt (DT)
[   31.345424] Call trace:
[   31.345445]  show_stack+0x20/0x38 (C)
[   31.345491]  dump_stack_lvl+0x8c/0xd0
[   31.345537]  print_report+0x118/0x5e8
[   31.345579]  kasan_report+0xdc/0x128
[   31.345620]  __asan_report_store1_noabort+0x20/0x30
[   31.345667]  krealloc_more_oob_helper+0x60c/0x678
[   31.345715]  krealloc_more_oob+0x20/0x38
[   31.345759]  kunit_try_run_case+0x170/0x3f0
[   31.345803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.345852]  kthread+0x328/0x630
[   31.345892]  ret_from_fork+0x10/0x20
[   31.345937] 
[   31.345955] Allocated by task 187:
[   31.345982]  kasan_save_stack+0x3c/0x68
[   31.346017]  kasan_save_track+0x20/0x40
[   31.346056]  kasan_save_alloc_info+0x40/0x58
[   31.346101]  __kasan_krealloc+0x118/0x178
[   31.346376]  krealloc_noprof+0x128/0x360
[   31.346424]  krealloc_more_oob_helper+0x168/0x678
[   31.346466]  krealloc_more_oob+0x20/0x38
[   31.346550]  kunit_try_run_case+0x170/0x3f0
[   31.346585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.346625]  kthread+0x328/0x630
[   31.346656]  ret_from_fork+0x10/0x20
[   31.346692] 
[   31.346710] The buggy address belongs to the object at fff00000c8f61a00
[   31.346710]  which belongs to the cache kmalloc-256 of size 256
[   31.346779] The buggy address is located 0 bytes to the right of
[   31.346779]  allocated 235-byte region [fff00000c8f61a00, fff00000c8f61aeb)
[   31.346841] 
[   31.346860] The buggy address belongs to the physical page:
[   31.346892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.346942] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.346994] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.347043] page_type: f5(slab)
[   31.347089] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.347146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.347193] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.347239] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.347286] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.347340] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.347379] page dumped because: kasan: bad access detected
[   31.347407] 
[   31.347432] Memory state around the buggy address:
[   31.347462]  fff00000c8f61980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.347504]  fff00000c8f61a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.347554] >fff00000c8f61a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   31.347590]                                                           ^
[   31.347628]  fff00000c8f61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.347669]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.347704] ==================================================================
[   31.412486] ==================================================================
[   31.412554] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   31.412636] Write of size 1 at addr fff00000c9b120eb by task kunit_try_catch/191
[   31.412877] 
[   31.412927] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.413189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.413244] Hardware name: linux,dummy-virt (DT)
[   31.413303] Call trace:
[   31.413332]  show_stack+0x20/0x38 (C)
[   31.413385]  dump_stack_lvl+0x8c/0xd0
[   31.413607]  print_report+0x118/0x5e8
[   31.413806]  kasan_report+0xdc/0x128
[   31.413922]  __asan_report_store1_noabort+0x20/0x30
[   31.413971]  krealloc_more_oob_helper+0x60c/0x678
[   31.414180]  krealloc_large_more_oob+0x20/0x38
[   31.414249]  kunit_try_run_case+0x170/0x3f0
[   31.414454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.414529]  kthread+0x328/0x630
[   31.414572]  ret_from_fork+0x10/0x20
[   31.414619] 
[   31.414668] The buggy address belongs to the physical page:
[   31.414798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.414853] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.414899] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.415108] page_type: f8(unknown)
[   31.415188] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.415339] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.415532] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.415608] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.415739] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.415805] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.415888] page dumped because: kasan: bad access detected
[   31.416055] 
[   31.416089] Memory state around the buggy address:
[   31.416278]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.416336]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.416453] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   31.416545]                                                           ^
[   31.416719]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.416793]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.416910] ==================================================================
[   31.349143] ==================================================================
[   31.349212] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   31.349277] Write of size 1 at addr fff00000c8f61af0 by task kunit_try_catch/187
[   31.349397] 
[   31.349445] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.349532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.349607] Hardware name: linux,dummy-virt (DT)
[   31.349645] Call trace:
[   31.349666]  show_stack+0x20/0x38 (C)
[   31.349713]  dump_stack_lvl+0x8c/0xd0
[   31.349916]  print_report+0x118/0x5e8
[   31.350063]  kasan_report+0xdc/0x128
[   31.350202]  __asan_report_store1_noabort+0x20/0x30
[   31.350277]  krealloc_more_oob_helper+0x5c0/0x678
[   31.350354]  krealloc_more_oob+0x20/0x38
[   31.350446]  kunit_try_run_case+0x170/0x3f0
[   31.350512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.350563]  kthread+0x328/0x630
[   31.350664]  ret_from_fork+0x10/0x20
[   31.350711] 
[   31.350730] Allocated by task 187:
[   31.350773]  kasan_save_stack+0x3c/0x68
[   31.350818]  kasan_save_track+0x20/0x40
[   31.351057]  kasan_save_alloc_info+0x40/0x58
[   31.351208]  __kasan_krealloc+0x118/0x178
[   31.351266]  krealloc_noprof+0x128/0x360
[   31.351323]  krealloc_more_oob_helper+0x168/0x678
[   31.351382]  krealloc_more_oob+0x20/0x38
[   31.351463]  kunit_try_run_case+0x170/0x3f0
[   31.351501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.351557]  kthread+0x328/0x630
[   31.351606]  ret_from_fork+0x10/0x20
[   31.351693] 
[   31.351711] The buggy address belongs to the object at fff00000c8f61a00
[   31.351711]  which belongs to the cache kmalloc-256 of size 256
[   31.351797] The buggy address is located 5 bytes to the right of
[   31.351797]  allocated 235-byte region [fff00000c8f61a00, fff00000c8f61aeb)
[   31.352616] 
[   31.352654] The buggy address belongs to the physical page:
[   31.352686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.352738] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.353064] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.353144] page_type: f5(slab)
[   31.353206] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.353365] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.353452] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.353566] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.353641] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.353973] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.354036] page dumped because: kasan: bad access detected
[   31.354121] 
[   31.354182] Memory state around the buggy address:
[   31.354251]  fff00000c8f61980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.354305]  fff00000c8f61a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.354633] >fff00000c8f61a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   31.354675]                                                              ^
[   31.355062]  fff00000c8f61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.355130]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.355251] ==================================================================
[   31.417815] ==================================================================
[   31.417891] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   31.417957] Write of size 1 at addr fff00000c9b120f0 by task kunit_try_catch/191
[   31.418093] 
[   31.418127] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.418215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.418241] Hardware name: linux,dummy-virt (DT)
[   31.418270] Call trace:
[   31.418546]  show_stack+0x20/0x38 (C)
[   31.418624]  dump_stack_lvl+0x8c/0xd0
[   31.418671]  print_report+0x118/0x5e8
[   31.418715]  kasan_report+0xdc/0x128
[   31.418852]  __asan_report_store1_noabort+0x20/0x30
[   31.418930]  krealloc_more_oob_helper+0x5c0/0x678
[   31.418996]  krealloc_large_more_oob+0x20/0x38
[   31.419103]  kunit_try_run_case+0x170/0x3f0
[   31.419147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.419211]  kthread+0x328/0x630
[   31.419505]  ret_from_fork+0x10/0x20
[   31.419586] 
[   31.419618] The buggy address belongs to the physical page:
[   31.419726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.419818] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.420001] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.420139] page_type: f8(unknown)
[   31.420180] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.420427] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.420616] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.420691] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.420758] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.420902] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.421005] page dumped because: kasan: bad access detected
[   31.421037] 
[   31.421054] Memory state around the buggy address:
[   31.421389]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.421716]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.421853] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   31.421935]                                                              ^
[   31.421994]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.422265]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.422512] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure Automatically assigned
[   31.332612] ==================================================================
[   31.332713] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   31.332764] Read of size 1 at addr fff00000c9b00000 by task kunit_try_catch/185
[   31.332813] 
[   31.332851] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.332932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.332957] Hardware name: linux,dummy-virt (DT)
[   31.333172] Call trace:
[   31.333311]  show_stack+0x20/0x38 (C)
[   31.333368]  dump_stack_lvl+0x8c/0xd0
[   31.333436]  print_report+0x118/0x5e8
[   31.333495]  kasan_report+0xdc/0x128
[   31.333538]  __asan_report_load1_noabort+0x20/0x30
[   31.333754]  page_alloc_uaf+0x328/0x350
[   31.333966]  kunit_try_run_case+0x170/0x3f0
[   31.334023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.334090]  kthread+0x328/0x630
[   31.334220]  ret_from_fork+0x10/0x20
[   31.334287] 
[   31.334315] The buggy address belongs to the physical page:
[   31.334407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b00
[   31.334492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.334558] page_type: f0(buddy)
[   31.334612] raw: 0bfffe0000000000 fff00000ff616280 fff00000ff616280 0000000000000000
[   31.334947] raw: 0000000000000000 0000000000000008 00000000f0000000 0000000000000000
[   31.334992] page dumped because: kasan: bad access detected
[   31.335040] 
[   31.335058] Memory state around the buggy address:
[   31.335102]  fff00000c9afff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.335206]  fff00000c9afff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.335251] >fff00000c9b00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.335287]                    ^
[   31.335314]  fff00000c9b00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.335360]  fff00000c9b00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.335396] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure Automatically assigned
[   31.315069] ==================================================================
[   31.315259] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   31.315357] Free of addr fff00000c3fe8001 by task kunit_try_catch/181
[   31.315692] 
[   31.315737] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.315847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.315891] Hardware name: linux,dummy-virt (DT)
[   31.315956] Call trace:
[   31.316000]  show_stack+0x20/0x38 (C)
[   31.316052]  dump_stack_lvl+0x8c/0xd0
[   31.316218]  print_report+0x118/0x5e8
[   31.316428]  kasan_report_invalid_free+0xc0/0xe8
[   31.316517]  __kasan_kfree_large+0x5c/0xa8
[   31.316677]  free_large_kmalloc+0x68/0x150
[   31.316775]  kfree+0x270/0x3c8
[   31.316912]  kmalloc_large_invalid_free+0x108/0x270
[   31.317060]  kunit_try_run_case+0x170/0x3f0
[   31.317174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.317275]  kthread+0x328/0x630
[   31.317318]  ret_from_fork+0x10/0x20
[   31.317529] 
[   31.317557] The buggy address belongs to the physical page:
[   31.317588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fe8
[   31.317653] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.317724] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.318000] page_type: f8(unknown)
[   31.318146] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.318280] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.318393] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.318480] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.318580] head: 0bfffe0000000002 ffffc1ffc30ffa01 00000000ffffffff 00000000ffffffff
[   31.318633] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.318682] page dumped because: kasan: bad access detected
[   31.318721] 
[   31.318746] Memory state around the buggy address:
[   31.318783]  fff00000c3fe7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.318830]  fff00000c3fe7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.318871] >fff00000c3fe8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.318916]                    ^
[   31.318953]  fff00000c3fe8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.319003]  fff00000c3fe8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.319266] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure Automatically assigned
[   31.305176] ==================================================================
[   31.305243] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   31.305521] Read of size 1 at addr fff00000c3fe8000 by task kunit_try_catch/179
[   31.305592] 
[   31.305664] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.305777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.305803] Hardware name: linux,dummy-virt (DT)
[   31.305839] Call trace:
[   31.305904]  show_stack+0x20/0x38 (C)
[   31.305956]  dump_stack_lvl+0x8c/0xd0
[   31.306008]  print_report+0x118/0x5e8
[   31.306071]  kasan_report+0xdc/0x128
[   31.306353]  __asan_report_load1_noabort+0x20/0x30
[   31.306424]  kmalloc_large_uaf+0x2cc/0x2f8
[   31.306470]  kunit_try_run_case+0x170/0x3f0
[   31.306514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.306606]  kthread+0x328/0x630
[   31.306675]  ret_from_fork+0x10/0x20
[   31.306721] 
[   31.306803] The buggy address belongs to the physical page:
[   31.306852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fe8
[   31.306908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.306973] raw: 0bfffe0000000000 fff00000da451d00 fff00000da451d00 0000000000000000
[   31.307276] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   31.307346] page dumped because: kasan: bad access detected
[   31.307386] 
[   31.307404] Memory state around the buggy address:
[   31.307498]  fff00000c3fe7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.307545]  fff00000c3fe7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.307623] >fff00000c3fe8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.307667]                    ^
[   31.307695]  fff00000c3fe8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.307847]  fff00000c3fe8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.307934] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure Automatically assigned
[   31.294988] ==================================================================
[   31.295293] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   31.295452] Write of size 1 at addr fff00000c3fe600a by task kunit_try_catch/177
[   31.295504] 
[   31.295560] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.295825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.295857] Hardware name: linux,dummy-virt (DT)
[   31.295887] Call trace:
[   31.295910]  show_stack+0x20/0x38 (C)
[   31.296063]  dump_stack_lvl+0x8c/0xd0
[   31.296121]  print_report+0x118/0x5e8
[   31.296197]  kasan_report+0xdc/0x128
[   31.296286]  __asan_report_store1_noabort+0x20/0x30
[   31.296417]  kmalloc_large_oob_right+0x278/0x2b8
[   31.296495]  kunit_try_run_case+0x170/0x3f0
[   31.296650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.296748]  kthread+0x328/0x630
[   31.296880]  ret_from_fork+0x10/0x20
[   31.296992] 
[   31.297298] The buggy address belongs to the physical page:
[   31.297347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fe4
[   31.297464] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.297558] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.297713] page_type: f8(unknown)
[   31.297766] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.298061] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.298145] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.298241] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.298328] head: 0bfffe0000000002 ffffc1ffc30ff901 00000000ffffffff 00000000ffffffff
[   31.298402] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.298513] page dumped because: kasan: bad access detected
[   31.298563] 
[   31.298612] Memory state around the buggy address:
[   31.298944]  fff00000c3fe5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.299001]  fff00000c3fe5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.299108] >fff00000c3fe6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.299179]                       ^
[   31.299316]  fff00000c3fe6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.299388]  fff00000c3fe6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.299456] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure Automatically assigned
[   31.283578] ==================================================================
[   31.283648] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   31.283710] Write of size 1 at addr fff00000c65ddf00 by task kunit_try_catch/175
[   31.283868] 
[   31.283900] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.284127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.284159] Hardware name: linux,dummy-virt (DT)
[   31.284341] Call trace:
[   31.284385]  show_stack+0x20/0x38 (C)
[   31.284478]  dump_stack_lvl+0x8c/0xd0
[   31.284571]  print_report+0x118/0x5e8
[   31.284707]  kasan_report+0xdc/0x128
[   31.284771]  __asan_report_store1_noabort+0x20/0x30
[   31.285040]  kmalloc_big_oob_right+0x2a4/0x2f0
[   31.285128]  kunit_try_run_case+0x170/0x3f0
[   31.285213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.285333]  kthread+0x328/0x630
[   31.285470]  ret_from_fork+0x10/0x20
[   31.285544] 
[   31.285562] Allocated by task 175:
[   31.285840]  kasan_save_stack+0x3c/0x68
[   31.285914]  kasan_save_track+0x20/0x40
[   31.285993]  kasan_save_alloc_info+0x40/0x58
[   31.286110]  __kasan_kmalloc+0xd4/0xd8
[   31.286165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.286233]  kmalloc_big_oob_right+0xb8/0x2f0
[   31.286274]  kunit_try_run_case+0x170/0x3f0
[   31.286311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.286354]  kthread+0x328/0x630
[   31.286396]  ret_from_fork+0x10/0x20
[   31.286439] 
[   31.286459] The buggy address belongs to the object at fff00000c65dc000
[   31.286459]  which belongs to the cache kmalloc-8k of size 8192
[   31.286514] The buggy address is located 0 bytes to the right of
[   31.286514]  allocated 7936-byte region [fff00000c65dc000, fff00000c65ddf00)
[   31.286574] 
[   31.286605] The buggy address belongs to the physical page:
[   31.286638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d8
[   31.286690] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.286743] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.286794] page_type: f5(slab)
[   31.286840] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   31.286887] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   31.286950] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   31.286998] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   31.287045] head: 0bfffe0000000003 ffffc1ffc3197601 00000000ffffffff 00000000ffffffff
[   31.287101] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   31.287139] page dumped because: kasan: bad access detected
[   31.287177] 
[   31.287195] Memory state around the buggy address:
[   31.287233]  fff00000c65dde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.287276]  fff00000c65dde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.287324] >fff00000c65ddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.287360]                    ^
[   31.287395]  fff00000c65ddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.287443]  fff00000c65de000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.287478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure Automatically assigned
[   31.268227] ==================================================================
[   31.268281] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   31.268331] Write of size 1 at addr fff00000c3efd678 by task kunit_try_catch/173
[   31.268379] 
[   31.268407] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.268485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.268510] Hardware name: linux,dummy-virt (DT)
[   31.268540] Call trace:
[   31.268560]  show_stack+0x20/0x38 (C)
[   31.268607]  dump_stack_lvl+0x8c/0xd0
[   31.268663]  print_report+0x118/0x5e8
[   31.268706]  kasan_report+0xdc/0x128
[   31.268747]  __asan_report_store1_noabort+0x20/0x30
[   31.268795]  kmalloc_track_caller_oob_right+0x40c/0x488
[   31.268866]  kunit_try_run_case+0x170/0x3f0
[   31.268920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.268970]  kthread+0x328/0x630
[   31.269010]  ret_from_fork+0x10/0x20
[   31.269062] 
[   31.269091] Allocated by task 173:
[   31.269117]  kasan_save_stack+0x3c/0x68
[   31.269153]  kasan_save_track+0x20/0x40
[   31.269186]  kasan_save_alloc_info+0x40/0x58
[   31.269221]  __kasan_kmalloc+0xd4/0xd8
[   31.269253]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   31.269296]  kmalloc_track_caller_oob_right+0xa8/0x488
[   31.269336]  kunit_try_run_case+0x170/0x3f0
[   31.269370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.269410]  kthread+0x328/0x630
[   31.269454]  ret_from_fork+0x10/0x20
[   31.269487] 
[   31.269505] The buggy address belongs to the object at fff00000c3efd600
[   31.269505]  which belongs to the cache kmalloc-128 of size 128
[   31.269558] The buggy address is located 0 bytes to the right of
[   31.269558]  allocated 120-byte region [fff00000c3efd600, fff00000c3efd678)
[   31.269618] 
[   31.269636] The buggy address belongs to the physical page:
[   31.269665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.269713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.269760] page_type: f5(slab)
[   31.269796] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.269880] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.269970] page dumped because: kasan: bad access detected
[   31.270103] 
[   31.270165] Memory state around the buggy address:
[   31.270282]  fff00000c3efd500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.270351]  fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.270390] >fff00000c3efd600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.270478]                                                                 ^
[   31.270535]  fff00000c3efd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.270658]  fff00000c3efd700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.270712] ==================================================================
[   31.272142] ==================================================================
[   31.272208] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   31.272274] Write of size 1 at addr fff00000c3efd778 by task kunit_try_catch/173
[   31.272337] 
[   31.272365] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.272448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.272474] Hardware name: linux,dummy-virt (DT)
[   31.272502] Call trace:
[   31.272522]  show_stack+0x20/0x38 (C)
[   31.272567]  dump_stack_lvl+0x8c/0xd0
[   31.272612]  print_report+0x118/0x5e8
[   31.272657]  kasan_report+0xdc/0x128
[   31.272716]  __asan_report_store1_noabort+0x20/0x30
[   31.272987]  kmalloc_track_caller_oob_right+0x418/0x488
[   31.273053]  kunit_try_run_case+0x170/0x3f0
[   31.273124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.273202]  kthread+0x328/0x630
[   31.273249]  ret_from_fork+0x10/0x20
[   31.273314] 
[   31.273352] Allocated by task 173:
[   31.273624]  kasan_save_stack+0x3c/0x68
[   31.273670]  kasan_save_track+0x20/0x40
[   31.273704]  kasan_save_alloc_info+0x40/0x58
[   31.273749]  __kasan_kmalloc+0xd4/0xd8
[   31.273982]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   31.274032]  kmalloc_track_caller_oob_right+0x184/0x488
[   31.274096]  kunit_try_run_case+0x170/0x3f0
[   31.274311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.274352]  kthread+0x328/0x630
[   31.274769]  ret_from_fork+0x10/0x20
[   31.274826] 
[   31.274898] The buggy address belongs to the object at fff00000c3efd700
[   31.274898]  which belongs to the cache kmalloc-128 of size 128
[   31.274952] The buggy address is located 0 bytes to the right of
[   31.274952]  allocated 120-byte region [fff00000c3efd700, fff00000c3efd778)
[   31.275072] 
[   31.275105] The buggy address belongs to the physical page:
[   31.275143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.275209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.275273] page_type: f5(slab)
[   31.275343] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.275400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.275465] page dumped because: kasan: bad access detected
[   31.275494] 
[   31.275511] Memory state around the buggy address:
[   31.275540]  fff00000c3efd600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.275797]  fff00000c3efd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.275914] >fff00000c3efd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.276024]                                                                 ^
[   31.276197]  fff00000c3efd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.276270]  fff00000c3efd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.276341] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure Automatically assigned
[   31.260412] ==================================================================
[   31.260473] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   31.260526] Read of size 1 at addr fff00000c9ad9000 by task kunit_try_catch/171
[   31.260575] 
[   31.260605] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.260729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.260786] Hardware name: linux,dummy-virt (DT)
[   31.260913] Call trace:
[   31.260952]  show_stack+0x20/0x38 (C)
[   31.261000]  dump_stack_lvl+0x8c/0xd0
[   31.261102]  print_report+0x118/0x5e8
[   31.261172]  kasan_report+0xdc/0x128
[   31.261235]  __asan_report_load1_noabort+0x20/0x30
[   31.261283]  kmalloc_node_oob_right+0x2f4/0x330
[   31.261331]  kunit_try_run_case+0x170/0x3f0
[   31.261375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.261469]  kthread+0x328/0x630
[   31.261548]  ret_from_fork+0x10/0x20
[   31.261593] 
[   31.261611] Allocated by task 171:
[   31.261637]  kasan_save_stack+0x3c/0x68
[   31.261672]  kasan_save_track+0x20/0x40
[   31.261716]  kasan_save_alloc_info+0x40/0x58
[   31.261753]  __kasan_kmalloc+0xd4/0xd8
[   31.261797]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   31.261837]  kmalloc_node_oob_right+0xbc/0x330
[   31.261875]  kunit_try_run_case+0x170/0x3f0
[   31.261950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.261991]  kthread+0x328/0x630
[   31.262088]  ret_from_fork+0x10/0x20
[   31.262150] 
[   31.262168] The buggy address belongs to the object at fff00000c9ad8000
[   31.262168]  which belongs to the cache kmalloc-4k of size 4096
[   31.262290] The buggy address is located 0 bytes to the right of
[   31.262290]  allocated 4096-byte region [fff00000c9ad8000, fff00000c9ad9000)
[   31.262431] 
[   31.262483] The buggy address belongs to the physical page:
[   31.262685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad8
[   31.263014] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.263072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.263147] page_type: f5(slab)
[   31.263184] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   31.263231] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   31.263296] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   31.263355] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   31.263414] head: 0bfffe0000000003 ffffc1ffc326b601 00000000ffffffff 00000000ffffffff
[   31.263551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   31.263697] page dumped because: kasan: bad access detected
[   31.263727] 
[   31.263753] Memory state around the buggy address:
[   31.263830]  fff00000c9ad8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.263902]  fff00000c9ad8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.263955] >fff00000c9ad9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.264015]                    ^
[   31.264129]  fff00000c9ad9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.264194]  fff00000c9ad9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.264229] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure Automatically assigned
[   31.246536] ==================================================================
[   31.246615] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   31.246667] Read of size 1 at addr fff00000c907e03f by task kunit_try_catch/169
[   31.246714] 
[   31.246867] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.246985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.247025] Hardware name: linux,dummy-virt (DT)
[   31.247174] Call trace:
[   31.247249]  show_stack+0x20/0x38 (C)
[   31.247316]  dump_stack_lvl+0x8c/0xd0
[   31.247362]  print_report+0x118/0x5e8
[   31.247404]  kasan_report+0xdc/0x128
[   31.247477]  __asan_report_load1_noabort+0x20/0x30
[   31.247525]  kmalloc_oob_left+0x2ec/0x320
[   31.247569]  kunit_try_run_case+0x170/0x3f0
[   31.247625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.247783]  kthread+0x328/0x630
[   31.247850]  ret_from_fork+0x10/0x20
[   31.247898] 
[   31.247916] Allocated by task 110:
[   31.248004]  kasan_save_stack+0x3c/0x68
[   31.248105]  kasan_save_track+0x20/0x40
[   31.248198]  kasan_save_alloc_info+0x40/0x58
[   31.248256]  __kasan_kmalloc+0xd4/0xd8
[   31.248336]  __kmalloc_noprof+0x198/0x4c8
[   31.248457]  kunit_kmalloc_array+0x34/0x88
[   31.248528]  test_readerwriter+0x3b0/0x948
[   31.248568]  kunit_try_run_case+0x170/0x3f0
[   31.248609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.248670]  kthread+0x328/0x630
[   31.248701]  ret_from_fork+0x10/0x20
[   31.248735] 
[   31.248753] The buggy address belongs to the object at fff00000c907e020
[   31.248753]  which belongs to the cache kmalloc-16 of size 16
[   31.248806] The buggy address is located 15 bytes to the right of
[   31.248806]  allocated 16-byte region [fff00000c907e020, fff00000c907e030)
[   31.248866] 
[   31.248884] The buggy address belongs to the physical page:
[   31.248913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e
[   31.248968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.249016] page_type: f5(slab)
[   31.249053] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.249133] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000
[   31.249172] page dumped because: kasan: bad access detected
[   31.249228] 
[   31.249269] Memory state around the buggy address:
[   31.249362]  fff00000c907df00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   31.249489]  fff00000c907df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.249563] >fff00000c907e000: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   31.249657]                                         ^
[   31.249746]  fff00000c907e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.249798]  fff00000c907e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.249833] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure Automatically assigned
[   31.238794] ==================================================================
[   31.238829] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   31.238870] Read of size 1 at addr fff00000c3efd580 by task kunit_try_catch/167
[   31.238937] 
[   31.238963] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.239058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.239095] Hardware name: linux,dummy-virt (DT)
[   31.239142] Call trace:
[   31.239181]  show_stack+0x20/0x38 (C)
[   31.239226]  dump_stack_lvl+0x8c/0xd0
[   31.239285]  print_report+0x118/0x5e8
[   31.239344]  kasan_report+0xdc/0x128
[   31.239402]  __asan_report_load1_noabort+0x20/0x30
[   31.239458]  kmalloc_oob_right+0x5d0/0x660
[   31.239503]  kunit_try_run_case+0x170/0x3f0
[   31.239547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.239911]  kthread+0x328/0x630
[   31.239955]  ret_from_fork+0x10/0x20
[   31.239999] 
[   31.240034] Allocated by task 167:
[   31.240190]  kasan_save_stack+0x3c/0x68
[   31.240244]  kasan_save_track+0x20/0x40
[   31.240309]  kasan_save_alloc_info+0x40/0x58
[   31.240378]  __kasan_kmalloc+0xd4/0xd8
[   31.240475]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.240544]  kmalloc_oob_right+0xb0/0x660
[   31.240633]  kunit_try_run_case+0x170/0x3f0
[   31.240688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.240728]  kthread+0x328/0x630
[   31.240776]  ret_from_fork+0x10/0x20
[   31.240810] 
[   31.240827] The buggy address belongs to the object at fff00000c3efd500
[   31.240827]  which belongs to the cache kmalloc-128 of size 128
[   31.240881] The buggy address is located 13 bytes to the right of
[   31.240881]  allocated 115-byte region [fff00000c3efd500, fff00000c3efd573)
[   31.240944] 
[   31.240962] The buggy address belongs to the physical page:
[   31.240989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.241037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.241091] page_type: f5(slab)
[   31.241126] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.241214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.241306] page dumped because: kasan: bad access detected
[   31.241335] 
[   31.241387] Memory state around the buggy address:
[   31.241465]  fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.241548]  fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.241613] >fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.241649]                    ^
[   31.241675]  fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.241713]  fff00000c3efd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.241749] ==================================================================
[   31.236686] ==================================================================
[   31.236724] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   31.236771] Write of size 1 at addr fff00000c3efd578 by task kunit_try_catch/167
[   31.236846] 
[   31.236876] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.236955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.236980] Hardware name: linux,dummy-virt (DT)
[   31.237009] Call trace:
[   31.237036]  show_stack+0x20/0x38 (C)
[   31.237103]  dump_stack_lvl+0x8c/0xd0
[   31.237150]  print_report+0x118/0x5e8
[   31.237192]  kasan_report+0xdc/0x128
[   31.237235]  __asan_report_store1_noabort+0x20/0x30
[   31.237282]  kmalloc_oob_right+0x538/0x660
[   31.237336]  kunit_try_run_case+0x170/0x3f0
[   31.237389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.237448]  kthread+0x328/0x630
[   31.237490]  ret_from_fork+0x10/0x20
[   31.237539] 
[   31.237557] Allocated by task 167:
[   31.237583]  kasan_save_stack+0x3c/0x68
[   31.237619]  kasan_save_track+0x20/0x40
[   31.237652]  kasan_save_alloc_info+0x40/0x58
[   31.237696]  __kasan_kmalloc+0xd4/0xd8
[   31.237729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.237772]  kmalloc_oob_right+0xb0/0x660
[   31.237809]  kunit_try_run_case+0x170/0x3f0
[   31.237843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.237891]  kthread+0x328/0x630
[   31.237931]  ret_from_fork+0x10/0x20
[   31.237965] 
[   31.237982] The buggy address belongs to the object at fff00000c3efd500
[   31.237982]  which belongs to the cache kmalloc-128 of size 128
[   31.238041] The buggy address is located 5 bytes to the right of
[   31.238041]  allocated 115-byte region [fff00000c3efd500, fff00000c3efd573)
[   31.238111] 
[   31.238129] The buggy address belongs to the physical page:
[   31.238157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.238206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.238252] page_type: f5(slab)
[   31.238287] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.238334] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.238372] page dumped because: kasan: bad access detected
[   31.238400] 
[   31.238417] Memory state around the buggy address:
[   31.238446]  fff00000c3efd400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.238486]  fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.238526] >fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.238562]                                                                 ^
[   31.238600]  fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.238638]  fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.238673] ==================================================================
[   31.225227] ==================================================================
[   31.225541] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   31.226363] Write of size 1 at addr fff00000c3efd573 by task kunit_try_catch/167
[   31.226516] 
[   31.227298] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.227666] Tainted: [N]=TEST
[   31.227700] Hardware name: linux,dummy-virt (DT)
[   31.228966] Call trace:
[   31.229336]  show_stack+0x20/0x38 (C)
[   31.229510]  dump_stack_lvl+0x8c/0xd0
[   31.229566]  print_report+0x118/0x5e8
[   31.229611]  kasan_report+0xdc/0x128
[   31.229653]  __asan_report_store1_noabort+0x20/0x30
[   31.229701]  kmalloc_oob_right+0x5a4/0x660
[   31.229747]  kunit_try_run_case+0x170/0x3f0
[   31.229795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.229844]  kthread+0x328/0x630
[   31.229951]  ret_from_fork+0x10/0x20
[   31.230393] 
[   31.230483] Allocated by task 167:
[   31.230784]  kasan_save_stack+0x3c/0x68
[   31.230940]  kasan_save_track+0x20/0x40
[   31.230975]  kasan_save_alloc_info+0x40/0x58
[   31.231011]  __kasan_kmalloc+0xd4/0xd8
[   31.231043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.231094]  kmalloc_oob_right+0xb0/0x660
[   31.231129]  kunit_try_run_case+0x170/0x3f0
[   31.231164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.231204]  kthread+0x328/0x630
[   31.231236]  ret_from_fork+0x10/0x20
[   31.231432] 
[   31.231553] The buggy address belongs to the object at fff00000c3efd500
[   31.231553]  which belongs to the cache kmalloc-128 of size 128
[   31.231644] The buggy address is located 0 bytes to the right of
[   31.231644]  allocated 115-byte region [fff00000c3efd500, fff00000c3efd573)
[   31.231739] 
[   31.232128] The buggy address belongs to the physical page:
[   31.232627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.233026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.233367] page_type: f5(slab)
[   31.233844] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.233976] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.234156] page dumped because: kasan: bad access detected
[   31.234201] 
[   31.234226] Memory state around the buggy address:
[   31.234476]  fff00000c3efd400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.234649]  fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.234738] >fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.234860]                                                              ^
[   31.235063]  fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.235140]  fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.235215] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  110.949229] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689
[  110.949887] Modules linked in:
[  110.950115] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[  110.951129] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  110.951660] Hardware name: linux,dummy-virt (DT)
[  110.952189] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  110.953225] pc : intlog10+0x38/0x48
[  110.953672] lr : intlog10_test+0xe4/0x200
[  110.954111] sp : ffff800082367c10
[  110.954493] x29: ffff800082367c90 x28: 0000000000000000 x27: 0000000000000000
[  110.955244] x26: 1ffe000018c27ca1 x25: 0000000000000000 x24: ffff800082367ce0
[  110.956098] x23: ffff800082367d00 x22: 0000000000000000 x21: 1ffff0001046cf82
[  110.956933] x20: ffffa0dee1e41de0 x19: ffff800080087990 x18: 0000000090f076e5
[  110.957685] x17: 0000000080bac4f3 x16: 00000000e263a8be x15: 0000000095b67a2c
[  110.958420] x14: 000000008a0b2563 x13: 000000008a4e4175 x12: ffff741bdcba8b89
[  110.959151] x11: 1ffff41bdcba8b88 x10: ffff741bdcba8b88 x9 : ffffa0dedf457984
[  110.959772] x8 : ffffa0dee5d45c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  110.960125] x5 : ffff70001046cf82 x4 : 1ffff00010010f3b x3 : 1ffff41bdc3c83bc
[  110.960465] x2 : 1ffff41bdc3c83bc x1 : 0000000000000003 x0 : 0000000000000000
[  110.960807] Call trace:
[  110.960946]  intlog10+0x38/0x48 (P)
[  110.961153]  kunit_try_run_case+0x170/0x3f0
[  110.961357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.961673]  kthread+0x328/0x630
[  110.961902]  ret_from_fork+0x10/0x20
[  110.962153] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  110.907055] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671
[  110.907965] Modules linked in:
[  110.908278] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[  110.908862] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  110.909408] Hardware name: linux,dummy-virt (DT)
[  110.909644] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  110.909994] pc : intlog2+0xd8/0xf8
[  110.910238] lr : intlog2_test+0xe4/0x200
[  110.910487] sp : ffff800082297c10
[  110.910682] x29: ffff800082297c90 x28: 0000000000000000 x27: 0000000000000000
[  110.911101] x26: 1ffe0000193634e1 x25: 0000000000000000 x24: ffff800082297ce0
[  110.911510] x23: ffff800082297d00 x22: 0000000000000000 x21: 1ffff00010452f82
[  110.911970] x20: ffffa0dee1e41ce0 x19: ffff800080087990 x18: 00000000066d908d
[  110.912585] x17: 0000000074a81e9f x16: 00000000b2f6124c x15: 0000000095987ca1
[  110.913000] x14: 000000005c4a72db x13: 0000000000000005 x12: ffff741bdcba8b89
[  110.913473] x11: 1ffff41bdcba8b88 x10: ffff741bdcba8b88 x9 : ffffa0dedf457b84
[  110.913849] x8 : ffffa0dee5d45c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  110.914316] x5 : ffff700010452f82 x4 : 1ffff00010010f3b x3 : 1ffff41bdc3c839c
[  110.914677] x2 : 1ffff41bdc3c839c x1 : 0000000000000003 x0 : 0000000000000000
[  110.915133] Call trace:
[  110.915305]  intlog2+0xd8/0xf8 (P)
[  110.915532]  kunit_try_run_case+0x170/0x3f0
[  110.915994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.916271]  kthread+0x328/0x630
[  110.916500]  ret_from_fork+0x10/0x20
[  110.916747] ---[ end trace 0000000000000000 ]---