Hay
Date
July 22, 2025, 5:13 a.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   30.753916] ==================================================================
[   30.753985] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   30.754053] Read of size 8 at addr fff00000c9257080 by task kunit_try_catch/231
[   30.754192] 
[   30.754237] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.754521] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.754587] Hardware name: linux,dummy-virt (DT)
[   30.754682] Call trace:
[   30.754709]  show_stack+0x20/0x38 (C)
[   30.754849]  dump_stack_lvl+0x8c/0xd0
[   30.754904]  print_report+0x118/0x5e8
[   30.754948]  kasan_report+0xdc/0x128
[   30.754992]  __asan_report_load8_noabort+0x20/0x30
[   30.755048]  workqueue_uaf+0x480/0x4a8
[   30.755368]  kunit_try_run_case+0x170/0x3f0
[   30.755489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.755549]  kthread+0x328/0x630
[   30.755594]  ret_from_fork+0x10/0x20
[   30.755643] 
[   30.755662] Allocated by task 231:
[   30.756025]  kasan_save_stack+0x3c/0x68
[   30.756090]  kasan_save_track+0x20/0x40
[   30.756128]  kasan_save_alloc_info+0x40/0x58
[   30.756169]  __kasan_kmalloc+0xd4/0xd8
[   30.756348]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.756392]  workqueue_uaf+0x13c/0x4a8
[   30.756536]  kunit_try_run_case+0x170/0x3f0
[   30.756849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.756917]  kthread+0x328/0x630
[   30.757021]  ret_from_fork+0x10/0x20
[   30.757152] 
[   30.757252] Freed by task 24:
[   30.757331]  kasan_save_stack+0x3c/0x68
[   30.757375]  kasan_save_track+0x20/0x40
[   30.757412]  kasan_save_free_info+0x4c/0x78
[   30.757449]  __kasan_slab_free+0x6c/0x98
[   30.757741]  kfree+0x214/0x3c8
[   30.757905]  workqueue_uaf_work+0x18/0x30
[   30.757973]  process_one_work+0x530/0xf88
[   30.758076]  worker_thread+0x618/0xf38
[   30.758134]  kthread+0x328/0x630
[   30.758502]  ret_from_fork+0x10/0x20
[   30.758567] 
[   30.758612] Last potentially related work creation:
[   30.758703]  kasan_save_stack+0x3c/0x68
[   30.758752]  kasan_record_aux_stack+0xb4/0xc8
[   30.758862]  __queue_work+0x65c/0xfe0
[   30.758922]  queue_work_on+0xbc/0xf8
[   30.758959]  workqueue_uaf+0x210/0x4a8
[   30.758996]  kunit_try_run_case+0x170/0x3f0
[   30.759035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.759076]  kthread+0x328/0x630
[   30.759118]  ret_from_fork+0x10/0x20
[   30.759156] 
[   30.759177] The buggy address belongs to the object at fff00000c9257080
[   30.759177]  which belongs to the cache kmalloc-32 of size 32
[   30.759250] The buggy address is located 0 bytes inside of
[   30.759250]  freed 32-byte region [fff00000c9257080, fff00000c92570a0)
[   30.759311] 
[   30.759331] The buggy address belongs to the physical page:
[   30.759381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109257
[   30.759448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.759499] page_type: f5(slab)
[   30.759552] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   30.759611] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   30.759652] page dumped because: kasan: bad access detected
[   30.759682] 
[   30.759714] Memory state around the buggy address:
[   30.759762]  fff00000c9256f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.759830]  fff00000c9257000: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   30.759873] >fff00000c9257080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   30.759919]                    ^
[   30.759946]  fff00000c9257100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.759996]  fff00000c9257180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.760043] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   30.688312] ==================================================================
[   30.688837] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   30.688917] Read of size 4 at addr fff00000c923ae80 by task swapper/1/0
[   30.688962] 
[   30.689005] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.689096] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.689124] Hardware name: linux,dummy-virt (DT)
[   30.689157] Call trace:
[   30.689180]  show_stack+0x20/0x38 (C)
[   30.689231]  dump_stack_lvl+0x8c/0xd0
[   30.691642]  print_report+0x118/0x5e8
[   30.691791]  kasan_report+0xdc/0x128
[   30.691846]  __asan_report_load4_noabort+0x20/0x30
[   30.691896]  rcu_uaf_reclaim+0x64/0x70
[   30.692961]  rcu_core+0x9f4/0x1e58
[   30.693328]  rcu_core_si+0x18/0x30
[   30.694302]  handle_softirqs+0x374/0xb28
[   30.694628]  __do_softirq+0x1c/0x28
[   30.695676]  ____do_softirq+0x18/0x30
[   30.695785]  call_on_irq_stack+0x24/0x30
[   30.696318]  do_softirq_own_stack+0x24/0x38
[   30.696458]  __irq_exit_rcu+0x1fc/0x318
[   30.696961]  irq_exit_rcu+0x1c/0x80
[   30.697300]  el1_interrupt+0x38/0x58
[   30.697952]  el1h_64_irq_handler+0x18/0x28
[   30.699102]  el1h_64_irq+0x6c/0x70
[   30.699409]  arch_local_irq_enable+0x4/0x8 (P)
[   30.699472]  do_idle+0x384/0x4e8
[   30.700354]  cpu_startup_entry+0x68/0x80
[   30.701145]  secondary_start_kernel+0x28c/0x340
[   30.701379]  __secondary_switched+0xc0/0xc8
[   30.701594] 
[   30.701946] Allocated by task 229:
[   30.702173]  kasan_save_stack+0x3c/0x68
[   30.702857]  kasan_save_track+0x20/0x40
[   30.703735]  kasan_save_alloc_info+0x40/0x58
[   30.703886]  __kasan_kmalloc+0xd4/0xd8
[   30.704610]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.704725]  rcu_uaf+0xb0/0x2d8
[   30.704970]  kunit_try_run_case+0x170/0x3f0
[   30.705012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.705059]  kthread+0x328/0x630
[   30.705093]  ret_from_fork+0x10/0x20
[   30.705910] 
[   30.706053] Freed by task 0:
[   30.706088]  kasan_save_stack+0x3c/0x68
[   30.706732]  kasan_save_track+0x20/0x40
[   30.707390]  kasan_save_free_info+0x4c/0x78
[   30.707442]  __kasan_slab_free+0x6c/0x98
[   30.707480]  kfree+0x214/0x3c8
[   30.707517]  rcu_uaf_reclaim+0x28/0x70
[   30.707554]  rcu_core+0x9f4/0x1e58
[   30.708717]  rcu_core_si+0x18/0x30
[   30.708985]  handle_softirqs+0x374/0xb28
[   30.709102]  __do_softirq+0x1c/0x28
[   30.709454] 
[   30.710007] Last potentially related work creation:
[   30.710612]  kasan_save_stack+0x3c/0x68
[   30.710670]  kasan_record_aux_stack+0xb4/0xc8
[   30.710710]  __call_rcu_common.constprop.0+0x74/0x8c8
[   30.710758]  call_rcu+0x18/0x30
[   30.711413]  rcu_uaf+0x14c/0x2d8
[   30.711742]  kunit_try_run_case+0x170/0x3f0
[   30.712001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.712045]  kthread+0x328/0x630
[   30.712080]  ret_from_fork+0x10/0x20
[   30.713164] 
[   30.713204] The buggy address belongs to the object at fff00000c923ae80
[   30.713204]  which belongs to the cache kmalloc-32 of size 32
[   30.713445] The buggy address is located 0 bytes inside of
[   30.713445]  freed 32-byte region [fff00000c923ae80, fff00000c923aea0)
[   30.713510] 
[   30.714122] The buggy address belongs to the physical page:
[   30.714591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10923a
[   30.714741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.715937] page_type: f5(slab)
[   30.716221] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   30.716378] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   30.716631] page dumped because: kasan: bad access detected
[   30.716846] 
[   30.716939] Memory state around the buggy address:
[   30.716973]  fff00000c923ad80: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   30.718006]  fff00000c923ae00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   30.718269] >fff00000c923ae80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   30.718457]                    ^
[   30.718509]  fff00000c923af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.719248]  fff00000c923af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.719292] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   30.604242] ==================================================================
[   30.604804] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   30.604887] Read of size 1 at addr fff00000c9a95078 by task kunit_try_catch/227
[   30.605070] 
[   30.605123] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.605571] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.605661] Hardware name: linux,dummy-virt (DT)
[   30.605846] Call trace:
[   30.605928]  show_stack+0x20/0x38 (C)
[   30.606221]  dump_stack_lvl+0x8c/0xd0
[   30.606522]  print_report+0x118/0x5e8
[   30.606696]  kasan_report+0xdc/0x128
[   30.606862]  __asan_report_load1_noabort+0x20/0x30
[   30.606952]  ksize_uaf+0x544/0x5f8
[   30.607041]  kunit_try_run_case+0x170/0x3f0
[   30.607471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.607704]  kthread+0x328/0x630
[   30.607801]  ret_from_fork+0x10/0x20
[   30.608096] 
[   30.608201] Allocated by task 227:
[   30.608444]  kasan_save_stack+0x3c/0x68
[   30.608550]  kasan_save_track+0x20/0x40
[   30.608693]  kasan_save_alloc_info+0x40/0x58
[   30.608781]  __kasan_kmalloc+0xd4/0xd8
[   30.608892]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.608936]  ksize_uaf+0xb8/0x5f8
[   30.608970]  kunit_try_run_case+0x170/0x3f0
[   30.609007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.609230]  kthread+0x328/0x630
[   30.610147]  ret_from_fork+0x10/0x20
[   30.610217] 
[   30.610260] Freed by task 227:
[   30.610357]  kasan_save_stack+0x3c/0x68
[   30.610421]  kasan_save_track+0x20/0x40
[   30.610459]  kasan_save_free_info+0x4c/0x78
[   30.610523]  __kasan_slab_free+0x6c/0x98
[   30.610609]  kfree+0x214/0x3c8
[   30.610674]  ksize_uaf+0x11c/0x5f8
[   30.610840]  kunit_try_run_case+0x170/0x3f0
[   30.611166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.611254]  kthread+0x328/0x630
[   30.611473]  ret_from_fork+0x10/0x20
[   30.611944] 
[   30.612001] The buggy address belongs to the object at fff00000c9a95000
[   30.612001]  which belongs to the cache kmalloc-128 of size 128
[   30.612158] The buggy address is located 120 bytes inside of
[   30.612158]  freed 128-byte region [fff00000c9a95000, fff00000c9a95080)
[   30.612229] 
[   30.612249] The buggy address belongs to the physical page:
[   30.612284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95
[   30.612340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.612411] page_type: f5(slab)
[   30.612448] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.612511] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.612553] page dumped because: kasan: bad access detected
[   30.612584] 
[   30.612618] Memory state around the buggy address:
[   30.612659]  fff00000c9a94f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.612712]  fff00000c9a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.612755] >fff00000c9a95000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.612793]                                                                 ^
[   30.612848]  fff00000c9a95080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.613157]  fff00000c9a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.613504] ==================================================================
[   30.593974] ==================================================================
[   30.594044] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   30.594290] Read of size 1 at addr fff00000c9a95000 by task kunit_try_catch/227
[   30.594355] 
[   30.594957] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.595069] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.595116] Hardware name: linux,dummy-virt (DT)
[   30.595163] Call trace:
[   30.595188]  show_stack+0x20/0x38 (C)
[   30.595255]  dump_stack_lvl+0x8c/0xd0
[   30.595703]  print_report+0x118/0x5e8
[   30.595770]  kasan_report+0xdc/0x128
[   30.595962]  __asan_report_load1_noabort+0x20/0x30
[   30.596054]  ksize_uaf+0x598/0x5f8
[   30.596145]  kunit_try_run_case+0x170/0x3f0
[   30.596234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.596317]  kthread+0x328/0x630
[   30.596528]  ret_from_fork+0x10/0x20
[   30.596748] 
[   30.596846] Allocated by task 227:
[   30.596987]  kasan_save_stack+0x3c/0x68
[   30.597082]  kasan_save_track+0x20/0x40
[   30.597198]  kasan_save_alloc_info+0x40/0x58
[   30.597286]  __kasan_kmalloc+0xd4/0xd8
[   30.597559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.597844]  ksize_uaf+0xb8/0x5f8
[   30.598008]  kunit_try_run_case+0x170/0x3f0
[   30.598089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.598226]  kthread+0x328/0x630
[   30.598302]  ret_from_fork+0x10/0x20
[   30.598375] 
[   30.598506] Freed by task 227:
[   30.598537]  kasan_save_stack+0x3c/0x68
[   30.598619]  kasan_save_track+0x20/0x40
[   30.599022]  kasan_save_free_info+0x4c/0x78
[   30.599083]  __kasan_slab_free+0x6c/0x98
[   30.599227]  kfree+0x214/0x3c8
[   30.599285]  ksize_uaf+0x11c/0x5f8
[   30.599366]  kunit_try_run_case+0x170/0x3f0
[   30.599508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.599552]  kthread+0x328/0x630
[   30.599753]  ret_from_fork+0x10/0x20
[   30.599893] 
[   30.600146] The buggy address belongs to the object at fff00000c9a95000
[   30.600146]  which belongs to the cache kmalloc-128 of size 128
[   30.600233] The buggy address is located 0 bytes inside of
[   30.600233]  freed 128-byte region [fff00000c9a95000, fff00000c9a95080)
[   30.600414] 
[   30.600485] The buggy address belongs to the physical page:
[   30.600520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95
[   30.600774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.600864] page_type: f5(slab)
[   30.600960] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.601347] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.601586] page dumped because: kasan: bad access detected
[   30.601628] 
[   30.601671] Memory state around the buggy address:
[   30.601955]  fff00000c9a94f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.602113]  fff00000c9a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.602225] >fff00000c9a95000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.602265]                    ^
[   30.602501]  fff00000c9a95080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.602893]  fff00000c9a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.603010] ==================================================================
[   30.587185] ==================================================================
[   30.587251] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   30.587515] Read of size 1 at addr fff00000c9a95000 by task kunit_try_catch/227
[   30.587652] 
[   30.587703] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.588110] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.588161] Hardware name: linux,dummy-virt (DT)
[   30.588195] Call trace:
[   30.588420]  show_stack+0x20/0x38 (C)
[   30.588694]  dump_stack_lvl+0x8c/0xd0
[   30.588764]  print_report+0x118/0x5e8
[   30.588809]  kasan_report+0xdc/0x128
[   30.589104]  __kasan_check_byte+0x54/0x70
[   30.589199]  ksize+0x30/0x88
[   30.589452]  ksize_uaf+0x168/0x5f8
[   30.589629]  kunit_try_run_case+0x170/0x3f0
[   30.589873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.589968]  kthread+0x328/0x630
[   30.590241]  ret_from_fork+0x10/0x20
[   30.590506] 
[   30.590561] Allocated by task 227:
[   30.590696]  kasan_save_stack+0x3c/0x68
[   30.590761]  kasan_save_track+0x20/0x40
[   30.590796]  kasan_save_alloc_info+0x40/0x58
[   30.590846]  __kasan_kmalloc+0xd4/0xd8
[   30.590890]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.590939]  ksize_uaf+0xb8/0x5f8
[   30.590984]  kunit_try_run_case+0x170/0x3f0
[   30.591022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.591064]  kthread+0x328/0x630
[   30.591097]  ret_from_fork+0x10/0x20
[   30.591142] 
[   30.591162] Freed by task 227:
[   30.591196]  kasan_save_stack+0x3c/0x68
[   30.591233]  kasan_save_track+0x20/0x40
[   30.591277]  kasan_save_free_info+0x4c/0x78
[   30.591315]  __kasan_slab_free+0x6c/0x98
[   30.591361]  kfree+0x214/0x3c8
[   30.591405]  ksize_uaf+0x11c/0x5f8
[   30.591450]  kunit_try_run_case+0x170/0x3f0
[   30.591487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.591529]  kthread+0x328/0x630
[   30.591563]  ret_from_fork+0x10/0x20
[   30.591598] 
[   30.591627] The buggy address belongs to the object at fff00000c9a95000
[   30.591627]  which belongs to the cache kmalloc-128 of size 128
[   30.591696] The buggy address is located 0 bytes inside of
[   30.591696]  freed 128-byte region [fff00000c9a95000, fff00000c9a95080)
[   30.591757] 
[   30.591791] The buggy address belongs to the physical page:
[   30.591844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95
[   30.591899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.591958] page_type: f5(slab)
[   30.592013] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.592071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.592120] page dumped because: kasan: bad access detected
[   30.592151] 
[   30.592177] Memory state around the buggy address:
[   30.592224]  fff00000c9a94f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.592273]  fff00000c9a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.592322] >fff00000c9a95000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.592360]                    ^
[   30.592394]  fff00000c9a95080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.592436]  fff00000c9a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.592474] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   30.564510] ==================================================================
[   30.564558] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   30.564610] Read of size 1 at addr fff00000c3f71f7f by task kunit_try_catch/225
[   30.564848] 
[   30.565280] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.565418] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.565450] Hardware name: linux,dummy-virt (DT)
[   30.565495] Call trace:
[   30.565671]  show_stack+0x20/0x38 (C)
[   30.565924]  dump_stack_lvl+0x8c/0xd0
[   30.566053]  print_report+0x118/0x5e8
[   30.566188]  kasan_report+0xdc/0x128
[   30.566326]  __asan_report_load1_noabort+0x20/0x30
[   30.566485]  ksize_unpoisons_memory+0x690/0x740
[   30.566558]  kunit_try_run_case+0x170/0x3f0
[   30.566837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.567023]  kthread+0x328/0x630
[   30.567179]  ret_from_fork+0x10/0x20
[   30.567390] 
[   30.567501] Allocated by task 225:
[   30.567546]  kasan_save_stack+0x3c/0x68
[   30.567788]  kasan_save_track+0x20/0x40
[   30.567925]  kasan_save_alloc_info+0x40/0x58
[   30.568096]  __kasan_kmalloc+0xd4/0xd8
[   30.568204]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.568314]  ksize_unpoisons_memory+0xc0/0x740
[   30.568391]  kunit_try_run_case+0x170/0x3f0
[   30.568745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.568987]  kthread+0x328/0x630
[   30.569093]  ret_from_fork+0x10/0x20
[   30.569216] 
[   30.569297] The buggy address belongs to the object at fff00000c3f71f00
[   30.569297]  which belongs to the cache kmalloc-128 of size 128
[   30.569544] The buggy address is located 12 bytes to the right of
[   30.569544]  allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73)
[   30.569620] 
[   30.569639] The buggy address belongs to the physical page:
[   30.569675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.569841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.570615] page_type: f5(slab)
[   30.570679] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.570749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.570853] page dumped because: kasan: bad access detected
[   30.571007] 
[   30.571071] Memory state around the buggy address:
[   30.571146]  fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.571838]  fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.572097] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.572181]                                                                 ^
[   30.572378]  fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.572494]  fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.572561] ==================================================================
[   30.551438] ==================================================================
[   30.551885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.551964] Read of size 1 at addr fff00000c3f71f73 by task kunit_try_catch/225
[   30.552015] 
[   30.552093] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.552197] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.552226] Hardware name: linux,dummy-virt (DT)
[   30.552259] Call trace:
[   30.552290]  show_stack+0x20/0x38 (C)
[   30.552358]  dump_stack_lvl+0x8c/0xd0
[   30.552404]  print_report+0x118/0x5e8
[   30.552449]  kasan_report+0xdc/0x128
[   30.552492]  __asan_report_load1_noabort+0x20/0x30
[   30.552539]  ksize_unpoisons_memory+0x628/0x740
[   30.552589]  kunit_try_run_case+0x170/0x3f0
[   30.552648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.552700]  kthread+0x328/0x630
[   30.552741]  ret_from_fork+0x10/0x20
[   30.552849] 
[   30.553386] Allocated by task 225:
[   30.553446]  kasan_save_stack+0x3c/0x68
[   30.553501]  kasan_save_track+0x20/0x40
[   30.553905]  kasan_save_alloc_info+0x40/0x58
[   30.553976]  __kasan_kmalloc+0xd4/0xd8
[   30.554063]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.554162]  ksize_unpoisons_memory+0xc0/0x740
[   30.554253]  kunit_try_run_case+0x170/0x3f0
[   30.554397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.554474]  kthread+0x328/0x630
[   30.554688]  ret_from_fork+0x10/0x20
[   30.554913] 
[   30.554972] The buggy address belongs to the object at fff00000c3f71f00
[   30.554972]  which belongs to the cache kmalloc-128 of size 128
[   30.555085] The buggy address is located 0 bytes to the right of
[   30.555085]  allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73)
[   30.555205] 
[   30.555322] The buggy address belongs to the physical page:
[   30.555380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.555461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.555861] page_type: f5(slab)
[   30.556161] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.556370] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.556439] page dumped because: kasan: bad access detected
[   30.556542] 
[   30.556613] Memory state around the buggy address:
[   30.556755]  fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.556845]  fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.557026] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.557444]                                                              ^
[   30.557554]  fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.557684]  fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.557773] ==================================================================
[   30.558969] ==================================================================
[   30.559027] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.559081] Read of size 1 at addr fff00000c3f71f78 by task kunit_try_catch/225
[   30.559283] 
[   30.559439] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.559539] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.559762] Hardware name: linux,dummy-virt (DT)
[   30.559837] Call trace:
[   30.559863]  show_stack+0x20/0x38 (C)
[   30.559991]  dump_stack_lvl+0x8c/0xd0
[   30.560339]  print_report+0x118/0x5e8
[   30.560433]  kasan_report+0xdc/0x128
[   30.560541]  __asan_report_load1_noabort+0x20/0x30
[   30.560629]  ksize_unpoisons_memory+0x618/0x740
[   30.560874]  kunit_try_run_case+0x170/0x3f0
[   30.561090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.561162]  kthread+0x328/0x630
[   30.561390]  ret_from_fork+0x10/0x20
[   30.561593] 
[   30.561661] Allocated by task 225:
[   30.561849]  kasan_save_stack+0x3c/0x68
[   30.561988]  kasan_save_track+0x20/0x40
[   30.562080]  kasan_save_alloc_info+0x40/0x58
[   30.562165]  __kasan_kmalloc+0xd4/0xd8
[   30.562200]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.562412]  ksize_unpoisons_memory+0xc0/0x740
[   30.562581]  kunit_try_run_case+0x170/0x3f0
[   30.562645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.562691]  kthread+0x328/0x630
[   30.562723]  ret_from_fork+0x10/0x20
[   30.562806] 
[   30.562838] The buggy address belongs to the object at fff00000c3f71f00
[   30.562838]  which belongs to the cache kmalloc-128 of size 128
[   30.562898] The buggy address is located 5 bytes to the right of
[   30.562898]  allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73)
[   30.562964] 
[   30.563005] The buggy address belongs to the physical page:
[   30.563040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.563093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.563140] page_type: f5(slab)
[   30.563178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.563248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.563288] page dumped because: kasan: bad access detected
[   30.563334] 
[   30.563353] Memory state around the buggy address:
[   30.563393]  fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.563438]  fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.563480] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.563519]                                                                 ^
[   30.563559]  fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.563600]  fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.563636] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.061006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   32.876471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   32.780863] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   32.790556] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   32.754940] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[   64.674568] Internal error: Oops: 0000000096000005 [#7]  SMP
[   64.679607] Modules linked in:
[   64.680059] CPU: 0 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.681383] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.682005] Hardware name: linux,dummy-virt (DT)
[   64.682498] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.683242] pc : ext4_mb_release+0x394/0xaf8
[   64.683762] lr : ext4_mb_release+0x37c/0xaf8
[   64.684251] sp : ffff800080cf7c50
[   64.684593] x29: ffff800080cf7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.685427] x26: fff00000c1ae3000 x25: fff00000c5ad6740 x24: 1ffe000018b5ace8
[   64.686384] x23: fffd800018b5ace8 x22: fff00000c5ad6618 x21: 1ffe000018b5acc3
[   64.687118] x20: 0000000000000000 x19: fff00000c5ad6400 x18: 1ffff2ff0e0f2c32
[   64.687845] x17: 0000000000000000 x16: fff00000da44cda8 x15: 0000000000000007
[   64.688574] x14: 0000000000000000 x13: 1ffe0000192bfcc4 x12: fffd8000196090c1
[   64.689565] x11: 1ffe0000196090c0 x10: fffd8000196090c0 x9 : ffff97f86e388bbc
[   64.690267] x8 : ffff800080cf79f8 x7 : 0000000000000001 x6 : ffff800080cf7b10
[   64.690619] x5 : 0000000000000001 x4 : 1ffe000018c8b511 x3 : dfff800000000000
[   64.691209] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.691951] Call trace:
[   64.692223]  ext4_mb_release+0x394/0xaf8 (P)
[   64.692669]  mbt_kunit_exit+0x9c/0x2c8
[   64.693076]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.693674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.694323]  kthread+0x328/0x630
[   64.694562]  ret_from_fork+0x10/0x20
[   64.694772] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.695026] ---[ end trace 0000000000000000 ]---
[   64.523685] Internal error: Oops: 0000000096000005 [#2]  SMP
[   64.528859] Modules linked in:
[   64.529314] CPU: 1 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.530391] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.530930] Hardware name: linux,dummy-virt (DT)
[   64.531499] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.531798] pc : ext4_mb_release+0x394/0xaf8
[   64.532047] lr : ext4_mb_release+0x37c/0xaf8
[   64.532270] sp : ffff800080b97c50
[   64.532482] x29: ffff800080b97c60 x28: dfff800000000000 x27: 0000000000000000
[   64.532962] x26: fff00000c99f1000 x25: fff00000c5aec740 x24: 1ffe000018b5d8e8
[   64.533469] x23: fffd800018b5d8e8 x22: fff00000c5aec618 x21: 1ffe000018b5d8c3
[   64.533928] x20: 0000000000000000 x19: fff00000c5aec400 x18: 000000002013ab6a
[   64.534435] x17: 0000000000000001 x16: fff00000da46eda8 x15: 000000005694f776
[   64.534865] x14: 000000006566aed3 x13: 1ffe0000192bfcf4 x12: fffd800019034a01
[   64.535309] x11: 1ffe000019034a00 x10: fffd800019034a00 x9 : ffff97f86e388bbc
[   64.535726] x8 : ffff800080b979f8 x7 : 0000000000000001 x6 : ffff800080b97b10
[   64.536157] x5 : 0000000000000001 x4 : 1ffe000018b8f511 x3 : dfff800000000000
[   64.536623] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.537625] Call trace:
[   64.537974]  ext4_mb_release+0x394/0xaf8 (P)
[   64.538428]  mbt_kunit_exit+0x9c/0x2c8
[   64.538840]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.539324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.539618]  kthread+0x328/0x630
[   64.539797]  ret_from_fork+0x10/0x20
[   64.540217] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.540793] ---[ end trace 0000000000000000 ]---
[  107.841706] Internal error: Oops: 0000000096000005 [#21]  SMP
[  107.844908] Modules linked in:
[  107.845384] CPU: 1 UID: 0 PID: 419 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[  107.846530] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  107.847255] Hardware name: linux,dummy-virt (DT)
[  107.848874] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  107.849858] pc : ext4_mb_release+0x394/0xaf8
[  107.850393] lr : ext4_mb_release+0x37c/0xaf8
[  107.850910] sp : ffff800080cd7c50
[  107.851250] x29: ffff800080cd7c60 x28: dfff800000000000 x27: 0000000000000000
[  107.851930] x26: fff00000c145c000 x25: fff00000c5d46740 x24: 1ffe000018ba8ce8
[  107.852442] x23: fffd800018ba8ce8 x22: fff00000c5d46618 x21: 1ffe000018ba8cc3
[  107.852792] x20: 0000000000000000 x19: fff00000c5d46400 x18: 1ffff2ff0e0f2c32
[  107.853147] x17: 0000000000000001 x16: fff00000da46eda8 x15: 0000000000000007
[  107.853487] x14: 00000000f1f1f1f1 x13: 1ffe0000192bfcf4 x12: fffd80001925bf81
[  107.853844] x11: 1ffe00001925bf80 x10: fffd80001925bf80 x9 : ffff97f86e388bbc
[  107.854596] x8 : ffff800080cd79f8 x7 : 0000000000000001 x6 : ffff800080cd7b10
[  107.855336] x5 : 0000000000000001 x4 : 1ffe000018baf799 x3 : dfff800000000000
[  107.856088] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[  107.856833] Call trace:
[  107.857140]  ext4_mb_release+0x394/0xaf8 (P)
[  107.857613]  mbt_kunit_exit+0x9c/0x2c8
[  107.858048]  kunit_try_run_case_cleanup+0x9c/0xe0
[  107.858551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  107.859115]  kthread+0x328/0x630
[  107.859497]  ret_from_fork+0x10/0x20
[  107.859939] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[  107.860533] ---[ end trace 0000000000000000 ]---
[   64.581555] Internal error: Oops: 0000000096000005 [#4]  SMP
[   64.587117] Modules linked in:
[   64.588667] CPU: 0 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.589806] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.590170] Hardware name: linux,dummy-virt (DT)
[   64.590441] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.590840] pc : ext4_mb_release+0x394/0xaf8
[   64.591092] lr : ext4_mb_release+0x37c/0xaf8
[   64.592123] sp : ffff800080cb7c50
[   64.593138] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.594005] x26: fff00000c643e000 x25: fff00000c9a5e740 x24: 1ffe00001934bce8
[   64.594382] x23: fffd80001934bce8 x22: fff00000c9a5e618 x21: 1ffe00001934bcc3
[   64.594732] x20: 0000000000000000 x19: fff00000c9a5e400 x18: 00000000ccf4d8a9
[   64.595480] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000695b76fc
[   64.596232] x14: 00000000f1f1f1f1 x13: 1ffe0000192bfcc4 x12: fffd800019609221
[   64.597218] x11: 1ffe000019609220 x10: fffd800019609220 x9 : ffff97f86e388bbc
[   64.598193] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10
[   64.598941] x5 : 0000000000000001 x4 : 1ffe00001944b799 x3 : dfff800000000000
[   64.599387] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.599727] Call trace:
[   64.599920]  ext4_mb_release+0x394/0xaf8 (P)
[   64.600361]  mbt_kunit_exit+0x9c/0x2c8
[   64.600764]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.601497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.602069]  kthread+0x328/0x630
[   64.602374]  ret_from_fork+0x10/0x20
[   64.602578] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.602832] ---[ end trace 0000000000000000 ]---
[  108.202744] Internal error: Oops: 0000000096000005 [#22]  SMP
[  108.209540] Modules linked in:
[  108.210042] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[  108.211146] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  108.211837] Hardware name: linux,dummy-virt (DT)
[  108.212335] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  108.212909] pc : kunit_test_null_dereference+0x70/0x170
[  108.213632] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.214091] sp : ffff8000820a7d30
[  108.214268] x29: ffff8000820a7d90 x28: 0000000000000000 x27: 0000000000000000
[  108.214631] x26: 1ffe0000192c1d01 x25: 0000000000000000 x24: 0000000000000004
[  108.214995] x23: fff00000c960e80c x22: ffff97f86bc48328 x21: fff00000c1b0bc88
[  108.215441] x20: 1ffff00010414fa6 x19: ffff800080087990 x18: 000000000f6d5eca
[  108.215879] x17: 0000000000000001 x16: fff00000da46eda8 x15: fff00000ff616b48
[  108.216288] x14: 0000000000018fff x13: 1ffe0000192bfcf4 x12: fffd8000190eb8b4
[  108.216774] x11: 1ffe0000190eb8b3 x10: fffd8000190eb8b3 x9 : ffff97f86bc3fab0
[  108.217194] x8 : ffff8000820a7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  108.217587] x5 : ffff700010414fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  108.218016] x2 : dfff800000000000 x1 : fff00000c875bcc0 x0 : ffff800080087990
[  108.218439] Call trace:
[  108.218602]  kunit_test_null_dereference+0x70/0x170 (P)
[  108.218975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.219261]  kthread+0x328/0x630
[  108.219531]  ret_from_fork+0x10/0x20
[  108.219872] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  108.220207] ---[ end trace 0000000000000000 ]---
[   64.899126] Internal error: Oops: 0000000096000005 [#14]  SMP
[   64.903555] Modules linked in:
[   64.905983] CPU: 1 UID: 0 PID: 405 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.907358] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.908190] Hardware name: linux,dummy-virt (DT)
[   64.908758] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.909630] pc : ext4_mb_release+0x394/0xaf8
[   64.910201] lr : ext4_mb_release+0x37c/0xaf8
[   64.910778] sp : ffff800080cb7c50
[   64.911175] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.911948] x26: fff00000c11d0000 x25: fff00000c5d1a740 x24: 1ffe000018ba34e8
[   64.912707] x23: fffd800018ba34e8 x22: fff00000c5d1a618 x21: 1ffe000018ba34c3
[   64.913684] x20: 0000000000000000 x19: fff00000c5d1a400 x18: 00000000fca6762f
[   64.914596] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000edf40d44
[   64.915195] x14: 000000007b6e0d47 x13: 1ffe0000192bfcf4 x12: fffd800019034b01
[   64.915540] x11: 1ffe000019034b00 x10: fffd800019034b00 x9 : ffff97f86e388bbc
[   64.915968] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10
[   64.916611] x5 : 0000000000000001 x4 : 1ffe0000182cf799 x3 : dfff800000000000
[   64.917184] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.917540] Call trace:
[   64.917675]  ext4_mb_release+0x394/0xaf8 (P)
[   64.917927]  mbt_kunit_exit+0x9c/0x2c8
[   64.918138]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.918435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.918723]  kthread+0x328/0x630
[   64.919286]  ret_from_fork+0x10/0x20
[   64.919582] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.919908] ---[ end trace 0000000000000000 ]---
[   64.802486] Internal error: Oops: 0000000096000005 [#11]  SMP
[   64.806604] Modules linked in:
[   64.807601] CPU: 1 UID: 0 PID: 399 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.809073] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.809860] Hardware name: linux,dummy-virt (DT)
[   64.810531] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.811393] pc : ext4_mb_release+0x394/0xaf8
[   64.812023] lr : ext4_mb_release+0x37c/0xaf8
[   64.812658] sp : ffff800080cf7c50
[   64.813264] x29: ffff800080cf7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.814292] x26: fff00000c44ed000 x25: fff00000c5c98740 x24: 1ffe000018b930e8
[   64.815259] x23: fffd800018b930e8 x22: fff00000c5c98618 x21: 1ffe000018b930c3
[   64.816236] x20: 0000000000000000 x19: fff00000c5c98400 x18: 1ffff2ff0e0f2c32
[   64.817306] x17: 0000000000000001 x16: fff00000da46eda8 x15: fff00000ff616b48
[   64.818493] x14: 0000000000018fff x13: 1ffe0000192bfcf4 x12: fffd800019034a81
[   64.819049] x11: 1ffe000019034a80 x10: fffd800019034a80 x9 : ffff97f86e388bbc
[   64.819400] x8 : ffff800080cf79f8 x7 : 0000000000000001 x6 : ffff800080cf7b10
[   64.819735] x5 : 0000000000000001 x4 : 1ffe00001826ca21 x3 : dfff800000000000
[   64.820518] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.821398] Call trace:
[   64.821719]  ext4_mb_release+0x394/0xaf8 (P)
[   64.822329]  mbt_kunit_exit+0x9c/0x2c8
[   64.822825]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.823358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.824031]  kthread+0x328/0x630
[   64.824411]  ret_from_fork+0x10/0x20
[   64.824884] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.825806] ---[ end trace 0000000000000000 ]---
[   64.704758] Internal error: Oops: 0000000096000005 [#8]  SMP
[   64.710419] Modules linked in:
[   64.712208] CPU: 1 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.713839] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.714973] Hardware name: linux,dummy-virt (DT)
[   64.716087] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.717051] pc : ext4_mb_release+0x394/0xaf8
[   64.717914] lr : ext4_mb_release+0x37c/0xaf8
[   64.718213] sp : ffff800080ce7c50
[   64.718451] x29: ffff800080ce7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.719021] x26: fff00000c44ea000 x25: fff00000c5ad4740 x24: 1ffe000018b5a8e8
[   64.719485] x23: fffd800018b5a8e8 x22: fff00000c5ad4618 x21: 1ffe000018b5a8c3
[   64.719964] x20: 0000000000000000 x19: fff00000c5ad4400 x18: 00000000527c6e06
[   64.720426] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000bc786473
[   64.721026] x14: 00000000f1f1f1f1 x13: 1ffe0000192bfcf4 x12: fffd800019034841
[   64.721462] x11: 1ffe000019034840 x10: fffd800019034840 x9 : ffff97f86e388bbc
[   64.721884] x8 : ffff800080ce79f8 x7 : 0000000000000001 x6 : ffff800080ce7b10
[   64.722292] x5 : 0000000000000001 x4 : 1ffe000018c8b289 x3 : dfff800000000000
[   64.722701] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.723137] Call trace:
[   64.723317]  ext4_mb_release+0x394/0xaf8 (P)
[   64.723562]  mbt_kunit_exit+0x9c/0x2c8
[   64.723806]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.724106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.724370]  kthread+0x328/0x630
[   64.724590]  ret_from_fork+0x10/0x20
[   64.724844] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.725187] ---[ end trace 0000000000000000 ]---
[   64.989865] Internal error: Oops: 0000000096000005 [#17]  SMP
[   64.992209] Modules linked in:
[   64.992464] CPU: 0 UID: 0 PID: 411 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.993058] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.993370] Hardware name: linux,dummy-virt (DT)
[   64.993635] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.994023] pc : ext4_mb_release+0x394/0xaf8
[   64.994405] lr : ext4_mb_release+0x37c/0xaf8
[   64.994670] sp : ffff800080cf7c50
[   64.994938] x29: ffff800080cf7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.995389] x26: fff00000c5ecd000 x25: fff00000c16c0740 x24: 1ffe0000182d80e8
[   64.995848] x23: fffd8000182d80e8 x22: fff00000c16c0618 x21: 1ffe0000182d80c3
[   64.996298] x20: 0000000000000000 x19: fff00000c16c0400 x18: 000000007a2c4c6a
[   64.996748] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000c7cd14a0
[   64.997147] x14: 00000000e32925f9 x13: 1ffe0000192bfcc4 x12: fffd8000195cf641
[   64.999237] x11: 1ffe0000195cf640 x10: fffd8000195cf640 x9 : ffff97f86e388bbc
[   64.999636] x8 : ffff800080cf79f8 x7 : 0000000000000001 x6 : ffff800080cf7b10
[   65.000579] x5 : 0000000000000001 x4 : 1ffe00001829b001 x3 : dfff800000000000
[   65.001614] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.002541] Call trace:
[   65.002992]  ext4_mb_release+0x394/0xaf8 (P)
[   65.003596]  mbt_kunit_exit+0x9c/0x2c8
[   65.004178]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.004845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.005667]  kthread+0x328/0x630
[   65.006286]  ret_from_fork+0x10/0x20
[   65.006742] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.007466] ---[ end trace 0000000000000000 ]---
[   64.773695] Internal error: Oops: 0000000096000005 [#10]  SMP
[   64.777923] Modules linked in:
[   64.779002] CPU: 0 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.780417] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.781536] Hardware name: linux,dummy-virt (DT)
[   64.782357] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.783424] pc : ext4_mb_release+0x394/0xaf8
[   64.784012] lr : ext4_mb_release+0x37c/0xaf8
[   64.784387] sp : ffff800080ce7c50
[   64.784599] x29: ffff800080ce7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.785228] x26: fff00000c1689000 x25: fff00000c9a58740 x24: 1ffe00001934b0e8
[   64.785676] x23: fffd80001934b0e8 x22: fff00000c9a58618 x21: 1ffe00001934b0c3
[   64.786242] x20: 0000000000000000 x19: fff00000c9a58400 x18: 0000000035a2f254
[   64.786592] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000b255be80
[   64.787219] x14: 000000009412bbfe x13: 1ffe0000192bfcc4 x12: fffd80001826eec1
[   64.787724] x11: 1ffe00001826eec0 x10: fffd80001826eec0 x9 : ffff97f86e388bbc
[   64.788176] x8 : ffff800080ce79f8 x7 : 0000000000000001 x6 : ffff800080ce7b10
[   64.788628] x5 : 0000000000000001 x4 : 1ffe000018e43ca9 x3 : dfff800000000000
[   64.789359] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.789901] Call trace:
[   64.790171]  ext4_mb_release+0x394/0xaf8 (P)
[   64.790426]  mbt_kunit_exit+0x9c/0x2c8
[   64.790671]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.791155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.791406]  kthread+0x328/0x630
[   64.791579]  ret_from_fork+0x10/0x20
[   64.791776] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.792592] ---[ end trace 0000000000000000 ]---
[   64.961437] Internal error: Oops: 0000000096000005 [#16]  SMP
[   64.966891] Modules linked in:
[   64.967112] CPU: 0 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.967536] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.967763] Hardware name: linux,dummy-virt (DT)
[   64.969075] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.970028] pc : ext4_mb_release+0x394/0xaf8
[   64.970553] lr : ext4_mb_release+0x37c/0xaf8
[   64.971131] sp : ffff800080d17c50
[   64.971638] x29: ffff800080d17c60 x28: dfff800000000000 x27: 0000000000000000
[   64.972597] x26: fff00000c11d3000 x25: fff00000c5f60740 x24: 1ffe000018bec0e8
[   64.973686] x23: fffd800018bec0e8 x22: fff00000c5f60618 x21: 1ffe000018bec0c3
[   64.974667] x20: 0000000000000000 x19: fff00000c5f60400 x18: 0000000007dd5685
[   64.975422] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000210dbe4b
[   64.976058] x14: 000000003c31b131 x13: 1ffe0000192bfcc4 x12: fffd800019608f01
[   64.976420] x11: 1ffe000019608f00 x10: fffd800019608f00 x9 : ffff97f86e388bbc
[   64.976767] x8 : ffff800080d179f8 x7 : 0000000000000001 x6 : ffff800080d17b10
[   64.977741] x5 : 0000000000000001 x4 : 1ffe000018e43289 x3 : dfff800000000000
[   64.978393] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.978779] Call trace:
[   64.978964]  ext4_mb_release+0x394/0xaf8 (P)
[   64.979213]  mbt_kunit_exit+0x9c/0x2c8
[   64.979436]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.979699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.980033]  kthread+0x328/0x630
[   64.980240]  ret_from_fork+0x10/0x20
[   64.980490] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.980820] ---[ end trace 0000000000000000 ]---
[   64.931076] Internal error: Oops: 0000000096000005 [#15]  SMP
[   64.932468] Modules linked in:
[   64.932713] CPU: 0 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.933867] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.934128] Hardware name: linux,dummy-virt (DT)
[   64.934399] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.934767] pc : ext4_mb_release+0x394/0xaf8
[   64.935045] lr : ext4_mb_release+0x37c/0xaf8
[   64.935296] sp : ffff800080cd7c50
[   64.935464] x29: ffff800080cd7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.936503] x26: fff00000c5eca000 x25: fff00000c16c2740 x24: 1ffe0000182d84e8
[   64.938015] x23: fffd8000182d84e8 x22: fff00000c16c2618 x21: 1ffe0000182d84c3
[   64.938963] x20: 0000000000000000 x19: fff00000c16c2400 x18: 1ffff2ff0e0f2c32
[   64.940033] x17: 0000000000000000 x16: fff00000da46eda8 x15: 0000000000000007
[   64.940399] x14: 0000000000000000 x13: 1ffe0000192bfcf4 x12: fffd800018c48a81
[   64.940744] x11: 1ffe000018c48a80 x10: fffd800018c48a80 x9 : ffff97f86e388bbc
[   64.942496] x8 : ffff800080cd79f8 x7 : 0000000000000001 x6 : ffff800080cd7b10
[   64.943421] x5 : 0000000000000001 x4 : 1ffe0000182cfca9 x3 : dfff800000000000
[   64.944545] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.945840] Call trace:
[   64.946369]  ext4_mb_release+0x394/0xaf8 (P)
[   64.947022]  mbt_kunit_exit+0x9c/0x2c8
[   64.947451]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.947694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.948441]  kthread+0x328/0x630
[   64.949090]  ret_from_fork+0x10/0x20
[   64.949765] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.950528] ---[ end trace 0000000000000000 ]---
[   64.833777] Internal error: Oops: 0000000096000005 [#12]  SMP
[   64.839203] Modules linked in:
[   64.839411] CPU: 1 UID: 0 PID: 401 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.839833] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.840130] Hardware name: linux,dummy-virt (DT)
[   64.840400] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.840796] pc : ext4_mb_release+0x394/0xaf8
[   64.841076] lr : ext4_mb_release+0x37c/0xaf8
[   64.841307] sp : ffff800080d17c50
[   64.841513] x29: ffff800080d17c60 x28: dfff800000000000 x27: 0000000000000000
[   64.841912] x26: fff00000c168c000 x25: fff00000c16c6740 x24: 1ffe0000182d8ce8
[   64.842275] x23: fffd8000182d8ce8 x22: fff00000c16c6618 x21: 1ffe0000182d8cc3
[   64.843177] x20: 0000000000000000 x19: fff00000c16c6400 x18: 00000000c264f5a1
[   64.843641] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000edf972f7
[   64.844021] x14: 00000000e2f716e3 x13: 1ffe0000192bfcf4 x12: fffd800018c48b81
[   64.844426] x11: 1ffe000018c48b80 x10: fffd800018c48b80 x9 : ffff97f86e388bbc
[   64.844881] x8 : ffff800080d179f8 x7 : 0000000000000001 x6 : ffff800080d17b10
[   64.845329] x5 : 0000000000000001 x4 : 1ffe0000182cf289 x3 : dfff800000000000
[   64.846015] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.846781] Call trace:
[   64.847071]  ext4_mb_release+0x394/0xaf8 (P)
[   64.847535]  mbt_kunit_exit+0x9c/0x2c8
[   64.847937]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.848426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.849126]  kthread+0x328/0x630
[   64.849515]  ret_from_fork+0x10/0x20
[   64.849944] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.850524] ---[ end trace 0000000000000000 ]---
[   64.867673] Internal error: Oops: 0000000096000005 [#13]  SMP
[   64.872340] Modules linked in:
[   64.872781] CPU: 0 UID: 0 PID: 403 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.875015] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.875890] Hardware name: linux,dummy-virt (DT)
[   64.876550] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.877482] pc : ext4_mb_release+0x394/0xaf8
[   64.878223] lr : ext4_mb_release+0x37c/0xaf8
[   64.878837] sp : ffff800080d07c50
[   64.879345] x29: ffff800080d07c60 x28: dfff800000000000 x27: 0000000000000000
[   64.880243] x26: fff00000c168f000 x25: fff00000c16c4740 x24: 1ffe0000182d88e8
[   64.881247] x23: fffd8000182d88e8 x22: fff00000c16c4618 x21: 1ffe0000182d88c3
[   64.882308] x20: 0000000000000000 x19: fff00000c16c4400 x18: fff00000cb293800
[   64.883212] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000000000000
[   64.884110] x14: 0000000000000000 x13: 1ffe0000192bfcc4 x12: fffd80001837fb21
[   64.885059] x11: 1ffe00001837fb20 x10: fffd80001837fb20 x9 : ffff97f86e388bbc
[   64.885988] x8 : ffff800080d079f8 x7 : 0000000000000001 x6 : ffff800080d07b10
[   64.886793] x5 : 0000000000000001 x4 : 1ffe000018e43799 x3 : dfff800000000000
[   64.887585] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.888383] Call trace:
[   64.888699]  ext4_mb_release+0x394/0xaf8 (P)
[   64.889187]  mbt_kunit_exit+0x9c/0x2c8
[   64.889445]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.889987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.890486]  kthread+0x328/0x630
[   64.890844]  ret_from_fork+0x10/0x20
[   64.891148] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.891398] ---[ end trace 0000000000000000 ]---
[   65.017512] Internal error: Oops: 0000000096000005 [#18]  SMP
[   65.023593] Modules linked in:
[   65.024017] CPU: 0 UID: 0 PID: 413 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   65.025176] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   65.026049] Hardware name: linux,dummy-virt (DT)
[   65.026754] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.027468] pc : ext4_mb_release+0x394/0xaf8
[   65.027952] lr : ext4_mb_release+0x37c/0xaf8
[   65.028413] sp : ffff800080d37c50
[   65.028779] x29: ffff800080d37c60 x28: dfff800000000000 x27: 0000000000000000
[   65.029788] x26: fff00000c5db8000 x25: fff00000c5ab6740 x24: 1ffe000018b56ce8
[   65.030220] x23: fffd800018b56ce8 x22: fff00000c5ab6618 x21: 1ffe000018b56cc3
[   65.030567] x20: 0000000000000000 x19: fff00000c5ab6400 x18: 000000003d345113
[   65.030919] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000047062c45
[   65.031259] x14: 00000000050d3c68 x13: 1ffe0000192bfcc4 x12: fffd800018259f81
[   65.031604] x11: 1ffe000018259f80 x10: fffd800018259f80 x9 : ffff97f86e388bbc
[   65.032230] x8 : ffff800080d379f8 x7 : 0000000000000001 x6 : ffff800080d37b10
[   65.033114] x5 : 0000000000000001 x4 : 1ffe00001829b511 x3 : dfff800000000000
[   65.033960] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.034871] Call trace:
[   65.035169]  ext4_mb_release+0x394/0xaf8 (P)
[   65.035635]  mbt_kunit_exit+0x9c/0x2c8
[   65.036063]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.036557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.037184]  kthread+0x328/0x630
[   65.037647]  ret_from_fork+0x10/0x20
[   65.038166] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.038947] ---[ end trace 0000000000000000 ]---
[   64.495800] Internal error: Oops: 0000000096000005 [#1]  SMP
[   64.500579] Modules linked in:
[   64.501387] CPU: 0 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.501968] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   64.502194] Hardware name: linux,dummy-virt (DT)
[   64.502466] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.502834] pc : ext4_mb_release+0x394/0xaf8
[   64.503096] lr : ext4_mb_release+0x37c/0xaf8
[   64.503323] sp : ffff800080cd7c50
[   64.503532] x29: ffff800080cd7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.504000] x26: fff00000c643b000 x25: fff00000c9a5c740 x24: 1ffe00001934b8e8
[   64.504373] x23: fffd80001934b8e8 x22: fff00000c9a5c618 x21: 1ffe00001934b8c3
[   64.504834] x20: 0000000000000000 x19: fff00000c9a5c400 x18: 00000000655c25a4
[   64.505257] x17: 0000000000000001 x16: fff00000da44cda8 x15: 000000009685f5d5
[   64.505668] x14: 000000009733713a x13: 1ffe0000192bfcc4 x12: fffd8000196092c1
[   64.506477] x11: 1ffe0000196092c0 x10: fffd8000196092c0 x9 : ffff97f86e388bbc
[   64.507262] x8 : ffff800080cd79f8 x7 : 0000000000000001 x6 : ffff800080cd7b10
[   64.508039] x5 : 0000000000000001 x4 : 1ffe00001944b511 x3 : dfff800000000000
[   64.508784] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.509660] Call trace:
[   64.510045]  ext4_mb_release+0x394/0xaf8 (P)
[   64.510747]  mbt_kunit_exit+0x9c/0x2c8
[   64.511404]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.512076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.512798]  kthread+0x328/0x630
[   64.513459]  ret_from_fork+0x10/0x20
[   64.514203] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.514725] ---[ end trace 0000000000000000 ]---
[   64.610093] Internal error: Oops: 0000000096000005 [#5]  SMP
[   64.614767] Modules linked in:
[   64.615556] CPU: 0 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.617242] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.617974] Hardware name: linux,dummy-virt (DT)
[   64.618495] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.619202] pc : ext4_mb_release+0x394/0xaf8
[   64.619706] lr : ext4_mb_release+0x37c/0xaf8
[   64.620205] sp : ffff800080cf7c50
[   64.620565] x29: ffff800080cf7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.621424] x26: fff00000c99f7000 x25: fff00000c5fbe740 x24: 1ffe000018bf7ce8
[   64.622076] x23: fffd800018bf7ce8 x22: fff00000c5fbe618 x21: 1ffe000018bf7cc3
[   64.622441] x20: 0000000000000000 x19: fff00000c5fbe400 x18: 000000006d9fc0e6
[   64.622788] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000309135d2
[   64.623348] x14: 00000000a911e4e5 x13: fff00000ca259448 x12: fffd800019034981
[   64.623959] x11: 1ffe000019034980 x10: fffd800019034980 x9 : ffff97f86e388bbc
[   64.624304] x8 : ffff800080cf79f8 x7 : 0000000000000001 x6 : ffff800080cf7b10
[   64.624643] x5 : 0000000000000001 x4 : 1ffe00001944b289 x3 : dfff800000000000
[   64.625097] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.625569] Call trace:
[   64.625752]  ext4_mb_release+0x394/0xaf8 (P)
[   64.626043]  mbt_kunit_exit+0x9c/0x2c8
[   64.626256]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.626551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.626904]  kthread+0x328/0x630
[   64.627096]  ret_from_fork+0x10/0x20
[   64.627377] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.627676] ---[ end trace 0000000000000000 ]---
[   64.638238] Internal error: Oops: 0000000096000005 [#6]  SMP
[   64.645435] Modules linked in:
[   64.647220] CPU: 0 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.648798] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.649789] Hardware name: linux,dummy-virt (DT)
[   64.650452] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.650960] pc : ext4_mb_release+0x394/0xaf8
[   64.651186] lr : ext4_mb_release+0x37c/0xaf8
[   64.651386] sp : ffff800080ce7c50
[   64.651543] x29: ffff800080ce7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.652039] x26: fff00000c0b08000 x25: fff00000c5d10740 x24: 1ffe000018ba20e8
[   64.652768] x23: fffd800018ba20e8 x22: fff00000c5d10618 x21: 1ffe000018ba20c3
[   64.653805] x20: 0000000000000000 x19: fff00000c5d10400 x18: 1ffff2ff0e0f2c32
[   64.654727] x17: 0000000000000001 x16: fff00000c92dd03c x15: 0000000000000007
[   64.655530] x14: 0000000000000000 x13: 1ffe00001b48dddd x12: fffd80001925bb81
[   64.656269] x11: 1ffe00001925bb80 x10: fffd80001925bb80 x9 : ffff97f86e388bbc
[   64.657058] x8 : ffff800080ce79f8 x7 : 0000000000000001 x6 : ffff800080ce7b10
[   64.657822] x5 : 0000000000000001 x4 : 1ffe000018c8ba21 x3 : dfff800000000000
[   64.658509] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.658856] Call trace:
[   64.658991]  ext4_mb_release+0x394/0xaf8 (P)
[   64.659198]  mbt_kunit_exit+0x9c/0x2c8
[   64.659383]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.659597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.659853]  kthread+0x328/0x630
[   64.660204]  ret_from_fork+0x10/0x20
[   64.660596] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.661282] ---[ end trace 0000000000000000 ]---
[   86.412743] Internal error: Oops: 0000000096000005 [#19]  SMP
[   86.418589] Modules linked in:
[   86.419347] CPU: 1 UID: 0 PID: 415 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   86.420320] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   86.420566] Hardware name: linux,dummy-virt (DT)
[   86.420770] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   86.421059] pc : ext4_mb_release+0x394/0xaf8
[   86.421531] lr : ext4_mb_release+0x37c/0xaf8
[   86.421834] sp : ffff800080d57c50
[   86.422049] x29: ffff800080d57c60 x28: dfff800000000000 x27: 0000000000000000
[   86.422511] x26: fff00000c11d6000 x25: fff00000c5ee0740 x24: 1ffe000018bdc0e8
[   86.422977] x23: fffd800018bdc0e8 x22: fff00000c5ee0618 x21: 1ffe000018bdc0c3
[   86.423433] x20: 0000000000000000 x19: fff00000c5ee0400 x18: fff00000c8671800
[   86.423881] x17: 0000000000000000 x16: fff00000c92dcc3c x15: fff00000ff616b48
[   86.424335] x14: 0000000000018fff x13: 1ffe00001b4899dd x12: fffd800019608e21
[   86.424782] x11: 1ffe000019608e20 x10: fffd800019608e20 x9 : ffff97f86e388bbc
[   86.425323] x8 : ffff800080d579f8 x7 : 0000000000000001 x6 : ffff800080d57b10
[   86.425735] x5 : 0000000000000001 x4 : 1ffe00001829ba21 x3 : dfff800000000000
[   86.426165] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   86.426570] Call trace:
[   86.426734]  ext4_mb_release+0x394/0xaf8 (P)
[   86.426993]  mbt_kunit_exit+0x9c/0x2c8
[   86.427247]  kunit_try_run_case_cleanup+0x9c/0xe0
[   86.427520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.427848]  kthread+0x328/0x630
[   86.428042]  ret_from_fork+0x10/0x20
[   86.428312] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   86.428568] ---[ end trace 0000000000000000 ]---
[  107.819159] Internal error: Oops: 0000000096000005 [#20]  SMP
[  107.824661] Modules linked in:
[  107.825043] CPU: 1 UID: 0 PID: 417 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[  107.825558] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  107.825859] Hardware name: linux,dummy-virt (DT)
[  107.826124] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  107.826472] pc : ext4_mb_release+0x394/0xaf8
[  107.826742] lr : ext4_mb_release+0x37c/0xaf8
[  107.826964] sp : ffff800080d47c50
[  107.827123] x29: ffff800080d47c60 x28: dfff800000000000 x27: 0000000000000000
[  107.827582] x26: fff00000c1459000 x25: fff00000c5d62740 x24: 1ffe000018bac4e8
[  107.828039] x23: fffd800018bac4e8 x22: fff00000c5d62618 x21: 1ffe000018bac4c3
[  107.828489] x20: 0000000000000000 x19: fff00000c5d62400 x18: 00000000097759ce
[  107.828899] x17: 0000000000000000 x16: fff00000da46eda8 x15: 00000000905da6ea
[  107.829320] x14: 0000000031840e1b x13: 1ffe0000192bfcf4 x12: fffd800019034b81
[  107.829734] x11: 1ffe000019034b80 x10: fffd800019034b80 x9 : ffff97f86e388bbc
[  107.830137] x8 : ffff800080d479f8 x7 : 0000000000000001 x6 : ffff800080d47b10
[  107.830547] x5 : 0000000000000001 x4 : 1ffe000018baf511 x3 : dfff800000000000
[  107.831002] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[  107.831407] Call trace:
[  107.831582]  ext4_mb_release+0x394/0xaf8 (P)
[  107.831849]  mbt_kunit_exit+0x9c/0x2c8
[  107.832059]  kunit_try_run_case_cleanup+0x9c/0xe0
[  107.832348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  107.832613]  kthread+0x328/0x630
[  107.832847]  ret_from_fork+0x10/0x20
[  107.833113] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[  107.833411] ---[ end trace 0000000000000000 ]---
[   64.550443] Internal error: Oops: 0000000096000005 [#3]  SMP
[   64.555374] Modules linked in:
[   64.555830] CPU: 1 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.557020] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.557676] Hardware name: linux,dummy-virt (DT)
[   64.558204] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.559010] pc : ext4_mb_release+0x394/0xaf8
[   64.559511] lr : ext4_mb_release+0x37c/0xaf8
[   64.559995] sp : ffff800080cd7c50
[   64.560331] x29: ffff800080cd7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.561088] x26: fff00000c99f4000 x25: fff00000c5fb8740 x24: 1ffe000018bf70e8
[   64.561949] x23: fffd800018bf70e8 x22: fff00000c5fb8618 x21: 1ffe000018bf70c3
[   64.562875] x20: 0000000000000000 x19: fff00000c5fb8400 x18: 1ffff2ff0e0f2c32
[   64.563725] x17: 0000000000000001 x16: fff00000da46eda8 x15: 0000000000000007
[   64.564470] x14: 00000000f1f1f1f1 x13: 1ffe0000192bfcf4 x12: fffd80001925bd01
[   64.565385] x11: 1ffe00001925bd00 x10: fffd80001925bd00 x9 : ffff97f86e388bbc
[   64.566078] x8 : ffff800080cd79f8 x7 : 0000000000000001 x6 : ffff800080cd7b10
[   64.566493] x5 : 0000000000000001 x4 : 1ffe000018c8b799 x3 : dfff800000000000
[   64.566844] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.567245] Call trace:
[   64.567409]  ext4_mb_release+0x394/0xaf8 (P)
[   64.567670]  mbt_kunit_exit+0x9c/0x2c8
[   64.567895]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.568146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.568467]  kthread+0x328/0x630
[   64.568669]  ret_from_fork+0x10/0x20
[   64.568968] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.569374] ---[ end trace 0000000000000000 ]---
[   64.736678] Internal error: Oops: 0000000096000005 [#9]  SMP
[   64.743242] Modules linked in:
[   64.743954] CPU: 0 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.745399] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.745760] Hardware name: linux,dummy-virt (DT)
[   64.746172] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.746464] pc : ext4_mb_release+0x394/0xaf8
[   64.746702] lr : ext4_mb_release+0x37c/0xaf8
[   64.747496] sp : ffff800080cc7c50
[   64.747722] x29: ffff800080cc7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.748182] x26: fff00000c152b000 x25: fff00000c9a5a740 x24: 1ffe00001934b4e8
[   64.748622] x23: fffd80001934b4e8 x22: fff00000c9a5a618 x21: 1ffe00001934b4c3
[   64.749928] x20: 0000000000000000 x19: fff00000c9a5a400 x18: 000000006bfd1d5d
[   64.750697] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000c51d42c1
[   64.751437] x14: 00000000ed0b7d3c x13: 1ffe0000192bfcc4 x12: fffd800018c48c81
[   64.752177] x11: 1ffe000018c48c80 x10: fffd800018c48c80 x9 : ffff97f86e388bbc
[   64.753081] x8 : ffff800080cc79f8 x7 : 0000000000000001 x6 : ffff800080cc7b10
[   64.753834] x5 : 0000000000000001 x4 : 1ffe000018bd5289 x3 : dfff800000000000
[   64.754567] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.755090] Call trace:
[   64.755231]  ext4_mb_release+0x394/0xaf8 (P)
[   64.755447]  mbt_kunit_exit+0x9c/0x2c8
[   64.755645]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.755956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.756479]  kthread+0x328/0x630
[   64.756852]  ret_from_fork+0x10/0x20
[   64.757317] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.758312] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   64.317887] ==================================================================
[   64.317962] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   64.317962] 
[   64.318052] Use-after-free read at 0x000000007a4a5714 (in kfence-#187):
[   64.318105]  test_krealloc+0x51c/0x830
[   64.318150]  kunit_try_run_case+0x170/0x3f0
[   64.318200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.318245]  kthread+0x328/0x630
[   64.318287]  ret_from_fork+0x10/0x20
[   64.318329] 
[   64.318353] kfence-#187: 0x000000007a4a5714-0x000000005885938b, size=32, cache=kmalloc-32
[   64.318353] 
[   64.318408] allocated by task 368 on cpu 1 at 64.317238s (0.001166s ago):
[   64.318478]  test_alloc+0x29c/0x628
[   64.318516]  test_krealloc+0xc0/0x830
[   64.318554]  kunit_try_run_case+0x170/0x3f0
[   64.318592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.318633]  kthread+0x328/0x630
[   64.318670]  ret_from_fork+0x10/0x20
[   64.318710] 
[   64.318733] freed by task 368 on cpu 1 at 64.317493s (0.001236s ago):
[   64.318791]  krealloc_noprof+0x148/0x360
[   64.318840]  test_krealloc+0x1dc/0x830
[   64.318877]  kunit_try_run_case+0x170/0x3f0
[   64.318916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.318960]  kthread+0x328/0x630
[   64.318997]  ret_from_fork+0x10/0x20
[   64.319037] 
[   64.319083] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.319168] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   64.319200] Hardware name: linux,dummy-virt (DT)
[   64.319234] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   64.237398] ==================================================================
[   64.237493] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   64.237493] 
[   64.237588] Use-after-free read at 0x00000000a0f62836 (in kfence-#186):
[   64.237642]  test_memcache_typesafe_by_rcu+0x280/0x560
[   64.237691]  kunit_try_run_case+0x170/0x3f0
[   64.237736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.237779]  kthread+0x328/0x630
[   64.237836]  ret_from_fork+0x10/0x20
[   64.237878] 
[   64.237903] kfence-#186: 0x00000000a0f62836-0x00000000f717499d, size=32, cache=test
[   64.237903] 
[   64.237955] allocated by task 366 on cpu 1 at 64.214985s (0.022966s ago):
[   64.238025]  test_alloc+0x230/0x628
[   64.238063]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   64.238104]  kunit_try_run_case+0x170/0x3f0
[   64.238143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.238188]  kthread+0x328/0x630
[   64.238225]  ret_from_fork+0x10/0x20
[   64.238264] 
[   64.238287] freed by task 366 on cpu 1 at 64.215106s (0.023177s ago):
[   64.238343]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   64.238385]  kunit_try_run_case+0x170/0x3f0
[   64.238423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.238465]  kthread+0x328/0x630
[   64.238500]  ret_from_fork+0x10/0x20
[   64.238538] 
[   64.238584] CPU: 0 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   64.238669] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   64.238700] Hardware name: linux,dummy-virt (DT)
[   64.238735] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   41.149434] ==================================================================
[   41.149598] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   41.149598] 
[   41.149701] Invalid read at 0x00000000f55a8b06:
[   41.149845]  test_invalid_access+0xdc/0x1f0
[   41.149926]  kunit_try_run_case+0x170/0x3f0
[   41.149986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.150037]  kthread+0x328/0x630
[   41.150086]  ret_from_fork+0x10/0x20
[   41.150147] 
[   41.150206] CPU: 1 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   41.150300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   41.150337] Hardware name: linux,dummy-virt (DT)
[   41.150377] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   35.821417] ==================================================================
[   35.821523] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   35.821523] 
[   35.821621] Out-of-bounds write at 0x0000000053cd69ea (1B left of kfence-#133):
[   35.821687]  test_out_of_bounds_write+0x100/0x240
[   35.821737]  kunit_try_run_case+0x170/0x3f0
[   35.821785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.821848]  kthread+0x328/0x630
[   35.821888]  ret_from_fork+0x10/0x20
[   35.821931] 
[   35.821955] kfence-#133: 0x00000000b870e193-0x0000000022b06c48, size=32, cache=test
[   35.821955] 
[   35.822013] allocated by task 324 on cpu 1 at 35.821327s (0.000682s ago):
[   35.822090]  test_alloc+0x230/0x628
[   35.822133]  test_out_of_bounds_write+0xc8/0x240
[   35.822180]  kunit_try_run_case+0x170/0x3f0
[   35.822222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.822270]  kthread+0x328/0x630
[   35.822308]  ret_from_fork+0x10/0x20
[   35.822348] 
[   35.822392] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   35.822492] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.822528] Hardware name: linux,dummy-virt (DT)
[   35.822565] ==================================================================
[   35.613441] ==================================================================
[   35.613558] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   35.613558] 
[   35.613663] Out-of-bounds write at 0x000000009bfd6f22 (1B left of kfence-#131):
[   35.613732]  test_out_of_bounds_write+0x100/0x240
[   35.613783]  kunit_try_run_case+0x170/0x3f0
[   35.613849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.613898]  kthread+0x328/0x630
[   35.613940]  ret_from_fork+0x10/0x20
[   35.613986] 
[   35.614012] kfence-#131: 0x00000000083c2ac4-0x00000000dfe75337, size=32, cache=kmalloc-32
[   35.614012] 
[   35.614077] allocated by task 322 on cpu 1 at 35.613269s (0.000804s ago):
[   35.614155]  test_alloc+0x29c/0x628
[   35.614205]  test_out_of_bounds_write+0xc8/0x240
[   35.614248]  kunit_try_run_case+0x170/0x3f0
[   35.614291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.614340]  kthread+0x328/0x630
[   35.614378]  ret_from_fork+0x10/0x20
[   35.614421] 
[   35.614468] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   35.614570] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.614606] Hardware name: linux,dummy-virt (DT)
[   35.614645] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   40.917502] ==================================================================
[   40.917594] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.917594] 
[   40.917658] Corrupted memory at 0x000000005057b64a [ ! . . . . . . . . . . . . . . . ] (in kfence-#182):
[   40.917980]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.918029]  kunit_try_run_case+0x170/0x3f0
[   40.918073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.918115]  kthread+0x328/0x630
[   40.918154]  ret_from_fork+0x10/0x20
[   40.918200] 
[   40.918225] kfence-#182: 0x000000003fc5fb02-0x000000007dccb406, size=73, cache=kmalloc-96
[   40.918225] 
[   40.918281] allocated by task 356 on cpu 0 at 40.917258s (0.001018s ago):
[   40.918345]  test_alloc+0x29c/0x628
[   40.918384]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   40.918425]  kunit_try_run_case+0x170/0x3f0
[   40.918465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.918508]  kthread+0x328/0x630
[   40.918544]  ret_from_fork+0x10/0x20
[   40.918585] 
[   40.918608] freed by task 356 on cpu 0 at 40.917404s (0.001200s ago):
[   40.918668]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.918710]  kunit_try_run_case+0x170/0x3f0
[   40.918750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.918793]  kthread+0x328/0x630
[   40.918839]  ret_from_fork+0x10/0x20
[   40.918879] 
[   40.918927] CPU: 0 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   40.919013] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   40.919044] Hardware name: linux,dummy-virt (DT)
[   40.919079] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   40.813540] ==================================================================
[   40.813630] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   40.813630] 
[   40.813729] Out-of-bounds read at 0x00000000e74cd9b8 (105B right of kfence-#181):
[   40.813786]  test_kmalloc_aligned_oob_read+0x238/0x468
[   40.813855]  kunit_try_run_case+0x170/0x3f0
[   40.813903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.813950]  kthread+0x328/0x630
[   40.813993]  ret_from_fork+0x10/0x20
[   40.814036] 
[   40.814060] kfence-#181: 0x00000000c423265b-0x0000000061530d2d, size=73, cache=kmalloc-96
[   40.814060] 
[   40.814114] allocated by task 354 on cpu 1 at 40.813280s (0.000830s ago):
[   40.814194]  test_alloc+0x29c/0x628
[   40.814237]  test_kmalloc_aligned_oob_read+0x100/0x468
[   40.814282]  kunit_try_run_case+0x170/0x3f0
[   40.814321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.814366]  kthread+0x328/0x630
[   40.814403]  ret_from_fork+0x10/0x20
[   40.814446] 
[   40.814494] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   40.814579] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   40.814610] Hardware name: linux,dummy-virt (DT)
[   40.814644] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   36.757430] ==================================================================
[   36.757524] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   36.757524] 
[   36.757589] Corrupted memory at 0x000000001bd21cfc [ ! . . . . . . . . . . . . . . . ] (in kfence-#142):
[   36.757921]  test_corruption+0x278/0x378
[   36.757969]  kunit_try_run_case+0x170/0x3f0
[   36.758016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.758063]  kthread+0x328/0x630
[   36.758105]  ret_from_fork+0x10/0x20
[   36.758148] 
[   36.758178] kfence-#142: 0x0000000090bfe3fa-0x000000006479973c, size=32, cache=kmalloc-32
[   36.758178] 
[   36.758239] allocated by task 342 on cpu 1 at 36.757238s (0.000997s ago):
[   36.758306]  test_alloc+0x29c/0x628
[   36.758345]  test_corruption+0xdc/0x378
[   36.758385]  kunit_try_run_case+0x170/0x3f0
[   36.758425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.758470]  kthread+0x328/0x630
[   36.758506]  ret_from_fork+0x10/0x20
[   36.758546] 
[   36.758569] freed by task 342 on cpu 1 at 36.757339s (0.001226s ago):
[   36.758632]  test_corruption+0x278/0x378
[   36.758670]  kunit_try_run_case+0x170/0x3f0
[   36.758711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.758754]  kthread+0x328/0x630
[   36.758792]  ret_from_fork+0x10/0x20
[   36.758841] 
[   36.758888] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   36.758979] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.759012] Hardware name: linux,dummy-virt (DT)
[   36.759048] ==================================================================
[   36.861564] ==================================================================
[   36.861660] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   36.861660] 
[   36.861723] Corrupted memory at 0x00000000a4b50782 [ ! ] (in kfence-#143):
[   36.861871]  test_corruption+0x284/0x378
[   36.861918]  kunit_try_run_case+0x170/0x3f0
[   36.861962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.862007]  kthread+0x328/0x630
[   36.862045]  ret_from_fork+0x10/0x20
[   36.862086] 
[   36.862112] kfence-#143: 0x000000009979f4de-0x000000003dfa6911, size=32, cache=kmalloc-32
[   36.862112] 
[   36.862175] allocated by task 342 on cpu 1 at 36.861299s (0.000872s ago):
[   36.862240]  test_alloc+0x29c/0x628
[   36.862280]  test_corruption+0x198/0x378
[   36.862320]  kunit_try_run_case+0x170/0x3f0
[   36.862362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.862407]  kthread+0x328/0x630
[   36.862444]  ret_from_fork+0x10/0x20
[   36.862484] 
[   36.862507] freed by task 342 on cpu 1 at 36.861396s (0.001107s ago):
[   36.862570]  test_corruption+0x284/0x378
[   36.862608]  kunit_try_run_case+0x170/0x3f0
[   36.862650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.862694]  kthread+0x328/0x630
[   36.862730]  ret_from_fork+0x10/0x20
[   36.862770] 
[   36.862822] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   36.862911] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.862945] Hardware name: linux,dummy-virt (DT)
[   36.862981] ==================================================================
[   37.901453] ==================================================================
[   37.901556] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   37.901556] 
[   37.901619] Corrupted memory at 0x0000000067e14ac7 [ ! ] (in kfence-#153):
[   37.901740]  test_corruption+0x1d8/0x378
[   37.901788]  kunit_try_run_case+0x170/0x3f0
[   37.901851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.901898]  kthread+0x328/0x630
[   37.901939]  ret_from_fork+0x10/0x20
[   37.901982] 
[   37.902007] kfence-#153: 0x00000000bd377903-0x00000000205a1aa5, size=32, cache=test
[   37.902007] 
[   37.902066] allocated by task 344 on cpu 1 at 37.901300s (0.000762s ago):
[   37.902132]  test_alloc+0x230/0x628
[   37.902177]  test_corruption+0x198/0x378
[   37.902216]  kunit_try_run_case+0x170/0x3f0
[   37.902258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.902304]  kthread+0x328/0x630
[   37.902342]  ret_from_fork+0x10/0x20
[   37.902382] 
[   37.902405] freed by task 344 on cpu 1 at 37.901363s (0.001038s ago):
[   37.902468]  test_corruption+0x1d8/0x378
[   37.902508]  kunit_try_run_case+0x170/0x3f0
[   37.902550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.902595]  kthread+0x328/0x630
[   37.902632]  ret_from_fork+0x10/0x20
[   37.902674] 
[   37.902718] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   37.902802] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   37.902841] Hardware name: linux,dummy-virt (DT)
[   37.902876] ==================================================================
[   36.965410] ==================================================================
[   36.965507] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   36.965507] 
[   36.965571] Corrupted memory at 0x00000000604ec11e [ ! . . . . . . . . . . . . . . . ] (in kfence-#144):
[   36.965899]  test_corruption+0x120/0x378
[   36.965948]  kunit_try_run_case+0x170/0x3f0
[   36.965995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.966040]  kthread+0x328/0x630
[   36.966081]  ret_from_fork+0x10/0x20
[   36.966121] 
[   36.966145] kfence-#144: 0x00000000f953b82f-0x00000000bb61341a, size=32, cache=test
[   36.966145] 
[   36.966215] allocated by task 344 on cpu 1 at 36.965268s (0.000943s ago):
[   36.966280]  test_alloc+0x230/0x628
[   36.966319]  test_corruption+0xdc/0x378
[   36.966358]  kunit_try_run_case+0x170/0x3f0
[   36.966400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.966446]  kthread+0x328/0x630
[   36.966483]  ret_from_fork+0x10/0x20
[   36.966522] 
[   36.966545] freed by task 344 on cpu 1 at 36.965326s (0.001216s ago):
[   36.966609]  test_corruption+0x120/0x378
[   36.966648]  kunit_try_run_case+0x170/0x3f0
[   36.966688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.966734]  kthread+0x328/0x630
[   36.966773]  ret_from_fork+0x10/0x20
[   36.966821] 
[   36.966867] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   36.966956] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.966989] Hardware name: linux,dummy-virt (DT)
[   36.967024] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   36.549355] ==================================================================
[   36.549446] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   36.549446] 
[   36.549506] Invalid free of 0x00000000f96d4fdc (in kfence-#140):
[   36.549560]  test_invalid_addr_free+0x1ac/0x238
[   36.549607]  kunit_try_run_case+0x170/0x3f0
[   36.549650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.549694]  kthread+0x328/0x630
[   36.549733]  ret_from_fork+0x10/0x20
[   36.549773] 
[   36.549796] kfence-#140: 0x000000001ec91793-0x000000004221a667, size=32, cache=kmalloc-32
[   36.549796] 
[   36.549868] allocated by task 338 on cpu 0 at 36.549221s (0.000643s ago):
[   36.549929]  test_alloc+0x29c/0x628
[   36.549970]  test_invalid_addr_free+0xd4/0x238
[   36.550011]  kunit_try_run_case+0x170/0x3f0
[   36.550051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.550092]  kthread+0x328/0x630
[   36.550129]  ret_from_fork+0x10/0x20
[   36.550172] 
[   36.550218] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   36.550303] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.550332] Hardware name: linux,dummy-virt (DT)
[   36.550366] ==================================================================
[   36.653393] ==================================================================
[   36.653487] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   36.653487] 
[   36.653548] Invalid free of 0x0000000065f44038 (in kfence-#141):
[   36.653600]  test_invalid_addr_free+0xec/0x238
[   36.653646]  kunit_try_run_case+0x170/0x3f0
[   36.653689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.653732]  kthread+0x328/0x630
[   36.653771]  ret_from_fork+0x10/0x20
[   36.653810] 
[   36.653851] kfence-#141: 0x0000000076c447fe-0x00000000ee8eba07, size=32, cache=test
[   36.653851] 
[   36.653906] allocated by task 340 on cpu 0 at 36.653275s (0.000628s ago):
[   36.653969]  test_alloc+0x230/0x628
[   36.654006]  test_invalid_addr_free+0xd4/0x238
[   36.654046]  kunit_try_run_case+0x170/0x3f0
[   36.654086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.654129]  kthread+0x328/0x630
[   36.654172]  ret_from_fork+0x10/0x20
[   36.654212] 
[   36.654254] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   36.654340] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.654370] Hardware name: linux,dummy-virt (DT)
[   36.654405] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   36.445585] ==================================================================
[   36.445685] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   36.445685] 
[   36.445748] Invalid free of 0x00000000a4abf1a1 (in kfence-#139):
[   36.445807]  test_double_free+0x100/0x238
[   36.445870]  kunit_try_run_case+0x170/0x3f0
[   36.445915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.445962]  kthread+0x328/0x630
[   36.446001]  ret_from_fork+0x10/0x20
[   36.446043] 
[   36.446067] kfence-#139: 0x00000000a4abf1a1-0x000000002b8c9777, size=32, cache=test
[   36.446067] 
[   36.446127] allocated by task 336 on cpu 1 at 36.445384s (0.000740s ago):
[   36.446201]  test_alloc+0x230/0x628
[   36.446242]  test_double_free+0xd4/0x238
[   36.446283]  kunit_try_run_case+0x170/0x3f0
[   36.446325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.446371]  kthread+0x328/0x630
[   36.446407]  ret_from_fork+0x10/0x20
[   36.446447] 
[   36.446473] freed by task 336 on cpu 1 at 36.445446s (0.001023s ago):
[   36.446539]  test_double_free+0xf0/0x238
[   36.446581]  kunit_try_run_case+0x170/0x3f0
[   36.446624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.446671]  kthread+0x328/0x630
[   36.446709]  ret_from_fork+0x10/0x20
[   36.446750] 
[   36.446793] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   36.446896] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.446929] Hardware name: linux,dummy-virt (DT)
[   36.446966] ==================================================================
[   36.341614] ==================================================================
[   36.341746] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   36.341746] 
[   36.341837] Invalid free of 0x000000002f0f3e04 (in kfence-#138):
[   36.341909]  test_double_free+0x1bc/0x238
[   36.341960]  kunit_try_run_case+0x170/0x3f0
[   36.342007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.342053]  kthread+0x328/0x630
[   36.342096]  ret_from_fork+0x10/0x20
[   36.342138] 
[   36.342168] kfence-#138: 0x000000002f0f3e04-0x00000000fd09caa5, size=32, cache=kmalloc-32
[   36.342168] 
[   36.342231] allocated by task 334 on cpu 1 at 36.341385s (0.000842s ago):
[   36.342299]  test_alloc+0x29c/0x628
[   36.342341]  test_double_free+0xd4/0x238
[   36.342382]  kunit_try_run_case+0x170/0x3f0
[   36.342421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.342468]  kthread+0x328/0x630
[   36.342506]  ret_from_fork+0x10/0x20
[   36.342547] 
[   36.342571] freed by task 334 on cpu 1 at 36.341457s (0.001110s ago):
[   36.342635]  test_double_free+0x1ac/0x238
[   36.342676]  kunit_try_run_case+0x170/0x3f0
[   36.342715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.342760]  kthread+0x328/0x630
[   36.342797]  ret_from_fork+0x10/0x20
[   36.342848] 
[   36.342894] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   36.342986] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.343021] Hardware name: linux,dummy-virt (DT)
[   36.343055] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   35.925804] ==================================================================
[   35.925936] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   35.925936] 
[   35.926039] Use-after-free read at 0x00000000fbe21db5 (in kfence-#134):
[   35.926094]  test_use_after_free_read+0x114/0x248
[   35.926139]  kunit_try_run_case+0x170/0x3f0
[   35.926189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.926233]  kthread+0x328/0x630
[   35.926271]  ret_from_fork+0x10/0x20
[   35.926310] 
[   35.926336] kfence-#134: 0x00000000fbe21db5-0x00000000a6fc4aad, size=32, cache=kmalloc-32
[   35.926336] 
[   35.926390] allocated by task 326 on cpu 0 at 35.925565s (0.000821s ago):
[   35.926459]  test_alloc+0x29c/0x628
[   35.926497]  test_use_after_free_read+0xd0/0x248
[   35.926538]  kunit_try_run_case+0x170/0x3f0
[   35.926578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.926622]  kthread+0x328/0x630
[   35.926659]  ret_from_fork+0x10/0x20
[   35.926700] 
[   35.926723] freed by task 326 on cpu 0 at 35.925611s (0.001109s ago):
[   35.926785]  test_use_after_free_read+0x1c0/0x248
[   35.926838]  kunit_try_run_case+0x170/0x3f0
[   35.926878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.926920]  kthread+0x328/0x630
[   35.926957]  ret_from_fork+0x10/0x20
[   35.926997] 
[   35.927044] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   35.927131] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.927163] Hardware name: linux,dummy-virt (DT)
[   35.927197] ==================================================================
[   36.029472] ==================================================================
[   36.029573] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   36.029573] 
[   36.029667] Use-after-free read at 0x0000000021596b64 (in kfence-#135):
[   36.029724]  test_use_after_free_read+0x114/0x248
[   36.029771]  kunit_try_run_case+0x170/0x3f0
[   36.029834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.029880]  kthread+0x328/0x630
[   36.029923]  ret_from_fork+0x10/0x20
[   36.029964] 
[   36.029988] kfence-#135: 0x0000000021596b64-0x0000000068348a9d, size=32, cache=test
[   36.029988] 
[   36.030046] allocated by task 328 on cpu 1 at 36.029274s (0.000767s ago):
[   36.030121]  test_alloc+0x230/0x628
[   36.030167]  test_use_after_free_read+0xd0/0x248
[   36.030209]  kunit_try_run_case+0x170/0x3f0
[   36.030251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.030295]  kthread+0x328/0x630
[   36.030334]  ret_from_fork+0x10/0x20
[   36.030373] 
[   36.030398] freed by task 328 on cpu 1 at 36.029339s (0.001055s ago):
[   36.030499]  test_use_after_free_read+0xf0/0x248
[   36.030545]  kunit_try_run_case+0x170/0x3f0
[   36.030589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.030634]  kthread+0x328/0x630
[   36.030673]  ret_from_fork+0x10/0x20
[   36.030714] 
[   36.030762] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   36.030870] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.030904] Hardware name: linux,dummy-virt (DT)
[   36.030941] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   34.678703] ==================================================================
[   34.678800] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   34.678800] 
[   34.678898] Out-of-bounds read at 0x00000000c93ede63 (32B right of kfence-#122):
[   34.679043]  test_out_of_bounds_read+0x1c8/0x3e0
[   34.679139]  kunit_try_run_case+0x170/0x3f0
[   34.679525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.679597]  kthread+0x328/0x630
[   34.679640]  ret_from_fork+0x10/0x20
[   34.679727] 
[   34.679753] kfence-#122: 0x00000000087804b4-0x000000009585f1a3, size=32, cache=test
[   34.679753] 
[   34.679879] allocated by task 320 on cpu 1 at 34.678565s (0.001258s ago):
[   34.679979]  test_alloc+0x230/0x628
[   34.680069]  test_out_of_bounds_read+0x198/0x3e0
[   34.680113]  kunit_try_run_case+0x170/0x3f0
[   34.680440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.680551]  kthread+0x328/0x630
[   34.680595]  ret_from_fork+0x10/0x20
[   34.680689] 
[   34.680754] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   34.680938] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.680987] Hardware name: linux,dummy-virt (DT)
[   34.681332] ==================================================================
[   34.367039] ==================================================================
[   34.367159] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   34.367159] 
[   34.367669] Out-of-bounds read at 0x0000000029514a75 (32B right of kfence-#119):
[   34.367792]  test_out_of_bounds_read+0x1c8/0x3e0
[   34.367910]  kunit_try_run_case+0x170/0x3f0
[   34.367973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.368040]  kthread+0x328/0x630
[   34.368083]  ret_from_fork+0x10/0x20
[   34.368315] 
[   34.368547] kfence-#119: 0x00000000e2b0f1e2-0x00000000945bcb18, size=32, cache=kmalloc-32
[   34.368547] 
[   34.368798] allocated by task 318 on cpu 1 at 34.366307s (0.002418s ago):
[   34.368891]  test_alloc+0x29c/0x628
[   34.369417]  test_out_of_bounds_read+0x198/0x3e0
[   34.369632]  kunit_try_run_case+0x170/0x3f0
[   34.370143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.370260]  kthread+0x328/0x630
[   34.370334]  ret_from_fork+0x10/0x20
[   34.370708] 
[   34.370762] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   34.370926] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.370968] Hardware name: linux,dummy-virt (DT)
[   34.371035] ==================================================================
[   33.744253] ==================================================================
[   33.744376] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   33.744376] 
[   33.744509] Out-of-bounds read at 0x00000000c2b32c4b (1B left of kfence-#113):
[   33.745854]  test_out_of_bounds_read+0x114/0x3e0
[   33.746015]  kunit_try_run_case+0x170/0x3f0
[   33.746071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.746624]  kthread+0x328/0x630
[   33.746761]  ret_from_fork+0x10/0x20
[   33.746924] 
[   33.747012] kfence-#113: 0x00000000249672b8-0x000000008095ed79, size=32, cache=kmalloc-32
[   33.747012] 
[   33.747153] allocated by task 318 on cpu 1 at 33.743024s (0.004106s ago):
[   33.747350]  test_alloc+0x29c/0x628
[   33.747456]  test_out_of_bounds_read+0xdc/0x3e0
[   33.747587]  kunit_try_run_case+0x170/0x3f0
[   33.747644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.747709]  kthread+0x328/0x630
[   33.748049]  ret_from_fork+0x10/0x20
[   33.748214] 
[   33.748431] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.748669] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.748709] Hardware name: linux,dummy-virt (DT)
[   33.748747] ==================================================================
[   34.472441] ==================================================================
[   34.472522] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   34.472522] 
[   34.472742] Out-of-bounds read at 0x00000000a6ddd57d (1B left of kfence-#120):
[   34.472805]  test_out_of_bounds_read+0x114/0x3e0
[   34.472869]  kunit_try_run_case+0x170/0x3f0
[   34.473333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.473513]  kthread+0x328/0x630
[   34.473580]  ret_from_fork+0x10/0x20
[   34.473713] 
[   34.473739] kfence-#120: 0x00000000a64a5998-0x00000000df1515cb, size=32, cache=test
[   34.473739] 
[   34.474161] allocated by task 320 on cpu 1 at 34.472327s (0.001799s ago):
[   34.474698]  test_alloc+0x230/0x628
[   34.475179]  test_out_of_bounds_read+0xdc/0x3e0
[   34.475400]  kunit_try_run_case+0x170/0x3f0
[   34.475643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.475755]  kthread+0x328/0x630
[   34.476138]  ret_from_fork+0x10/0x20
[   34.476458] 
[   34.476789] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   34.477856] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.478407] Hardware name: linux,dummy-virt (DT)
[   34.478505] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_oob_in_memset
[   30.341393] ==================================================================
[   30.341623] BUG: KFENCE: memory corruption in kmalloc_oob_in_memset+0x160/0x2d0
[   30.341623] 
[   30.342013] Corrupted memory at 0x00000000de715e1e [ ! ! ! ! ! ! ! ! . . . . . . . . ] (in kfence-#90):
[   30.345298]  kmalloc_oob_in_memset+0x160/0x2d0
[   30.345505]  kunit_try_run_case+0x170/0x3f0
[   30.345762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.345909]  kthread+0x328/0x630
[   30.345996]  ret_from_fork+0x10/0x20
[   30.346077] 
[   30.346991] kfence-#90: 0x0000000095db6084-0x00000000c9aaf235, size=120, cache=kmalloc-128
[   30.346991] 
[   30.347651] allocated by task 201 on cpu 1 at 30.339432s (0.007826s ago):
[   30.347991]  kmalloc_oob_in_memset+0xb0/0x2d0
[   30.348443]  kunit_try_run_case+0x170/0x3f0
[   30.348528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.348954]  kthread+0x328/0x630
[   30.349000]  ret_from_fork+0x10/0x20
[   30.349655] 
[   30.350038] freed by task 201 on cpu 1 at 30.340122s (0.009709s ago):
[   30.350461]  kmalloc_oob_in_memset+0x160/0x2d0
[   30.350586]  kunit_try_run_case+0x170/0x3f0
[   30.350711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.350858]  kthread+0x328/0x630
[   30.350896]  ret_from_fork+0x10/0x20
[   30.351023] 
[   30.351488] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.351834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.351990] Hardware name: linux,dummy-virt (DT)
[   30.352210] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   33.558895] ==================================================================
[   33.559400] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   33.559503] Write of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.559725] 
[   33.559920] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.560192] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.560267] Hardware name: linux,dummy-virt (DT)
[   33.560324] Call trace:
[   33.560412]  show_stack+0x20/0x38 (C)
[   33.560469]  dump_stack_lvl+0x8c/0xd0
[   33.560904]  print_report+0x118/0x5e8
[   33.561407]  kasan_report+0xdc/0x128
[   33.561589]  kasan_check_range+0x100/0x1a8
[   33.561689]  __kasan_check_write+0x20/0x30
[   33.561745]  strncpy_from_user+0x3c/0x2a0
[   33.561997]  copy_user_test_oob+0x5c0/0xec8
[   33.562310]  kunit_try_run_case+0x170/0x3f0
[   33.562576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.562825]  kthread+0x328/0x630
[   33.562884]  ret_from_fork+0x10/0x20
[   33.563294] 
[   33.563349] Allocated by task 316:
[   33.563397]  kasan_save_stack+0x3c/0x68
[   33.563748]  kasan_save_track+0x20/0x40
[   33.563979]  kasan_save_alloc_info+0x40/0x58
[   33.564050]  __kasan_kmalloc+0xd4/0xd8
[   33.564271]  __kmalloc_noprof+0x198/0x4c8
[   33.564332]  kunit_kmalloc_array+0x34/0x88
[   33.564553]  copy_user_test_oob+0xac/0xec8
[   33.564926]  kunit_try_run_case+0x170/0x3f0
[   33.565173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.565452]  kthread+0x328/0x630
[   33.565826]  ret_from_fork+0x10/0x20
[   33.565977] 
[   33.566087] The buggy address belongs to the object at fff00000c922a400
[   33.566087]  which belongs to the cache kmalloc-128 of size 128
[   33.566485] The buggy address is located 0 bytes inside of
[   33.566485]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.566842] 
[   33.566961] The buggy address belongs to the physical page:
[   33.567238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.567563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.567775] page_type: f5(slab)
[   33.568177] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.568267] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.568653] page dumped because: kasan: bad access detected
[   33.568799] 
[   33.568845] Memory state around the buggy address:
[   33.568908]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.568974]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.569382] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.569482]                                                                 ^
[   33.569527]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.569573]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.569965] ==================================================================
[   33.571545] ==================================================================
[   33.571599] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   33.571658] Write of size 1 at addr fff00000c922a478 by task kunit_try_catch/316
[   33.571719] 
[   33.571752] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.571859] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.571897] Hardware name: linux,dummy-virt (DT)
[   33.571930] Call trace:
[   33.571954]  show_stack+0x20/0x38 (C)
[   33.572006]  dump_stack_lvl+0x8c/0xd0
[   33.572053]  print_report+0x118/0x5e8
[   33.572101]  kasan_report+0xdc/0x128
[   33.572166]  __asan_report_store1_noabort+0x20/0x30
[   33.572219]  strncpy_from_user+0x270/0x2a0
[   33.572266]  copy_user_test_oob+0x5c0/0xec8
[   33.572323]  kunit_try_run_case+0x170/0x3f0
[   33.572372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.572425]  kthread+0x328/0x630
[   33.572477]  ret_from_fork+0x10/0x20
[   33.572528] 
[   33.572548] Allocated by task 316:
[   33.572579]  kasan_save_stack+0x3c/0x68
[   33.572623]  kasan_save_track+0x20/0x40
[   33.572661]  kasan_save_alloc_info+0x40/0x58
[   33.572701]  __kasan_kmalloc+0xd4/0xd8
[   33.572739]  __kmalloc_noprof+0x198/0x4c8
[   33.572780]  kunit_kmalloc_array+0x34/0x88
[   33.573278]  copy_user_test_oob+0xac/0xec8
[   33.573338]  kunit_try_run_case+0x170/0x3f0
[   33.573384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.573431]  kthread+0x328/0x630
[   33.573466]  ret_from_fork+0x10/0x20
[   33.573507] 
[   33.573529] The buggy address belongs to the object at fff00000c922a400
[   33.573529]  which belongs to the cache kmalloc-128 of size 128
[   33.573590] The buggy address is located 0 bytes to the right of
[   33.573590]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.573656] 
[   33.573679] The buggy address belongs to the physical page:
[   33.573715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.573771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.573833] page_type: f5(slab)
[   33.573872] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.573924] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.573963] page dumped because: kasan: bad access detected
[   33.573996] 
[   33.574016] Memory state around the buggy address:
[   33.574049]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.574094]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.574138] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.574180]                                                                 ^
[   33.574221]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.574282]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.574322] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   33.545615] ==================================================================
[   33.545667] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   33.545721] Read of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.545774] 
[   33.546143] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.546379] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.546415] Hardware name: linux,dummy-virt (DT)
[   33.546465] Call trace:
[   33.546492]  show_stack+0x20/0x38 (C)
[   33.547050]  dump_stack_lvl+0x8c/0xd0
[   33.547135]  print_report+0x118/0x5e8
[   33.547182]  kasan_report+0xdc/0x128
[   33.547399]  kasan_check_range+0x100/0x1a8
[   33.547462]  __kasan_check_read+0x20/0x30
[   33.547539]  copy_user_test_oob+0x4a0/0xec8
[   33.547653]  kunit_try_run_case+0x170/0x3f0
[   33.547702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.547753]  kthread+0x328/0x630
[   33.547983]  ret_from_fork+0x10/0x20
[   33.548385] 
[   33.548422] Allocated by task 316:
[   33.548459]  kasan_save_stack+0x3c/0x68
[   33.548615]  kasan_save_track+0x20/0x40
[   33.548667]  kasan_save_alloc_info+0x40/0x58
[   33.548848]  __kasan_kmalloc+0xd4/0xd8
[   33.549420]  __kmalloc_noprof+0x198/0x4c8
[   33.549472]  kunit_kmalloc_array+0x34/0x88
[   33.549698]  copy_user_test_oob+0xac/0xec8
[   33.549989]  kunit_try_run_case+0x170/0x3f0
[   33.550373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.550850]  kthread+0x328/0x630
[   33.551091]  ret_from_fork+0x10/0x20
[   33.551181] 
[   33.551204] The buggy address belongs to the object at fff00000c922a400
[   33.551204]  which belongs to the cache kmalloc-128 of size 128
[   33.551751] The buggy address is located 0 bytes inside of
[   33.551751]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.552093] 
[   33.552138] The buggy address belongs to the physical page:
[   33.552451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.553048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.553242] page_type: f5(slab)
[   33.553724] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.553971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.554200] page dumped because: kasan: bad access detected
[   33.554261] 
[   33.554592] Memory state around the buggy address:
[   33.554743]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.554871]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.555058] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.555143]                                                                 ^
[   33.555390]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.555501]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.555746] ==================================================================
[   33.534741] ==================================================================
[   33.535229] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   33.535312] Write of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.535365] 
[   33.535678] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.535792] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.535893] Hardware name: linux,dummy-virt (DT)
[   33.535951] Call trace:
[   33.535976]  show_stack+0x20/0x38 (C)
[   33.536030]  dump_stack_lvl+0x8c/0xd0
[   33.536382]  print_report+0x118/0x5e8
[   33.536487]  kasan_report+0xdc/0x128
[   33.536541]  kasan_check_range+0x100/0x1a8
[   33.536587]  __kasan_check_write+0x20/0x30
[   33.537049]  copy_user_test_oob+0x434/0xec8
[   33.537198]  kunit_try_run_case+0x170/0x3f0
[   33.537392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.537594]  kthread+0x328/0x630
[   33.537664]  ret_from_fork+0x10/0x20
[   33.537922] 
[   33.538155] Allocated by task 316:
[   33.538251]  kasan_save_stack+0x3c/0x68
[   33.538406]  kasan_save_track+0x20/0x40
[   33.538449]  kasan_save_alloc_info+0x40/0x58
[   33.538673]  __kasan_kmalloc+0xd4/0xd8
[   33.538940]  __kmalloc_noprof+0x198/0x4c8
[   33.539009]  kunit_kmalloc_array+0x34/0x88
[   33.539245]  copy_user_test_oob+0xac/0xec8
[   33.539509]  kunit_try_run_case+0x170/0x3f0
[   33.539704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.539932]  kthread+0x328/0x630
[   33.540182]  ret_from_fork+0x10/0x20
[   33.540260] 
[   33.540503] The buggy address belongs to the object at fff00000c922a400
[   33.540503]  which belongs to the cache kmalloc-128 of size 128
[   33.540776] The buggy address is located 0 bytes inside of
[   33.540776]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.541275] 
[   33.541341] The buggy address belongs to the physical page:
[   33.541400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.541698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.541868] page_type: f5(slab)
[   33.542081] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.542229] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.542381] page dumped because: kasan: bad access detected
[   33.542585] 
[   33.542771] Memory state around the buggy address:
[   33.542853]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.542903]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.543471] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.543560]                                                                 ^
[   33.543846]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.543983]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.544072] ==================================================================
[   33.524992] ==================================================================
[   33.525218] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   33.525417] Read of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.525511] 
[   33.525564] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.525782] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.525945] Hardware name: linux,dummy-virt (DT)
[   33.526008] Call trace:
[   33.526191]  show_stack+0x20/0x38 (C)
[   33.526336]  dump_stack_lvl+0x8c/0xd0
[   33.526747]  print_report+0x118/0x5e8
[   33.526944]  kasan_report+0xdc/0x128
[   33.527022]  kasan_check_range+0x100/0x1a8
[   33.527153]  __kasan_check_read+0x20/0x30
[   33.527259]  copy_user_test_oob+0x3c8/0xec8
[   33.527309]  kunit_try_run_case+0x170/0x3f0
[   33.527853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.528159]  kthread+0x328/0x630
[   33.528267]  ret_from_fork+0x10/0x20
[   33.528439] 
[   33.528501] Allocated by task 316:
[   33.528537]  kasan_save_stack+0x3c/0x68
[   33.528718]  kasan_save_track+0x20/0x40
[   33.529010]  kasan_save_alloc_info+0x40/0x58
[   33.529304]  __kasan_kmalloc+0xd4/0xd8
[   33.529363]  __kmalloc_noprof+0x198/0x4c8
[   33.529994]  kunit_kmalloc_array+0x34/0x88
[   33.530109]  copy_user_test_oob+0xac/0xec8
[   33.530161]  kunit_try_run_case+0x170/0x3f0
[   33.530201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.530467]  kthread+0x328/0x630
[   33.530883]  ret_from_fork+0x10/0x20
[   33.531029] 
[   33.531252] The buggy address belongs to the object at fff00000c922a400
[   33.531252]  which belongs to the cache kmalloc-128 of size 128
[   33.531567] The buggy address is located 0 bytes inside of
[   33.531567]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.531874] 
[   33.531905] The buggy address belongs to the physical page:
[   33.531941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.531998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.532050] page_type: f5(slab)
[   33.532158] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.532227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.532273] page dumped because: kasan: bad access detected
[   33.532304] 
[   33.532324] Memory state around the buggy address:
[   33.532359]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.532412]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.532465] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.532525]                                                                 ^
[   33.532567]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.532627]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.532667] ==================================================================
[   33.474100] ==================================================================
[   33.474204] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   33.474707] Write of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.474809] 
[   33.474949] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.475647] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.475691] Hardware name: linux,dummy-virt (DT)
[   33.475747] Call trace:
[   33.475910]  show_stack+0x20/0x38 (C)
[   33.475997]  dump_stack_lvl+0x8c/0xd0
[   33.476406]  print_report+0x118/0x5e8
[   33.476469]  kasan_report+0xdc/0x128
[   33.476515]  kasan_check_range+0x100/0x1a8
[   33.476738]  __kasan_check_write+0x20/0x30
[   33.476930]  copy_user_test_oob+0x234/0xec8
[   33.477132]  kunit_try_run_case+0x170/0x3f0
[   33.477246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.477387]  kthread+0x328/0x630
[   33.477438]  ret_from_fork+0x10/0x20
[   33.477490] 
[   33.477513] Allocated by task 316:
[   33.477548]  kasan_save_stack+0x3c/0x68
[   33.478036]  kasan_save_track+0x20/0x40
[   33.478122]  kasan_save_alloc_info+0x40/0x58
[   33.478271]  __kasan_kmalloc+0xd4/0xd8
[   33.478353]  __kmalloc_noprof+0x198/0x4c8
[   33.478584]  kunit_kmalloc_array+0x34/0x88
[   33.478737]  copy_user_test_oob+0xac/0xec8
[   33.478883]  kunit_try_run_case+0x170/0x3f0
[   33.479036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.479133]  kthread+0x328/0x630
[   33.479254]  ret_from_fork+0x10/0x20
[   33.479303] 
[   33.479326] The buggy address belongs to the object at fff00000c922a400
[   33.479326]  which belongs to the cache kmalloc-128 of size 128
[   33.479608] The buggy address is located 0 bytes inside of
[   33.479608]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.479770] 
[   33.479868] The buggy address belongs to the physical page:
[   33.480457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.480651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.480952] page_type: f5(slab)
[   33.481041] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.481097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.481141] page dumped because: kasan: bad access detected
[   33.481196] 
[   33.481541] Memory state around the buggy address:
[   33.482098]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.482337]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.482387] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.482528]                                                                 ^
[   33.482845]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.483064]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.483158] ==================================================================
[   33.512330] ==================================================================
[   33.512728] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   33.512806] Write of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.512911] 
[   33.512981] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.513456] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.513557] Hardware name: linux,dummy-virt (DT)
[   33.513899] Call trace:
[   33.513937]  show_stack+0x20/0x38 (C)
[   33.514180]  dump_stack_lvl+0x8c/0xd0
[   33.514291]  print_report+0x118/0x5e8
[   33.514443]  kasan_report+0xdc/0x128
[   33.514869]  kasan_check_range+0x100/0x1a8
[   33.514934]  __kasan_check_write+0x20/0x30
[   33.515101]  copy_user_test_oob+0x35c/0xec8
[   33.515356]  kunit_try_run_case+0x170/0x3f0
[   33.515423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.515678]  kthread+0x328/0x630
[   33.516054]  ret_from_fork+0x10/0x20
[   33.516389] 
[   33.516641] Allocated by task 316:
[   33.516689]  kasan_save_stack+0x3c/0x68
[   33.516905]  kasan_save_track+0x20/0x40
[   33.517116]  kasan_save_alloc_info+0x40/0x58
[   33.517168]  __kasan_kmalloc+0xd4/0xd8
[   33.517206]  __kmalloc_noprof+0x198/0x4c8
[   33.517249]  kunit_kmalloc_array+0x34/0x88
[   33.517551]  copy_user_test_oob+0xac/0xec8
[   33.517789]  kunit_try_run_case+0x170/0x3f0
[   33.517878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.518104]  kthread+0x328/0x630
[   33.518431]  ret_from_fork+0x10/0x20
[   33.518515] 
[   33.518538] The buggy address belongs to the object at fff00000c922a400
[   33.518538]  which belongs to the cache kmalloc-128 of size 128
[   33.518787] The buggy address is located 0 bytes inside of
[   33.518787]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.519159] 
[   33.519413] The buggy address belongs to the physical page:
[   33.519792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.520062] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.520260] page_type: f5(slab)
[   33.520654] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.520963] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.521155] page dumped because: kasan: bad access detected
[   33.521391] 
[   33.521623] Memory state around the buggy address:
[   33.521692]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.521748]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.522028] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.522262]                                                                 ^
[   33.522545]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.522632]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.522725] ==================================================================
[   33.490289] ==================================================================
[   33.490353] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   33.490876] Read of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.490982] 
[   33.491385] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.491774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.491889] Hardware name: linux,dummy-virt (DT)
[   33.491955] Call trace:
[   33.491983]  show_stack+0x20/0x38 (C)
[   33.492077]  dump_stack_lvl+0x8c/0xd0
[   33.492498]  print_report+0x118/0x5e8
[   33.492910]  kasan_report+0xdc/0x128
[   33.493007]  kasan_check_range+0x100/0x1a8
[   33.493075]  __kasan_check_read+0x20/0x30
[   33.493254]  copy_user_test_oob+0x728/0xec8
[   33.493435]  kunit_try_run_case+0x170/0x3f0
[   33.493779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.493919]  kthread+0x328/0x630
[   33.494114]  ret_from_fork+0x10/0x20
[   33.494610] 
[   33.494880] Allocated by task 316:
[   33.494965]  kasan_save_stack+0x3c/0x68
[   33.495013]  kasan_save_track+0x20/0x40
[   33.495252]  kasan_save_alloc_info+0x40/0x58
[   33.495441]  __kasan_kmalloc+0xd4/0xd8
[   33.495606]  __kmalloc_noprof+0x198/0x4c8
[   33.495939]  kunit_kmalloc_array+0x34/0x88
[   33.496350]  copy_user_test_oob+0xac/0xec8
[   33.496567]  kunit_try_run_case+0x170/0x3f0
[   33.496826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.497030]  kthread+0x328/0x630
[   33.497138]  ret_from_fork+0x10/0x20
[   33.497327] 
[   33.497575] The buggy address belongs to the object at fff00000c922a400
[   33.497575]  which belongs to the cache kmalloc-128 of size 128
[   33.497784] The buggy address is located 0 bytes inside of
[   33.497784]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.498061] 
[   33.498128] The buggy address belongs to the physical page:
[   33.498201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.498296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.498403] page_type: f5(slab)
[   33.498491] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.498699] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.499118] page dumped because: kasan: bad access detected
[   33.499217] 
[   33.499288] Memory state around the buggy address:
[   33.499426]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.499575]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.499649] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.499690]                                                                 ^
[   33.499769]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.499970]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.500176] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   33.427114] ==================================================================
[   33.427202] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   33.427343] Write of size 8 at addr fff00000c922a378 by task kunit_try_catch/312
[   33.427417] 
[   33.427454] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.427801] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.427862] Hardware name: linux,dummy-virt (DT)
[   33.427985] Call trace:
[   33.428043]  show_stack+0x20/0x38 (C)
[   33.428127]  dump_stack_lvl+0x8c/0xd0
[   33.428239]  print_report+0x118/0x5e8
[   33.428315]  kasan_report+0xdc/0x128
[   33.428381]  kasan_check_range+0x100/0x1a8
[   33.428481]  __kasan_check_write+0x20/0x30
[   33.428546]  copy_to_kernel_nofault+0x8c/0x250
[   33.428627]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   33.428681]  kunit_try_run_case+0x170/0x3f0
[   33.428885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.429184]  kthread+0x328/0x630
[   33.429341]  ret_from_fork+0x10/0x20
[   33.429681] 
[   33.429727] Allocated by task 312:
[   33.429763]  kasan_save_stack+0x3c/0x68
[   33.430027]  kasan_save_track+0x20/0x40
[   33.430292]  kasan_save_alloc_info+0x40/0x58
[   33.430484]  __kasan_kmalloc+0xd4/0xd8
[   33.430531]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.431076]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.431236]  kunit_try_run_case+0x170/0x3f0
[   33.431459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.431553]  kthread+0x328/0x630
[   33.432006]  ret_from_fork+0x10/0x20
[   33.432089] 
[   33.432375] The buggy address belongs to the object at fff00000c922a300
[   33.432375]  which belongs to the cache kmalloc-128 of size 128
[   33.432625] The buggy address is located 0 bytes to the right of
[   33.432625]  allocated 120-byte region [fff00000c922a300, fff00000c922a378)
[   33.432987] 
[   33.433394] The buggy address belongs to the physical page:
[   33.433623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.434010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.434108] page_type: f5(slab)
[   33.434206] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.434289] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.434543] page dumped because: kasan: bad access detected
[   33.434698] 
[   33.434974] Memory state around the buggy address:
[   33.435136]  fff00000c922a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.435506]  fff00000c922a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.435751] >fff00000c922a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.435986]                                                                 ^
[   33.436267]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.436693]  fff00000c922a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.437014] ==================================================================
[   33.420322] ==================================================================
[   33.420396] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   33.420555] Read of size 8 at addr fff00000c922a378 by task kunit_try_catch/312
[   33.420615] 
[   33.420680] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.420981] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.421248] Hardware name: linux,dummy-virt (DT)
[   33.421289] Call trace:
[   33.421376]  show_stack+0x20/0x38 (C)
[   33.421435]  dump_stack_lvl+0x8c/0xd0
[   33.421487]  print_report+0x118/0x5e8
[   33.421533]  kasan_report+0xdc/0x128
[   33.421579]  __asan_report_load8_noabort+0x20/0x30
[   33.421631]  copy_to_kernel_nofault+0x204/0x250
[   33.421682]  copy_to_kernel_nofault_oob+0x158/0x418
[   33.421734]  kunit_try_run_case+0x170/0x3f0
[   33.421794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.421859]  kthread+0x328/0x630
[   33.421903]  ret_from_fork+0x10/0x20
[   33.421952] 
[   33.421984] Allocated by task 312:
[   33.422021]  kasan_save_stack+0x3c/0x68
[   33.422077]  kasan_save_track+0x20/0x40
[   33.422130]  kasan_save_alloc_info+0x40/0x58
[   33.422176]  __kasan_kmalloc+0xd4/0xd8
[   33.422214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.422257]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.422301]  kunit_try_run_case+0x170/0x3f0
[   33.422339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.422386]  kthread+0x328/0x630
[   33.422425]  ret_from_fork+0x10/0x20
[   33.422464] 
[   33.422501] The buggy address belongs to the object at fff00000c922a300
[   33.422501]  which belongs to the cache kmalloc-128 of size 128
[   33.422562] The buggy address is located 0 bytes to the right of
[   33.422562]  allocated 120-byte region [fff00000c922a300, fff00000c922a378)
[   33.422628] 
[   33.422660] The buggy address belongs to the physical page:
[   33.422708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.422766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.422854] page_type: f5(slab)
[   33.423654] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.423765] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.423853] page dumped because: kasan: bad access detected
[   33.423965] 
[   33.424036] Memory state around the buggy address:
[   33.424132]  fff00000c922a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.424313]  fff00000c922a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.424485] >fff00000c922a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.424791]                                                                 ^
[   33.425098]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.425169]  fff00000c922a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.425212] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   33.372870] ==================================================================
[   33.372941] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   33.373149] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300
[   33.373477] 
[   33.373587] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.373730] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.373843] Hardware name: linux,dummy-virt (DT)
[   33.373914] Call trace:
[   33.373940]  show_stack+0x20/0x38 (C)
[   33.374190]  dump_stack_lvl+0x8c/0xd0
[   33.374304]  print_report+0x310/0x5e8
[   33.374408]  kasan_report+0xdc/0x128
[   33.374494]  __asan_report_load1_noabort+0x20/0x30
[   33.374598]  vmalloc_oob+0x578/0x5d0
[   33.374689]  kunit_try_run_case+0x170/0x3f0
[   33.374740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.374995]  kthread+0x328/0x630
[   33.375120]  ret_from_fork+0x10/0x20
[   33.375205] 
[   33.375249] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0
[   33.375626] The buggy address belongs to the physical page:
[   33.375703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1095ea
[   33.375838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.375991] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.376054] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.376098] page dumped because: kasan: bad access detected
[   33.376273] 
[   33.376413] Memory state around the buggy address:
[   33.376503]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.376576]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.376966] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.377065]                                                              ^
[   33.377157]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.377257]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.377347] ==================================================================
[   33.377985] ==================================================================
[   33.378035] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   33.378087] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300
[   33.378138] 
[   33.378175] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.378265] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.378305] Hardware name: linux,dummy-virt (DT)
[   33.378338] Call trace:
[   33.378361]  show_stack+0x20/0x38 (C)
[   33.378426]  dump_stack_lvl+0x8c/0xd0
[   33.378473]  print_report+0x310/0x5e8
[   33.378519]  kasan_report+0xdc/0x128
[   33.378562]  __asan_report_load1_noabort+0x20/0x30
[   33.378612]  vmalloc_oob+0x51c/0x5d0
[   33.378659]  kunit_try_run_case+0x170/0x3f0
[   33.378706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.378759]  kthread+0x328/0x630
[   33.378810]  ret_from_fork+0x10/0x20
[   33.378882] 
[   33.378912] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0
[   33.379000] The buggy address belongs to the physical page:
[   33.379043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1095ea
[   33.379100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.379161] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.379213] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.379255] page dumped because: kasan: bad access detected
[   33.379287] 
[   33.379316] Memory state around the buggy address:
[   33.379350]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.379395]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.379440] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.379480]                                                                 ^
[   33.379522]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.379566]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.379606] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.134047] ==================================================================
[   33.134436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.134524] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.134578] 
[   33.134844] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.134955] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.134988] Hardware name: linux,dummy-virt (DT)
[   33.135176] Call trace:
[   33.135211]  show_stack+0x20/0x38 (C)
[   33.135269]  dump_stack_lvl+0x8c/0xd0
[   33.135320]  print_report+0x118/0x5e8
[   33.135367]  kasan_report+0xdc/0x128
[   33.135413]  __asan_report_store8_noabort+0x20/0x30
[   33.135466]  kasan_atomics_helper+0x3e5c/0x4858
[   33.135518]  kasan_atomics+0x198/0x2e0
[   33.136371]  kunit_try_run_case+0x170/0x3f0
[   33.136694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.136774]  kthread+0x328/0x630
[   33.136836]  ret_from_fork+0x10/0x20
[   33.136887] 
[   33.136994] Allocated by task 296:
[   33.137041]  kasan_save_stack+0x3c/0x68
[   33.137089]  kasan_save_track+0x20/0x40
[   33.137128]  kasan_save_alloc_info+0x40/0x58
[   33.137532]  __kasan_kmalloc+0xd4/0xd8
[   33.137890]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.137963]  kasan_atomics+0xb8/0x2e0
[   33.138324]  kunit_try_run_case+0x170/0x3f0
[   33.138722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.138839]  kthread+0x328/0x630
[   33.138937]  ret_from_fork+0x10/0x20
[   33.139045] 
[   33.139454] The buggy address belongs to the object at fff00000c9225780
[   33.139454]  which belongs to the cache kmalloc-64 of size 64
[   33.139558] The buggy address is located 0 bytes to the right of
[   33.139558]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.139706] 
[   33.139778] The buggy address belongs to the physical page:
[   33.139869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.140124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.140273] page_type: f5(slab)
[   33.140618] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.141088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.141160] page dumped because: kasan: bad access detected
[   33.141372] 
[   33.141491] Memory state around the buggy address:
[   33.141573]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.141652]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.141707] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.141746]                                      ^
[   33.142098]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.142262]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.142356] ==================================================================
[   33.014526] ==================================================================
[   33.014699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.014762] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.014879] 
[   33.014916] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.015040] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.015073] Hardware name: linux,dummy-virt (DT)
[   33.015383] Call trace:
[   33.015426]  show_stack+0x20/0x38 (C)
[   33.015541]  dump_stack_lvl+0x8c/0xd0
[   33.015593]  print_report+0x118/0x5e8
[   33.015639]  kasan_report+0xdc/0x128
[   33.015753]  __asan_report_load4_noabort+0x20/0x30
[   33.016027]  kasan_atomics_helper+0x3dcc/0x4858
[   33.016102]  kasan_atomics+0x198/0x2e0
[   33.016155]  kunit_try_run_case+0x170/0x3f0
[   33.016207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.016260]  kthread+0x328/0x630
[   33.017017]  kasan_save_track+0x20/0x40
[   33.017575]  kasan_atomics+0xb8/0x2e0
[   33.017690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.018703] 
[   33.020438] page_type: f5(slab)
[   33.021285] page dumped because: kasan: bad access detected
[   33.021358] 
[   33.021479] Memory state around the buggy address:
[   33.021622]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.022454] ==================================================================
[   33.347547] ==================================================================
[   33.347593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   33.347664] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.347715] 
[   33.347745] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.347846] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.347875] Hardware name: linux,dummy-virt (DT)
[   33.347906] Call trace:
[   33.347931]  show_stack+0x20/0x38 (C)
[   33.347979]  dump_stack_lvl+0x8c/0xd0
[   33.348062]  print_report+0x118/0x5e8
[   33.348109]  kasan_report+0xdc/0x128
[   33.348155]  __asan_report_load8_noabort+0x20/0x30
[   33.348206]  kasan_atomics_helper+0x3e20/0x4858
[   33.348657]  kasan_atomics+0x198/0x2e0
[   33.348765]  kunit_try_run_case+0x170/0x3f0
[   33.348949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.349064]  kthread+0x328/0x630
[   33.349112]  ret_from_fork+0x10/0x20
[   33.349212] 
[   33.349283] Allocated by task 296:
[   33.349431]  kasan_save_stack+0x3c/0x68
[   33.349882]  kasan_save_track+0x20/0x40
[   33.349954]  kasan_save_alloc_info+0x40/0x58
[   33.350070]  __kasan_kmalloc+0xd4/0xd8
[   33.350139]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.350200]  kasan_atomics+0xb8/0x2e0
[   33.350240]  kunit_try_run_case+0x170/0x3f0
[   33.350280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.350324]  kthread+0x328/0x630
[   33.350473]  ret_from_fork+0x10/0x20
[   33.350518] 
[   33.350539] The buggy address belongs to the object at fff00000c9225780
[   33.350539]  which belongs to the cache kmalloc-64 of size 64
[   33.350701] The buggy address is located 0 bytes to the right of
[   33.350701]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.350886] 
[   33.350969] The buggy address belongs to the physical page:
[   33.351016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.351113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.351472] page_type: f5(slab)
[   33.351538] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.351642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.351846] page dumped because: kasan: bad access detected
[   33.351878] 
[   33.351899] Memory state around the buggy address:
[   33.351931]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.351977]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.352021] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.352061]                                      ^
[   33.352246]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.352403]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.352505] ==================================================================
[   33.178914] ==================================================================
[   33.178970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.179033] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.179086] 
[   33.179117] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.179209] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.179252] Hardware name: linux,dummy-virt (DT)
[   33.179286] Call trace:
[   33.179320]  show_stack+0x20/0x38 (C)
[   33.179372]  dump_stack_lvl+0x8c/0xd0
[   33.179430]  print_report+0x118/0x5e8
[   33.179477]  kasan_report+0xdc/0x128
[   33.179529]  kasan_check_range+0x100/0x1a8
[   33.179577]  __kasan_check_write+0x20/0x30
[   33.179625]  kasan_atomics_helper+0x1058/0x4858
[   33.179676]  kasan_atomics+0x198/0x2e0
[   33.179725]  kunit_try_run_case+0x170/0x3f0
[   33.179772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.179859]  kthread+0x328/0x630
[   33.180357]  ret_from_fork+0x10/0x20
[   33.180825] 
[   33.180875] Allocated by task 296:
[   33.180933]  kasan_save_stack+0x3c/0x68
[   33.181002]  kasan_save_track+0x20/0x40
[   33.181067]  kasan_save_alloc_info+0x40/0x58
[   33.181133]  __kasan_kmalloc+0xd4/0xd8
[   33.181448]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.181505]  kasan_atomics+0xb8/0x2e0
[   33.181546]  kunit_try_run_case+0x170/0x3f0
[   33.181585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.181978]  kthread+0x328/0x630
[   33.182054]  ret_from_fork+0x10/0x20
[   33.182284] 
[   33.182365] The buggy address belongs to the object at fff00000c9225780
[   33.182365]  which belongs to the cache kmalloc-64 of size 64
[   33.182662] The buggy address is located 0 bytes to the right of
[   33.182662]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.182923] 
[   33.182992] The buggy address belongs to the physical page:
[   33.183295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.183542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.183711] page_type: f5(slab)
[   33.183860] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.183961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.184029] page dumped because: kasan: bad access detected
[   33.184138] 
[   33.184160] Memory state around the buggy address:
[   33.184302]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.184543]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.184875] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.184964]                                      ^
[   33.185081]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.185213]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.185290] ==================================================================
[   33.236213] ==================================================================
[   33.236398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   33.236500] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.236826] 
[   33.236878] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.236975] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.237044] Hardware name: linux,dummy-virt (DT)
[   33.237091] Call trace:
[   33.237124]  show_stack+0x20/0x38 (C)
[   33.237188]  dump_stack_lvl+0x8c/0xd0
[   33.237237]  print_report+0x118/0x5e8
[   33.237289]  kasan_report+0xdc/0x128
[   33.237335]  kasan_check_range+0x100/0x1a8
[   33.237396]  __kasan_check_write+0x20/0x30
[   33.237454]  kasan_atomics_helper+0x12d8/0x4858
[   33.237514]  kasan_atomics+0x198/0x2e0
[   33.237562]  kunit_try_run_case+0x170/0x3f0
[   33.237611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.237672]  kthread+0x328/0x630
[   33.237723]  ret_from_fork+0x10/0x20
[   33.237772] 
[   33.237794] Allocated by task 296:
[   33.237986]  kasan_save_stack+0x3c/0x68
[   33.238572]  kasan_save_track+0x20/0x40
[   33.238634]  kasan_save_alloc_info+0x40/0x58
[   33.238677]  __kasan_kmalloc+0xd4/0xd8
[   33.238715]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.238840]  kasan_atomics+0xb8/0x2e0
[   33.238926]  kunit_try_run_case+0x170/0x3f0
[   33.239343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.239589]  kthread+0x328/0x630
[   33.239638]  ret_from_fork+0x10/0x20
[   33.239959] 
[   33.240235] The buggy address belongs to the object at fff00000c9225780
[   33.240235]  which belongs to the cache kmalloc-64 of size 64
[   33.240380] The buggy address is located 0 bytes to the right of
[   33.240380]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.240629] 
[   33.240665] The buggy address belongs to the physical page:
[   33.240848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.240941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.241381] page_type: f5(slab)
[   33.241561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.241839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.241930] page dumped because: kasan: bad access detected
[   33.241964] 
[   33.242435] Memory state around the buggy address:
[   33.242570]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.242757]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.242994] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.243186]                                      ^
[   33.243409]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.243526]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.243669] ==================================================================
[   33.283489] ==================================================================
[   33.283550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   33.283911] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.284161] 
[   33.284225] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.284470] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.284514] Hardware name: linux,dummy-virt (DT)
[   33.284584] Call trace:
[   33.284611]  show_stack+0x20/0x38 (C)
[   33.284757]  dump_stack_lvl+0x8c/0xd0
[   33.284811]  print_report+0x118/0x5e8
[   33.284997]  kasan_report+0xdc/0x128
[   33.285148]  kasan_check_range+0x100/0x1a8
[   33.285215]  __kasan_check_write+0x20/0x30
[   33.285714]  kasan_atomics_helper+0x14e4/0x4858
[   33.286167]  kasan_atomics+0x198/0x2e0
[   33.286232]  kunit_try_run_case+0x170/0x3f0
[   33.286378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.286768]  kthread+0x328/0x630
[   33.286998]  ret_from_fork+0x10/0x20
[   33.287057] 
[   33.287080] Allocated by task 296:
[   33.287396]  kasan_save_stack+0x3c/0x68
[   33.287714]  kasan_save_track+0x20/0x40
[   33.288000]  kasan_save_alloc_info+0x40/0x58
[   33.288316]  __kasan_kmalloc+0xd4/0xd8
[   33.289168]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.289433]  kasan_atomics+0xb8/0x2e0
[   33.289904]  kunit_try_run_case+0x170/0x3f0
[   33.290001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.290637]  kthread+0x328/0x630
[   33.291022]  ret_from_fork+0x10/0x20
[   33.291168] 
[   33.291197] The buggy address belongs to the object at fff00000c9225780
[   33.291197]  which belongs to the cache kmalloc-64 of size 64
[   33.291395] The buggy address is located 0 bytes to the right of
[   33.291395]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.291623] 
[   33.291664] The buggy address belongs to the physical page:
[   33.292126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.292348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.292446] page_type: f5(slab)
[   33.292897] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.293002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.293046] page dumped because: kasan: bad access detected
[   33.293505] 
[   33.293708] Memory state around the buggy address:
[   33.293870]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.294106]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.294329] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.294647]                                      ^
[   33.295144]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.295225]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.295285] ==================================================================
[   32.855544] ==================================================================
[   32.855624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   32.855937] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.856827]  kasan_report+0xdc/0x128
[   32.857327]  kunit_try_run_case+0x170/0x3f0
[   32.857826]  ret_from_fork+0x10/0x20
[   32.858372]  __kasan_kmalloc+0xd4/0xd8
[   32.858572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.858794] The buggy address is located 0 bytes to the right of
[   32.858794]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.859981] ==================================================================
[   33.089974] ==================================================================
[   33.090026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.090093] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.090154] 
[   33.090191] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.090281] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.090323] Hardware name: linux,dummy-virt (DT)
[   33.090365] Call trace:
[   33.090390]  show_stack+0x20/0x38 (C)
[   33.090441]  dump_stack_lvl+0x8c/0xd0
[   33.090498]  print_report+0x118/0x5e8
[   33.090545]  kasan_report+0xdc/0x128
[   33.090591]  __asan_report_load4_noabort+0x20/0x30
[   33.090642]  kasan_atomics_helper+0x3e04/0x4858
[   33.090694]  kasan_atomics+0x198/0x2e0
[   33.090743]  kunit_try_run_case+0x170/0x3f0
[   33.090790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.091268]  kthread+0x328/0x630
[   33.091321]  ret_from_fork+0x10/0x20
[   33.091689] 
[   33.091742] Allocated by task 296:
[   33.091787]  kasan_save_stack+0x3c/0x68
[   33.091846]  kasan_save_track+0x20/0x40
[   33.091883]  kasan_save_alloc_info+0x40/0x58
[   33.092282]  __kasan_kmalloc+0xd4/0xd8
[   33.092343]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.092387]  kasan_atomics+0xb8/0x2e0
[   33.092670]  kunit_try_run_case+0x170/0x3f0
[   33.092722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.093091]  kthread+0x328/0x630
[   33.093262]  ret_from_fork+0x10/0x20
[   33.093337] 
[   33.093476] The buggy address belongs to the object at fff00000c9225780
[   33.093476]  which belongs to the cache kmalloc-64 of size 64
[   33.093593] The buggy address is located 0 bytes to the right of
[   33.093593]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.093711] 
[   33.093733] The buggy address belongs to the physical page:
[   33.093769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.093835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.093884] page_type: f5(slab)
[   33.094484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.094736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.094808] page dumped because: kasan: bad access detected
[   33.095021] 
[   33.095061] Memory state around the buggy address:
[   33.095097]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.095394]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.095588] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.095790]                                      ^
[   33.096055]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.096244]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.096344] ==================================================================
[   33.307550] ==================================================================
[   33.307602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   33.307655] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.307707] 
[   33.307740] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.307846] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.307878] Hardware name: linux,dummy-virt (DT)
[   33.307910] Call trace:
[   33.307947]  show_stack+0x20/0x38 (C)
[   33.308009]  dump_stack_lvl+0x8c/0xd0
[   33.308063]  print_report+0x118/0x5e8
[   33.308111]  kasan_report+0xdc/0x128
[   33.308161]  kasan_check_range+0x100/0x1a8
[   33.308209]  __kasan_check_write+0x20/0x30
[   33.308263]  kasan_atomics_helper+0x15b4/0x4858
[   33.308329]  kasan_atomics+0x198/0x2e0
[   33.308378]  kunit_try_run_case+0x170/0x3f0
[   33.308429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.308485]  kthread+0x328/0x630
[   33.308529]  ret_from_fork+0x10/0x20
[   33.308578] 
[   33.308600] Allocated by task 296:
[   33.308640]  kasan_save_stack+0x3c/0x68
[   33.308693]  kasan_save_track+0x20/0x40
[   33.308732]  kasan_save_alloc_info+0x40/0x58
[   33.308773]  __kasan_kmalloc+0xd4/0xd8
[   33.308810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.308862]  kasan_atomics+0xb8/0x2e0
[   33.308902]  kunit_try_run_case+0x170/0x3f0
[   33.308941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.309035]  kthread+0x328/0x630
[   33.309322]  ret_from_fork+0x10/0x20
[   33.309367] 
[   33.309390] The buggy address belongs to the object at fff00000c9225780
[   33.309390]  which belongs to the cache kmalloc-64 of size 64
[   33.309448] The buggy address is located 0 bytes to the right of
[   33.309448]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.309510] 
[   33.309533] The buggy address belongs to the physical page:
[   33.309567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.309622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.310105] page_type: f5(slab)
[   33.310165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.310447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.310575] page dumped because: kasan: bad access detected
[   33.310676] 
[   33.310735] Memory state around the buggy address:
[   33.310891]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.311030]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.311119] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.311184]                                      ^
[   33.311237]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.311301]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.311340] ==================================================================
[   33.170737] ==================================================================
[   33.170789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.170861] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.170910] 
[   33.170940] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.171033] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.171066] Hardware name: linux,dummy-virt (DT)
[   33.171098] Call trace:
[   33.171122]  show_stack+0x20/0x38 (C)
[   33.171172]  dump_stack_lvl+0x8c/0xd0
[   33.171218]  print_report+0x118/0x5e8
[   33.171843]  kasan_report+0xdc/0x128
[   33.171916]  kasan_check_range+0x100/0x1a8
[   33.171967]  __kasan_check_write+0x20/0x30
[   33.172371]  kasan_atomics_helper+0xff0/0x4858
[   33.172770]  kasan_atomics+0x198/0x2e0
[   33.172846]  kunit_try_run_case+0x170/0x3f0
[   33.173182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.173275]  kthread+0x328/0x630
[   33.173489]  ret_from_fork+0x10/0x20
[   33.173981] 
[   33.174049] Allocated by task 296:
[   33.174316]  kasan_save_stack+0x3c/0x68
[   33.174505]  kasan_save_track+0x20/0x40
[   33.174575]  kasan_save_alloc_info+0x40/0x58
[   33.174630]  __kasan_kmalloc+0xd4/0xd8
[   33.174666]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.175027]  kasan_atomics+0xb8/0x2e0
[   33.175140]  kunit_try_run_case+0x170/0x3f0
[   33.175569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.175627]  kthread+0x328/0x630
[   33.175982]  ret_from_fork+0x10/0x20
[   33.176228] 
[   33.176430] The buggy address belongs to the object at fff00000c9225780
[   33.176430]  which belongs to the cache kmalloc-64 of size 64
[   33.176565] The buggy address is located 0 bytes to the right of
[   33.176565]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.176706] 
[   33.176774] The buggy address belongs to the physical page:
[   33.177170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.177262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.177418] page_type: f5(slab)
[   33.177524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.177584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.177627] page dumped because: kasan: bad access detected
[   33.177661] 
[   33.177682] Memory state around the buggy address:
[   33.177943]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.178176]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.178227] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.178278]                                      ^
[   33.178322]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.178375]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.178418] ==================================================================
[   33.152708] ==================================================================
[   33.152840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.152986] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.153131] 
[   33.153209] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.153387] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.153425] Hardware name: linux,dummy-virt (DT)
[   33.153458] Call trace:
[   33.153691]  show_stack+0x20/0x38 (C)
[   33.154129]  dump_stack_lvl+0x8c/0xd0
[   33.154304]  print_report+0x118/0x5e8
[   33.154356]  kasan_report+0xdc/0x128
[   33.154590]  kasan_check_range+0x100/0x1a8
[   33.154845]  __kasan_check_write+0x20/0x30
[   33.155064]  kasan_atomics_helper+0xf20/0x4858
[   33.155265]  kasan_atomics+0x198/0x2e0
[   33.155349]  kunit_try_run_case+0x170/0x3f0
[   33.155551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.155784]  kthread+0x328/0x630
[   33.155851]  ret_from_fork+0x10/0x20
[   33.156153] 
[   33.156474] Allocated by task 296:
[   33.156657]  kasan_save_stack+0x3c/0x68
[   33.156722]  kasan_save_track+0x20/0x40
[   33.157065]  kasan_save_alloc_info+0x40/0x58
[   33.157297]  __kasan_kmalloc+0xd4/0xd8
[   33.157430]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.157605]  kasan_atomics+0xb8/0x2e0
[   33.157706]  kunit_try_run_case+0x170/0x3f0
[   33.157746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.157975]  kthread+0x328/0x630
[   33.158528]  ret_from_fork+0x10/0x20
[   33.158648] 
[   33.158722] The buggy address belongs to the object at fff00000c9225780
[   33.158722]  which belongs to the cache kmalloc-64 of size 64
[   33.158831] The buggy address is located 0 bytes to the right of
[   33.158831]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.158927] 
[   33.158970] The buggy address belongs to the physical page:
[   33.159008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.159074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.159132] page_type: f5(slab)
[   33.159175] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.159227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.159269] page dumped because: kasan: bad access detected
[   33.159317] 
[   33.159337] Memory state around the buggy address:
[   33.159371]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.159415]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.159474] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.159513]                                      ^
[   33.159557]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.159610]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.159649] ==================================================================
[   33.343396] ==================================================================
[   33.343557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   33.343660] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.343742] 
[   33.343797] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.343938] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.343969] Hardware name: linux,dummy-virt (DT)
[   33.344065] Call trace:
[   33.344091]  show_stack+0x20/0x38 (C)
[   33.344139]  dump_stack_lvl+0x8c/0xd0
[   33.344186]  print_report+0x118/0x5e8
[   33.344250]  kasan_report+0xdc/0x128
[   33.344528]  kasan_check_range+0x100/0x1a8
[   33.344674]  __kasan_check_write+0x20/0x30
[   33.344879]  kasan_atomics_helper+0x175c/0x4858
[   33.345079]  kasan_atomics+0x198/0x2e0
[   33.345149]  kunit_try_run_case+0x170/0x3f0
[   33.345199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.345408]  kthread+0x328/0x630
[   33.345455]  ret_from_fork+0x10/0x20
[   33.345771] 
[   33.345844] Allocated by task 296:
[   33.345995]  kasan_save_stack+0x3c/0x68
[   33.346075]  kasan_save_track+0x20/0x40
[   33.346145]  kasan_save_alloc_info+0x40/0x58
[   33.346205]  __kasan_kmalloc+0xd4/0xd8
[   33.346246]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.346291]  kasan_atomics+0xb8/0x2e0
[   33.346331]  kunit_try_run_case+0x170/0x3f0
[   33.346381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.346427]  kthread+0x328/0x630
[   33.346466]  ret_from_fork+0x10/0x20
[   33.346505] 
[   33.346536] The buggy address belongs to the object at fff00000c9225780
[   33.346536]  which belongs to the cache kmalloc-64 of size 64
[   33.346596] The buggy address is located 0 bytes to the right of
[   33.346596]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.346658] 
[   33.346679] The buggy address belongs to the physical page:
[   33.346718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.346774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.346843] page_type: f5(slab)
[   33.346882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.346935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.346983] page dumped because: kasan: bad access detected
[   33.347016] 
[   33.347035] Memory state around the buggy address:
[   33.347069]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.347124]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.347174] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.347219]                                      ^
[   33.347261]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.347306]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.347345] ==================================================================
[   33.318256] ==================================================================
[   33.318372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   33.318439] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.318491] 
[   33.318523] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.318613] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.318807] Hardware name: linux,dummy-virt (DT)
[   33.318857] Call trace:
[   33.319032]  show_stack+0x20/0x38 (C)
[   33.319093]  dump_stack_lvl+0x8c/0xd0
[   33.319164]  print_report+0x118/0x5e8
[   33.319513]  kasan_report+0xdc/0x128
[   33.319584]  kasan_check_range+0x100/0x1a8
[   33.319636]  __kasan_check_write+0x20/0x30
[   33.319703]  kasan_atomics_helper+0x1644/0x4858
[   33.319755]  kasan_atomics+0x198/0x2e0
[   33.319801]  kunit_try_run_case+0x170/0x3f0
[   33.319883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.319954]  kthread+0x328/0x630
[   33.320000]  ret_from_fork+0x10/0x20
[   33.320050] 
[   33.320214] Allocated by task 296:
[   33.320249]  kasan_save_stack+0x3c/0x68
[   33.320480]  kasan_save_track+0x20/0x40
[   33.320533]  kasan_save_alloc_info+0x40/0x58
[   33.320623]  __kasan_kmalloc+0xd4/0xd8
[   33.320891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.321035]  kasan_atomics+0xb8/0x2e0
[   33.321144]  kunit_try_run_case+0x170/0x3f0
[   33.321205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.321282]  kthread+0x328/0x630
[   33.321319]  ret_from_fork+0x10/0x20
[   33.321522] 
[   33.321685] The buggy address belongs to the object at fff00000c9225780
[   33.321685]  which belongs to the cache kmalloc-64 of size 64
[   33.321783] The buggy address is located 0 bytes to the right of
[   33.321783]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.321909] 
[   33.322100] The buggy address belongs to the physical page:
[   33.322338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.322463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.322513] page_type: f5(slab)
[   33.322596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.322850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.323029] page dumped because: kasan: bad access detected
[   33.323280] 
[   33.323399] Memory state around the buggy address:
[   33.323535]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.323600]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.323662] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.324015]                                      ^
[   33.324061]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.324230]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.324446] ==================================================================
[   33.324948] ==================================================================
[   33.325029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   33.325121] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.325208] 
[   33.325251] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.325340] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.325372] Hardware name: linux,dummy-virt (DT)
[   33.325406] Call trace:
[   33.325445]  show_stack+0x20/0x38 (C)
[   33.325498]  dump_stack_lvl+0x8c/0xd0
[   33.325555]  print_report+0x118/0x5e8
[   33.325611]  kasan_report+0xdc/0x128
[   33.325657]  __asan_report_load8_noabort+0x20/0x30
[   33.325709]  kasan_atomics_helper+0x3df4/0x4858
[   33.325761]  kasan_atomics+0x198/0x2e0
[   33.325833]  kunit_try_run_case+0x170/0x3f0
[   33.325883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.325946]  kthread+0x328/0x630
[   33.326006]  ret_from_fork+0x10/0x20
[   33.326075] 
[   33.326123] Allocated by task 296:
[   33.326165]  kasan_save_stack+0x3c/0x68
[   33.326224]  kasan_save_track+0x20/0x40
[   33.326261]  kasan_save_alloc_info+0x40/0x58
[   33.326302]  __kasan_kmalloc+0xd4/0xd8
[   33.326339]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.326382]  kasan_atomics+0xb8/0x2e0
[   33.326437]  kunit_try_run_case+0x170/0x3f0
[   33.326476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.326520]  kthread+0x328/0x630
[   33.326575]  ret_from_fork+0x10/0x20
[   33.326622] 
[   33.326653] The buggy address belongs to the object at fff00000c9225780
[   33.326653]  which belongs to the cache kmalloc-64 of size 64
[   33.326711] The buggy address is located 0 bytes to the right of
[   33.326711]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.326775] 
[   33.326796] The buggy address belongs to the physical page:
[   33.326849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.326903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.326950] page_type: f5(slab)
[   33.326989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.327041] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.327082] page dumped because: kasan: bad access detected
[   33.327113] 
[   33.327132] Memory state around the buggy address:
[   33.327165]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.327351]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.327837] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.327929]                                      ^
[   33.327996]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.328093]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.328200] ==================================================================
[   32.970986] ==================================================================
[   32.971043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   32.971113] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   32.971183] 
[   32.971215] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.971304] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.971337] Hardware name: linux,dummy-virt (DT)
[   32.971369] Call trace:
[   32.971392]  show_stack+0x20/0x38 (C)
[   32.971444]  dump_stack_lvl+0x8c/0xd0
[   32.971492]  print_report+0x118/0x5e8
[   32.971539]  kasan_report+0xdc/0x128
[   32.971594]  __asan_report_load4_noabort+0x20/0x30
[   32.971804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.972537] The buggy address is located 0 bytes to the right of
[   32.972537]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.973769] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.975189] 
[   32.975750]  print_report+0x118/0x5e8
[   32.978399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.978727] 
[   32.978751] The buggy address belongs to the object at fff00000c9225780
[   32.978751]  which belongs to the cache kmalloc-64 of size 64
[   32.979021] The buggy address is located 0 bytes to the right of
[   32.979021]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.979166] 
[   32.979245] The buggy address belongs to the physical page:
[   32.979445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   32.979556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.979696] page_type: f5(slab)
[   32.979763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.979970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.980181] page dumped because: kasan: bad access detected
[   32.980289] 
[   32.980395] Memory state around the buggy address:
[   32.980465]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.980540]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.980597] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.980705]                                      ^
[   32.980741]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.981010]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.981084] ==================================================================
[   33.328878] ==================================================================
[   33.328935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   33.329015] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.329099] 
[   33.329186] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.329294] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.329325] Hardware name: linux,dummy-virt (DT)
[   33.329357] Call trace:
[   33.329381]  show_stack+0x20/0x38 (C)
[   33.329431]  dump_stack_lvl+0x8c/0xd0
[   33.329479]  print_report+0x118/0x5e8
[   33.329654]  kasan_report+0xdc/0x128
[   33.329860]  kasan_check_range+0x100/0x1a8
[   33.329955]  __kasan_check_write+0x20/0x30
[   33.330057]  kasan_atomics_helper+0x16d0/0x4858
[   33.330332]  kasan_atomics+0x198/0x2e0
[   33.330499]  kunit_try_run_case+0x170/0x3f0
[   33.330635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.330690]  kthread+0x328/0x630
[   33.330944]  ret_from_fork+0x10/0x20
[   33.331186] 
[   33.331344] Allocated by task 296:
[   33.331483]  kasan_save_stack+0x3c/0x68
[   33.331675]  kasan_save_track+0x20/0x40
[   33.331805]  kasan_save_alloc_info+0x40/0x58
[   33.331963]  __kasan_kmalloc+0xd4/0xd8
[   33.332040]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.332087]  kasan_atomics+0xb8/0x2e0
[   33.332127]  kunit_try_run_case+0x170/0x3f0
[   33.332386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.332514]  kthread+0x328/0x630
[   33.332707]  ret_from_fork+0x10/0x20
[   33.332908] 
[   33.333232] The buggy address belongs to the object at fff00000c9225780
[   33.333232]  which belongs to the cache kmalloc-64 of size 64
[   33.333399] The buggy address is located 0 bytes to the right of
[   33.333399]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.333475] 
[   33.333496] The buggy address belongs to the physical page:
[   33.333686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.333849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.334019] page_type: f5(slab)
[   33.334109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.334206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.334555] page dumped because: kasan: bad access detected
[   33.334694] 
[   33.334764] Memory state around the buggy address:
[   33.334862]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.334939]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.335038] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.335174]                                      ^
[   33.335235]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.335279]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.335345] ==================================================================
[   33.186073] ==================================================================
[   33.186126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.186186] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.186239] 
[   33.186688] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.186936] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.186968] Hardware name: linux,dummy-virt (DT)
[   33.187174] Call trace:
[   33.187202]  show_stack+0x20/0x38 (C)
[   33.187696]  dump_stack_lvl+0x8c/0xd0
[   33.187793]  print_report+0x118/0x5e8
[   33.187867]  kasan_report+0xdc/0x128
[   33.188160]  kasan_check_range+0x100/0x1a8
[   33.188359]  __kasan_check_write+0x20/0x30
[   33.188417]  kasan_atomics_helper+0x10c0/0x4858
[   33.188804]  kasan_atomics+0x198/0x2e0
[   33.189084]  kunit_try_run_case+0x170/0x3f0
[   33.189292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.189502]  kthread+0x328/0x630
[   33.189689]  ret_from_fork+0x10/0x20
[   33.189794] 
[   33.190057] Allocated by task 296:
[   33.190228]  kasan_save_stack+0x3c/0x68
[   33.190329]  kasan_save_track+0x20/0x40
[   33.190368]  kasan_save_alloc_info+0x40/0x58
[   33.190574]  __kasan_kmalloc+0xd4/0xd8
[   33.190795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.190888]  kasan_atomics+0xb8/0x2e0
[   33.191099]  kunit_try_run_case+0x170/0x3f0
[   33.191190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.191355]  kthread+0x328/0x630
[   33.191589]  ret_from_fork+0x10/0x20
[   33.191767] 
[   33.191977] The buggy address belongs to the object at fff00000c9225780
[   33.191977]  which belongs to the cache kmalloc-64 of size 64
[   33.192054] The buggy address is located 0 bytes to the right of
[   33.192054]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.192384] 
[   33.192535] The buggy address belongs to the physical page:
[   33.192918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.193084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.193237] page_type: f5(slab)
[   33.193320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.193546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.193737] page dumped because: kasan: bad access detected
[   33.193830] 
[   33.193951] Memory state around the buggy address:
[   33.194012]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.194100]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.194312] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.194569]                                      ^
[   33.194624]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.194669]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.195122] ==================================================================
[   32.870150] ==================================================================
[   32.870372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   32.870746] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.871297]  print_report+0x118/0x5e8
[   32.871671]  kasan_atomics_helper+0x3f94/0x4858
[   32.872433]  kthread+0x328/0x630
[   32.872592]  kasan_save_stack+0x3c/0x68
[   32.873409]  __kasan_kmalloc+0xd4/0xd8
[   32.873991]  kthread+0x328/0x630
[   32.874496] The buggy address is located 0 bytes to the right of
[   32.874496]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.875969] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.876422] ==================================================================
[   33.008880] ==================================================================
[   33.008970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.009337] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.009502] 
[   33.009578] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.009734] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.009860] Hardware name: linux,dummy-virt (DT)
[   33.009895] Call trace:
[   33.009919]  show_stack+0x20/0x38 (C)
[   33.010353]  dump_stack_lvl+0x8c/0xd0
[   33.010575]  print_report+0x118/0x5e8
[   33.010787]  kasan_report+0xdc/0x128
[   33.010862]  kasan_check_range+0x100/0x1a8
[   33.010948]  __kasan_check_write+0x20/0x30
[   33.011020]  kasan_atomics_helper+0xad4/0x4858
[   33.011078]  kasan_atomics+0x198/0x2e0
[   33.011124]  kunit_try_run_case+0x170/0x3f0
[   33.011176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.011241]  kthread+0x328/0x630
[   33.011314]  ret_from_fork+0x10/0x20
[   33.011362] 
[   33.011385] Allocated by task 296:
[   33.011423]  kasan_save_stack+0x3c/0x68
[   33.011488]  kasan_save_track+0x20/0x40
[   33.011539]  kasan_save_alloc_info+0x40/0x58
[   33.011587]  __kasan_kmalloc+0xd4/0xd8
[   33.011626]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.011669]  kasan_atomics+0xb8/0x2e0
[   33.011717]  kunit_try_run_case+0x170/0x3f0
[   33.011766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.011809]  kthread+0x328/0x630
[   33.011855]  ret_from_fork+0x10/0x20
[   33.011891] 
[   33.011913] The buggy address belongs to the object at fff00000c9225780
[   33.011913]  which belongs to the cache kmalloc-64 of size 64
[   33.011972] The buggy address is located 0 bytes to the right of
[   33.011972]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.012101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.012356] page dumped because: kasan: bad access detected
[   33.012389] 
[   33.012411] Memory state around the buggy address:
[   33.012450]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.012509]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.012554] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.012605]                                      ^
[   33.012647]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.012691]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.012739] ==================================================================
[   33.144642] ==================================================================
[   33.144695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.144793] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.144875] 
[   33.144930] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.145335] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.145389] Hardware name: linux,dummy-virt (DT)
[   33.145423] Call trace:
[   33.145447]  show_stack+0x20/0x38 (C)
[   33.145862]  dump_stack_lvl+0x8c/0xd0
[   33.145949]  print_report+0x118/0x5e8
[   33.146034]  kasan_report+0xdc/0x128
[   33.146259]  kasan_check_range+0x100/0x1a8
[   33.146450]  __kasan_check_write+0x20/0x30
[   33.146531]  kasan_atomics_helper+0xeb8/0x4858
[   33.146771]  kasan_atomics+0x198/0x2e0
[   33.147274]  kunit_try_run_case+0x170/0x3f0
[   33.147369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.147586]  kthread+0x328/0x630
[   33.147972]  ret_from_fork+0x10/0x20
[   33.148152] 
[   33.148219] Allocated by task 296:
[   33.148253]  kasan_save_stack+0x3c/0x68
[   33.148473]  kasan_save_track+0x20/0x40
[   33.148632]  kasan_save_alloc_info+0x40/0x58
[   33.148713]  __kasan_kmalloc+0xd4/0xd8
[   33.148762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.149124]  kasan_atomics+0xb8/0x2e0
[   33.149178]  kunit_try_run_case+0x170/0x3f0
[   33.149218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.149263]  kthread+0x328/0x630
[   33.149298]  ret_from_fork+0x10/0x20
[   33.149336] 
[   33.149360] The buggy address belongs to the object at fff00000c9225780
[   33.149360]  which belongs to the cache kmalloc-64 of size 64
[   33.149652] The buggy address is located 0 bytes to the right of
[   33.149652]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.150085] 
[   33.150186] The buggy address belongs to the physical page:
[   33.150285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.150434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.150503] page_type: f5(slab)
[   33.150545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.150647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.150690] page dumped because: kasan: bad access detected
[   33.150722] 
[   33.150748] Memory state around the buggy address:
[   33.150784]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.150839]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.150893] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.150939]                                      ^
[   33.150981]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.151035]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.151073] ==================================================================
[   33.071843] ==================================================================
[   33.071919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.071980] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.072241] 
[   33.072311] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.072407] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.072803] Hardware name: linux,dummy-virt (DT)
[   33.072870] Call trace:
[   33.073075]  show_stack+0x20/0x38 (C)
[   33.073146]  dump_stack_lvl+0x8c/0xd0
[   33.073289]  print_report+0x118/0x5e8
[   33.073361]  kasan_report+0xdc/0x128
[   33.073776]  __asan_report_load4_noabort+0x20/0x30
[   33.073868]  kasan_atomics_helper+0x3dd8/0x4858
[   33.073924]  kasan_atomics+0x198/0x2e0
[   33.074242]  kunit_try_run_case+0x170/0x3f0
[   33.074511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.074786]  kthread+0x328/0x630
[   33.074977]  ret_from_fork+0x10/0x20
[   33.075039] 
[   33.075079] Allocated by task 296:
[   33.075112]  kasan_save_stack+0x3c/0x68
[   33.075166]  kasan_save_track+0x20/0x40
[   33.075211]  kasan_save_alloc_info+0x40/0x58
[   33.075253]  __kasan_kmalloc+0xd4/0xd8
[   33.075309]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.075364]  kasan_atomics+0xb8/0x2e0
[   33.075413]  kunit_try_run_case+0x170/0x3f0
[   33.075462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.075511]  kthread+0x328/0x630
[   33.075546]  ret_from_fork+0x10/0x20
[   33.075582] 
[   33.075603] The buggy address belongs to the object at fff00000c9225780
[   33.075603]  which belongs to the cache kmalloc-64 of size 64
[   33.075671] The buggy address is located 0 bytes to the right of
[   33.075671]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.075737] 
[   33.075763] The buggy address belongs to the physical page:
[   33.076016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.076498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.076562] page_type: f5(slab)
[   33.076966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.077343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.077511] page dumped because: kasan: bad access detected
[   33.077575] 
[   33.077622] Memory state around the buggy address:
[   33.077759]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.077851]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.077897] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.077935]                                      ^
[   33.078614]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.078732]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.078909] ==================================================================
[   33.217960] ==================================================================
[   33.218081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   33.218144] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.218202] 
[   33.218466] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.218966] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.219028] Hardware name: linux,dummy-virt (DT)
[   33.219113] Call trace:
[   33.219141]  show_stack+0x20/0x38 (C)
[   33.219382]  dump_stack_lvl+0x8c/0xd0
[   33.219453]  print_report+0x118/0x5e8
[   33.219807]  kasan_report+0xdc/0x128
[   33.219891]  kasan_check_range+0x100/0x1a8
[   33.219942]  __kasan_check_write+0x20/0x30
[   33.219991]  kasan_atomics_helper+0x11f8/0x4858
[   33.220043]  kasan_atomics+0x198/0x2e0
[   33.220090]  kunit_try_run_case+0x170/0x3f0
[   33.220163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.220219]  kthread+0x328/0x630
[   33.220271]  ret_from_fork+0x10/0x20
[   33.220322] 
[   33.220346] Allocated by task 296:
[   33.220387]  kasan_save_stack+0x3c/0x68
[   33.220432]  kasan_save_track+0x20/0x40
[   33.220471]  kasan_save_alloc_info+0x40/0x58
[   33.220512]  __kasan_kmalloc+0xd4/0xd8
[   33.220549]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.220602]  kasan_atomics+0xb8/0x2e0
[   33.220641]  kunit_try_run_case+0x170/0x3f0
[   33.220682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.220728]  kthread+0x328/0x630
[   33.220762]  ret_from_fork+0x10/0x20
[   33.220807] 
[   33.220844] The buggy address belongs to the object at fff00000c9225780
[   33.220844]  which belongs to the cache kmalloc-64 of size 64
[   33.221659] The buggy address is located 0 bytes to the right of
[   33.221659]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.221769] 
[   33.221821] The buggy address belongs to the physical page:
[   33.221889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.222059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.222177] page_type: f5(slab)
[   33.222402] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.222637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.222912] page dumped because: kasan: bad access detected
[   33.222990] 
[   33.223290] Memory state around the buggy address:
[   33.223371]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.223464]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.223739] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.224245]                                      ^
[   33.224410]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.224555]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.224641] ==================================================================
[   33.226076] ==================================================================
[   33.226175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   33.226263] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.226317] 
[   33.226347] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.227500] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.227553] Hardware name: linux,dummy-virt (DT)
[   33.227588] Call trace:
[   33.227642]  show_stack+0x20/0x38 (C)
[   33.227705]  dump_stack_lvl+0x8c/0xd0
[   33.227763]  print_report+0x118/0x5e8
[   33.227884]  kasan_report+0xdc/0x128
[   33.227941]  kasan_check_range+0x100/0x1a8
[   33.227990]  __kasan_check_write+0x20/0x30
[   33.228382]  kasan_atomics_helper+0x126c/0x4858
[   33.228474]  kasan_atomics+0x198/0x2e0
[   33.228525]  kunit_try_run_case+0x170/0x3f0
[   33.228579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.228632]  kthread+0x328/0x630
[   33.229058]  ret_from_fork+0x10/0x20
[   33.229347] 
[   33.229581] Allocated by task 296:
[   33.229629]  kasan_save_stack+0x3c/0x68
[   33.229677]  kasan_save_track+0x20/0x40
[   33.229716]  kasan_save_alloc_info+0x40/0x58
[   33.229953]  __kasan_kmalloc+0xd4/0xd8
[   33.230100]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.230421]  kasan_atomics+0xb8/0x2e0
[   33.230559]  kunit_try_run_case+0x170/0x3f0
[   33.230605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.231028]  kthread+0x328/0x630
[   33.231240]  ret_from_fork+0x10/0x20
[   33.231440] 
[   33.231521] The buggy address belongs to the object at fff00000c9225780
[   33.231521]  which belongs to the cache kmalloc-64 of size 64
[   33.231642] The buggy address is located 0 bytes to the right of
[   33.231642]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.231880] 
[   33.232049] The buggy address belongs to the physical page:
[   33.232139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.232606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.232969] page_type: f5(slab)
[   33.233127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.233263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.233310] page dumped because: kasan: bad access detected
[   33.233343] 
[   33.233730] Memory state around the buggy address:
[   33.233827]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.234070]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.234121] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.234561]                                      ^
[   33.234761]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.235033]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.235113] ==================================================================
[   33.244863] ==================================================================
[   33.245005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   33.245345] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.245503] 
[   33.245595] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.246150] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.246228] Hardware name: linux,dummy-virt (DT)
[   33.246289] Call trace:
[   33.246333]  show_stack+0x20/0x38 (C)
[   33.246826]  dump_stack_lvl+0x8c/0xd0
[   33.246976]  print_report+0x118/0x5e8
[   33.247097]  kasan_report+0xdc/0x128
[   33.247150]  kasan_check_range+0x100/0x1a8
[   33.247402]  __kasan_check_write+0x20/0x30
[   33.247565]  kasan_atomics_helper+0x1384/0x4858
[   33.247625]  kasan_atomics+0x198/0x2e0
[   33.248074]  kunit_try_run_case+0x170/0x3f0
[   33.248347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.248612]  kthread+0x328/0x630
[   33.248705]  ret_from_fork+0x10/0x20
[   33.248974] 
[   33.249426] Allocated by task 296:
[   33.249546]  kasan_save_stack+0x3c/0x68
[   33.249599]  kasan_save_track+0x20/0x40
[   33.249639]  kasan_save_alloc_info+0x40/0x58
[   33.249679]  __kasan_kmalloc+0xd4/0xd8
[   33.250032]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.250118]  kasan_atomics+0xb8/0x2e0
[   33.250540]  kunit_try_run_case+0x170/0x3f0
[   33.250589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.250904]  kthread+0x328/0x630
[   33.251285]  ret_from_fork+0x10/0x20
[   33.251379] 
[   33.251419] The buggy address belongs to the object at fff00000c9225780
[   33.251419]  which belongs to the cache kmalloc-64 of size 64
[   33.251478] The buggy address is located 0 bytes to the right of
[   33.251478]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.251543] 
[   33.251566] The buggy address belongs to the physical page:
[   33.251611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.251675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.251734] page_type: f5(slab)
[   33.251776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.251845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.251894] page dumped because: kasan: bad access detected
[   33.251938] 
[   33.251960] Memory state around the buggy address:
[   33.251994]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.252039]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.252092] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.252131]                                      ^
[   33.252174]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.252216]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.252261] ==================================================================
[   32.999928] ==================================================================
[   32.999984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.000040] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.000092] 
[   33.000123] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.000216] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.000247] Hardware name: linux,dummy-virt (DT)
[   33.000279] Call trace:
[   33.000302]  show_stack+0x20/0x38 (C)
[   33.000655]  dump_stack_lvl+0x8c/0xd0
[   33.000961]  print_report+0x118/0x5e8
[   33.001248]  kasan_report+0xdc/0x128
[   33.001441]  kasan_check_range+0x100/0x1a8
[   33.001678]  __kasan_check_write+0x20/0x30
[   33.001803]  kasan_atomics_helper+0xa6c/0x4858
[   33.001990]  kasan_atomics+0x198/0x2e0
[   33.002359]  kunit_try_run_case+0x170/0x3f0
[   33.002473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.002594]  kthread+0x328/0x630
[   33.002679]  ret_from_fork+0x10/0x20
[   33.002807] 
[   33.002840] Allocated by task 296:
[   33.003146]  kasan_save_stack+0x3c/0x68
[   33.003273]  kasan_save_track+0x20/0x40
[   33.003360]  kasan_save_alloc_info+0x40/0x58
[   33.003707]  __kasan_kmalloc+0xd4/0xd8
[   33.003757]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.003821]  kasan_atomics+0xb8/0x2e0
[   33.004319]  kunit_try_run_case+0x170/0x3f0
[   33.004414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.004507]  kthread+0x328/0x630
[   33.004637]  ret_from_fork+0x10/0x20
[   33.004780] 
[   33.004939] The buggy address belongs to the object at fff00000c9225780
[   33.004939]  which belongs to the cache kmalloc-64 of size 64
[   33.005327] The buggy address is located 0 bytes to the right of
[   33.005327]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.005469] 
[   33.005537] The buggy address belongs to the physical page:
[   33.005739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.005952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.006075] page_type: f5(slab)
[   33.006244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.006369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.006724] page dumped because: kasan: bad access detected
[   33.006785] 
[   33.006927] Memory state around the buggy address:
[   33.007016]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.007151]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.007226] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.007440]                                      ^
[   33.007569]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.007642]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.007700] ==================================================================
[   33.275269] ==================================================================
[   33.275353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   33.275414] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.275881] 
[   33.275931] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.276422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.276475] Hardware name: linux,dummy-virt (DT)
[   33.276510] Call trace:
[   33.276554]  show_stack+0x20/0x38 (C)
[   33.276746]  dump_stack_lvl+0x8c/0xd0
[   33.276826]  print_report+0x118/0x5e8
[   33.276874]  kasan_report+0xdc/0x128
[   33.276920]  kasan_check_range+0x100/0x1a8
[   33.276967]  __kasan_check_write+0x20/0x30
[   33.277014]  kasan_atomics_helper+0x147c/0x4858
[   33.277065]  kasan_atomics+0x198/0x2e0
[   33.277113]  kunit_try_run_case+0x170/0x3f0
[   33.277162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.277214]  kthread+0x328/0x630
[   33.277383]  ret_from_fork+0x10/0x20
[   33.277450] 
[   33.277474] Allocated by task 296:
[   33.277508]  kasan_save_stack+0x3c/0x68
[   33.277552]  kasan_save_track+0x20/0x40
[   33.277590]  kasan_save_alloc_info+0x40/0x58
[   33.277629]  __kasan_kmalloc+0xd4/0xd8
[   33.277666]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.277710]  kasan_atomics+0xb8/0x2e0
[   33.277750]  kunit_try_run_case+0x170/0x3f0
[   33.277789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.277848]  kthread+0x328/0x630
[   33.277886]  ret_from_fork+0x10/0x20
[   33.277936] 
[   33.277959] The buggy address belongs to the object at fff00000c9225780
[   33.277959]  which belongs to the cache kmalloc-64 of size 64
[   33.278025] The buggy address is located 0 bytes to the right of
[   33.278025]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.278090] 
[   33.278112] The buggy address belongs to the physical page:
[   33.278147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.278208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.278257] page_type: f5(slab)
[   33.278297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.278349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.278396] page dumped because: kasan: bad access detected
[   33.278429] 
[   33.278450] Memory state around the buggy address:
[   33.278495]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.278539]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.278582] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.278621]                                      ^
[   33.278655]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.278698]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.278747] ==================================================================
[   32.831115] ==================================================================
[   32.831167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   32.832007] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.832230]  show_stack+0x20/0x38 (C)
[   32.833328]  kasan_atomics+0x198/0x2e0
[   32.834535]  kasan_save_track+0x20/0x40
[   32.836570] The buggy address is located 0 bytes to the right of
[   32.836570]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.837981] 
[   32.838639] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.840081] ==================================================================
[   33.097957] ==================================================================
[   33.098221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.098425] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.098492] 
[   33.098699] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.098804] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.099030] Hardware name: linux,dummy-virt (DT)
[   33.099080] Call trace:
[   33.099304]  show_stack+0x20/0x38 (C)
[   33.099617]  dump_stack_lvl+0x8c/0xd0
[   33.099784]  print_report+0x118/0x5e8
[   33.099874]  kasan_report+0xdc/0x128
[   33.100134]  kasan_check_range+0x100/0x1a8
[   33.100292]  __kasan_check_read+0x20/0x30
[   33.100601]  kasan_atomics_helper+0xdd4/0x4858
[   33.100680]  kasan_atomics+0x198/0x2e0
[   33.100869]  kunit_try_run_case+0x170/0x3f0
[   33.101086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.101526]  kthread+0x328/0x630
[   33.101611]  ret_from_fork+0x10/0x20
[   33.102030] 
[   33.102376] Allocated by task 296:
[   33.102488]  kasan_save_stack+0x3c/0x68
[   33.102772]  kasan_save_track+0x20/0x40
[   33.102963]  kasan_save_alloc_info+0x40/0x58
[   33.103034]  __kasan_kmalloc+0xd4/0xd8
[   33.103452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.103543]  kasan_atomics+0xb8/0x2e0
[   33.103705]  kunit_try_run_case+0x170/0x3f0
[   33.103846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.103918]  kthread+0x328/0x630
[   33.104297]  ret_from_fork+0x10/0x20
[   33.104379] 
[   33.104713] The buggy address belongs to the object at fff00000c9225780
[   33.104713]  which belongs to the cache kmalloc-64 of size 64
[   33.105213] The buggy address is located 0 bytes to the right of
[   33.105213]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.105610] 
[   33.105677] The buggy address belongs to the physical page:
[   33.105963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.106218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.106277] page_type: f5(slab)
[   33.106318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.106466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.106522] page dumped because: kasan: bad access detected
[   33.106555] 
[   33.106576] Memory state around the buggy address:
[   33.106609]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.106655]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.106699] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.106738]                                      ^
[   33.106774]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.106841]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.106893] ==================================================================
[   33.080393] ==================================================================
[   33.080669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.080882] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.081168] 
[   33.081399] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.081521] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.081875] Hardware name: linux,dummy-virt (DT)
[   33.081937] Call trace:
[   33.082052]  show_stack+0x20/0x38 (C)
[   33.082185]  dump_stack_lvl+0x8c/0xd0
[   33.082252]  print_report+0x118/0x5e8
[   33.082305]  kasan_report+0xdc/0x128
[   33.082691]  kasan_check_range+0x100/0x1a8
[   33.083217]  __kasan_check_write+0x20/0x30
[   33.083310]  kasan_atomics_helper+0xd3c/0x4858
[   33.083721]  kasan_atomics+0x198/0x2e0
[   33.083809]  kunit_try_run_case+0x170/0x3f0
[   33.084075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.084285]  kthread+0x328/0x630
[   33.084522]  ret_from_fork+0x10/0x20
[   33.084786] 
[   33.084851] Allocated by task 296:
[   33.084893]  kasan_save_stack+0x3c/0x68
[   33.085134]  kasan_save_track+0x20/0x40
[   33.085320]  kasan_save_alloc_info+0x40/0x58
[   33.085707]  __kasan_kmalloc+0xd4/0xd8
[   33.085872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.085960]  kasan_atomics+0xb8/0x2e0
[   33.086069]  kunit_try_run_case+0x170/0x3f0
[   33.086222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.086269]  kthread+0x328/0x630
[   33.086320]  ret_from_fork+0x10/0x20
[   33.086359] 
[   33.086536] The buggy address belongs to the object at fff00000c9225780
[   33.086536]  which belongs to the cache kmalloc-64 of size 64
[   33.086795] The buggy address is located 0 bytes to the right of
[   33.086795]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.087106] 
[   33.087212] The buggy address belongs to the physical page:
[   33.087270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.088020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.088200] page_type: f5(slab)
[   33.088275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.088367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.088514] page dumped because: kasan: bad access detected
[   33.088549] 
[   33.088569] Memory state around the buggy address:
[   33.088626]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.089252]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.089320] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.089363]                                      ^
[   33.089399]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.089445]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.089525] ==================================================================
[   33.122865] ==================================================================
[   33.122924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.122981] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.123246] 
[   33.123419] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.123722] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.123967] Hardware name: linux,dummy-virt (DT)
[   33.124056] Call trace:
[   33.124086]  show_stack+0x20/0x38 (C)
[   33.124234]  dump_stack_lvl+0x8c/0xd0
[   33.124293]  print_report+0x118/0x5e8
[   33.124341]  kasan_report+0xdc/0x128
[   33.124389]  kasan_check_range+0x100/0x1a8
[   33.124437]  __kasan_check_write+0x20/0x30
[   33.124597]  kasan_atomics_helper+0xe44/0x4858
[   33.124665]  kasan_atomics+0x198/0x2e0
[   33.124722]  kunit_try_run_case+0x170/0x3f0
[   33.124772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.124837]  kthread+0x328/0x630
[   33.125442]  ret_from_fork+0x10/0x20
[   33.126033] 
[   33.126140] Allocated by task 296:
[   33.126192]  kasan_save_stack+0x3c/0x68
[   33.126365]  kasan_save_track+0x20/0x40
[   33.126427]  kasan_save_alloc_info+0x40/0x58
[   33.126775]  __kasan_kmalloc+0xd4/0xd8
[   33.126855]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.127281]  kasan_atomics+0xb8/0x2e0
[   33.127352]  kunit_try_run_case+0x170/0x3f0
[   33.127438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.127682]  kthread+0x328/0x630
[   33.127886]  ret_from_fork+0x10/0x20
[   33.127970] 
[   33.128014] The buggy address belongs to the object at fff00000c9225780
[   33.128014]  which belongs to the cache kmalloc-64 of size 64
[   33.128318] The buggy address is located 0 bytes to the right of
[   33.128318]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.128499] 
[   33.128577] The buggy address belongs to the physical page:
[   33.128615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.129048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.129178] page_type: f5(slab)
[   33.129225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.129602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.130247] page dumped because: kasan: bad access detected
[   33.130310] 
[   33.130365] Memory state around the buggy address:
[   33.130442]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.130581]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.130929] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.131324]                                      ^
[   33.131496]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.131730]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.131849] ==================================================================
[   33.253746] ==================================================================
[   33.253800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   33.253872] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.253923] 
[   33.253956] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.254047] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.254350] Hardware name: linux,dummy-virt (DT)
[   33.254403] Call trace:
[   33.255291]  show_stack+0x20/0x38 (C)
[   33.255368]  dump_stack_lvl+0x8c/0xd0
[   33.255421]  print_report+0x118/0x5e8
[   33.255504]  kasan_report+0xdc/0x128
[   33.255562]  __asan_report_load8_noabort+0x20/0x30
[   33.255616]  kasan_atomics_helper+0x3f04/0x4858
[   33.255936]  kasan_atomics+0x198/0x2e0
[   33.256051]  kunit_try_run_case+0x170/0x3f0
[   33.256111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.256498]  kthread+0x328/0x630
[   33.256568]  ret_from_fork+0x10/0x20
[   33.256621] 
[   33.256643] Allocated by task 296:
[   33.257174]  kasan_save_stack+0x3c/0x68
[   33.257256]  kasan_save_track+0x20/0x40
[   33.257296]  kasan_save_alloc_info+0x40/0x58
[   33.257338]  __kasan_kmalloc+0xd4/0xd8
[   33.257373]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.257417]  kasan_atomics+0xb8/0x2e0
[   33.257456]  kunit_try_run_case+0x170/0x3f0
[   33.257877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.258210]  kthread+0x328/0x630
[   33.258304]  ret_from_fork+0x10/0x20
[   33.258346] 
[   33.258640] The buggy address belongs to the object at fff00000c9225780
[   33.258640]  which belongs to the cache kmalloc-64 of size 64
[   33.259083] The buggy address is located 0 bytes to the right of
[   33.259083]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.259451] 
[   33.259598] The buggy address belongs to the physical page:
[   33.259692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.260021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.260463] page_type: f5(slab)
[   33.260638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.260855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.260934] page dumped because: kasan: bad access detected
[   33.261021] 
[   33.261059] Memory state around the buggy address:
[   33.261095]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.261338]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.261403] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.261558]                                      ^
[   33.261886]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.261982]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.262134] ==================================================================
[   33.353653] ==================================================================
[   33.353722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   33.353777] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.353839] 
[   33.353872] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.354164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.354202] Hardware name: linux,dummy-virt (DT)
[   33.354368] Call trace:
[   33.354394]  show_stack+0x20/0x38 (C)
[   33.354448]  dump_stack_lvl+0x8c/0xd0
[   33.354507]  print_report+0x118/0x5e8
[   33.354727]  kasan_report+0xdc/0x128
[   33.354779]  kasan_check_range+0x100/0x1a8
[   33.354871]  __kasan_check_write+0x20/0x30
[   33.355164]  kasan_atomics_helper+0x17ec/0x4858
[   33.355322]  kasan_atomics+0x198/0x2e0
[   33.355374]  kunit_try_run_case+0x170/0x3f0
[   33.355440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.355666]  kthread+0x328/0x630
[   33.355726]  ret_from_fork+0x10/0x20
[   33.355858] 
[   33.355943] Allocated by task 296:
[   33.355977]  kasan_save_stack+0x3c/0x68
[   33.356021]  kasan_save_track+0x20/0x40
[   33.356059]  kasan_save_alloc_info+0x40/0x58
[   33.356129]  __kasan_kmalloc+0xd4/0xd8
[   33.356444]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.356554]  kasan_atomics+0xb8/0x2e0
[   33.356598]  kunit_try_run_case+0x170/0x3f0
[   33.356852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.356912]  kthread+0x328/0x630
[   33.356949]  ret_from_fork+0x10/0x20
[   33.357209] 
[   33.357278] The buggy address belongs to the object at fff00000c9225780
[   33.357278]  which belongs to the cache kmalloc-64 of size 64
[   33.357426] The buggy address is located 0 bytes to the right of
[   33.357426]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.357535] 
[   33.357604] The buggy address belongs to the physical page:
[   33.357700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.357990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.358128] page_type: f5(slab)
[   33.358177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.358563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.358731] page dumped because: kasan: bad access detected
[   33.358820] 
[   33.358888] Memory state around the buggy address:
[   33.359247]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.359357]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.359488] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.359527]                                      ^
[   33.359579]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.359945]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.360028] ==================================================================
[   33.207045] ==================================================================
[   33.207367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   33.207525] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.207610] 
[   33.207645] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.207774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.207805] Hardware name: linux,dummy-virt (DT)
[   33.207848] Call trace:
[   33.208357]  show_stack+0x20/0x38 (C)
[   33.208551]  dump_stack_lvl+0x8c/0xd0
[   33.208614]  print_report+0x118/0x5e8
[   33.208872]  kasan_report+0xdc/0x128
[   33.209066]  kasan_check_range+0x100/0x1a8
[   33.209480]  __kasan_check_write+0x20/0x30
[   33.209691]  kasan_atomics_helper+0x1190/0x4858
[   33.209907]  kasan_atomics+0x198/0x2e0
[   33.210078]  kunit_try_run_case+0x170/0x3f0
[   33.210177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.210544]  kthread+0x328/0x630
[   33.210648]  ret_from_fork+0x10/0x20
[   33.210702] 
[   33.210748] Allocated by task 296:
[   33.211098]  kasan_save_stack+0x3c/0x68
[   33.211163]  kasan_save_track+0x20/0x40
[   33.211220]  kasan_save_alloc_info+0x40/0x58
[   33.211392]  __kasan_kmalloc+0xd4/0xd8
[   33.211439]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.211486]  kasan_atomics+0xb8/0x2e0
[   33.211525]  kunit_try_run_case+0x170/0x3f0
[   33.211923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.211994]  kthread+0x328/0x630
[   33.212360]  ret_from_fork+0x10/0x20
[   33.212567] 
[   33.212644] The buggy address belongs to the object at fff00000c9225780
[   33.212644]  which belongs to the cache kmalloc-64 of size 64
[   33.213145] The buggy address is located 0 bytes to the right of
[   33.213145]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.213373] 
[   33.213534] The buggy address belongs to the physical page:
[   33.213605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.213801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.213987] page_type: f5(slab)
[   33.214374] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.214501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.214558] page dumped because: kasan: bad access detected
[   33.214639] 
[   33.214719] Memory state around the buggy address:
[   33.214786]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.214844]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.215059] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.215268]                                      ^
[   33.215362]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.215837]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.215920] ==================================================================
[   33.311704] ==================================================================
[   33.311764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   33.311832] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.311900] 
[   33.311933] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.312235] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.312280] Hardware name: linux,dummy-virt (DT)
[   33.312350] Call trace:
[   33.312376]  show_stack+0x20/0x38 (C)
[   33.312431]  dump_stack_lvl+0x8c/0xd0
[   33.312481]  print_report+0x118/0x5e8
[   33.312556]  kasan_report+0xdc/0x128
[   33.312617]  __asan_report_load8_noabort+0x20/0x30
[   33.312669]  kasan_atomics_helper+0x3db0/0x4858
[   33.312721]  kasan_atomics+0x198/0x2e0
[   33.312788]  kunit_try_run_case+0x170/0x3f0
[   33.312880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.313019]  kthread+0x328/0x630
[   33.313082]  ret_from_fork+0x10/0x20
[   33.313133] 
[   33.313161] Allocated by task 296:
[   33.313192]  kasan_save_stack+0x3c/0x68
[   33.313234]  kasan_save_track+0x20/0x40
[   33.313272]  kasan_save_alloc_info+0x40/0x58
[   33.313313]  __kasan_kmalloc+0xd4/0xd8
[   33.313348]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.313565]  kasan_atomics+0xb8/0x2e0
[   33.313635]  kunit_try_run_case+0x170/0x3f0
[   33.313709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.313805]  kthread+0x328/0x630
[   33.314167]  ret_from_fork+0x10/0x20
[   33.314256] 
[   33.314324] The buggy address belongs to the object at fff00000c9225780
[   33.314324]  which belongs to the cache kmalloc-64 of size 64
[   33.314431] The buggy address is located 0 bytes to the right of
[   33.314431]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.314515] 
[   33.314537] The buggy address belongs to the physical page:
[   33.314735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.314961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.315041] page_type: f5(slab)
[   33.315096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.315322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.315367] page dumped because: kasan: bad access detected
[   33.315533] 
[   33.315877] Memory state around the buggy address:
[   33.316157]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.316332]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.316450] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.316518]                                      ^
[   33.316606]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.316704]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.316745] ==================================================================
[   33.263635] ==================================================================
[   33.263838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   33.264046] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.264322] 
[   33.264403] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.264503] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.264535] Hardware name: linux,dummy-virt (DT)
[   33.264951] Call trace:
[   33.265199]  show_stack+0x20/0x38 (C)
[   33.265281]  dump_stack_lvl+0x8c/0xd0
[   33.265350]  print_report+0x118/0x5e8
[   33.265793]  kasan_report+0xdc/0x128
[   33.266252]  kasan_check_range+0x100/0x1a8
[   33.266315]  __kasan_check_write+0x20/0x30
[   33.266363]  kasan_atomics_helper+0x1414/0x4858
[   33.266447]  kasan_atomics+0x198/0x2e0
[   33.266774]  kunit_try_run_case+0x170/0x3f0
[   33.266873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.267468]  kthread+0x328/0x630
[   33.267645]  ret_from_fork+0x10/0x20
[   33.268077] 
[   33.268135] Allocated by task 296:
[   33.268172]  kasan_save_stack+0x3c/0x68
[   33.268464]  kasan_save_track+0x20/0x40
[   33.268837]  kasan_save_alloc_info+0x40/0x58
[   33.269076]  __kasan_kmalloc+0xd4/0xd8
[   33.269187]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.269375]  kasan_atomics+0xb8/0x2e0
[   33.269634]  kunit_try_run_case+0x170/0x3f0
[   33.269791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.269885]  kthread+0x328/0x630
[   33.270099]  ret_from_fork+0x10/0x20
[   33.270304] 
[   33.270479] The buggy address belongs to the object at fff00000c9225780
[   33.270479]  which belongs to the cache kmalloc-64 of size 64
[   33.270550] The buggy address is located 0 bytes to the right of
[   33.270550]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.270615] 
[   33.270909] The buggy address belongs to the physical page:
[   33.271310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.271409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.271517] page_type: f5(slab)
[   33.271850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.271937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.272044] page dumped because: kasan: bad access detected
[   33.272132] 
[   33.272249] Memory state around the buggy address:
[   33.272305]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.272369]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.272413] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.272772]                                      ^
[   33.272891]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.273087]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.273304] ==================================================================
[   33.196646] ==================================================================
[   33.197104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.197190] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.197243] 
[   33.197277] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.197610] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.198010] Hardware name: linux,dummy-virt (DT)
[   33.198090] Call trace:
[   33.198282]  show_stack+0x20/0x38 (C)
[   33.198380]  dump_stack_lvl+0x8c/0xd0
[   33.198555]  print_report+0x118/0x5e8
[   33.198612]  kasan_report+0xdc/0x128
[   33.198659]  kasan_check_range+0x100/0x1a8
[   33.198708]  __kasan_check_write+0x20/0x30
[   33.199119]  kasan_atomics_helper+0x1128/0x4858
[   33.199620]  kasan_atomics+0x198/0x2e0
[   33.199915]  kunit_try_run_case+0x170/0x3f0
[   33.200175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.200385]  kthread+0x328/0x630
[   33.200450]  ret_from_fork+0x10/0x20
[   33.200749] 
[   33.200840] Allocated by task 296:
[   33.201236]  kasan_save_stack+0x3c/0x68
[   33.201297]  kasan_save_track+0x20/0x40
[   33.201623]  kasan_save_alloc_info+0x40/0x58
[   33.201712]  __kasan_kmalloc+0xd4/0xd8
[   33.202071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.202191]  kasan_atomics+0xb8/0x2e0
[   33.202264]  kunit_try_run_case+0x170/0x3f0
[   33.202304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.202647]  kthread+0x328/0x630
[   33.202955]  ret_from_fork+0x10/0x20
[   33.203300] 
[   33.203355] The buggy address belongs to the object at fff00000c9225780
[   33.203355]  which belongs to the cache kmalloc-64 of size 64
[   33.203689] The buggy address is located 0 bytes to the right of
[   33.203689]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.203772] 
[   33.203984] The buggy address belongs to the physical page:
[   33.204042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.204239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.204565] page_type: f5(slab)
[   33.205145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.205230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.205303] page dumped because: kasan: bad access detected
[   33.205336] 
[   33.205393] Memory state around the buggy address:
[   33.205429]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.205477]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.205530] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.205580]                                      ^
[   33.205618]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.205671]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.205712] ==================================================================
[   33.110430] ==================================================================
[   33.110802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.110986] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.111048] 
[   33.111084] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.111580] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.111637] Hardware name: linux,dummy-virt (DT)
[   33.111673] Call trace:
[   33.111698]  show_stack+0x20/0x38 (C)
[   33.112060]  dump_stack_lvl+0x8c/0xd0
[   33.112138]  print_report+0x118/0x5e8
[   33.112527]  kasan_report+0xdc/0x128
[   33.112852]  __asan_report_load8_noabort+0x20/0x30
[   33.113085]  kasan_atomics_helper+0x3f58/0x4858
[   33.113908]  kasan_atomics+0x198/0x2e0
[   33.113990]  kunit_try_run_case+0x170/0x3f0
[   33.114305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.114443]  kthread+0x328/0x630
[   33.114524]  ret_from_fork+0x10/0x20
[   33.114900] 
[   33.115340] Allocated by task 296:
[   33.115384]  kasan_save_stack+0x3c/0x68
[   33.115624]  kasan_save_track+0x20/0x40
[   33.115856]  kasan_save_alloc_info+0x40/0x58
[   33.116289]  __kasan_kmalloc+0xd4/0xd8
[   33.116525]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.116640]  kasan_atomics+0xb8/0x2e0
[   33.116954]  kunit_try_run_case+0x170/0x3f0
[   33.117009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.117758]  kthread+0x328/0x630
[   33.117963]  ret_from_fork+0x10/0x20
[   33.118079] 
[   33.118221] The buggy address belongs to the object at fff00000c9225780
[   33.118221]  which belongs to the cache kmalloc-64 of size 64
[   33.118283] The buggy address is located 0 bytes to the right of
[   33.118283]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.118380] 
[   33.118427] The buggy address belongs to the physical page:
[   33.118684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.119328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.119562] page_type: f5(slab)
[   33.119607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.119659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.120254] page dumped because: kasan: bad access detected
[   33.120439] 
[   33.120490] Memory state around the buggy address:
[   33.120544]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.120651]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.120712] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.120751]                                      ^
[   33.121042]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.121261]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.121340] ==================================================================
[   33.162187] ==================================================================
[   33.162254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.162348] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.162432] 
[   33.162467] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.162634] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.162668] Hardware name: linux,dummy-virt (DT)
[   33.162719] Call trace:
[   33.162800]  show_stack+0x20/0x38 (C)
[   33.162884]  dump_stack_lvl+0x8c/0xd0
[   33.162994]  print_report+0x118/0x5e8
[   33.163041]  kasan_report+0xdc/0x128
[   33.163089]  kasan_check_range+0x100/0x1a8
[   33.163151]  __kasan_check_write+0x20/0x30
[   33.163348]  kasan_atomics_helper+0xf88/0x4858
[   33.163652]  kasan_atomics+0x198/0x2e0
[   33.163870]  kunit_try_run_case+0x170/0x3f0
[   33.163943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.163997]  kthread+0x328/0x630
[   33.164041]  ret_from_fork+0x10/0x20
[   33.164128] 
[   33.164166] Allocated by task 296:
[   33.164204]  kasan_save_stack+0x3c/0x68
[   33.164640]  kasan_save_track+0x20/0x40
[   33.164730]  kasan_save_alloc_info+0x40/0x58
[   33.164774]  __kasan_kmalloc+0xd4/0xd8
[   33.165370]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.165531]  kasan_atomics+0xb8/0x2e0
[   33.165603]  kunit_try_run_case+0x170/0x3f0
[   33.165701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.165788]  kthread+0x328/0x630
[   33.165853]  ret_from_fork+0x10/0x20
[   33.165893] 
[   33.166267] The buggy address belongs to the object at fff00000c9225780
[   33.166267]  which belongs to the cache kmalloc-64 of size 64
[   33.166374] The buggy address is located 0 bytes to the right of
[   33.166374]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.166920] 
[   33.166973] The buggy address belongs to the physical page:
[   33.167028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.167296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.167410] page_type: f5(slab)
[   33.167639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.168086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.168176] page dumped because: kasan: bad access detected
[   33.168406] 
[   33.168453] Memory state around the buggy address:
[   33.168599]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.168681]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.169054] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.169130]                                      ^
[   33.169410]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.169565]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.169729] ==================================================================
[   33.336690] ==================================================================
[   33.336849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   33.336915] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.336990] 
[   33.337050] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.337142] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.337176] Hardware name: linux,dummy-virt (DT)
[   33.337209] Call trace:
[   33.337232]  show_stack+0x20/0x38 (C)
[   33.337283]  dump_stack_lvl+0x8c/0xd0
[   33.337332]  print_report+0x118/0x5e8
[   33.337546]  kasan_report+0xdc/0x128
[   33.337694]  __asan_report_load8_noabort+0x20/0x30
[   33.337790]  kasan_atomics_helper+0x3e10/0x4858
[   33.337883]  kasan_atomics+0x198/0x2e0
[   33.337995]  kunit_try_run_case+0x170/0x3f0
[   33.338047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.338100]  kthread+0x328/0x630
[   33.338384]  ret_from_fork+0x10/0x20
[   33.338499] 
[   33.338538] Allocated by task 296:
[   33.338570]  kasan_save_stack+0x3c/0x68
[   33.338980]  kasan_save_track+0x20/0x40
[   33.339106]  kasan_save_alloc_info+0x40/0x58
[   33.339371]  __kasan_kmalloc+0xd4/0xd8
[   33.339545]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.339722]  kasan_atomics+0xb8/0x2e0
[   33.339774]  kunit_try_run_case+0x170/0x3f0
[   33.339824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.340165]  kthread+0x328/0x630
[   33.340345]  ret_from_fork+0x10/0x20
[   33.340441] 
[   33.340519] The buggy address belongs to the object at fff00000c9225780
[   33.340519]  which belongs to the cache kmalloc-64 of size 64
[   33.340885] The buggy address is located 0 bytes to the right of
[   33.340885]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.340984] 
[   33.341006] The buggy address belongs to the physical page:
[   33.341038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.341226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.341276] page_type: f5(slab)
[   33.341550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.341683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.342016] page dumped because: kasan: bad access detected
[   33.342135] 
[   33.342253] Memory state around the buggy address:
[   33.342334]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.342382]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.342435] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.342484]                                      ^
[   33.342519]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.342563]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.342612] ==================================================================
[   32.885450] ==================================================================
[   32.885508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   32.885562] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   32.885614] 
[   32.885974] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.887319]  kasan_atomics_helper+0x414/0x4858
[   32.887798]  kunit_try_run_case+0x170/0x3f0
[   32.888132] 
[   32.888537]  kasan_save_track+0x20/0x40
[   32.888884]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.889097]  kunit_try_run_case+0x170/0x3f0
[   32.889183]  kthread+0x328/0x630
[   32.889702] The buggy address belongs to the object at fff00000c9225780
[   32.889702]  which belongs to the cache kmalloc-64 of size 64
[   32.891306] 
[   32.891363] Memory state around the buggy address:
[   32.891968]                                      ^
[   32.892189] ==================================================================
[   32.981678] ==================================================================
[   32.981731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   32.981787] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   32.982109] 
[   32.982310] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.982470] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.982506] Hardware name: linux,dummy-virt (DT)
[   32.982539] Call trace:
[   32.982564]  show_stack+0x20/0x38 (C)
[   32.982823]  dump_stack_lvl+0x8c/0xd0
[   32.982884]  print_report+0x118/0x5e8
[   32.983019]  kasan_report+0xdc/0x128
[   32.983116]  kasan_check_range+0x100/0x1a8
[   32.983222]  __kasan_check_write+0x20/0x30
[   32.983288]  kasan_atomics_helper+0x99c/0x4858
[   32.983341]  kasan_atomics+0x198/0x2e0
[   32.983408]  kunit_try_run_case+0x170/0x3f0
[   32.983736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.983800]  kthread+0x328/0x630
[   32.983941]  ret_from_fork+0x10/0x20
[   32.983993] 
[   32.984063] Allocated by task 296:
[   32.984151]  kasan_save_stack+0x3c/0x68
[   32.984268]  kasan_save_track+0x20/0x40
[   32.984367]  kasan_save_alloc_info+0x40/0x58
[   32.984423]  __kasan_kmalloc+0xd4/0xd8
[   32.984463]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.984506]  kasan_atomics+0xb8/0x2e0
[   32.984845]  kunit_try_run_case+0x170/0x3f0
[   32.985376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.985738]  kthread+0x328/0x630
[   32.985879]  ret_from_fork+0x10/0x20
[   32.986006] 
[   32.986084] The buggy address belongs to the object at fff00000c9225780
[   32.986084]  which belongs to the cache kmalloc-64 of size 64
[   32.986180] The buggy address is located 0 bytes to the right of
[   32.986180]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.986269] 
[   32.986491] The buggy address belongs to the physical page:
[   32.986739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   32.986843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.987146] page_type: f5(slab)
[   32.987198] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.987544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.987664] page dumped because: kasan: bad access detected
[   32.987946] 
[   32.988006] Memory state around the buggy address:
[   32.988253]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.988585]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.988865] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.989121]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.990901] 
[   32.991146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.991214] Call trace:
[   32.991564]  kasan_report+0xdc/0x128
[   32.992866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.994057]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.995060]  ret_from_fork+0x10/0x20
[   32.995508] 
[   32.995744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   32.996268] page_type: f5(slab)
[   32.996349] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.996703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.996845] page dumped because: kasan: bad access detected
[   32.996920] 
[   32.997087] Memory state around the buggy address:
[   32.997180]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.997354]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.997522] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.997586]                                      ^
[   32.997874]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.997933]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.998093] ==================================================================
[   33.296983] ==================================================================
[   33.297105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   33.297479] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.297557] 
[   33.297601] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.298142] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.298573] Hardware name: linux,dummy-virt (DT)
[   33.298643] Call trace:
[   33.298688]  show_stack+0x20/0x38 (C)
[   33.298791]  dump_stack_lvl+0x8c/0xd0
[   33.298903]  print_report+0x118/0x5e8
[   33.299068]  kasan_report+0xdc/0x128
[   33.299175]  kasan_check_range+0x100/0x1a8
[   33.299325]  __kasan_check_write+0x20/0x30
[   33.299837]  kasan_atomics_helper+0x154c/0x4858
[   33.300100]  kasan_atomics+0x198/0x2e0
[   33.300374]  kunit_try_run_case+0x170/0x3f0
[   33.301022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.301396]  kthread+0x328/0x630
[   33.301525]  ret_from_fork+0x10/0x20
[   33.301669] 
[   33.301750] Allocated by task 296:
[   33.302167]  kasan_save_stack+0x3c/0x68
[   33.302248]  kasan_save_track+0x20/0x40
[   33.302521]  kasan_save_alloc_info+0x40/0x58
[   33.302604]  __kasan_kmalloc+0xd4/0xd8
[   33.302644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.302988]  kasan_atomics+0xb8/0x2e0
[   33.303312]  kunit_try_run_case+0x170/0x3f0
[   33.303580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.303940]  kthread+0x328/0x630
[   33.304677]  ret_from_fork+0x10/0x20
[   33.305400] 
[   33.305441] The buggy address belongs to the object at fff00000c9225780
[   33.305441]  which belongs to the cache kmalloc-64 of size 64
[   33.305503] The buggy address is located 0 bytes to the right of
[   33.305503]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.305568] 
[   33.305592] The buggy address belongs to the physical page:
[   33.305628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.305686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.305736] page_type: f5(slab)
[   33.305777] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.305840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.305992] page dumped because: kasan: bad access detected
[   33.306100] 
[   33.306177] Memory state around the buggy address:
[   33.306310]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.306427]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.306537] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.306627]                                      ^
[   33.306712]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.306768]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.306807] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   32.667212] ==================================================================
[   32.667266] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   32.667399] Read of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292
[   32.668624]  __asan_report_load8_noabort+0x20/0x30
[   32.669379]  ret_from_fork+0x10/0x20
[   32.669429] 
[   32.670268]  kasan_save_track+0x20/0x40
[   32.670908]  kunit_try_run_case+0x170/0x3f0
[   32.671890] The buggy address is located 8 bytes inside of
[   32.671890]  allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969)
[   32.673208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.675755] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   32.677249]  kthread+0x328/0x630
[   32.677292]  ret_from_fork+0x10/0x20
[   32.677341] 
[   32.677380] Allocated by task 292:
[   32.677412]  kasan_save_stack+0x3c/0x68
[   32.677705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.678359] The buggy address is located 8 bytes inside of
[   32.678359]  allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969)
[   32.679412] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.680288]  fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.682531] 
[   32.683100] Call trace:
[   32.683928]  kasan_bitops_generic+0x110/0x1c8
[   32.684162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.684439]  kthread+0x328/0x630
[   32.684527]  ret_from_fork+0x10/0x20
[   32.684580] 
[   32.684636] Allocated by task 292:
[   32.684672]  kasan_save_stack+0x3c/0x68
[   32.684717]  kasan_save_track+0x20/0x40
[   32.684885]  kasan_save_alloc_info+0x40/0x58
[   32.685403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.686033] The buggy address belongs to the object at fff00000c7b7a960
[   32.686033]  which belongs to the cache kmalloc-16 of size 16
[   32.686824] page_type: f5(slab)
[   32.687037] page dumped because: kasan: bad access detected
[   32.687192]  fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   32.688572] Write of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292
[   32.690426]  kunit_try_run_case+0x170/0x3f0
[   32.690770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.691178]  kthread+0x328/0x630
[   32.691546]  kasan_save_stack+0x3c/0x68
[   32.692450]  kunit_try_run_case+0x170/0x3f0
[   32.693396] The buggy address is located 8 bytes inside of
[   32.693396]  allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969)
[   32.694142] page_type: f5(slab)
[   32.694407] page dumped because: kasan: bad access detected
[   32.694696]                                                           ^
[   32.698200]  kasan_report+0xdc/0x128
[   32.698723]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   32.699166]  kunit_try_run_case+0x170/0x3f0
[   32.699773]  ret_from_fork+0x10/0x20
[   32.700310]  kasan_bitops_generic+0xa0/0x1c8
[   32.700454]  kthread+0x328/0x630
[   32.700632] The buggy address is located 8 bytes inside of
[   32.700632]  allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969)
[   32.701723] page dumped because: kasan: bad access detected
[   32.702515]                                                           ^
[   32.703883] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   32.705262]  kasan_report+0xdc/0x128
[   32.705548]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   32.706315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.707962]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.709050] 
[   32.709212] The buggy address is located 8 bytes inside of
[   32.709212]  allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969)
[   32.709752] page dumped because: kasan: bad access detected
[   32.710120]  fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.711897] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.712738]  kasan_check_range+0x100/0x1a8
[   32.712789]  __kasan_check_write+0x20/0x30
[   32.713166]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   32.713453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.715405]  kasan_bitops_generic+0xa0/0x1c8
[   32.715843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.716553] The buggy address is located 8 bytes inside of
[   32.716553]  allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969)
[   32.717441] page dumped because: kasan: bad access detected
[   32.718169] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.719799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   32.720543]  kasan_report+0xdc/0x128
[   32.720802]  kunit_try_run_case+0x170/0x3f0
[   32.721310]  kasan_bitops_generic+0xa0/0x1c8
[   32.721516] 
[   32.721666] 
[   32.721721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a
[   32.723295]                                                           ^
[   32.724697] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   32.725470]  dump_stack_lvl+0x8c/0xd0
[   32.725520]  print_report+0x118/0x5e8
[   32.725774]  kasan_report+0xdc/0x128
[   32.726125]  kasan_bitops_generic+0x110/0x1c8
[   32.727128]  kasan_save_stack+0x3c/0x68
[   32.727896]  kasan_bitops_generic+0xa0/0x1c8
[   32.728345]  kthread+0x328/0x630
[   32.728766] The buggy address is located 8 bytes inside of
[   32.728766]  allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969)
[   32.729895] page_type: f5(slab)
[   32.730417] page dumped because: kasan: bad access detected
[   32.730802]  fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   32.734526] Write of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292
[   32.735072]  show_stack+0x20/0x38 (C)
[   32.735136]  dump_stack_lvl+0x8c/0xd0
[   32.735294]  print_report+0x118/0x5e8
[   32.735354]  kasan_report+0xdc/0x128
[   32.735428]  kasan_check_range+0x100/0x1a8
[   32.735531]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   32.735921]  kasan_save_stack+0x3c/0x68
[   32.736056]  __kasan_kmalloc+0xd4/0xd8
[   32.736094]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.736264]  kthread+0x328/0x630
[   32.736357] The buggy address belongs to the object at fff00000c7b7a960
[   32.736357]  which belongs to the cache kmalloc-16 of size 16
[   32.736593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.736733] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.737954]                                                           ^
[   32.739548] Read of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292
[   32.739861] Hardware name: linux,dummy-virt (DT)
[   32.739899] Call trace:
[   32.740444]  __asan_report_load8_noabort+0x20/0x30
[   32.741301]  kthread+0x328/0x630
[   32.742198]  __kasan_kmalloc+0xd4/0xd8
[   32.743164]  kthread+0x328/0x630
[   32.743391] 
[   32.743590] The buggy address is located 8 bytes inside of
[   32.743590]  allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969)
[   32.744782] 
[   32.745498]                                                           ^
[   32.746806] ==================================================================
[   32.660058] ==================================================================
[   32.660119] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   32.660178] Write of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292
[   32.660229] 
[   32.660265] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.660355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.660387] Hardware name: linux,dummy-virt (DT)
[   32.660420] Call trace:
[   32.660444]  show_stack+0x20/0x38 (C)
[   32.660494]  dump_stack_lvl+0x8c/0xd0
[   32.660541]  print_report+0x118/0x5e8
[   32.660586]  kasan_report+0xdc/0x128
[   32.660630]  kasan_check_range+0x100/0x1a8
[   32.660678]  __kasan_check_write+0x20/0x30
[   32.660725]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   32.660779]  kasan_bitops_generic+0x110/0x1c8
[   32.661201]  kunit_try_run_case+0x170/0x3f0
[   32.661565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.661659]  kthread+0x328/0x630
[   32.661706]  ret_from_fork+0x10/0x20
[   32.662425] 
[   32.662480] Allocated by task 292:
[   32.662589]  kasan_save_stack+0x3c/0x68
[   32.662676]  kasan_save_track+0x20/0x40
[   32.662822]  kasan_save_alloc_info+0x40/0x58
[   32.662879]  __kasan_kmalloc+0xd4/0xd8
[   32.663231]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.663311]  kasan_bitops_generic+0xa0/0x1c8
[   32.663411]  kunit_try_run_case+0x170/0x3f0
[   32.663482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.663616]  kthread+0x328/0x630
[   32.663794]  ret_from_fork+0x10/0x20
[   32.663860] 
[   32.663882] The buggy address belongs to the object at fff00000c7b7a960
[   32.663882]  which belongs to the cache kmalloc-16 of size 16
[   32.663961] The buggy address is located 8 bytes inside of
[   32.663961]  allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969)
[   32.664313] 
[   32.664372] The buggy address belongs to the physical page:
[   32.664465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a
[   32.664580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.664713] page_type: f5(slab)
[   32.664787] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.664990] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.665176] page dumped because: kasan: bad access detected
[   32.665231] 
[   32.665311] Memory state around the buggy address:
[   32.665389]  fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.665499]  fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   32.665632] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.665711]                                                           ^
[   32.665820]  fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.665893]  fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.665948] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   32.645998] ==================================================================
[   32.646409] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   32.646485] Read of size 1 at addr fff00000c9227a10 by task kunit_try_catch/290
[   32.646546] 
[   32.646707] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.646935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.647002] Hardware name: linux,dummy-virt (DT)
[   32.647036] Call trace:
[   32.647106]  show_stack+0x20/0x38 (C)
[   32.647422]  dump_stack_lvl+0x8c/0xd0
[   32.647502]  print_report+0x118/0x5e8
[   32.647616]  kasan_report+0xdc/0x128
[   32.647669]  __asan_report_load1_noabort+0x20/0x30
[   32.647747]  strnlen+0x80/0x88
[   32.648067]  kasan_strings+0x478/0xb00
[   32.648230]  kunit_try_run_case+0x170/0x3f0
[   32.648286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.648340]  kthread+0x328/0x630
[   32.648624]  ret_from_fork+0x10/0x20
[   32.648706] 
[   32.648838] Allocated by task 290:
[   32.648910]  kasan_save_stack+0x3c/0x68
[   32.649022]  kasan_save_track+0x20/0x40
[   32.649240]  kasan_save_alloc_info+0x40/0x58
[   32.649443]  __kasan_kmalloc+0xd4/0xd8
[   32.649538]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.649648]  kasan_strings+0xc8/0xb00
[   32.649737]  kunit_try_run_case+0x170/0x3f0
[   32.649872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.649972]  kthread+0x328/0x630
[   32.650025]  ret_from_fork+0x10/0x20
[   32.650330] 
[   32.650379] Freed by task 290:
[   32.650525]  kasan_save_stack+0x3c/0x68
[   32.650640]  kasan_save_track+0x20/0x40
[   32.650685]  kasan_save_free_info+0x4c/0x78
[   32.650986]  __kasan_slab_free+0x6c/0x98
[   32.651165]  kfree+0x214/0x3c8
[   32.651273]  kasan_strings+0x24c/0xb00
[   32.651399]  kunit_try_run_case+0x170/0x3f0
[   32.651442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.651679]  kthread+0x328/0x630
[   32.651864]  ret_from_fork+0x10/0x20
[   32.651937] 
[   32.651961] The buggy address belongs to the object at fff00000c9227a00
[   32.651961]  which belongs to the cache kmalloc-32 of size 32
[   32.652144] The buggy address is located 16 bytes inside of
[   32.652144]  freed 32-byte region [fff00000c9227a00, fff00000c9227a20)
[   32.652214] 
[   32.652248] The buggy address belongs to the physical page:
[   32.652286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109227
[   32.652372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.652421] page_type: f5(slab)
[   32.652469] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.652523] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.652566] page dumped because: kasan: bad access detected
[   32.652599] 
[   32.652633] Memory state around the buggy address:
[   32.652675]  fff00000c9227900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.652721]  fff00000c9227980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.652766] >fff00000c9227a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.652828]                          ^
[   32.652859]  fff00000c9227a80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.653426]  fff00000c9227b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.653498] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   32.637694] ==================================================================
[   32.637750] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   32.637805] Read of size 1 at addr fff00000c9227a10 by task kunit_try_catch/290
[   32.637889] 
[   32.637921] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.638018] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.638051] Hardware name: linux,dummy-virt (DT)
[   32.638084] Call trace:
[   32.638107]  show_stack+0x20/0x38 (C)
[   32.638163]  dump_stack_lvl+0x8c/0xd0
[   32.638210]  print_report+0x118/0x5e8
[   32.638258]  kasan_report+0xdc/0x128
[   32.638314]  __asan_report_load1_noabort+0x20/0x30
[   32.638367]  strlen+0xa8/0xb0
[   32.638412]  kasan_strings+0x418/0xb00
[   32.638460]  kunit_try_run_case+0x170/0x3f0
[   32.638508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.638570]  kthread+0x328/0x630
[   32.638616]  ret_from_fork+0x10/0x20
[   32.638663] 
[   32.638683] Allocated by task 290:
[   32.638719]  kasan_save_stack+0x3c/0x68
[   32.638760]  kasan_save_track+0x20/0x40
[   32.638797]  kasan_save_alloc_info+0x40/0x58
[   32.639465]  __kasan_kmalloc+0xd4/0xd8
[   32.639529]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.639610]  kasan_strings+0xc8/0xb00
[   32.639658]  kunit_try_run_case+0x170/0x3f0
[   32.639702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.640113]  kthread+0x328/0x630
[   32.640202]  ret_from_fork+0x10/0x20
[   32.640245] 
[   32.640268] Freed by task 290:
[   32.640522]  kasan_save_stack+0x3c/0x68
[   32.640589]  kasan_save_track+0x20/0x40
[   32.640872]  kasan_save_free_info+0x4c/0x78
[   32.640967]  __kasan_slab_free+0x6c/0x98
[   32.641260]  kfree+0x214/0x3c8
[   32.641358]  kasan_strings+0x24c/0xb00
[   32.641607]  kunit_try_run_case+0x170/0x3f0
[   32.641683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.642016]  kthread+0x328/0x630
[   32.642130]  ret_from_fork+0x10/0x20
[   32.642214] 
[   32.642297] The buggy address belongs to the object at fff00000c9227a00
[   32.642297]  which belongs to the cache kmalloc-32 of size 32
[   32.642382] The buggy address is located 16 bytes inside of
[   32.642382]  freed 32-byte region [fff00000c9227a00, fff00000c9227a20)
[   32.642538] 
[   32.642608] The buggy address belongs to the physical page:
[   32.642703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109227
[   32.642863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.642932] page_type: f5(slab)
[   32.643314] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.643440] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.643518] page dumped because: kasan: bad access detected
[   32.643633] 
[   32.643656] Memory state around the buggy address:
[   32.643689]  fff00000c9227900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.644009]  fff00000c9227980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.644105] >fff00000c9227a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.644205]                          ^
[   32.644291]  fff00000c9227a80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.644572]  fff00000c9227b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.644690] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   32.627828] ==================================================================
[   32.627994] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   32.628073] Read of size 1 at addr fff00000c9227a10 by task kunit_try_catch/290
[   32.628397] 
[   32.628460] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.628850] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.628902] Hardware name: linux,dummy-virt (DT)
[   32.629014] Call trace:
[   32.629077]  show_stack+0x20/0x38 (C)
[   32.629230]  dump_stack_lvl+0x8c/0xd0
[   32.629354]  print_report+0x118/0x5e8
[   32.629501]  kasan_report+0xdc/0x128
[   32.629552]  __asan_report_load1_noabort+0x20/0x30
[   32.629603]  kasan_strings+0x95c/0xb00
[   32.630023]  kunit_try_run_case+0x170/0x3f0
[   32.630146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.630308]  kthread+0x328/0x630
[   32.630406]  ret_from_fork+0x10/0x20
[   32.630589] 
[   32.630648] Allocated by task 290:
[   32.630680]  kasan_save_stack+0x3c/0x68
[   32.631032]  kasan_save_track+0x20/0x40
[   32.631107]  kasan_save_alloc_info+0x40/0x58
[   32.631220]  __kasan_kmalloc+0xd4/0xd8
[   32.631297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.631383]  kasan_strings+0xc8/0xb00
[   32.631425]  kunit_try_run_case+0x170/0x3f0
[   32.631599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.631676]  kthread+0x328/0x630
[   32.631712]  ret_from_fork+0x10/0x20
[   32.632185] 
[   32.632249] Freed by task 290:
[   32.632339]  kasan_save_stack+0x3c/0x68
[   32.632389]  kasan_save_track+0x20/0x40
[   32.632474]  kasan_save_free_info+0x4c/0x78
[   32.632869]  __kasan_slab_free+0x6c/0x98
[   32.632940]  kfree+0x214/0x3c8
[   32.633077]  kasan_strings+0x24c/0xb00
[   32.633169]  kunit_try_run_case+0x170/0x3f0
[   32.633302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.633381]  kthread+0x328/0x630
[   32.633418]  ret_from_fork+0x10/0x20
[   32.633746] 
[   32.633831] The buggy address belongs to the object at fff00000c9227a00
[   32.633831]  which belongs to the cache kmalloc-32 of size 32
[   32.633963] The buggy address is located 16 bytes inside of
[   32.633963]  freed 32-byte region [fff00000c9227a00, fff00000c9227a20)
[   32.634076] 
[   32.634166] The buggy address belongs to the physical page:
[   32.634266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109227
[   32.634661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.634855] page_type: f5(slab)
[   32.634924] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.635123] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.635211] page dumped because: kasan: bad access detected
[   32.635344] 
[   32.635365] Memory state around the buggy address:
[   32.635400]  fff00000c9227900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.635782]  fff00000c9227980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.636155] >fff00000c9227a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.636224]                          ^
[   32.636325]  fff00000c9227a80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.636432]  fff00000c9227b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.636590] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   32.618527] ==================================================================
[   32.618576] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   32.618634] Read of size 1 at addr fff00000c9227a10 by task kunit_try_catch/290
[   32.618685] 
[   32.618720] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.618828] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.618860] Hardware name: linux,dummy-virt (DT)
[   32.619029] Call trace:
[   32.619065]  show_stack+0x20/0x38 (C)
[   32.619122]  dump_stack_lvl+0x8c/0xd0
[   32.619171]  print_report+0x118/0x5e8
[   32.619219]  kasan_report+0xdc/0x128
[   32.619264]  __asan_report_load1_noabort+0x20/0x30
[   32.619316]  strcmp+0xc0/0xc8
[   32.619361]  kasan_strings+0x340/0xb00
[   32.619435]  kunit_try_run_case+0x170/0x3f0
[   32.619486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.619538]  kthread+0x328/0x630
[   32.619583]  ret_from_fork+0x10/0x20
[   32.619641] 
[   32.619663] Allocated by task 290:
[   32.619694]  kasan_save_stack+0x3c/0x68
[   32.619747]  kasan_save_track+0x20/0x40
[   32.619786]  kasan_save_alloc_info+0x40/0x58
[   32.620725]  __kasan_kmalloc+0xd4/0xd8
[   32.621106]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.621231]  kasan_strings+0xc8/0xb00
[   32.621326]  kunit_try_run_case+0x170/0x3f0
[   32.621643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.621738]  kthread+0x328/0x630
[   32.621781]  ret_from_fork+0x10/0x20
[   32.622057] 
[   32.622135] Freed by task 290:
[   32.622271]  kasan_save_stack+0x3c/0x68
[   32.622357]  kasan_save_track+0x20/0x40
[   32.622513]  kasan_save_free_info+0x4c/0x78
[   32.622589]  __kasan_slab_free+0x6c/0x98
[   32.622941]  kfree+0x214/0x3c8
[   32.623012]  kasan_strings+0x24c/0xb00
[   32.623148]  kunit_try_run_case+0x170/0x3f0
[   32.623235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.623367]  kthread+0x328/0x630
[   32.623402]  ret_from_fork+0x10/0x20
[   32.623728] 
[   32.623779] The buggy address belongs to the object at fff00000c9227a00
[   32.623779]  which belongs to the cache kmalloc-32 of size 32
[   32.623928] The buggy address is located 16 bytes inside of
[   32.623928]  freed 32-byte region [fff00000c9227a00, fff00000c9227a20)
[   32.624054] 
[   32.624450] The buggy address belongs to the physical page:
[   32.624537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109227
[   32.624674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.624779] page_type: f5(slab)
[   32.624868] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.625160] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.625242] page dumped because: kasan: bad access detected
[   32.625557] 
[   32.625602] Memory state around the buggy address:
[   32.625730]  fff00000c9227900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.625906]  fff00000c9227980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.626003] >fff00000c9227a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.626057]                          ^
[   32.626092]  fff00000c9227a80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.626390]  fff00000c9227b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.626576] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   32.597847] ==================================================================
[   32.597911] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   32.597972] Read of size 1 at addr fff00000c9227858 by task kunit_try_catch/288
[   32.598025] 
[   32.598059] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.598150] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.598187] Hardware name: linux,dummy-virt (DT)
[   32.598220] Call trace:
[   32.598245]  show_stack+0x20/0x38 (C)
[   32.598298]  dump_stack_lvl+0x8c/0xd0
[   32.598348]  print_report+0x118/0x5e8
[   32.598394]  kasan_report+0xdc/0x128
[   32.598440]  __asan_report_load1_noabort+0x20/0x30
[   32.598492]  memcmp+0x198/0x1d8
[   32.598538]  kasan_memcmp+0x16c/0x300
[   32.598585]  kunit_try_run_case+0x170/0x3f0
[   32.598636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.598691]  kthread+0x328/0x630
[   32.598735]  ret_from_fork+0x10/0x20
[   32.598786] 
[   32.598808] Allocated by task 288:
[   32.598872]  kasan_save_stack+0x3c/0x68
[   32.598933]  kasan_save_track+0x20/0x40
[   32.598971]  kasan_save_alloc_info+0x40/0x58
[   32.599017]  __kasan_kmalloc+0xd4/0xd8
[   32.599056]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.599101]  kasan_memcmp+0xbc/0x300
[   32.599140]  kunit_try_run_case+0x170/0x3f0
[   32.599179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.599224]  kthread+0x328/0x630
[   32.599260]  ret_from_fork+0x10/0x20
[   32.599299] 
[   32.599321] The buggy address belongs to the object at fff00000c9227840
[   32.599321]  which belongs to the cache kmalloc-32 of size 32
[   32.599381] The buggy address is located 0 bytes to the right of
[   32.599381]  allocated 24-byte region [fff00000c9227840, fff00000c9227858)
[   32.599447] 
[   32.599469] The buggy address belongs to the physical page:
[   32.599506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109227
[   32.599561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.599609] page_type: f5(slab)
[   32.599660] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.599720] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.599762] page dumped because: kasan: bad access detected
[   32.599795] 
[   32.601043] Memory state around the buggy address:
[   32.601431]  fff00000c9227700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.601602]  fff00000c9227780: 00 00 00 04 fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.601798] >fff00000c9227800: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.602103]                                                     ^
[   32.602378]  fff00000c9227880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.602461]  fff00000c9227900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.602839] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   32.572889] ==================================================================
[   32.573124] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   32.573232] Read of size 1 at addr ffff800080a37b4a by task kunit_try_catch/284
[   32.573356] 
[   32.573413] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.573523] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.573557] Hardware name: linux,dummy-virt (DT)
[   32.573589] Call trace:
[   32.573616]  show_stack+0x20/0x38 (C)
[   32.573668]  dump_stack_lvl+0x8c/0xd0
[   32.573717]  print_report+0x310/0x5e8
[   32.573942]  kasan_report+0xdc/0x128
[   32.574022]  __asan_report_load1_noabort+0x20/0x30
[   32.574339]  kasan_alloca_oob_right+0x2dc/0x340
[   32.574438]  kunit_try_run_case+0x170/0x3f0
[   32.574594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.574704]  kthread+0x328/0x630
[   32.575105]  ret_from_fork+0x10/0x20
[   32.575313] 
[   32.575387] The buggy address belongs to stack of task kunit_try_catch/284
[   32.575473] 
[   32.575576] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080a30000 allocated at kernel_clone+0x150/0x7b0
[   32.575972] The buggy address belongs to the physical page:
[   32.576106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xfff00000c95f10c8 pfn:0x1095f1
[   32.576233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.576298] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.576398] raw: fff00000c95f10c8 0000000000000000 00000001ffffffff 0000000000000000
[   32.576452] page dumped because: kasan: bad access detected
[   32.576488] 
[   32.576508] Memory state around the buggy address:
[   32.576551]  ffff800080a37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.576598]  ffff800080a37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.576640] >ffff800080a37b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   32.576679]                                               ^
[   32.576726]  ffff800080a37b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   32.576779]  ffff800080a37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.576840] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   32.560438] ==================================================================
[   32.560540] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   32.560728] Read of size 1 at addr ffff800080b37b5f by task kunit_try_catch/282
[   32.560785] 
[   32.561010] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.561246] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.561339] Hardware name: linux,dummy-virt (DT)
[   32.561431] Call trace:
[   32.561541]  show_stack+0x20/0x38 (C)
[   32.561748]  dump_stack_lvl+0x8c/0xd0
[   32.561802]  print_report+0x310/0x5e8
[   32.562174]  kasan_report+0xdc/0x128
[   32.562329]  __asan_report_load1_noabort+0x20/0x30
[   32.562438]  kasan_alloca_oob_left+0x2b8/0x310
[   32.562604]  kunit_try_run_case+0x170/0x3f0
[   32.562730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.562890]  kthread+0x328/0x630
[   32.562945]  ret_from_fork+0x10/0x20
[   32.563363] 
[   32.563423] The buggy address belongs to stack of task kunit_try_catch/282
[   32.563570] 
[   32.563661] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080b30000 allocated at kernel_clone+0x150/0x7b0
[   32.563882] The buggy address belongs to the physical page:
[   32.564228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109253
[   32.564310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.564466] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.564603] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.564698] page dumped because: kasan: bad access detected
[   32.564773] 
[   32.564863] Memory state around the buggy address:
[   32.564958]  ffff800080b37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.565011]  ffff800080b37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.565389] >ffff800080b37b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   32.565461]                                                     ^
[   32.565573]  ffff800080b37b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   32.565689]  ffff800080b37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.565825] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   32.542329] ==================================================================
[   32.542478] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   32.543009] Read of size 1 at addr ffff800080b37c2a by task kunit_try_catch/280
[   32.543354] 
[   32.543426] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.543524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.543564] Hardware name: linux,dummy-virt (DT)
[   32.543598] Call trace:
[   32.543623]  show_stack+0x20/0x38 (C)
[   32.543676]  dump_stack_lvl+0x8c/0xd0
[   32.543863]  print_report+0x310/0x5e8
[   32.543953]  kasan_report+0xdc/0x128
[   32.544117]  __asan_report_load1_noabort+0x20/0x30
[   32.544181]  kasan_stack_oob+0x238/0x270
[   32.544358]  kunit_try_run_case+0x170/0x3f0
[   32.544615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.544901]  kthread+0x328/0x630
[   32.545185]  ret_from_fork+0x10/0x20
[   32.545479] 
[   32.546330] The buggy address belongs to stack of task kunit_try_catch/280
[   32.546623]  and is located at offset 138 in frame:
[   32.546799]  kasan_stack_oob+0x0/0x270
[   32.547206] 
[   32.547416] This frame has 4 objects:
[   32.547896]  [48, 49) '__assertion'
[   32.548284]  [64, 72) 'array'
[   32.548337]  [96, 112) '__assertion'
[   32.548538]  [128, 138) 'stack_array'
[   32.548596] 
[   32.548900] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080b30000 allocated at kernel_clone+0x150/0x7b0
[   32.549081] The buggy address belongs to the physical page:
[   32.549257] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109253
[   32.549542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.549659] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.549736] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.550145] page dumped because: kasan: bad access detected
[   32.550204] 
[   32.550356] Memory state around the buggy address:
[   32.550440]  ffff800080b37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.550708]  ffff800080b37b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   32.550760] >ffff800080b37c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   32.551148]                                   ^
[   32.551206]  ffff800080b37c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   32.551378]  ffff800080b37d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.551424] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   32.515552] ==================================================================
[   32.515616] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   32.515674] Read of size 1 at addr ffff97f87258f68d by task kunit_try_catch/276
[   32.515727] 
[   32.515765] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.516698] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.516778] Hardware name: linux,dummy-virt (DT)
[   32.516836] Call trace:
[   32.516884]  show_stack+0x20/0x38 (C)
[   32.516976]  dump_stack_lvl+0x8c/0xd0
[   32.517052]  print_report+0x310/0x5e8
[   32.517139]  kasan_report+0xdc/0x128
[   32.517315]  __asan_report_load1_noabort+0x20/0x30
[   32.517379]  kasan_global_oob_right+0x230/0x270
[   32.517438]  kunit_try_run_case+0x170/0x3f0
[   32.517828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.518012]  kthread+0x328/0x630
[   32.518181]  ret_from_fork+0x10/0x20
[   32.518261] 
[   32.518627] The buggy address belongs to the variable:
[   32.519035]  global_array+0xd/0x40
[   32.519184] 
[   32.519300] The buggy address belongs to a 0-page vmalloc region starting at 0xffff97f8706f0000 allocated at paging_init+0x66c/0x7d0
[   32.520798] The buggy address belongs to the physical page:
[   32.521000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d8f
[   32.521166] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   32.521417] raw: 03fffe0000002000 ffffc1ffc01f63c8 ffffc1ffc01f63c8 0000000000000000
[   32.521650] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.521755] page dumped because: kasan: bad access detected
[   32.521787] 
[   32.521852] Memory state around the buggy address:
[   32.522109]  ffff97f87258f580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.522294]  ffff97f87258f600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   32.522387] >ffff97f87258f680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   32.522798]                       ^
[   32.522954]  ffff97f87258f700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   32.523057]  ffff97f87258f780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.523495] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   32.484869] ==================================================================
[   32.485140] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.485205] Free of addr fff00000c9a95f01 by task kunit_try_catch/272
[   32.485276] 
[   32.485315] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.485683] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.485767] Hardware name: linux,dummy-virt (DT)
[   32.485809] Call trace:
[   32.485978]  show_stack+0x20/0x38 (C)
[   32.486041]  dump_stack_lvl+0x8c/0xd0
[   32.486232]  print_report+0x118/0x5e8
[   32.486432]  kasan_report_invalid_free+0xc0/0xe8
[   32.486621]  check_slab_allocation+0xfc/0x108
[   32.486697]  __kasan_mempool_poison_object+0x78/0x150
[   32.487058]  mempool_free+0x3f4/0x5f0
[   32.487138]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.487295]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.487440]  kunit_try_run_case+0x170/0x3f0
[   32.487550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.487627]  kthread+0x328/0x630
[   32.487763]  ret_from_fork+0x10/0x20
[   32.487832] 
[   32.487852] Allocated by task 272:
[   32.488024]  kasan_save_stack+0x3c/0x68
[   32.488220]  kasan_save_track+0x20/0x40
[   32.488283]  kasan_save_alloc_info+0x40/0x58
[   32.488421]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.488560]  remove_element+0x130/0x1f8
[   32.488665]  mempool_alloc_preallocated+0x58/0xc0
[   32.488708]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   32.488776]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.489160]  kunit_try_run_case+0x170/0x3f0
[   32.489222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.489350]  kthread+0x328/0x630
[   32.489430]  ret_from_fork+0x10/0x20
[   32.489583] 
[   32.489652] The buggy address belongs to the object at fff00000c9a95f00
[   32.489652]  which belongs to the cache kmalloc-128 of size 128
[   32.489891] The buggy address is located 1 bytes inside of
[   32.489891]  128-byte region [fff00000c9a95f00, fff00000c9a95f80)
[   32.489958] 
[   32.489978] The buggy address belongs to the physical page:
[   32.490023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95
[   32.490223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.490310] page_type: f5(slab)
[   32.490433] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.490538] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   32.490653] page dumped because: kasan: bad access detected
[   32.490735] 
[   32.490802] Memory state around the buggy address:
[   32.490943]  fff00000c9a95e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.490988]  fff00000c9a95e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.491201] >fff00000c9a95f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.491372]                    ^
[   32.491460]  fff00000c9a95f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.491594]  fff00000c9a96000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.491734] ==================================================================
[   32.499323] ==================================================================
[   32.499389] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.499444] Free of addr fff00000c9ba4001 by task kunit_try_catch/274
[   32.499652] 
[   32.500126] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.500241] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.500308] Hardware name: linux,dummy-virt (DT)
[   32.500345] Call trace:
[   32.500578]  show_stack+0x20/0x38 (C)
[   32.500663]  dump_stack_lvl+0x8c/0xd0
[   32.500889]  print_report+0x118/0x5e8
[   32.500997]  kasan_report_invalid_free+0xc0/0xe8
[   32.501311]  __kasan_mempool_poison_object+0xfc/0x150
[   32.501636]  mempool_free+0x3f4/0x5f0
[   32.502125]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.502257]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   32.502351]  kunit_try_run_case+0x170/0x3f0
[   32.502501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.502635]  kthread+0x328/0x630
[   32.502704]  ret_from_fork+0x10/0x20
[   32.502839] 
[   32.502895] The buggy address belongs to the physical page:
[   32.502999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba4
[   32.503079] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.503422] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.503520] page_type: f8(unknown)
[   32.503596] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.503706] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.503922] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.504119] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.504234] head: 0bfffe0000000002 ffffc1ffc326e901 00000000ffffffff 00000000ffffffff
[   32.504468] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.504653] page dumped because: kasan: bad access detected
[   32.504729] 
[   32.504752] Memory state around the buggy address:
[   32.504822]  fff00000c9ba3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.505001]  fff00000c9ba3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.505227] >fff00000c9ba4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.505293]                    ^
[   32.505324]  fff00000c9ba4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.505376]  fff00000c9ba4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.505417] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   32.436447] ==================================================================
[   32.436511] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.436569] Free of addr fff00000c9a95b00 by task kunit_try_catch/266
[   32.436611] 
[   32.436644] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.436780] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.437673] Hardware name: linux,dummy-virt (DT)
[   32.437767] Call trace:
[   32.437833]  show_stack+0x20/0x38 (C)
[   32.437932]  dump_stack_lvl+0x8c/0xd0
[   32.438012]  print_report+0x118/0x5e8
[   32.438347]  kasan_report_invalid_free+0xc0/0xe8
[   32.438486]  check_slab_allocation+0xd4/0x108
[   32.438569]  __kasan_mempool_poison_object+0x78/0x150
[   32.438639]  mempool_free+0x3f4/0x5f0
[   32.438725]  mempool_double_free_helper+0x150/0x2e8
[   32.439013]  mempool_kmalloc_double_free+0xc0/0x118
[   32.439449]  kunit_try_run_case+0x170/0x3f0
[   32.439891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.440031]  kthread+0x328/0x630
[   32.440127]  ret_from_fork+0x10/0x20
[   32.440488] 
[   32.440540] Allocated by task 266:
[   32.440592]  kasan_save_stack+0x3c/0x68
[   32.440734]  kasan_save_track+0x20/0x40
[   32.440792]  kasan_save_alloc_info+0x40/0x58
[   32.440845]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.441235]  remove_element+0x130/0x1f8
[   32.441337]  mempool_alloc_preallocated+0x58/0xc0
[   32.441396]  mempool_double_free_helper+0x94/0x2e8
[   32.441437]  mempool_kmalloc_double_free+0xc0/0x118
[   32.441782]  kunit_try_run_case+0x170/0x3f0
[   32.441893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.441972]  kthread+0x328/0x630
[   32.442051]  ret_from_fork+0x10/0x20
[   32.442472] 
[   32.442613] Freed by task 266:
[   32.442691]  kasan_save_stack+0x3c/0x68
[   32.442807]  kasan_save_track+0x20/0x40
[   32.442891]  kasan_save_free_info+0x4c/0x78
[   32.442936]  __kasan_mempool_poison_object+0xc0/0x150
[   32.443311]  mempool_free+0x3f4/0x5f0
[   32.443416]  mempool_double_free_helper+0x100/0x2e8
[   32.443489]  mempool_kmalloc_double_free+0xc0/0x118
[   32.443862]  kunit_try_run_case+0x170/0x3f0
[   32.443918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.444189]  kthread+0x328/0x630
[   32.444332]  ret_from_fork+0x10/0x20
[   32.444547] 
[   32.444656] The buggy address belongs to the object at fff00000c9a95b00
[   32.444656]  which belongs to the cache kmalloc-128 of size 128
[   32.445173] The buggy address is located 0 bytes inside of
[   32.445173]  128-byte region [fff00000c9a95b00, fff00000c9a95b80)
[   32.445272] 
[   32.445310] The buggy address belongs to the physical page:
[   32.445351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95
[   32.445406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.445786] page_type: f5(slab)
[   32.445866] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.445919] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.445960] page dumped because: kasan: bad access detected
[   32.446008] 
[   32.446026] Memory state around the buggy address:
[   32.446076]  fff00000c9a95a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.446136]  fff00000c9a95a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.446185] >fff00000c9a95b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.446223]                    ^
[   32.446251]  fff00000c9a95b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.446303]  fff00000c9a95c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.446341] ==================================================================
[   32.471350] ==================================================================
[   32.471414] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.471827] Free of addr fff00000c9ba0000 by task kunit_try_catch/270
[   32.471888] 
[   32.471923] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.472023] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.472144] Hardware name: linux,dummy-virt (DT)
[   32.472193] Call trace:
[   32.472218]  show_stack+0x20/0x38 (C)
[   32.472553]  dump_stack_lvl+0x8c/0xd0
[   32.472632]  print_report+0x118/0x5e8
[   32.472794]  kasan_report_invalid_free+0xc0/0xe8
[   32.472948]  __kasan_mempool_poison_pages+0xe0/0xe8
[   32.473036]  mempool_free+0x3ac/0x5f0
[   32.473165]  mempool_double_free_helper+0x150/0x2e8
[   32.473275]  mempool_page_alloc_double_free+0xbc/0x118
[   32.473328]  kunit_try_run_case+0x170/0x3f0
[   32.473375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.473434]  kthread+0x328/0x630
[   32.473778]  ret_from_fork+0x10/0x20
[   32.473877] 
[   32.473972] The buggy address belongs to the physical page:
[   32.474060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba0
[   32.474146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.474358] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.474422] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.474803] page dumped because: kasan: bad access detected
[   32.474867] 
[   32.475157] Memory state around the buggy address:
[   32.475337]  fff00000c9b9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.475438]  fff00000c9b9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.475486] >fff00000c9ba0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.475531]                    ^
[   32.475559]  fff00000c9ba0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.475602]  fff00000c9ba0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.475640] ==================================================================
[   32.454600] ==================================================================
[   32.454658] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.454709] Free of addr fff00000c9ba0000 by task kunit_try_catch/268
[   32.454752] 
[   32.454782] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.454904] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.454942] Hardware name: linux,dummy-virt (DT)
[   32.454979] Call trace:
[   32.455002]  show_stack+0x20/0x38 (C)
[   32.455049]  dump_stack_lvl+0x8c/0xd0
[   32.455095]  print_report+0x118/0x5e8
[   32.455137]  kasan_report_invalid_free+0xc0/0xe8
[   32.455184]  __kasan_mempool_poison_object+0x14c/0x150
[   32.455231]  mempool_free+0x3f4/0x5f0
[   32.455274]  mempool_double_free_helper+0x150/0x2e8
[   32.455323]  mempool_kmalloc_large_double_free+0xc0/0x118
[   32.455374]  kunit_try_run_case+0x170/0x3f0
[   32.455421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.455471]  kthread+0x328/0x630
[   32.455513]  ret_from_fork+0x10/0x20
[   32.455559] 
[   32.455588] The buggy address belongs to the physical page:
[   32.455623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba0
[   32.455676] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.455725] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.455777] page_type: f8(unknown)
[   32.456301] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.456364] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.456880] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.456961] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.457032] head: 0bfffe0000000002 ffffc1ffc326e801 00000000ffffffff 00000000ffffffff
[   32.457107] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.457298] page dumped because: kasan: bad access detected
[   32.457440] 
[   32.457508] Memory state around the buggy address:
[   32.458170]  fff00000c9b9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.458269]  fff00000c9b9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.458501] >fff00000c9ba0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.458545]                    ^
[   32.458576]  fff00000c9ba0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.458627]  fff00000c9ba0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.458665] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   30.788745] ==================================================================
[   30.788809] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   30.789002] Read of size 1 at addr fff00000c925e0c8 by task kunit_try_catch/238
[   30.789058] 
[   30.790011] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.790139] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.790198] Hardware name: linux,dummy-virt (DT)
[   30.790274] Call trace:
[   30.790298]  show_stack+0x20/0x38 (C)
[   30.790538]  dump_stack_lvl+0x8c/0xd0
[   30.790598]  print_report+0x118/0x5e8
[   30.790717]  kasan_report+0xdc/0x128
[   30.791159]  __asan_report_load1_noabort+0x20/0x30
[   30.791259]  kmem_cache_oob+0x344/0x430
[   30.791570]  kunit_try_run_case+0x170/0x3f0
[   30.791774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.791984]  kthread+0x328/0x630
[   30.792064]  ret_from_fork+0x10/0x20
[   30.792242] 
[   30.792281] Allocated by task 238:
[   30.792309]  kasan_save_stack+0x3c/0x68
[   30.792615]  kasan_save_track+0x20/0x40
[   30.792688]  kasan_save_alloc_info+0x40/0x58
[   30.792782]  __kasan_slab_alloc+0xa8/0xb0
[   30.792926]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.792968]  kmem_cache_oob+0x12c/0x430
[   30.793309]  kunit_try_run_case+0x170/0x3f0
[   30.793458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.793575]  kthread+0x328/0x630
[   30.793951]  ret_from_fork+0x10/0x20
[   30.794045] 
[   30.794097] The buggy address belongs to the object at fff00000c925e000
[   30.794097]  which belongs to the cache test_cache of size 200
[   30.794257] The buggy address is located 0 bytes to the right of
[   30.794257]  allocated 200-byte region [fff00000c925e000, fff00000c925e0c8)
[   30.794352] 
[   30.794673] The buggy address belongs to the physical page:
[   30.794740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10925e
[   30.795115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.795213] page_type: f5(slab)
[   30.795350] raw: 0bfffe0000000000 fff00000c3f36780 dead000000000122 0000000000000000
[   30.795436] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.795763] page dumped because: kasan: bad access detected
[   30.795847] 
[   30.795921] Memory state around the buggy address:
[   30.796012]  fff00000c925df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.796166]  fff00000c925e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.796240] >fff00000c925e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   30.796279]                                               ^
[   30.796490]  fff00000c925e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.796670]  fff00000c925e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.796723] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   32.420033] ==================================================================
[   32.420100] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.420170] Read of size 1 at addr fff00000c9ba0000 by task kunit_try_catch/264
[   32.420220] 
[   32.420260] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.420353] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.420383] Hardware name: linux,dummy-virt (DT)
[   32.420415] Call trace:
[   32.420439]  show_stack+0x20/0x38 (C)
[   32.420500]  dump_stack_lvl+0x8c/0xd0
[   32.420556]  print_report+0x118/0x5e8
[   32.420617]  kasan_report+0xdc/0x128
[   32.420668]  __asan_report_load1_noabort+0x20/0x30
[   32.420717]  mempool_uaf_helper+0x314/0x340
[   32.420762]  mempool_page_alloc_uaf+0xc0/0x118
[   32.420823]  kunit_try_run_case+0x170/0x3f0
[   32.421538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.421615]  kthread+0x328/0x630
[   32.421740]  ret_from_fork+0x10/0x20
[   32.421877] 
[   32.421978] The buggy address belongs to the physical page:
[   32.422066] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba0
[   32.422271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.422369] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.422807] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.422903] page dumped because: kasan: bad access detected
[   32.422981] 
[   32.423108] Memory state around the buggy address:
[   32.423241]  fff00000c9b9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.423299]  fff00000c9b9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.423540] >fff00000c9ba0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.423758]                    ^
[   32.423900]  fff00000c9ba0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.423998]  fff00000c9ba0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.424384] ==================================================================
[   32.363906] ==================================================================
[   32.364151] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.364351] Read of size 1 at addr fff00000c9ba0000 by task kunit_try_catch/260
[   32.364425] 
[   32.364481] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.364572] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.364599] Hardware name: linux,dummy-virt (DT)
[   32.364841] Call trace:
[   32.364878]  show_stack+0x20/0x38 (C)
[   32.364997]  dump_stack_lvl+0x8c/0xd0
[   32.365054]  print_report+0x118/0x5e8
[   32.365105]  kasan_report+0xdc/0x128
[   32.365147]  __asan_report_load1_noabort+0x20/0x30
[   32.365332]  mempool_uaf_helper+0x314/0x340
[   32.365583]  mempool_kmalloc_large_uaf+0xc4/0x120
[   32.366004]  kunit_try_run_case+0x170/0x3f0
[   32.366146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.366334]  kthread+0x328/0x630
[   32.366411]  ret_from_fork+0x10/0x20
[   32.366607] 
[   32.366640] The buggy address belongs to the physical page:
[   32.366688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba0
[   32.366776] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.366860] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.366914] page_type: f8(unknown)
[   32.366978] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.367029] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.367086] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.367141] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.367191] head: 0bfffe0000000002 ffffc1ffc326e801 00000000ffffffff 00000000ffffffff
[   32.367245] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.367291] page dumped because: kasan: bad access detected
[   32.367330] 
[   32.367347] Memory state around the buggy address:
[   32.367388]  fff00000c9b9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.367430]  fff00000c9b9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.367494] >fff00000c9ba0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.367532]                    ^
[   32.367559]  fff00000c9ba0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.367602]  fff00000c9ba0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.367655] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   32.377755] ==================================================================
[   32.377958] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.378023] Read of size 1 at addr fff00000c921c240 by task kunit_try_catch/262
[   32.378079] 
[   32.378267] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.378372] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.378410] Hardware name: linux,dummy-virt (DT)
[   32.378440] Call trace:
[   32.378473]  show_stack+0x20/0x38 (C)
[   32.378525]  dump_stack_lvl+0x8c/0xd0
[   32.378569]  print_report+0x118/0x5e8
[   32.378806]  kasan_report+0xdc/0x128
[   32.378935]  __asan_report_load1_noabort+0x20/0x30
[   32.379156]  mempool_uaf_helper+0x314/0x340
[   32.379225]  mempool_slab_uaf+0xc0/0x118
[   32.379306]  kunit_try_run_case+0x170/0x3f0
[   32.379359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.379433]  kthread+0x328/0x630
[   32.379500]  ret_from_fork+0x10/0x20
[   32.379547] 
[   32.379702] Allocated by task 262:
[   32.379745]  kasan_save_stack+0x3c/0x68
[   32.379790]  kasan_save_track+0x20/0x40
[   32.379983]  kasan_save_alloc_info+0x40/0x58
[   32.380029]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.380077]  remove_element+0x16c/0x1f8
[   32.380116]  mempool_alloc_preallocated+0x58/0xc0
[   32.380336]  mempool_uaf_helper+0xa4/0x340
[   32.380502]  mempool_slab_uaf+0xc0/0x118
[   32.380548]  kunit_try_run_case+0x170/0x3f0
[   32.380595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.380653]  kthread+0x328/0x630
[   32.380691]  ret_from_fork+0x10/0x20
[   32.380728] 
[   32.380747] Freed by task 262:
[   32.380775]  kasan_save_stack+0x3c/0x68
[   32.381012]  kasan_save_track+0x20/0x40
[   32.381121]  kasan_save_free_info+0x4c/0x78
[   32.381262]  __kasan_mempool_poison_object+0xc0/0x150
[   32.381351]  mempool_free+0x3f4/0x5f0
[   32.381396]  mempool_uaf_helper+0x104/0x340
[   32.381600]  mempool_slab_uaf+0xc0/0x118
[   32.381647]  kunit_try_run_case+0x170/0x3f0
[   32.381739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.381823]  kthread+0x328/0x630
[   32.381912]  ret_from_fork+0x10/0x20
[   32.382019] 
[   32.382094] The buggy address belongs to the object at fff00000c921c240
[   32.382094]  which belongs to the cache test_cache of size 123
[   32.382350] The buggy address is located 0 bytes inside of
[   32.382350]  freed 123-byte region [fff00000c921c240, fff00000c921c2bb)
[   32.382525] 
[   32.382585] The buggy address belongs to the physical page:
[   32.382732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10921c
[   32.382802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.383035] page_type: f5(slab)
[   32.383204] raw: 0bfffe0000000000 fff00000c9247280 dead000000000122 0000000000000000
[   32.383317] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.383453] page dumped because: kasan: bad access detected
[   32.383495] 
[   32.383514] Memory state around the buggy address:
[   32.383683]  fff00000c921c100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.383931]  fff00000c921c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.384060] >fff00000c921c200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.384101]                                            ^
[   32.384136]  fff00000c921c280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.384178]  fff00000c921c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.384215] ==================================================================
[   32.352021] ==================================================================
[   32.352096] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.352168] Read of size 1 at addr fff00000c9a95700 by task kunit_try_catch/258
[   32.352217] 
[   32.352257] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.352350] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.352380] Hardware name: linux,dummy-virt (DT)
[   32.352412] Call trace:
[   32.352439]  show_stack+0x20/0x38 (C)
[   32.352490]  dump_stack_lvl+0x8c/0xd0
[   32.352540]  print_report+0x118/0x5e8
[   32.352584]  kasan_report+0xdc/0x128
[   32.352626]  __asan_report_load1_noabort+0x20/0x30
[   32.352672]  mempool_uaf_helper+0x314/0x340
[   32.352720]  mempool_kmalloc_uaf+0xc4/0x120
[   32.352767]  kunit_try_run_case+0x170/0x3f0
[   32.352830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.353075]  kthread+0x328/0x630
[   32.353128]  ret_from_fork+0x10/0x20
[   32.353178] 
[   32.353199] Allocated by task 258:
[   32.353227]  kasan_save_stack+0x3c/0x68
[   32.353270]  kasan_save_track+0x20/0x40
[   32.353307]  kasan_save_alloc_info+0x40/0x58
[   32.353345]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.353387]  remove_element+0x130/0x1f8
[   32.353428]  mempool_alloc_preallocated+0x58/0xc0
[   32.353469]  mempool_uaf_helper+0xa4/0x340
[   32.353509]  mempool_kmalloc_uaf+0xc4/0x120
[   32.353549]  kunit_try_run_case+0x170/0x3f0
[   32.353587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.353630]  kthread+0x328/0x630
[   32.353664]  ret_from_fork+0x10/0x20
[   32.353702] 
[   32.353720] Freed by task 258:
[   32.353748]  kasan_save_stack+0x3c/0x68
[   32.353784]  kasan_save_track+0x20/0x40
[   32.353835]  kasan_save_free_info+0x4c/0x78
[   32.353873]  __kasan_mempool_poison_object+0xc0/0x150
[   32.353914]  mempool_free+0x3f4/0x5f0
[   32.353950]  mempool_uaf_helper+0x104/0x340
[   32.353992]  mempool_kmalloc_uaf+0xc4/0x120
[   32.354032]  kunit_try_run_case+0x170/0x3f0
[   32.354068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.354112]  kthread+0x328/0x630
[   32.354144]  ret_from_fork+0x10/0x20
[   32.354185] 
[   32.354205] The buggy address belongs to the object at fff00000c9a95700
[   32.354205]  which belongs to the cache kmalloc-128 of size 128
[   32.354265] The buggy address is located 0 bytes inside of
[   32.354265]  freed 128-byte region [fff00000c9a95700, fff00000c9a95780)
[   32.354323] 
[   32.354345] The buggy address belongs to the physical page:
[   32.354385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95
[   32.354441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.354493] page_type: f5(slab)
[   32.354534] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.354583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.354623] page dumped because: kasan: bad access detected
[   32.354654] 
[   32.354672] Memory state around the buggy address:
[   32.354705]  fff00000c9a95600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.354748]  fff00000c9a95680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.354790] >fff00000c9a95700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.354837]                    ^
[   32.354863]  fff00000c9a95780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.354904]  fff00000c9a95800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.354942] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   32.287688] ==================================================================
[   32.287748] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.287803] Read of size 1 at addr fff00000c926a2bb by task kunit_try_catch/256
[   32.290482] 
[   32.290537] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.290684] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.290714] Hardware name: linux,dummy-virt (DT)
[   32.290745] Call trace:
[   32.290770]  show_stack+0x20/0x38 (C)
[   32.290833]  dump_stack_lvl+0x8c/0xd0
[   32.290880]  print_report+0x118/0x5e8
[   32.291026]  kasan_report+0xdc/0x128
[   32.291300]  __asan_report_load1_noabort+0x20/0x30
[   32.291352]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.291401]  mempool_slab_oob_right+0xc0/0x118
[   32.293123]  kunit_try_run_case+0x170/0x3f0
[   32.293219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.293441]  kthread+0x328/0x630
[   32.293887]  ret_from_fork+0x10/0x20
[   32.294238] 
[   32.294425] Allocated by task 256:
[   32.294488]  kasan_save_stack+0x3c/0x68
[   32.294536]  kasan_save_track+0x20/0x40
[   32.294742]  kasan_save_alloc_info+0x40/0x58
[   32.294861]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.295171]  remove_element+0x16c/0x1f8
[   32.295399]  mempool_alloc_preallocated+0x58/0xc0
[   32.295443]  mempool_oob_right_helper+0x98/0x2f0
[   32.295873]  mempool_slab_oob_right+0xc0/0x118
[   32.295974]  kunit_try_run_case+0x170/0x3f0
[   32.296105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.296602]  kthread+0x328/0x630
[   32.296649]  ret_from_fork+0x10/0x20
[   32.296685] 
[   32.296705] The buggy address belongs to the object at fff00000c926a240
[   32.296705]  which belongs to the cache test_cache of size 123
[   32.297018] The buggy address is located 0 bytes to the right of
[   32.297018]  allocated 123-byte region [fff00000c926a240, fff00000c926a2bb)
[   32.297550] 
[   32.297585] The buggy address belongs to the physical page:
[   32.297650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10926a
[   32.298233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.298681] page_type: f5(slab)
[   32.298723] raw: 0bfffe0000000000 fff00000c9247140 dead000000000122 0000000000000000
[   32.299220] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.299267] page dumped because: kasan: bad access detected
[   32.299298] 
[   32.299714] Memory state around the buggy address:
[   32.299779]  fff00000c926a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.299848]  fff00000c926a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.300162] >fff00000c926a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.300319]                                         ^
[   32.300639]  fff00000c926a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.300691]  fff00000c926a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.300730] ==================================================================
[   32.272018] ==================================================================
[   32.272125] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.272185] Read of size 1 at addr fff00000c9b9e001 by task kunit_try_catch/254
[   32.272402] 
[   32.272505] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.272622] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.272653] Hardware name: linux,dummy-virt (DT)
[   32.272685] Call trace:
[   32.272708]  show_stack+0x20/0x38 (C)
[   32.272769]  dump_stack_lvl+0x8c/0xd0
[   32.272827]  print_report+0x118/0x5e8
[   32.272871]  kasan_report+0xdc/0x128
[   32.272958]  __asan_report_load1_noabort+0x20/0x30
[   32.273083]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.273134]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   32.273186]  kunit_try_run_case+0x170/0x3f0
[   32.273231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.273304]  kthread+0x328/0x630
[   32.273345]  ret_from_fork+0x10/0x20
[   32.273424] 
[   32.273444] The buggy address belongs to the physical page:
[   32.273481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b9c
[   32.273554] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.273601] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.273794] page_type: f8(unknown)
[   32.273905] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.273955] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.274003] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.274050] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.274098] head: 0bfffe0000000002 ffffc1ffc326e701 00000000ffffffff 00000000ffffffff
[   32.274145] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.274189] page dumped because: kasan: bad access detected
[   32.274219] 
[   32.274236] Memory state around the buggy address:
[   32.274319]  fff00000c9b9df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.274362]  fff00000c9b9df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.274404] >fff00000c9b9e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.274476]                    ^
[   32.274503]  fff00000c9b9e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.274545]  fff00000c9b9e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.274582] ==================================================================
[   32.263351] ==================================================================
[   32.263432] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.263511] Read of size 1 at addr fff00000c9a95373 by task kunit_try_catch/252
[   32.263562] 
[   32.263604] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.263701] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.263731] Hardware name: linux,dummy-virt (DT)
[   32.263766] Call trace:
[   32.263792]  show_stack+0x20/0x38 (C)
[   32.263858]  dump_stack_lvl+0x8c/0xd0
[   32.263908]  print_report+0x118/0x5e8
[   32.263950]  kasan_report+0xdc/0x128
[   32.263992]  __asan_report_load1_noabort+0x20/0x30
[   32.264041]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.264090]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.264139]  kunit_try_run_case+0x170/0x3f0
[   32.264188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.264237]  kthread+0x328/0x630
[   32.264282]  ret_from_fork+0x10/0x20
[   32.264329] 
[   32.264348] Allocated by task 252:
[   32.264378]  kasan_save_stack+0x3c/0x68
[   32.264418]  kasan_save_track+0x20/0x40
[   32.264453]  kasan_save_alloc_info+0x40/0x58
[   32.264492]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.264533]  remove_element+0x130/0x1f8
[   32.264572]  mempool_alloc_preallocated+0x58/0xc0
[   32.264612]  mempool_oob_right_helper+0x98/0x2f0
[   32.264651]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.264692]  kunit_try_run_case+0x170/0x3f0
[   32.264729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.264772]  kthread+0x328/0x630
[   32.264804]  ret_from_fork+0x10/0x20
[   32.264852] 
[   32.264901] The buggy address belongs to the object at fff00000c9a95300
[   32.264901]  which belongs to the cache kmalloc-128 of size 128
[   32.264961] The buggy address is located 0 bytes to the right of
[   32.264961]  allocated 115-byte region [fff00000c9a95300, fff00000c9a95373)
[   32.265022] 
[   32.265044] The buggy address belongs to the physical page:
[   32.265083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95
[   32.265139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.265191] page_type: f5(slab)
[   32.265235] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.265284] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.265325] page dumped because: kasan: bad access detected
[   32.265356] 
[   32.265374] Memory state around the buggy address:
[   32.265407]  fff00000c9a95200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.265450]  fff00000c9a95280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.265494] >fff00000c9a95300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.265530]                                                              ^
[   32.265569]  fff00000c9a95380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.265612]  fff00000c9a95400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.265651] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   31.666301] ==================================================================
[   31.666778] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   31.666881] Read of size 1 at addr fff00000c3f36c80 by task kunit_try_catch/246
[   31.666932] 
[   31.666973] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   31.667070] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.667099] Hardware name: linux,dummy-virt (DT)
[   31.667134] Call trace:
[   31.667163]  show_stack+0x20/0x38 (C)
[   31.667215]  dump_stack_lvl+0x8c/0xd0
[   31.667276]  print_report+0x118/0x5e8
[   31.667321]  kasan_report+0xdc/0x128
[   31.667364]  __kasan_check_byte+0x54/0x70
[   31.667406]  kmem_cache_destroy+0x34/0x218
[   31.667763]  kmem_cache_double_destroy+0x174/0x300
[   31.668212]  kunit_try_run_case+0x170/0x3f0
[   31.668302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.668560]  kthread+0x328/0x630
[   31.668612]  ret_from_fork+0x10/0x20
[   31.668661] 
[   31.668688] Allocated by task 246:
[   31.668748]  kasan_save_stack+0x3c/0x68
[   31.668911]  kasan_save_track+0x20/0x40
[   31.668947]  kasan_save_alloc_info+0x40/0x58
[   31.668986]  __kasan_slab_alloc+0xa8/0xb0
[   31.669023]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.669067]  __kmem_cache_create_args+0x178/0x280
[   31.669353]  kmem_cache_double_destroy+0xc0/0x300
[   31.669435]  kunit_try_run_case+0x170/0x3f0
[   31.669475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.669521]  kthread+0x328/0x630
[   31.669554]  ret_from_fork+0x10/0x20
[   31.669757] 
[   31.669925] Freed by task 246:
[   31.669966]  kasan_save_stack+0x3c/0x68
[   31.670008]  kasan_save_track+0x20/0x40
[   31.670049]  kasan_save_free_info+0x4c/0x78
[   31.670087]  __kasan_slab_free+0x6c/0x98
[   31.670121]  kmem_cache_free+0x260/0x468
[   31.670165]  slab_kmem_cache_release+0x38/0x50
[   31.670204]  kmem_cache_release+0x1c/0x30
[   31.670438]  kobject_put+0x17c/0x420
[   31.670606]  sysfs_slab_release+0x1c/0x30
[   31.670684]  kmem_cache_destroy+0x118/0x218
[   31.670807]  kmem_cache_double_destroy+0x128/0x300
[   31.670907]  kunit_try_run_case+0x170/0x3f0
[   31.671087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.671129]  kthread+0x328/0x630
[   31.671203]  ret_from_fork+0x10/0x20
[   31.671414] 
[   31.671976] The buggy address belongs to the object at fff00000c3f36c80
[   31.671976]  which belongs to the cache kmem_cache of size 208
[   31.672241] The buggy address is located 0 bytes inside of
[   31.672241]  freed 208-byte region [fff00000c3f36c80, fff00000c3f36d50)
[   31.672306] 
[   31.672329] The buggy address belongs to the physical page:
[   31.672371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f36
[   31.672429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.673326] page_type: f5(slab)
[   31.673379] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122
[   31.673431] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   31.673474] page dumped because: kasan: bad access detected
[   31.673504] 
[   31.673521] Memory state around the buggy address:
[   31.674675]  fff00000c3f36b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.675287]  fff00000c3f36c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.675486] >fff00000c3f36c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.675564]                    ^
[   31.675885]  fff00000c3f36d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   31.676330]  fff00000c3f36d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.676399] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   31.366773] ==================================================================
[   31.366887] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   31.366975] Read of size 1 at addr fff00000c9234000 by task kunit_try_catch/244
[   31.367037] 
[   31.367091] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   31.367185] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.367214] Hardware name: linux,dummy-virt (DT)
[   31.367258] Call trace:
[   31.367285]  show_stack+0x20/0x38 (C)
[   31.367339]  dump_stack_lvl+0x8c/0xd0
[   31.367390]  print_report+0x118/0x5e8
[   31.367434]  kasan_report+0xdc/0x128
[   31.367718]  __asan_report_load1_noabort+0x20/0x30
[   31.368158]  kmem_cache_rcu_uaf+0x388/0x468
[   31.368247]  kunit_try_run_case+0x170/0x3f0
[   31.369107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.369169]  kthread+0x328/0x630
[   31.369215]  ret_from_fork+0x10/0x20
[   31.371840] 
[   31.371869] Allocated by task 244:
[   31.371903]  kasan_save_stack+0x3c/0x68
[   31.371952]  kasan_save_track+0x20/0x40
[   31.371987]  kasan_save_alloc_info+0x40/0x58
[   31.372026]  __kasan_slab_alloc+0xa8/0xb0
[   31.372060]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.372102]  kmem_cache_rcu_uaf+0x12c/0x468
[   31.372141]  kunit_try_run_case+0x170/0x3f0
[   31.372178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.372221]  kthread+0x328/0x630
[   31.372254]  ret_from_fork+0x10/0x20
[   31.372291] 
[   31.372309] Freed by task 0:
[   31.372337]  kasan_save_stack+0x3c/0x68
[   31.372373]  kasan_save_track+0x20/0x40
[   31.372407]  kasan_save_free_info+0x4c/0x78
[   31.372445]  __kasan_slab_free+0x6c/0x98
[   31.372478]  slab_free_after_rcu_debug+0xd4/0x2f8
[   31.372520]  rcu_core+0x9f4/0x1e58
[   31.372558]  rcu_core_si+0x18/0x30
[   31.372593]  handle_softirqs+0x374/0xb28
[   31.372633]  __do_softirq+0x1c/0x28
[   31.372667] 
[   31.372686] Last potentially related work creation:
[   31.372712]  kasan_save_stack+0x3c/0x68
[   31.372748]  kasan_record_aux_stack+0xb4/0xc8
[   31.372786]  kmem_cache_free+0x120/0x468
[   31.372834]  kmem_cache_rcu_uaf+0x16c/0x468
[   31.372883]  kunit_try_run_case+0x170/0x3f0
[   31.372996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.373040]  kthread+0x328/0x630
[   31.373072]  ret_from_fork+0x10/0x20
[   31.373301] 
[   31.373322] The buggy address belongs to the object at fff00000c9234000
[   31.373322]  which belongs to the cache test_cache of size 200
[   31.373384] The buggy address is located 0 bytes inside of
[   31.373384]  freed 200-byte region [fff00000c9234000, fff00000c92340c8)
[   31.373444] 
[   31.373466] The buggy address belongs to the physical page:
[   31.373595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109234
[   31.373750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.373903] page_type: f5(slab)
[   31.374003] raw: 0bfffe0000000000 fff00000c3f36b40 dead000000000122 0000000000000000
[   31.374055] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.374141] page dumped because: kasan: bad access detected
[   31.374295] 
[   31.374319] Memory state around the buggy address:
[   31.374353]  fff00000c9233f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.374690]  fff00000c9233f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.374735] >fff00000c9234000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.374773]                    ^
[   31.374801]  fff00000c9234080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.374852]  fff00000c9234100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.374931] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.071323] ==================================================================
[   31.071390] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   31.071459] Free of addr fff00000c9231001 by task kunit_try_catch/242
[   31.071503] 
[   31.071569] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   31.071662] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.071719] Hardware name: linux,dummy-virt (DT)
[   31.071872] Call trace:
[   31.072076]  show_stack+0x20/0x38 (C)
[   31.072243]  dump_stack_lvl+0x8c/0xd0
[   31.072517]  print_report+0x118/0x5e8
[   31.072582]  kasan_report_invalid_free+0xc0/0xe8
[   31.072780]  check_slab_allocation+0xfc/0x108
[   31.072887]  __kasan_slab_pre_free+0x2c/0x48
[   31.072953]  kmem_cache_free+0xf0/0x468
[   31.073040]  kmem_cache_invalid_free+0x184/0x3c8
[   31.073092]  kunit_try_run_case+0x170/0x3f0
[   31.073152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.073204]  kthread+0x328/0x630
[   31.073267]  ret_from_fork+0x10/0x20
[   31.073315] 
[   31.073335] Allocated by task 242:
[   31.073365]  kasan_save_stack+0x3c/0x68
[   31.073546]  kasan_save_track+0x20/0x40
[   31.073583]  kasan_save_alloc_info+0x40/0x58
[   31.073695]  __kasan_slab_alloc+0xa8/0xb0
[   31.073830]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.073897]  kmem_cache_invalid_free+0x12c/0x3c8
[   31.074248]  kunit_try_run_case+0x170/0x3f0
[   31.074380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.074497]  kthread+0x328/0x630
[   31.074576]  ret_from_fork+0x10/0x20
[   31.074714] 
[   31.074790] The buggy address belongs to the object at fff00000c9231000
[   31.074790]  which belongs to the cache test_cache of size 200
[   31.074905] The buggy address is located 1 bytes inside of
[   31.074905]  200-byte region [fff00000c9231000, fff00000c92310c8)
[   31.075002] 
[   31.075025] The buggy address belongs to the physical page:
[   31.075064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109231
[   31.075119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.075303] page_type: f5(slab)
[   31.075495] raw: 0bfffe0000000000 fff00000c3f36a00 dead000000000122 0000000000000000
[   31.075593] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.075649] page dumped because: kasan: bad access detected
[   31.075697] 
[   31.075798] Memory state around the buggy address:
[   31.075940]  fff00000c9230f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.076085]  fff00000c9230f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.076172] >fff00000c9231000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.076268]                    ^
[   31.076295]  fff00000c9231080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.076609]  fff00000c9231100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.076724] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   31.035329] ==================================================================
[   31.035401] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.035554] Free of addr fff00000c922c000 by task kunit_try_catch/240
[   31.035597] 
[   31.035642] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   31.035757] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.035857] Hardware name: linux,dummy-virt (DT)
[   31.035906] Call trace:
[   31.035948]  show_stack+0x20/0x38 (C)
[   31.036022]  dump_stack_lvl+0x8c/0xd0
[   31.036073]  print_report+0x118/0x5e8
[   31.036118]  kasan_report_invalid_free+0xc0/0xe8
[   31.036174]  check_slab_allocation+0xd4/0x108
[   31.036220]  __kasan_slab_pre_free+0x2c/0x48
[   31.036376]  kmem_cache_free+0xf0/0x468
[   31.036559]  kmem_cache_double_free+0x190/0x3c8
[   31.036676]  kunit_try_run_case+0x170/0x3f0
[   31.036728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.036832]  kthread+0x328/0x630
[   31.036889]  ret_from_fork+0x10/0x20
[   31.036999] 
[   31.037097] Allocated by task 240:
[   31.037180]  kasan_save_stack+0x3c/0x68
[   31.037222]  kasan_save_track+0x20/0x40
[   31.037256]  kasan_save_alloc_info+0x40/0x58
[   31.037303]  __kasan_slab_alloc+0xa8/0xb0
[   31.037337]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.037378]  kmem_cache_double_free+0x12c/0x3c8
[   31.037416]  kunit_try_run_case+0x170/0x3f0
[   31.037452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.037493]  kthread+0x328/0x630
[   31.037660]  ret_from_fork+0x10/0x20
[   31.037762] 
[   31.037800] Freed by task 240:
[   31.037841]  kasan_save_stack+0x3c/0x68
[   31.037877]  kasan_save_track+0x20/0x40
[   31.037935]  kasan_save_free_info+0x4c/0x78
[   31.037971]  __kasan_slab_free+0x6c/0x98
[   31.038083]  kmem_cache_free+0x260/0x468
[   31.038253]  kmem_cache_double_free+0x140/0x3c8
[   31.038315]  kunit_try_run_case+0x170/0x3f0
[   31.038425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.038610]  kthread+0x328/0x630
[   31.038720]  ret_from_fork+0x10/0x20
[   31.038776] 
[   31.038795] The buggy address belongs to the object at fff00000c922c000
[   31.038795]  which belongs to the cache test_cache of size 200
[   31.038972] The buggy address is located 0 bytes inside of
[   31.038972]  200-byte region [fff00000c922c000, fff00000c922c0c8)
[   31.039177] 
[   31.039229] The buggy address belongs to the physical page:
[   31.039349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922c
[   31.039433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.039585] page_type: f5(slab)
[   31.039663] raw: 0bfffe0000000000 fff00000c3f368c0 dead000000000122 0000000000000000
[   31.039838] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.039891] page dumped because: kasan: bad access detected
[   31.039955] 
[   31.039973] Memory state around the buggy address:
[   31.040007]  fff00000c922bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.040324]  fff00000c922bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.040489] >fff00000c922c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.040614]                    ^
[   31.040705]  fff00000c922c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.040774]  fff00000c922c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.040920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   30.530328] ==================================================================
[   30.530441] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   30.530510] Free of addr fff00000c7b7a940 by task kunit_try_catch/223
[   30.530553] 
[   30.530782] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.531126] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.531312] Hardware name: linux,dummy-virt (DT)
[   30.531644] Call trace:
[   30.532066]  show_stack+0x20/0x38 (C)
[   30.532137]  dump_stack_lvl+0x8c/0xd0
[   30.532208]  print_report+0x118/0x5e8
[   30.532290]  kasan_report_invalid_free+0xc0/0xe8
[   30.532349]  check_slab_allocation+0xd4/0x108
[   30.532395]  __kasan_slab_pre_free+0x2c/0x48
[   30.532440]  kfree+0xe8/0x3c8
[   30.532485]  kfree_sensitive+0x3c/0xb0
[   30.533056]  kmalloc_double_kzfree+0x168/0x308
[   30.533402]  kunit_try_run_case+0x170/0x3f0
[   30.533487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.533719]  kthread+0x328/0x630
[   30.533781]  ret_from_fork+0x10/0x20
[   30.534245] 
[   30.534313] Allocated by task 223:
[   30.534345]  kasan_save_stack+0x3c/0x68
[   30.534403]  kasan_save_track+0x20/0x40
[   30.534468]  kasan_save_alloc_info+0x40/0x58
[   30.534509]  __kasan_kmalloc+0xd4/0xd8
[   30.534555]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.534595]  kmalloc_double_kzfree+0xb8/0x308
[   30.534651]  kunit_try_run_case+0x170/0x3f0
[   30.534690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.534740]  kthread+0x328/0x630
[   30.534773]  ret_from_fork+0x10/0x20
[   30.534830] 
[   30.534848] Freed by task 223:
[   30.534875]  kasan_save_stack+0x3c/0x68
[   30.534919]  kasan_save_track+0x20/0x40
[   30.534969]  kasan_save_free_info+0x4c/0x78
[   30.535005]  __kasan_slab_free+0x6c/0x98
[   30.535040]  kfree+0x214/0x3c8
[   30.535075]  kfree_sensitive+0x80/0xb0
[   30.535111]  kmalloc_double_kzfree+0x11c/0x308
[   30.535160]  kunit_try_run_case+0x170/0x3f0
[   30.535203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.535250]  kthread+0x328/0x630
[   30.535293]  ret_from_fork+0x10/0x20
[   30.535330] 
[   30.535348] The buggy address belongs to the object at fff00000c7b7a940
[   30.535348]  which belongs to the cache kmalloc-16 of size 16
[   30.535404] The buggy address is located 0 bytes inside of
[   30.535404]  16-byte region [fff00000c7b7a940, fff00000c7b7a950)
[   30.535463] 
[   30.535484] The buggy address belongs to the physical page:
[   30.535516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a
[   30.535569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.535614] page_type: f5(slab)
[   30.535650] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.535702] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.535739] page dumped because: kasan: bad access detected
[   30.535780] 
[   30.535799] Memory state around the buggy address:
[   30.536199]  fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.536612]  fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   30.536706] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   30.536768]                                            ^
[   30.536837]  fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.536880]  fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.537425] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   30.520078] ==================================================================
[   30.520274] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.520360] Read of size 1 at addr fff00000c7b7a940 by task kunit_try_catch/223
[   30.520575] 
[   30.520613] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.520705] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.520734] Hardware name: linux,dummy-virt (DT)
[   30.520766] Call trace:
[   30.520822]  show_stack+0x20/0x38 (C)
[   30.521140]  dump_stack_lvl+0x8c/0xd0
[   30.521347]  print_report+0x118/0x5e8
[   30.521436]  kasan_report+0xdc/0x128
[   30.521609]  __kasan_check_byte+0x54/0x70
[   30.521688]  kfree_sensitive+0x30/0xb0
[   30.521982]  kmalloc_double_kzfree+0x168/0x308
[   30.522215]  kunit_try_run_case+0x170/0x3f0
[   30.522344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.522533]  kthread+0x328/0x630
[   30.522711]  ret_from_fork+0x10/0x20
[   30.522846] 
[   30.522869] Allocated by task 223:
[   30.523125]  kasan_save_stack+0x3c/0x68
[   30.523230]  kasan_save_track+0x20/0x40
[   30.523298]  kasan_save_alloc_info+0x40/0x58
[   30.523436]  __kasan_kmalloc+0xd4/0xd8
[   30.523538]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.523601]  kmalloc_double_kzfree+0xb8/0x308
[   30.523917]  kunit_try_run_case+0x170/0x3f0
[   30.524023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.524071]  kthread+0x328/0x630
[   30.524107]  ret_from_fork+0x10/0x20
[   30.524146] 
[   30.524167] Freed by task 223:
[   30.524208]  kasan_save_stack+0x3c/0x68
[   30.524244]  kasan_save_track+0x20/0x40
[   30.524280]  kasan_save_free_info+0x4c/0x78
[   30.524318]  __kasan_slab_free+0x6c/0x98
[   30.524352]  kfree+0x214/0x3c8
[   30.524395]  kfree_sensitive+0x80/0xb0
[   30.524440]  kmalloc_double_kzfree+0x11c/0x308
[   30.524496]  kunit_try_run_case+0x170/0x3f0
[   30.524533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.524577]  kthread+0x328/0x630
[   30.524620]  ret_from_fork+0x10/0x20
[   30.524680] 
[   30.524699] The buggy address belongs to the object at fff00000c7b7a940
[   30.524699]  which belongs to the cache kmalloc-16 of size 16
[   30.524770] The buggy address is located 0 bytes inside of
[   30.524770]  freed 16-byte region [fff00000c7b7a940, fff00000c7b7a950)
[   30.524907] 
[   30.525254] The buggy address belongs to the physical page:
[   30.525500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a
[   30.525575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.525624] page_type: f5(slab)
[   30.525988] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.526233] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.526379] page dumped because: kasan: bad access detected
[   30.526463] 
[   30.526523] Memory state around the buggy address:
[   30.526655]  fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.526873]  fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   30.527183] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   30.527269]                                            ^
[   30.527385]  fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.527474]  fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.527676] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   30.497035] ==================================================================
[   30.497329] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   30.497527] Read of size 1 at addr fff00000c923d6a8 by task kunit_try_catch/219
[   30.497674] 
[   30.497757] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.497957] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.497988] Hardware name: linux,dummy-virt (DT)
[   30.498034] Call trace:
[   30.498318]  show_stack+0x20/0x38 (C)
[   30.498414]  dump_stack_lvl+0x8c/0xd0
[   30.498736]  print_report+0x118/0x5e8
[   30.498824]  kasan_report+0xdc/0x128
[   30.498872]  __asan_report_load1_noabort+0x20/0x30
[   30.498950]  kmalloc_uaf2+0x3f4/0x468
[   30.498999]  kunit_try_run_case+0x170/0x3f0
[   30.499050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.499103]  kthread+0x328/0x630
[   30.499165]  ret_from_fork+0x10/0x20
[   30.499213] 
[   30.499231] Allocated by task 219:
[   30.499260]  kasan_save_stack+0x3c/0x68
[   30.499301]  kasan_save_track+0x20/0x40
[   30.499344]  kasan_save_alloc_info+0x40/0x58
[   30.499382]  __kasan_kmalloc+0xd4/0xd8
[   30.499415]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.499464]  kmalloc_uaf2+0xc4/0x468
[   30.499506]  kunit_try_run_case+0x170/0x3f0
[   30.499544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.499594]  kthread+0x328/0x630
[   30.499626]  ret_from_fork+0x10/0x20
[   30.499661] 
[   30.499679] Freed by task 219:
[   30.499703]  kasan_save_stack+0x3c/0x68
[   30.499754]  kasan_save_track+0x20/0x40
[   30.499787]  kasan_save_free_info+0x4c/0x78
[   30.499834]  __kasan_slab_free+0x6c/0x98
[   30.499868]  kfree+0x214/0x3c8
[   30.499904]  kmalloc_uaf2+0x134/0x468
[   30.499940]  kunit_try_run_case+0x170/0x3f0
[   30.499977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.500025]  kthread+0x328/0x630
[   30.500076]  ret_from_fork+0x10/0x20
[   30.500112] 
[   30.500131] The buggy address belongs to the object at fff00000c923d680
[   30.500131]  which belongs to the cache kmalloc-64 of size 64
[   30.500189] The buggy address is located 40 bytes inside of
[   30.500189]  freed 64-byte region [fff00000c923d680, fff00000c923d6c0)
[   30.500259] 
[   30.500278] The buggy address belongs to the physical page:
[   30.500312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10923d
[   30.500374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.500422] page_type: f5(slab)
[   30.500461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.500511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.500553] page dumped because: kasan: bad access detected
[   30.500589] 
[   30.500622] Memory state around the buggy address:
[   30.500660]  fff00000c923d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.500703]  fff00000c923d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.500750] >fff00000c923d680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.500788]                                   ^
[   30.501058]  fff00000c923d700: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   30.501576]  fff00000c923d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.501955] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   30.479408] ==================================================================
[   30.479470] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   30.479529] Write of size 33 at addr fff00000c923d500 by task kunit_try_catch/217
[   30.479610] 
[   30.479647] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.479735] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.479772] Hardware name: linux,dummy-virt (DT)
[   30.479832] Call trace:
[   30.479856]  show_stack+0x20/0x38 (C)
[   30.479906]  dump_stack_lvl+0x8c/0xd0
[   30.479956]  print_report+0x118/0x5e8
[   30.480001]  kasan_report+0xdc/0x128
[   30.480045]  kasan_check_range+0x100/0x1a8
[   30.480098]  __asan_memset+0x34/0x78
[   30.480143]  kmalloc_uaf_memset+0x170/0x310
[   30.480191]  kunit_try_run_case+0x170/0x3f0
[   30.480238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.480290]  kthread+0x328/0x630
[   30.480334]  ret_from_fork+0x10/0x20
[   30.480389] 
[   30.480409] Allocated by task 217:
[   30.480436]  kasan_save_stack+0x3c/0x68
[   30.480474]  kasan_save_track+0x20/0x40
[   30.480515]  kasan_save_alloc_info+0x40/0x58
[   30.480558]  __kasan_kmalloc+0xd4/0xd8
[   30.480598]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.480637]  kmalloc_uaf_memset+0xb8/0x310
[   30.480675]  kunit_try_run_case+0x170/0x3f0
[   30.480712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.480754]  kthread+0x328/0x630
[   30.480787]  ret_from_fork+0x10/0x20
[   30.480880] 
[   30.481145] Freed by task 217:
[   30.481405]  kasan_save_stack+0x3c/0x68
[   30.481692]  kasan_save_track+0x20/0x40
[   30.481736]  kasan_save_free_info+0x4c/0x78
[   30.481831]  __kasan_slab_free+0x6c/0x98
[   30.482192]  kfree+0x214/0x3c8
[   30.482257]  kmalloc_uaf_memset+0x11c/0x310
[   30.482335]  kunit_try_run_case+0x170/0x3f0
[   30.482514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.482572]  kthread+0x328/0x630
[   30.482866]  ret_from_fork+0x10/0x20
[   30.482956] 
[   30.483005] The buggy address belongs to the object at fff00000c923d500
[   30.483005]  which belongs to the cache kmalloc-64 of size 64
[   30.483243] The buggy address is located 0 bytes inside of
[   30.483243]  freed 64-byte region [fff00000c923d500, fff00000c923d540)
[   30.483424] 
[   30.483478] The buggy address belongs to the physical page:
[   30.483514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10923d
[   30.483921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.484090] page_type: f5(slab)
[   30.484241] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.484326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.484408] page dumped because: kasan: bad access detected
[   30.484790] 
[   30.484869] Memory state around the buggy address:
[   30.485027]  fff00000c923d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.485132]  fff00000c923d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.485261] >fff00000c923d500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.485359]                    ^
[   30.485427]  fff00000c923d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.485761]  fff00000c923d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.485847] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   30.462642] ==================================================================
[   30.462952] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   30.463280] Read of size 1 at addr fff00000c7b7a928 by task kunit_try_catch/215
[   30.463357] 
[   30.463391] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.463484] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.463734] Hardware name: linux,dummy-virt (DT)
[   30.463807] Call trace:
[   30.463843]  show_stack+0x20/0x38 (C)
[   30.463896]  dump_stack_lvl+0x8c/0xd0
[   30.463943]  print_report+0x118/0x5e8
[   30.463987]  kasan_report+0xdc/0x128
[   30.464031]  __asan_report_load1_noabort+0x20/0x30
[   30.464077]  kmalloc_uaf+0x300/0x338
[   30.464121]  kunit_try_run_case+0x170/0x3f0
[   30.464397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.464753]  kthread+0x328/0x630
[   30.464865]  ret_from_fork+0x10/0x20
[   30.464962] 
[   30.465000] Allocated by task 215:
[   30.465288]  kasan_save_stack+0x3c/0x68
[   30.465360]  kasan_save_track+0x20/0x40
[   30.465491]  kasan_save_alloc_info+0x40/0x58
[   30.465590]  __kasan_kmalloc+0xd4/0xd8
[   30.465705]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.465779]  kmalloc_uaf+0xb8/0x338
[   30.466139]  kunit_try_run_case+0x170/0x3f0
[   30.466251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.466332]  kthread+0x328/0x630
[   30.466408]  ret_from_fork+0x10/0x20
[   30.466680] 
[   30.466766] Freed by task 215:
[   30.466798]  kasan_save_stack+0x3c/0x68
[   30.466852]  kasan_save_track+0x20/0x40
[   30.466888]  kasan_save_free_info+0x4c/0x78
[   30.466984]  __kasan_slab_free+0x6c/0x98
[   30.467022]  kfree+0x214/0x3c8
[   30.467057]  kmalloc_uaf+0x11c/0x338
[   30.467101]  kunit_try_run_case+0x170/0x3f0
[   30.467139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.467182]  kthread+0x328/0x630
[   30.467216]  ret_from_fork+0x10/0x20
[   30.467268] 
[   30.467296] The buggy address belongs to the object at fff00000c7b7a920
[   30.467296]  which belongs to the cache kmalloc-16 of size 16
[   30.467353] The buggy address is located 8 bytes inside of
[   30.467353]  freed 16-byte region [fff00000c7b7a920, fff00000c7b7a930)
[   30.467412] 
[   30.467438] The buggy address belongs to the physical page:
[   30.467482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a
[   30.467535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.467585] page_type: f5(slab)
[   30.467628] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.467684] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.467724] page dumped because: kasan: bad access detected
[   30.467754] 
[   30.467791] Memory state around the buggy address:
[   30.468385]  fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.468465]  fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   30.468527] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.468580]                                   ^
[   30.468627]  fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.469036]  fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.469092] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   30.443481] ==================================================================
[   30.443575] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   30.443637] Read of size 64 at addr fff00000c923d204 by task kunit_try_catch/213
[   30.443687] 
[   30.443719] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.443808] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.444217] Hardware name: linux,dummy-virt (DT)
[   30.444325] Call trace:
[   30.444351]  show_stack+0x20/0x38 (C)
[   30.444404]  dump_stack_lvl+0x8c/0xd0
[   30.444450]  print_report+0x118/0x5e8
[   30.444497]  kasan_report+0xdc/0x128
[   30.444538]  kasan_check_range+0x100/0x1a8
[   30.444604]  __asan_memmove+0x3c/0x98
[   30.444647]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   30.444700]  kunit_try_run_case+0x170/0x3f0
[   30.444746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.444798]  kthread+0x328/0x630
[   30.445062]  ret_from_fork+0x10/0x20
[   30.445379] 
[   30.445425] Allocated by task 213:
[   30.445547]  kasan_save_stack+0x3c/0x68
[   30.445656]  kasan_save_track+0x20/0x40
[   30.445725]  kasan_save_alloc_info+0x40/0x58
[   30.445877]  __kasan_kmalloc+0xd4/0xd8
[   30.445914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.445962]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   30.446011]  kunit_try_run_case+0x170/0x3f0
[   30.446051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.446573]  kthread+0x328/0x630
[   30.446669]  ret_from_fork+0x10/0x20
[   30.446756] 
[   30.446854] The buggy address belongs to the object at fff00000c923d200
[   30.446854]  which belongs to the cache kmalloc-64 of size 64
[   30.446969] The buggy address is located 4 bytes inside of
[   30.446969]  allocated 64-byte region [fff00000c923d200, fff00000c923d240)
[   30.447059] 
[   30.447078] The buggy address belongs to the physical page:
[   30.447562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10923d
[   30.447689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.447836] page_type: f5(slab)
[   30.447878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.447955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.448328] page dumped because: kasan: bad access detected
[   30.448381] 
[   30.448466] Memory state around the buggy address:
[   30.448581]  fff00000c923d100: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   30.448635]  fff00000c923d180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.448767] >fff00000c923d200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.448807]                                            ^
[   30.449110]  fff00000c923d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.449234]  fff00000c923d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.449332] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   30.428056] ==================================================================
[   30.428374] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   30.428686] Read of size 18446744073709551614 at addr fff00000c923d004 by task kunit_try_catch/211
[   30.429083] 
[   30.429138] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.429233] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.429263] Hardware name: linux,dummy-virt (DT)
[   30.429510] Call trace:
[   30.429562]  show_stack+0x20/0x38 (C)
[   30.429711]  dump_stack_lvl+0x8c/0xd0
[   30.429799]  print_report+0x118/0x5e8
[   30.430014]  kasan_report+0xdc/0x128
[   30.430360]  kasan_check_range+0x100/0x1a8
[   30.430452]  __asan_memmove+0x3c/0x98
[   30.430527]  kmalloc_memmove_negative_size+0x154/0x2e0
[   30.430598]  kunit_try_run_case+0x170/0x3f0
[   30.430770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.431142]  kthread+0x328/0x630
[   30.431213]  ret_from_fork+0x10/0x20
[   30.431360] 
[   30.431420] Allocated by task 211:
[   30.431555]  kasan_save_stack+0x3c/0x68
[   30.431652]  kasan_save_track+0x20/0x40
[   30.431994]  kasan_save_alloc_info+0x40/0x58
[   30.432064]  __kasan_kmalloc+0xd4/0xd8
[   30.432147]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.432268]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   30.432398]  kunit_try_run_case+0x170/0x3f0
[   30.432477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.432532]  kthread+0x328/0x630
[   30.432773]  ret_from_fork+0x10/0x20
[   30.432852] 
[   30.432873] The buggy address belongs to the object at fff00000c923d000
[   30.432873]  which belongs to the cache kmalloc-64 of size 64
[   30.433331] The buggy address is located 4 bytes inside of
[   30.433331]  64-byte region [fff00000c923d000, fff00000c923d040)
[   30.433461] 
[   30.433541] The buggy address belongs to the physical page:
[   30.433716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10923d
[   30.433905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.434060] page_type: f5(slab)
[   30.434133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.434249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.434338] page dumped because: kasan: bad access detected
[   30.434418] 
[   30.434499] Memory state around the buggy address:
[   30.434565]  fff00000c923cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.434642]  fff00000c923cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.434733] >fff00000c923d000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.434778]                    ^
[   30.435121]  fff00000c923d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.435212]  fff00000c923d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.435314] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   30.411150] ==================================================================
[   30.411426] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.411490] Write of size 16 at addr fff00000c3f71e69 by task kunit_try_catch/209
[   30.411789] 
[   30.411844] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.412317] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.412379] Hardware name: linux,dummy-virt (DT)
[   30.412639] Call trace:
[   30.412676]  show_stack+0x20/0x38 (C)
[   30.412894]  dump_stack_lvl+0x8c/0xd0
[   30.413081]  print_report+0x118/0x5e8
[   30.413134]  kasan_report+0xdc/0x128
[   30.413423]  kasan_check_range+0x100/0x1a8
[   30.413659]  __asan_memset+0x34/0x78
[   30.414107]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.414192]  kunit_try_run_case+0x170/0x3f0
[   30.414339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.414428]  kthread+0x328/0x630
[   30.414580]  ret_from_fork+0x10/0x20
[   30.414723] 
[   30.414793] Allocated by task 209:
[   30.415224]  kasan_save_stack+0x3c/0x68
[   30.415292]  kasan_save_track+0x20/0x40
[   30.415405]  kasan_save_alloc_info+0x40/0x58
[   30.415561]  __kasan_kmalloc+0xd4/0xd8
[   30.415620]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.415685]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.416053]  kunit_try_run_case+0x170/0x3f0
[   30.416121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.416245]  kthread+0x328/0x630
[   30.416285]  ret_from_fork+0x10/0x20
[   30.416344] 
[   30.416640] The buggy address belongs to the object at fff00000c3f71e00
[   30.416640]  which belongs to the cache kmalloc-128 of size 128
[   30.416868] The buggy address is located 105 bytes inside of
[   30.416868]  allocated 120-byte region [fff00000c3f71e00, fff00000c3f71e78)
[   30.417057] 
[   30.417162] The buggy address belongs to the physical page:
[   30.417210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.417282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.417595] page_type: f5(slab)
[   30.417672] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.417833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.417878] page dumped because: kasan: bad access detected
[   30.418219] 
[   30.418265] Memory state around the buggy address:
[   30.418324]  fff00000c3f71d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.418659]  fff00000c3f71d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.418732] >fff00000c3f71e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.418836]                                                                 ^
[   30.418915]  fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.418960]  fff00000c3f71f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.419291] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   30.398292] ==================================================================
[   30.398448] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   30.398507] Write of size 8 at addr fff00000c3f71d71 by task kunit_try_catch/207
[   30.398582] 
[   30.398895] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.398999] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.399081] Hardware name: linux,dummy-virt (DT)
[   30.399141] Call trace:
[   30.399181]  show_stack+0x20/0x38 (C)
[   30.399248]  dump_stack_lvl+0x8c/0xd0
[   30.399337]  print_report+0x118/0x5e8
[   30.399383]  kasan_report+0xdc/0x128
[   30.399442]  kasan_check_range+0x100/0x1a8
[   30.399740]  __asan_memset+0x34/0x78
[   30.399820]  kmalloc_oob_memset_8+0x150/0x2f8
[   30.399879]  kunit_try_run_case+0x170/0x3f0
[   30.399938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.400091]  kthread+0x328/0x630
[   30.400157]  ret_from_fork+0x10/0x20
[   30.400275] 
[   30.400316] Allocated by task 207:
[   30.400351]  kasan_save_stack+0x3c/0x68
[   30.400409]  kasan_save_track+0x20/0x40
[   30.400451]  kasan_save_alloc_info+0x40/0x58
[   30.400717]  __kasan_kmalloc+0xd4/0xd8
[   30.400779]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.400831]  kmalloc_oob_memset_8+0xb0/0x2f8
[   30.400954]  kunit_try_run_case+0x170/0x3f0
[   30.401055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.401113]  kthread+0x328/0x630
[   30.401156]  ret_from_fork+0x10/0x20
[   30.401194] 
[   30.401259] The buggy address belongs to the object at fff00000c3f71d00
[   30.401259]  which belongs to the cache kmalloc-128 of size 128
[   30.401326] The buggy address is located 113 bytes inside of
[   30.401326]  allocated 120-byte region [fff00000c3f71d00, fff00000c3f71d78)
[   30.401386] 
[   30.401406] The buggy address belongs to the physical page:
[   30.401443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.401496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.401545] page_type: f5(slab)
[   30.401596] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.401646] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.401685] page dumped because: kasan: bad access detected
[   30.401716] 
[   30.401742] Memory state around the buggy address:
[   30.401789]  fff00000c3f71c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.402230]  fff00000c3f71c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.402314] >fff00000c3f71d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.402392]                                                                 ^
[   30.402468]  fff00000c3f71d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.402596]  fff00000c3f71e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.402662] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   30.383060] ==================================================================
[   30.383117] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   30.383169] Write of size 4 at addr fff00000c3f71c75 by task kunit_try_catch/205
[   30.383222] 
[   30.383253] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.383340] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.383368] Hardware name: linux,dummy-virt (DT)
[   30.383407] Call trace:
[   30.383428]  show_stack+0x20/0x38 (C)
[   30.383476]  dump_stack_lvl+0x8c/0xd0
[   30.383520]  print_report+0x118/0x5e8
[   30.383562]  kasan_report+0xdc/0x128
[   30.383604]  kasan_check_range+0x100/0x1a8
[   30.383656]  __asan_memset+0x34/0x78
[   30.383700]  kmalloc_oob_memset_4+0x150/0x300
[   30.383745]  kunit_try_run_case+0x170/0x3f0
[   30.383800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.384197]  kthread+0x328/0x630
[   30.384728]  ret_from_fork+0x10/0x20
[   30.384808] 
[   30.385220] Allocated by task 205:
[   30.385259]  kasan_save_stack+0x3c/0x68
[   30.385306]  kasan_save_track+0x20/0x40
[   30.385340]  kasan_save_alloc_info+0x40/0x58
[   30.385377]  __kasan_kmalloc+0xd4/0xd8
[   30.385443]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.385508]  kmalloc_oob_memset_4+0xb0/0x300
[   30.385573]  kunit_try_run_case+0x170/0x3f0
[   30.385844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.385971]  kthread+0x328/0x630
[   30.386049]  ret_from_fork+0x10/0x20
[   30.386381] 
[   30.386438] The buggy address belongs to the object at fff00000c3f71c00
[   30.386438]  which belongs to the cache kmalloc-128 of size 128
[   30.386506] The buggy address is located 117 bytes inside of
[   30.386506]  allocated 120-byte region [fff00000c3f71c00, fff00000c3f71c78)
[   30.386567] 
[   30.386744] The buggy address belongs to the physical page:
[   30.386893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.387007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.387097] page_type: f5(slab)
[   30.387233] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.387295] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.387349] page dumped because: kasan: bad access detected
[   30.387726] 
[   30.387769] Memory state around the buggy address:
[   30.387803]  fff00000c3f71b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.388132]  fff00000c3f71b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.388240] >fff00000c3f71c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.388280]                                                                 ^
[   30.388349]  fff00000c3f71c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.388417]  fff00000c3f71d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.388892] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   30.368072] ==================================================================
[   30.368365] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   30.368439] Write of size 2 at addr fff00000c3f71b77 by task kunit_try_catch/203
[   30.368883] 
[   30.368948] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.369123] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.369230] Hardware name: linux,dummy-virt (DT)
[   30.369309] Call trace:
[   30.369642]  show_stack+0x20/0x38 (C)
[   30.369733]  dump_stack_lvl+0x8c/0xd0
[   30.369867]  print_report+0x118/0x5e8
[   30.369986]  kasan_report+0xdc/0x128
[   30.370043]  kasan_check_range+0x100/0x1a8
[   30.370221]  __asan_memset+0x34/0x78
[   30.370607]  kmalloc_oob_memset_2+0x150/0x2f8
[   30.370693]  kunit_try_run_case+0x170/0x3f0
[   30.371404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.371499]  kthread+0x328/0x630
[   30.371587]  ret_from_fork+0x10/0x20
[   30.371675] 
[   30.371730] Allocated by task 203:
[   30.371795]  kasan_save_stack+0x3c/0x68
[   30.372041]  kasan_save_track+0x20/0x40
[   30.372113]  kasan_save_alloc_info+0x40/0x58
[   30.372434]  __kasan_kmalloc+0xd4/0xd8
[   30.372624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.372949]  kmalloc_oob_memset_2+0xb0/0x2f8
[   30.373097]  kunit_try_run_case+0x170/0x3f0
[   30.373233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.373313]  kthread+0x328/0x630
[   30.373694]  ret_from_fork+0x10/0x20
[   30.373806] 
[   30.373844] The buggy address belongs to the object at fff00000c3f71b00
[   30.373844]  which belongs to the cache kmalloc-128 of size 128
[   30.374209] The buggy address is located 119 bytes inside of
[   30.374209]  allocated 120-byte region [fff00000c3f71b00, fff00000c3f71b78)
[   30.374281] 
[   30.374310] The buggy address belongs to the physical page:
[   30.374364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.374460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.374512] page_type: f5(slab)
[   30.374571] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.374629] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.374667] page dumped because: kasan: bad access detected
[   30.374696] 
[   30.374715] Memory state around the buggy address:
[   30.374747]  fff00000c3f71a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.374799]  fff00000c3f71a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.375068] >fff00000c3f71b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.375253]                                                                 ^
[   30.375329]  fff00000c3f71b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.375371]  fff00000c3f71c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.375653] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   30.323418] ==================================================================
[   30.323658] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   30.323787] Read of size 16 at addr fff00000c7b7a900 by task kunit_try_catch/199
[   30.323864] 
[   30.324157] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.324356] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.324392] Hardware name: linux,dummy-virt (DT)
[   30.324469] Call trace:
[   30.324494]  show_stack+0x20/0x38 (C)
[   30.324582]  dump_stack_lvl+0x8c/0xd0
[   30.324728]  print_report+0x118/0x5e8
[   30.324796]  kasan_report+0xdc/0x128
[   30.325137]  __asan_report_load16_noabort+0x20/0x30
[   30.325212]  kmalloc_uaf_16+0x3bc/0x438
[   30.325338]  kunit_try_run_case+0x170/0x3f0
[   30.325498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.325598]  kthread+0x328/0x630
[   30.325680]  ret_from_fork+0x10/0x20
[   30.325729] 
[   30.326031] Allocated by task 199:
[   30.326224]  kasan_save_stack+0x3c/0x68
[   30.326386]  kasan_save_track+0x20/0x40
[   30.326498]  kasan_save_alloc_info+0x40/0x58
[   30.326574]  __kasan_kmalloc+0xd4/0xd8
[   30.326730]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.327141]  kmalloc_uaf_16+0x140/0x438
[   30.327216]  kunit_try_run_case+0x170/0x3f0
[   30.327336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.327391]  kthread+0x328/0x630
[   30.327462]  ret_from_fork+0x10/0x20
[   30.327761] 
[   30.327832] Freed by task 199:
[   30.327885]  kasan_save_stack+0x3c/0x68
[   30.327995]  kasan_save_track+0x20/0x40
[   30.328073]  kasan_save_free_info+0x4c/0x78
[   30.328176]  __kasan_slab_free+0x6c/0x98
[   30.328258]  kfree+0x214/0x3c8
[   30.328313]  kmalloc_uaf_16+0x190/0x438
[   30.328613]  kunit_try_run_case+0x170/0x3f0
[   30.328694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.328768]  kthread+0x328/0x630
[   30.328887]  ret_from_fork+0x10/0x20
[   30.328976] 
[   30.329029] The buggy address belongs to the object at fff00000c7b7a900
[   30.329029]  which belongs to the cache kmalloc-16 of size 16
[   30.329155] The buggy address is located 0 bytes inside of
[   30.329155]  freed 16-byte region [fff00000c7b7a900, fff00000c7b7a910)
[   30.329239] 
[   30.329258] The buggy address belongs to the physical page:
[   30.329642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a
[   30.329757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.329904] page_type: f5(slab)
[   30.329961] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.330056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.330223] page dumped because: kasan: bad access detected
[   30.330313] 
[   30.330331] Memory state around the buggy address:
[   30.330656]  fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.330725]  fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   30.330837] >fff00000c7b7a900: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.330876]                    ^
[   30.331032]  fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.331267]  fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.331354] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   30.304306] ==================================================================
[   30.304395] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   30.304476] Write of size 16 at addr fff00000c7b7a7c0 by task kunit_try_catch/197
[   30.304598] 
[   30.304634] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.304844] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.304909] Hardware name: linux,dummy-virt (DT)
[   30.304950] Call trace:
[   30.304972]  show_stack+0x20/0x38 (C)
[   30.305041]  dump_stack_lvl+0x8c/0xd0
[   30.305087]  print_report+0x118/0x5e8
[   30.305133]  kasan_report+0xdc/0x128
[   30.305796]  __asan_report_store16_noabort+0x20/0x30
[   30.305875]  kmalloc_oob_16+0x3a0/0x3f8
[   30.306190]  kunit_try_run_case+0x170/0x3f0
[   30.306284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.306393]  kthread+0x328/0x630
[   30.306778]  ret_from_fork+0x10/0x20
[   30.306873] 
[   30.306894] Allocated by task 197:
[   30.307180]  kasan_save_stack+0x3c/0x68
[   30.307251]  kasan_save_track+0x20/0x40
[   30.307304]  kasan_save_alloc_info+0x40/0x58
[   30.307425]  __kasan_kmalloc+0xd4/0xd8
[   30.307561]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.307681]  kmalloc_oob_16+0xb4/0x3f8
[   30.307795]  kunit_try_run_case+0x170/0x3f0
[   30.307846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.307923]  kthread+0x328/0x630
[   30.308170]  ret_from_fork+0x10/0x20
[   30.308305] 
[   30.308349] The buggy address belongs to the object at fff00000c7b7a7c0
[   30.308349]  which belongs to the cache kmalloc-16 of size 16
[   30.308785] The buggy address is located 0 bytes inside of
[   30.308785]  allocated 13-byte region [fff00000c7b7a7c0, fff00000c7b7a7cd)
[   30.308984] 
[   30.309031] The buggy address belongs to the physical page:
[   30.309074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a
[   30.309144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.309192] page_type: f5(slab)
[   30.309230] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.309278] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.309316] page dumped because: kasan: bad access detected
[   30.309346] 
[   30.309363] Memory state around the buggy address:
[   30.309403]  fff00000c7b7a680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.309447]  fff00000c7b7a700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.309487] >fff00000c7b7a780: fa fb fc fc 00 00 fc fc 00 05 fc fc fa fb fc fc
[   30.309533]                                               ^
[   30.309567]  fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.309613]  fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   30.309657] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   30.280291] ==================================================================
[   30.280356] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   30.280691] Read of size 1 at addr fff00000c81a5000 by task kunit_try_catch/195
[   30.280995] 
[   30.281073] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.281215] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.281244] Hardware name: linux,dummy-virt (DT)
[   30.281273] Call trace:
[   30.281295]  show_stack+0x20/0x38 (C)
[   30.281611]  dump_stack_lvl+0x8c/0xd0
[   30.281665]  print_report+0x118/0x5e8
[   30.281708]  kasan_report+0xdc/0x128
[   30.281750]  __kasan_check_byte+0x54/0x70
[   30.281792]  krealloc_noprof+0x44/0x360
[   30.281848]  krealloc_uaf+0x180/0x520
[   30.282009]  kunit_try_run_case+0x170/0x3f0
[   30.282066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.282116]  kthread+0x328/0x630
[   30.282179]  ret_from_fork+0x10/0x20
[   30.282236] 
[   30.282265] Allocated by task 195:
[   30.282295]  kasan_save_stack+0x3c/0x68
[   30.282336]  kasan_save_track+0x20/0x40
[   30.282372]  kasan_save_alloc_info+0x40/0x58
[   30.282410]  __kasan_kmalloc+0xd4/0xd8
[   30.282443]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.282484]  krealloc_uaf+0xc8/0x520
[   30.282521]  kunit_try_run_case+0x170/0x3f0
[   30.282557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.282600]  kthread+0x328/0x630
[   30.282633]  ret_from_fork+0x10/0x20
[   30.282678] 
[   30.282697] Freed by task 195:
[   30.282730]  kasan_save_stack+0x3c/0x68
[   30.282765]  kasan_save_track+0x20/0x40
[   30.282809]  kasan_save_free_info+0x4c/0x78
[   30.283444]  __kasan_slab_free+0x6c/0x98
[   30.283520]  kfree+0x214/0x3c8
[   30.283586]  krealloc_uaf+0x12c/0x520
[   30.283920]  kunit_try_run_case+0x170/0x3f0
[   30.283987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.284077]  kthread+0x328/0x630
[   30.284384]  ret_from_fork+0x10/0x20
[   30.284454] 
[   30.284712] The buggy address belongs to the object at fff00000c81a5000
[   30.284712]  which belongs to the cache kmalloc-256 of size 256
[   30.284904] The buggy address is located 0 bytes inside of
[   30.284904]  freed 256-byte region [fff00000c81a5000, fff00000c81a5100)
[   30.285038] 
[   30.285079] The buggy address belongs to the physical page:
[   30.285116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.285485] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.285638] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.285746] page_type: f5(slab)
[   30.286237] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.286320] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.286445] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.286792] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.286877] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.286982] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.287035] page dumped because: kasan: bad access detected
[   30.287064] 
[   30.287137] Memory state around the buggy address:
[   30.287497]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.287547]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.287617] >fff00000c81a5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.287805]                    ^
[   30.287857]  fff00000c81a5080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.288288]  fff00000c81a5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.288359] ==================================================================
[   30.290149] ==================================================================
[   30.290207] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   30.290285] Read of size 1 at addr fff00000c81a5000 by task kunit_try_catch/195
[   30.290406] 
[   30.290444] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.290590] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.290637] Hardware name: linux,dummy-virt (DT)
[   30.291005] Call trace:
[   30.291106]  show_stack+0x20/0x38 (C)
[   30.291181]  dump_stack_lvl+0x8c/0xd0
[   30.291257]  print_report+0x118/0x5e8
[   30.291302]  kasan_report+0xdc/0x128
[   30.291384]  __asan_report_load1_noabort+0x20/0x30
[   30.291460]  krealloc_uaf+0x4c8/0x520
[   30.291603]  kunit_try_run_case+0x170/0x3f0
[   30.291687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.291740]  kthread+0x328/0x630
[   30.292077]  ret_from_fork+0x10/0x20
[   30.292168] 
[   30.292314] Allocated by task 195:
[   30.292353]  kasan_save_stack+0x3c/0x68
[   30.292405]  kasan_save_track+0x20/0x40
[   30.292534]  kasan_save_alloc_info+0x40/0x58
[   30.292580]  __kasan_kmalloc+0xd4/0xd8
[   30.292719]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.292764]  krealloc_uaf+0xc8/0x520
[   30.292800]  kunit_try_run_case+0x170/0x3f0
[   30.292913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.293010]  kthread+0x328/0x630
[   30.293345]  ret_from_fork+0x10/0x20
[   30.293409] 
[   30.293438] Freed by task 195:
[   30.293466]  kasan_save_stack+0x3c/0x68
[   30.293503]  kasan_save_track+0x20/0x40
[   30.293587]  kasan_save_free_info+0x4c/0x78
[   30.293625]  __kasan_slab_free+0x6c/0x98
[   30.293668]  kfree+0x214/0x3c8
[   30.293705]  krealloc_uaf+0x12c/0x520
[   30.293742]  kunit_try_run_case+0x170/0x3f0
[   30.293788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.293843]  kthread+0x328/0x630
[   30.293875]  ret_from_fork+0x10/0x20
[   30.293912] 
[   30.293931] The buggy address belongs to the object at fff00000c81a5000
[   30.293931]  which belongs to the cache kmalloc-256 of size 256
[   30.293994] The buggy address is located 0 bytes inside of
[   30.293994]  freed 256-byte region [fff00000c81a5000, fff00000c81a5100)
[   30.294052] 
[   30.294085] The buggy address belongs to the physical page:
[   30.294117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.294203] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.294256] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.294304] page_type: f5(slab)
[   30.294356] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.294404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.294450] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.294497] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.294544] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.294600] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.294639] page dumped because: kasan: bad access detected
[   30.294677] 
[   30.294696] Memory state around the buggy address:
[   30.294726]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.294767]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.294807] >fff00000c81a5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.295168]                    ^
[   30.295372]  fff00000c81a5080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.295431]  fff00000c81a5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.295485] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   30.185015] ==================================================================
[   30.185370] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.185889] Write of size 1 at addr fff00000c81a4eda by task kunit_try_catch/189
[   30.186266] 
[   30.186920] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.187291] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.187344] Hardware name: linux,dummy-virt (DT)
[   30.187456] Call trace:
[   30.187515]  show_stack+0x20/0x38 (C)
[   30.187618]  dump_stack_lvl+0x8c/0xd0
[   30.187705]  print_report+0x118/0x5e8
[   30.188060]  kasan_report+0xdc/0x128
[   30.188495]  __asan_report_store1_noabort+0x20/0x30
[   30.188575]  krealloc_less_oob_helper+0xa80/0xc50
[   30.188748]  krealloc_less_oob+0x20/0x38
[   30.188878]  kunit_try_run_case+0x170/0x3f0
[   30.189230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.189611]  kthread+0x328/0x630
[   30.189850]  ret_from_fork+0x10/0x20
[   30.189907] 
[   30.189925] Allocated by task 189:
[   30.190197]  kasan_save_stack+0x3c/0x68
[   30.190559]  kasan_save_track+0x20/0x40
[   30.190792]  kasan_save_alloc_info+0x40/0x58
[   30.190874]  __kasan_krealloc+0x118/0x178
[   30.190943]  krealloc_noprof+0x128/0x360
[   30.190978]  krealloc_less_oob_helper+0x168/0xc50
[   30.191177]  krealloc_less_oob+0x20/0x38
[   30.191261]  kunit_try_run_case+0x170/0x3f0
[   30.191393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.191455]  kthread+0x328/0x630
[   30.191488]  ret_from_fork+0x10/0x20
[   30.191739] 
[   30.192160] The buggy address belongs to the object at fff00000c81a4e00
[   30.192160]  which belongs to the cache kmalloc-256 of size 256
[   30.192375] The buggy address is located 17 bytes to the right of
[   30.192375]  allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9)
[   30.192583] 
[   30.192640] The buggy address belongs to the physical page:
[   30.192682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.193035] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.193199] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.193279] page_type: f5(slab)
[   30.193316] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.193526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.193763] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.193877] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.194008] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.194282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.194449] page dumped because: kasan: bad access detected
[   30.194539] 
[   30.194558] Memory state around the buggy address:
[   30.194708]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.194848]  fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.195012] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.195053]                                                     ^
[   30.195132]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.195398]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.195634] ==================================================================
[   30.161397] ==================================================================
[   30.161793] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.162341] Write of size 1 at addr fff00000c81a4ec9 by task kunit_try_catch/189
[   30.162445] 
[   30.162492] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.162827] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.162923] Hardware name: linux,dummy-virt (DT)
[   30.163250] Call trace:
[   30.163322]  show_stack+0x20/0x38 (C)
[   30.163447]  dump_stack_lvl+0x8c/0xd0
[   30.163694]  print_report+0x118/0x5e8
[   30.163872]  kasan_report+0xdc/0x128
[   30.163948]  __asan_report_store1_noabort+0x20/0x30
[   30.164103]  krealloc_less_oob_helper+0xa48/0xc50
[   30.164215]  krealloc_less_oob+0x20/0x38
[   30.164366]  kunit_try_run_case+0x170/0x3f0
[   30.164563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.165201]  kthread+0x328/0x630
[   30.165311]  ret_from_fork+0x10/0x20
[   30.165441] 
[   30.165508] Allocated by task 189:
[   30.165633]  kasan_save_stack+0x3c/0x68
[   30.165955]  kasan_save_track+0x20/0x40
[   30.166126]  kasan_save_alloc_info+0x40/0x58
[   30.166206]  __kasan_krealloc+0x118/0x178
[   30.166250]  krealloc_noprof+0x128/0x360
[   30.166578]  krealloc_less_oob_helper+0x168/0xc50
[   30.166763]  krealloc_less_oob+0x20/0x38
[   30.166859]  kunit_try_run_case+0x170/0x3f0
[   30.167068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.167222]  kthread+0x328/0x630
[   30.167362]  ret_from_fork+0x10/0x20
[   30.167531] 
[   30.167858] The buggy address belongs to the object at fff00000c81a4e00
[   30.167858]  which belongs to the cache kmalloc-256 of size 256
[   30.168110] The buggy address is located 0 bytes to the right of
[   30.168110]  allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9)
[   30.168410] 
[   30.168447] The buggy address belongs to the physical page:
[   30.168484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.168552] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.168596] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.168646] page_type: f5(slab)
[   30.168684] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.168733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.168780] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.168846] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.169304] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.169568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.169714] page dumped because: kasan: bad access detected
[   30.169801] 
[   30.170132] Memory state around the buggy address:
[   30.170400]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.170522]  fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.170708] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.170754]                                               ^
[   30.170986]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.171195]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.171399] ==================================================================
[   30.178292] ==================================================================
[   30.178656] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.178739] Write of size 1 at addr fff00000c81a4ed0 by task kunit_try_catch/189
[   30.178796] 
[   30.178979] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.179088] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.179312] Hardware name: linux,dummy-virt (DT)
[   30.179356] Call trace:
[   30.179705]  show_stack+0x20/0x38 (C)
[   30.179848]  dump_stack_lvl+0x8c/0xd0
[   30.179903]  print_report+0x118/0x5e8
[   30.179947]  kasan_report+0xdc/0x128
[   30.180034]  __asan_report_store1_noabort+0x20/0x30
[   30.180085]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.180160]  krealloc_less_oob+0x20/0x38
[   30.180522]  kunit_try_run_case+0x170/0x3f0
[   30.180662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.180793]  kthread+0x328/0x630
[   30.180880]  ret_from_fork+0x10/0x20
[   30.181153] 
[   30.181270] Allocated by task 189:
[   30.181458]  kasan_save_stack+0x3c/0x68
[   30.181520]  kasan_save_track+0x20/0x40
[   30.181577]  kasan_save_alloc_info+0x40/0x58
[   30.181613]  __kasan_krealloc+0x118/0x178
[   30.181840]  krealloc_noprof+0x128/0x360
[   30.181933]  krealloc_less_oob_helper+0x168/0xc50
[   30.182169]  krealloc_less_oob+0x20/0x38
[   30.182281]  kunit_try_run_case+0x170/0x3f0
[   30.182378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.182541]  kthread+0x328/0x630
[   30.182579]  ret_from_fork+0x10/0x20
[   30.182792] 
[   30.182984] The buggy address belongs to the object at fff00000c81a4e00
[   30.182984]  which belongs to the cache kmalloc-256 of size 256
[   30.183194] The buggy address is located 7 bytes to the right of
[   30.183194]  allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9)
[   30.183265] 
[   30.183284] The buggy address belongs to the physical page:
[   30.183318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.183381] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.183434] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.183491] page_type: f5(slab)
[   30.183529] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.183576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.183623] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.183669] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.183716] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.183762] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.183800] page dumped because: kasan: bad access detected
[   30.183841] 
[   30.183867] Memory state around the buggy address:
[   30.183907]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.183949]  fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.183990] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.184025]                                                  ^
[   30.184070]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.184121]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.184156] ==================================================================
[   30.240306] ==================================================================
[   30.240369] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.240423] Write of size 1 at addr fff00000c9aea0c9 by task kunit_try_catch/193
[   30.240471] 
[   30.240502] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.240586] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.240616] Hardware name: linux,dummy-virt (DT)
[   30.240645] Call trace:
[   30.240667]  show_stack+0x20/0x38 (C)
[   30.240714]  dump_stack_lvl+0x8c/0xd0
[   30.240758]  print_report+0x118/0x5e8
[   30.240801]  kasan_report+0xdc/0x128
[   30.241662]  __asan_report_store1_noabort+0x20/0x30
[   30.241786]  krealloc_less_oob_helper+0xa48/0xc50
[   30.241949]  krealloc_large_less_oob+0x20/0x38
[   30.242050]  kunit_try_run_case+0x170/0x3f0
[   30.242147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.242299]  kthread+0x328/0x630
[   30.242342]  ret_from_fork+0x10/0x20
[   30.242725] 
[   30.242831] The buggy address belongs to the physical page:
[   30.242983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.243141] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.243237] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.243625] page_type: f8(unknown)
[   30.243732] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.243834] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.243976] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.244048] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.244351] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.244789] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.244936] page dumped because: kasan: bad access detected
[   30.244988] 
[   30.245007] Memory state around the buggy address:
[   30.245045]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.245099]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.245446] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.245615]                                               ^
[   30.245694]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.245900]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.246306] ==================================================================
[   30.247608] ==================================================================
[   30.247692] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.247747] Write of size 1 at addr fff00000c9aea0d0 by task kunit_try_catch/193
[   30.247897] 
[   30.247928] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.248157] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.248313] Hardware name: linux,dummy-virt (DT)
[   30.248348] Call trace:
[   30.248369]  show_stack+0x20/0x38 (C)
[   30.248648]  dump_stack_lvl+0x8c/0xd0
[   30.248792]  print_report+0x118/0x5e8
[   30.248944]  kasan_report+0xdc/0x128
[   30.249065]  __asan_report_store1_noabort+0x20/0x30
[   30.249251]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.249314]  krealloc_large_less_oob+0x20/0x38
[   30.249656]  kunit_try_run_case+0x170/0x3f0
[   30.249765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.250005]  kthread+0x328/0x630
[   30.250093]  ret_from_fork+0x10/0x20
[   30.250268] 
[   30.250363] The buggy address belongs to the physical page:
[   30.250407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.250835] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.250931] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.251031] page_type: f8(unknown)
[   30.251237] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.251331] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.251647] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.251723] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.251867] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.252312] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.252654] page dumped because: kasan: bad access detected
[   30.252715] 
[   30.252763] Memory state around the buggy address:
[   30.252889]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.252951]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.252992] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.253038]                                                  ^
[   30.253074]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.253479]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.253877] ==================================================================
[   30.262647] ==================================================================
[   30.262736] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.263052] Write of size 1 at addr fff00000c9aea0ea by task kunit_try_catch/193
[   30.263120] 
[   30.263151] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.263236] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.263264] Hardware name: linux,dummy-virt (DT)
[   30.263348] Call trace:
[   30.263374]  show_stack+0x20/0x38 (C)
[   30.263425]  dump_stack_lvl+0x8c/0xd0
[   30.263471]  print_report+0x118/0x5e8
[   30.263515]  kasan_report+0xdc/0x128
[   30.263558]  __asan_report_store1_noabort+0x20/0x30
[   30.263611]  krealloc_less_oob_helper+0xae4/0xc50
[   30.263679]  krealloc_large_less_oob+0x20/0x38
[   30.263736]  kunit_try_run_case+0x170/0x3f0
[   30.263789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.263852]  kthread+0x328/0x630
[   30.263893]  ret_from_fork+0x10/0x20
[   30.263938] 
[   30.263967] The buggy address belongs to the physical page:
[   30.263998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.264048] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.264105] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.264152] page_type: f8(unknown)
[   30.264196] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.264244] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.264290] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.264344] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.264391] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.264436] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.264472] page dumped because: kasan: bad access detected
[   30.264501] 
[   30.264526] Memory state around the buggy address:
[   30.264555]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.264596]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.264645] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.264687]                                                           ^
[   30.264723]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.264771]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.265215] ==================================================================
[   30.266094] ==================================================================
[   30.266138] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.266210] Write of size 1 at addr fff00000c9aea0eb by task kunit_try_catch/193
[   30.266267] 
[   30.266597] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.266832] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.266870] Hardware name: linux,dummy-virt (DT)
[   30.266938] Call trace:
[   30.267000]  show_stack+0x20/0x38 (C)
[   30.267054]  dump_stack_lvl+0x8c/0xd0
[   30.267100]  print_report+0x118/0x5e8
[   30.267423]  kasan_report+0xdc/0x128
[   30.267535]  __asan_report_store1_noabort+0x20/0x30
[   30.267588]  krealloc_less_oob_helper+0xa58/0xc50
[   30.267653]  krealloc_large_less_oob+0x20/0x38
[   30.267729]  kunit_try_run_case+0x170/0x3f0
[   30.267783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.268005]  kthread+0x328/0x630
[   30.268048]  ret_from_fork+0x10/0x20
[   30.268435] 
[   30.268478] The buggy address belongs to the physical page:
[   30.268512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.268915] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.269034] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.269211] page_type: f8(unknown)
[   30.269287] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.269382] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.269479] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.269548] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.269753] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.270030] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.270141] page dumped because: kasan: bad access detected
[   30.270218] 
[   30.270330] Memory state around the buggy address:
[   30.270408]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.270539]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.270595] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.270692]                                                           ^
[   30.270731]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.271064]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.271146] ==================================================================
[   30.255904] ==================================================================
[   30.256075] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.256137] Write of size 1 at addr fff00000c9aea0da by task kunit_try_catch/193
[   30.256203] 
[   30.256317] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.256433] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.256464] Hardware name: linux,dummy-virt (DT)
[   30.256504] Call trace:
[   30.256533]  show_stack+0x20/0x38 (C)
[   30.256585]  dump_stack_lvl+0x8c/0xd0
[   30.256635]  print_report+0x118/0x5e8
[   30.256688]  kasan_report+0xdc/0x128
[   30.256732]  __asan_report_store1_noabort+0x20/0x30
[   30.256779]  krealloc_less_oob_helper+0xa80/0xc50
[   30.257288]  krealloc_large_less_oob+0x20/0x38
[   30.257539]  kunit_try_run_case+0x170/0x3f0
[   30.257710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.257904]  kthread+0x328/0x630
[   30.257962]  ret_from_fork+0x10/0x20
[   30.258346] 
[   30.258486] The buggy address belongs to the physical page:
[   30.258531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.258907] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.259049] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.259401] page_type: f8(unknown)
[   30.259483] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.259584] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.260027] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.260111] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.260280] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.260445] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.260559] page dumped because: kasan: bad access detected
[   30.260690] 
[   30.260754] Memory state around the buggy address:
[   30.260786]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.260847]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.261191] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.261343]                                                     ^
[   30.261382]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.261423]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.261466] ==================================================================
[   30.196794] ==================================================================
[   30.197180] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.197371] Write of size 1 at addr fff00000c81a4eea by task kunit_try_catch/189
[   30.197552] 
[   30.197636] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.197950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.197986] Hardware name: linux,dummy-virt (DT)
[   30.198056] Call trace:
[   30.198581]  show_stack+0x20/0x38 (C)
[   30.198644]  dump_stack_lvl+0x8c/0xd0
[   30.198691]  print_report+0x118/0x5e8
[   30.198744]  kasan_report+0xdc/0x128
[   30.198786]  __asan_report_store1_noabort+0x20/0x30
[   30.198846]  krealloc_less_oob_helper+0xae4/0xc50
[   30.198919]  krealloc_less_oob+0x20/0x38
[   30.198965]  kunit_try_run_case+0x170/0x3f0
[   30.199011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.199062]  kthread+0x328/0x630
[   30.199121]  ret_from_fork+0x10/0x20
[   30.199199] 
[   30.199217] Allocated by task 189:
[   30.199258]  kasan_save_stack+0x3c/0x68
[   30.199308]  kasan_save_track+0x20/0x40
[   30.199348]  kasan_save_alloc_info+0x40/0x58
[   30.199384]  __kasan_krealloc+0x118/0x178
[   30.199433]  krealloc_noprof+0x128/0x360
[   30.199476]  krealloc_less_oob_helper+0x168/0xc50
[   30.199524]  krealloc_less_oob+0x20/0x38
[   30.199561]  kunit_try_run_case+0x170/0x3f0
[   30.199596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.199636]  kthread+0x328/0x630
[   30.199673]  ret_from_fork+0x10/0x20
[   30.199713] 
[   30.199746] The buggy address belongs to the object at fff00000c81a4e00
[   30.199746]  which belongs to the cache kmalloc-256 of size 256
[   30.199800] The buggy address is located 33 bytes to the right of
[   30.199800]  allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9)
[   30.199871] 
[   30.199898] The buggy address belongs to the physical page:
[   30.199930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.199988] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.200041] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.200088] page_type: f5(slab)
[   30.200124] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.200186] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.200234] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.200291] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.200338] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.200384] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.200421] page dumped because: kasan: bad access detected
[   30.200450] 
[   30.200475] Memory state around the buggy address:
[   30.200505]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.200545]  fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.200595] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.200630]                                                           ^
[   30.200666]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.200721]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.200766] ==================================================================
[   30.202449] ==================================================================
[   30.202941] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.203026] Write of size 1 at addr fff00000c81a4eeb by task kunit_try_catch/189
[   30.203103] 
[   30.203145] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.203231] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.203516] Hardware name: linux,dummy-virt (DT)
[   30.203563] Call trace:
[   30.203760]  show_stack+0x20/0x38 (C)
[   30.203856]  dump_stack_lvl+0x8c/0xd0
[   30.203911]  print_report+0x118/0x5e8
[   30.203954]  kasan_report+0xdc/0x128
[   30.203998]  __asan_report_store1_noabort+0x20/0x30
[   30.204233]  krealloc_less_oob_helper+0xa58/0xc50
[   30.204339]  krealloc_less_oob+0x20/0x38
[   30.204541]  kunit_try_run_case+0x170/0x3f0
[   30.204605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.204659]  kthread+0x328/0x630
[   30.204880]  ret_from_fork+0x10/0x20
[   30.204942] 
[   30.205369] Allocated by task 189:
[   30.205537]  kasan_save_stack+0x3c/0x68
[   30.205628]  kasan_save_track+0x20/0x40
[   30.205748]  kasan_save_alloc_info+0x40/0x58
[   30.205846]  __kasan_krealloc+0x118/0x178
[   30.205964]  krealloc_noprof+0x128/0x360
[   30.206004]  krealloc_less_oob_helper+0x168/0xc50
[   30.206092]  krealloc_less_oob+0x20/0x38
[   30.206440]  kunit_try_run_case+0x170/0x3f0
[   30.206639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.206759]  kthread+0x328/0x630
[   30.206889]  ret_from_fork+0x10/0x20
[   30.207087] 
[   30.207337] The buggy address belongs to the object at fff00000c81a4e00
[   30.207337]  which belongs to the cache kmalloc-256 of size 256
[   30.207591] The buggy address is located 34 bytes to the right of
[   30.207591]  allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9)
[   30.207719] 
[   30.207919] The buggy address belongs to the physical page:
[   30.207987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.208061] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.208197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.208304] page_type: f5(slab)
[   30.208490] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.208624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.208861] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.208989] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.209142] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.209238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.209331] page dumped because: kasan: bad access detected
[   30.209363] 
[   30.209396] Memory state around the buggy address:
[   30.209606]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.209703]  fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.209759] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.210019]                                                           ^
[   30.210086]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.210182]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.210263] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   30.220659] ==================================================================
[   30.220946] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.221018] Write of size 1 at addr fff00000c9aea0eb by task kunit_try_catch/191
[   30.221067] 
[   30.221102] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.221188] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.221216] Hardware name: linux,dummy-virt (DT)
[   30.221246] Call trace:
[   30.221268]  show_stack+0x20/0x38 (C)
[   30.221315]  dump_stack_lvl+0x8c/0xd0
[   30.221361]  print_report+0x118/0x5e8
[   30.221404]  kasan_report+0xdc/0x128
[   30.221445]  __asan_report_store1_noabort+0x20/0x30
[   30.221493]  krealloc_more_oob_helper+0x60c/0x678
[   30.221541]  krealloc_large_more_oob+0x20/0x38
[   30.221588]  kunit_try_run_case+0x170/0x3f0
[   30.221634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.221684]  kthread+0x328/0x630
[   30.221725]  ret_from_fork+0x10/0x20
[   30.221770] 
[   30.221789] The buggy address belongs to the physical page:
[   30.221838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.221889] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.221932] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.221981] page_type: f8(unknown)
[   30.222018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.222064] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.222175] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.222291] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.222461] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.222516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.222562] page dumped because: kasan: bad access detected
[   30.222591] 
[   30.222608] Memory state around the buggy address:
[   30.222837]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.223107]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.223989] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.224052]                                                           ^
[   30.224139]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.224183]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.224269] ==================================================================
[   30.144348] ==================================================================
[   30.144842] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.144994] Write of size 1 at addr fff00000c81a4cf0 by task kunit_try_catch/187
[   30.145106] 
[   30.145157] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.145522] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.145659] Hardware name: linux,dummy-virt (DT)
[   30.145727] Call trace:
[   30.145796]  show_stack+0x20/0x38 (C)
[   30.145959]  dump_stack_lvl+0x8c/0xd0
[   30.146060]  print_report+0x118/0x5e8
[   30.146167]  kasan_report+0xdc/0x128
[   30.146220]  __asan_report_store1_noabort+0x20/0x30
[   30.146277]  krealloc_more_oob_helper+0x5c0/0x678
[   30.146326]  krealloc_more_oob+0x20/0x38
[   30.146371]  kunit_try_run_case+0x170/0x3f0
[   30.146425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.146484]  kthread+0x328/0x630
[   30.146533]  ret_from_fork+0x10/0x20
[   30.146579] 
[   30.146597] Allocated by task 187:
[   30.146626]  kasan_save_stack+0x3c/0x68
[   30.146671]  kasan_save_track+0x20/0x40
[   30.146706]  kasan_save_alloc_info+0x40/0x58
[   30.146752]  __kasan_krealloc+0x118/0x178
[   30.146786]  krealloc_noprof+0x128/0x360
[   30.147140]  krealloc_more_oob_helper+0x168/0x678
[   30.147408]  krealloc_more_oob+0x20/0x38
[   30.147670]  kunit_try_run_case+0x170/0x3f0
[   30.147848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.148021]  kthread+0x328/0x630
[   30.148107]  ret_from_fork+0x10/0x20
[   30.148214] 
[   30.148482] The buggy address belongs to the object at fff00000c81a4c00
[   30.148482]  which belongs to the cache kmalloc-256 of size 256
[   30.148749] The buggy address is located 5 bytes to the right of
[   30.148749]  allocated 235-byte region [fff00000c81a4c00, fff00000c81a4ceb)
[   30.148954] 
[   30.149032] The buggy address belongs to the physical page:
[   30.149135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.149190] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.149252] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.149677] page_type: f5(slab)
[   30.150161] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.150230] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.150658] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.150743] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.150847] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.151493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.151604] page dumped because: kasan: bad access detected
[   30.151781] 
[   30.151880] Memory state around the buggy address:
[   30.152050]  fff00000c81a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.152137]  fff00000c81a4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.152213] >fff00000c81a4c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.152416]                                                              ^
[   30.152496]  fff00000c81a4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.152601]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.152656] ==================================================================
[   30.227205] ==================================================================
[   30.227253] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.227304] Write of size 1 at addr fff00000c9aea0f0 by task kunit_try_catch/191
[   30.227352] 
[   30.227380] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.227465] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.227492] Hardware name: linux,dummy-virt (DT)
[   30.227521] Call trace:
[   30.227542]  show_stack+0x20/0x38 (C)
[   30.227587]  dump_stack_lvl+0x8c/0xd0
[   30.227641]  print_report+0x118/0x5e8
[   30.227685]  kasan_report+0xdc/0x128
[   30.227727]  __asan_report_store1_noabort+0x20/0x30
[   30.227776]  krealloc_more_oob_helper+0x5c0/0x678
[   30.228083]  krealloc_large_more_oob+0x20/0x38
[   30.228162]  kunit_try_run_case+0x170/0x3f0
[   30.228209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.228261]  kthread+0x328/0x630
[   30.228494]  ret_from_fork+0x10/0x20
[   30.228799] 
[   30.228846] The buggy address belongs to the physical page:
[   30.228993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.229062] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.229105] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.229503] page_type: f8(unknown)
[   30.229625] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.229676] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.229783] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.230014] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.230502] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.230728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.230969] page dumped because: kasan: bad access detected
[   30.231241] 
[   30.231268] Memory state around the buggy address:
[   30.231300]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.231636]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.231851] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.231961]                                                              ^
[   30.232222]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.232457]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.232604] ==================================================================
[   30.136043] ==================================================================
[   30.136100] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.136156] Write of size 1 at addr fff00000c81a4ceb by task kunit_try_catch/187
[   30.136204] 
[   30.136236] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.136320] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.136348] Hardware name: linux,dummy-virt (DT)
[   30.136378] Call trace:
[   30.136400]  show_stack+0x20/0x38 (C)
[   30.136447]  dump_stack_lvl+0x8c/0xd0
[   30.136491]  print_report+0x118/0x5e8
[   30.136534]  kasan_report+0xdc/0x128
[   30.136577]  __asan_report_store1_noabort+0x20/0x30
[   30.136627]  krealloc_more_oob_helper+0x60c/0x678
[   30.136676]  krealloc_more_oob+0x20/0x38
[   30.136721]  kunit_try_run_case+0x170/0x3f0
[   30.136768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.137727]  kthread+0x328/0x630
[   30.137925]  ret_from_fork+0x10/0x20
[   30.138032] 
[   30.138135] Allocated by task 187:
[   30.138170]  kasan_save_stack+0x3c/0x68
[   30.138256]  kasan_save_track+0x20/0x40
[   30.138451]  kasan_save_alloc_info+0x40/0x58
[   30.138497]  __kasan_krealloc+0x118/0x178
[   30.138737]  krealloc_noprof+0x128/0x360
[   30.138841]  krealloc_more_oob_helper+0x168/0x678
[   30.138888]  krealloc_more_oob+0x20/0x38
[   30.138926]  kunit_try_run_case+0x170/0x3f0
[   30.139016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.139235]  kthread+0x328/0x630
[   30.139392]  ret_from_fork+0x10/0x20
[   30.139525] 
[   30.139685] The buggy address belongs to the object at fff00000c81a4c00
[   30.139685]  which belongs to the cache kmalloc-256 of size 256
[   30.140069] The buggy address is located 0 bytes to the right of
[   30.140069]  allocated 235-byte region [fff00000c81a4c00, fff00000c81a4ceb)
[   30.140161] 
[   30.140489] The buggy address belongs to the physical page:
[   30.140660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.140737] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.140791] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.141018] page_type: f5(slab)
[   30.141261] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.141432] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.141527] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.141666] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.141753] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.141829] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.142020] page dumped because: kasan: bad access detected
[   30.142294] 
[   30.142405] Memory state around the buggy address:
[   30.142496]  fff00000c81a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.142587]  fff00000c81a4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.142846] >fff00000c81a4c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.142940]                                                           ^
[   30.143222]  fff00000c81a4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.143360]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.143505] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   30.120260] ==================================================================
[   30.120365] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   30.120625] Read of size 1 at addr fff00000c9b30000 by task kunit_try_catch/185
[   30.120684] 
[   30.120718] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.120824] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.121293] Hardware name: linux,dummy-virt (DT)
[   30.121332] Call trace:
[   30.121355]  show_stack+0x20/0x38 (C)
[   30.121661]  dump_stack_lvl+0x8c/0xd0
[   30.121880]  print_report+0x118/0x5e8
[   30.122028]  kasan_report+0xdc/0x128
[   30.122138]  __asan_report_load1_noabort+0x20/0x30
[   30.122306]  page_alloc_uaf+0x328/0x350
[   30.122357]  kunit_try_run_case+0x170/0x3f0
[   30.122731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.123093]  kthread+0x328/0x630
[   30.123204]  ret_from_fork+0x10/0x20
[   30.123330] 
[   30.123358] The buggy address belongs to the physical page:
[   30.123793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b30
[   30.124023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.124086] page_type: f0(buddy)
[   30.124127] raw: 0bfffe0000000000 fff00000ff6160e0 fff00000ff6160e0 0000000000000000
[   30.124453] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   30.124612] page dumped because: kasan: bad access detected
[   30.124654] 
[   30.124673] Memory state around the buggy address:
[   30.124750]  fff00000c9b2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.124914]  fff00000c9b2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.125218] >fff00000c9b30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.125261]                    ^
[   30.125623]  fff00000c9b30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.125712]  fff00000c9b30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.125784] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   30.104316] ==================================================================
[   30.104396] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   30.104458] Free of addr fff00000c9ae4001 by task kunit_try_catch/181
[   30.104502] 
[   30.104532] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.104617] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.104646] Hardware name: linux,dummy-virt (DT)
[   30.104676] Call trace:
[   30.104696]  show_stack+0x20/0x38 (C)
[   30.104743]  dump_stack_lvl+0x8c/0xd0
[   30.104787]  print_report+0x118/0x5e8
[   30.104875]  kasan_report_invalid_free+0xc0/0xe8
[   30.105026]  __kasan_kfree_large+0x5c/0xa8
[   30.105150]  free_large_kmalloc+0x68/0x150
[   30.105337]  kfree+0x270/0x3c8
[   30.105446]  kmalloc_large_invalid_free+0x108/0x270
[   30.105515]  kunit_try_run_case+0x170/0x3f0
[   30.105561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.105631]  kthread+0x328/0x630
[   30.105672]  ret_from_fork+0x10/0x20
[   30.105717] 
[   30.105736] The buggy address belongs to the physical page:
[   30.105769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4
[   30.105829] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.105873] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.106141] page_type: f8(unknown)
[   30.106192] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.106240] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.106293] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.106350] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.106396] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff
[   30.106443] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.106481] page dumped because: kasan: bad access detected
[   30.106517] 
[   30.106596] Memory state around the buggy address:
[   30.106638]  fff00000c9ae3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.106680]  fff00000c9ae3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.106722] >fff00000c9ae4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.106757]                    ^
[   30.106792]  fff00000c9ae4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.106843]  fff00000c9ae4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.107193] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   30.092858] ==================================================================
[   30.092991] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   30.093045] Read of size 1 at addr fff00000c9ae4000 by task kunit_try_catch/179
[   30.093092] 
[   30.093171] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.093286] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.093502] Hardware name: linux,dummy-virt (DT)
[   30.093535] Call trace:
[   30.093602]  show_stack+0x20/0x38 (C)
[   30.093727]  dump_stack_lvl+0x8c/0xd0
[   30.093856]  print_report+0x118/0x5e8
[   30.093954]  kasan_report+0xdc/0x128
[   30.094099]  __asan_report_load1_noabort+0x20/0x30
[   30.094211]  kmalloc_large_uaf+0x2cc/0x2f8
[   30.094320]  kunit_try_run_case+0x170/0x3f0
[   30.094431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.094500]  kthread+0x328/0x630
[   30.094541]  ret_from_fork+0x10/0x20
[   30.094955] 
[   30.095032] The buggy address belongs to the physical page:
[   30.095131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4
[   30.095270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.095455] raw: 0bfffe0000000000 ffffc1ffc326ba08 fff00000da472d00 0000000000000000
[   30.095568] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   30.095647] page dumped because: kasan: bad access detected
[   30.095727] 
[   30.095745] Memory state around the buggy address:
[   30.095775]  fff00000c9ae3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.096169]  fff00000c9ae3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.096268] >fff00000c9ae4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.096369]                    ^
[   30.096397]  fff00000c9ae4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.096437]  fff00000c9ae4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.096882] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   30.084141] ==================================================================
[   30.084634] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   30.084695] Write of size 1 at addr fff00000c9ae600a by task kunit_try_catch/177
[   30.084742] 
[   30.084772] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.084878] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.084906] Hardware name: linux,dummy-virt (DT)
[   30.084934] Call trace:
[   30.084956]  show_stack+0x20/0x38 (C)
[   30.085002]  dump_stack_lvl+0x8c/0xd0
[   30.086897]  print_report+0x118/0x5e8
[   30.086941]  kasan_report+0xdc/0x128
[   30.086982]  __asan_report_store1_noabort+0x20/0x30
[   30.087029]  kmalloc_large_oob_right+0x278/0x2b8
[   30.087075]  kunit_try_run_case+0x170/0x3f0
[   30.087122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.087171]  kthread+0x328/0x630
[   30.087212]  ret_from_fork+0x10/0x20
[   30.087257] 
[   30.087292] The buggy address belongs to the physical page:
[   30.087328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4
[   30.087380] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.087424] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.087480] page_type: f8(unknown)
[   30.087519] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.087567] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.087613] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.087659] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.087705] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff
[   30.087751] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.087790] page dumped because: kasan: bad access detected
[   30.087831] 
[   30.087878] Memory state around the buggy address:
[   30.087910]  fff00000c9ae5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.087973]  fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.088020] >fff00000c9ae6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.088195]                       ^
[   30.088287]  fff00000c9ae6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.088338]  fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.088426] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   30.074731] ==================================================================
[   30.074795] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   30.074881] Write of size 1 at addr fff00000c9b09f00 by task kunit_try_catch/175
[   30.074965] 
[   30.075013] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.075100] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.075127] Hardware name: linux,dummy-virt (DT)
[   30.075156] Call trace:
[   30.075177]  show_stack+0x20/0x38 (C)
[   30.075365]  dump_stack_lvl+0x8c/0xd0
[   30.075437]  print_report+0x118/0x5e8
[   30.075483]  kasan_report+0xdc/0x128
[   30.075532]  __asan_report_store1_noabort+0x20/0x30
[   30.075579]  kmalloc_big_oob_right+0x2a4/0x2f0
[   30.075645]  kunit_try_run_case+0x170/0x3f0
[   30.075710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.075766]  kthread+0x328/0x630
[   30.075873]  ret_from_fork+0x10/0x20
[   30.075923] 
[   30.075959] Allocated by task 175:
[   30.075986]  kasan_save_stack+0x3c/0x68
[   30.076040]  kasan_save_track+0x20/0x40
[   30.076075]  kasan_save_alloc_info+0x40/0x58
[   30.076225]  __kasan_kmalloc+0xd4/0xd8
[   30.076396]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.076475]  kmalloc_big_oob_right+0xb8/0x2f0
[   30.076523]  kunit_try_run_case+0x170/0x3f0
[   30.076569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.076611]  kthread+0x328/0x630
[   30.076645]  ret_from_fork+0x10/0x20
[   30.076680] 
[   30.076699] The buggy address belongs to the object at fff00000c9b08000
[   30.076699]  which belongs to the cache kmalloc-8k of size 8192
[   30.076841] The buggy address is located 0 bytes to the right of
[   30.076841]  allocated 7936-byte region [fff00000c9b08000, fff00000c9b09f00)
[   30.077134] 
[   30.077162] The buggy address belongs to the physical page:
[   30.077212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b08
[   30.077337] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.077397] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.077466] page_type: f5(slab)
[   30.077504] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.077780] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.077914] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.078081] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.078296] head: 0bfffe0000000003 ffffc1ffc326c201 00000000ffffffff 00000000ffffffff
[   30.078424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.078546] page dumped because: kasan: bad access detected
[   30.078618] 
[   30.078636] Memory state around the buggy address:
[   30.078679]  fff00000c9b09e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.078883]  fff00000c9b09e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.079140] >fff00000c9b09f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.079252]                    ^
[   30.079322]  fff00000c9b09f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.079361]  fff00000c9b0a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.079596] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   30.058762] ==================================================================
[   30.058847] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   30.058907] Write of size 1 at addr fff00000c3f71978 by task kunit_try_catch/173
[   30.058955] 
[   30.058988] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.059078] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.059107] Hardware name: linux,dummy-virt (DT)
[   30.059147] Call trace:
[   30.059170]  show_stack+0x20/0x38 (C)
[   30.059217]  dump_stack_lvl+0x8c/0xd0
[   30.059271]  print_report+0x118/0x5e8
[   30.059315]  kasan_report+0xdc/0x128
[   30.059357]  __asan_report_store1_noabort+0x20/0x30
[   30.059405]  kmalloc_track_caller_oob_right+0x40c/0x488
[   30.059455]  kunit_try_run_case+0x170/0x3f0
[   30.059501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.059552]  kthread+0x328/0x630
[   30.059595]  ret_from_fork+0x10/0x20
[   30.059641] 
[   30.059664] Allocated by task 173:
[   30.059691]  kasan_save_stack+0x3c/0x68
[   30.059729]  kasan_save_track+0x20/0x40
[   30.059762]  kasan_save_alloc_info+0x40/0x58
[   30.059798]  __kasan_kmalloc+0xd4/0xd8
[   30.059841]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.059881]  kmalloc_track_caller_oob_right+0xa8/0x488
[   30.059921]  kunit_try_run_case+0x170/0x3f0
[   30.059956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.060022]  kthread+0x328/0x630
[   30.060069]  ret_from_fork+0x10/0x20
[   30.060362] 
[   30.060401] The buggy address belongs to the object at fff00000c3f71900
[   30.060401]  which belongs to the cache kmalloc-128 of size 128
[   30.060466] The buggy address is located 0 bytes to the right of
[   30.060466]  allocated 120-byte region [fff00000c3f71900, fff00000c3f71978)
[   30.060527] 
[   30.060545] The buggy address belongs to the physical page:
[   30.060599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.060654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.060801] page_type: f5(slab)
[   30.060864] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.060945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.060985] page dumped because: kasan: bad access detected
[   30.061014] 
[   30.061031] Memory state around the buggy address:
[   30.061136]  fff00000c3f71800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.061244]  fff00000c3f71880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061390] >fff00000c3f71900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.061428]                                                                 ^
[   30.061466]  fff00000c3f71980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061506]  fff00000c3f71a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061543] ==================================================================
[   30.063688] ==================================================================
[   30.063751] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   30.063803] Write of size 1 at addr fff00000c3f71a78 by task kunit_try_catch/173
[   30.063960] 
[   30.063991] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.064216] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.064306] Hardware name: linux,dummy-virt (DT)
[   30.064365] Call trace:
[   30.064409]  show_stack+0x20/0x38 (C)
[   30.064615]  dump_stack_lvl+0x8c/0xd0
[   30.064741]  print_report+0x118/0x5e8
[   30.064789]  kasan_report+0xdc/0x128
[   30.065116]  __asan_report_store1_noabort+0x20/0x30
[   30.065172]  kmalloc_track_caller_oob_right+0x418/0x488
[   30.065223]  kunit_try_run_case+0x170/0x3f0
[   30.065269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.065399]  kthread+0x328/0x630
[   30.066217]  ret_from_fork+0x10/0x20
[   30.066464] 
[   30.066528] Allocated by task 173:
[   30.066629]  kasan_save_stack+0x3c/0x68
[   30.066791]  kasan_save_track+0x20/0x40
[   30.066958]  kasan_save_alloc_info+0x40/0x58
[   30.067125]  __kasan_kmalloc+0xd4/0xd8
[   30.067160]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.067241]  kmalloc_track_caller_oob_right+0x184/0x488
[   30.067500]  kunit_try_run_case+0x170/0x3f0
[   30.067620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.067711]  kthread+0x328/0x630
[   30.067790]  ret_from_fork+0x10/0x20
[   30.067896] 
[   30.067957] The buggy address belongs to the object at fff00000c3f71a00
[   30.067957]  which belongs to the cache kmalloc-128 of size 128
[   30.068088] The buggy address is located 0 bytes to the right of
[   30.068088]  allocated 120-byte region [fff00000c3f71a00, fff00000c3f71a78)
[   30.068184] 
[   30.068278] The buggy address belongs to the physical page:
[   30.068357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.068466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.068576] page_type: f5(slab)
[   30.068655] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.068750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.068788] page dumped because: kasan: bad access detected
[   30.068826] 
[   30.068970] Memory state around the buggy address:
[   30.069221]  fff00000c3f71900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.069364]  fff00000c3f71980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.069424] >fff00000c3f71a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.069495]                                                                 ^
[   30.069588]  fff00000c3f71a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.069665]  fff00000c3f71b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.069700] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   30.046285] ==================================================================
[   30.046350] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   30.046406] Read of size 1 at addr fff00000c996f000 by task kunit_try_catch/171
[   30.046454] 
[   30.046486] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.046571] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.046599] Hardware name: linux,dummy-virt (DT)
[   30.046628] Call trace:
[   30.046649]  show_stack+0x20/0x38 (C)
[   30.046697]  dump_stack_lvl+0x8c/0xd0
[   30.046744]  print_report+0x118/0x5e8
[   30.046787]  kasan_report+0xdc/0x128
[   30.046845]  __asan_report_load1_noabort+0x20/0x30
[   30.046927]  kmalloc_node_oob_right+0x2f4/0x330
[   30.046993]  kunit_try_run_case+0x170/0x3f0
[   30.047060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.047137]  kthread+0x328/0x630
[   30.047180]  ret_from_fork+0x10/0x20
[   30.047285] 
[   30.047343] Allocated by task 171:
[   30.047390]  kasan_save_stack+0x3c/0x68
[   30.047464]  kasan_save_track+0x20/0x40
[   30.047499]  kasan_save_alloc_info+0x40/0x58
[   30.047534]  __kasan_kmalloc+0xd4/0xd8
[   30.047638]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   30.047681]  kmalloc_node_oob_right+0xbc/0x330
[   30.047719]  kunit_try_run_case+0x170/0x3f0
[   30.047755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.047795]  kthread+0x328/0x630
[   30.047836]  ret_from_fork+0x10/0x20
[   30.047870] 
[   30.048274] The buggy address belongs to the object at fff00000c996e000
[   30.048274]  which belongs to the cache kmalloc-4k of size 4096
[   30.048379] The buggy address is located 0 bytes to the right of
[   30.048379]  allocated 4096-byte region [fff00000c996e000, fff00000c996f000)
[   30.048525] 
[   30.048562] The buggy address belongs to the physical page:
[   30.048712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109968
[   30.049071] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.049276] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.049421] page_type: f5(slab)
[   30.049578] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   30.049666] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.049806] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   30.049972] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.050020] head: 0bfffe0000000003 ffffc1ffc3265a01 00000000ffffffff 00000000ffffffff
[   30.050066] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.050107] page dumped because: kasan: bad access detected
[   30.050136] 
[   30.050154] Memory state around the buggy address:
[   30.050191]  fff00000c996ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.050650]  fff00000c996ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.050809] >fff00000c996f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.050926]                    ^
[   30.051014]  fff00000c996f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.051171]  fff00000c996f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.051244] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   29.942643] ==================================================================
[   29.942750] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.943130] Read of size 1 at addr fff00000c7b7a7df by task kunit_try_catch/169
[   29.943184] 
[   29.943221] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   29.943422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.943456] Hardware name: linux,dummy-virt (DT)
[   29.943487] Call trace:
[   29.943509]  show_stack+0x20/0x38 (C)
[   29.944029]  dump_stack_lvl+0x8c/0xd0
[   29.944162]  print_report+0x118/0x5e8
[   29.944226]  kasan_report+0xdc/0x128
[   29.944286]  __asan_report_load1_noabort+0x20/0x30
[   29.944508]  kmalloc_oob_left+0x2ec/0x320
[   29.944810]  kunit_try_run_case+0x170/0x3f0
[   29.945002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.945101]  kthread+0x328/0x630
[   29.945147]  ret_from_fork+0x10/0x20
[   29.945195] 
[   29.945366] Allocated by task 104:
[   29.945404]  kasan_save_stack+0x3c/0x68
[   29.945447]  kasan_save_track+0x20/0x40
[   29.945482]  kasan_save_alloc_info+0x40/0x58
[   29.945526]  __kasan_kmalloc+0xd4/0xd8
[   29.945560]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.945900]  kvasprintf+0xe0/0x180
[   29.946008]  kasprintf+0xd0/0x110
[   29.946075]  miscdev_test_can_open+0xac/0x2c8
[   29.946412]  miscdev_test_collision_reverse+0x3b8/0x650
[   29.946660]  kunit_try_run_case+0x170/0x3f0
[   29.947042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.947098]  kthread+0x328/0x630
[   29.947308]  ret_from_fork+0x10/0x20
[   29.947365] 
[   29.947410] Freed by task 3350701984:
[   29.947594] ------------[ cut here ]------------
[   29.947647] pool index -1 out of bounds (219) for stack id fff00000
[   29.951614] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#1: kunit_try_catch/169
[   30.008495] Modules linked in:
[   30.010083] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.011122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.011446] Hardware name: linux,dummy-virt (DT)
[   30.012356] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   30.013213] pc : depot_fetch_stack+0x68/0x88
[   30.013575] lr : depot_fetch_stack+0x68/0x88
[   30.013846] sp : ffff800080b37a50
[   30.014038] x29: ffff800080b37a50 x28: ffff800080087b08 x27: 1ffff00010010f61
[   30.015029] x26: 1ffff00010010f60 x25: ffff800080087b00 x24: ffff97f86b378044
[   30.015620] x23: ffffc1ffc31ede80 x22: ffff97f86fea4788 x21: ffff97f86fea7ae8
[   30.016213] x20: fff00000c7b7a7df x19: ffff800080b37b60 x18: 000000004344aacd
[   30.016830] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007
[   30.017763] x14: 0000000000000000 x13: 0000000000000007 x12: ffff700010166ea7
[   30.018677] x11: 1ffff00010166ea6 x10: ffff700010166ea6 x9 : ffff97f86acf118c
[   30.019637] x8 : ffff800080b37537 x7 : 0000000000000001 x6 : ffff700010166ea6
[   30.020546] x5 : ffff800080b37530 x4 : 1ffe00001934d511 x3 : dfff800000000000
[   30.020933] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9a6a880
[   30.021832] Call trace:
[   30.022000]  depot_fetch_stack+0x68/0x88 (P)
[   30.022221]  stack_depot_print+0x24/0x60
[   30.022421]  print_report+0x5e4/0x5e8
[   30.022613]  kasan_report+0xdc/0x128
[   30.022797]  __asan_report_load1_noabort+0x20/0x30
[   30.023339]  kmalloc_oob_left+0x2ec/0x320
[   30.023599]  kunit_try_run_case+0x170/0x3f0
[   30.023865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.024148]  kthread+0x328/0x630
[   30.024356]  ret_from_fork+0x10/0x20
[   30.024653] ---[ end trace 0000000000000000 ]---
[   30.025172] ------------[ cut here ]------------
[   30.025222] corrupt handle or use after stack_depot_put()
[   30.025314] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#1: kunit_try_catch/169
[   30.026565] Modules linked in:
[   30.026838] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.027498] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.027798] Hardware name: linux,dummy-virt (DT)
[   30.028092] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   30.028457] pc : stack_depot_print+0x54/0x60
[   30.028765] lr : stack_depot_print+0x54/0x60
[   30.029351] sp : ffff800080b37a60
[   30.029631] x29: ffff800080b37a60 x28: ffff800080087b08 x27: 1ffff00010010f61
[   30.030129] x26: 1ffff00010010f60 x25: ffff800080087b00 x24: ffff97f86b378044
[   30.030596] x23: ffffc1ffc31ede80 x22: ffff97f86fea4788 x21: ffff97f86fea7ae8
[   30.031061] x20: fff00000c7b7a7df x19: ffff800080b37b60 x18: 000000004344aacd
[   30.031521] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   30.031981] x14: ffff700010166f2c x13: 1ffe00001934d511 x12: ffff72ff0e3954f1
[   30.032443] x11: 1ffff2ff0e3954f0 x10: ffff72ff0e3954f0 x9 : ffff97f86acf118c
[   30.033059] x8 : ffff97f871caa783 x7 : 0000000000000001 x6 : ffff72ff0e3954f0
[   30.033541] x5 : ffff97f871caa780 x4 : 1ffe00001934d511 x3 : dfff800000000000
[   30.033988] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9a6a880
[   30.034432] Call trace:
[   30.034597]  stack_depot_print+0x54/0x60 (P)
[   30.034893]  print_report+0x5e4/0x5e8
[   30.035172]  kasan_report+0xdc/0x128
[   30.035397]  __asan_report_load1_noabort+0x20/0x30
[   30.035691]  kmalloc_oob_left+0x2ec/0x320
[   30.035955]  kunit_try_run_case+0x170/0x3f0
[   30.036235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.036562]  kthread+0x328/0x630
[   30.036822]  ret_from_fork+0x10/0x20
[   30.037057] ---[ end trace 0000000000000000 ]---
[   30.037405] 
[   30.037434] The buggy address belongs to the object at fff00000c7b7a7c0
[   30.037434]  which belongs to the cache kmalloc-16 of size 16
[   30.037493] The buggy address is located 15 bytes to the right of
[   30.037493]  allocated 16-byte region [fff00000c7b7a7c0, fff00000c7b7a7d0)
[   30.037669] 
[   30.037691] The buggy address belongs to the physical page:
[   30.037744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a
[   30.037799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.037868] page_type: f5(slab)
[   30.037910] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.037959] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.037998] page dumped because: kasan: bad access detected
[   30.038027] 
[   30.038045] Memory state around the buggy address:
[   30.038076]  fff00000c7b7a680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.038118]  fff00000c7b7a700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.038164] >fff00000c7b7a780: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   30.038199]                                                     ^
[   30.038236]  fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.038276]  fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   30.038313] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   29.903927] ==================================================================
[   29.904258] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.905110] Write of size 1 at addr fff00000c3f71873 by task kunit_try_catch/167
[   29.905224] 
[   29.906013] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   29.906167] Tainted: [N]=TEST
[   29.906200] Hardware name: linux,dummy-virt (DT)
[   29.906417] Call trace:
[   29.906589]  show_stack+0x20/0x38 (C)
[   29.906723]  dump_stack_lvl+0x8c/0xd0
[   29.906775]  print_report+0x118/0x5e8
[   29.906846]  kasan_report+0xdc/0x128
[   29.906894]  __asan_report_store1_noabort+0x20/0x30
[   29.906944]  kmalloc_oob_right+0x5a4/0x660
[   29.906992]  kunit_try_run_case+0x170/0x3f0
[   29.907042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.907094]  kthread+0x328/0x630
[   29.907140]  ret_from_fork+0x10/0x20
[   29.907295] 
[   29.907336] Allocated by task 167:
[   29.907449]  kasan_save_stack+0x3c/0x68
[   29.907513]  kasan_save_track+0x20/0x40
[   29.907548]  kasan_save_alloc_info+0x40/0x58
[   29.907585]  __kasan_kmalloc+0xd4/0xd8
[   29.907622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.907669]  kmalloc_oob_right+0xb0/0x660
[   29.907707]  kunit_try_run_case+0x170/0x3f0
[   29.907743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.907784]  kthread+0x328/0x630
[   29.907828]  ret_from_fork+0x10/0x20
[   29.907882] 
[   29.907942] The buggy address belongs to the object at fff00000c3f71800
[   29.907942]  which belongs to the cache kmalloc-128 of size 128
[   29.908033] The buggy address is located 0 bytes to the right of
[   29.908033]  allocated 115-byte region [fff00000c3f71800, fff00000c3f71873)
[   29.908097] 
[   29.908175] The buggy address belongs to the physical page:
[   29.908577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   29.908837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.909161] page_type: f5(slab)
[   29.909451] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.909510] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.909608] page dumped because: kasan: bad access detected
[   29.909646] 
[   29.909671] Memory state around the buggy address:
[   29.909908]  fff00000c3f71700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.909975]  fff00000c3f71780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.910027] >fff00000c3f71800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.910079]                                                              ^
[   29.910164]  fff00000c3f71880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.910205]  fff00000c3f71900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.910266] ==================================================================
[   29.915660] ==================================================================
[   29.915707] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.915755] Read of size 1 at addr fff00000c3f71880 by task kunit_try_catch/167
[   29.915801] 
[   29.915846] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   29.916340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.916423] Hardware name: linux,dummy-virt (DT)
[   29.916720] Call trace:
[   29.916754]  show_stack+0x20/0x38 (C)
[   29.917080]  dump_stack_lvl+0x8c/0xd0
[   29.917627]  print_report+0x118/0x5e8
[   29.917887]  kasan_report+0xdc/0x128
[   29.918333]  __asan_report_load1_noabort+0x20/0x30
[   29.918409]  kmalloc_oob_right+0x5d0/0x660
[   29.918777]  kunit_try_run_case+0x170/0x3f0
[   29.919159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.919369]  kthread+0x328/0x630
[   29.919484]  ret_from_fork+0x10/0x20
[   29.919894] 
[   29.919998] Allocated by task 167:
[   29.920057]  kasan_save_stack+0x3c/0x68
[   29.920244]  kasan_save_track+0x20/0x40
[   29.920445]  kasan_save_alloc_info+0x40/0x58
[   29.920516]  __kasan_kmalloc+0xd4/0xd8
[   29.920709]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.920947]  kmalloc_oob_right+0xb0/0x660
[   29.921067]  kunit_try_run_case+0x170/0x3f0
[   29.921156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.921282]  kthread+0x328/0x630
[   29.921338]  ret_from_fork+0x10/0x20
[   29.921373] 
[   29.921393] The buggy address belongs to the object at fff00000c3f71800
[   29.921393]  which belongs to the cache kmalloc-128 of size 128
[   29.921458] The buggy address is located 13 bytes to the right of
[   29.921458]  allocated 115-byte region [fff00000c3f71800, fff00000c3f71873)
[   29.921864] 
[   29.921889] The buggy address belongs to the physical page:
[   29.921925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   29.922203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.922391] page_type: f5(slab)
[   29.922602] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.923016] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.923408] page dumped because: kasan: bad access detected
[   29.923536] 
[   29.923828] Memory state around the buggy address:
[   29.923899]  fff00000c3f71780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.924062]  fff00000c3f71800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.924362] >fff00000c3f71880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.924409]                    ^
[   29.924438]  fff00000c3f71900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.924479]  fff00000c3f71980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.924591] ==================================================================
[   29.911029] ==================================================================
[   29.911067] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.911216] Write of size 1 at addr fff00000c3f71878 by task kunit_try_catch/167
[   29.911265] 
[   29.911331] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   29.911413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.911504] Hardware name: linux,dummy-virt (DT)
[   29.911533] Call trace:
[   29.911555]  show_stack+0x20/0x38 (C)
[   29.911603]  dump_stack_lvl+0x8c/0xd0
[   29.911649]  print_report+0x118/0x5e8
[   29.911693]  kasan_report+0xdc/0x128
[   29.911736]  __asan_report_store1_noabort+0x20/0x30
[   29.911784]  kmalloc_oob_right+0x538/0x660
[   29.912059]  kunit_try_run_case+0x170/0x3f0
[   29.912127]  kunit_gen
[   29.912127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.912272]  kthread+0x328/0x630
[   29.912316]  ret_from_fork+0x10/0x20
[   29.912801] 
[   29.912905] Allocated by task 167:
[   29.912984]  kasan_save_stack+0x3c/0x68
[   29.913056]  kasan_save_track+0x20/0x40
[   29.913175]  kasan_save_alloc_info+0x40/0x58
[   29.913259]  __kasan_kmalloc+0xd4/0xd8
[   29.913292]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.913331]  kmalloc_oob_right+0xb0/0x660
[   29.913369]  kunit_try_run_case+0x170/0x3f0
[   29.913405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.913446]  kthread+0x328/0x630
[   29.913478]  ret_from_fork+0x10/0x20
[   29.913513] 
[   29.913531] The buggy address belongs to the object at fff00000c3f71800
[   29.913531]  which belongs to the cache kmalloc-128 of size 128
[   29.913586] The buggy address is located 5 bytes to the right of
[   29.913586]  allocated 115-byte region [fff00000c3f71800, fff00000c3f71873)
[   29.913646] 
[   29.913917] The buggy address belongs to the physical page:
[   29.914302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   29.914500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.914610] page_type: f5(slab)
[   29.914658] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.914706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.914744] page dumped because: kasan: bad access detected
[   29.914773] 
[   29.914790] Memory state around the buggy address:
[   29.914831]  fff00000c3f71700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.914873]  fff00000c3f71780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.914923] >fff00000c3f71800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.914960]                                                                 ^
[   29.915068]  fff00000c3f71880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.915110]  fff00000c3f71900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.915145] ==================================================================
Failure - log-parser-boot/exception-warning-libteststest_ratelimit-at-test_ratelimit_stress_child
------------[ cut here ]------------
[  194.148799] WARNING: lib/tests/test_ratelimit.c:87 at test_ratelimit_stress_child+0x160/0x1b8, CPU#0: test_ratelimit_/1741
[  194.150128] Modules linked in:
[  194.150410] CPU: 0 UID: 0 PID: 1741 Comm: test_ratelimit_ Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[  194.152530] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  194.152803] Hardware name: linux,dummy-virt (DT)
[  194.153283] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  194.153977] pc : test_ratelimit_stress_child+0x160/0x1b8
[  194.154606] lr : test_ratelimit_stress_child+0x30/0x1b8
[  194.155294] sp : ffff8000899e7d90
[  194.155661] x29: ffff8000899e7d90 x28: 0000000000000000 x27: 0000000000000000
[  194.156390] x26: 1ffe0000198f7261 x25: 0000000000000000 x24: 0000000000000004
[  194.156886] x23: fff00000cc7b930c x22: fff00000cc9677a8 x21: ffff97f86bd775b0
[  194.157706] x20: fff00000cc7b9300 x19: fff00000cc9677a8 x18: 000000005373b7e0
[  194.158741] x17: 0000000000000000 x16: fff00000c92dd03c x15: fff00000ff616b48
[  194.159125] x14: 0000000000018fff x13: 1ffe00001b48dddd x12: fffd80001b489859
[  194.159475] x11: 1ffe00001b489858 x10: fffd80001b489858 x9 : ffff97f86e388bbc
[  194.160484] x8 : ffff8000899e7ae8 x7 : 0000000000000001 x6 : ffff8000899e7c00
[  194.161364] x5 : 0000000000000001 x4 : ffff97f8707043e0 x3 : 0000000000000000
[  194.162592] x2 : 1ffe00001992cef9 x1 : 0000000000000000 x0 : 0000000000000000
[  194.163539] Call trace:
[  194.163831]  test_ratelimit_stress_child+0x160/0x1b8 (P)
[  194.164365]  kthread+0x328/0x630
[  194.164723]  ret_from_fork+0x10/0x20
[  194.165532] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  109.124609] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/689
[  109.126629] Modules linked in:
[  109.127102] CPU: 1 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[  109.128296] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  109.128684] Hardware name: linux,dummy-virt (DT)
[  109.129070] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.129369] pc : intlog10+0x38/0x48
[  109.129555] lr : intlog10_test+0xe4/0x200
[  109.129745] sp : ffff8000821f7c10
[  109.129915] x29: ffff8000821f7c90 x28: 0000000000000000 x27: 0000000000000000
[  109.130280] x26: 1ffe000018b44101 x25: 0000000000000000 x24: ffff8000821f7ce0
[  109.130627] x23: ffff8000821f7d00 x22: 0000000000000000 x21: 1ffff0001043ef82
[  109.131067] x20: ffff97f86e651c20 x19: ffff800080087990 x18: 00000000a5df9932
[  109.131587] x17: 00000000e92747d2 x16: fff00000c92dcc3c x15: 000000006420f870
[  109.132465] x14: 0000000039e98be6 x13: 1ffe00001b4899dd x12: ffff72ff0e4ab389
[  109.133268] x11: 1ffff2ff0e4ab388 x10: ffff72ff0e4ab388 x9 : ffff97f86bc5b89c
[  109.133800] x8 : ffff97f872559c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.134171] x5 : ffff70001043ef82 x4 : 1ffff00010010f3b x3 : 1ffff2ff0dcca384
[  109.134515] x2 : 1ffff2ff0dcca384 x1 : 0000000000000003 x0 : 0000000000000000
[  109.134871] Call trace:
[  109.135012]  intlog10+0x38/0x48 (P)
[  109.135254]  kunit_try_run_case+0x170/0x3f0
[  109.135556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.135870]  kthread+0x328/0x630
[  109.136112]  ret_from_fork+0x10/0x20
[  109.136344] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  109.076721] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/671
[  109.081487] Modules linked in:
[  109.082081] CPU: 0 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[  109.083192] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  109.083909] Hardware name: linux,dummy-virt (DT)
[  109.084414] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.084705] pc : intlog2+0xd8/0xf8
[  109.084897] lr : intlog2_test+0xe4/0x200
[  109.085594] sp : ffff8000822a7c10
[  109.086115] x29: ffff8000822a7c90 x28: 0000000000000000 x27: 0000000000000000
[  109.087106] x26: 1ffe000018b462c1 x25: 0000000000000000 x24: ffff8000822a7ce0
[  109.087956] x23: ffff8000822a7d00 x22: 0000000000000000 x21: 1ffff00010454f82
[  109.088804] x20: ffff97f86e651b20 x19: ffff800080087990 x18: 00000000843def44
[  109.089710] x17: 00000000f9c0eb98 x16: fff00000c92dd03c x15: 00000000e6b64a1b
[  109.090281] x14: 00000000f1f1f1f1 x13: 1ffe00001b48dddd x12: ffff72ff0e4ab389
[  109.090638] x11: 1ffff2ff0e4ab388 x10: ffff72ff0e4ab388 x9 : ffff97f86bc5ba9c
[  109.091051] x8 : ffff97f872559c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.091491] x5 : ffff700010454f82 x4 : 1ffff00010010f3b x3 : 1ffff2ff0dcca364
[  109.091854] x2 : 1ffff2ff0dcca364 x1 : 0000000000000003 x0 : 0000000000000000
[  109.092341] Call trace:
[  109.092515]  intlog2+0xd8/0xf8 (P)
[  109.092767]  kunit_try_run_case+0x170/0x3f0
[  109.093141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.093538]  kthread+0x328/0x630
[  109.093795]  ret_from_fork+0x10/0x20
[  109.094031] ---[ end trace 0000000000000000 ]---