Hay
Date
July 23, 2025, 3:10 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.191974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   33.248208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   33.175798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   33.110026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   32.982800] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   33.006016] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   32.995672] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[   64.381726] Internal error: Oops: 0000000096000005 [#8]  SMP
[   64.388340] Modules linked in:
[   64.389632] CPU: 1 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.390665] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.391226] Hardware name: linux,dummy-virt (DT)
[   64.391670] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.392323] pc : ext4_mb_release+0x394/0xaf8
[   64.393289] lr : ext4_mb_release+0x37c/0xaf8
[   64.393515] sp : ffff800080c07c50
[   64.393674] x29: ffff800080c07c60 x28: dfff800000000000 x27: 0000000000000000
[   64.394271] x26: fff00000c6542000 x25: fff00000cc5ac740 x24: 1ffe0000198b58e8
[   64.395022] x23: fffd8000198b58e8 x22: fff00000cc5ac618 x21: 1ffe0000198b58c3
[   64.395762] x20: 0000000000000000 x19: fff00000cc5ac400 x18: 000000002d3b49db
[   64.396495] x17: 0000000000000001 x16: fff00000da46cda8 x15: fff00000ff616b48
[   64.397457] x14: 0000000000018fff x13: 1ffe00001919e514 x12: fffd800018171e01
[   64.397815] x11: 1ffe000018171e00 x10: fffd800018171e00 x9 : ffff91bcf9f8d63c
[   64.398172] x8 : ffff800080c079f8 x7 : 0000000000000001 x6 : ffff800080c07b10
[   64.398518] x5 : 0000000000000001 x4 : 1ffe00001904a799 x3 : dfff800000000000
[   64.398859] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.399208] Call trace:
[   64.399349]  ext4_mb_release+0x394/0xaf8 (P)
[   64.399566]  mbt_kunit_exit+0x9c/0x2c8
[   64.399757]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.400113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.400670]  kthread+0x328/0x630
[   64.401046]  ret_from_fork+0x10/0x20
[   64.401498] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.402148] ---[ end trace 0000000000000000 ]---
[   64.166544] Internal error: Oops: 0000000096000005 [#1]  SMP
[   64.170780] Modules linked in:
[   64.172287] CPU: 0 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.173559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   64.173922] Hardware name: linux,dummy-virt (DT)
[   64.174353] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.174876] pc : ext4_mb_release+0x394/0xaf8
[   64.175448] lr : ext4_mb_release+0x37c/0xaf8
[   64.175858] sp : ffff800080bb7c50
[   64.176098] x29: ffff800080bb7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.176521] x26: fff00000c59df000 x25: fff00000c9992740 x24: 1ffe0000193324e8
[   64.177243] x23: fffd8000193324e8 x22: fff00000c9992618 x21: 1ffe0000193324c3
[   64.178030] x20: 0000000000000000 x19: fff00000c9992400 x18: 0000000006a1a343
[   64.178580] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000b158b6ac
[   64.179159] x14: 0000000021f7818d x13: 1ffe00001919e4e4 x12: fffd800019748a81
[   64.179825] x11: 1ffe000019748a80 x10: fffd800019748a80 x9 : ffff91bcf9f8d63c
[   64.180438] x8 : ffff800080bb79f8 x7 : 0000000000000001 x6 : ffff800080bb7b10
[   64.181139] x5 : 0000000000000001 x4 : 1ffe00001836d511 x3 : dfff800000000000
[   64.181819] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.182484] Call trace:
[   64.182657]  ext4_mb_release+0x394/0xaf8 (P)
[   64.182883]  mbt_kunit_exit+0x9c/0x2c8
[   64.183185]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.183469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.183804]  kthread+0x328/0x630
[   64.184012]  ret_from_fork+0x10/0x20
[   64.184569] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.185207] ---[ end trace 0000000000000000 ]---
[   64.476066] Internal error: Oops: 0000000096000005 [#11]  SMP
[   64.482546] Modules linked in:
[   64.483231] CPU: 1 UID: 0 PID: 401 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.484145] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.484388] Hardware name: linux,dummy-virt (DT)
[   64.484824] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.485785] pc : ext4_mb_release+0x394/0xaf8
[   64.486488] lr : ext4_mb_release+0x37c/0xaf8
[   64.487128] sp : ffff800080bc7c50
[   64.487615] x29: ffff800080bc7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.488403] x26: fff00000c6545000 x25: fff00000c7a06740 x24: 1ffe000018f40ce8
[   64.489558] x23: fffd800018f40ce8 x22: fff00000c7a06618 x21: 1ffe000018f40cc3
[   64.490230] x20: 0000000000000000 x19: fff00000c7a06400 x18: 1ffff2379f872c2e
[   64.490602] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007
[   64.490960] x14: 00000000f1f1f1f1 x13: 1ffe00001919e514 x12: fffd800018171d81
[   64.491303] x11: 1ffe000018171d80 x10: fffd800018171d80 x9 : ffff91bcf9f8d63c
[   64.491647] x8 : ffff800080bc79f8 x7 : 0000000000000001 x6 : ffff800080bc7b10
[   64.492146] x5 : 0000000000000001 x4 : 1ffe000018c8d001 x3 : dfff800000000000
[   64.492939] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.493747] Call trace:
[   64.494056]  ext4_mb_release+0x394/0xaf8 (P)
[   64.494523]  mbt_kunit_exit+0x9c/0x2c8
[   64.494942]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.495432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.495993]  kthread+0x328/0x630
[   64.496353]  ret_from_fork+0x10/0x20
[   64.496877] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.497612] ---[ end trace 0000000000000000 ]---
[   64.442697] Internal error: Oops: 0000000096000005 [#10]  SMP
[   64.450840] Modules linked in:
[   64.452755] CPU: 0 UID: 0 PID: 399 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.453916] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.454525] Hardware name: linux,dummy-virt (DT)
[   64.455038] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.455726] pc : ext4_mb_release+0x394/0xaf8
[   64.456245] lr : ext4_mb_release+0x37c/0xaf8
[   64.456714] sp : ffff800080bc7c50
[   64.456919] x29: ffff800080bc7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.457756] x26: fff00000cc909000 x25: fff00000cc98e740 x24: 1ffe000019931ce8
[   64.458258] x23: fffd800019931ce8 x22: fff00000cc98e618 x21: 1ffe000019931cc3
[   64.458613] x20: 0000000000000000 x19: fff00000cc98e400 x18: 0000000066a1663e
[   64.459082] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000b906f994
[   64.459842] x14: 0000000026e49a88 x13: 1ffe00001919e4e4 x12: fffd80001821c561
[   64.460758] x11: 1ffe00001821c560 x10: fffd80001821c560 x9 : ffff91bcf9f8d63c
[   64.461597] x8 : ffff800080bc79f8 x7 : 0000000000000001 x6 : ffff800080bc7b10
[   64.462373] x5 : 0000000000000001 x4 : 1ffe00001904a001 x3 : dfff800000000000
[   64.463124] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.463854] Call trace:
[   64.464144]  ext4_mb_release+0x394/0xaf8 (P)
[   64.464600]  mbt_kunit_exit+0x9c/0x2c8
[   64.465052]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.465616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.465875]  kthread+0x328/0x630
[   64.466073]  ret_from_fork+0x10/0x20
[   64.466278] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.466835] ---[ end trace 0000000000000000 ]---
[   64.658994] Internal error: Oops: 0000000096000005 [#17]  SMP
[   64.665656] Modules linked in:
[   64.666058] CPU: 1 UID: 0 PID: 413 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.667225] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.667935] Hardware name: linux,dummy-virt (DT)
[   64.668541] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.669324] pc : ext4_mb_release+0x394/0xaf8
[   64.669879] lr : ext4_mb_release+0x37c/0xaf8
[   64.670428] sp : ffff800080c27c50
[   64.670805] x29: ffff800080c27c60 x28: dfff800000000000 x27: 0000000000000000
[   64.671456] x26: fff00000c4509000 x25: fff00000cc928740 x24: 1ffe0000199250e8
[   64.671804] x23: fffd8000199250e8 x22: fff00000cc928618 x21: 1ffe0000199250c3
[   64.672259] x20: 0000000000000000 x19: fff00000cc928400 x18: 00000000ab3f8a0c
[   64.673160] x17: 00000000b5de12fa x16: 00000000d2f9f891 x15: 00000000265a1517
[   64.673655] x14: 000000009e9f7af5 x13: 00000000e29de636 x12: fffd800018171cc1
[   64.674317] x11: 1ffe000018171cc0 x10: fffd800018171cc0 x9 : ffff91bcf9f8d63c
[   64.675102] x8 : ffff800080c279f8 x7 : 0000000000000001 x6 : ffff800080c27b10
[   64.675599] x5 : 0000000000000001 x4 : 1ffe000018bb5511 x3 : dfff800000000000
[   64.675953] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.676293] Call trace:
[   64.676431]  ext4_mb_release+0x394/0xaf8 (P)
[   64.677371]  mbt_kunit_exit+0x9c/0x2c8
[   64.677838]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.678389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.678975]  kthread+0x328/0x630
[   64.679373]  ret_from_fork+0x10/0x20
[   64.679811] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.680434] ---[ end trace 0000000000000000 ]---
[   64.416159] Internal error: Oops: 0000000096000005 [#9]  SMP
[   64.418556] Modules linked in:
[   64.418980] CPU: 1 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.419999] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.421026] Hardware name: linux,dummy-virt (DT)
[   64.421495] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.422144] pc : ext4_mb_release+0x394/0xaf8
[   64.422610] lr : ext4_mb_release+0x37c/0xaf8
[   64.423048] sp : ffff800080c17c50
[   64.423414] x29: ffff800080c17c60 x28: dfff800000000000 x27: 0000000000000000
[   64.424164] x26: fff00000c78fe000 x25: fff00000cc98c740 x24: 1ffe0000199318e8
[   64.425053] x23: fffd8000199318e8 x22: fff00000cc98c618 x21: 1ffe0000199318c3
[   64.425420] x20: 0000000000000000 x19: fff00000cc98c400 x18: 0000000022f900e8
[   64.425767] x17: 0000000000000000 x16: fff00000da46cda8 x15: 000000005c4c9699
[   64.426128] x14: 00000000f58b03fe x13: 1ffe00001919e514 x12: fffd800019734f01
[   64.426591] x11: 1ffe000019734f00 x10: fffd800019734f00 x9 : ffff91bcf9f8d63c
[   64.427042] x8 : ffff800080c179f8 x7 : 0000000000000001 x6 : ffff800080c17b10
[   64.427474] x5 : 0000000000000001 x4 : 1ffe0000193d9289 x3 : dfff800000000000
[   64.427929] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.428358] Call trace:
[   64.429030]  ext4_mb_release+0x394/0xaf8 (P)
[   64.429344]  mbt_kunit_exit+0x9c/0x2c8
[   64.429560]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.429864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.430149]  kthread+0x328/0x630
[   64.430385]  ret_from_fork+0x10/0x20
[   64.430646] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.430994] ---[ end trace 0000000000000000 ]---
[   64.601443] Internal error: Oops: 0000000096000005 [#15]  SMP
[   64.605291] Modules linked in:
[   64.605673] CPU: 1 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.606844] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.607400] Hardware name: linux,dummy-virt (DT)
[   64.607969] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.608702] pc : ext4_mb_release+0x394/0xaf8
[   64.609265] lr : ext4_mb_release+0x37c/0xaf8
[   64.609729] sp : ffff800080c27c50
[   64.610111] x29: ffff800080c27c60 x28: dfff800000000000 x27: 0000000000000000
[   64.610915] x26: fff00000c627e000 x25: fff00000c85ea740 x24: 1ffe0000190bd4e8
[   64.611721] x23: fffd8000190bd4e8 x22: fff00000c85ea618 x21: 1ffe0000190bd4c3
[   64.612463] x20: 0000000000000000 x19: fff00000c85ea400 x18: 00000000894b06cc
[   64.613356] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000060245e46
[   64.614115] x14: 00000000f1f1f1f1 x13: 1ffe00001919e514 x12: fffd800019734781
[   64.614865] x11: 1ffe000019734780 x10: fffd800019734780 x9 : ffff91bcf9f8d63c
[   64.615601] x8 : ffff800080c279f8 x7 : 0000000000000001 x6 : ffff800080c27b10
[   64.616336] x5 : 0000000000000001 x4 : 1ffe000018c8dca9 x3 : dfff800000000000
[   64.617219] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.618136] Call trace:
[   64.618454]  ext4_mb_release+0x394/0xaf8 (P)
[   64.618919]  mbt_kunit_exit+0x9c/0x2c8
[   64.619304]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.619527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.619770]  kthread+0x328/0x630
[   64.620022]  ret_from_fork+0x10/0x20
[   64.620421] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.621023] ---[ end trace 0000000000000000 ]---
[   64.291136] Internal error: Oops: 0000000096000005 [#5]  SMP
[   64.294545] Modules linked in:
[   64.294844] CPU: 0 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.295470] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.295761] Hardware name: linux,dummy-virt (DT)
[   64.296039] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.296485] pc : ext4_mb_release+0x394/0xaf8
[   64.296779] lr : ext4_mb_release+0x37c/0xaf8
[   64.297098] sp : ffff800080bc7c50
[   64.297347] x29: ffff800080bc7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.297807] x26: fff00000c78f8000 x25: fff00000c9996740 x24: 1ffe000019332ce8
[   64.298221] x23: fffd800019332ce8 x22: fff00000c9996618 x21: 1ffe000019332cc3
[   64.298676] x20: 0000000000000000 x19: fff00000c9996400 x18: 000000007da7a042
[   64.299133] x17: 0000000000000001 x16: fff00000da44ada8 x15: fff00000ff616b48
[   64.299562] x14: 0000000000018fff x13: 1ffe00001919e4e4 x12: fffd80001923cd01
[   64.300040] x11: 1ffe00001923cd00 x10: fffd80001923cd00 x9 : ffff91bcf9f8d63c
[   64.300480] x8 : ffff800080bc79f8 x7 : 0000000000000001 x6 : ffff800080bc7b10
[   64.300963] x5 : 0000000000000001 x4 : 1ffe00001836d799 x3 : dfff800000000000
[   64.301508] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.301914] Call trace:
[   64.302104]  ext4_mb_release+0x394/0xaf8 (P)
[   64.302403]  mbt_kunit_exit+0x9c/0x2c8
[   64.302657]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.302961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.303290]  kthread+0x328/0x630
[   64.303519]  ret_from_fork+0x10/0x20
[   64.303729] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.304139] ---[ end trace 0000000000000000 ]---
[   64.260760] Internal error: Oops: 0000000096000005 [#4]  SMP
[   64.268893] Modules linked in:
[   64.270203] CPU: 1 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.271419] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.272150] Hardware name: linux,dummy-virt (DT)
[   64.273013] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.273490] pc : ext4_mb_release+0x394/0xaf8
[   64.273727] lr : ext4_mb_release+0x37c/0xaf8
[   64.273944] sp : ffff800080bf7c50
[   64.274105] x29: ffff800080bf7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.274561] x26: fff00000c1504000 x25: fff00000c9994740 x24: 1ffe0000193328e8
[   64.275030] x23: fffd8000193328e8 x22: fff00000c9994618 x21: 1ffe0000193328c3
[   64.275450] x20: 0000000000000000 x19: fff00000c9994400 x18: 1ffff2379f872c2e
[   64.275866] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007
[   64.276328] x14: 0000000000000000 x13: 1ffe00001919e514 x12: fffd800018c6f9a1
[   64.276733] x11: 1ffe000018c6f9a0 x10: fffd800018c6f9a0 x9 : ffff91bcf9f8d63c
[   64.277364] x8 : ffff800080bf79f8 x7 : 0000000000000001 x6 : ffff800080bf7b10
[   64.277805] x5 : 0000000000000001 x4 : 1ffe000018c7a289 x3 : dfff800000000000
[   64.278257] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.278673] Call trace:
[   64.278834]  ext4_mb_release+0x394/0xaf8 (P)
[   64.279339]  mbt_kunit_exit+0x9c/0x2c8
[   64.279572]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.279843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.280172]  kthread+0x328/0x630
[   64.280406]  ret_from_fork+0x10/0x20
[   64.280637] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.281140] ---[ end trace 0000000000000000 ]---
[  108.362544] Internal error: Oops: 0000000096000005 [#21]  SMP
[  108.368673] Modules linked in:
[  108.369301] CPU: 0 UID: 0 PID: 421 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[  108.370793] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  108.371048] Hardware name: linux,dummy-virt (DT)
[  108.371244] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  108.371513] pc : ext4_mb_release+0x394/0xaf8
[  108.371727] lr : ext4_mb_release+0x37c/0xaf8
[  108.371934] sp : ffff800080c27c50
[  108.372165] x29: ffff800080c27c60 x28: dfff800000000000 x27: 0000000000000000
[  108.373513] x26: fff00000c71a0000 x25: fff00000cb2b4740 x24: 1ffe0000196568e8
[  108.374373] x23: fffd8000196568e8 x22: fff00000cb2b4618 x21: 1ffe0000196568c3
[  108.375143] x20: 0000000000000000 x19: fff00000cb2b4400 x18: 0000000020abc2d8
[  108.375917] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000cceedc1b
[  108.376701] x14: 00000000f1f1f1f1 x13: 1ffe00001919e4e4 x12: fffd800019734b81
[  108.377684] x11: 1ffe000019734b80 x10: fffd800019734b80 x9 : ffff91bcf9f8d63c
[  108.378571] x8 : ffff800080c279f8 x7 : 0000000000000001 x6 : ffff800080c27b10
[  108.379159] x5 : 0000000000000001 x4 : 1ffe000018bb5ca9 x3 : dfff800000000000
[  108.379507] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[  108.379845] Call trace:
[  108.380005]  ext4_mb_release+0x394/0xaf8 (P)
[  108.380283]  mbt_kunit_exit+0x9c/0x2c8
[  108.380519]  kunit_try_run_case_cleanup+0x9c/0xe0
[  108.380968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.381461]  kthread+0x328/0x630
[  108.381655]  ret_from_fork+0x10/0x20
[  108.381857] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[  108.382147] ---[ end trace 0000000000000000 ]---
[   64.573370] Internal error: Oops: 0000000096000005 [#14]  SMP
[   64.579334] Modules linked in:
[   64.579714] CPU: 1 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.580929] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.581631] Hardware name: linux,dummy-virt (DT)
[   64.582055] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.582844] pc : ext4_mb_release+0x394/0xaf8
[   64.583107] lr : ext4_mb_release+0x37c/0xaf8
[   64.583339] sp : ffff800080c37c50
[   64.583498] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000
[   64.583864] x26: fff00000c627b000 x25: fff00000c5914740 x24: 1ffe000018b228e8
[   64.584327] x23: fffd800018b228e8 x22: fff00000c5914618 x21: 1ffe000018b228c3
[   64.584741] x20: 0000000000000000 x19: fff00000c5914400 x18: 00000000a7ced754
[   64.585199] x17: 000000009bbffb31 x16: fff00000c1ba9c3c x15: 00000000e8b9bfd5
[   64.585639] x14: 000000006730a5c3 x13: 1ffe00001b4895dd x12: fffd800018171fc1
[   64.586490] x11: 1ffe000018171fc0 x10: fffd800018171fc0 x9 : ffff91bcf9f8d63c
[   64.586926] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10
[   64.587388] x5 : 0000000000000001 x4 : 1ffe000018c13ca9 x3 : dfff800000000000
[   64.588122] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.589026] Call trace:
[   64.589319]  ext4_mb_release+0x394/0xaf8 (P)
[   64.589549]  mbt_kunit_exit+0x9c/0x2c8
[   64.590250]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.590752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.591327]  kthread+0x328/0x630
[   64.591607]  ret_from_fork+0x10/0x20
[   64.591814] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.592342] ---[ end trace 0000000000000000 ]---
[   64.689175] Internal error: Oops: 0000000096000005 [#18]  SMP
[   64.693679] Modules linked in:
[   64.694101] CPU: 0 UID: 0 PID: 415 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.695419] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.696025] Hardware name: linux,dummy-virt (DT)
[   64.696526] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.697320] pc : ext4_mb_release+0x394/0xaf8
[   64.697912] lr : ext4_mb_release+0x37c/0xaf8
[   64.698453] sp : ffff800080c47c50
[   64.698825] x29: ffff800080c47c60 x28: dfff800000000000 x27: 0000000000000000
[   64.699603] x26: fff00000c63c2000 x25: fff00000c7fc0740 x24: 1ffe000018ff80e8
[   64.700226] x23: fffd800018ff80e8 x22: fff00000c7fc0618 x21: 1ffe000018ff80c3
[   64.700600] x20: 0000000000000000 x19: fff00000c7fc0400 x18: 1ffff2379f872c2e
[   64.701550] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000000000007
[   64.701953] x14: 00000000f1f1f1f1 x13: 1ffe00001919e4e4 x12: fffd800019734d01
[   64.702301] x11: 1ffe000019734d00 x10: fffd800019734d00 x9 : ffff91bcf9f8d63c
[   64.702650] x8 : ffff800080c479f8 x7 : 0000000000000001 x6 : ffff800080c47b10
[   64.703174] x5 : 0000000000000001 x4 : 1ffe000018bb5799 x3 : dfff800000000000
[   64.703956] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.704748] Call trace:
[   64.705055]  ext4_mb_release+0x394/0xaf8 (P)
[   64.705529]  mbt_kunit_exit+0x9c/0x2c8
[   64.705961]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.706487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.707059]  kthread+0x328/0x630
[   64.707432]  ret_from_fork+0x10/0x20
[   64.707867] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.708464] ---[ end trace 0000000000000000 ]---
[   64.314677] Internal error: Oops: 0000000096000005 [#6]  SMP
[   64.320805] Modules linked in:
[   64.321660] CPU: 0 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.323274] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.324165] Hardware name: linux,dummy-virt (DT)
[   64.324808] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.325188] pc : ext4_mb_release+0x394/0xaf8
[   64.325421] lr : ext4_mb_release+0x37c/0xaf8
[   64.325625] sp : ffff800080b87c50
[   64.325781] x29: ffff800080b87c60 x28: dfff800000000000 x27: 0000000000000000
[   64.326330] x26: fff00000c1052000 x25: fff00000c78f6740 x24: 1ffe000018f1ece8
[   64.327130] x23: fffd800018f1ece8 x22: fff00000c78f6618 x21: 1ffe000018f1ecc3
[   64.327876] x20: 0000000000000000 x19: fff00000c78f6400 x18: 1ffff2379f872c2e
[   64.328668] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000000000007
[   64.329564] x14: 0000000000000000 x13: 1ffe00001919e4e4 x12: fffd800018375581
[   64.330323] x11: 1ffe000018375580 x10: fffd800018375580 x9 : ffff91bcf9f8d63c
[   64.331096] x8 : ffff800080b879f8 x7 : 0000000000000001 x6 : ffff800080b87b10
[   64.331845] x5 : 0000000000000001 x4 : 1ffe0000193d9799 x3 : dfff800000000000
[   64.332670] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.333478] Call trace:
[   64.333781]  ext4_mb_release+0x394/0xaf8 (P)
[   64.334280]  mbt_kunit_exit+0x9c/0x2c8
[   64.334616]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.334843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.335087]  kthread+0x328/0x630
[   64.335262]  ret_from_fork+0x10/0x20
[   64.335461] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.335701] ---[ end trace 0000000000000000 ]---
[   86.418000] Internal error: Oops: 0000000096000005 [#19]  SMP
[   86.422129] Modules linked in:
[   86.422548] CPU: 1 UID: 0 PID: 417 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   86.423601] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   86.424260] Hardware name: linux,dummy-virt (DT)
[   86.424774] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   86.425374] pc : ext4_mb_release+0x394/0xaf8
[   86.425607] lr : ext4_mb_release+0x37c/0xaf8
[   86.425891] sp : ffff800080c17c50
[   86.426241] x29: ffff800080c17c60 x28: dfff800000000000 x27: 0000000000000000
[   86.426989] x26: fff00000c450c000 x25: fff00000c10fc740 x24: 1ffe00001821f8e8
[   86.427722] x23: fffd80001821f8e8 x22: fff00000c10fc618 x21: 1ffe00001821f8c3
[   86.428091] x20: 0000000000000000 x19: fff00000c10fc400 x18: fff00000c99fc800
[   86.428433] x17: 0000000000000001 x16: fff00000da46cda8 x15: 1ffe00001933f90f
[   86.428843] x14: 00000000f1f1f1f1 x13: 1ffe00001919e514 x12: fffd800019748781
[   86.429291] x11: 1ffe000019748780 x10: fffd800019748780 x9 : ffff91bcf9f8d63c
[   86.429689] x8 : ffff800080c179f8 x7 : 0000000000000001 x6 : ffff800080c17b10
[   86.430127] x5 : 0000000000000001 x4 : 1ffe000018e37289 x3 : dfff800000000000
[   86.430520] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   86.431009] Call trace:
[   86.431296]  ext4_mb_release+0x394/0xaf8 (P)
[   86.431739]  mbt_kunit_exit+0x9c/0x2c8
[   86.432153]  kunit_try_run_case_cleanup+0x9c/0xe0
[   86.432631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.433199]  kthread+0x328/0x630
[   86.433557]  ret_from_fork+0x10/0x20
[   86.433981] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   86.434559] ---[ end trace 0000000000000000 ]---
[   64.199033] Internal error: Oops: 0000000096000005 [#2]  SMP
[   64.202841] Modules linked in:
[   64.203342] CPU: 1 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.204646] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.205424] Hardware name: linux,dummy-virt (DT)
[   64.206083] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.206957] pc : ext4_mb_release+0x394/0xaf8
[   64.207557] lr : ext4_mb_release+0x37c/0xaf8
[   64.208070] sp : ffff800080bd7c50
[   64.208462] x29: ffff800080bd7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.209284] x26: fff00000c1bc3000 x25: fff00000cb2ee740 x24: 1ffe00001965dce8
[   64.210104] x23: fffd80001965dce8 x22: fff00000cb2ee618 x21: 1ffe00001965dcc3
[   64.210934] x20: 0000000000000000 x19: fff00000cb2ee400 x18: 00000000a1898bd5
[   64.211283] x17: 0000000000000001 x16: fff00000da46cda8 x15: 000000009cf0791d
[   64.211623] x14: 00000000715751ab x13: 1ffe00001919e514 x12: fffd800018171e81
[   64.212084] x11: 1ffe000018171e80 x10: fffd800018171e80 x9 : ffff91bcf9f8d63c
[   64.213093] x8 : ffff800080bd79f8 x7 : 0000000000000001 x6 : ffff800080bd7b10
[   64.213941] x5 : 0000000000000001 x4 : 1ffe000018c7a799 x3 : dfff800000000000
[   64.214685] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.215176] Call trace:
[   64.215322]  ext4_mb_release+0x394/0xaf8 (P)
[   64.215546]  mbt_kunit_exit+0x9c/0x2c8
[   64.215735]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.215975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.216279]  kthread+0x328/0x630
[   64.216541]  ret_from_fork+0x10/0x20
[   64.216812] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.217246] ---[ end trace 0000000000000000 ]---
[   64.227566] Internal error: Oops: 0000000096000005 [#3]  SMP
[   64.233177] Modules linked in:
[   64.233583] CPU: 1 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.234561] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.235027] Hardware name: linux,dummy-virt (DT)
[   64.235582] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.236652] pc : ext4_mb_release+0x394/0xaf8
[   64.237168] lr : ext4_mb_release+0x37c/0xaf8
[   64.237494] sp : ffff800080be7c50
[   64.237894] x29: ffff800080be7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.238626] x26: fff00000c1bc7000 x25: fff00000c78f4740 x24: 1ffe000018f1e8e8
[   64.239092] x23: fffd800018f1e8e8 x22: fff00000c78f4618 x21: 1ffe000018f1e8c3
[   64.239455] x20: 0000000000000000 x19: fff00000c78f4400 x18: 1ffff2379f872c2e
[   64.239788] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007
[   64.240737] x14: 0000000000000000 x13: 1ffe00001919e514 x12: fffd800018375681
[   64.241655] x11: 1ffe000018375680 x10: fffd800018375680 x9 : ffff91bcf9f8d63c
[   64.242436] x8 : ffff800080be79f8 x7 : 0000000000000001 x6 : ffff800080be7b10
[   64.243196] x5 : 0000000000000001 x4 : 1ffe000018c7aa21 x3 : dfff800000000000
[   64.243955] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.244765] Call trace:
[   64.245119]  ext4_mb_release+0x394/0xaf8 (P)
[   64.245654]  mbt_kunit_exit+0x9c/0x2c8
[   64.246187]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.246844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.247447]  kthread+0x328/0x630
[   64.247830]  ret_from_fork+0x10/0x20
[   64.248271] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.248754] ---[ end trace 0000000000000000 ]---
[   64.507142] Internal error: Oops: 0000000096000005 [#12]  SMP
[   64.513884] Modules linked in:
[   64.514326] CPU: 0 UID: 0 PID: 403 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.515363] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.515924] Hardware name: linux,dummy-virt (DT)
[   64.516351] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.517259] pc : ext4_mb_release+0x394/0xaf8
[   64.517537] lr : ext4_mb_release+0x37c/0xaf8
[   64.517917] sp : ffff800080c17c50
[   64.518115] x29: ffff800080c17c60 x28: dfff800000000000 x27: 0000000000000000
[   64.518545] x26: fff00000cc90c000 x25: fff00000c7fb8740 x24: 1ffe000018ff70e8
[   64.519055] x23: fffd800018ff70e8 x22: fff00000c7fb8618 x21: 1ffe000018ff70c3
[   64.519494] x20: 0000000000000000 x19: fff00000c7fb8400 x18: 00000000f67cae9f
[   64.519919] x17: 0000000000000001 x16: fff00000da44ada8 x15: fff00000ff616b48
[   64.520320] x14: 00000000f1f1f1f1 x13: 1ffe00001919e4e4 x12: fffd800019734e01
[   64.521411] x11: 1ffe000019734e00 x10: fffd800019734e00 x9 : ffff91bcf9f8d63c
[   64.521842] x8 : ffff800080c179f8 x7 : 0000000000000001 x6 : ffff800080c17b10
[   64.522311] x5 : 0000000000000001 x4 : 1ffe000018c13289 x3 : dfff800000000000
[   64.522762] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.523204] Call trace:
[   64.523383]  ext4_mb_release+0x394/0xaf8 (P)
[   64.523668]  mbt_kunit_exit+0x9c/0x2c8
[   64.523929]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.524217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.524765]  kthread+0x328/0x630
[   64.525035]  ret_from_fork+0x10/0x20
[   64.525321] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.525652] ---[ end trace 0000000000000000 ]---
[  108.334646] Internal error: Oops: 0000000096000005 [#20]  SMP
[  108.340404] Modules linked in:
[  108.342835] CPU: 1 UID: 0 PID: 419 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[  108.343516] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  108.343763] Hardware name: linux,dummy-virt (DT)
[  108.344074] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  108.344676] pc : ext4_mb_release+0x394/0xaf8
[  108.345203] lr : ext4_mb_release+0x37c/0xaf8
[  108.345422] sp : ffff800080c57c50
[  108.345584] x29: ffff800080c57c60 x28: dfff800000000000 x27: 0000000000000000
[  108.345955] x26: fff00000c63c5000 x25: fff00000c7fc2740 x24: 1ffe000018ff84e8
[  108.346388] x23: fffd800018ff84e8 x22: fff00000c7fc2618 x21: 1ffe000018ff84c3
[  108.346781] x20: 0000000000000000 x19: fff00000c7fc2400 x18: 0000000040717167
[  108.347409] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000043a49260
[  108.347829] x14: 00000000a33a4d49 x13: 1ffe00001919e514 x12: fffd80001923cd81
[  108.348180] x11: 1ffe00001923cd80 x10: fffd80001923cd80 x9 : ffff91bcf9f8d63c
[  108.348614] x8 : ffff800080c579f8 x7 : 0000000000000001 x6 : ffff800080c57b10
[  108.349599] x5 : 0000000000000001 x4 : 1ffe000018e37799 x3 : dfff800000000000
[  108.350409] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[  108.351149] Call trace:
[  108.351431]  ext4_mb_release+0x394/0xaf8 (P)
[  108.351875]  mbt_kunit_exit+0x9c/0x2c8
[  108.352265]  kunit_try_run_case_cleanup+0x9c/0xe0
[  108.352489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.353094]  kthread+0x328/0x630
[  108.353761]  ret_from_fork+0x10/0x20
[  108.354193] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[  108.354748] ---[ end trace 0000000000000000 ]---
[   64.348625] Internal error: Oops: 0000000096000005 [#7]  SMP
[   64.356040] Modules linked in:
[   64.356517] CPU: 0 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.357214] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.357878] Hardware name: linux,dummy-virt (DT)
[   64.358507] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.359324] pc : ext4_mb_release+0x394/0xaf8
[   64.359846] lr : ext4_mb_release+0x37c/0xaf8
[   64.360300] sp : ffff800080be7c50
[   64.360641] x29: ffff800080be7c60 x28: dfff800000000000 x27: 0000000000000000
[   64.361510] x26: fff00000c78fb000 x25: fff00000cb2f6740 x24: 1ffe00001965ece8
[   64.362024] x23: fffd80001965ece8 x22: fff00000cb2f6618 x21: 1ffe00001965ecc3
[   64.362379] x20: 0000000000000000 x19: fff00000cb2f6400 x18: 1ffff2379f872c2e
[   64.362721] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000000000007
[   64.363352] x14: 00000000f1f1f1f1 x13: 1ffe00001919e4e4 x12: fffd800018c6f921
[   64.364076] x11: 1ffe000018c6f920 x10: fffd800018c6f920 x9 : ffff91bcf9f8d63c
[   64.364917] x8 : ffff800080be79f8 x7 : 0000000000000001 x6 : ffff800080be7b10
[   64.365663] x5 : 0000000000000001 x4 : 1ffe0000193d9001 x3 : dfff800000000000
[   64.366398] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.367134] Call trace:
[   64.367409]  ext4_mb_release+0x394/0xaf8 (P)
[   64.367863]  mbt_kunit_exit+0x9c/0x2c8
[   64.368270]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.368908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.369557]  kthread+0x328/0x630
[   64.370055]  ret_from_fork+0x10/0x20
[   64.370607] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.371236] ---[ end trace 0000000000000000 ]---
[   64.633304] Internal error: Oops: 0000000096000005 [#16]  SMP
[   64.637948] Modules linked in:
[   64.638217] CPU: 0 UID: 0 PID: 411 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.638799] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.639120] Hardware name: linux,dummy-virt (DT)
[   64.639369] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.639707] pc : ext4_mb_release+0x394/0xaf8
[   64.639973] lr : ext4_mb_release+0x37c/0xaf8
[   64.640187] sp : ffff800080c37c50
[   64.640383] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000
[   64.640728] x26: fff00000cc90f000 x25: fff00000c7fba740 x24: 1ffe000018ff74e8
[   64.641072] x23: fffd800018ff74e8 x22: fff00000c7fba618 x21: 1ffe000018ff74c3
[   64.641488] x20: 0000000000000000 x19: fff00000c7fba400 x18: 00000000ec96ac89
[   64.641934] x17: 000000003535ad13 x16: fff00000c1baa03c x15: 0000000027eeea88
[   64.642425] x14: 00000000f9c4cb08 x13: 1ffe00001b48d9dd x12: fffd8000187bb0a1
[   64.644512] x11: 1ffe0000187bb0a0 x10: fffd8000187bb0a0 x9 : ffff91bcf9f8d63c
[   64.645807] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10
[   64.646971] x5 : 0000000000000001 x4 : 1ffe000018c8d799 x3 : dfff800000000000
[   64.647344] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.647688] Call trace:
[   64.647834]  ext4_mb_release+0x394/0xaf8 (P)
[   64.648102]  mbt_kunit_exit+0x9c/0x2c8
[   64.648304]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.649394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.650132]  kthread+0x328/0x630
[   64.650686]  ret_from_fork+0x10/0x20
[   64.651153] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.651761] ---[ end trace 0000000000000000 ]---
[  108.707246] Internal error: Oops: 0000000096000005 [#22]  SMP
[  108.710824] Modules linked in:
[  108.711423] CPU: 0 UID: 0 PID: 565 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[  108.712674] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  108.713401] Hardware name: linux,dummy-virt (DT)
[  108.714076] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  108.714931] pc : kunit_test_null_dereference+0x70/0x170
[  108.715586] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.716223] sp : ffff800082027d30
[  108.716817] x29: ffff800082027d90 x28: 0000000000000000 x27: 0000000000000000
[  108.717844] x26: 1ffe000019747f01 x25: 0000000000000000 x24: 0000000000000004
[  108.718612] x23: fff00000cba3f80c x22: ffff91bcf7848d30 x21: fff00000c3f05308
[  108.719365] x20: 1ffff00010404fa6 x19: ffff800080087990 x18: 0000000032ef18e5
[  108.719829] x17: 00000000eb8e1943 x16: 0000000056578d60 x15: 00000000c38541d9
[  108.720177] x14: 000000009623875e x13: 00000000929d6e4f x12: fffd8000191ba11c
[  108.720516] x11: 1ffe0000191ba11b x10: fffd8000191ba11b x9 : ffff91bcf78404b8
[  108.721399] x8 : ffff800082027c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  108.722418] x5 : ffff700010404fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  108.723153] x2 : dfff800000000000 x1 : fff00000c8dd0000 x0 : ffff800080087990
[  108.723871] Call trace:
[  108.724177]  kunit_test_null_dereference+0x70/0x170 (P)
[  108.724753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.725362]  kthread+0x328/0x630
[  108.725747]  ret_from_fork+0x10/0x20
[  108.726254] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  108.726867] ---[ end trace 0000000000000000 ]---
[   64.539486] Internal error: Oops: 0000000096000005 [#13]  SMP
[   64.547224] Modules linked in:
[   64.547462] CPU: 0 UID: 0 PID: 405 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   64.547890] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   64.549440] Hardware name: linux,dummy-virt (DT)
[   64.550244] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.551097] pc : ext4_mb_release+0x394/0xaf8
[   64.551719] lr : ext4_mb_release+0x37c/0xaf8
[   64.552307] sp : ffff800080c07c50
[   64.552861] x29: ffff800080c07c60 x28: dfff800000000000 x27: 0000000000000000
[   64.553802] x26: fff00000c6278000 x25: fff00000c800c740 x24: 1ffe0000190018e8
[   64.554184] x23: fffd8000190018e8 x22: fff00000c800c618 x21: 1ffe0000190018c3
[   64.554538] x20: 0000000000000000 x19: fff00000c800c400 x18: 00000000929a660b
[   64.554877] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000b79efbfb
[   64.556022] x14: 00000000f9250858 x13: 1ffe00001919e4e4 x12: fffd800019748901
[   64.557126] x11: 1ffe000019748900 x10: fffd800019748900 x9 : ffff91bcf9f8d63c
[   64.558163] x8 : ffff800080c079f8 x7 : 0000000000000001 x6 : ffff800080c07b10
[   64.559165] x5 : 0000000000000001 x4 : 1ffe000018c13799 x3 : dfff800000000000
[   64.560137] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.561281] Call trace:
[   64.562072]  ext4_mb_release+0x394/0xaf8 (P)
[   64.562721]  mbt_kunit_exit+0x9c/0x2c8
[   64.563321]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.563590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.563835]  kthread+0x328/0x630
[   64.564025]  ret_from_fork+0x10/0x20
[   64.564235] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.564481] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   63.977784] ==================================================================
[   63.977882] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   63.977882] 
[   63.977999] Use-after-free read at 0x00000000748a9655 (in kfence-#188):
[   63.978055]  test_krealloc+0x51c/0x830
[   63.978100]  kunit_try_run_case+0x170/0x3f0
[   63.978144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.978189]  kthread+0x328/0x630
[   63.978231]  ret_from_fork+0x10/0x20
[   63.978273] 
[   63.978298] kfence-#188: 0x00000000748a9655-0x000000006ce6798a, size=32, cache=kmalloc-32
[   63.978298] 
[   63.978359] allocated by task 370 on cpu 0 at 63.976911s (0.001444s ago):
[   63.978428]  test_alloc+0x29c/0x628
[   63.978467]  test_krealloc+0xc0/0x830
[   63.978505]  kunit_try_run_case+0x170/0x3f0
[   63.978544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.978587]  kthread+0x328/0x630
[   63.978624]  ret_from_fork+0x10/0x20
[   63.978663] 
[   63.978689] freed by task 370 on cpu 0 at 63.977195s (0.001490s ago):
[   63.978747]  krealloc_noprof+0x148/0x360
[   63.978784]  test_krealloc+0x1dc/0x830
[   63.978821]  kunit_try_run_case+0x170/0x3f0
[   63.978858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.978908]  kthread+0x328/0x630
[   63.978945]  ret_from_fork+0x10/0x20
[   63.978984] 
[   63.979032] CPU: 0 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   63.979116] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.979148] Hardware name: linux,dummy-virt (DT)
[   63.979185] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   63.889023] ==================================================================
[   63.889130] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   63.889130] 
[   63.889229] Use-after-free read at 0x0000000027bff02d (in kfence-#187):
[   63.889286]  test_memcache_typesafe_by_rcu+0x280/0x560
[   63.889336]  kunit_try_run_case+0x170/0x3f0
[   63.889381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.889426]  kthread+0x328/0x630
[   63.889466]  ret_from_fork+0x10/0x20
[   63.889508] 
[   63.889533] kfence-#187: 0x0000000027bff02d-0x00000000857234c3, size=32, cache=test
[   63.889533] 
[   63.889586] allocated by task 368 on cpu 1 at 63.872958s (0.016625s ago):
[   63.889655]  test_alloc+0x230/0x628
[   63.889695]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   63.889736]  kunit_try_run_case+0x170/0x3f0
[   63.889774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.889817]  kthread+0x328/0x630
[   63.889854]  ret_from_fork+0x10/0x20
[   63.889891] 
[   63.889932] freed by task 368 on cpu 1 at 63.873086s (0.016843s ago):
[   63.889988]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   63.890029]  kunit_try_run_case+0x170/0x3f0
[   63.890067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.890109]  kthread+0x328/0x630
[   63.890146]  ret_from_fork+0x10/0x20
[   63.890184] 
[   63.890231] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   63.890316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.890353] Hardware name: linux,dummy-virt (DT)
[   63.890387] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   41.216401] ==================================================================
[   41.216560] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   41.216560] 
[   41.216664] Invalid read at 0x00000000ffb7c965:
[   41.216882]  test_invalid_access+0xdc/0x1f0
[   41.217889]  kunit_try_run_case+0x170/0x3f0
[   41.217978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.218030]  kthread+0x328/0x630
[   41.218078]  ret_from_fork+0x10/0x20
[   41.218297] 
[   41.218364] CPU: 1 UID: 0 PID: 364 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   41.218720] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   41.218759] Hardware name: linux,dummy-virt (DT)
[   41.218801] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   40.985104] ==================================================================
[   40.985203] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.985203] 
[   40.985268] Corrupted memory at 0x00000000039546ab [ ! . . . . . . . . . . . . . . . ] (in kfence-#181):
[   40.985580]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.985628]  kunit_try_run_case+0x170/0x3f0
[   40.985672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.985715]  kthread+0x328/0x630
[   40.985755]  ret_from_fork+0x10/0x20
[   40.985795] 
[   40.985820] kfence-#181: 0x000000008efb0950-0x000000002df0f7f5, size=73, cache=kmalloc-96
[   40.985820] 
[   40.985876] allocated by task 358 on cpu 1 at 40.984844s (0.001028s ago):
[   40.985953]  test_alloc+0x29c/0x628
[   40.985992]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   40.986033]  kunit_try_run_case+0x170/0x3f0
[   40.986072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.986115]  kthread+0x328/0x630
[   40.986151]  ret_from_fork+0x10/0x20
[   40.986191] 
[   40.986214] freed by task 358 on cpu 1 at 40.985008s (0.001202s ago):
[   40.986274]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   40.986315]  kunit_try_run_case+0x170/0x3f0
[   40.986359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.986404]  kthread+0x328/0x630
[   40.986439]  ret_from_fork+0x10/0x20
[   40.986477] 
[   40.986523] CPU: 1 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   40.986607] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   40.986638] Hardware name: linux,dummy-virt (DT)
[   40.986671] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   40.881247] ==================================================================
[   40.881354] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   40.881354] 
[   40.881455] Out-of-bounds read at 0x00000000b14c1698 (105B right of kfence-#180):
[   40.881521]  test_kmalloc_aligned_oob_read+0x238/0x468
[   40.881572]  kunit_try_run_case+0x170/0x3f0
[   40.881618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.881665]  kthread+0x328/0x630
[   40.881707]  ret_from_fork+0x10/0x20
[   40.881750] 
[   40.881776] kfence-#180: 0x00000000fc6b713b-0x00000000934bc69f, size=73, cache=kmalloc-96
[   40.881776] 
[   40.881832] allocated by task 356 on cpu 1 at 40.880985s (0.000843s ago):
[   40.881923]  test_alloc+0x29c/0x628
[   40.881966]  test_kmalloc_aligned_oob_read+0x100/0x468
[   40.882012]  kunit_try_run_case+0x170/0x3f0
[   40.882054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.882102]  kthread+0x328/0x630
[   40.882139]  ret_from_fork+0x10/0x20
[   40.882180] 
[   40.882231] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   40.882320] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   40.882359] Hardware name: linux,dummy-virt (DT)
[   40.882397] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   36.617249] ==================================================================
[   36.617342] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   36.617342] 
[   36.617403] Corrupted memory at 0x00000000b6c7afbb [ ! ] (in kfence-#139):
[   36.617520]  test_corruption+0x1d8/0x378
[   36.617565]  kunit_try_run_case+0x170/0x3f0
[   36.617611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.617655]  kthread+0x328/0x630
[   36.617693]  ret_from_fork+0x10/0x20
[   36.617734] 
[   36.617759] kfence-#139: 0x00000000c3773b6d-0x00000000bdd64e83, size=32, cache=test
[   36.617759] 
[   36.617815] allocated by task 346 on cpu 1 at 36.617114s (0.000697s ago):
[   36.617875]  test_alloc+0x230/0x628
[   36.617929]  test_corruption+0x198/0x378
[   36.617968]  kunit_try_run_case+0x170/0x3f0
[   36.618008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.618051]  kthread+0x328/0x630
[   36.618087]  ret_from_fork+0x10/0x20
[   36.618126] 
[   36.618149] freed by task 346 on cpu 1 at 36.617161s (0.000984s ago):
[   36.618209]  test_corruption+0x1d8/0x378
[   36.618248]  kunit_try_run_case+0x170/0x3f0
[   36.618287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.618330]  kthread+0x328/0x630
[   36.618375]  ret_from_fork+0x10/0x20
[   36.618414] 
[   36.618460] CPU: 1 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   36.618540] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.618570] Hardware name: linux,dummy-virt (DT)
[   36.618603] ==================================================================
[   36.409302] ==================================================================
[   36.409400] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   36.409400] 
[   36.409460] Corrupted memory at 0x00000000abf84d73 [ ! ] (in kfence-#137):
[   36.409592]  test_corruption+0x284/0x378
[   36.409639]  kunit_try_run_case+0x170/0x3f0
[   36.409681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.409726]  kthread+0x328/0x630
[   36.409765]  ret_from_fork+0x10/0x20
[   36.409804] 
[   36.409828] kfence-#137: 0x00000000e58d51ae-0x00000000cd03b2f7, size=32, cache=kmalloc-32
[   36.409828] 
[   36.409886] allocated by task 344 on cpu 1 at 36.409013s (0.000869s ago):
[   36.409965]  test_alloc+0x29c/0x628
[   36.410004]  test_corruption+0x198/0x378
[   36.410043]  kunit_try_run_case+0x170/0x3f0
[   36.410082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.410125]  kthread+0x328/0x630
[   36.410161]  ret_from_fork+0x10/0x20
[   36.410200] 
[   36.410223] freed by task 344 on cpu 1 at 36.409119s (0.001100s ago):
[   36.410283]  test_corruption+0x284/0x378
[   36.410321]  kunit_try_run_case+0x170/0x3f0
[   36.410365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.410409]  kthread+0x328/0x630
[   36.410446]  ret_from_fork+0x10/0x20
[   36.410485] 
[   36.410533] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   36.410616] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.410648] Hardware name: linux,dummy-virt (DT)
[   36.410682] ==================================================================
[   36.513021] ==================================================================
[   36.513113] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   36.513113] 
[   36.513174] Corrupted memory at 0x0000000011e10c81 [ ! . . . . . . . . . . . . . . . ] (in kfence-#138):
[   36.513486]  test_corruption+0x120/0x378
[   36.513530]  kunit_try_run_case+0x170/0x3f0
[   36.513575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.513617]  kthread+0x328/0x630
[   36.513657]  ret_from_fork+0x10/0x20
[   36.513699] 
[   36.513722] kfence-#138: 0x0000000046850c56-0x00000000076387aa, size=32, cache=test
[   36.513722] 
[   36.513776] allocated by task 346 on cpu 1 at 36.512862s (0.000911s ago):
[   36.513836]  test_alloc+0x230/0x628
[   36.513875]  test_corruption+0xdc/0x378
[   36.513929]  kunit_try_run_case+0x170/0x3f0
[   36.513968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.514011]  kthread+0x328/0x630
[   36.514046]  ret_from_fork+0x10/0x20
[   36.514083] 
[   36.514108] freed by task 346 on cpu 1 at 36.512934s (0.001171s ago):
[   36.514168]  test_corruption+0x120/0x378
[   36.514204]  kunit_try_run_case+0x170/0x3f0
[   36.514243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.514286]  kthread+0x328/0x630
[   36.514321]  ret_from_fork+0x10/0x20
[   36.514365] 
[   36.514410] CPU: 1 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   36.514491] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.514523] Hardware name: linux,dummy-virt (DT)
[   36.514557] ==================================================================
[   36.097221] ==================================================================
[   36.097340] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   36.097340] 
[   36.097408] Corrupted memory at 0x0000000035789ce5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#134):
[   36.097834]  test_corruption+0x278/0x378
[   36.097881]  kunit_try_run_case+0x170/0x3f0
[   36.097944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.097989]  kthread+0x328/0x630
[   36.098028]  ret_from_fork+0x10/0x20
[   36.098070] 
[   36.098099] kfence-#134: 0x00000000a6b1368b-0x000000005cece796, size=32, cache=kmalloc-32
[   36.098099] 
[   36.098156] allocated by task 344 on cpu 1 at 36.096926s (0.001226s ago):
[   36.098220]  test_alloc+0x29c/0x628
[   36.098258]  test_corruption+0xdc/0x378
[   36.098296]  kunit_try_run_case+0x170/0x3f0
[   36.098336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.098385]  kthread+0x328/0x630
[   36.098421]  ret_from_fork+0x10/0x20
[   36.098460] 
[   36.098483] freed by task 344 on cpu 1 at 36.097034s (0.001445s ago):
[   36.098541]  test_corruption+0x278/0x378
[   36.098577]  kunit_try_run_case+0x170/0x3f0
[   36.098616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.098658]  kthread+0x328/0x630
[   36.098695]  ret_from_fork+0x10/0x20
[   36.098734] 
[   36.098779] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   36.098860] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.098892] Hardware name: linux,dummy-virt (DT)
[   36.098938] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   35.889008] ==================================================================
[   35.889100] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   35.889100] 
[   35.889160] Invalid free of 0x00000000b0133952 (in kfence-#132):
[   35.889216]  test_invalid_addr_free+0xec/0x238
[   35.889260]  kunit_try_run_case+0x170/0x3f0
[   35.889305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.889347]  kthread+0x328/0x630
[   35.889385]  ret_from_fork+0x10/0x20
[   35.889425] 
[   35.889450] kfence-#132: 0x00000000c4cd7fa6-0x000000007721b191, size=32, cache=test
[   35.889450] 
[   35.889503] allocated by task 342 on cpu 1 at 35.888869s (0.000630s ago):
[   35.889563]  test_alloc+0x230/0x628
[   35.889604]  test_invalid_addr_free+0xd4/0x238
[   35.889644]  kunit_try_run_case+0x170/0x3f0
[   35.889684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.889728]  kthread+0x328/0x630
[   35.889764]  ret_from_fork+0x10/0x20
[   35.889803] 
[   35.889848] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   35.889947] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.889979] Hardware name: linux,dummy-virt (DT)
[   35.890011] ==================================================================
[   35.785203] ==================================================================
[   35.785288] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   35.785288] 
[   35.785347] Invalid free of 0x00000000fd00de05 (in kfence-#131):
[   35.785402]  test_invalid_addr_free+0x1ac/0x238
[   35.785449]  kunit_try_run_case+0x170/0x3f0
[   35.785494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.785536]  kthread+0x328/0x630
[   35.785574]  ret_from_fork+0x10/0x20
[   35.785616] 
[   35.785639] kfence-#131: 0x00000000e880db90-0x00000000f999c545, size=32, cache=kmalloc-32
[   35.785639] 
[   35.785693] allocated by task 340 on cpu 1 at 35.785067s (0.000623s ago):
[   35.785755]  test_alloc+0x29c/0x628
[   35.785794]  test_invalid_addr_free+0xd4/0x238
[   35.785832]  kunit_try_run_case+0x170/0x3f0
[   35.785871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.785928]  kthread+0x328/0x630
[   35.785965]  ret_from_fork+0x10/0x20
[   35.786003] 
[   35.786048] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   35.786133] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.786166] Hardware name: linux,dummy-virt (DT)
[   35.786198] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   35.580348] ==================================================================
[   35.580472] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   35.580472] 
[   35.581207] Invalid free of 0x00000000d08afd28 (in kfence-#129):
[   35.581422]  test_double_free+0x1bc/0x238
[   35.581615]  kunit_try_run_case+0x170/0x3f0
[   35.581871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.582021]  kthread+0x328/0x630
[   35.582070]  ret_from_fork+0x10/0x20
[   35.582114] 
[   35.582364] kfence-#129: 0x00000000d08afd28-0x00000000667cc3dc, size=32, cache=kmalloc-32
[   35.582364] 
[   35.582467] allocated by task 336 on cpu 1 at 35.579535s (0.002927s ago):
[   35.582786]  test_alloc+0x29c/0x628
[   35.582907]  test_double_free+0xd4/0x238
[   35.582987]  kunit_try_run_case+0x170/0x3f0
[   35.583033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.583290]  kthread+0x328/0x630
[   35.583782]  ret_from_fork+0x10/0x20
[   35.583876] 
[   35.584401] freed by task 336 on cpu 1 at 35.579918s (0.004461s ago):
[   35.584810]  test_double_free+0x1ac/0x238
[   35.584861]  kunit_try_run_case+0x170/0x3f0
[   35.584916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.584986]  kthread+0x328/0x630
[   35.585024]  ret_from_fork+0x10/0x20
[   35.585357] 
[   35.585507] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   35.586199] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.586294] Hardware name: linux,dummy-virt (DT)
[   35.586613] ==================================================================
[   35.682522] ==================================================================
[   35.682922] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   35.682922] 
[   35.683232] Invalid free of 0x00000000466e04fa (in kfence-#130):
[   35.683388]  test_double_free+0x100/0x238
[   35.683462]  kunit_try_run_case+0x170/0x3f0
[   35.683507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.683815]  kthread+0x328/0x630
[   35.684179]  ret_from_fork+0x10/0x20
[   35.684252] 
[   35.684278] kfence-#130: 0x00000000466e04fa-0x00000000646e99dc, size=32, cache=test
[   35.684278] 
[   35.684378] allocated by task 338 on cpu 1 at 35.682272s (0.002074s ago):
[   35.684463]  test_alloc+0x230/0x628
[   35.684796]  test_double_free+0xd4/0x238
[   35.684957]  kunit_try_run_case+0x170/0x3f0
[   35.685086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.685137]  kthread+0x328/0x630
[   35.685443]  ret_from_fork+0x10/0x20
[   35.685608] 
[   35.685700] freed by task 338 on cpu 1 at 35.682345s (0.003334s ago):
[   35.685869]  test_double_free+0xf0/0x238
[   35.685927]  kunit_try_run_case+0x170/0x3f0
[   35.685997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.686386]  kthread+0x328/0x630
[   35.686744]  ret_from_fork+0x10/0x20
[   35.686851] 
[   35.686914] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   35.687314] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.687383] Hardware name: linux,dummy-virt (DT)
[   35.687602] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   35.261569] ==================================================================
[   35.261649] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   35.261649] 
[   35.261741] Use-after-free read at 0x00000000404d1b9d (in kfence-#126):
[   35.261816]  test_use_after_free_read+0x114/0x248
[   35.261894]  kunit_try_run_case+0x170/0x3f0
[   35.262052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.262098]  kthread+0x328/0x630
[   35.262138]  ret_from_fork+0x10/0x20
[   35.262307] 
[   35.262509] kfence-#126: 0x00000000404d1b9d-0x00000000d618dd20, size=32, cache=test
[   35.262509] 
[   35.262616] allocated by task 330 on cpu 1 at 35.261338s (0.001267s ago):
[   35.262698]  test_alloc+0x230/0x628
[   35.262741]  test_use_after_free_read+0xd0/0x248
[   35.262817]  kunit_try_run_case+0x170/0x3f0
[   35.262860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.262917]  kthread+0x328/0x630
[   35.262977]  ret_from_fork+0x10/0x20
[   35.263108] 
[   35.263239] freed by task 330 on cpu 1 at 35.261402s (0.001726s ago):
[   35.263387]  test_use_after_free_read+0xf0/0x248
[   35.263516]  kunit_try_run_case+0x170/0x3f0
[   35.263661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.263716]  kthread+0x328/0x630
[   35.263752]  ret_from_fork+0x10/0x20
[   35.263792] 
[   35.264029] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   35.264150] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.264184] Hardware name: linux,dummy-virt (DT)
[   35.264253] ==================================================================
[   35.154045] ==================================================================
[   35.154147] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   35.154147] 
[   35.154442] Use-after-free read at 0x00000000efd0f0b6 (in kfence-#125):
[   35.154562]  test_use_after_free_read+0x114/0x248
[   35.154634]  kunit_try_run_case+0x170/0x3f0
[   35.154700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.154754]  kthread+0x328/0x630
[   35.154794]  ret_from_fork+0x10/0x20
[   35.155035] 
[   35.155123] kfence-#125: 0x00000000efd0f0b6-0x0000000069a2a49e, size=32, cache=kmalloc-32
[   35.155123] 
[   35.155208] allocated by task 328 on cpu 1 at 35.153687s (0.001499s ago):
[   35.155311]  test_alloc+0x29c/0x628
[   35.155369]  test_use_after_free_read+0xd0/0x248
[   35.155443]  kunit_try_run_case+0x170/0x3f0
[   35.155491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.155537]  kthread+0x328/0x630
[   35.155574]  ret_from_fork+0x10/0x20
[   35.155906] 
[   35.156131] freed by task 328 on cpu 1 at 35.153789s (0.002240s ago):
[   35.156292]  test_use_after_free_read+0x1c0/0x248
[   35.156350]  kunit_try_run_case+0x170/0x3f0
[   35.156393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.156673]  kthread+0x328/0x630
[   35.156732]  ret_from_fork+0x10/0x20
[   35.156797] 
[   35.156926] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   35.157056] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.157108] Hardware name: linux,dummy-virt (DT)
[   35.157481] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   34.842949] ==================================================================
[   34.843054] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   34.843054] 
[   34.843531] Out-of-bounds write at 0x00000000f5ecaf6b (1B left of kfence-#122):
[   34.843601]  test_out_of_bounds_write+0x100/0x240
[   34.843886]  kunit_try_run_case+0x170/0x3f0
[   34.844087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.844147]  kthread+0x328/0x630
[   34.844215]  ret_from_fork+0x10/0x20
[   34.844554] 
[   34.844635] kfence-#122: 0x00000000912abb84-0x000000007c600b57, size=32, cache=kmalloc-32
[   34.844635] 
[   34.845001] allocated by task 324 on cpu 1 at 34.842707s (0.002289s ago):
[   34.845080]  test_alloc+0x29c/0x628
[   34.845120]  test_out_of_bounds_write+0xc8/0x240
[   34.845171]  kunit_try_run_case+0x170/0x3f0
[   34.845223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.845271]  kthread+0x328/0x630
[   34.845323]  ret_from_fork+0x10/0x20
[   34.845398] 
[   34.845446] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   34.845559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.845594] Hardware name: linux,dummy-virt (DT)
[   34.845638] ==================================================================
[   35.049531] ==================================================================
[   35.049620] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   35.049620] 
[   35.049720] Out-of-bounds write at 0x0000000032578aae (1B left of kfence-#124):
[   35.049805]  test_out_of_bounds_write+0x100/0x240
[   35.049874]  kunit_try_run_case+0x170/0x3f0
[   35.049937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.049984]  kthread+0x328/0x630
[   35.050033]  ret_from_fork+0x10/0x20
[   35.050300] 
[   35.050377] kfence-#124: 0x00000000c4e843bb-0x0000000004268b7a, size=32, cache=test
[   35.050377] 
[   35.050524] allocated by task 326 on cpu 1 at 35.049156s (0.001356s ago):
[   35.050617]  test_alloc+0x230/0x628
[   35.050681]  test_out_of_bounds_write+0xc8/0x240
[   35.050753]  kunit_try_run_case+0x170/0x3f0
[   35.050797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.050856]  kthread+0x328/0x630
[   35.050924]  ret_from_fork+0x10/0x20
[   35.050997] 
[   35.051042] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   35.051154] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.051188] Hardware name: linux,dummy-virt (DT)
[   35.051502] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   34.419186] ==================================================================
[   34.419275] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   34.419275] 
[   34.419654] Out-of-bounds read at 0x000000009bb3491f (1B left of kfence-#118):
[   34.419807]  test_out_of_bounds_read+0x114/0x3e0
[   34.419865]  kunit_try_run_case+0x170/0x3f0
[   34.420186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.420556]  kthread+0x328/0x630
[   34.420661]  ret_from_fork+0x10/0x20
[   34.420715] 
[   34.420740] kfence-#118: 0x000000001491221a-0x00000000d9032223, size=32, cache=test
[   34.420740] 
[   34.421126] allocated by task 322 on cpu 1 at 34.418632s (0.002416s ago):
[   34.421508]  test_alloc+0x230/0x628
[   34.421683]  test_out_of_bounds_read+0xdc/0x3e0
[   34.422038]  kunit_try_run_case+0x170/0x3f0
[   34.422152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.422231]  kthread+0x328/0x630
[   34.422305]  ret_from_fork+0x10/0x20
[   34.422579] 
[   34.422958] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   34.423149] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.423296] Hardware name: linux,dummy-virt (DT)
[   34.423341] ==================================================================
[   34.102228] ==================================================================
[   34.102318] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   34.102318] 
[   34.102462] Out-of-bounds read at 0x00000000fc1ad20c (1B left of kfence-#115):
[   34.102592]  test_out_of_bounds_read+0x114/0x3e0
[   34.102674]  kunit_try_run_case+0x170/0x3f0
[   34.102724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.102782]  kthread+0x328/0x630
[   34.102822]  ret_from_fork+0x10/0x20
[   34.103003] 
[   34.103032] kfence-#115: 0x000000004eecf4f5-0x00000000acfa2ca1, size=32, cache=kmalloc-32
[   34.103032] 
[   34.103097] allocated by task 320 on cpu 1 at 34.101627s (0.001467s ago):
[   34.103309]  test_alloc+0x29c/0x628
[   34.104831]  test_out_of_bounds_read+0xdc/0x3e0
[   34.104920]  kunit_try_run_case+0x170/0x3f0
[   34.104966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.105014]  kthread+0x328/0x630
[   34.105050]  ret_from_fork+0x10/0x20
[   34.105092] 
[   34.105143] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   34.105245] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.105281] Hardware name: linux,dummy-virt (DT)
[   34.105319] ==================================================================
[   34.209338] ==================================================================
[   34.209424] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   34.209424] 
[   34.209505] Out-of-bounds read at 0x000000009ac86b1e (32B right of kfence-#116):
[   34.209770]  test_out_of_bounds_read+0x1c8/0x3e0
[   34.209831]  kunit_try_run_case+0x170/0x3f0
[   34.209875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.209934]  kthread+0x328/0x630
[   34.209991]  ret_from_fork+0x10/0x20
[   34.210036] 
[   34.210062] kfence-#116: 0x0000000076e21990-0x0000000025b1ee47, size=32, cache=kmalloc-32
[   34.210062] 
[   34.210146] allocated by task 320 on cpu 1 at 34.209101s (0.001034s ago):
[   34.210227]  test_alloc+0x29c/0x628
[   34.210268]  test_out_of_bounds_read+0x198/0x3e0
[   34.210560]  kunit_try_run_case+0x170/0x3f0
[   34.210621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.210717]  kthread+0x328/0x630
[   34.210754]  ret_from_fork+0x10/0x20
[   34.210811] 
[   34.210881] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   34.211263] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.211317] Hardware name: linux,dummy-virt (DT)
[   34.211354] ==================================================================
[   34.526279] ==================================================================
[   34.526376] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   34.526376] 
[   34.526617] Out-of-bounds read at 0x00000000c600cfc6 (32B right of kfence-#119):
[   34.526817]  test_out_of_bounds_read+0x1c8/0x3e0
[   34.526881]  kunit_try_run_case+0x170/0x3f0
[   34.526946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.526993]  kthread+0x328/0x630
[   34.527030]  ret_from_fork+0x10/0x20
[   34.527069] 
[   34.527120] kfence-#119: 0x0000000006ec61e2-0x00000000bb4a1c87, size=32, cache=test
[   34.527120] 
[   34.527187] allocated by task 322 on cpu 1 at 34.525985s (0.001191s ago):
[   34.527259]  test_alloc+0x230/0x628
[   34.527298]  test_out_of_bounds_read+0x198/0x3e0
[   34.527339]  kunit_try_run_case+0x170/0x3f0
[   34.527380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.527434]  kthread+0x328/0x630
[   34.527472]  ret_from_fork+0x10/0x20
[   34.527510] 
[   34.527554] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   34.527643] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.527676] Hardware name: linux,dummy-virt (DT)
[   34.527710] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-kmalloc_node_oob_right
[   30.059240] ==================================================================
[   30.059342] BUG: KFENCE: out-of-bounds read in kmalloc_node_oob_right+0x160/0x330
[   30.059342] 
[   30.059440] Out-of-bounds read at 0x00000000d889b2dd (4096B right of kfence-#90):
[   30.059636]  kmalloc_node_oob_right+0x160/0x330
[   30.059682]  kunit_try_run_case+0x170/0x3f0
[   30.059721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.059762]  kthread+0x328/0x630
[   30.059796]  ret_from_fork+0x10/0x20
[   30.059833] 
[   30.060022] kfence-#90: 0x00000000aa6bc611-0x0000000020538670, size=4096, cache=kmalloc-4k
[   30.060022] 
[   30.060190] allocated by task 173 on cpu 0 at 30.058129s (0.002008s ago):
[   30.060513]  kmalloc_node_oob_right+0xbc/0x330
[   30.060756]  kunit_try_run_case+0x170/0x3f0
[   30.060837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.060913]  kthread+0x328/0x630
[   30.061011]  ret_from_fork+0x10/0x20
[   30.061128] 
[   30.061220] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.061307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.061334] Hardware name: linux,dummy-virt (DT)
[   30.061396] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   33.938806] ==================================================================
[   33.939004] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   33.939130] Write of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318
[   33.939186] 
[   33.939218] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.939623] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.939949] Hardware name: linux,dummy-virt (DT)
[   33.940003] Call trace:
[   33.940087]  show_stack+0x20/0x38 (C)
[   33.940173]  dump_stack_lvl+0x8c/0xd0
[   33.940230]  print_report+0x118/0x5e8
[   33.940373]  kasan_report+0xdc/0x128
[   33.940439]  kasan_check_range+0x100/0x1a8
[   33.940490]  __kasan_check_write+0x20/0x30
[   33.940877]  strncpy_from_user+0x3c/0x2a0
[   33.940963]  copy_user_test_oob+0x5c0/0xec8
[   33.941288]  kunit_try_run_case+0x170/0x3f0
[   33.941416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.941688]  kthread+0x328/0x630
[   33.941744]  ret_from_fork+0x10/0x20
[   33.941795] 
[   33.941817] Allocated by task 318:
[   33.942313]  kasan_save_stack+0x3c/0x68
[   33.942812]  kasan_save_track+0x20/0x40
[   33.943278]  kasan_save_alloc_info+0x40/0x58
[   33.943365]  __kasan_kmalloc+0xd4/0xd8
[   33.943440]  __kmalloc_noprof+0x198/0x4c8
[   33.943659]  kunit_kmalloc_array+0x34/0x88
[   33.943700]  copy_user_test_oob+0xac/0xec8
[   33.944295]  kunit_try_run_case+0x170/0x3f0
[   33.944349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.944397]  kthread+0x328/0x630
[   33.944460]  ret_from_fork+0x10/0x20
[   33.944519] 
[   33.944830] The buggy address belongs to the object at fff00000c9c2f300
[   33.944830]  which belongs to the cache kmalloc-128 of size 128
[   33.945193] The buggy address is located 0 bytes inside of
[   33.945193]  allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378)
[   33.945270] 
[   33.945425] The buggy address belongs to the physical page:
[   33.945466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f
[   33.945647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.945811] page_type: f5(slab)
[   33.946073] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.946397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.946712] page dumped because: kasan: bad access detected
[   33.947169] 
[   33.947233] Memory state around the buggy address:
[   33.947587]  fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.947650]  fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.947702] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.947773]                                                                 ^
[   33.947822]  fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.947869]  fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.947922] ==================================================================
[   33.949622] ==================================================================
[   33.949685] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   33.949738] Write of size 1 at addr fff00000c9c2f378 by task kunit_try_catch/318
[   33.949798] 
[   33.950137] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.950573] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.950625] Hardware name: linux,dummy-virt (DT)
[   33.950705] Call trace:
[   33.950732]  show_stack+0x20/0x38 (C)
[   33.950786]  dump_stack_lvl+0x8c/0xd0
[   33.950831]  print_report+0x118/0x5e8
[   33.950970]  kasan_report+0xdc/0x128
[   33.951017]  __asan_report_store1_noabort+0x20/0x30
[   33.951201]  strncpy_from_user+0x270/0x2a0
[   33.951255]  copy_user_test_oob+0x5c0/0xec8
[   33.951559]  kunit_try_run_case+0x170/0x3f0
[   33.951859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.951948]  kthread+0x328/0x630
[   33.951993]  ret_from_fork+0x10/0x20
[   33.952042] 
[   33.952333] Allocated by task 318:
[   33.952528]  kasan_save_stack+0x3c/0x68
[   33.952703]  kasan_save_track+0x20/0x40
[   33.952803]  kasan_save_alloc_info+0x40/0x58
[   33.952869]  __kasan_kmalloc+0xd4/0xd8
[   33.953089]  __kmalloc_noprof+0x198/0x4c8
[   33.953133]  kunit_kmalloc_array+0x34/0x88
[   33.953269]  copy_user_test_oob+0xac/0xec8
[   33.953341]  kunit_try_run_case+0x170/0x3f0
[   33.953481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.953646]  kthread+0x328/0x630
[   33.953826]  ret_from_fork+0x10/0x20
[   33.953872] 
[   33.953906] The buggy address belongs to the object at fff00000c9c2f300
[   33.953906]  which belongs to the cache kmalloc-128 of size 128
[   33.954480] The buggy address is located 0 bytes to the right of
[   33.954480]  allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378)
[   33.954635] 
[   33.954707] The buggy address belongs to the physical page:
[   33.954940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f
[   33.955161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.955536] page_type: f5(slab)
[   33.955607] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.955806] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.955967] page dumped because: kasan: bad access detected
[   33.956033] 
[   33.956056] Memory state around the buggy address:
[   33.956111]  fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.956176]  fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.956240] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.956289]                                                                 ^
[   33.956336]  fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.956389]  fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.956439] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   33.893372] ==================================================================
[   33.893441] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   33.893503] Read of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318
[   33.893689] 
[   33.893730] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.893825] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.893858] Hardware name: linux,dummy-virt (DT)
[   33.893890] Call trace:
[   33.893929]  show_stack+0x20/0x38 (C)
[   33.893978]  dump_stack_lvl+0x8c/0xd0
[   33.894027]  print_report+0x118/0x5e8
[   33.894073]  kasan_report+0xdc/0x128
[   33.894125]  kasan_check_range+0x100/0x1a8
[   33.894345]  __kasan_check_read+0x20/0x30
[   33.894576]  copy_user_test_oob+0x728/0xec8
[   33.894665]  kunit_try_run_case+0x170/0x3f0
[   33.894874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.894955]  kthread+0x328/0x630
[   33.894997]  ret_from_fork+0x10/0x20
[   33.895045] 
[   33.895065] Allocated by task 318:
[   33.895096]  kasan_save_stack+0x3c/0x68
[   33.895135]  kasan_save_track+0x20/0x40
[   33.895173]  kasan_save_alloc_info+0x40/0x58
[   33.895244]  __kasan_kmalloc+0xd4/0xd8
[   33.895281]  __kmalloc_noprof+0x198/0x4c8
[   33.895324]  kunit_kmalloc_array+0x34/0x88
[   33.895363]  copy_user_test_oob+0xac/0xec8
[   33.895405]  kunit_try_run_case+0x170/0x3f0
[   33.895444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.895489]  kthread+0x328/0x630
[   33.895524]  ret_from_fork+0x10/0x20
[   33.895563] 
[   33.895585] The buggy address belongs to the object at fff00000c9c2f300
[   33.895585]  which belongs to the cache kmalloc-128 of size 128
[   33.895647] The buggy address is located 0 bytes inside of
[   33.895647]  allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378)
[   33.895712] 
[   33.895735] The buggy address belongs to the physical page:
[   33.895800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f
[   33.895909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.895963] page_type: f5(slab)
[   33.896004] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.896057] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.896100] page dumped because: kasan: bad access detected
[   33.896132] 
[   33.896152] Memory state around the buggy address:
[   33.896186]  fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.896230]  fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.896275] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.896314]                                                                 ^
[   33.896428]  fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.896474]  fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.896543] ==================================================================
[   33.919716] ==================================================================
[   33.919830] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   33.919887] Write of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318
[   33.919955] 
[   33.919987] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.920076] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.920108] Hardware name: linux,dummy-virt (DT)
[   33.920140] Call trace:
[   33.920164]  show_stack+0x20/0x38 (C)
[   33.920213]  dump_stack_lvl+0x8c/0xd0
[   33.920260]  print_report+0x118/0x5e8
[   33.920325]  kasan_report+0xdc/0x128
[   33.920379]  kasan_check_range+0x100/0x1a8
[   33.920426]  __kasan_check_write+0x20/0x30
[   33.920486]  copy_user_test_oob+0x434/0xec8
[   33.921210]  kunit_try_run_case+0x170/0x3f0
[   33.921520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.922114]  kthread+0x328/0x630
[   33.922246]  ret_from_fork+0x10/0x20
[   33.922345] 
[   33.922374] Allocated by task 318:
[   33.922600]  kasan_save_stack+0x3c/0x68
[   33.922756]  kasan_save_track+0x20/0x40
[   33.923192]  kasan_save_alloc_info+0x40/0x58
[   33.923280]  __kasan_kmalloc+0xd4/0xd8
[   33.923626]  __kmalloc_noprof+0x198/0x4c8
[   33.923970]  kunit_kmalloc_array+0x34/0x88
[   33.924357]  copy_user_test_oob+0xac/0xec8
[   33.924520]  kunit_try_run_case+0x170/0x3f0
[   33.924599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.924655]  kthread+0x328/0x630
[   33.925040]  ret_from_fork+0x10/0x20
[   33.925164] 
[   33.925241] The buggy address belongs to the object at fff00000c9c2f300
[   33.925241]  which belongs to the cache kmalloc-128 of size 128
[   33.925467] The buggy address is located 0 bytes inside of
[   33.925467]  allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378)
[   33.925953] 
[   33.926002] The buggy address belongs to the physical page:
[   33.926051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f
[   33.926325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.926468] page_type: f5(slab)
[   33.926513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.926727] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.927236] page dumped because: kasan: bad access detected
[   33.927298] 
[   33.927407] Memory state around the buggy address:
[   33.927474]  fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.927692]  fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.927963] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.928126]                                                                 ^
[   33.928183]  fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.928329]  fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.928404] ==================================================================
[   33.929665] ==================================================================
[   33.929741] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   33.930098] Read of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318
[   33.930420] 
[   33.930627] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.930757] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.930850] Hardware name: linux,dummy-virt (DT)
[   33.930884] Call trace:
[   33.930919]  show_stack+0x20/0x38 (C)
[   33.931107]  dump_stack_lvl+0x8c/0xd0
[   33.931369]  print_report+0x118/0x5e8
[   33.931611]  kasan_report+0xdc/0x128
[   33.931674]  kasan_check_range+0x100/0x1a8
[   33.931884]  __kasan_check_read+0x20/0x30
[   33.931965]  copy_user_test_oob+0x4a0/0xec8
[   33.932021]  kunit_try_run_case+0x170/0x3f0
[   33.932238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.932310]  kthread+0x328/0x630
[   33.932353]  ret_from_fork+0x10/0x20
[   33.932406] 
[   33.932427] Allocated by task 318:
[   33.932458]  kasan_save_stack+0x3c/0x68
[   33.932501]  kasan_save_track+0x20/0x40
[   33.932927]  kasan_save_alloc_info+0x40/0x58
[   33.933244]  __kasan_kmalloc+0xd4/0xd8
[   33.933334]  __kmalloc_noprof+0x198/0x4c8
[   33.933459]  kunit_kmalloc_array+0x34/0x88
[   33.933767]  copy_user_test_oob+0xac/0xec8
[   33.933933]  kunit_try_run_case+0x170/0x3f0
[   33.934253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.934671]  kthread+0x328/0x630
[   33.934788]  ret_from_fork+0x10/0x20
[   33.934947] 
[   33.935001] The buggy address belongs to the object at fff00000c9c2f300
[   33.935001]  which belongs to the cache kmalloc-128 of size 128
[   33.935326] The buggy address is located 0 bytes inside of
[   33.935326]  allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378)
[   33.935709] 
[   33.935752] The buggy address belongs to the physical page:
[   33.935875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f
[   33.935975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.936039] page_type: f5(slab)
[   33.936093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.936153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.936195] page dumped because: kasan: bad access detected
[   33.936229] 
[   33.936258] Memory state around the buggy address:
[   33.936293]  fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.936352]  fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.936398] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.936438]                                                                 ^
[   33.936484]  fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.937006]  fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.937075] ==================================================================
[   33.910940] ==================================================================
[   33.910994] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   33.911047] Read of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318
[   33.911175] 
[   33.911221] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.911588] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.911640] Hardware name: linux,dummy-virt (DT)
[   33.911694] Call trace:
[   33.911723]  show_stack+0x20/0x38 (C)
[   33.911776]  dump_stack_lvl+0x8c/0xd0
[   33.911951]  print_report+0x118/0x5e8
[   33.912120]  kasan_report+0xdc/0x128
[   33.912203]  kasan_check_range+0x100/0x1a8
[   33.912279]  __kasan_check_read+0x20/0x30
[   33.912345]  copy_user_test_oob+0x3c8/0xec8
[   33.912439]  kunit_try_run_case+0x170/0x3f0
[   33.912486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.912833]  kthread+0x328/0x630
[   33.912936]  ret_from_fork+0x10/0x20
[   33.913015] 
[   33.913355] Allocated by task 318:
[   33.913421]  kasan_save_stack+0x3c/0x68
[   33.913628]  kasan_save_track+0x20/0x40
[   33.913888]  kasan_save_alloc_info+0x40/0x58
[   33.913998]  __kasan_kmalloc+0xd4/0xd8
[   33.914324]  __kmalloc_noprof+0x198/0x4c8
[   33.914472]  kunit_kmalloc_array+0x34/0x88
[   33.914516]  copy_user_test_oob+0xac/0xec8
[   33.914567]  kunit_try_run_case+0x170/0x3f0
[   33.914930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.915157]  kthread+0x328/0x630
[   33.915258]  ret_from_fork+0x10/0x20
[   33.915473] 
[   33.915499] The buggy address belongs to the object at fff00000c9c2f300
[   33.915499]  which belongs to the cache kmalloc-128 of size 128
[   33.915869] The buggy address is located 0 bytes inside of
[   33.915869]  allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378)
[   33.916178] 
[   33.916554] The buggy address belongs to the physical page:
[   33.916790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f
[   33.916864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.917125] page_type: f5(slab)
[   33.917213] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.917280] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.917323] page dumped because: kasan: bad access detected
[   33.917360] 
[   33.917380] Memory state around the buggy address:
[   33.917721]  fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.917951]  fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.918290] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.918380]                                                                 ^
[   33.918877]  fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.919042]  fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.919106] ==================================================================
[   33.883229] ==================================================================
[   33.883398] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   33.883628] Write of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318
[   33.883720] 
[   33.883825] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.884291] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.884485] Hardware name: linux,dummy-virt (DT)
[   33.884784] Call trace:
[   33.884906]  show_stack+0x20/0x38 (C)
[   33.884967]  dump_stack_lvl+0x8c/0xd0
[   33.885038]  print_report+0x118/0x5e8
[   33.885084]  kasan_report+0xdc/0x128
[   33.885127]  kasan_check_range+0x100/0x1a8
[   33.885333]  __kasan_check_write+0x20/0x30
[   33.885454]  copy_user_test_oob+0x234/0xec8
[   33.885508]  kunit_try_run_case+0x170/0x3f0
[   33.885560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.885638]  kthread+0x328/0x630
[   33.885695]  ret_from_fork+0x10/0x20
[   33.885810] 
[   33.885956] Allocated by task 318:
[   33.885990]  kasan_save_stack+0x3c/0x68
[   33.886035]  kasan_save_track+0x20/0x40
[   33.886073]  kasan_save_alloc_info+0x40/0x58
[   33.886124]  __kasan_kmalloc+0xd4/0xd8
[   33.886161]  __kmalloc_noprof+0x198/0x4c8
[   33.886204]  kunit_kmalloc_array+0x34/0x88
[   33.886330]  copy_user_test_oob+0xac/0xec8
[   33.886469]  kunit_try_run_case+0x170/0x3f0
[   33.886549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.886685]  kthread+0x328/0x630
[   33.886755]  ret_from_fork+0x10/0x20
[   33.886801] 
[   33.886822] The buggy address belongs to the object at fff00000c9c2f300
[   33.886822]  which belongs to the cache kmalloc-128 of size 128
[   33.887033] The buggy address is located 0 bytes inside of
[   33.887033]  allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378)
[   33.887394] 
[   33.887425] The buggy address belongs to the physical page:
[   33.887490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f
[   33.887648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.887705] page_type: f5(slab)
[   33.887749] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.887802] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.887848] page dumped because: kasan: bad access detected
[   33.887944] 
[   33.888038] Memory state around the buggy address:
[   33.888215]  fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.888279]  fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.888497] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.888624]                                                                 ^
[   33.888672]  fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.888716]  fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.888756] ==================================================================
[   33.902160] ==================================================================
[   33.902248] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   33.902317] Write of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318
[   33.902379] 
[   33.902553] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.902797] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.902831] Hardware name: linux,dummy-virt (DT)
[   33.902865] Call trace:
[   33.902890]  show_stack+0x20/0x38 (C)
[   33.902959]  dump_stack_lvl+0x8c/0xd0
[   33.903287]  print_report+0x118/0x5e8
[   33.903368]  kasan_report+0xdc/0x128
[   33.903477]  kasan_check_range+0x100/0x1a8
[   33.903531]  __kasan_check_write+0x20/0x30
[   33.903578]  copy_user_test_oob+0x35c/0xec8
[   33.903915]  kunit_try_run_case+0x170/0x3f0
[   33.904007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.904104]  kthread+0x328/0x630
[   33.904146]  ret_from_fork+0x10/0x20
[   33.904462] 
[   33.904499] Allocated by task 318:
[   33.904543]  kasan_save_stack+0x3c/0x68
[   33.904841]  kasan_save_track+0x20/0x40
[   33.904926]  kasan_save_alloc_info+0x40/0x58
[   33.905066]  __kasan_kmalloc+0xd4/0xd8
[   33.905167]  __kmalloc_noprof+0x198/0x4c8
[   33.905307]  kunit_kmalloc_array+0x34/0x88
[   33.905360]  copy_user_test_oob+0xac/0xec8
[   33.905716]  kunit_try_run_case+0x170/0x3f0
[   33.905814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.905949]  kthread+0x328/0x630
[   33.906026]  ret_from_fork+0x10/0x20
[   33.906082] 
[   33.906104] The buggy address belongs to the object at fff00000c9c2f300
[   33.906104]  which belongs to the cache kmalloc-128 of size 128
[   33.906464] The buggy address is located 0 bytes inside of
[   33.906464]  allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378)
[   33.906540] 
[   33.906574] The buggy address belongs to the physical page:
[   33.906871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f
[   33.907262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.907395] page_type: f5(slab)
[   33.907442] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.907799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.907892] page dumped because: kasan: bad access detected
[   33.908200] 
[   33.908476] Memory state around the buggy address:
[   33.908565]  fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.908663]  fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.908995] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.909044]                                                                 ^
[   33.909337]  fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.909398]  fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.909687] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   33.839894] ==================================================================
[   33.840015] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   33.840089] Read of size 8 at addr fff00000c9c2f278 by task kunit_try_catch/314
[   33.840154] 
[   33.840196] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.840294] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.840354] Hardware name: linux,dummy-virt (DT)
[   33.840390] Call trace:
[   33.840417]  show_stack+0x20/0x38 (C)
[   33.840469]  dump_stack_lvl+0x8c/0xd0
[   33.840676]  print_report+0x118/0x5e8
[   33.840861]  kasan_report+0xdc/0x128
[   33.840931]  __asan_report_load8_noabort+0x20/0x30
[   33.841031]  copy_to_kernel_nofault+0x204/0x250
[   33.841083]  copy_to_kernel_nofault_oob+0x158/0x418
[   33.841153]  kunit_try_run_case+0x170/0x3f0
[   33.841205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.841274]  kthread+0x328/0x630
[   33.841318]  ret_from_fork+0x10/0x20
[   33.841369] 
[   33.841390] Allocated by task 314:
[   33.841420]  kasan_save_stack+0x3c/0x68
[   33.841463]  kasan_save_track+0x20/0x40
[   33.841500]  kasan_save_alloc_info+0x40/0x58
[   33.841542]  __kasan_kmalloc+0xd4/0xd8
[   33.841654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.841915]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.841964]  kunit_try_run_case+0x170/0x3f0
[   33.842110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.842184]  kthread+0x328/0x630
[   33.842252]  ret_from_fork+0x10/0x20
[   33.842367] 
[   33.842391] The buggy address belongs to the object at fff00000c9c2f200
[   33.842391]  which belongs to the cache kmalloc-128 of size 128
[   33.842454] The buggy address is located 0 bytes to the right of
[   33.842454]  allocated 120-byte region [fff00000c9c2f200, fff00000c9c2f278)
[   33.842519] 
[   33.842584] The buggy address belongs to the physical page:
[   33.842694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f
[   33.842756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.842859] page_type: f5(slab)
[   33.843493] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.843563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.843747] page dumped because: kasan: bad access detected
[   33.843927] 
[   33.844100] Memory state around the buggy address:
[   33.844142]  fff00000c9c2f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.844465]  fff00000c9c2f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.844705] >fff00000c9c2f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.844907]                                                                 ^
[   33.844966]  fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.845014]  fff00000c9c2f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.845131] ==================================================================
[   33.846422] ==================================================================
[   33.846738] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   33.846990] Write of size 8 at addr fff00000c9c2f278 by task kunit_try_catch/314
[   33.847095] 
[   33.847131] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.847234] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.847267] Hardware name: linux,dummy-virt (DT)
[   33.847302] Call trace:
[   33.847420]  show_stack+0x20/0x38 (C)
[   33.847723]  dump_stack_lvl+0x8c/0xd0
[   33.848034]  print_report+0x118/0x5e8
[   33.848110]  kasan_report+0xdc/0x128
[   33.848156]  kasan_check_range+0x100/0x1a8
[   33.848212]  __kasan_check_write+0x20/0x30
[   33.848421]  copy_to_kernel_nofault+0x8c/0x250
[   33.848473]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   33.848571]  kunit_try_run_case+0x170/0x3f0
[   33.848621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.848675]  kthread+0x328/0x630
[   33.848720]  ret_from_fork+0x10/0x20
[   33.849159] 
[   33.849185] Allocated by task 314:
[   33.849427]  kasan_save_stack+0x3c/0x68
[   33.849473]  kasan_save_track+0x20/0x40
[   33.849645]  kasan_save_alloc_info+0x40/0x58
[   33.849691]  __kasan_kmalloc+0xd4/0xd8
[   33.849728]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.850164]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.850214]  kunit_try_run_case+0x170/0x3f0
[   33.850256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.850303]  kthread+0x328/0x630
[   33.850339]  ret_from_fork+0x10/0x20
[   33.850395] 
[   33.850417] The buggy address belongs to the object at fff00000c9c2f200
[   33.850417]  which belongs to the cache kmalloc-128 of size 128
[   33.850479] The buggy address is located 0 bytes to the right of
[   33.850479]  allocated 120-byte region [fff00000c9c2f200, fff00000c9c2f278)
[   33.851022] 
[   33.851048] The buggy address belongs to the physical page:
[   33.851087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f
[   33.851148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.851200] page_type: f5(slab)
[   33.851240] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.851304] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.851347] page dumped because: kasan: bad access detected
[   33.851463] 
[   33.851779] Memory state around the buggy address:
[   33.852002]  fff00000c9c2f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.852162]  fff00000c9c2f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.852392] >fff00000c9c2f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.852445]                                                                 ^
[   33.852493]  fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.852580]  fff00000c9c2f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.852621] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   33.741782] ==================================================================
[   33.742339] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   33.742442] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/302
[   33.743356] 
[   33.744097] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.744601] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.744638] Hardware name: linux,dummy-virt (DT)
[   33.744680] Call trace:
[   33.744709]  show_stack+0x20/0x38 (C)
[   33.744765]  dump_stack_lvl+0x8c/0xd0
[   33.745352]  print_report+0x310/0x5e8
[   33.745530]  kasan_report+0xdc/0x128
[   33.745976]  __asan_report_load1_noabort+0x20/0x30
[   33.746095]  vmalloc_oob+0x578/0x5d0
[   33.746225]  kunit_try_run_case+0x170/0x3f0
[   33.746297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.746359]  kthread+0x328/0x630
[   33.746406]  ret_from_fork+0x10/0x20
[   33.746457] 
[   33.746481] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0
[   33.746590] The buggy address belongs to the physical page:
[   33.746631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c36
[   33.746689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.747478] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.747630] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.747711] page dumped because: kasan: bad access detected
[   33.747744] 
[   33.747764] Memory state around the buggy address:
[   33.748046]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.748178]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.748225] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.748437]                                                              ^
[   33.748506]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.748554]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.748601] ==================================================================
[   33.750595] ==================================================================
[   33.751083] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   33.751264] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/302
[   33.751497] 
[   33.751543] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.752028] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.752160] Hardware name: linux,dummy-virt (DT)
[   33.752368] Call trace:
[   33.752531]  show_stack+0x20/0x38 (C)
[   33.752597]  dump_stack_lvl+0x8c/0xd0
[   33.752686]  print_report+0x310/0x5e8
[   33.752734]  kasan_report+0xdc/0x128
[   33.752780]  __asan_report_load1_noabort+0x20/0x30
[   33.752828]  vmalloc_oob+0x51c/0x5d0
[   33.752875]  kunit_try_run_case+0x170/0x3f0
[   33.753102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.753495]  kthread+0x328/0x630
[   33.753805]  ret_from_fork+0x10/0x20
[   33.754218] 
[   33.754532] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0
[   33.754841] The buggy address belongs to the physical page:
[   33.754884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c36
[   33.755312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.755540] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.755650] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.755953] page dumped because: kasan: bad access detected
[   33.756174] 
[   33.756198] Memory state around the buggy address:
[   33.756235]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.756281]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.756326] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.756647]                                                                 ^
[   33.756717]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.756765]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.757030] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.473249] ==================================================================
[   33.473338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.473415] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.473480] 
[   33.473519] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.473610] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.473642] Hardware name: linux,dummy-virt (DT)
[   33.473746] Call trace:
[   33.473772]  show_stack+0x20/0x38 (C)
[   33.473819]  dump_stack_lvl+0x8c/0xd0
[   33.473922]  print_report+0x118/0x5e8
[   33.473983]  kasan_report+0xdc/0x128
[   33.474030]  __asan_report_load4_noabort+0x20/0x30
[   33.474097]  kasan_atomics_helper+0x3e04/0x4858
[   33.474168]  kasan_atomics+0x198/0x2e0
[   33.474218]  kunit_try_run_case+0x170/0x3f0
[   33.474519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.474608]  kthread+0x328/0x630
[   33.474652]  ret_from_fork+0x10/0x20
[   33.474744] 
[   33.474785] Allocated by task 298:
[   33.474844]  kasan_save_stack+0x3c/0x68
[   33.474917]  kasan_save_track+0x20/0x40
[   33.475150]  kasan_save_alloc_info+0x40/0x58
[   33.475213]  __kasan_kmalloc+0xd4/0xd8
[   33.475251]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.475430]  kasan_atomics+0xb8/0x2e0
[   33.475502]  kunit_try_run_case+0x170/0x3f0
[   33.475552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.475596]  kthread+0x328/0x630
[   33.475686]  ret_from_fork+0x10/0x20
[   33.475726] 
[   33.475748] The buggy address belongs to the object at fff00000c9c2de00
[   33.475748]  which belongs to the cache kmalloc-64 of size 64
[   33.475835] The buggy address is located 0 bytes to the right of
[   33.475835]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.476123] 
[   33.476173] The buggy address belongs to the physical page:
[   33.476210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.476263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.476339] page_type: f5(slab)
[   33.476541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.477090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.477195] page dumped because: kasan: bad access detected
[   33.477348] 
[   33.477392] Memory state around the buggy address:
[   33.477428]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.477672]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.477770] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.477959]                                      ^
[   33.477998]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.478053]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.478093] ==================================================================
[   33.664837] ==================================================================
[   33.664891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   33.665399] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.666569] 
[   33.666686] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.666792] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.667043] Hardware name: linux,dummy-virt (DT)
[   33.667382] Call trace:
[   33.667440]  show_stack+0x20/0x38 (C)
[   33.667735]  dump_stack_lvl+0x8c/0xd0
[   33.667827]  print_report+0x118/0x5e8
[   33.667882]  kasan_report+0xdc/0x128
[   33.667970]  kasan_check_range+0x100/0x1a8
[   33.668022]  __kasan_check_write+0x20/0x30
[   33.668070]  kasan_atomics_helper+0x16d0/0x4858
[   33.668147]  kasan_atomics+0x198/0x2e0
[   33.668196]  kunit_try_run_case+0x170/0x3f0
[   33.668243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.668296]  kthread+0x328/0x630
[   33.668339]  ret_from_fork+0x10/0x20
[   33.668387] 
[   33.668408] Allocated by task 298:
[   33.668458]  kasan_save_stack+0x3c/0x68
[   33.668503]  kasan_save_track+0x20/0x40
[   33.668777]  kasan_save_alloc_info+0x40/0x58
[   33.668917]  __kasan_kmalloc+0xd4/0xd8
[   33.668981]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.669033]  kasan_atomics+0xb8/0x2e0
[   33.669073]  kunit_try_run_case+0x170/0x3f0
[   33.669113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.669331]  kthread+0x328/0x630
[   33.669507]  ret_from_fork+0x10/0x20
[   33.669586] 
[   33.669654] The buggy address belongs to the object at fff00000c9c2de00
[   33.669654]  which belongs to the cache kmalloc-64 of size 64
[   33.670008] The buggy address is located 0 bytes to the right of
[   33.670008]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.670123] 
[   33.670178] The buggy address belongs to the physical page:
[   33.670214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.670400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.670627] page_type: f5(slab)
[   33.670889] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.671044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.671131] page dumped because: kasan: bad access detected
[   33.671245] 
[   33.671305] Memory state around the buggy address:
[   33.671417]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.671493]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.671808] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.671950]                                      ^
[   33.672043]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.672255]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.672427] ==================================================================
[   33.681605] ==================================================================
[   33.681660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   33.681715] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.681768] 
[   33.681800] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.681891] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.681937] Hardware name: linux,dummy-virt (DT)
[   33.681968] Call trace:
[   33.681993]  show_stack+0x20/0x38 (C)
[   33.683628]  dump_stack_lvl+0x8c/0xd0
[   33.683719]  print_report+0x118/0x5e8
[   33.684191]  kasan_report+0xdc/0x128
[   33.684340]  kasan_check_range+0x100/0x1a8
[   33.684390]  __kasan_check_write+0x20/0x30
[   33.684730]  kasan_atomics_helper+0x175c/0x4858
[   33.685245]  kasan_atomics+0x198/0x2e0
[   33.685307]  kunit_try_run_case+0x170/0x3f0
[   33.685356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.685579]  kthread+0x328/0x630
[   33.685758]  ret_from_fork+0x10/0x20
[   33.686191] 
[   33.686441] Allocated by task 298:
[   33.686673]  kasan_save_stack+0x3c/0x68
[   33.686872]  kasan_save_track+0x20/0x40
[   33.687144]  kasan_save_alloc_info+0x40/0x58
[   33.687454]  __kasan_kmalloc+0xd4/0xd8
[   33.687504]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.687876]  kasan_atomics+0xb8/0x2e0
[   33.688136]  kunit_try_run_case+0x170/0x3f0
[   33.688510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.688640]  kthread+0x328/0x630
[   33.688703]  ret_from_fork+0x10/0x20
[   33.688742] 
[   33.688867] The buggy address belongs to the object at fff00000c9c2de00
[   33.688867]  which belongs to the cache kmalloc-64 of size 64
[   33.689136] The buggy address is located 0 bytes to the right of
[   33.689136]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.689206] 
[   33.689439] The buggy address belongs to the physical page:
[   33.689531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.689689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.690281] page_type: f5(slab)
[   33.690592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.691010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.691358] page dumped because: kasan: bad access detected
[   33.691558] 
[   33.691597] Memory state around the buggy address:
[   33.691756]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.692125]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.692176] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.692217]                                      ^
[   33.692654]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.692719]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.692767] ==================================================================
[   33.524244] ==================================================================
[   33.524341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.524439] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.524494] 
[   33.524533] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.524656] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.524748] Hardware name: linux,dummy-virt (DT)
[   33.524783] Call trace:
[   33.524809]  show_stack+0x20/0x38 (C)
[   33.525040]  dump_stack_lvl+0x8c/0xd0
[   33.525265]  print_report+0x118/0x5e8
[   33.525510]  kasan_report+0xdc/0x128
[   33.525728]  kasan_check_range+0x100/0x1a8
[   33.525970]  __kasan_check_write+0x20/0x30
[   33.526177]  kasan_atomics_helper+0x1058/0x4858
[   33.526266]  kasan_atomics+0x198/0x2e0
[   33.526525]  kunit_try_run_case+0x170/0x3f0
[   33.526725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.527021]  kthread+0x328/0x630
[   33.527225]  ret_from_fork+0x10/0x20
[   33.527505] 
[   33.527612] Allocated by task 298:
[   33.527652]  kasan_save_stack+0x3c/0x68
[   33.527698]  kasan_save_track+0x20/0x40
[   33.527945]  kasan_save_alloc_info+0x40/0x58
[   33.528330]  __kasan_kmalloc+0xd4/0xd8
[   33.528674]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.528741]  kasan_atomics+0xb8/0x2e0
[   33.528953]  kunit_try_run_case+0x170/0x3f0
[   33.529077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.529486]  kthread+0x328/0x630
[   33.529601]  ret_from_fork+0x10/0x20
[   33.529645] 
[   33.529667] The buggy address belongs to the object at fff00000c9c2de00
[   33.529667]  which belongs to the cache kmalloc-64 of size 64
[   33.529891] The buggy address is located 0 bytes to the right of
[   33.529891]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.530201] 
[   33.530285] The buggy address belongs to the physical page:
[   33.530480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.530549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.530601] page_type: f5(slab)
[   33.530641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.530693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.530735] page dumped because: kasan: bad access detected
[   33.530770] 
[   33.530790] Memory state around the buggy address:
[   33.530823]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.530876]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.530934] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.530985]                                      ^
[   33.531040]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.531120]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.531170] ==================================================================
[   33.508210] ==================================================================
[   33.508266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.508319] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.508387] 
[   33.508435] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.508528] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.508612] Hardware name: linux,dummy-virt (DT)
[   33.508684] Call trace:
[   33.508708]  show_stack+0x20/0x38 (C)
[   33.508757]  dump_stack_lvl+0x8c/0xd0
[   33.508970]  print_report+0x118/0x5e8
[   33.509019]  kasan_report+0xdc/0x128
[   33.509064]  kasan_check_range+0x100/0x1a8
[   33.509344]  __kasan_check_write+0x20/0x30
[   33.509432]  kasan_atomics_helper+0xf88/0x4858
[   33.509824]  kasan_atomics+0x198/0x2e0
[   33.509953]  kunit_try_run_case+0x170/0x3f0
[   33.510100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.510194]  kthread+0x328/0x630
[   33.510299]  ret_from_fork+0x10/0x20
[   33.510415] 
[   33.510439] Allocated by task 298:
[   33.510469]  kasan_save_stack+0x3c/0x68
[   33.510822]  kasan_save_track+0x20/0x40
[   33.510912]  kasan_save_alloc_info+0x40/0x58
[   33.510980]  __kasan_kmalloc+0xd4/0xd8
[   33.511040]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.511336]  kasan_atomics+0xb8/0x2e0
[   33.511429]  kunit_try_run_case+0x170/0x3f0
[   33.511487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.511534]  kthread+0x328/0x630
[   33.511574]  ret_from_fork+0x10/0x20
[   33.511621] 
[   33.511652] The buggy address belongs to the object at fff00000c9c2de00
[   33.511652]  which belongs to the cache kmalloc-64 of size 64
[   33.511803] The buggy address is located 0 bytes to the right of
[   33.511803]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.511872] 
[   33.512128] The buggy address belongs to the physical page:
[   33.512391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.512466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.512942] page_type: f5(slab)
[   33.513067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.513144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.513189] page dumped because: kasan: bad access detected
[   33.513588] 
[   33.513688] Memory state around the buggy address:
[   33.514058]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.514196]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.514281] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.514419]                                      ^
[   33.514477]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.514552]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.514594] ==================================================================
[   33.633371] ==================================================================
[   33.633448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   33.633501] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.633797] 
[   33.633851] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.634031] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.634068] Hardware name: linux,dummy-virt (DT)
[   33.634117] Call trace:
[   33.634143]  show_stack+0x20/0x38 (C)
[   33.634225]  dump_stack_lvl+0x8c/0xd0
[   33.634302]  print_report+0x118/0x5e8
[   33.634360]  kasan_report+0xdc/0x128
[   33.634405]  __asan_report_load8_noabort+0x20/0x30
[   33.634480]  kasan_atomics_helper+0x3db0/0x4858
[   33.634534]  kasan_atomics+0x198/0x2e0
[   33.634600]  kunit_try_run_case+0x170/0x3f0
[   33.634839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.634914]  kthread+0x328/0x630
[   33.634959]  ret_from_fork+0x10/0x20
[   33.635042] 
[   33.635083] Allocated by task 298:
[   33.635116]  kasan_save_stack+0x3c/0x68
[   33.635164]  kasan_save_track+0x20/0x40
[   33.635450]  kasan_save_alloc_info+0x40/0x58
[   33.635510]  __kasan_kmalloc+0xd4/0xd8
[   33.635556]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.635599]  kasan_atomics+0xb8/0x2e0
[   33.635666]  kunit_try_run_case+0x170/0x3f0
[   33.635714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.635760]  kthread+0x328/0x630
[   33.635796]  ret_from_fork+0x10/0x20
[   33.636084] 
[   33.636152] The buggy address belongs to the object at fff00000c9c2de00
[   33.636152]  which belongs to the cache kmalloc-64 of size 64
[   33.636218] The buggy address is located 0 bytes to the right of
[   33.636218]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.636283] 
[   33.636304] The buggy address belongs to the physical page:
[   33.636340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.636395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.636458] page_type: f5(slab)
[   33.636532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.637007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.637051] page dumped because: kasan: bad access detected
[   33.637260] 
[   33.637283] Memory state around the buggy address:
[   33.637499]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.637572]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.637619] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.638219]                                      ^
[   33.638310]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.638366]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.638839] ==================================================================
[   33.565839] ==================================================================
[   33.565930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   33.566165] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.566342] 
[   33.566411] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.566510] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.566631] Hardware name: linux,dummy-virt (DT)
[   33.566687] Call trace:
[   33.566713]  show_stack+0x20/0x38 (C)
[   33.566766]  dump_stack_lvl+0x8c/0xd0
[   33.567023]  print_report+0x118/0x5e8
[   33.567103]  kasan_report+0xdc/0x128
[   33.567257]  kasan_check_range+0x100/0x1a8
[   33.567318]  __kasan_check_write+0x20/0x30
[   33.567612]  kasan_atomics_helper+0x126c/0x4858
[   33.567833]  kasan_atomics+0x198/0x2e0
[   33.568079]  kunit_try_run_case+0x170/0x3f0
[   33.568147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.568201]  kthread+0x328/0x630
[   33.568511]  ret_from_fork+0x10/0x20
[   33.568805] 
[   33.568995] Allocated by task 298:
[   33.569171]  kasan_save_stack+0x3c/0x68
[   33.569223]  kasan_save_track+0x20/0x40
[   33.569615]  kasan_save_alloc_info+0x40/0x58
[   33.569778]  __kasan_kmalloc+0xd4/0xd8
[   33.570123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.570197]  kasan_atomics+0xb8/0x2e0
[   33.570240]  kunit_try_run_case+0x170/0x3f0
[   33.570299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.570345]  kthread+0x328/0x630
[   33.570402]  ret_from_fork+0x10/0x20
[   33.570453] 
[   33.570485] The buggy address belongs to the object at fff00000c9c2de00
[   33.570485]  which belongs to the cache kmalloc-64 of size 64
[   33.570546] The buggy address is located 0 bytes to the right of
[   33.570546]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.570623] 
[   33.570645] The buggy address belongs to the physical page:
[   33.570682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.570746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.570797] page_type: f5(slab)
[   33.570836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.571507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.571571] page dumped because: kasan: bad access detected
[   33.571630] 
[   33.571678] Memory state around the buggy address:
[   33.571778]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.571825]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.571916] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.572320]                                      ^
[   33.572637]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.572891]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.572986] ==================================================================
[   33.693352] ==================================================================
[   33.693402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   33.693454] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.693506] 
[   33.694367] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.694484] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.694516] Hardware name: linux,dummy-virt (DT)
[   33.694547] Call trace:
[   33.695194]  show_stack+0x20/0x38 (C)
[   33.695264]  dump_stack_lvl+0x8c/0xd0
[   33.695314]  print_report+0x118/0x5e8
[   33.695362]  kasan_report+0xdc/0x128
[   33.695802]  __asan_report_load8_noabort+0x20/0x30
[   33.696042]  kasan_atomics_helper+0x3e20/0x4858
[   33.696094]  kasan_atomics+0x198/0x2e0
[   33.696143]  kunit_try_run_case+0x170/0x3f0
[   33.696191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.696246]  kthread+0x328/0x630
[   33.696289]  ret_from_fork+0x10/0x20
[   33.697088] 
[   33.697139] Allocated by task 298:
[   33.697171]  kasan_save_stack+0x3c/0x68
[   33.697226]  kasan_save_track+0x20/0x40
[   33.697628]  kasan_save_alloc_info+0x40/0x58
[   33.697674]  __kasan_kmalloc+0xd4/0xd8
[   33.697711]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.697925]  kasan_atomics+0xb8/0x2e0
[   33.698190]  kunit_try_run_case+0x170/0x3f0
[   33.698239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.698515]  kthread+0x328/0x630
[   33.698750]  ret_from_fork+0x10/0x20
[   33.698877] 
[   33.698950] The buggy address belongs to the object at fff00000c9c2de00
[   33.698950]  which belongs to the cache kmalloc-64 of size 64
[   33.699041] The buggy address is located 0 bytes to the right of
[   33.699041]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.699107] 
[   33.699428] The buggy address belongs to the physical page:
[   33.699554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.700199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.700557] page_type: f5(slab)
[   33.700783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.701009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.701058] page dumped because: kasan: bad access detected
[   33.701092] 
[   33.701119] Memory state around the buggy address:
[   33.701153]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.701200]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.701673] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.701807]                                      ^
[   33.702298]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.702814]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.703156] ==================================================================
[   33.389693] ==================================================================
[   33.389750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.389806] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.389858] 
[   33.389983] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.391021] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.391172] Hardware name: linux,dummy-virt (DT)
[   33.391208] Call trace:
[   33.391646]  show_stack+0x20/0x38 (C)
[   33.391703]  dump_stack_lvl+0x8c/0xd0
[   33.391753]  print_report+0x118/0x5e8
[   33.391800]  kasan_report+0xdc/0x128
[   33.392092]  kasan_check_range+0x100/0x1a8
[   33.392142]  __kasan_check_write+0x20/0x30
[   33.392192]  kasan_atomics_helper+0xa6c/0x4858
[   33.392805]  kasan_atomics+0x198/0x2e0
[   33.393090]  kunit_try_run_case+0x170/0x3f0
[   33.393440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.393538]  kthread+0x328/0x630
[   33.393585]  ret_from_fork+0x10/0x20
[   33.394153] 
[   33.394191] Allocated by task 298:
[   33.394226]  kasan_save_stack+0x3c/0x68
[   33.394274]  kasan_save_track+0x20/0x40
[   33.394312]  kasan_save_alloc_info+0x40/0x58
[   33.394358]  __kasan_kmalloc+0xd4/0xd8
[   33.395146]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.395214]  kasan_atomics+0xb8/0x2e0
[   33.395258]  kunit_try_run_case+0x170/0x3f0
[   33.395297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.395343]  kthread+0x328/0x630
[   33.395376]  ret_from_fork+0x10/0x20
[   33.395415] 
[   33.395437] The buggy address belongs to the object at fff00000c9c2de00
[   33.395437]  which belongs to the cache kmalloc-64 of size 64
[   33.396691] The buggy address is located 0 bytes to the right of
[   33.396691]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.396801] 
[   33.396826] The buggy address belongs to the physical page:
[   33.396863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.396977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.397053] page_type: f5(slab)
[   33.397112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.397189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.397231] page dumped because: kasan: bad access detected
[   33.397265] 
[   33.397329] Memory state around the buggy address:
[   33.397420]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.397936]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.398270] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.398661]                                      ^
[   33.398731]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.399218]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.399322] ==================================================================
[   33.478559] ==================================================================
[   33.478626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.478706] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.478758] 
[   33.478808] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.478913] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.478951] Hardware name: linux,dummy-virt (DT)
[   33.479001] Call trace:
[   33.479041]  show_stack+0x20/0x38 (C)
[   33.479091]  dump_stack_lvl+0x8c/0xd0
[   33.479157]  print_report+0x118/0x5e8
[   33.479201]  kasan_report+0xdc/0x128
[   33.479246]  kasan_check_range+0x100/0x1a8
[   33.479309]  __kasan_check_read+0x20/0x30
[   33.479374]  kasan_atomics_helper+0xdd4/0x4858
[   33.479428]  kasan_atomics+0x198/0x2e0
[   33.479481]  kunit_try_run_case+0x170/0x3f0
[   33.479537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.479591]  kthread+0x328/0x630
[   33.479634]  ret_from_fork+0x10/0x20
[   33.479682] 
[   33.479702] Allocated by task 298:
[   33.479732]  kasan_save_stack+0x3c/0x68
[   33.479771]  kasan_save_track+0x20/0x40
[   33.479809]  kasan_save_alloc_info+0x40/0x58
[   33.479849]  __kasan_kmalloc+0xd4/0xd8
[   33.479885]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.479937]  kasan_atomics+0xb8/0x2e0
[   33.480229]  kunit_try_run_case+0x170/0x3f0
[   33.480335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.480392]  kthread+0x328/0x630
[   33.480430]  ret_from_fork+0x10/0x20
[   33.480468] 
[   33.480498] The buggy address belongs to the object at fff00000c9c2de00
[   33.480498]  which belongs to the cache kmalloc-64 of size 64
[   33.480576] The buggy address is located 0 bytes to the right of
[   33.480576]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.480653] 
[   33.480865] The buggy address belongs to the physical page:
[   33.480941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.481046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.481134] page_type: f5(slab)
[   33.481193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.481245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.481486] page dumped because: kasan: bad access detected
[   33.481524] 
[   33.481544] Memory state around the buggy address:
[   33.481578]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.481681]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.481750] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.481801]                                      ^
[   33.481891]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.481964]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.482042] ==================================================================
[   33.531766] ==================================================================
[   33.532135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.532208] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.532268] 
[   33.532303] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.532394] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.532632] Hardware name: linux,dummy-virt (DT)
[   33.532727] Call trace:
[   33.532800]  show_stack+0x20/0x38 (C)
[   33.532989]  dump_stack_lvl+0x8c/0xd0
[   33.533249]  print_report+0x118/0x5e8
[   33.533655]  kasan_report+0xdc/0x128
[   33.533742]  kasan_check_range+0x100/0x1a8
[   33.533885]  __kasan_check_write+0x20/0x30
[   33.533988]  kasan_atomics_helper+0x10c0/0x4858
[   33.534222]  kasan_atomics+0x198/0x2e0
[   33.534666]  kunit_try_run_case+0x170/0x3f0
[   33.535024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.535219]  kthread+0x328/0x630
[   33.535455]  ret_from_fork+0x10/0x20
[   33.535827] 
[   33.535976] Allocated by task 298:
[   33.536231]  kasan_save_stack+0x3c/0x68
[   33.536462]  kasan_save_track+0x20/0x40
[   33.536982]  kasan_save_alloc_info+0x40/0x58
[   33.537196]  __kasan_kmalloc+0xd4/0xd8
[   33.537261]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.537375]  kasan_atomics+0xb8/0x2e0
[   33.537418]  kunit_try_run_case+0x170/0x3f0
[   33.537459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.537529]  kthread+0x328/0x630
[   33.537568]  ret_from_fork+0x10/0x20
[   33.537747] 
[   33.537935] The buggy address belongs to the object at fff00000c9c2de00
[   33.537935]  which belongs to the cache kmalloc-64 of size 64
[   33.538163] The buggy address is located 0 bytes to the right of
[   33.538163]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.538523] 
[   33.538709] The buggy address belongs to the physical page:
[   33.539330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.539568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.539675] page_type: f5(slab)
[   33.539743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.539883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.540172] page dumped because: kasan: bad access detected
[   33.540369] 
[   33.540465] Memory state around the buggy address:
[   33.540662]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.540714]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.540758] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.540797]                                      ^
[   33.540835]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.541270]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.541329] ==================================================================
[   33.487153] ==================================================================
[   33.487202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.487252] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.487314] 
[   33.487344] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.487437] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.487479] Hardware name: linux,dummy-virt (DT)
[   33.487514] Call trace:
[   33.487539]  show_stack+0x20/0x38 (C)
[   33.487586]  dump_stack_lvl+0x8c/0xd0
[   33.487643]  print_report+0x118/0x5e8
[   33.487689]  kasan_report+0xdc/0x128
[   33.487742]  kasan_check_range+0x100/0x1a8
[   33.487788]  __kasan_check_write+0x20/0x30
[   33.487845]  kasan_atomics_helper+0xe44/0x4858
[   33.488414]  kasan_atomics+0x198/0x2e0
[   33.488485]  kunit_try_run_case+0x170/0x3f0
[   33.488537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.488591]  kthread+0x328/0x630
[   33.488768]  ret_from_fork+0x10/0x20
[   33.488892] 
[   33.488982] Allocated by task 298:
[   33.489059]  kasan_save_stack+0x3c/0x68
[   33.489155]  kasan_save_track+0x20/0x40
[   33.489242]  kasan_save_alloc_info+0x40/0x58
[   33.489570]  __kasan_kmalloc+0xd4/0xd8
[   33.489660]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.489715]  kasan_atomics+0xb8/0x2e0
[   33.489785]  kunit_try_run_case+0x170/0x3f0
[   33.489869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.489927]  kthread+0x328/0x630
[   33.489963]  ret_from_fork+0x10/0x20
[   33.490124] 
[   33.490150] The buggy address belongs to the object at fff00000c9c2de00
[   33.490150]  which belongs to the cache kmalloc-64 of size 64
[   33.490213] The buggy address is located 0 bytes to the right of
[   33.490213]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.490322] 
[   33.490398] The buggy address belongs to the physical page:
[   33.490494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.490594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.490719] page_type: f5(slab)
[   33.490925] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.491054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.491223] page dumped because: kasan: bad access detected
[   33.491294] 
[   33.491353] Memory state around the buggy address:
[   33.491431]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.491497]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.491583] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.491635]                                      ^
[   33.491714]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.491759]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.491797] ==================================================================
[   33.651509] ==================================================================
[   33.651705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   33.652450] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.652507] 
[   33.652540] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.652631] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.652782] Hardware name: linux,dummy-virt (DT)
[   33.652820] Call trace:
[   33.652845]  show_stack+0x20/0x38 (C)
[   33.653471]  dump_stack_lvl+0x8c/0xd0
[   33.653758]  print_report+0x118/0x5e8
[   33.653934]  kasan_report+0xdc/0x128
[   33.654041]  __asan_report_load8_noabort+0x20/0x30
[   33.654165]  kasan_atomics_helper+0x3df4/0x4858
[   33.654217]  kasan_atomics+0x198/0x2e0
[   33.654265]  kunit_try_run_case+0x170/0x3f0
[   33.654314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.655701]  kthread+0x328/0x630
[   33.655840]  ret_from_fork+0x10/0x20
[   33.656607] 
[   33.656684] Allocated by task 298:
[   33.656764]  kasan_save_stack+0x3c/0x68
[   33.657004]  kasan_save_track+0x20/0x40
[   33.657158]  kasan_save_alloc_info+0x40/0x58
[   33.657489]  __kasan_kmalloc+0xd4/0xd8
[   33.657711]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.657832]  kasan_atomics+0xb8/0x2e0
[   33.658237]  kunit_try_run_case+0x170/0x3f0
[   33.658578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.658634]  kthread+0x328/0x630
[   33.658672]  ret_from_fork+0x10/0x20
[   33.659621] 
[   33.659798] The buggy address belongs to the object at fff00000c9c2de00
[   33.659798]  which belongs to the cache kmalloc-64 of size 64
[   33.660226] The buggy address is located 0 bytes to the right of
[   33.660226]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.660657] 
[   33.660686] The buggy address belongs to the physical page:
[   33.660967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.661411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.661588] page_type: f5(slab)
[   33.661631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.661826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.661882] page dumped because: kasan: bad access detected
[   33.661923] 
[   33.661945] Memory state around the buggy address:
[   33.662371]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.662668]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.662725] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.662767]                                      ^
[   33.663118]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.663261]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.663584] ==================================================================
[   33.704136] ==================================================================
[   33.704192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   33.704245] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.704297] 
[   33.704787] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.705128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.705429] Hardware name: linux,dummy-virt (DT)
[   33.705464] Call trace:
[   33.705502]  show_stack+0x20/0x38 (C)
[   33.705782]  dump_stack_lvl+0x8c/0xd0
[   33.705921]  print_report+0x118/0x5e8
[   33.705967]  kasan_report+0xdc/0x128
[   33.706013]  kasan_check_range+0x100/0x1a8
[   33.706060]  __kasan_check_write+0x20/0x30
[   33.706107]  kasan_atomics_helper+0x17ec/0x4858
[   33.706159]  kasan_atomics+0x198/0x2e0
[   33.706206]  kunit_try_run_case+0x170/0x3f0
[   33.706255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.707222]  kthread+0x328/0x630
[   33.707714]  ret_from_fork+0x10/0x20
[   33.707965] 
[   33.707991] Allocated by task 298:
[   33.708133]  kasan_save_stack+0x3c/0x68
[   33.708194]  kasan_save_track+0x20/0x40
[   33.708366]  kasan_save_alloc_info+0x40/0x58
[   33.708432]  __kasan_kmalloc+0xd4/0xd8
[   33.708619]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.709016]  kasan_atomics+0xb8/0x2e0
[   33.709134]  kunit_try_run_case+0x170/0x3f0
[   33.709237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.709393]  kthread+0x328/0x630
[   33.709573]  ret_from_fork+0x10/0x20
[   33.709665] 
[   33.709689] The buggy address belongs to the object at fff00000c9c2de00
[   33.709689]  which belongs to the cache kmalloc-64 of size 64
[   33.709954] The buggy address is located 0 bytes to the right of
[   33.709954]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.710281] 
[   33.710306] The buggy address belongs to the physical page:
[   33.710343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.710923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.711281] page_type: f5(slab)
[   33.711462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.711517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.711561] page dumped because: kasan: bad access detected
[   33.711595] 
[   33.711615] Memory state around the buggy address:
[   33.711649]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.711696]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.712219] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.712691]                                      ^
[   33.712735]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.712820]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.712863] ==================================================================
[   33.361707] ==================================================================
[   33.361764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.361818] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.361869] 
[   33.361917] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.363542] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.363591] Hardware name: linux,dummy-virt (DT)
[   33.363639] Call trace:
[   33.363663]  show_stack+0x20/0x38 (C)
[   33.363765]  dump_stack_lvl+0x8c/0xd0
[   33.363860]  print_report+0x118/0x5e8
[   33.363916]  kasan_report+0xdc/0x128
[   33.363961]  kasan_check_range+0x100/0x1a8
[   33.364382]  __kasan_check_write+0x20/0x30
[   33.364785]  kasan_atomics_helper+0x99c/0x4858
[   33.364917]  kasan_atomics+0x198/0x2e0
[   33.365309]  kunit_try_run_case+0x170/0x3f0
[   33.365613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.365925]  kthread+0x328/0x630
[   33.366236]  ret_from_fork+0x10/0x20
[   33.366651] 
[   33.366679] Allocated by task 298:
[   33.367110]  kasan_save_stack+0x3c/0x68
[   33.367211]  kasan_save_track+0x20/0x40
[   33.367593]  kasan_save_alloc_info+0x40/0x58
[   33.367646]  __kasan_kmalloc+0xd4/0xd8
[   33.368075]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.368286]  kasan_atomics+0xb8/0x2e0
[   33.368613]  kunit_try_run_case+0x170/0x3f0
[   33.368670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.368715]  kthread+0x328/0x630
[   33.368750]  ret_from_fork+0x10/0x20
[   33.368788] 
[   33.369231] The buggy address belongs to the object at fff00000c9c2de00
[   33.369231]  which belongs to the cache kmalloc-64 of size 64
[   33.369646] The buggy address is located 0 bytes to the right of
[   33.369646]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.369931] 
[   33.370250] The buggy address belongs to the physical page:
[   33.370388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.370824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.370984] page_type: f5(slab)
[   33.371332] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.371441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.371801] page dumped because: kasan: bad access detected
[   33.372048] 
[   33.372255] Memory state around the buggy address:
[   33.372509]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.372721]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.372821] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.372866]                                      ^
[   33.373199]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.373503]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.373626] ==================================================================
[   33.515659] ==================================================================
[   33.515978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.516043] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.516153] 
[   33.516378] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.516481] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.516514] Hardware name: linux,dummy-virt (DT)
[   33.516547] Call trace:
[   33.516571]  show_stack+0x20/0x38 (C)
[   33.517385]  dump_stack_lvl+0x8c/0xd0
[   33.517449]  print_report+0x118/0x5e8
[   33.517496]  kasan_report+0xdc/0x128
[   33.517962]  kasan_check_range+0x100/0x1a8
[   33.518123]  __kasan_check_write+0x20/0x30
[   33.518272]  kasan_atomics_helper+0xff0/0x4858
[   33.518330]  kasan_atomics+0x198/0x2e0
[   33.518410]  kunit_try_run_case+0x170/0x3f0
[   33.518461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.518530]  kthread+0x328/0x630
[   33.518572]  ret_from_fork+0x10/0x20
[   33.518630] 
[   33.518658] Allocated by task 298:
[   33.518692]  kasan_save_stack+0x3c/0x68
[   33.518735]  kasan_save_track+0x20/0x40
[   33.518772]  kasan_save_alloc_info+0x40/0x58
[   33.518820]  __kasan_kmalloc+0xd4/0xd8
[   33.518866]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.518920]  kasan_atomics+0xb8/0x2e0
[   33.519003]  kunit_try_run_case+0x170/0x3f0
[   33.519829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.519940]  kthread+0x328/0x630
[   33.520019]  ret_from_fork+0x10/0x20
[   33.520098] 
[   33.520339] The buggy address belongs to the object at fff00000c9c2de00
[   33.520339]  which belongs to the cache kmalloc-64 of size 64
[   33.520455] The buggy address is located 0 bytes to the right of
[   33.520455]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.520531] 
[   33.520595] The buggy address belongs to the physical page:
[   33.520632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.520687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.520738] page_type: f5(slab)
[   33.521329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.521570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.521692] page dumped because: kasan: bad access detected
[   33.521776] 
[   33.521859] Memory state around the buggy address:
[   33.521998]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.522049]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.522111] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.522332]                                      ^
[   33.522730]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.522972]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.523087] ==================================================================
[   33.503702] ==================================================================
[   33.503974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.504058] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.504109] 
[   33.504181] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.504293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.504338] Hardware name: linux,dummy-virt (DT)
[   33.504373] Call trace:
[   33.504416]  show_stack+0x20/0x38 (C)
[   33.504472]  dump_stack_lvl+0x8c/0xd0
[   33.504563]  print_report+0x118/0x5e8
[   33.504661]  kasan_report+0xdc/0x128
[   33.504718]  kasan_check_range+0x100/0x1a8
[   33.504765]  __kasan_check_write+0x20/0x30
[   33.504813]  kasan_atomics_helper+0xf20/0x4858
[   33.504910]  kasan_atomics+0x198/0x2e0
[   33.504957]  kunit_try_run_case+0x170/0x3f0
[   33.505004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.505197]  kthread+0x328/0x630
[   33.505311]  ret_from_fork+0x10/0x20
[   33.505380] 
[   33.505403] Allocated by task 298:
[   33.505442]  kasan_save_stack+0x3c/0x68
[   33.505507]  kasan_save_track+0x20/0x40
[   33.505555]  kasan_save_alloc_info+0x40/0x58
[   33.505605]  __kasan_kmalloc+0xd4/0xd8
[   33.505641]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.505685]  kasan_atomics+0xb8/0x2e0
[   33.505737]  kunit_try_run_case+0x170/0x3f0
[   33.505778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.505835]  kthread+0x328/0x630
[   33.505872]  ret_from_fork+0x10/0x20
[   33.505919] 
[   33.505939] The buggy address belongs to the object at fff00000c9c2de00
[   33.505939]  which belongs to the cache kmalloc-64 of size 64
[   33.505997] The buggy address is located 0 bytes to the right of
[   33.505997]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.506063] 
[   33.506087] The buggy address belongs to the physical page:
[   33.506122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.506390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.506478] page_type: f5(slab)
[   33.506519] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.506586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.506702] page dumped because: kasan: bad access detected
[   33.506782] 
[   33.506830] Memory state around the buggy address:
[   33.506863]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.506918]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.507007] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.507050]                                      ^
[   33.507241]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.507327]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.507460] ==================================================================
[   33.542164] ==================================================================
[   33.542218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.542271] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.542751] 
[   33.542803] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.543065] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.543145] Hardware name: linux,dummy-virt (DT)
[   33.543193] Call trace:
[   33.543353]  show_stack+0x20/0x38 (C)
[   33.543417]  dump_stack_lvl+0x8c/0xd0
[   33.543468]  print_report+0x118/0x5e8
[   33.543827]  kasan_report+0xdc/0x128
[   33.543911]  kasan_check_range+0x100/0x1a8
[   33.543964]  __kasan_check_write+0x20/0x30
[   33.544239]  kasan_atomics_helper+0x1128/0x4858
[   33.544354]  kasan_atomics+0x198/0x2e0
[   33.544408]  kunit_try_run_case+0x170/0x3f0
[   33.545002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.545122]  kthread+0x328/0x630
[   33.545179]  ret_from_fork+0x10/0x20
[   33.545229] 
[   33.545250] Allocated by task 298:
[   33.545526]  kasan_save_stack+0x3c/0x68
[   33.545612]  kasan_save_track+0x20/0x40
[   33.545677]  kasan_save_alloc_info+0x40/0x58
[   33.545894]  __kasan_kmalloc+0xd4/0xd8
[   33.545962]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.546006]  kasan_atomics+0xb8/0x2e0
[   33.546488]  kunit_try_run_case+0x170/0x3f0
[   33.546877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.547184]  kthread+0x328/0x630
[   33.547397]  ret_from_fork+0x10/0x20
[   33.547650] 
[   33.547700] The buggy address belongs to the object at fff00000c9c2de00
[   33.547700]  which belongs to the cache kmalloc-64 of size 64
[   33.548021] The buggy address is located 0 bytes to the right of
[   33.548021]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.548232] 
[   33.548452] The buggy address belongs to the physical page:
[   33.548546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.548634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.548731] page_type: f5(slab)
[   33.548785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.548860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.548939] page dumped because: kasan: bad access detected
[   33.549234] 
[   33.549461] Memory state around the buggy address:
[   33.549779]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.549847]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.549984] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.550076]                                      ^
[   33.550459]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.550537]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.550637] ==================================================================
[   33.375221] ==================================================================
[   33.376159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   33.376250] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.376704] 
[   33.377033] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.377956] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.378243] Hardware name: linux,dummy-virt (DT)
[   33.378399] Call trace:
[   33.378564]  show_stack+0x20/0x38 (C)
[   33.378626]  dump_stack_lvl+0x8c/0xd0
[   33.378857]  print_report+0x118/0x5e8
[   33.379251]  kasan_report+0xdc/0x128
[   33.379365]  kasan_check_range+0x100/0x1a8
[   33.379971]  __kasan_check_write+0x20/0x30
[   33.380036]  kasan_atomics_helper+0xa04/0x4858
[   33.380098]  kasan_atomics+0x198/0x2e0
[   33.380144]  kunit_try_run_case+0x170/0x3f0
[   33.380610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.380675]  kthread+0x328/0x630
[   33.380719]  ret_from_fork+0x10/0x20
[   33.381162] 
[   33.381201] Allocated by task 298:
[   33.381236]  kasan_save_stack+0x3c/0x68
[   33.381504]  kasan_save_track+0x20/0x40
[   33.381545]  kasan_save_alloc_info+0x40/0x58
[   33.381917]  __kasan_kmalloc+0xd4/0xd8
[   33.382173]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.382220]  kasan_atomics+0xb8/0x2e0
[   33.382597]  kunit_try_run_case+0x170/0x3f0
[   33.382649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.382696]  kthread+0x328/0x630
[   33.382733]  ret_from_fork+0x10/0x20
[   33.382770] 
[   33.383352] The buggy address belongs to the object at fff00000c9c2de00
[   33.383352]  which belongs to the cache kmalloc-64 of size 64
[   33.383694] The buggy address is located 0 bytes to the right of
[   33.383694]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.384174] 
[   33.385142] The buggy address belongs to the physical page:
[   33.385422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.385558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.385702] page_type: f5(slab)
[   33.385754] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.386066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.386257] page dumped because: kasan: bad access detected
[   33.386330] 
[   33.386374] Memory state around the buggy address:
[   33.386658]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.386796]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.386842] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.387163]                                      ^
[   33.387516]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.387568]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.387884] ==================================================================
[   33.338358] ==================================================================
[   33.338409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   33.338465] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.338517] 
[   33.338550] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.338640] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.338673] Hardware name: linux,dummy-virt (DT)
[   33.338704] Call trace:
[   33.338727]  show_stack+0x20/0x38 (C)
[   33.338775]  dump_stack_lvl+0x8c/0xd0
[   33.338825]  print_report+0x118/0x5e8
[   33.338870]  kasan_report+0xdc/0x128
[   33.339325]  __asan_report_load4_noabort+0x20/0x30
[   33.339400]  kasan_atomics_helper+0x42d8/0x4858
[   33.339540]  kasan_atomics+0x198/0x2e0
[   33.340014]  kunit_try_run_case+0x170/0x3f0
[   33.340509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.340585]  kthread+0x328/0x630
[   33.340944]  ret_from_fork+0x10/0x20
[   33.340998] 
[   33.341019] Allocated by task 298:
[   33.341051]  kasan_save_stack+0x3c/0x68
[   33.341651]  kasan_save_track+0x20/0x40
[   33.341711]  kasan_save_alloc_info+0x40/0x58
[   33.341755]  __kasan_kmalloc+0xd4/0xd8
[   33.342380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.342793]  kasan_atomics+0xb8/0x2e0
[   33.343037]  kunit_try_run_case+0x170/0x3f0
[   33.343082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.343129]  kthread+0x328/0x630
[   33.343165]  ret_from_fork+0x10/0x20
[   33.343204] 
[   33.343226] The buggy address belongs to the object at fff00000c9c2de00
[   33.343226]  which belongs to the cache kmalloc-64 of size 64
[   33.343288] The buggy address is located 0 bytes to the right of
[   33.343288]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.343355] 
[   33.344463] The buggy address belongs to the physical page:
[   33.344506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.344843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.344895] page_type: f5(slab)
[   33.344946] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.345000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.345043] page dumped because: kasan: bad access detected
[   33.345074] 
[   33.345624] Memory state around the buggy address:
[   33.345667]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.345717]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.346036] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.346080]                                      ^
[   33.346119]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.346701]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.346751] ==================================================================
[   33.600776] ==================================================================
[   33.601053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   33.601125] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.602057] 
[   33.602144] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.602303] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.602388] Hardware name: linux,dummy-virt (DT)
[   33.602424] Call trace:
[   33.602449]  show_stack+0x20/0x38 (C)
[   33.602693]  dump_stack_lvl+0x8c/0xd0
[   33.602811]  print_report+0x118/0x5e8
[   33.603190]  kasan_report+0xdc/0x128
[   33.603373]  kasan_check_range+0x100/0x1a8
[   33.603589]  __kasan_check_write+0x20/0x30
[   33.604005]  kasan_atomics_helper+0x1414/0x4858
[   33.604561]  kasan_atomics+0x198/0x2e0
[   33.604766]  kunit_try_run_case+0x170/0x3f0
[   33.604876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.604945]  kthread+0x328/0x630
[   33.605126]  ret_from_fork+0x10/0x20
[   33.605344] 
[   33.605537] Allocated by task 298:
[   33.605628]  kasan_save_stack+0x3c/0x68
[   33.605915]  kasan_save_track+0x20/0x40
[   33.606074]  kasan_save_alloc_info+0x40/0x58
[   33.606410]  __kasan_kmalloc+0xd4/0xd8
[   33.606643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.606838]  kasan_atomics+0xb8/0x2e0
[   33.607224]  kunit_try_run_case+0x170/0x3f0
[   33.607333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.607382]  kthread+0x328/0x630
[   33.607548]  ret_from_fork+0x10/0x20
[   33.608023] 
[   33.608076] The buggy address belongs to the object at fff00000c9c2de00
[   33.608076]  which belongs to the cache kmalloc-64 of size 64
[   33.608421] The buggy address is located 0 bytes to the right of
[   33.608421]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.608540] 
[   33.608609] The buggy address belongs to the physical page:
[   33.608867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.608950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.609060] page_type: f5(slab)
[   33.609469] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.609572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.610101] page dumped because: kasan: bad access detected
[   33.610187] 
[   33.610365] Memory state around the buggy address:
[   33.610490]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.610729]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.611107] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.611321]                                      ^
[   33.611435]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.611530]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.611667] ==================================================================
[   33.090069] ==================================================================
[   33.090127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   33.091032] Call trace:
[   33.091849]  __kasan_check_read+0x20/0x30
[   33.093200]  kthread+0x328/0x630
[   33.093736] 
[   33.094631]  kasan_save_alloc_info+0x40/0x58
[   33.095325]  kunit_try_run_case+0x170/0x3f0
[   33.096337] 
[   33.096876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.098128]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.099982] ==================================================================
[   33.412262] ==================================================================
[   33.412314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.412366] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.412418] 
[   33.412449] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.413936] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.413990] Hardware name: linux,dummy-virt (DT)
[   33.414026] Call trace:
[   33.414638]  show_stack+0x20/0x38 (C)
[   33.414865]  dump_stack_lvl+0x8c/0xd0
[   33.415218]  print_report+0x118/0x5e8
[   33.415563]  kasan_report+0xdc/0x128
[   33.416056]  __asan_report_load4_noabort+0x20/0x30
[   33.416439]  kasan_atomics_helper+0x3dcc/0x4858
[   33.416498]  kasan_atomics+0x198/0x2e0
[   33.416885]  kunit_try_run_case+0x170/0x3f0
[   33.417252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.417357]  kthread+0x328/0x630
[   33.418861]  __kasan_kmalloc+0xd4/0xd8
[   33.420660]  ret_from_fork+0x10/0x20
[   33.421243] 
[   33.422042] page_type: f5(slab)
[   33.423659]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.424985]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.427161] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.427302]  dump_stack_lvl+0x8c/0xd0
[   33.429061]  kasan_atomics_helper+0xb70/0x4858
[   33.429367]  kthread+0x328/0x630
[   33.431029]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.432719] 
[   33.433135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.434449]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.434925] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.438817] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.439130] Hardware name: linux,dummy-virt (DT)
[   33.439328] Call trace:
[   33.439490]  dump_stack_lvl+0x8c/0xd0
[   33.439681]  kasan_atomics_helper+0x3dbc/0x4858
[   33.439939]  ret_from_fork+0x10/0x20
[   33.442674]  kasan_atomics+0xb8/0x2e0
[   33.444919] The buggy address is located 0 bytes to the right of
[   33.444919]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.447230]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.447695]                                      ^
[   33.451609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   33.452066] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.452396]  __kasan_check_write+0x20/0x30
[   33.455984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.456307]  __kasan_kmalloc+0xd4/0xd8
[   33.456463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.457129] page dumped because: kasan: bad access detected
[   33.457292]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.458058] ==================================================================
[   33.557093] ==================================================================
[   33.557147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   33.557501] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.557707] 
[   33.557753] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.557847] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.557879] Hardware name: linux,dummy-virt (DT)
[   33.557923] Call trace:
[   33.557947]  show_stack+0x20/0x38 (C)
[   33.558166]  dump_stack_lvl+0x8c/0xd0
[   33.558476]  print_report+0x118/0x5e8
[   33.558527]  kasan_report+0xdc/0x128
[   33.558571]  kasan_check_range+0x100/0x1a8
[   33.558618]  __kasan_check_write+0x20/0x30
[   33.559009]  kasan_atomics_helper+0x11f8/0x4858
[   33.559338]  kasan_atomics+0x198/0x2e0
[   33.559469]  kunit_try_run_case+0x170/0x3f0
[   33.559524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.559607]  kthread+0x328/0x630
[   33.560026]  ret_from_fork+0x10/0x20
[   33.560257] 
[   33.560298] Allocated by task 298:
[   33.560332]  kasan_save_stack+0x3c/0x68
[   33.560377]  kasan_save_track+0x20/0x40
[   33.560461]  kasan_save_alloc_info+0x40/0x58
[   33.560508]  __kasan_kmalloc+0xd4/0xd8
[   33.560546]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.560592]  kasan_atomics+0xb8/0x2e0
[   33.560963]  kunit_try_run_case+0x170/0x3f0
[   33.561046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.561284]  kthread+0x328/0x630
[   33.561475]  ret_from_fork+0x10/0x20
[   33.561537] 
[   33.561561] The buggy address belongs to the object at fff00000c9c2de00
[   33.561561]  which belongs to the cache kmalloc-64 of size 64
[   33.561871] The buggy address is located 0 bytes to the right of
[   33.561871]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.562259] 
[   33.562469] The buggy address belongs to the physical page:
[   33.562699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.562789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.563181] page_type: f5(slab)
[   33.563446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.563649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.563745] page dumped because: kasan: bad access detected
[   33.563880] 
[   33.563960] Memory state around the buggy address:
[   33.564187]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.564395]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.564722] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.564794]                                      ^
[   33.564920]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.564987]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.565144] ==================================================================
[   33.616892] ==================================================================
[   33.616962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   33.617016] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.617068] 
[   33.617101] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.617190] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.617222] Hardware name: linux,dummy-virt (DT)
[   33.617255] Call trace:
[   33.617279]  show_stack+0x20/0x38 (C)
[   33.617327]  dump_stack_lvl+0x8c/0xd0
[   33.617375]  print_report+0x118/0x5e8
[   33.617419]  kasan_report+0xdc/0x128
[   33.617463]  kasan_check_range+0x100/0x1a8
[   33.617510]  __kasan_check_write+0x20/0x30
[   33.617557]  kasan_atomics_helper+0x14e4/0x4858
[   33.617607]  kasan_atomics+0x198/0x2e0
[   33.617655]  kunit_try_run_case+0x170/0x3f0
[   33.617702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.617754]  kthread+0x328/0x630
[   33.617797]  ret_from_fork+0x10/0x20
[   33.617845] 
[   33.617867] Allocated by task 298:
[   33.617905]  kasan_save_stack+0x3c/0x68
[   33.617946]  kasan_save_track+0x20/0x40
[   33.617984]  kasan_save_alloc_info+0x40/0x58
[   33.618086]  __kasan_kmalloc+0xd4/0xd8
[   33.618142]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.618186]  kasan_atomics+0xb8/0x2e0
[   33.618277]  kunit_try_run_case+0x170/0x3f0
[   33.618323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.618373]  kthread+0x328/0x630
[   33.618489]  ret_from_fork+0x10/0x20
[   33.618532] 
[   33.618555] The buggy address belongs to the object at fff00000c9c2de00
[   33.618555]  which belongs to the cache kmalloc-64 of size 64
[   33.618613] The buggy address is located 0 bytes to the right of
[   33.618613]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.618677] 
[   33.618700] The buggy address belongs to the physical page:
[   33.618735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.618789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.619157] page_type: f5(slab)
[   33.619224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.619474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.619560] page dumped because: kasan: bad access detected
[   33.619671] 
[   33.619697] Memory state around the buggy address:
[   33.619733]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.619778]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.620067] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.620123]                                      ^
[   33.620217]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.620439]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.620503] ==================================================================
[   33.469381] ==================================================================
[   33.469451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.469506] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.469574] 
[   33.469623] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.469735] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.469785] Hardware name: linux,dummy-virt (DT)
[   33.469834] Call trace:
[   33.469858]  show_stack+0x20/0x38 (C)
[   33.469917]  dump_stack_lvl+0x8c/0xd0
[   33.469963]  print_report+0x118/0x5e8
[   33.470008]  kasan_report+0xdc/0x128
[   33.470052]  kasan_check_range+0x100/0x1a8
[   33.470119]  __kasan_check_write+0x20/0x30
[   33.470168]  kasan_atomics_helper+0xd3c/0x4858
[   33.470218]  kasan_atomics+0x198/0x2e0
[   33.470497]  kunit_try_run_case+0x170/0x3f0
[   33.470604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.470679]  kthread+0x328/0x630
[   33.470723]  ret_from_fork+0x10/0x20
[   33.470782] 
[   33.470821] Allocated by task 298:
[   33.470870]  kasan_save_stack+0x3c/0x68
[   33.470922]  kasan_save_track+0x20/0x40
[   33.470977]  kasan_save_alloc_info+0x40/0x58
[   33.471037]  __kasan_kmalloc+0xd4/0xd8
[   33.471072]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.471115]  kasan_atomics+0xb8/0x2e0
[   33.471184]  kunit_try_run_case+0x170/0x3f0
[   33.471241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.471308]  kthread+0x328/0x630
[   33.471363]  ret_from_fork+0x10/0x20
[   33.471431] 
[   33.471459] The buggy address belongs to the object at fff00000c9c2de00
[   33.471459]  which belongs to the cache kmalloc-64 of size 64
[   33.471519] The buggy address is located 0 bytes to the right of
[   33.471519]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.471585] 
[   33.471625] The buggy address belongs to the physical page:
[   33.471862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.471942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.471993] page_type: f5(slab)
[   33.472030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.472098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.472140] page dumped because: kasan: bad access detected
[   33.472213] 
[   33.472253] Memory state around the buggy address:
[   33.472288]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.472365]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.472409] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.472462]                                      ^
[   33.472498]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.472571]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.472657] ==================================================================
[   33.400626] ==================================================================
[   33.400681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.400734] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.400787] 
[   33.400818] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.402424] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.402769] Hardware name: linux,dummy-virt (DT)
[   33.402810] Call trace:
[   33.403104]  show_stack+0x20/0x38 (C)
[   33.403163]  dump_stack_lvl+0x8c/0xd0
[   33.403216]  print_report+0x118/0x5e8
[   33.403263]  kasan_report+0xdc/0x128
[   33.403309]  kasan_check_range+0x100/0x1a8
[   33.403357]  __kasan_check_write+0x20/0x30
[   33.404089]  kasan_atomics_helper+0xad4/0x4858
[   33.404577]  kasan_atomics+0x198/0x2e0
[   33.404703]  kunit_try_run_case+0x170/0x3f0
[   33.404753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.405202]  kthread+0x328/0x630
[   33.405478]  ret_from_fork+0x10/0x20
[   33.405580] 
[   33.405601] Allocated by task 298:
[   33.406084]  kasan_save_stack+0x3c/0x68
[   33.406135]  kasan_save_track+0x20/0x40
[   33.406182]  kasan_save_alloc_info+0x40/0x58
[   33.406223]  __kasan_kmalloc+0xd4/0xd8
[   33.406259]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.406303]  kasan_atomics+0xb8/0x2e0
[   33.407105]  kunit_try_run_case+0x170/0x3f0
[   33.407388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.407773]  kthread+0x328/0x630
[   33.407985]  ret_from_fork+0x10/0x20
[   33.408110] 
[   33.408133] The buggy address belongs to the object at fff00000c9c2de00
[   33.408133]  which belongs to the cache kmalloc-64 of size 64
[   33.408724] The buggy address is located 0 bytes to the right of
[   33.408724]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.408930] 
[   33.409042] The buggy address belongs to the physical page:
[   33.409081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.409415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.409470] page_type: f5(slab)
[   33.409612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.409828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.409873] page dumped because: kasan: bad access detected
[   33.410545] 
[   33.410936] Memory state around the buggy address:
[   33.411060]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.411330]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.411552] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.411719]                                      ^
[   33.411789]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.411835]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.411877] ==================================================================
[   33.466263] ==================================================================
[   33.466314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.466373] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.466425] 
[   33.466456] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.466545] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.466577] Hardware name: linux,dummy-virt (DT)
[   33.466610] Call trace:
[   33.466633]  show_stack+0x20/0x38 (C)
[   33.466684]  dump_stack_lvl+0x8c/0xd0
[   33.466732]  print_report+0x118/0x5e8
[   33.466778]  kasan_report+0xdc/0x128
[   33.466823]  __asan_report_load4_noabort+0x20/0x30
[   33.466873]  kasan_atomics_helper+0x3dd8/0x4858
[   33.466955]  kasan_atomics+0x198/0x2e0
[   33.467016]  kunit_try_run_case+0x170/0x3f0
[   33.467073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.467129]  kthread+0x328/0x630
[   33.467171]  ret_from_fork+0x10/0x20
[   33.467220] 
[   33.467239] Allocated by task 298:
[   33.467269]  kasan_save_stack+0x3c/0x68
[   33.467315]  kasan_save_track+0x20/0x40
[   33.467365]  kasan_save_alloc_info+0x40/0x58
[   33.467413]  __kasan_kmalloc+0xd4/0xd8
[   33.467449]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.467492]  kasan_atomics+0xb8/0x2e0
[   33.467529]  kunit_try_run_case+0x170/0x3f0
[   33.467567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.467622]  kthread+0x328/0x630
[   33.467658]  ret_from_fork+0x10/0x20
[   33.467693] 
[   33.467713] The buggy address belongs to the object at fff00000c9c2de00
[   33.467713]  which belongs to the cache kmalloc-64 of size 64
[   33.467780] The buggy address is located 0 bytes to the right of
[   33.467780]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.467845] 
[   33.467875] The buggy address belongs to the physical page:
[   33.467920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.467974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.468022] page_type: f5(slab)
[   33.468060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.468111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.468153] page dumped because: kasan: bad access detected
[   33.468185] 
[   33.468204] Memory state around the buggy address:
[   33.468237]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.468282]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.468662] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.468711]                                      ^
[   33.468749]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.468822]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.468888] ==================================================================
[   33.492596] ==================================================================
[   33.492797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.492886] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.493012] 
[   33.493080] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.493213] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.493282] Hardware name: linux,dummy-virt (DT)
[   33.493354] Call trace:
[   33.493419]  show_stack+0x20/0x38 (C)
[   33.493505]  dump_stack_lvl+0x8c/0xd0
[   33.493552]  print_report+0x118/0x5e8
[   33.493842]  kasan_report+0xdc/0x128
[   33.493934]  __asan_report_store8_noabort+0x20/0x30
[   33.494089]  kasan_atomics_helper+0x3e5c/0x4858
[   33.494189]  kasan_atomics+0x198/0x2e0
[   33.494285]  kunit_try_run_case+0x170/0x3f0
[   33.494414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.494720]  kthread+0x328/0x630
[   33.494884]  ret_from_fork+0x10/0x20
[   33.495013] 
[   33.495053] Allocated by task 298:
[   33.495084]  kasan_save_stack+0x3c/0x68
[   33.495136]  kasan_save_track+0x20/0x40
[   33.495353]  kasan_save_alloc_info+0x40/0x58
[   33.495509]  __kasan_kmalloc+0xd4/0xd8
[   33.495619]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.495706]  kasan_atomics+0xb8/0x2e0
[   33.496016]  kunit_try_run_case+0x170/0x3f0
[   33.496111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.496200]  kthread+0x328/0x630
[   33.496269]  ret_from_fork+0x10/0x20
[   33.496307] 
[   33.496330] The buggy address belongs to the object at fff00000c9c2de00
[   33.496330]  which belongs to the cache kmalloc-64 of size 64
[   33.496538] The buggy address is located 0 bytes to the right of
[   33.496538]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.496783] 
[   33.496823] The buggy address belongs to the physical page:
[   33.496905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.497161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.497368] page_type: f5(slab)
[   33.497459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.497591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.497678] page dumped because: kasan: bad access detected
[   33.497722] 
[   33.497768] Memory state around the buggy address:
[   33.497809]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.497873]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.497932] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.497972]                                      ^
[   33.498368]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.498452]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.498493] ==================================================================
[   33.551623] ==================================================================
[   33.551731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   33.551792] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.551933] 
[   33.551990] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.552221] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.552255] Hardware name: linux,dummy-virt (DT)
[   33.552289] Call trace:
[   33.552349]  show_stack+0x20/0x38 (C)
[   33.552404]  dump_stack_lvl+0x8c/0xd0
[   33.552477]  print_report+0x118/0x5e8
[   33.552526]  kasan_report+0xdc/0x128
[   33.552570]  kasan_check_range+0x100/0x1a8
[   33.552617]  __kasan_check_write+0x20/0x30
[   33.552665]  kasan_atomics_helper+0x1190/0x4858
[   33.552719]  kasan_atomics+0x198/0x2e0
[   33.552778]  kunit_try_run_case+0x170/0x3f0
[   33.552828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.552887]  kthread+0x328/0x630
[   33.552950]  ret_from_fork+0x10/0x20
[   33.553000] 
[   33.553021] Allocated by task 298:
[   33.553052]  kasan_save_stack+0x3c/0x68
[   33.553102]  kasan_save_track+0x20/0x40
[   33.553141]  kasan_save_alloc_info+0x40/0x58
[   33.553181]  __kasan_kmalloc+0xd4/0xd8
[   33.553217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.553260]  kasan_atomics+0xb8/0x2e0
[   33.553300]  kunit_try_run_case+0x170/0x3f0
[   33.553339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.553383]  kthread+0x328/0x630
[   33.553419]  ret_from_fork+0x10/0x20
[   33.553457] 
[   33.553478] The buggy address belongs to the object at fff00000c9c2de00
[   33.553478]  which belongs to the cache kmalloc-64 of size 64
[   33.553547] The buggy address is located 0 bytes to the right of
[   33.553547]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.553611] 
[   33.553634] The buggy address belongs to the physical page:
[   33.553686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.553750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.553809] page_type: f5(slab)
[   33.553850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.554434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.554923] page dumped because: kasan: bad access detected
[   33.554998] 
[   33.555060] Memory state around the buggy address:
[   33.555122]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.555210]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.555297] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.555517]                                      ^
[   33.555641]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.556204]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.556311] ==================================================================
[   33.612431] ==================================================================
[   33.612639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   33.612724] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.612849] 
[   33.612952] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.613046] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.613274] Hardware name: linux,dummy-virt (DT)
[   33.613330] Call trace:
[   33.613365]  show_stack+0x20/0x38 (C)
[   33.613417]  dump_stack_lvl+0x8c/0xd0
[   33.613510]  print_report+0x118/0x5e8
[   33.613598]  kasan_report+0xdc/0x128
[   33.613844]  kasan_check_range+0x100/0x1a8
[   33.613938]  __kasan_check_write+0x20/0x30
[   33.613997]  kasan_atomics_helper+0x147c/0x4858
[   33.614049]  kasan_atomics+0x198/0x2e0
[   33.614097]  kunit_try_run_case+0x170/0x3f0
[   33.614145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.614244]  kthread+0x328/0x630
[   33.614303]  ret_from_fork+0x10/0x20
[   33.614364] 
[   33.614406] Allocated by task 298:
[   33.614458]  kasan_save_stack+0x3c/0x68
[   33.614501]  kasan_save_track+0x20/0x40
[   33.614548]  kasan_save_alloc_info+0x40/0x58
[   33.614590]  __kasan_kmalloc+0xd4/0xd8
[   33.614627]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.614670]  kasan_atomics+0xb8/0x2e0
[   33.614710]  kunit_try_run_case+0x170/0x3f0
[   33.614758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.614812]  kthread+0x328/0x630
[   33.614848]  ret_from_fork+0x10/0x20
[   33.614906] 
[   33.614929] The buggy address belongs to the object at fff00000c9c2de00
[   33.614929]  which belongs to the cache kmalloc-64 of size 64
[   33.614997] The buggy address is located 0 bytes to the right of
[   33.614997]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.615062] 
[   33.615097] The buggy address belongs to the physical page:
[   33.615134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.615189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.615239] page_type: f5(slab)
[   33.615277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.615330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.615384] page dumped because: kasan: bad access detected
[   33.615426] 
[   33.615457] Memory state around the buggy address:
[   33.615490]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.615540]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.615590] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.615640]                                      ^
[   33.615676]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.615719]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.615761] ==================================================================
[   33.639803] ==================================================================
[   33.640411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   33.640485] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.641128] 
[   33.641651] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.641857] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.642173] Hardware name: linux,dummy-virt (DT)
[   33.642639] Call trace:
[   33.642854]  show_stack+0x20/0x38 (C)
[   33.642972]  dump_stack_lvl+0x8c/0xd0
[   33.643295]  print_report+0x118/0x5e8
[   33.643355]  kasan_report+0xdc/0x128
[   33.643401]  kasan_check_range+0x100/0x1a8
[   33.643449]  __kasan_check_write+0x20/0x30
[   33.644094]  kasan_atomics_helper+0x1644/0x4858
[   33.644426]  kasan_atomics+0x198/0x2e0
[   33.644490]  kunit_try_run_case+0x170/0x3f0
[   33.644540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.645248]  kthread+0x328/0x630
[   33.645582]  ret_from_fork+0x10/0x20
[   33.645777] 
[   33.645927] Allocated by task 298:
[   33.645963]  kasan_save_stack+0x3c/0x68
[   33.646125]  kasan_save_track+0x20/0x40
[   33.646173]  kasan_save_alloc_info+0x40/0x58
[   33.646214]  __kasan_kmalloc+0xd4/0xd8
[   33.646250]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.646294]  kasan_atomics+0xb8/0x2e0
[   33.646335]  kunit_try_run_case+0x170/0x3f0
[   33.646577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.646780]  kthread+0x328/0x630
[   33.646828]  ret_from_fork+0x10/0x20
[   33.646929] 
[   33.646952] The buggy address belongs to the object at fff00000c9c2de00
[   33.646952]  which belongs to the cache kmalloc-64 of size 64
[   33.647105] The buggy address is located 0 bytes to the right of
[   33.647105]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.647427] 
[   33.647600] The buggy address belongs to the physical page:
[   33.647641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.648040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.648346] page_type: f5(slab)
[   33.648714] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.648806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.648857] page dumped because: kasan: bad access detected
[   33.648890] 
[   33.649093] Memory state around the buggy address:
[   33.649136]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.649196]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.649308] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.649722]                                      ^
[   33.649781]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.649926]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.650240] ==================================================================
[   33.672845] ==================================================================
[   33.672948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   33.673002] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.673081] 
[   33.673112] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.673333] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.673400] Hardware name: linux,dummy-virt (DT)
[   33.673445] Call trace:
[   33.673470]  show_stack+0x20/0x38 (C)
[   33.673565]  dump_stack_lvl+0x8c/0xd0
[   33.673646]  print_report+0x118/0x5e8
[   33.673954]  kasan_report+0xdc/0x128
[   33.674027]  __asan_report_load8_noabort+0x20/0x30
[   33.674080]  kasan_atomics_helper+0x3e10/0x4858
[   33.674170]  kasan_atomics+0x198/0x2e0
[   33.674223]  kunit_try_run_case+0x170/0x3f0
[   33.674272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.674326]  kthread+0x328/0x630
[   33.674378]  ret_from_fork+0x10/0x20
[   33.674428] 
[   33.674448] Allocated by task 298:
[   33.674478]  kasan_save_stack+0x3c/0x68
[   33.674704]  kasan_save_track+0x20/0x40
[   33.674993]  kasan_save_alloc_info+0x40/0x58
[   33.675364]  __kasan_kmalloc+0xd4/0xd8
[   33.675410]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.675455]  kasan_atomics+0xb8/0x2e0
[   33.675494]  kunit_try_run_case+0x170/0x3f0
[   33.675937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.676081]  kthread+0x328/0x630
[   33.676119]  ret_from_fork+0x10/0x20
[   33.676158] 
[   33.676923] The buggy address belongs to the object at fff00000c9c2de00
[   33.676923]  which belongs to the cache kmalloc-64 of size 64
[   33.677055] The buggy address is located 0 bytes to the right of
[   33.677055]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.677360] 
[   33.677387] The buggy address belongs to the physical page:
[   33.677422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.677478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.677528] page_type: f5(slab)
[   33.677766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.678194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.678272] page dumped because: kasan: bad access detected
[   33.678306] 
[   33.678334] Memory state around the buggy address:
[   33.678373]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.678420]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.679178] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.679230]                                      ^
[   33.679682]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.680047]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.680286] ==================================================================
[   33.498978] ==================================================================
[   33.499121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.499216] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.499270] 
[   33.499325] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.499436] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.499469] Hardware name: linux,dummy-virt (DT)
[   33.499549] Call trace:
[   33.499575]  show_stack+0x20/0x38 (C)
[   33.499643]  dump_stack_lvl+0x8c/0xd0
[   33.499716]  print_report+0x118/0x5e8
[   33.499771]  kasan_report+0xdc/0x128
[   33.499819]  kasan_check_range+0x100/0x1a8
[   33.499868]  __kasan_check_write+0x20/0x30
[   33.499928]  kasan_atomics_helper+0xeb8/0x4858
[   33.500218]  kasan_atomics+0x198/0x2e0
[   33.500309]  kunit_try_run_case+0x170/0x3f0
[   33.500363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.500418]  kthread+0x328/0x630
[   33.500490]  ret_from_fork+0x10/0x20
[   33.500540] 
[   33.500563] Allocated by task 298:
[   33.500593]  kasan_save_stack+0x3c/0x68
[   33.500634]  kasan_save_track+0x20/0x40
[   33.500705]  kasan_save_alloc_info+0x40/0x58
[   33.500747]  __kasan_kmalloc+0xd4/0xd8
[   33.500943]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.501066]  kasan_atomics+0xb8/0x2e0
[   33.501154]  kunit_try_run_case+0x170/0x3f0
[   33.501216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.501261]  kthread+0x328/0x630
[   33.501447]  ret_from_fork+0x10/0x20
[   33.501487] 
[   33.501516] The buggy address belongs to the object at fff00000c9c2de00
[   33.501516]  which belongs to the cache kmalloc-64 of size 64
[   33.501720] The buggy address is located 0 bytes to the right of
[   33.501720]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.501833] 
[   33.501935] The buggy address belongs to the physical page:
[   33.501999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.502204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.502257] page_type: f5(slab)
[   33.502295] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.502445] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.502535] page dumped because: kasan: bad access detected
[   33.502568] 
[   33.502599] Memory state around the buggy address:
[   33.502632]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.502677]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.502738] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.502778]                                      ^
[   33.502813]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.502857]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.503067] ==================================================================
[   33.594122] ==================================================================
[   33.594371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   33.594457] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.594512] 
[   33.595067] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.595310] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.595548] Hardware name: linux,dummy-virt (DT)
[   33.595594] Call trace:
[   33.595635]  show_stack+0x20/0x38 (C)
[   33.595719]  dump_stack_lvl+0x8c/0xd0
[   33.595804]  print_report+0x118/0x5e8
[   33.595861]  kasan_report+0xdc/0x128
[   33.595949]  __asan_report_load8_noabort+0x20/0x30
[   33.596027]  kasan_atomics_helper+0x3f04/0x4858
[   33.596129]  kasan_atomics+0x198/0x2e0
[   33.596179]  kunit_try_run_case+0x170/0x3f0
[   33.596233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.596286]  kthread+0x328/0x630
[   33.596330]  ret_from_fork+0x10/0x20
[   33.596534] 
[   33.596933] Allocated by task 298:
[   33.597005]  kasan_save_stack+0x3c/0x68
[   33.597106]  kasan_save_track+0x20/0x40
[   33.597198]  kasan_save_alloc_info+0x40/0x58
[   33.597287]  __kasan_kmalloc+0xd4/0xd8
[   33.597325]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.597394]  kasan_atomics+0xb8/0x2e0
[   33.597729]  kunit_try_run_case+0x170/0x3f0
[   33.597809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.598132]  kthread+0x328/0x630
[   33.598305]  ret_from_fork+0x10/0x20
[   33.598360] 
[   33.598392] The buggy address belongs to the object at fff00000c9c2de00
[   33.598392]  which belongs to the cache kmalloc-64 of size 64
[   33.598454] The buggy address is located 0 bytes to the right of
[   33.598454]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.598532] 
[   33.598569] The buggy address belongs to the physical page:
[   33.598607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.598676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.598745] page_type: f5(slab)
[   33.598785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.598844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.598913] page dumped because: kasan: bad access detected
[   33.598946] 
[   33.598966] Memory state around the buggy address:
[   33.599011]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.599057]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.599101] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.599143]                                      ^
[   33.599204]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.599254]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.599303] ==================================================================
[   33.208017] ==================================================================
[   33.208271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   33.209064] 
[   33.209646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.210142] Call trace:
[   33.211566]  __kasan_check_write+0x20/0x30
[   33.212117]  kasan_atomics_helper+0x5b4/0x4858
[   33.212523]  kasan_atomics+0x198/0x2e0
[   33.212751]  kthread+0x328/0x630
[   33.213562]  ret_from_fork+0x10/0x20
[   33.214188] 
[   33.214269] Allocated by task 298:
[   33.216564] 
[   33.217121] 
[   33.218353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.220650]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.221426] ==================================================================
[   33.583795] ==================================================================
[   33.583867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   33.584230] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.584369] 
[   33.584405] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.584499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.584678] Hardware name: linux,dummy-virt (DT)
[   33.584718] Call trace:
[   33.585110]  show_stack+0x20/0x38 (C)
[   33.585651]  dump_stack_lvl+0x8c/0xd0
[   33.585733]  print_report+0x118/0x5e8
[   33.585951]  kasan_report+0xdc/0x128
[   33.586472]  kasan_check_range+0x100/0x1a8
[   33.586563]  __kasan_check_write+0x20/0x30
[   33.587355]  kasan_atomics_helper+0x1384/0x4858
[   33.587554]  kasan_atomics+0x198/0x2e0
[   33.587638]  kunit_try_run_case+0x170/0x3f0
[   33.588005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.588348]  kthread+0x328/0x630
[   33.588506]  ret_from_fork+0x10/0x20
[   33.588666] 
[   33.588715] Allocated by task 298:
[   33.588767]  kasan_save_stack+0x3c/0x68
[   33.588819]  kasan_save_track+0x20/0x40
[   33.588858]  kasan_save_alloc_info+0x40/0x58
[   33.588908]  __kasan_kmalloc+0xd4/0xd8
[   33.589219]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.589366]  kasan_atomics+0xb8/0x2e0
[   33.589534]  kunit_try_run_case+0x170/0x3f0
[   33.589576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.589623]  kthread+0x328/0x630
[   33.589807]  ret_from_fork+0x10/0x20
[   33.590117] 
[   33.590379] The buggy address belongs to the object at fff00000c9c2de00
[   33.590379]  which belongs to the cache kmalloc-64 of size 64
[   33.590713] The buggy address is located 0 bytes to the right of
[   33.590713]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.590890] 
[   33.590965] The buggy address belongs to the physical page:
[   33.591414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.591574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.591750] page_type: f5(slab)
[   33.591832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.592065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.592163] page dumped because: kasan: bad access detected
[   33.592236] 
[   33.592416] Memory state around the buggy address:
[   33.592617]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.592677]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.592722] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.592807]                                      ^
[   33.592855]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.592918]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.592969] ==================================================================
[   33.574476] ==================================================================
[   33.574669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   33.574872] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.574946] 
[   33.574981] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.575180] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.575217] Hardware name: linux,dummy-virt (DT)
[   33.575251] Call trace:
[   33.575313]  show_stack+0x20/0x38 (C)
[   33.575941]  dump_stack_lvl+0x8c/0xd0
[   33.576016]  print_report+0x118/0x5e8
[   33.576086]  kasan_report+0xdc/0x128
[   33.576134]  kasan_check_range+0x100/0x1a8
[   33.576181]  __kasan_check_write+0x20/0x30
[   33.576518]  kasan_atomics_helper+0x12d8/0x4858
[   33.576960]  kasan_atomics+0x198/0x2e0
[   33.577075]  kunit_try_run_case+0x170/0x3f0
[   33.577126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.577481]  kthread+0x328/0x630
[   33.577650]  ret_from_fork+0x10/0x20
[   33.577925] 
[   33.578004] Allocated by task 298:
[   33.578237]  kasan_save_stack+0x3c/0x68
[   33.578558]  kasan_save_track+0x20/0x40
[   33.578866]  kasan_save_alloc_info+0x40/0x58
[   33.579093]  __kasan_kmalloc+0xd4/0xd8
[   33.579166]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.579322]  kasan_atomics+0xb8/0x2e0
[   33.579508]  kunit_try_run_case+0x170/0x3f0
[   33.579864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.580058]  kthread+0x328/0x630
[   33.580267]  ret_from_fork+0x10/0x20
[   33.580441] 
[   33.580557] The buggy address belongs to the object at fff00000c9c2de00
[   33.580557]  which belongs to the cache kmalloc-64 of size 64
[   33.580919] The buggy address is located 0 bytes to the right of
[   33.580919]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.581008] 
[   33.581031] The buggy address belongs to the physical page:
[   33.581370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.581779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.581887] page_type: f5(slab)
[   33.582012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.582135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.582182] page dumped because: kasan: bad access detected
[   33.582231] 
[   33.582257] Memory state around the buggy address:
[   33.582292]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.582343]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.582396] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.582442]                                      ^
[   33.582485]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.582529]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.582575] ==================================================================
[   33.627119] ==================================================================
[   33.627262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   33.627490] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.627573] 
[   33.627617] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.627708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.627818] Hardware name: linux,dummy-virt (DT)
[   33.627875] Call trace:
[   33.628186]  show_stack+0x20/0x38 (C)
[   33.628256]  dump_stack_lvl+0x8c/0xd0
[   33.628307]  print_report+0x118/0x5e8
[   33.628361]  kasan_report+0xdc/0x128
[   33.628406]  kasan_check_range+0x100/0x1a8
[   33.628625]  __kasan_check_write+0x20/0x30
[   33.628819]  kasan_atomics_helper+0x15b4/0x4858
[   33.628918]  kasan_atomics+0x198/0x2e0
[   33.629201]  kunit_try_run_case+0x170/0x3f0
[   33.629306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.629519]  kthread+0x328/0x630
[   33.629635]  ret_from_fork+0x10/0x20
[   33.629693] 
[   33.629716] Allocated by task 298:
[   33.629807]  kasan_save_stack+0x3c/0x68
[   33.629976]  kasan_save_track+0x20/0x40
[   33.630073]  kasan_save_alloc_info+0x40/0x58
[   33.630297]  __kasan_kmalloc+0xd4/0xd8
[   33.630435]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.630511]  kasan_atomics+0xb8/0x2e0
[   33.630614]  kunit_try_run_case+0x170/0x3f0
[   33.630654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.630851]  kthread+0x328/0x630
[   33.631003]  ret_from_fork+0x10/0x20
[   33.631082] 
[   33.631286] The buggy address belongs to the object at fff00000c9c2de00
[   33.631286]  which belongs to the cache kmalloc-64 of size 64
[   33.631414] The buggy address is located 0 bytes to the right of
[   33.631414]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.631520] 
[   33.631584] The buggy address belongs to the physical page:
[   33.631622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.631711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.631883] page_type: f5(slab)
[   33.632037] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.632212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.632415] page dumped because: kasan: bad access detected
[   33.632482] 
[   33.632569] Memory state around the buggy address:
[   33.632626]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.632706]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.632791] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.632860]                                      ^
[   33.633062]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.633121]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.633161] ==================================================================
[   33.347955] ==================================================================
[   33.348868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   33.348969] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.349319] 
[   33.349354] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.350038] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.350074] Hardware name: linux,dummy-virt (DT)
[   33.350383] Call trace:
[   33.350496]  show_stack+0x20/0x38 (C)
[   33.350686]  dump_stack_lvl+0x8c/0xd0
[   33.350990]  print_report+0x118/0x5e8
[   33.351348]  kasan_report+0xdc/0x128
[   33.351690]  kasan_check_range+0x100/0x1a8
[   33.351812]  __kasan_check_write+0x20/0x30
[   33.352245]  kasan_atomics_helper+0x934/0x4858
[   33.352616]  kasan_atomics+0x198/0x2e0
[   33.352671]  kunit_try_run_case+0x170/0x3f0
[   33.353017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.353148]  kthread+0x328/0x630
[   33.353400]  ret_from_fork+0x10/0x20
[   33.353594] 
[   33.353981] Allocated by task 298:
[   33.354141]  kasan_save_stack+0x3c/0x68
[   33.354263]  kasan_save_track+0x20/0x40
[   33.356500] The buggy address belongs to the object at fff00000c9c2de00
[   33.356500]  which belongs to the cache kmalloc-64 of size 64
[   33.356593] The buggy address is located 0 bytes to the right of
[   33.356593]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.356833] 
[   33.357342] The buggy address belongs to the physical page:
[   33.357564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.357628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.357843] page_type: f5(slab)
[   33.358201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.358270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.358315] page dumped because: kasan: bad access detected
[   33.358352] 
[   33.358873] Memory state around the buggy address:
[   33.359564]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.359808]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.360159] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.360248]                                      ^
[   33.360289]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.360333]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.360777] ==================================================================
[   33.227432] ==================================================================
[   33.227488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   33.230122] Call trace:
[   33.231799]  print_report+0x118/0x5e8
[   33.232477]  kasan_atomics+0x198/0x2e0
[   33.233415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.233471]  kthread+0x328/0x630
[   33.234340]  ret_from_fork+0x10/0x20
[   33.235442]  kasan_save_stack+0x3c/0x68
[   33.236349]  kasan_save_alloc_info+0x40/0x58
[   33.237190]  kasan_atomics+0xb8/0x2e0
[   33.237832]  kthread+0x328/0x630
[   33.237994]  ret_from_fork+0x10/0x20
[   33.238770] The buggy address is located 0 bytes to the right of
[   33.238770]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.241289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.242745]                                      ^
[   33.248041] ==================================================================
[   33.621195] ==================================================================
[   33.621389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   33.621452] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.621505] 
[   33.621537] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.621627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.621750] Hardware name: linux,dummy-virt (DT)
[   33.621817] Call trace:
[   33.621844]  show_stack+0x20/0x38 (C)
[   33.622074]  dump_stack_lvl+0x8c/0xd0
[   33.622259]  print_report+0x118/0x5e8
[   33.622312]  kasan_report+0xdc/0x128
[   33.622362]  kasan_check_range+0x100/0x1a8
[   33.622417]  __kasan_check_write+0x20/0x30
[   33.622533]  kasan_atomics_helper+0x154c/0x4858
[   33.622589]  kasan_atomics+0x198/0x2e0
[   33.622713]  kunit_try_run_case+0x170/0x3f0
[   33.622766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.622889]  kthread+0x328/0x630
[   33.622966]  ret_from_fork+0x10/0x20
[   33.623096] 
[   33.623121] Allocated by task 298:
[   33.623187]  kasan_save_stack+0x3c/0x68
[   33.623233]  kasan_save_track+0x20/0x40
[   33.623270]  kasan_save_alloc_info+0x40/0x58
[   33.623311]  __kasan_kmalloc+0xd4/0xd8
[   33.623655]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.623716]  kasan_atomics+0xb8/0x2e0
[   33.623774]  kunit_try_run_case+0x170/0x3f0
[   33.624062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.624213]  kthread+0x328/0x630
[   33.624283]  ret_from_fork+0x10/0x20
[   33.624323] 
[   33.624346] The buggy address belongs to the object at fff00000c9c2de00
[   33.624346]  which belongs to the cache kmalloc-64 of size 64
[   33.624552] The buggy address is located 0 bytes to the right of
[   33.624552]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.624630] 
[   33.624747] The buggy address belongs to the physical page:
[   33.624803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.625139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.625212] page_type: f5(slab)
[   33.625353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.625490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.625589] page dumped because: kasan: bad access detected
[   33.625677] 
[   33.625893] Memory state around the buggy address:
[   33.625947]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.626107]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.626192] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.626368]                                      ^
[   33.626457]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.626605]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.626646] ==================================================================
[   33.482256] ==================================================================
[   33.482414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.482466] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298
[   33.482555] 
[   33.482593] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   33.482702] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.482740] Hardware name: linux,dummy-virt (DT)
[   33.482788] Call trace:
[   33.482829]  show_stack+0x20/0x38 (C)
[   33.482889]  dump_stack_lvl+0x8c/0xd0
[   33.482967]  print_report+0x118/0x5e8
[   33.483035]  kasan_report+0xdc/0x128
[   33.483079]  __asan_report_load8_noabort+0x20/0x30
[   33.483151]  kasan_atomics_helper+0x3f58/0x4858
[   33.483204]  kasan_atomics+0x198/0x2e0
[   33.483253]  kunit_try_run_case+0x170/0x3f0
[   33.483308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.483607]  kthread+0x328/0x630
[   33.483669]  ret_from_fork+0x10/0x20
[   33.483738] 
[   33.483764] Allocated by task 298:
[   33.483802]  kasan_save_stack+0x3c/0x68
[   33.483920]  kasan_save_track+0x20/0x40
[   33.483981]  kasan_save_alloc_info+0x40/0x58
[   33.484022]  __kasan_kmalloc+0xd4/0xd8
[   33.484148]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.484263]  kasan_atomics+0xb8/0x2e0
[   33.484331]  kunit_try_run_case+0x170/0x3f0
[   33.484386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.484433]  kthread+0x328/0x630
[   33.484466]  ret_from_fork+0x10/0x20
[   33.484620] 
[   33.484852] The buggy address belongs to the object at fff00000c9c2de00
[   33.484852]  which belongs to the cache kmalloc-64 of size 64
[   33.484954] The buggy address is located 0 bytes to the right of
[   33.484954]  allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30)
[   33.485065] 
[   33.485263] The buggy address belongs to the physical page:
[   33.485436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d
[   33.485693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.485836] page_type: f5(slab)
[   33.485923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.486010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.486107] page dumped because: kasan: bad access detected
[   33.486195] 
[   33.486253] Memory state around the buggy address:
[   33.486317]  fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.486386]  fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.486562] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.486739]                                      ^
[   33.486822]  fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.486868]  fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.486917] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   32.899465] ==================================================================
[   32.899519] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   32.899571] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.899895] 
[   32.899941] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.905139]  kthread+0x328/0x630
[   32.909157]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.913593]  kasan_save_track+0x20/0x40
[   32.917157] 
[   32.920333] page dumped because: kasan: bad access detected
[   32.928407] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.931552]  kasan_bitops_generic+0x11c/0x1c8
[   32.932389]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.935181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.937252] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.938956]  kunit_try_run_case+0x170/0x3f0
[   32.940243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.941571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.942885] ==================================================================
[   32.855081] ==================================================================
[   32.855426] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   32.855510] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.855572] 
[   32.855667] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.855790] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.855882] Hardware name: linux,dummy-virt (DT)
[   32.855925] Call trace:
[   32.855979]  show_stack+0x20/0x38 (C)
[   32.856239]  dump_stack_lvl+0x8c/0xd0
[   32.856389]  print_report+0x118/0x5e8
[   32.856456]  kasan_report+0xdc/0x128
[   32.856500]  kasan_check_range+0x100/0x1a8
[   32.856678]  __kasan_check_write+0x20/0x30
[   32.856964]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   32.857049]  kasan_bitops_generic+0x110/0x1c8
[   32.857161]  kunit_try_run_case+0x170/0x3f0
[   32.857260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.857397]  kthread+0x328/0x630
[   32.857460]  ret_from_fork+0x10/0x20
[   32.857551] 
[   32.857573] Allocated by task 294:
[   32.857749]  kasan_save_stack+0x3c/0x68
[   32.857809]  kasan_save_track+0x20/0x40
[   32.857933]  kasan_save_alloc_info+0x40/0x58
[   32.858057]  __kasan_kmalloc+0xd4/0xd8
[   32.858144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.858198]  kasan_bitops_generic+0xa0/0x1c8
[   32.858401]  kunit_try_run_case+0x170/0x3f0
[   32.858454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.858529]  kthread+0x328/0x630
[   32.858643]  ret_from_fork+0x10/0x20
[   32.858685] 
[   32.858709] The buggy address belongs to the object at fff00000c60439a0
[   32.858709]  which belongs to the cache kmalloc-16 of size 16
[   32.858769] The buggy address is located 8 bytes inside of
[   32.858769]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.858867] 
[   32.858889] The buggy address belongs to the physical page:
[   32.858937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.858992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.859052] page_type: f5(slab)
[   32.859099] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.859166] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.859233] page dumped because: kasan: bad access detected
[   32.859266] 
[   32.859294] Memory state around the buggy address:
[   32.859329]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.859373]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.859422] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.859463]                                   ^
[   32.859507]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.859560]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.859605] ==================================================================
[   32.847706] ==================================================================
[   32.847822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   32.847919] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.848022] 
[   32.848056] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.848376] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.848440] Hardware name: linux,dummy-virt (DT)
[   32.848542] Call trace:
[   32.848591]  show_stack+0x20/0x38 (C)
[   32.848663]  dump_stack_lvl+0x8c/0xd0
[   32.848778]  print_report+0x118/0x5e8
[   32.848854]  kasan_report+0xdc/0x128
[   32.849048]  __asan_report_load8_noabort+0x20/0x30
[   32.849110]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   32.849277]  kasan_bitops_generic+0x110/0x1c8
[   32.849381]  kunit_try_run_case+0x170/0x3f0
[   32.849503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.849639]  kthread+0x328/0x630
[   32.849706]  ret_from_fork+0x10/0x20
[   32.850012] 
[   32.850106] Allocated by task 294:
[   32.850164]  kasan_save_stack+0x3c/0x68
[   32.850209]  kasan_save_track+0x20/0x40
[   32.850284]  kasan_save_alloc_info+0x40/0x58
[   32.850550]  __kasan_kmalloc+0xd4/0xd8
[   32.850703]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.850782]  kasan_bitops_generic+0xa0/0x1c8
[   32.850835]  kunit_try_run_case+0x170/0x3f0
[   32.851018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.851113]  kthread+0x328/0x630
[   32.851164]  ret_from_fork+0x10/0x20
[   32.851221] 
[   32.851295] The buggy address belongs to the object at fff00000c60439a0
[   32.851295]  which belongs to the cache kmalloc-16 of size 16
[   32.851372] The buggy address is located 8 bytes inside of
[   32.851372]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.851617] 
[   32.851647] The buggy address belongs to the physical page:
[   32.851700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.851864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.851960] page_type: f5(slab)
[   32.852169] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.852285] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.852373] page dumped because: kasan: bad access detected
[   32.852480] 
[   32.852614] Memory state around the buggy address:
[   32.852683]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.852730]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.852772] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.852978]                                   ^
[   32.853178]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.853245]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.853363] ==================================================================
[   32.871679] ==================================================================
[   32.871818] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   32.871925] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.871980] 
[   32.872029] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.872396] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.872462] Hardware name: linux,dummy-virt (DT)
[   32.872512] Call trace:
[   32.872547]  show_stack+0x20/0x38 (C)
[   32.872600]  dump_stack_lvl+0x8c/0xd0
[   32.872733]  print_report+0x118/0x5e8
[   32.872801]  kasan_report+0xdc/0x128
[   32.872867]  kasan_check_range+0x100/0x1a8
[   32.873001]  __kasan_check_write+0x20/0x30
[   32.873068]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   32.873307]  kasan_bitops_generic+0x110/0x1c8
[   32.873524]  kunit_try_run_case+0x170/0x3f0
[   32.873611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.873722]  kthread+0x328/0x630
[   32.873867]  ret_from_fork+0x10/0x20
[   32.874086] 
[   32.874146] Allocated by task 294:
[   32.874205]  kasan_save_stack+0x3c/0x68
[   32.874255]  kasan_save_track+0x20/0x40
[   32.874299]  kasan_save_alloc_info+0x40/0x58
[   32.874338]  __kasan_kmalloc+0xd4/0xd8
[   32.874382]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.874649]  kasan_bitops_generic+0xa0/0x1c8
[   32.874804]  kunit_try_run_case+0x170/0x3f0
[   32.874884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.875026]  kthread+0x328/0x630
[   32.875099]  ret_from_fork+0x10/0x20
[   32.875237] 
[   32.875298] The buggy address belongs to the object at fff00000c60439a0
[   32.875298]  which belongs to the cache kmalloc-16 of size 16
[   32.875564] The buggy address is located 8 bytes inside of
[   32.875564]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.875747] 
[   32.875810] The buggy address belongs to the physical page:
[   32.875991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.876064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.876296] page_type: f5(slab)
[   32.876358] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.876430] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.876504] page dumped because: kasan: bad access detected
[   32.876606] 
[   32.876665] Memory state around the buggy address:
[   32.876794]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.876922]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.876989] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.877075]                                   ^
[   32.877112]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.877158]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.877199] ==================================================================
[   32.883957] ==================================================================
[   32.884010] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   32.884133] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.884188] 
[   32.884248] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.884387] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.884423] Hardware name: linux,dummy-virt (DT)
[   32.884473] Call trace:
[   32.884499]  show_stack+0x20/0x38 (C)
[   32.884594]  dump_stack_lvl+0x8c/0xd0
[   32.884673]  print_report+0x118/0x5e8
[   32.884781]  kasan_report+0xdc/0x128
[   32.884828]  kasan_check_range+0x100/0x1a8
[   32.884875]  __kasan_check_write+0x20/0x30
[   32.885126]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   32.885285]  kasan_bitops_generic+0x110/0x1c8
[   32.885408]  kunit_try_run_case+0x170/0x3f0
[   32.885506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.885594]  kthread+0x328/0x630
[   32.885729]  ret_from_fork+0x10/0x20
[   32.885971] 
[   32.886041] Allocated by task 294:
[   32.886188]  kasan_save_stack+0x3c/0x68
[   32.886291]  kasan_save_track+0x20/0x40
[   32.886387]  kasan_save_alloc_info+0x40/0x58
[   32.886468]  __kasan_kmalloc+0xd4/0xd8
[   32.886568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.886631]  kasan_bitops_generic+0xa0/0x1c8
[   32.886876]  kunit_try_run_case+0x170/0x3f0
[   32.887049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.887098]  kthread+0x328/0x630
[   32.887133]  ret_from_fork+0x10/0x20
[   32.887347] 
[   32.887469] The buggy address belongs to the object at fff00000c60439a0
[   32.887469]  which belongs to the cache kmalloc-16 of size 16
[   32.887579] The buggy address is located 8 bytes inside of
[   32.887579]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.887734] 
[   32.887758] The buggy address belongs to the physical page:
[   32.887812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.888079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.888202] page_type: f5(slab)
[   32.888301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.888389] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.888432] page dumped because: kasan: bad access detected
[   32.888570] 
[   32.888594] Memory state around the buggy address:
[   32.888631]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.888736]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.888804] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.888895]                                   ^
[   32.888985]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.889057]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.889098] ==================================================================
[   32.841187] ==================================================================
[   32.841254] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   32.841383] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.841556] 
[   32.841613] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.841752] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.841884] Hardware name: linux,dummy-virt (DT)
[   32.841961] Call trace:
[   32.842076]  show_stack+0x20/0x38 (C)
[   32.842184]  dump_stack_lvl+0x8c/0xd0
[   32.842255]  print_report+0x118/0x5e8
[   32.842521]  kasan_report+0xdc/0x128
[   32.842574]  kasan_check_range+0x100/0x1a8
[   32.842721]  __kasan_check_write+0x20/0x30
[   32.842807]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   32.843041]  kasan_bitops_generic+0x110/0x1c8
[   32.843199]  kunit_try_run_case+0x170/0x3f0
[   32.843264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.843354]  kthread+0x328/0x630
[   32.843606]  ret_from_fork+0x10/0x20
[   32.843683] 
[   32.843737] Allocated by task 294:
[   32.843788]  kasan_save_stack+0x3c/0x68
[   32.843856]  kasan_save_track+0x20/0x40
[   32.844628]  kasan_save_alloc_info+0x40/0x58
[   32.844760]  __kasan_kmalloc+0xd4/0xd8
[   32.844841]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.845040]  kasan_bitops_generic+0xa0/0x1c8
[   32.845107]  kunit_try_run_case+0x170/0x3f0
[   32.845147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.845236]  kthread+0x328/0x630
[   32.845282]  ret_from_fork+0x10/0x20
[   32.845331] 
[   32.845370] The buggy address belongs to the object at fff00000c60439a0
[   32.845370]  which belongs to the cache kmalloc-16 of size 16
[   32.845437] The buggy address is located 8 bytes inside of
[   32.845437]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.845506] 
[   32.845538] The buggy address belongs to the physical page:
[   32.845585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.845651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.845701] page_type: f5(slab)
[   32.845759] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.845828] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.845872] page dumped because: kasan: bad access detected
[   32.845916] 
[   32.845936] Memory state around the buggy address:
[   32.845981]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.846027]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.846081] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.846122]                                   ^
[   32.846157]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.846210]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.846261] ==================================================================
[   32.867579] ==================================================================
[   32.867783] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   32.867895] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.867977] 
[   32.868018] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.868177] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.868212] Hardware name: linux,dummy-virt (DT)
[   32.868262] Call trace:
[   32.868288]  show_stack+0x20/0x38 (C)
[   32.868418]  dump_stack_lvl+0x8c/0xd0
[   32.868472]  print_report+0x118/0x5e8
[   32.868640]  kasan_report+0xdc/0x128
[   32.868693]  kasan_check_range+0x100/0x1a8
[   32.868746]  __kasan_check_write+0x20/0x30
[   32.868988]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   32.869064]  kasan_bitops_generic+0x110/0x1c8
[   32.869125]  kunit_try_run_case+0x170/0x3f0
[   32.869173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.869228]  kthread+0x328/0x630
[   32.869271]  ret_from_fork+0x10/0x20
[   32.869320] 
[   32.869341] Allocated by task 294:
[   32.869371]  kasan_save_stack+0x3c/0x68
[   32.869411]  kasan_save_track+0x20/0x40
[   32.869449]  kasan_save_alloc_info+0x40/0x58
[   32.869489]  __kasan_kmalloc+0xd4/0xd8
[   32.869526]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.869569]  kasan_bitops_generic+0xa0/0x1c8
[   32.869612]  kunit_try_run_case+0x170/0x3f0
[   32.869651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.869696]  kthread+0x328/0x630
[   32.869731]  ret_from_fork+0x10/0x20
[   32.869769] 
[   32.869789] The buggy address belongs to the object at fff00000c60439a0
[   32.869789]  which belongs to the cache kmalloc-16 of size 16
[   32.869848] The buggy address is located 8 bytes inside of
[   32.869848]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.869922] 
[   32.869944] The buggy address belongs to the physical page:
[   32.870038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.870105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.870156] page_type: f5(slab)
[   32.870204] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.870273] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.870328] page dumped because: kasan: bad access detected
[   32.870375] 
[   32.870395] Memory state around the buggy address:
[   32.870430]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.870485]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.870538] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.870583]                                   ^
[   32.870619]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.870664]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.870702] ==================================================================
[   32.878163] ==================================================================
[   32.878373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   32.878441] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.878588] 
[   32.878646] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.878745] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.878779] Hardware name: linux,dummy-virt (DT)
[   32.878813] Call trace:
[   32.878836]  show_stack+0x20/0x38 (C)
[   32.878886]  dump_stack_lvl+0x8c/0xd0
[   32.878988]  print_report+0x118/0x5e8
[   32.879036]  kasan_report+0xdc/0x128
[   32.879088]  __asan_report_load8_noabort+0x20/0x30
[   32.879139]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   32.879193]  kasan_bitops_generic+0x110/0x1c8
[   32.879252]  kunit_try_run_case+0x170/0x3f0
[   32.879301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.879369]  kthread+0x328/0x630
[   32.879412]  ret_from_fork+0x10/0x20
[   32.879461] 
[   32.879490] Allocated by task 294:
[   32.879521]  kasan_save_stack+0x3c/0x68
[   32.879561]  kasan_save_track+0x20/0x40
[   32.879598]  kasan_save_alloc_info+0x40/0x58
[   32.879645]  __kasan_kmalloc+0xd4/0xd8
[   32.879682]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.879724]  kasan_bitops_generic+0xa0/0x1c8
[   32.879773]  kunit_try_run_case+0x170/0x3f0
[   32.879820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.879867]  kthread+0x328/0x630
[   32.880696]  ret_from_fork+0x10/0x20
[   32.881084] 
[   32.881179] The buggy address belongs to the object at fff00000c60439a0
[   32.881179]  which belongs to the cache kmalloc-16 of size 16
[   32.881343] The buggy address is located 8 bytes inside of
[   32.881343]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.881421] 
[   32.881442] The buggy address belongs to the physical page:
[   32.881605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.881670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.882086] page_type: f5(slab)
[   32.882278] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.882460] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.882547] page dumped because: kasan: bad access detected
[   32.882679] 
[   32.882737] Memory state around the buggy address:
[   32.882855]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.882926]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.883145] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.883221]                                   ^
[   32.883360]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.883419]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.883459] ==================================================================
[   32.890388] ==================================================================
[   32.890513] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   32.890578] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.890665] 
[   32.890699] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.890794] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.890826] Hardware name: linux,dummy-virt (DT)
[   32.890859] Call trace:
[   32.890883]  show_stack+0x20/0x38 (C)
[   32.890945]  dump_stack_lvl+0x8c/0xd0
[   32.890993]  print_report+0x118/0x5e8
[   32.891038]  kasan_report+0xdc/0x128
[   32.891095]  kasan_check_range+0x100/0x1a8
[   32.891317]  __kasan_check_write+0x20/0x30
[   32.891390]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   32.891789]  kasan_bitops_generic+0x110/0x1c8
[   32.891871]  kunit_try_run_case+0x170/0x3f0
[   32.891935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.891990]  kthread+0x328/0x630
[   32.892036]  ret_from_fork+0x10/0x20
[   32.892977] 
[   32.893066] Allocated by task 294:
[   32.893306]  kasan_save_stack+0x3c/0x68
[   32.893445]  kasan_save_track+0x20/0x40
[   32.893483]  kasan_save_alloc_info+0x40/0x58
[   32.893524]  __kasan_kmalloc+0xd4/0xd8
[   32.893561]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.893605]  kasan_bitops_generic+0xa0/0x1c8
[   32.893730]  kunit_try_run_case+0x170/0x3f0
[   32.894024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.894085]  kthread+0x328/0x630
[   32.894121]  ret_from_fork+0x10/0x20
[   32.894208] 
[   32.894231] The buggy address belongs to the object at fff00000c60439a0
[   32.894231]  which belongs to the cache kmalloc-16 of size 16
[   32.894375] The buggy address is located 8 bytes inside of
[   32.894375]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.894476] 
[   32.894702] The buggy address belongs to the physical page:
[   32.894742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.894998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.895343] page_type: f5(slab)
[   32.895498] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.896060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.896485] page dumped because: kasan: bad access detected
[   32.896585] 
[   32.896826] Memory state around the buggy address:
[   32.896872]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.896932]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.897414] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.897460]                                   ^
[   32.897678]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.897738]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.897779] ==================================================================
[   32.860682] ==================================================================
[   32.860738] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   32.860875] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.860991] 
[   32.861183] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.861342] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.861430] Hardware name: linux,dummy-virt (DT)
[   32.861491] Call trace:
[   32.861646]  show_stack+0x20/0x38 (C)
[   32.861780]  dump_stack_lvl+0x8c/0xd0
[   32.861871]  print_report+0x118/0x5e8
[   32.861998]  kasan_report+0xdc/0x128
[   32.862096]  __asan_report_load8_noabort+0x20/0x30
[   32.862197]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   32.862293]  kasan_bitops_generic+0x110/0x1c8
[   32.862590]  kunit_try_run_case+0x170/0x3f0
[   32.862689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.862809]  kthread+0x328/0x630
[   32.862858]  ret_from_fork+0x10/0x20
[   32.863085] 
[   32.863117] Allocated by task 294:
[   32.863150]  kasan_save_stack+0x3c/0x68
[   32.863227]  kasan_save_track+0x20/0x40
[   32.863292]  kasan_save_alloc_info+0x40/0x58
[   32.863367]  __kasan_kmalloc+0xd4/0xd8
[   32.863467]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.863552]  kasan_bitops_generic+0xa0/0x1c8
[   32.863651]  kunit_try_run_case+0x170/0x3f0
[   32.863729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.863864]  kthread+0x328/0x630
[   32.864283]  ret_from_fork+0x10/0x20
[   32.864349] 
[   32.864407] The buggy address belongs to the object at fff00000c60439a0
[   32.864407]  which belongs to the cache kmalloc-16 of size 16
[   32.864582] The buggy address is located 8 bytes inside of
[   32.864582]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.864702] 
[   32.864813] The buggy address belongs to the physical page:
[   32.864915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.865030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.865113] page_type: f5(slab)
[   32.865363] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.865478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.865639] page dumped because: kasan: bad access detected
[   32.865739] 
[   32.865799] Memory state around the buggy address:
[   32.865935]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.866036]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.866123] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.866270]                                   ^
[   32.866355]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.866401]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.866699] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   32.830011] ==================================================================
[   32.830062] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   32.830114] Read of size 1 at addr fff00000c9c2cc50 by task kunit_try_catch/292
[   32.830182] 
[   32.830219] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.830351] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.830401] Hardware name: linux,dummy-virt (DT)
[   32.830435] Call trace:
[   32.830476]  show_stack+0x20/0x38 (C)
[   32.830539]  dump_stack_lvl+0x8c/0xd0
[   32.830586]  print_report+0x118/0x5e8
[   32.830637]  kasan_report+0xdc/0x128
[   32.830680]  __asan_report_load1_noabort+0x20/0x30
[   32.830738]  strnlen+0x80/0x88
[   32.830783]  kasan_strings+0x478/0xb00
[   32.830830]  kunit_try_run_case+0x170/0x3f0
[   32.830877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.830940]  kthread+0x328/0x630
[   32.830983]  ret_from_fork+0x10/0x20
[   32.831029] 
[   32.831254] Allocated by task 292:
[   32.831308]  kasan_save_stack+0x3c/0x68
[   32.831367]  kasan_save_track+0x20/0x40
[   32.831407]  kasan_save_alloc_info+0x40/0x58
[   32.831454]  __kasan_kmalloc+0xd4/0xd8
[   32.831491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.831534]  kasan_strings+0xc8/0xb00
[   32.831572]  kunit_try_run_case+0x170/0x3f0
[   32.831612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.831675]  kthread+0x328/0x630
[   32.831743]  ret_from_fork+0x10/0x20
[   32.831783] 
[   32.831805] Freed by task 292:
[   32.831840]  kasan_save_stack+0x3c/0x68
[   32.831879]  kasan_save_track+0x20/0x40
[   32.831928]  kasan_save_free_info+0x4c/0x78
[   32.831967]  __kasan_slab_free+0x6c/0x98
[   32.832005]  kfree+0x214/0x3c8
[   32.832041]  kasan_strings+0x24c/0xb00
[   32.832081]  kunit_try_run_case+0x170/0x3f0
[   32.832146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.832192]  kthread+0x328/0x630
[   32.832228]  ret_from_fork+0x10/0x20
[   32.832426] 
[   32.832449] The buggy address belongs to the object at fff00000c9c2cc40
[   32.832449]  which belongs to the cache kmalloc-32 of size 32
[   32.832519] The buggy address is located 16 bytes inside of
[   32.832519]  freed 32-byte region [fff00000c9c2cc40, fff00000c9c2cc60)
[   32.832662] 
[   32.832732] The buggy address belongs to the physical page:
[   32.832787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.832844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.832893] page_type: f5(slab)
[   32.832942] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.833012] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.833053] page dumped because: kasan: bad access detected
[   32.833085] 
[   32.833105] Memory state around the buggy address:
[   32.833158]  fff00000c9c2cb00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.833382]  fff00000c9c2cb80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.833467] >fff00000c9c2cc00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.833582]                                                  ^
[   32.833655]  fff00000c9c2cc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.833700]  fff00000c9c2cd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.833739] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   32.824172] ==================================================================
[   32.824224] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   32.824274] Read of size 1 at addr fff00000c9c2cc50 by task kunit_try_catch/292
[   32.824352] 
[   32.824401] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.824531] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.824598] Hardware name: linux,dummy-virt (DT)
[   32.824723] Call trace:
[   32.824783]  show_stack+0x20/0x38 (C)
[   32.824931]  dump_stack_lvl+0x8c/0xd0
[   32.825012]  print_report+0x118/0x5e8
[   32.825077]  kasan_report+0xdc/0x128
[   32.825123]  __asan_report_load1_noabort+0x20/0x30
[   32.825175]  strlen+0xa8/0xb0
[   32.825219]  kasan_strings+0x418/0xb00
[   32.825325]  kunit_try_run_case+0x170/0x3f0
[   32.825376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.825431]  kthread+0x328/0x630
[   32.825473]  ret_from_fork+0x10/0x20
[   32.825587] 
[   32.825655] Allocated by task 292:
[   32.825695]  kasan_save_stack+0x3c/0x68
[   32.825745]  kasan_save_track+0x20/0x40
[   32.825832]  kasan_save_alloc_info+0x40/0x58
[   32.825890]  __kasan_kmalloc+0xd4/0xd8
[   32.825944]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.826011]  kasan_strings+0xc8/0xb00
[   32.826085]  kunit_try_run_case+0x170/0x3f0
[   32.826122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.826202]  kthread+0x328/0x630
[   32.826322]  ret_from_fork+0x10/0x20
[   32.826402] 
[   32.826461] Freed by task 292:
[   32.826653]  kasan_save_stack+0x3c/0x68
[   32.826693]  kasan_save_track+0x20/0x40
[   32.826856]  kasan_save_free_info+0x4c/0x78
[   32.827008]  __kasan_slab_free+0x6c/0x98
[   32.827088]  kfree+0x214/0x3c8
[   32.827222]  kasan_strings+0x24c/0xb00
[   32.827310]  kunit_try_run_case+0x170/0x3f0
[   32.827395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.827520]  kthread+0x328/0x630
[   32.827565]  ret_from_fork+0x10/0x20
[   32.827603] 
[   32.827779] The buggy address belongs to the object at fff00000c9c2cc40
[   32.827779]  which belongs to the cache kmalloc-32 of size 32
[   32.827842] The buggy address is located 16 bytes inside of
[   32.827842]  freed 32-byte region [fff00000c9c2cc40, fff00000c9c2cc60)
[   32.827991] 
[   32.828041] The buggy address belongs to the physical page:
[   32.828229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.828284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.828332] page_type: f5(slab)
[   32.828369] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.828491] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.828613] page dumped because: kasan: bad access detected
[   32.828684] 
[   32.828770] Memory state around the buggy address:
[   32.828921]  fff00000c9c2cb00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.829014]  fff00000c9c2cb80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.829121] >fff00000c9c2cc00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.829189]                                                  ^
[   32.829259]  fff00000c9c2cc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.829304]  fff00000c9c2cd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.829344] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   32.818393] ==================================================================
[   32.818466] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   32.818520] Read of size 1 at addr fff00000c9c2cc50 by task kunit_try_catch/292
[   32.818572] 
[   32.818605] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.818929] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.818978] Hardware name: linux,dummy-virt (DT)
[   32.819051] Call trace:
[   32.819106]  show_stack+0x20/0x38 (C)
[   32.819183]  dump_stack_lvl+0x8c/0xd0
[   32.819252]  print_report+0x118/0x5e8
[   32.819350]  kasan_report+0xdc/0x128
[   32.819394]  __asan_report_load1_noabort+0x20/0x30
[   32.819463]  kasan_strings+0x95c/0xb00
[   32.819528]  kunit_try_run_case+0x170/0x3f0
[   32.819595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.819651]  kthread+0x328/0x630
[   32.819709]  ret_from_fork+0x10/0x20
[   32.819758] 
[   32.819778] Allocated by task 292:
[   32.819956]  kasan_save_stack+0x3c/0x68
[   32.820178]  kasan_save_track+0x20/0x40
[   32.820257]  kasan_save_alloc_info+0x40/0x58
[   32.820319]  __kasan_kmalloc+0xd4/0xd8
[   32.820355]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.820428]  kasan_strings+0xc8/0xb00
[   32.820486]  kunit_try_run_case+0x170/0x3f0
[   32.820600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.820676]  kthread+0x328/0x630
[   32.820711]  ret_from_fork+0x10/0x20
[   32.820750] 
[   32.820770] Freed by task 292:
[   32.820990]  kasan_save_stack+0x3c/0x68
[   32.821030]  kasan_save_track+0x20/0x40
[   32.821068]  kasan_save_free_info+0x4c/0x78
[   32.821107]  __kasan_slab_free+0x6c/0x98
[   32.821143]  kfree+0x214/0x3c8
[   32.821181]  kasan_strings+0x24c/0xb00
[   32.821221]  kunit_try_run_case+0x170/0x3f0
[   32.821261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.821352]  kthread+0x328/0x630
[   32.821498]  ret_from_fork+0x10/0x20
[   32.821580] 
[   32.821693] The buggy address belongs to the object at fff00000c9c2cc40
[   32.821693]  which belongs to the cache kmalloc-32 of size 32
[   32.821799] The buggy address is located 16 bytes inside of
[   32.821799]  freed 32-byte region [fff00000c9c2cc40, fff00000c9c2cc60)
[   32.821874] 
[   32.822447] The buggy address belongs to the physical page:
[   32.822490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.822561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.822611] page_type: f5(slab)
[   32.822649] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.822915] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.823002] page dumped because: kasan: bad access detected
[   32.823122] 
[   32.823190] Memory state around the buggy address:
[   32.823306]  fff00000c9c2cb00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.823397]  fff00000c9c2cb80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.823469] >fff00000c9c2cc00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.823560]                                                  ^
[   32.823660]  fff00000c9c2cc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.823750]  fff00000c9c2cd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.823848] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   32.813094] ==================================================================
[   32.813151] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   32.813206] Read of size 1 at addr fff00000c9c2cc50 by task kunit_try_catch/292
[   32.813258] 
[   32.813293] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.813401] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.813434] Hardware name: linux,dummy-virt (DT)
[   32.813478] Call trace:
[   32.813514]  show_stack+0x20/0x38 (C)
[   32.813580]  dump_stack_lvl+0x8c/0xd0
[   32.813637]  print_report+0x118/0x5e8
[   32.813683]  kasan_report+0xdc/0x128
[   32.813733]  __asan_report_load1_noabort+0x20/0x30
[   32.813791]  strcmp+0xc0/0xc8
[   32.813837]  kasan_strings+0x340/0xb00
[   32.813891]  kunit_try_run_case+0x170/0x3f0
[   32.813955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.814008]  kthread+0x328/0x630
[   32.814050]  ret_from_fork+0x10/0x20
[   32.814099] 
[   32.814119] Allocated by task 292:
[   32.814149]  kasan_save_stack+0x3c/0x68
[   32.814190]  kasan_save_track+0x20/0x40
[   32.814227]  kasan_save_alloc_info+0x40/0x58
[   32.814267]  __kasan_kmalloc+0xd4/0xd8
[   32.814318]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.814365]  kasan_strings+0xc8/0xb00
[   32.814404]  kunit_try_run_case+0x170/0x3f0
[   32.814442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.814515]  kthread+0x328/0x630
[   32.814550]  ret_from_fork+0x10/0x20
[   32.814588] 
[   32.814914] Freed by task 292:
[   32.814943]  kasan_save_stack+0x3c/0x68
[   32.814980]  kasan_save_track+0x20/0x40
[   32.815017]  kasan_save_free_info+0x4c/0x78
[   32.815056]  __kasan_slab_free+0x6c/0x98
[   32.815093]  kfree+0x214/0x3c8
[   32.815129]  kasan_strings+0x24c/0xb00
[   32.815169]  kunit_try_run_case+0x170/0x3f0
[   32.815207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.815250]  kthread+0x328/0x630
[   32.815285]  ret_from_fork+0x10/0x20
[   32.815323] 
[   32.815344] The buggy address belongs to the object at fff00000c9c2cc40
[   32.815344]  which belongs to the cache kmalloc-32 of size 32
[   32.815427] The buggy address is located 16 bytes inside of
[   32.815427]  freed 32-byte region [fff00000c9c2cc40, fff00000c9c2cc60)
[   32.815520] 
[   32.815567] The buggy address belongs to the physical page:
[   32.815614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.815702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.815765] page_type: f5(slab)
[   32.815841] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.815972] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.816062] page dumped because: kasan: bad access detected
[   32.816148] 
[   32.816168] Memory state around the buggy address:
[   32.816219]  fff00000c9c2cb00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.816550]  fff00000c9c2cb80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.816631] >fff00000c9c2cc00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.816754]                                                  ^
[   32.816823]  fff00000c9c2cc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.816946]  fff00000c9c2cd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.817045] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   32.800524] ==================================================================
[   32.800694] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   32.800758] Read of size 1 at addr fff00000c9c2ca98 by task kunit_try_catch/290
[   32.800810] 
[   32.800849] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.800958] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.800991] Hardware name: linux,dummy-virt (DT)
[   32.801025] Call trace:
[   32.801051]  show_stack+0x20/0x38 (C)
[   32.801104]  dump_stack_lvl+0x8c/0xd0
[   32.801152]  print_report+0x118/0x5e8
[   32.801197]  kasan_report+0xdc/0x128
[   32.801243]  __asan_report_load1_noabort+0x20/0x30
[   32.801292]  memcmp+0x198/0x1d8
[   32.801340]  kasan_memcmp+0x16c/0x300
[   32.801388]  kunit_try_run_case+0x170/0x3f0
[   32.801437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.801491]  kthread+0x328/0x630
[   32.801534]  ret_from_fork+0x10/0x20
[   32.801584] 
[   32.801604] Allocated by task 290:
[   32.801636]  kasan_save_stack+0x3c/0x68
[   32.801678]  kasan_save_track+0x20/0x40
[   32.801714]  kasan_save_alloc_info+0x40/0x58
[   32.801754]  __kasan_kmalloc+0xd4/0xd8
[   32.801789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.801834]  kasan_memcmp+0xbc/0x300
[   32.801872]  kunit_try_run_case+0x170/0x3f0
[   32.801921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.801967]  kthread+0x328/0x630
[   32.802000]  ret_from_fork+0x10/0x20
[   32.802038] 
[   32.802059] The buggy address belongs to the object at fff00000c9c2ca80
[   32.802059]  which belongs to the cache kmalloc-32 of size 32
[   32.802119] The buggy address is located 0 bytes to the right of
[   32.802119]  allocated 24-byte region [fff00000c9c2ca80, fff00000c9c2ca98)
[   32.802184] 
[   32.802205] The buggy address belongs to the physical page:
[   32.802243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.802299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.802356] page_type: f5(slab)
[   32.802396] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.802447] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.802489] page dumped because: kasan: bad access detected
[   32.802522] 
[   32.802541] Memory state around the buggy address:
[   32.802574]  fff00000c9c2c980: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   32.802620]  fff00000c9c2ca00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.802665] >fff00000c9c2ca80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.802706]                             ^
[   32.802740]  fff00000c9c2cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.802784]  fff00000c9c2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.802825] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   32.770753] ==================================================================
[   32.771140] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   32.771301] Read of size 1 at addr ffff800080b77b4a by task kunit_try_catch/286
[   32.771352] 
[   32.771387] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.772124] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.772303] Hardware name: linux,dummy-virt (DT)
[   32.772343] Call trace:
[   32.772691]  show_stack+0x20/0x38 (C)
[   32.772766]  dump_stack_lvl+0x8c/0xd0
[   32.772815]  print_report+0x310/0x5e8
[   32.772862]  kasan_report+0xdc/0x128
[   32.772916]  __asan_report_load1_noabort+0x20/0x30
[   32.772965]  kasan_alloca_oob_right+0x2dc/0x340
[   32.773015]  kunit_try_run_case+0x170/0x3f0
[   32.773279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.773519]  kthread+0x328/0x630
[   32.773569]  ret_from_fork+0x10/0x20
[   32.773762] 
[   32.773829] The buggy address belongs to stack of task kunit_try_catch/286
[   32.774150] 
[   32.774173] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080b70000 allocated at kernel_clone+0x150/0x7b0
[   32.774572] The buggy address belongs to the physical page:
[   32.774610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c18
[   32.774878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.775058] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.775284] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.775333] page dumped because: kasan: bad access detected
[   32.775367] 
[   32.775635] Memory state around the buggy address:
[   32.775684]  ffff800080b77a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.775731]  ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.776216] >ffff800080b77b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   32.776416]                                               ^
[   32.776585]  ffff800080b77b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   32.776677]  ffff800080b77c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.776815] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   32.760399] ==================================================================
[   32.760516] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   32.760715] Read of size 1 at addr ffff800080b77b5f by task kunit_try_catch/284
[   32.760772] 
[   32.760810] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.760921] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.760953] Hardware name: linux,dummy-virt (DT)
[   32.760988] Call trace:
[   32.761013]  show_stack+0x20/0x38 (C)
[   32.761066]  dump_stack_lvl+0x8c/0xd0
[   32.761115]  print_report+0x310/0x5e8
[   32.761161]  kasan_report+0xdc/0x128
[   32.761228]  __asan_report_load1_noabort+0x20/0x30
[   32.761283]  kasan_alloca_oob_left+0x2b8/0x310
[   32.761334]  kunit_try_run_case+0x170/0x3f0
[   32.761383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.761437]  kthread+0x328/0x630
[   32.761480]  ret_from_fork+0x10/0x20
[   32.761532] 
[   32.761591] The buggy address belongs to stack of task kunit_try_catch/284
[   32.761781] 
[   32.761806] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080b70000 allocated at kernel_clone+0x150/0x7b0
[   32.761959] The buggy address belongs to the physical page:
[   32.761998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c18
[   32.762083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.762151] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.762203] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.762246] page dumped because: kasan: bad access detected
[   32.762279] 
[   32.762298] Memory state around the buggy address:
[   32.762334]  ffff800080b77a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.762384]  ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.762429] >ffff800080b77b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   32.763205]                                                     ^
[   32.763405]  ffff800080b77b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   32.763544]  ffff800080b77c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.763634] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   32.742283] ==================================================================
[   32.742379] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   32.742448] Read of size 1 at addr ffff800080b77c2a by task kunit_try_catch/282
[   32.742500] 
[   32.742541] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.742640] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.742716] Hardware name: linux,dummy-virt (DT)
[   32.742755] Call trace:
[   32.742782]  show_stack+0x20/0x38 (C)
[   32.742838]  dump_stack_lvl+0x8c/0xd0
[   32.742887]  print_report+0x310/0x5e8
[   32.743731]  kasan_report+0xdc/0x128
[   32.743810]  __asan_report_load1_noabort+0x20/0x30
[   32.743885]  kasan_stack_oob+0x238/0x270
[   32.744004]  kunit_try_run_case+0x170/0x3f0
[   32.744093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.744148]  kthread+0x328/0x630
[   32.744201]  ret_from_fork+0x10/0x20
[   32.744475] 
[   32.744779] The buggy address belongs to stack of task kunit_try_catch/282
[   32.745232]  and is located at offset 138 in frame:
[   32.745285]  kasan_stack_oob+0x0/0x270
[   32.745802] 
[   32.745887] This frame has 4 objects:
[   32.746526]  [48, 49) '__assertion'
[   32.746720]  [64, 72) 'array'
[   32.746807]  [96, 112) '__assertion'
[   32.746972]  [128, 138) 'stack_array'
[   32.747039] 
[   32.747263] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080b70000 allocated at kernel_clone+0x150/0x7b0
[   32.747784] The buggy address belongs to the physical page:
[   32.747869] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c18
[   32.748007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.748113] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.748324] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.748397] page dumped because: kasan: bad access detected
[   32.748621] 
[   32.748746] Memory state around the buggy address:
[   32.748921]  ffff800080b77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.748996]  ffff800080b77b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   32.749078] >ffff800080b77c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   32.749209]                                   ^
[   32.749267]  ffff800080b77c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   32.749505]  ffff800080b77d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   32.749667] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   32.726320] ==================================================================
[   32.726410] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   32.726478] Read of size 1 at addr ffff91bcfe19068d by task kunit_try_catch/278
[   32.726532] 
[   32.726573] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.726665] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.726698] Hardware name: linux,dummy-virt (DT)
[   32.726732] Call trace:
[   32.726757]  show_stack+0x20/0x38 (C)
[   32.726854]  dump_stack_lvl+0x8c/0xd0
[   32.727048]  print_report+0x310/0x5e8
[   32.727110]  kasan_report+0xdc/0x128
[   32.727173]  __asan_report_load1_noabort+0x20/0x30
[   32.727226]  kasan_global_oob_right+0x230/0x270
[   32.727293]  kunit_try_run_case+0x170/0x3f0
[   32.727346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.727418]  kthread+0x328/0x630
[   32.727465]  ret_from_fork+0x10/0x20
[   32.727535] 
[   32.727683] The buggy address belongs to the variable:
[   32.727726]  global_array+0xd/0x40
[   32.727778] 
[   32.727835] The buggy address belongs to a 0-page vmalloc region starting at 0xffff91bcfc2f0000 allocated at paging_init+0x66c/0x7d0
[   32.728498] The buggy address belongs to the physical page:
[   32.728654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d90
[   32.728761] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   32.728872] raw: 03fffe0000002000 ffffc1ffc01f6408 ffffc1ffc01f6408 0000000000000000
[   32.728977] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.729041] page dumped because: kasan: bad access detected
[   32.729075] 
[   32.729095] Memory state around the buggy address:
[   32.729148]  ffff91bcfe190580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.729194]  ffff91bcfe190600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   32.729403] >ffff91bcfe190680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   32.729490]                       ^
[   32.729597]  ffff91bcfe190700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   32.729676]  ffff91bcfe190780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.729762] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   32.714577] ==================================================================
[   32.714647] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.714927] Free of addr fff00000c9bfc001 by task kunit_try_catch/276
[   32.715179] 
[   32.715228] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.715546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.715693] Hardware name: linux,dummy-virt (DT)
[   32.715743] Call trace:
[   32.715772]  show_stack+0x20/0x38 (C)
[   32.715827]  dump_stack_lvl+0x8c/0xd0
[   32.715885]  print_report+0x118/0x5e8
[   32.715944]  kasan_report_invalid_free+0xc0/0xe8
[   32.715993]  __kasan_mempool_poison_object+0xfc/0x150
[   32.716053]  mempool_free+0x3f4/0x5f0
[   32.716100]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.716163]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   32.716501]  kunit_try_run_case+0x170/0x3f0
[   32.716630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.716724]  kthread+0x328/0x630
[   32.716770]  ret_from_fork+0x10/0x20
[   32.716819] 
[   32.716841] The buggy address belongs to the physical page:
[   32.716990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bfc
[   32.717081] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.717216] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.717323] page_type: f8(unknown)
[   32.717467] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.717596] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.717652] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.717861] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.718195] head: 0bfffe0000000002 ffffc1ffc326ff01 00000000ffffffff 00000000ffffffff
[   32.718303] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.718422] page dumped because: kasan: bad access detected
[   32.718456] 
[   32.718762] Memory state around the buggy address:
[   32.719009]  fff00000c9bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.719071]  fff00000c9bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.719254] >fff00000c9bfc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.719399]                    ^
[   32.719538]  fff00000c9bfc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.719787]  fff00000c9bfc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.720400] ==================================================================
[   32.701357] ==================================================================
[   32.701452] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.701546] Free of addr fff00000c9bd9e01 by task kunit_try_catch/274
[   32.701611] 
[   32.701661] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.701754] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.701787] Hardware name: linux,dummy-virt (DT)
[   32.701819] Call trace:
[   32.701845]  show_stack+0x20/0x38 (C)
[   32.701910]  dump_stack_lvl+0x8c/0xd0
[   32.701958]  print_report+0x118/0x5e8
[   32.702309]  kasan_report_invalid_free+0xc0/0xe8
[   32.702461]  check_slab_allocation+0xfc/0x108
[   32.702581]  __kasan_mempool_poison_object+0x78/0x150
[   32.702707]  mempool_free+0x3f4/0x5f0
[   32.702795]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.702878]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.702999]  kunit_try_run_case+0x170/0x3f0
[   32.703047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.703315]  kthread+0x328/0x630
[   32.703497]  ret_from_fork+0x10/0x20
[   32.703748] 
[   32.703857] Allocated by task 274:
[   32.703895]  kasan_save_stack+0x3c/0x68
[   32.703954]  kasan_save_track+0x20/0x40
[   32.704004]  kasan_save_alloc_info+0x40/0x58
[   32.704045]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.704087]  remove_element+0x130/0x1f8
[   32.704432]  mempool_alloc_preallocated+0x58/0xc0
[   32.704556]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   32.704708]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.704825]  kunit_try_run_case+0x170/0x3f0
[   32.704947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.705016]  kthread+0x328/0x630
[   32.705103]  ret_from_fork+0x10/0x20
[   32.705234] 
[   32.705261] The buggy address belongs to the object at fff00000c9bd9e00
[   32.705261]  which belongs to the cache kmalloc-128 of size 128
[   32.705323] The buggy address is located 1 bytes inside of
[   32.705323]  128-byte region [fff00000c9bd9e00, fff00000c9bd9e80)
[   32.705384] 
[   32.705406] The buggy address belongs to the physical page:
[   32.705837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9
[   32.705963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.706058] page_type: f5(slab)
[   32.706150] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.706227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.706364] page dumped because: kasan: bad access detected
[   32.706432] 
[   32.706491] Memory state around the buggy address:
[   32.706565]  fff00000c9bd9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.706665]  fff00000c9bd9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.706762] >fff00000c9bd9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.707060]                    ^
[   32.707189]  fff00000c9bd9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.707253]  fff00000c9bd9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.707305] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   32.657998] ==================================================================
[   32.658071] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.658212] Free of addr fff00000c9bd9a00 by task kunit_try_catch/268
[   32.658372] 
[   32.658517] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.658791] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.658852] Hardware name: linux,dummy-virt (DT)
[   32.658886] Call trace:
[   32.658918]  show_stack+0x20/0x38 (C)
[   32.658968]  dump_stack_lvl+0x8c/0xd0
[   32.659405]  print_report+0x118/0x5e8
[   32.659692]  kasan_report_invalid_free+0xc0/0xe8
[   32.659871]  check_slab_allocation+0xd4/0x108
[   32.659975]  __kasan_mempool_poison_object+0x78/0x150
[   32.660062]  mempool_free+0x3f4/0x5f0
[   32.660118]  mempool_double_free_helper+0x150/0x2e8
[   32.660483]  mempool_kmalloc_double_free+0xc0/0x118
[   32.660656]  kunit_try_run_case+0x170/0x3f0
[   32.660706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.660787]  kthread+0x328/0x630
[   32.660893]  ret_from_fork+0x10/0x20
[   32.660954] 
[   32.660975] Allocated by task 268:
[   32.661033]  kasan_save_stack+0x3c/0x68
[   32.661076]  kasan_save_track+0x20/0x40
[   32.661112]  kasan_save_alloc_info+0x40/0x58
[   32.661151]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.661194]  remove_element+0x130/0x1f8
[   32.661233]  mempool_alloc_preallocated+0x58/0xc0
[   32.661578]  mempool_double_free_helper+0x94/0x2e8
[   32.661660]  mempool_kmalloc_double_free+0xc0/0x118
[   32.661703]  kunit_try_run_case+0x170/0x3f0
[   32.661751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.662055]  kthread+0x328/0x630
[   32.662308]  ret_from_fork+0x10/0x20
[   32.662373] 
[   32.662394] Freed by task 268:
[   32.662474]  kasan_save_stack+0x3c/0x68
[   32.662591]  kasan_save_track+0x20/0x40
[   32.662627]  kasan_save_free_info+0x4c/0x78
[   32.662665]  __kasan_mempool_poison_object+0xc0/0x150
[   32.662833]  mempool_free+0x3f4/0x5f0
[   32.662999]  mempool_double_free_helper+0x100/0x2e8
[   32.663066]  mempool_kmalloc_double_free+0xc0/0x118
[   32.663108]  kunit_try_run_case+0x170/0x3f0
[   32.663306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.663358]  kthread+0x328/0x630
[   32.663392]  ret_from_fork+0x10/0x20
[   32.663646] 
[   32.663679] The buggy address belongs to the object at fff00000c9bd9a00
[   32.663679]  which belongs to the cache kmalloc-128 of size 128
[   32.663742] The buggy address is located 0 bytes inside of
[   32.663742]  128-byte region [fff00000c9bd9a00, fff00000c9bd9a80)
[   32.663801] 
[   32.663822] The buggy address belongs to the physical page:
[   32.663867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9
[   32.663933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.664342] page_type: f5(slab)
[   32.664503] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.664554] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.664659] page dumped because: kasan: bad access detected
[   32.664690] 
[   32.664711] Memory state around the buggy address:
[   32.664742]  fff00000c9bd9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.664789]  fff00000c9bd9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.664855] >fff00000c9bd9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.664893]                    ^
[   32.664935]  fff00000c9bd9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.665007]  fff00000c9bd9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.665447] ==================================================================
[   32.673272] ==================================================================
[   32.673332] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.673389] Free of addr fff00000c9bf8000 by task kunit_try_catch/270
[   32.673431] 
[   32.673486] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.673578] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.673606] Hardware name: linux,dummy-virt (DT)
[   32.673642] Call trace:
[   32.673753]  show_stack+0x20/0x38 (C)
[   32.673917]  dump_stack_lvl+0x8c/0xd0
[   32.674032]  print_report+0x118/0x5e8
[   32.674076]  kasan_report_invalid_free+0xc0/0xe8
[   32.674123]  __kasan_mempool_poison_object+0x14c/0x150
[   32.674178]  mempool_free+0x3f4/0x5f0
[   32.674384]  mempool_double_free_helper+0x150/0x2e8
[   32.674435]  mempool_kmalloc_large_double_free+0xc0/0x118
[   32.674486]  kunit_try_run_case+0x170/0x3f0
[   32.674534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.674596]  kthread+0x328/0x630
[   32.674797]  ret_from_fork+0x10/0x20
[   32.674931] 
[   32.674956] The buggy address belongs to the physical page:
[   32.674995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8
[   32.675389] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.675741] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.675870] page_type: f8(unknown)
[   32.675921] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.675974] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.676026] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.676077] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.676129] head: 0bfffe0000000002 ffffc1ffc326fe01 00000000ffffffff 00000000ffffffff
[   32.676182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.676224] page dumped because: kasan: bad access detected
[   32.676258] 
[   32.676280] Memory state around the buggy address:
[   32.676313]  fff00000c9bf7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676359]  fff00000c9bf7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676401] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.676442]                    ^
[   32.676473]  fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.677333]  fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.677700] ==================================================================
[   32.691721] ==================================================================
[   32.691783] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.691838] Free of addr fff00000c9bfc000 by task kunit_try_catch/272
[   32.691883] 
[   32.691939] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.692055] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.692123] Hardware name: linux,dummy-virt (DT)
[   32.692165] Call trace:
[   32.692190]  show_stack+0x20/0x38 (C)
[   32.692242]  dump_stack_lvl+0x8c/0xd0
[   32.692290]  print_report+0x118/0x5e8
[   32.692344]  kasan_report_invalid_free+0xc0/0xe8
[   32.692393]  __kasan_mempool_poison_pages+0xe0/0xe8
[   32.692441]  mempool_free+0x3ac/0x5f0
[   32.692488]  mempool_double_free_helper+0x150/0x2e8
[   32.692573]  mempool_page_alloc_double_free+0xbc/0x118
[   32.692626]  kunit_try_run_case+0x170/0x3f0
[   32.692676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.692727]  kthread+0x328/0x630
[   32.692771]  ret_from_fork+0x10/0x20
[   32.692818] 
[   32.692920] The buggy address belongs to the physical page:
[   32.692980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bfc
[   32.693082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.693202] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.693292] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.693390] page dumped because: kasan: bad access detected
[   32.693472] 
[   32.693571] Memory state around the buggy address:
[   32.693616]  fff00000c9bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.693661]  fff00000c9bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.693729] >fff00000c9bfc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.693772]                    ^
[   32.693805]  fff00000c9bfc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.694244]  fff00000c9bfc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.694326] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   32.601654] ==================================================================
[   32.601883] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.601963] Read of size 1 at addr fff00000c9bf8000 by task kunit_try_catch/262
[   32.602033] 
[   32.602115] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.602229] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.602323] Hardware name: linux,dummy-virt (DT)
[   32.602379] Call trace:
[   32.602420]  show_stack+0x20/0x38 (C)
[   32.602487]  dump_stack_lvl+0x8c/0xd0
[   32.602589]  print_report+0x118/0x5e8
[   32.602634]  kasan_report+0xdc/0x128
[   32.602703]  __asan_report_load1_noabort+0x20/0x30
[   32.602914]  mempool_uaf_helper+0x314/0x340
[   32.602975]  mempool_kmalloc_large_uaf+0xc4/0x120
[   32.603041]  kunit_try_run_case+0x170/0x3f0
[   32.603100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.603281]  kthread+0x328/0x630
[   32.603372]  ret_from_fork+0x10/0x20
[   32.603434] 
[   32.603466] The buggy address belongs to the physical page:
[   32.603505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8
[   32.603625] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.603682] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.603743] page_type: f8(unknown)
[   32.603807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.603865] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.603936] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.603994] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.604058] head: 0bfffe0000000002 ffffc1ffc326fe01 00000000ffffffff 00000000ffffffff
[   32.604107] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.604148] page dumped because: kasan: bad access detected
[   32.604178] 
[   32.604198] Memory state around the buggy address:
[   32.604230]  fff00000c9bf7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.604275]  fff00000c9bf7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.604319] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.604371]                    ^
[   32.604403]  fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.604453]  fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.604492] ==================================================================
[   32.644385] ==================================================================
[   32.644455] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.644598] Read of size 1 at addr fff00000c9bf8000 by task kunit_try_catch/266
[   32.644649] 
[   32.644688] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.644797] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.644829] Hardware name: linux,dummy-virt (DT)
[   32.644860] Call trace:
[   32.644917]  show_stack+0x20/0x38 (C)
[   32.645063]  dump_stack_lvl+0x8c/0xd0
[   32.645113]  print_report+0x118/0x5e8
[   32.645192]  kasan_report+0xdc/0x128
[   32.645237]  __asan_report_load1_noabort+0x20/0x30
[   32.645283]  mempool_uaf_helper+0x314/0x340
[   32.645330]  mempool_page_alloc_uaf+0xc0/0x118
[   32.645378]  kunit_try_run_case+0x170/0x3f0
[   32.645438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.645490]  kthread+0x328/0x630
[   32.645530]  ret_from_fork+0x10/0x20
[   32.645577] 
[   32.645613] The buggy address belongs to the physical page:
[   32.645741] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8
[   32.645883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.646046] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.646099] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.646139] page dumped because: kasan: bad access detected
[   32.646191] 
[   32.646268] Memory state around the buggy address:
[   32.646308]  fff00000c9bf7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.646454]  fff00000c9bf7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.646523] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.646615]                    ^
[   32.646644]  fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.646686]  fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.646724] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   32.586762] ==================================================================
[   32.586830] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.586913] Read of size 1 at addr fff00000c9bd9600 by task kunit_try_catch/260
[   32.587135] 
[   32.587187] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.587388] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.587450] Hardware name: linux,dummy-virt (DT)
[   32.587485] Call trace:
[   32.587602]  show_stack+0x20/0x38 (C)
[   32.587670]  dump_stack_lvl+0x8c/0xd0
[   32.587934]  print_report+0x118/0x5e8
[   32.588000]  kasan_report+0xdc/0x128
[   32.588052]  __asan_report_load1_noabort+0x20/0x30
[   32.588103]  mempool_uaf_helper+0x314/0x340
[   32.588164]  mempool_kmalloc_uaf+0xc4/0x120
[   32.588286]  kunit_try_run_case+0x170/0x3f0
[   32.588362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.588415]  kthread+0x328/0x630
[   32.588517]  ret_from_fork+0x10/0x20
[   32.588629] 
[   32.588677] Allocated by task 260:
[   32.588886]  kasan_save_stack+0x3c/0x68
[   32.588951]  kasan_save_track+0x20/0x40
[   32.589036]  kasan_save_alloc_info+0x40/0x58
[   32.589117]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.589574]  remove_element+0x130/0x1f8
[   32.589761]  mempool_alloc_preallocated+0x58/0xc0
[   32.589817]  mempool_uaf_helper+0xa4/0x340
[   32.589864]  mempool_kmalloc_uaf+0xc4/0x120
[   32.590201]  kunit_try_run_case+0x170/0x3f0
[   32.590309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.590444]  kthread+0x328/0x630
[   32.590503]  ret_from_fork+0x10/0x20
[   32.590583] 
[   32.590664] Freed by task 260:
[   32.590803]  kasan_save_stack+0x3c/0x68
[   32.590872]  kasan_save_track+0x20/0x40
[   32.590922]  kasan_save_free_info+0x4c/0x78
[   32.591088]  __kasan_mempool_poison_object+0xc0/0x150
[   32.591147]  mempool_free+0x3f4/0x5f0
[   32.591196]  mempool_uaf_helper+0x104/0x340
[   32.591242]  mempool_kmalloc_uaf+0xc4/0x120
[   32.591300]  kunit_try_run_case+0x170/0x3f0
[   32.591366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.591407]  kthread+0x328/0x630
[   32.591441]  ret_from_fork+0x10/0x20
[   32.591476] 
[   32.591506] The buggy address belongs to the object at fff00000c9bd9600
[   32.591506]  which belongs to the cache kmalloc-128 of size 128
[   32.591576] The buggy address is located 0 bytes inside of
[   32.591576]  freed 128-byte region [fff00000c9bd9600, fff00000c9bd9680)
[   32.591637] 
[   32.591667] The buggy address belongs to the physical page:
[   32.591705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9
[   32.591762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.591813] page_type: f5(slab)
[   32.591851] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.591914] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.591957] page dumped because: kasan: bad access detected
[   32.591985] 
[   32.592015] Memory state around the buggy address:
[   32.592056]  fff00000c9bd9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.592101]  fff00000c9bd9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.592153] >fff00000c9bd9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.592192]                    ^
[   32.592230]  fff00000c9bd9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.592278]  fff00000c9bd9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.592326] ==================================================================
[   32.614681] ==================================================================
[   32.614748] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.614800] Read of size 1 at addr fff00000c9c29240 by task kunit_try_catch/264
[   32.614894] 
[   32.616209] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.616328] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.616365] Hardware name: linux,dummy-virt (DT)
[   32.616407] Call trace:
[   32.616497]  show_stack+0x20/0x38 (C)
[   32.616627]  dump_stack_lvl+0x8c/0xd0
[   32.616724]  print_report+0x118/0x5e8
[   32.616802]  kasan_report+0xdc/0x128
[   32.617194]  __asan_report_load1_noabort+0x20/0x30
[   32.617279]  mempool_uaf_helper+0x314/0x340
[   32.617394]  mempool_slab_uaf+0xc0/0x118
[   32.617504]  kunit_try_run_case+0x170/0x3f0
[   32.617592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.617719]  kthread+0x328/0x630
[   32.617795]  ret_from_fork+0x10/0x20
[   32.617931] 
[   32.617953] Allocated by task 264:
[   32.617991]  kasan_save_stack+0x3c/0x68
[   32.618331]  kasan_save_track+0x20/0x40
[   32.618396]  kasan_save_alloc_info+0x40/0x58
[   32.618436]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.618477]  remove_element+0x16c/0x1f8
[   32.618519]  mempool_alloc_preallocated+0x58/0xc0
[   32.618598]  mempool_uaf_helper+0xa4/0x340
[   32.618645]  mempool_slab_uaf+0xc0/0x118
[   32.618689]  kunit_try_run_case+0x170/0x3f0
[   32.618727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.618770]  kthread+0x328/0x630
[   32.618802]  ret_from_fork+0x10/0x20
[   32.618849] 
[   32.618868] Freed by task 264:
[   32.618911]  kasan_save_stack+0x3c/0x68
[   32.618948]  kasan_save_track+0x20/0x40
[   32.618992]  kasan_save_free_info+0x4c/0x78
[   32.619029]  __kasan_mempool_poison_object+0xc0/0x150
[   32.619077]  mempool_free+0x3f4/0x5f0
[   32.619115]  mempool_uaf_helper+0x104/0x340
[   32.619163]  mempool_slab_uaf+0xc0/0x118
[   32.619200]  kunit_try_run_case+0x170/0x3f0
[   32.619237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.619281]  kthread+0x328/0x630
[   32.619329]  ret_from_fork+0x10/0x20
[   32.619371] 
[   32.619392] The buggy address belongs to the object at fff00000c9c29240
[   32.619392]  which belongs to the cache test_cache of size 123
[   32.619470] The buggy address is located 0 bytes inside of
[   32.619470]  freed 123-byte region [fff00000c9c29240, fff00000c9c292bb)
[   32.619542] 
[   32.619562] The buggy address belongs to the physical page:
[   32.619611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c29
[   32.619676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.619728] page_type: f5(slab)
[   32.619773] raw: 0bfffe0000000000 fff00000c1b0d8c0 dead000000000122 0000000000000000
[   32.619831] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.619872] page dumped because: kasan: bad access detected
[   32.620375] 
[   32.620427] Memory state around the buggy address:
[   32.620719]  fff00000c9c29100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.621314]  fff00000c9c29180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.621385] >fff00000c9c29200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.621481]                                            ^
[   32.621521]  fff00000c9c29280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.621563]  fff00000c9c29300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.621601] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   32.519126] ==================================================================
[   32.519206] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.519286] Read of size 1 at addr fff00000c9bd9273 by task kunit_try_catch/254
[   32.519339] 
[   32.519383] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.519481] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.519511] Hardware name: linux,dummy-virt (DT)
[   32.519548] Call trace:
[   32.519573]  show_stack+0x20/0x38 (C)
[   32.519625]  dump_stack_lvl+0x8c/0xd0
[   32.519676]  print_report+0x118/0x5e8
[   32.519719]  kasan_report+0xdc/0x128
[   32.519760]  __asan_report_load1_noabort+0x20/0x30
[   32.519808]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.519858]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.519924]  kunit_try_run_case+0x170/0x3f0
[   32.519973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.520025]  kthread+0x328/0x630
[   32.520067]  ret_from_fork+0x10/0x20
[   32.520116] 
[   32.520137] Allocated by task 254:
[   32.520168]  kasan_save_stack+0x3c/0x68
[   32.520209]  kasan_save_track+0x20/0x40
[   32.520243]  kasan_save_alloc_info+0x40/0x58
[   32.520282]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.520323]  remove_element+0x130/0x1f8
[   32.520364]  mempool_alloc_preallocated+0x58/0xc0
[   32.520403]  mempool_oob_right_helper+0x98/0x2f0
[   32.520445]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.520484]  kunit_try_run_case+0x170/0x3f0
[   32.520522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.520677]  kthread+0x328/0x630
[   32.520713]  ret_from_fork+0x10/0x20
[   32.520748] 
[   32.520768] The buggy address belongs to the object at fff00000c9bd9200
[   32.520768]  which belongs to the cache kmalloc-128 of size 128
[   32.520828] The buggy address is located 0 bytes to the right of
[   32.520828]  allocated 115-byte region [fff00000c9bd9200, fff00000c9bd9273)
[   32.520891] 
[   32.520925] The buggy address belongs to the physical page:
[   32.520968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9
[   32.521029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.521084] page_type: f5(slab)
[   32.521127] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.521177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.521217] page dumped because: kasan: bad access detected
[   32.521248] 
[   32.521266] Memory state around the buggy address:
[   32.521300]  fff00000c9bd9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.521343]  fff00000c9bd9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.521385] >fff00000c9bd9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.521424]                                                              ^
[   32.521466]  fff00000c9bd9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.521509]  fff00000c9bd9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.521545] ==================================================================
[   32.554136] ==================================================================
[   32.554207] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.554270] Read of size 1 at addr fff00000c9c1d2bb by task kunit_try_catch/258
[   32.554427] 
[   32.554473] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.554662] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.554719] Hardware name: linux,dummy-virt (DT)
[   32.554769] Call trace:
[   32.554857]  show_stack+0x20/0x38 (C)
[   32.554938]  dump_stack_lvl+0x8c/0xd0
[   32.555249]  print_report+0x118/0x5e8
[   32.555323]  kasan_report+0xdc/0x128
[   32.555375]  __asan_report_load1_noabort+0x20/0x30
[   32.555433]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.555492]  mempool_slab_oob_right+0xc0/0x118
[   32.555566]  kunit_try_run_case+0x170/0x3f0
[   32.555627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.555680]  kthread+0x328/0x630
[   32.555728]  ret_from_fork+0x10/0x20
[   32.555847] 
[   32.555884] Allocated by task 258:
[   32.556082]  kasan_save_stack+0x3c/0x68
[   32.556130]  kasan_save_track+0x20/0x40
[   32.556166]  kasan_save_alloc_info+0x40/0x58
[   32.556224]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.556268]  remove_element+0x16c/0x1f8
[   32.556350]  mempool_alloc_preallocated+0x58/0xc0
[   32.556489]  mempool_oob_right_helper+0x98/0x2f0
[   32.556545]  mempool_slab_oob_right+0xc0/0x118
[   32.556639]  kunit_try_run_case+0x170/0x3f0
[   32.556982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.557170]  kthread+0x328/0x630
[   32.557227]  ret_from_fork+0x10/0x20
[   32.557265] 
[   32.557285] The buggy address belongs to the object at fff00000c9c1d240
[   32.557285]  which belongs to the cache test_cache of size 123
[   32.557346] The buggy address is located 0 bytes to the right of
[   32.557346]  allocated 123-byte region [fff00000c9c1d240, fff00000c9c1d2bb)
[   32.557592] 
[   32.557617] The buggy address belongs to the physical page:
[   32.557653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c1d
[   32.557736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.557884] page_type: f5(slab)
[   32.557952] raw: 0bfffe0000000000 fff00000c1b0d780 dead000000000122 0000000000000000
[   32.558081] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.558160] page dumped because: kasan: bad access detected
[   32.558271] 
[   32.558330] Memory state around the buggy address:
[   32.558436]  fff00000c9c1d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.558492]  fff00000c9c1d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.558850] >fff00000c9c1d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.559007]                                         ^
[   32.559080]  fff00000c9c1d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.559200]  fff00000c9c1d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.559277] ==================================================================
[   32.528281] ==================================================================
[   32.529047] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.530175] Read of size 1 at addr fff00000c99a6001 by task kunit_try_catch/256
[   32.531025] 
[   32.531293] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.531708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.531871] Hardware name: linux,dummy-virt (DT)
[   32.532294] Call trace:
[   32.532325]  show_stack+0x20/0x38 (C)
[   32.532623]  dump_stack_lvl+0x8c/0xd0
[   32.532694]  print_report+0x118/0x5e8
[   32.533313]  kasan_report+0xdc/0x128
[   32.533370]  __asan_report_load1_noabort+0x20/0x30
[   32.533420]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.533470]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   32.533522]  kunit_try_run_case+0x170/0x3f0
[   32.533573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.533624]  kthread+0x328/0x630
[   32.533666]  ret_from_fork+0x10/0x20
[   32.533714] 
[   32.533735] The buggy address belongs to the physical page:
[   32.533771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a4
[   32.533825] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.533872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.533938] page_type: f8(unknown)
[   32.533974] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.534023] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.535320] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.535382] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.535914] head: 0bfffe0000000002 ffffc1ffc3266901 00000000ffffffff 00000000ffffffff
[   32.536558] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.536936] page dumped because: kasan: bad access detected
[   32.536977] 
[   32.536996] Memory state around the buggy address:
[   32.537520]  fff00000c99a5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.537697]  fff00000c99a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.537742] >fff00000c99a6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.537781]                    ^
[   32.538238]  fff00000c99a6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.538858]  fff00000c99a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.539134] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   31.955874] ==================================================================
[   31.955971] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   31.956049] Read of size 1 at addr fff00000c5c24a00 by task kunit_try_catch/248
[   31.956102] 
[   31.956142] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.956236] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.956268] Hardware name: linux,dummy-virt (DT)
[   31.956301] Call trace:
[   31.956327]  show_stack+0x20/0x38 (C)
[   31.956379]  dump_stack_lvl+0x8c/0xd0
[   31.956430]  print_report+0x118/0x5e8
[   31.956474]  kasan_report+0xdc/0x128
[   31.956516]  __kasan_check_byte+0x54/0x70
[   31.956573]  kmem_cache_destroy+0x34/0x218
[   31.956622]  kmem_cache_double_destroy+0x174/0x300
[   31.956672]  kunit_try_run_case+0x170/0x3f0
[   31.956721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.956773]  kthread+0x328/0x630
[   31.956815]  ret_from_fork+0x10/0x20
[   31.956865] 
[   31.956884] Allocated by task 248:
[   31.956929]  kasan_save_stack+0x3c/0x68
[   31.956971]  kasan_save_track+0x20/0x40
[   31.957007]  kasan_save_alloc_info+0x40/0x58
[   31.957044]  __kasan_slab_alloc+0xa8/0xb0
[   31.957078]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.957122]  __kmem_cache_create_args+0x178/0x280
[   31.957162]  kmem_cache_double_destroy+0xc0/0x300
[   31.957201]  kunit_try_run_case+0x170/0x3f0
[   31.957240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.957283]  kthread+0x328/0x630
[   31.957315]  ret_from_fork+0x10/0x20
[   31.957351] 
[   31.957369] Freed by task 248:
[   31.957394]  kasan_save_stack+0x3c/0x68
[   31.957429]  kasan_save_track+0x20/0x40
[   31.957463]  kasan_save_free_info+0x4c/0x78
[   31.957501]  __kasan_slab_free+0x6c/0x98
[   31.957537]  kmem_cache_free+0x260/0x468
[   31.957574]  slab_kmem_cache_release+0x38/0x50
[   31.957615]  kmem_cache_release+0x1c/0x30
[   31.957652]  kobject_put+0x17c/0x420
[   31.957690]  sysfs_slab_release+0x1c/0x30
[   31.957725]  kmem_cache_destroy+0x118/0x218
[   31.957764]  kmem_cache_double_destroy+0x128/0x300
[   31.957804]  kunit_try_run_case+0x170/0x3f0
[   31.957841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.957882]  kthread+0x328/0x630
[   31.957929]  ret_from_fork+0x10/0x20
[   31.957964] 
[   31.957983] The buggy address belongs to the object at fff00000c5c24a00
[   31.957983]  which belongs to the cache kmem_cache of size 208
[   31.958042] The buggy address is located 0 bytes inside of
[   31.958042]  freed 208-byte region [fff00000c5c24a00, fff00000c5c24ad0)
[   31.958103] 
[   31.958124] The buggy address belongs to the physical page:
[   31.958164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c24
[   31.958221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.958274] page_type: f5(slab)
[   31.958314] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   31.958376] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   31.958417] page dumped because: kasan: bad access detected
[   31.958449] 
[   31.958467] Memory state around the buggy address:
[   31.958500]  fff00000c5c24900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.958543]  fff00000c5c24980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.958587] >fff00000c5c24a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.958624]                    ^
[   31.958654]  fff00000c5c24a80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   31.958696]  fff00000c5c24b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.958736] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   31.885314] ==================================================================
[   31.885419] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   31.885506] Read of size 1 at addr fff00000c9a5a000 by task kunit_try_catch/246
[   31.885557] 
[   31.885602] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.885697] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.885730] Hardware name: linux,dummy-virt (DT)
[   31.885765] Call trace:
[   31.885791]  show_stack+0x20/0x38 (C)
[   31.885844]  dump_stack_lvl+0x8c/0xd0
[   31.885893]  print_report+0x118/0x5e8
[   31.885955]  kasan_report+0xdc/0x128
[   31.885998]  __asan_report_load1_noabort+0x20/0x30
[   31.886047]  kmem_cache_rcu_uaf+0x388/0x468
[   31.886095]  kunit_try_run_case+0x170/0x3f0
[   31.886146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.886199]  kthread+0x328/0x630
[   31.886243]  ret_from_fork+0x10/0x20
[   31.886293] 
[   31.886311] Allocated by task 246:
[   31.886342]  kasan_save_stack+0x3c/0x68
[   31.886400]  kasan_save_track+0x20/0x40
[   31.886436]  kasan_save_alloc_info+0x40/0x58
[   31.886473]  __kasan_slab_alloc+0xa8/0xb0
[   31.886509]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.886555]  kmem_cache_rcu_uaf+0x12c/0x468
[   31.886594]  kunit_try_run_case+0x170/0x3f0
[   31.886631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.886676]  kthread+0x328/0x630
[   31.886709]  ret_from_fork+0x10/0x20
[   31.886747] 
[   31.886764] Freed by task 0:
[   31.886789]  kasan_save_stack+0x3c/0x68
[   31.886823]  kasan_save_track+0x20/0x40
[   31.886858]  kasan_save_free_info+0x4c/0x78
[   31.886894]  __kasan_slab_free+0x6c/0x98
[   31.886939]  slab_free_after_rcu_debug+0xd4/0x2f8
[   31.886981]  rcu_core+0x9f4/0x1e58
[   31.887019]  rcu_core_si+0x18/0x30
[   31.887054]  handle_softirqs+0x374/0xb28
[   31.887091]  __do_softirq+0x1c/0x28
[   31.887125] 
[   31.887144] Last potentially related work creation:
[   31.887169]  kasan_save_stack+0x3c/0x68
[   31.887205]  kasan_record_aux_stack+0xb4/0xc8
[   31.887243]  kmem_cache_free+0x120/0x468
[   31.887282]  kmem_cache_rcu_uaf+0x16c/0x468
[   31.887320]  kunit_try_run_case+0x170/0x3f0
[   31.887359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.887402]  kthread+0x328/0x630
[   31.887435]  ret_from_fork+0x10/0x20
[   31.887469] 
[   31.887487] The buggy address belongs to the object at fff00000c9a5a000
[   31.887487]  which belongs to the cache test_cache of size 200
[   31.887546] The buggy address is located 0 bytes inside of
[   31.887546]  freed 200-byte region [fff00000c9a5a000, fff00000c9a5a0c8)
[   31.887607] 
[   31.887629] The buggy address belongs to the physical page:
[   31.887669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5a
[   31.887727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.887777] page_type: f5(slab)
[   31.887819] raw: 0bfffe0000000000 fff00000c5c248c0 dead000000000122 0000000000000000
[   31.887868] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.887917] page dumped because: kasan: bad access detected
[   31.887948] 
[   31.887965] Memory state around the buggy address:
[   31.887998]  fff00000c9a59f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.888042]  fff00000c9a59f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.888085] >fff00000c9a5a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.888123]                    ^
[   31.888151]  fff00000c9a5a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.888193]  fff00000c9a5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.888233] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.746672] ==================================================================
[   31.746744] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   31.746816] Free of addr fff00000c9a5b001 by task kunit_try_catch/244
[   31.746858] 
[   31.747283] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.747394] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.747426] Hardware name: linux,dummy-virt (DT)
[   31.747460] Call trace:
[   31.747485]  show_stack+0x20/0x38 (C)
[   31.747687]  dump_stack_lvl+0x8c/0xd0
[   31.747754]  print_report+0x118/0x5e8
[   31.747930]  kasan_report_invalid_free+0xc0/0xe8
[   31.747985]  check_slab_allocation+0xfc/0x108
[   31.748032]  __kasan_slab_pre_free+0x2c/0x48
[   31.748156]  kmem_cache_free+0xf0/0x468
[   31.748257]  kmem_cache_invalid_free+0x184/0x3c8
[   31.748336]  kunit_try_run_case+0x170/0x3f0
[   31.748423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.748479]  kthread+0x328/0x630
[   31.748646]  ret_from_fork+0x10/0x20
[   31.748804] 
[   31.748887] Allocated by task 244:
[   31.748939]  kasan_save_stack+0x3c/0x68
[   31.749008]  kasan_save_track+0x20/0x40
[   31.749077]  kasan_save_alloc_info+0x40/0x58
[   31.749125]  __kasan_slab_alloc+0xa8/0xb0
[   31.749161]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.749395]  kmem_cache_invalid_free+0x12c/0x3c8
[   31.749505]  kunit_try_run_case+0x170/0x3f0
[   31.749602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.749681]  kthread+0x328/0x630
[   31.749799]  ret_from_fork+0x10/0x20
[   31.750100] 
[   31.750155] The buggy address belongs to the object at fff00000c9a5b000
[   31.750155]  which belongs to the cache test_cache of size 200
[   31.750219] The buggy address is located 1 bytes inside of
[   31.750219]  200-byte region [fff00000c9a5b000, fff00000c9a5b0c8)
[   31.750339] 
[   31.750384] The buggy address belongs to the physical page:
[   31.750440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5b
[   31.750530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.750624] page_type: f5(slab)
[   31.750665] raw: 0bfffe0000000000 fff00000c5c24780 dead000000000122 0000000000000000
[   31.750754] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.750812] page dumped because: kasan: bad access detected
[   31.750851] 
[   31.750890] Memory state around the buggy address:
[   31.750981]  fff00000c9a5af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.751054]  fff00000c9a5af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.751130] >fff00000c9a5b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.751227]                    ^
[   31.751550]  fff00000c9a5b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.751700]  fff00000c9a5b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.751770] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   31.710725] ==================================================================
[   31.710807] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.710883] Free of addr fff00000c9a91000 by task kunit_try_catch/242
[   31.710942] 
[   31.710986] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.711080] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.711114] Hardware name: linux,dummy-virt (DT)
[   31.711148] Call trace:
[   31.711174]  show_stack+0x20/0x38 (C)
[   31.711227]  dump_stack_lvl+0x8c/0xd0
[   31.711276]  print_report+0x118/0x5e8
[   31.711321]  kasan_report_invalid_free+0xc0/0xe8
[   31.711368]  check_slab_allocation+0xd4/0x108
[   31.711414]  __kasan_slab_pre_free+0x2c/0x48
[   31.711463]  kmem_cache_free+0xf0/0x468
[   31.711510]  kmem_cache_double_free+0x190/0x3c8
[   31.711559]  kunit_try_run_case+0x170/0x3f0
[   31.711609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.711663]  kthread+0x328/0x630
[   31.711704]  ret_from_fork+0x10/0x20
[   31.711752] 
[   31.711770] Allocated by task 242:
[   31.711800]  kasan_save_stack+0x3c/0x68
[   31.711839]  kasan_save_track+0x20/0x40
[   31.711872]  kasan_save_alloc_info+0x40/0x58
[   31.711922]  __kasan_slab_alloc+0xa8/0xb0
[   31.711958]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.711999]  kmem_cache_double_free+0x12c/0x3c8
[   31.712038]  kunit_try_run_case+0x170/0x3f0
[   31.712075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.712116]  kthread+0x328/0x630
[   31.712149]  ret_from_fork+0x10/0x20
[   31.712183] 
[   31.712202] Freed by task 242:
[   31.712229]  kasan_save_stack+0x3c/0x68
[   31.712262]  kasan_save_track+0x20/0x40
[   31.712295]  kasan_save_free_info+0x4c/0x78
[   31.712333]  __kasan_slab_free+0x6c/0x98
[   31.712366]  kmem_cache_free+0x260/0x468
[   31.712405]  kmem_cache_double_free+0x140/0x3c8
[   31.712443]  kunit_try_run_case+0x170/0x3f0
[   31.712480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.712557]  kthread+0x328/0x630
[   31.712591]  ret_from_fork+0x10/0x20
[   31.712643] 
[   31.712663] The buggy address belongs to the object at fff00000c9a91000
[   31.712663]  which belongs to the cache test_cache of size 200
[   31.712720] The buggy address is located 0 bytes inside of
[   31.712720]  200-byte region [fff00000c9a91000, fff00000c9a910c8)
[   31.712781] 
[   31.712801] The buggy address belongs to the physical page:
[   31.712841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a91
[   31.712905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.712959] page_type: f5(slab)
[   31.713000] raw: 0bfffe0000000000 fff00000c5c24640 dead000000000122 0000000000000000
[   31.713050] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.713091] page dumped because: kasan: bad access detected
[   31.713122] 
[   31.713139] Memory state around the buggy address:
[   31.713174]  fff00000c9a90f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.713217]  fff00000c9a90f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.713260] >fff00000c9a91000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.713298]                    ^
[   31.713328]  fff00000c9a91080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.713368]  fff00000c9a91100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.713408] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   31.547355] ==================================================================
[   31.547487] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   31.547615] Read of size 1 at addr fff00000c99c30c8 by task kunit_try_catch/240
[   31.547705] 
[   31.547751] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.548088] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.548145] Hardware name: linux,dummy-virt (DT)
[   31.548181] Call trace:
[   31.548252]  show_stack+0x20/0x38 (C)
[   31.548316]  dump_stack_lvl+0x8c/0xd0
[   31.548369]  print_report+0x118/0x5e8
[   31.548430]  kasan_report+0xdc/0x128
[   31.548502]  __asan_report_load1_noabort+0x20/0x30
[   31.548664]  kmem_cache_oob+0x344/0x430
[   31.548713]  kunit_try_run_case+0x170/0x3f0
[   31.548886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.548966]  kthread+0x328/0x630
[   31.549111]  ret_from_fork+0x10/0x20
[   31.549300] 
[   31.549349] Allocated by task 240:
[   31.549418]  kasan_save_stack+0x3c/0x68
[   31.549469]  kasan_save_track+0x20/0x40
[   31.549731]  kasan_save_alloc_info+0x40/0x58
[   31.549837]  __kasan_slab_alloc+0xa8/0xb0
[   31.550033]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.550406]  kmem_cache_oob+0x12c/0x430
[   31.550485]  kunit_try_run_case+0x170/0x3f0
[   31.550550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.550833]  kthread+0x328/0x630
[   31.550933]  ret_from_fork+0x10/0x20
[   31.551054] 
[   31.551084] The buggy address belongs to the object at fff00000c99c3000
[   31.551084]  which belongs to the cache test_cache of size 200
[   31.551157] The buggy address is located 0 bytes to the right of
[   31.551157]  allocated 200-byte region [fff00000c99c3000, fff00000c99c30c8)
[   31.551400] 
[   31.551656] The buggy address belongs to the physical page:
[   31.551704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099c3
[   31.551789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.551866] page_type: f5(slab)
[   31.551937] raw: 0bfffe0000000000 fff00000c5c24500 dead000000000122 0000000000000000
[   31.552003] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.552043] page dumped because: kasan: bad access detected
[   31.552082] 
[   31.552108] Memory state around the buggy address:
[   31.552142]  fff00000c99c2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.552185]  fff00000c99c3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.552228] >fff00000c99c3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.552266]                                               ^
[   31.552305]  fff00000c99c3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.552359]  fff00000c99c3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.552397] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   31.510717] ==================================================================
[   31.510809] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   31.510880] Read of size 8 at addr fff00000c9a6bf80 by task kunit_try_catch/233
[   31.510945] 
[   31.510989] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.511082] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.511111] Hardware name: linux,dummy-virt (DT)
[   31.511143] Call trace:
[   31.511170]  show_stack+0x20/0x38 (C)
[   31.511222]  dump_stack_lvl+0x8c/0xd0
[   31.511269]  print_report+0x118/0x5e8
[   31.511415]  kasan_report+0xdc/0x128
[   31.511563]  __asan_report_load8_noabort+0x20/0x30
[   31.512030]  workqueue_uaf+0x480/0x4a8
[   31.512090]  kunit_try_run_case+0x170/0x3f0
[   31.512247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.512411]  kthread+0x328/0x630
[   31.512504]  ret_from_fork+0x10/0x20
[   31.512558] 
[   31.512577] Allocated by task 233:
[   31.512607]  kasan_save_stack+0x3c/0x68
[   31.512648]  kasan_save_track+0x20/0x40
[   31.512683]  kasan_save_alloc_info+0x40/0x58
[   31.512722]  __kasan_kmalloc+0xd4/0xd8
[   31.513085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.513131]  workqueue_uaf+0x13c/0x4a8
[   31.513202]  kunit_try_run_case+0x170/0x3f0
[   31.513249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.513292]  kthread+0x328/0x630
[   31.513326]  ret_from_fork+0x10/0x20
[   31.513438] 
[   31.513459] Freed by task 9:
[   31.513535]  kasan_save_stack+0x3c/0x68
[   31.513574]  kasan_save_track+0x20/0x40
[   31.513609]  kasan_save_free_info+0x4c/0x78
[   31.513646]  __kasan_slab_free+0x6c/0x98
[   31.513682]  kfree+0x214/0x3c8
[   31.513716]  workqueue_uaf_work+0x18/0x30
[   31.513752]  process_one_work+0x530/0xf88
[   31.513792]  worker_thread+0x618/0xf38
[   31.513862]  kthread+0x328/0x630
[   31.513906]  ret_from_fork+0x10/0x20
[   31.513948] 
[   31.513966] Last potentially related work creation:
[   31.513993]  kasan_save_stack+0x3c/0x68
[   31.514029]  kasan_record_aux_stack+0xb4/0xc8
[   31.514068]  __queue_work+0x65c/0xfe0
[   31.514105]  queue_work_on+0xbc/0xf8
[   31.514406]  workqueue_uaf+0x210/0x4a8
[   31.514501]  kunit_try_run_case+0x170/0x3f0
[   31.514555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.514648]  kthread+0x328/0x630
[   31.514681]  ret_from_fork+0x10/0x20
[   31.514717] 
[   31.514735] The buggy address belongs to the object at fff00000c9a6bf80
[   31.514735]  which belongs to the cache kmalloc-32 of size 32
[   31.514967] The buggy address is located 0 bytes inside of
[   31.514967]  freed 32-byte region [fff00000c9a6bf80, fff00000c9a6bfa0)
[   31.515176] 
[   31.515199] The buggy address belongs to the physical page:
[   31.515238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a6b
[   31.515296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.515574] page_type: f5(slab)
[   31.515691] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.515808] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.515894] page dumped because: kasan: bad access detected
[   31.516007] 
[   31.516064] Memory state around the buggy address:
[   31.516126]  fff00000c9a6be80: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.516177]  fff00000c9a6bf00: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   31.516277] >fff00000c9a6bf80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.516449]                    ^
[   31.516490]  fff00000c9a6c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.516583]  fff00000c9a6c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.516622] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   31.481456] ==================================================================
[   31.481597] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.481672] Read of size 4 at addr fff00000c9a6bd80 by task swapper/0/0
[   31.481720] 
[   31.481761] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.481854] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.481884] Hardware name: linux,dummy-virt (DT)
[   31.481930] Call trace:
[   31.481954]  show_stack+0x20/0x38 (C)
[   31.482006]  dump_stack_lvl+0x8c/0xd0
[   31.482066]  print_report+0x118/0x5e8
[   31.482122]  kasan_report+0xdc/0x128
[   31.482174]  __asan_report_load4_noabort+0x20/0x30
[   31.482233]  rcu_uaf_reclaim+0x64/0x70
[   31.482283]  rcu_core+0x9f4/0x1e58
[   31.482340]  rcu_core_si+0x18/0x30
[   31.482388]  handle_softirqs+0x374/0xb28
[   31.482546]  __do_softirq+0x1c/0x28
[   31.482588]  ____do_softirq+0x18/0x30
[   31.482632]  call_on_irq_stack+0x30/0x48
[   31.484953]  do_softirq_own_stack+0x24/0x38
[   31.485025]  __irq_exit_rcu+0x1fc/0x318
[   31.485071]  irq_exit_rcu+0x1c/0x80
[   31.485114]  el1_interrupt+0x38/0x58
[   31.485162]  el1h_64_irq_handler+0x18/0x28
[   31.485206]  el1h_64_irq+0x6c/0x70
[   31.485303]  arch_local_irq_enable+0x4/0x8 (P)
[   31.485352]  do_idle+0x384/0x4e8
[   31.485396]  cpu_startup_entry+0x64/0x80
[   31.485440]  rest_init+0x160/0x188
[   31.485485]  start_kernel+0x30c/0x3d0
[   31.485535]  __primary_switched+0x8c/0xa0
[   31.485587] 
[   31.485606] Allocated by task 231:
[   31.485637]  kasan_save_stack+0x3c/0x68
[   31.485681]  kasan_save_track+0x20/0x40
[   31.485718]  kasan_save_alloc_info+0x40/0x58
[   31.485754]  __kasan_kmalloc+0xd4/0xd8
[   31.485789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.485830]  rcu_uaf+0xb0/0x2d8
[   31.485865]  kunit_try_run_case+0x170/0x3f0
[   31.485926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.485972]  kthread+0x328/0x630
[   31.486088]  ret_from_fork+0x10/0x20
[   31.486179] 
[   31.486266] Freed by task 0:
[   31.486323]  kasan_save_stack+0x3c/0x68
[   31.486384]  kasan_save_track+0x20/0x40
[   31.486425]  kasan_save_free_info+0x4c/0x78
[   31.486464]  __kasan_slab_free+0x6c/0x98
[   31.486500]  kfree+0x214/0x3c8
[   31.486537]  rcu_uaf_reclaim+0x28/0x70
[   31.486577]  rcu_core+0x9f4/0x1e58
[   31.486613]  rcu_core_si+0x18/0x30
[   31.486648]  handle_softirqs+0x374/0xb28
[   31.486686]  __do_softirq+0x1c/0x28
[   31.486723] 
[   31.486744] Last potentially related work creation:
[   31.486770]  kasan_save_stack+0x3c/0x68
[   31.486807]  kasan_record_aux_stack+0xb4/0xc8
[   31.486846]  __call_rcu_common.constprop.0+0x74/0x8c8
[   31.486888]  call_rcu+0x18/0x30
[   31.486934]  rcu_uaf+0x14c/0x2d8
[   31.486968]  kunit_try_run_case+0x170/0x3f0
[   31.487007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.487050]  kthread+0x328/0x630
[   31.487083]  ret_from_fork+0x10/0x20
[   31.487117] 
[   31.487138] The buggy address belongs to the object at fff00000c9a6bd80
[   31.487138]  which belongs to the cache kmalloc-32 of size 32
[   31.487198] The buggy address is located 0 bytes inside of
[   31.487198]  freed 32-byte region [fff00000c9a6bd80, fff00000c9a6bda0)
[   31.487259] 
[   31.487280] The buggy address belongs to the physical page:
[   31.487322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a6b
[   31.487380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.487433] page_type: f5(slab)
[   31.487474] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.487524] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.487566] page dumped because: kasan: bad access detected
[   31.487595] 
[   31.487613] Memory state around the buggy address:
[   31.487645]  fff00000c9a6bc80: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   31.487688]  fff00000c9a6bd00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.487731] >fff00000c9a6bd80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   31.487770]                    ^
[   31.487797]  fff00000c9a6be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.487839]  fff00000c9a6be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.487876] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   31.299890] ==================================================================
[   31.299972] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   31.300111] Read of size 1 at addr fff00000c99bcf78 by task kunit_try_catch/229
[   31.300189] 
[   31.300249] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.300427] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.300460] Hardware name: linux,dummy-virt (DT)
[   31.300492] Call trace:
[   31.300515]  show_stack+0x20/0x38 (C)
[   31.300850]  dump_stack_lvl+0x8c/0xd0
[   31.300967]  print_report+0x118/0x5e8
[   31.301087]  kasan_report+0xdc/0x128
[   31.301191]  __asan_report_load1_noabort+0x20/0x30
[   31.301281]  ksize_uaf+0x544/0x5f8
[   31.301407]  kunit_try_run_case+0x170/0x3f0
[   31.301451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.301503]  kthread+0x328/0x630
[   31.301789]  ret_from_fork+0x10/0x20
[   31.301941] 
[   31.302012] Allocated by task 229:
[   31.302081]  kasan_save_stack+0x3c/0x68
[   31.302247]  kasan_save_track+0x20/0x40
[   31.302352]  kasan_save_alloc_info+0x40/0x58
[   31.302722]  __kasan_kmalloc+0xd4/0xd8
[   31.302797]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.302916]  ksize_uaf+0xb8/0x5f8
[   31.302974]  kunit_try_run_case+0x170/0x3f0
[   31.303496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.303882]  kthread+0x328/0x630
[   31.303977]  ret_from_fork+0x10/0x20
[   31.304044] 
[   31.304088] Freed by task 229:
[   31.304153]  kasan_save_stack+0x3c/0x68
[   31.304227]  kasan_save_track+0x20/0x40
[   31.304281]  kasan_save_free_info+0x4c/0x78
[   31.304421]  __kasan_slab_free+0x6c/0x98
[   31.304621]  kfree+0x214/0x3c8
[   31.304768]  ksize_uaf+0x11c/0x5f8
[   31.304807]  kunit_try_run_case+0x170/0x3f0
[   31.304843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.305138]  kthread+0x328/0x630
[   31.305318]  ret_from_fork+0x10/0x20
[   31.305402] 
[   31.305805] The buggy address belongs to the object at fff00000c99bcf00
[   31.305805]  which belongs to the cache kmalloc-128 of size 128
[   31.305879] The buggy address is located 120 bytes inside of
[   31.305879]  freed 128-byte region [fff00000c99bcf00, fff00000c99bcf80)
[   31.306124] 
[   31.306333] The buggy address belongs to the physical page:
[   31.306458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.306594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.306692] page_type: f5(slab)
[   31.306795] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.306846] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.307053] page dumped because: kasan: bad access detected
[   31.307240] 
[   31.307284] Memory state around the buggy address:
[   31.307349]  fff00000c99bce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.307679]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.307771] >fff00000c99bcf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.307921]                                                                 ^
[   31.307996]  fff00000c99bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.308099]  fff00000c99bd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.308138] ==================================================================
[   31.279873] ==================================================================
[   31.280164] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.280444] Read of size 1 at addr fff00000c99bcf00 by task kunit_try_catch/229
[   31.280514] 
[   31.281403] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.281524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.281591] Hardware name: linux,dummy-virt (DT)
[   31.281644] Call trace:
[   31.281676]  show_stack+0x20/0x38 (C)
[   31.281755]  dump_stack_lvl+0x8c/0xd0
[   31.281940]  print_report+0x118/0x5e8
[   31.281997]  kasan_report+0xdc/0x128
[   31.282040]  __kasan_check_byte+0x54/0x70
[   31.282084]  ksize+0x30/0x88
[   31.282129]  ksize_uaf+0x168/0x5f8
[   31.282173]  kunit_try_run_case+0x170/0x3f0
[   31.282219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.282270]  kthread+0x328/0x630
[   31.282310]  ret_from_fork+0x10/0x20
[   31.282362] 
[   31.282381] Allocated by task 229:
[   31.282410]  kasan_save_stack+0x3c/0x68
[   31.282450]  kasan_save_track+0x20/0x40
[   31.282486]  kasan_save_alloc_info+0x40/0x58
[   31.282523]  __kasan_kmalloc+0xd4/0xd8
[   31.282558]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.282609]  ksize_uaf+0xb8/0x5f8
[   31.282682]  kunit_try_run_case+0x170/0x3f0
[   31.282764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.282870]  kthread+0x328/0x630
[   31.282911]  ret_from_fork+0x10/0x20
[   31.282946] 
[   31.282964] Freed by task 229:
[   31.282991]  kasan_save_stack+0x3c/0x68
[   31.283067]  kasan_save_track+0x20/0x40
[   31.283198]  kasan_save_free_info+0x4c/0x78
[   31.283237]  __kasan_slab_free+0x6c/0x98
[   31.283281]  kfree+0x214/0x3c8
[   31.283326]  ksize_uaf+0x11c/0x5f8
[   31.283363]  kunit_try_run_case+0x170/0x3f0
[   31.283401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.283444]  kthread+0x328/0x630
[   31.283477]  ret_from_fork+0x10/0x20
[   31.283514] 
[   31.283532] The buggy address belongs to the object at fff00000c99bcf00
[   31.283532]  which belongs to the cache kmalloc-128 of size 128
[   31.283591] The buggy address is located 0 bytes inside of
[   31.283591]  freed 128-byte region [fff00000c99bcf00, fff00000c99bcf80)
[   31.283674] 
[   31.283777] The buggy address belongs to the physical page:
[   31.283846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.284677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.284740] page_type: f5(slab)
[   31.284787] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.284839] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.285525] page dumped because: kasan: bad access detected
[   31.286126] 
[   31.286175] Memory state around the buggy address:
[   31.286212]  fff00000c99bce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.286256]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.286826] >fff00000c99bcf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.287240]                    ^
[   31.287293]  fff00000c99bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.287337]  fff00000c99bd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.287875] ==================================================================
[   31.289784] ==================================================================
[   31.289867] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.290225] Read of size 1 at addr fff00000c99bcf00 by task kunit_try_catch/229
[   31.290368] 
[   31.290411] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.290503] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.290586] Hardware name: linux,dummy-virt (DT)
[   31.290681] Call trace:
[   31.290729]  show_stack+0x20/0x38 (C)
[   31.290853]  dump_stack_lvl+0x8c/0xd0
[   31.290916]  print_report+0x118/0x5e8
[   31.290960]  kasan_report+0xdc/0x128
[   31.291009]  __asan_report_load1_noabort+0x20/0x30
[   31.291054]  ksize_uaf+0x598/0x5f8
[   31.291098]  kunit_try_run_case+0x170/0x3f0
[   31.291144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.291505]  kthread+0x328/0x630
[   31.291589]  ret_from_fork+0x10/0x20
[   31.291710] 
[   31.291734] Allocated by task 229:
[   31.291762]  kasan_save_stack+0x3c/0x68
[   31.291812]  kasan_save_track+0x20/0x40
[   31.291856]  kasan_save_alloc_info+0x40/0x58
[   31.291892]  __kasan_kmalloc+0xd4/0xd8
[   31.292185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.292251]  ksize_uaf+0xb8/0x5f8
[   31.292554]  kunit_try_run_case+0x170/0x3f0
[   31.292771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.292870]  kthread+0x328/0x630
[   31.293013]  ret_from_fork+0x10/0x20
[   31.293090] 
[   31.293184] Freed by task 229:
[   31.293215]  kasan_save_stack+0x3c/0x68
[   31.293254]  kasan_save_track+0x20/0x40
[   31.293297]  kasan_save_free_info+0x4c/0x78
[   31.293344]  __kasan_slab_free+0x6c/0x98
[   31.293754]  kfree+0x214/0x3c8
[   31.293856]  ksize_uaf+0x11c/0x5f8
[   31.293954]  kunit_try_run_case+0x170/0x3f0
[   31.294097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.294196]  kthread+0x328/0x630
[   31.294305]  ret_from_fork+0x10/0x20
[   31.294363] 
[   31.294383] The buggy address belongs to the object at fff00000c99bcf00
[   31.294383]  which belongs to the cache kmalloc-128 of size 128
[   31.294816] The buggy address is located 0 bytes inside of
[   31.294816]  freed 128-byte region [fff00000c99bcf00, fff00000c99bcf80)
[   31.294917] 
[   31.294992] The buggy address belongs to the physical page:
[   31.295084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.295339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.295568] page_type: f5(slab)
[   31.295631] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.296007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.296061] page dumped because: kasan: bad access detected
[   31.296373] 
[   31.296437] Memory state around the buggy address:
[   31.296525]  fff00000c99bce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.296592]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.296727] >fff00000c99bcf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.296837]                    ^
[   31.296880]  fff00000c99bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.297000]  fff00000c99bd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.297039] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   31.257589] ==================================================================
[   31.257924] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   31.258068] Read of size 1 at addr fff00000c99bce78 by task kunit_try_catch/227
[   31.258123] 
[   31.258157] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.258543] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.258587] Hardware name: linux,dummy-virt (DT)
[   31.258689] Call trace:
[   31.258716]  show_stack+0x20/0x38 (C)
[   31.258888]  dump_stack_lvl+0x8c/0xd0
[   31.258983]  print_report+0x118/0x5e8
[   31.259208]  kasan_report+0xdc/0x128
[   31.259271]  __asan_report_load1_noabort+0x20/0x30
[   31.259479]  ksize_unpoisons_memory+0x618/0x740
[   31.259641]  kunit_try_run_case+0x170/0x3f0
[   31.259696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.259749]  kthread+0x328/0x630
[   31.259798]  ret_from_fork+0x10/0x20
[   31.259847] 
[   31.259865] Allocated by task 227:
[   31.259893]  kasan_save_stack+0x3c/0x68
[   31.259942]  kasan_save_track+0x20/0x40
[   31.259979]  kasan_save_alloc_info+0x40/0x58
[   31.260017]  __kasan_kmalloc+0xd4/0xd8
[   31.260051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.260089]  ksize_unpoisons_memory+0xc0/0x740
[   31.260128]  kunit_try_run_case+0x170/0x3f0
[   31.260163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.260204]  kthread+0x328/0x630
[   31.260282]  ret_from_fork+0x10/0x20
[   31.260321] 
[   31.260339] The buggy address belongs to the object at fff00000c99bce00
[   31.260339]  which belongs to the cache kmalloc-128 of size 128
[   31.260397] The buggy address is located 5 bytes to the right of
[   31.260397]  allocated 115-byte region [fff00000c99bce00, fff00000c99bce73)
[   31.260471] 
[   31.260491] The buggy address belongs to the physical page:
[   31.261176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.261436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.261523] page_type: f5(slab)
[   31.261660] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.261739] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.262098] page dumped because: kasan: bad access detected
[   31.262153] 
[   31.262214] Memory state around the buggy address:
[   31.262316]  fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.262488]  fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.262598] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.262673]                                                                 ^
[   31.263039]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.263092]  fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.263183] ==================================================================
[   31.264094] ==================================================================
[   31.264146] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.264199] Read of size 1 at addr fff00000c99bce7f by task kunit_try_catch/227
[   31.265071] 
[   31.265122] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.265476] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.265618] Hardware name: linux,dummy-virt (DT)
[   31.265673] Call trace:
[   31.265715]  show_stack+0x20/0x38 (C)
[   31.266343]  dump_stack_lvl+0x8c/0xd0
[   31.266551]  print_report+0x118/0x5e8
[   31.266641]  kasan_report+0xdc/0x128
[   31.266751]  __asan_report_load1_noabort+0x20/0x30
[   31.266879]  ksize_unpoisons_memory+0x690/0x740
[   31.266974]  kunit_try_run_case+0x170/0x3f0
[   31.267367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.267578]  kthread+0x328/0x630
[   31.267770]  ret_from_fork+0x10/0x20
[   31.267888] 
[   31.268003] Allocated by task 227:
[   31.268061]  kasan_save_stack+0x3c/0x68
[   31.268169]  kasan_save_track+0x20/0x40
[   31.268236]  kasan_save_alloc_info+0x40/0x58
[   31.268385]  __kasan_kmalloc+0xd4/0xd8
[   31.268462]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.268602]  ksize_unpoisons_memory+0xc0/0x740
[   31.268653]  kunit_try_run_case+0x170/0x3f0
[   31.268691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.268741]  kthread+0x328/0x630
[   31.268773]  ret_from_fork+0x10/0x20
[   31.269150] 
[   31.269227] The buggy address belongs to the object at fff00000c99bce00
[   31.269227]  which belongs to the cache kmalloc-128 of size 128
[   31.269290] The buggy address is located 12 bytes to the right of
[   31.269290]  allocated 115-byte region [fff00000c99bce00, fff00000c99bce73)
[   31.269363] 
[   31.269398] The buggy address belongs to the physical page:
[   31.269434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.269509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.269556] page_type: f5(slab)
[   31.269591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.269649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.269700] page dumped because: kasan: bad access detected
[   31.269740] 
[   31.269766] Memory state around the buggy address:
[   31.269807]  fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.269851]  fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.270129] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.270730]                                                                 ^
[   31.270875]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.271230]  fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.271297] ==================================================================
[   31.249693] ==================================================================
[   31.249796] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   31.250019] Read of size 1 at addr fff00000c99bce73 by task kunit_try_catch/227
[   31.250074] 
[   31.250110] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.250201] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.250401] Hardware name: linux,dummy-virt (DT)
[   31.250480] Call trace:
[   31.250506]  show_stack+0x20/0x38 (C)
[   31.250858]  dump_stack_lvl+0x8c/0xd0
[   31.251019]  print_report+0x118/0x5e8
[   31.251085]  kasan_report+0xdc/0x128
[   31.251131]  __asan_report_load1_noabort+0x20/0x30
[   31.251207]  ksize_unpoisons_memory+0x628/0x740
[   31.251305]  kunit_try_run_case+0x170/0x3f0
[   31.251354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.251429]  kthread+0x328/0x630
[   31.251627]  ret_from_fork+0x10/0x20
[   31.251697] 
[   31.251996] Allocated by task 227:
[   31.252048]  kasan_save_stack+0x3c/0x68
[   31.252094]  kasan_save_track+0x20/0x40
[   31.252130]  kasan_save_alloc_info+0x40/0x58
[   31.252304]  __kasan_kmalloc+0xd4/0xd8
[   31.252351]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.252420]  ksize_unpoisons_memory+0xc0/0x740
[   31.252836]  kunit_try_run_case+0x170/0x3f0
[   31.252950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.253088]  kthread+0x328/0x630
[   31.253137]  ret_from_fork+0x10/0x20
[   31.253186] 
[   31.253212] The buggy address belongs to the object at fff00000c99bce00
[   31.253212]  which belongs to the cache kmalloc-128 of size 128
[   31.253343] The buggy address is located 0 bytes to the right of
[   31.253343]  allocated 115-byte region [fff00000c99bce00, fff00000c99bce73)
[   31.253548] 
[   31.253765] The buggy address belongs to the physical page:
[   31.253853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.254007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.254096] page_type: f5(slab)
[   31.254223] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.254462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.254627] page dumped because: kasan: bad access detected
[   31.254928] 
[   31.255064] Memory state around the buggy address:
[   31.255143]  fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.255281]  fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.255348] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.255397]                                                              ^
[   31.255472]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.255515]  fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.255590] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   31.229832] ==================================================================
[   31.229964] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   31.230051] Free of addr fff00000c8603ee0 by task kunit_try_catch/225
[   31.230240] 
[   31.230324] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.230427] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.230456] Hardware name: linux,dummy-virt (DT)
[   31.230993] Call trace:
[   31.231168]  show_stack+0x20/0x38 (C)
[   31.231268]  dump_stack_lvl+0x8c/0xd0
[   31.231467]  print_report+0x118/0x5e8
[   31.231530]  kasan_report_invalid_free+0xc0/0xe8
[   31.231577]  check_slab_allocation+0xd4/0x108
[   31.231758]  __kasan_slab_pre_free+0x2c/0x48
[   31.231843]  kfree+0xe8/0x3c8
[   31.232048]  kfree_sensitive+0x3c/0xb0
[   31.232115]  kmalloc_double_kzfree+0x168/0x308
[   31.232164]  kunit_try_run_case+0x170/0x3f0
[   31.232536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.232615]  kthread+0x328/0x630
[   31.232660]  ret_from_fork+0x10/0x20
[   31.232723] 
[   31.232926] Allocated by task 225:
[   31.233139]  kasan_save_stack+0x3c/0x68
[   31.233297]  kasan_save_track+0x20/0x40
[   31.233359]  kasan_save_alloc_info+0x40/0x58
[   31.233658]  __kasan_kmalloc+0xd4/0xd8
[   31.233846]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.234138]  kmalloc_double_kzfree+0xb8/0x308
[   31.234314]  kunit_try_run_case+0x170/0x3f0
[   31.234382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.234428]  kthread+0x328/0x630
[   31.234468]  ret_from_fork+0x10/0x20
[   31.234505] 
[   31.234526] Freed by task 225:
[   31.234591]  kasan_save_stack+0x3c/0x68
[   31.234639]  kasan_save_track+0x20/0x40
[   31.234685]  kasan_save_free_info+0x4c/0x78
[   31.234723]  __kasan_slab_free+0x6c/0x98
[   31.234758]  kfree+0x214/0x3c8
[   31.234803]  kfree_sensitive+0x80/0xb0
[   31.234842]  kmalloc_double_kzfree+0x11c/0x308
[   31.234884]  kunit_try_run_case+0x170/0x3f0
[   31.234944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.234994]  kthread+0x328/0x630
[   31.235028]  ret_from_fork+0x10/0x20
[   31.235065] 
[   31.235089] The buggy address belongs to the object at fff00000c8603ee0
[   31.235089]  which belongs to the cache kmalloc-16 of size 16
[   31.235151] The buggy address is located 0 bytes inside of
[   31.235151]  16-byte region [fff00000c8603ee0, fff00000c8603ef0)
[   31.235217] 
[   31.235247] The buggy address belongs to the physical page:
[   31.235292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603
[   31.235351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.235410] page_type: f5(slab)
[   31.235466] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.235527] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000
[   31.235585] page dumped because: kasan: bad access detected
[   31.235616] 
[   31.235646] Memory state around the buggy address:
[   31.235687]  fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.235739]  fff00000c8603e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.235797] >fff00000c8603e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.235836]                                                        ^
[   31.235887]  fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.236396]  fff00000c8603f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.236518] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   31.219395] ==================================================================
[   31.219482] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   31.219562] Read of size 1 at addr fff00000c8603ee0 by task kunit_try_catch/225
[   31.219888] 
[   31.219965] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.220065] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.220140] Hardware name: linux,dummy-virt (DT)
[   31.220175] Call trace:
[   31.220202]  show_stack+0x20/0x38 (C)
[   31.220258]  dump_stack_lvl+0x8c/0xd0
[   31.220628]  print_report+0x118/0x5e8
[   31.220710]  kasan_report+0xdc/0x128
[   31.220871]  __kasan_check_byte+0x54/0x70
[   31.221019]  kfree_sensitive+0x30/0xb0
[   31.221082]  kmalloc_double_kzfree+0x168/0x308
[   31.221313]  kunit_try_run_case+0x170/0x3f0
[   31.221568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.221678]  kthread+0x328/0x630
[   31.221811]  ret_from_fork+0x10/0x20
[   31.221957] 
[   31.222101] Allocated by task 225:
[   31.222152]  kasan_save_stack+0x3c/0x68
[   31.222387]  kasan_save_track+0x20/0x40
[   31.222592]  kasan_save_alloc_info+0x40/0x58
[   31.222668]  __kasan_kmalloc+0xd4/0xd8
[   31.222719]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.222877]  kmalloc_double_kzfree+0xb8/0x308
[   31.222972]  kunit_try_run_case+0x170/0x3f0
[   31.223190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.223408]  kthread+0x328/0x630
[   31.223476]  ret_from_fork+0x10/0x20
[   31.223620] 
[   31.223671] Freed by task 225:
[   31.223803]  kasan_save_stack+0x3c/0x68
[   31.223915]  kasan_save_track+0x20/0x40
[   31.223975]  kasan_save_free_info+0x4c/0x78
[   31.224360]  __kasan_slab_free+0x6c/0x98
[   31.224429]  kfree+0x214/0x3c8
[   31.224469]  kfree_sensitive+0x80/0xb0
[   31.224519]  kmalloc_double_kzfree+0x11c/0x308
[   31.225385]  kunit_try_run_case+0x170/0x3f0
[   31.225442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.225487]  kthread+0x328/0x630
[   31.225554]  ret_from_fork+0x10/0x20
[   31.225606] 
[   31.225651] The buggy address belongs to the object at fff00000c8603ee0
[   31.225651]  which belongs to the cache kmalloc-16 of size 16
[   31.225733] The buggy address is located 0 bytes inside of
[   31.225733]  freed 16-byte region [fff00000c8603ee0, fff00000c8603ef0)
[   31.226120] 
[   31.226166] The buggy address belongs to the physical page:
[   31.226474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603
[   31.226750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.226830] page_type: f5(slab)
[   31.227038] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.227266] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000
[   31.227351] page dumped because: kasan: bad access detected
[   31.227452] 
[   31.227474] Memory state around the buggy address:
[   31.227696]  fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.227884]  fff00000c8603e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.228106] >fff00000c8603e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.228294]                                                        ^
[   31.228393]  fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.228504]  fff00000c8603f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.228583] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   31.190127] ==================================================================
[   31.190214] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   31.190273] Read of size 1 at addr fff00000c9a6faa8 by task kunit_try_catch/221
[   31.190326] 
[   31.190375] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.190467] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.190507] Hardware name: linux,dummy-virt (DT)
[   31.190539] Call trace:
[   31.190561]  show_stack+0x20/0x38 (C)
[   31.190611]  dump_stack_lvl+0x8c/0xd0
[   31.190659]  print_report+0x118/0x5e8
[   31.190704]  kasan_report+0xdc/0x128
[   31.190747]  __asan_report_load1_noabort+0x20/0x30
[   31.190796]  kmalloc_uaf2+0x3f4/0x468
[   31.190841]  kunit_try_run_case+0x170/0x3f0
[   31.190894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.191764]  kthread+0x328/0x630
[   31.191830]  ret_from_fork+0x10/0x20
[   31.192181] 
[   31.192218] Allocated by task 221:
[   31.192250]  kasan_save_stack+0x3c/0x68
[   31.192299]  kasan_save_track+0x20/0x40
[   31.192335]  kasan_save_alloc_info+0x40/0x58
[   31.192373]  __kasan_kmalloc+0xd4/0xd8
[   31.192569]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.192812]  kmalloc_uaf2+0xc4/0x468
[   31.193050]  kunit_try_run_case+0x170/0x3f0
[   31.193250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.193321]  kthread+0x328/0x630
[   31.193464]  ret_from_fork+0x10/0x20
[   31.193540] 
[   31.193559] Freed by task 221:
[   31.193801]  kasan_save_stack+0x3c/0x68
[   31.193978]  kasan_save_track+0x20/0x40
[   31.194088]  kasan_save_free_info+0x4c/0x78
[   31.194145]  __kasan_slab_free+0x6c/0x98
[   31.194340]  kfree+0x214/0x3c8
[   31.194577]  kmalloc_uaf2+0x134/0x468
[   31.194730]  kunit_try_run_case+0x170/0x3f0
[   31.194821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.194882]  kthread+0x328/0x630
[   31.195080]  ret_from_fork+0x10/0x20
[   31.195336] 
[   31.195362] The buggy address belongs to the object at fff00000c9a6fa80
[   31.195362]  which belongs to the cache kmalloc-64 of size 64
[   31.195635] The buggy address is located 40 bytes inside of
[   31.195635]  freed 64-byte region [fff00000c9a6fa80, fff00000c9a6fac0)
[   31.195858] 
[   31.195882] The buggy address belongs to the physical page:
[   31.195952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a6f
[   31.196468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.196577] page_type: f5(slab)
[   31.196747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.196987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.197127] page dumped because: kasan: bad access detected
[   31.197191] 
[   31.197255] Memory state around the buggy address:
[   31.197327]  fff00000c9a6f980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.197538]  fff00000c9a6fa00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.197705] >fff00000c9a6fa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.197936]                                   ^
[   31.198154]  fff00000c9a6fb00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   31.198284]  fff00000c9a6fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.198367] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   31.174354] ==================================================================
[   31.174419] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   31.174472] Write of size 33 at addr fff00000c9a6f900 by task kunit_try_catch/219
[   31.174672] 
[   31.174718] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.174809] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.175202] Hardware name: linux,dummy-virt (DT)
[   31.175258] Call trace:
[   31.175303]  show_stack+0x20/0x38 (C)
[   31.175357]  dump_stack_lvl+0x8c/0xd0
[   31.175403]  print_report+0x118/0x5e8
[   31.175448]  kasan_report+0xdc/0x128
[   31.175564]  kasan_check_range+0x100/0x1a8
[   31.175641]  __asan_memset+0x34/0x78
[   31.175687]  kmalloc_uaf_memset+0x170/0x310
[   31.175826]  kunit_try_run_case+0x170/0x3f0
[   31.175894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.175965]  kthread+0x328/0x630
[   31.176157]  ret_from_fork+0x10/0x20
[   31.176346] 
[   31.176373] Allocated by task 219:
[   31.176479]  kasan_save_stack+0x3c/0x68
[   31.176541]  kasan_save_track+0x20/0x40
[   31.176617]  kasan_save_alloc_info+0x40/0x58
[   31.176735]  __kasan_kmalloc+0xd4/0xd8
[   31.176768]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.177089]  kmalloc_uaf_memset+0xb8/0x310
[   31.177320]  kunit_try_run_case+0x170/0x3f0
[   31.177539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.177616]  kthread+0x328/0x630
[   31.177766]  ret_from_fork+0x10/0x20
[   31.177850] 
[   31.177875] Freed by task 219:
[   31.178212]  kasan_save_stack+0x3c/0x68
[   31.178283]  kasan_save_track+0x20/0x40
[   31.178397]  kasan_save_free_info+0x4c/0x78
[   31.178478]  __kasan_slab_free+0x6c/0x98
[   31.178565]  kfree+0x214/0x3c8
[   31.178678]  kmalloc_uaf_memset+0x11c/0x310
[   31.178767]  kunit_try_run_case+0x170/0x3f0
[   31.178824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.179187]  kthread+0x328/0x630
[   31.179252]  ret_from_fork+0x10/0x20
[   31.179360] 
[   31.179420] The buggy address belongs to the object at fff00000c9a6f900
[   31.179420]  which belongs to the cache kmalloc-64 of size 64
[   31.179529] The buggy address is located 0 bytes inside of
[   31.179529]  freed 64-byte region [fff00000c9a6f900, fff00000c9a6f940)
[   31.179698] 
[   31.179756] The buggy address belongs to the physical page:
[   31.179792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a6f
[   31.180010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.180193] page_type: f5(slab)
[   31.180277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.180379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.180478] page dumped because: kasan: bad access detected
[   31.180533] 
[   31.180644] Memory state around the buggy address:
[   31.180704]  fff00000c9a6f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.180768]  fff00000c9a6f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.180816] >fff00000c9a6f900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.180854]                    ^
[   31.181070]  fff00000c9a6f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.181259]  fff00000c9a6fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.181332] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   31.158157] ==================================================================
[   31.158494] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   31.158584] Read of size 1 at addr fff00000c8603ec8 by task kunit_try_catch/217
[   31.158701] 
[   31.158739] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.159122] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.159183] Hardware name: linux,dummy-virt (DT)
[   31.159226] Call trace:
[   31.159252]  show_stack+0x20/0x38 (C)
[   31.159306]  dump_stack_lvl+0x8c/0xd0
[   31.159354]  print_report+0x118/0x5e8
[   31.159398]  kasan_report+0xdc/0x128
[   31.159736]  __asan_report_load1_noabort+0x20/0x30
[   31.159808]  kmalloc_uaf+0x300/0x338
[   31.159853]  kunit_try_run_case+0x170/0x3f0
[   31.160196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.160386]  kthread+0x328/0x630
[   31.160439]  ret_from_fork+0x10/0x20
[   31.160508] 
[   31.160614] Allocated by task 217:
[   31.160682]  kasan_save_stack+0x3c/0x68
[   31.160783]  kasan_save_track+0x20/0x40
[   31.160817]  kasan_save_alloc_info+0x40/0x58
[   31.160856]  __kasan_kmalloc+0xd4/0xd8
[   31.161062]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.161265]  kmalloc_uaf+0xb8/0x338
[   31.161359]  kunit_try_run_case+0x170/0x3f0
[   31.161399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.161630]  kthread+0x328/0x630
[   31.161849]  ret_from_fork+0x10/0x20
[   31.161912] 
[   31.161931] Freed by task 217:
[   31.162172]  kasan_save_stack+0x3c/0x68
[   31.162301]  kasan_save_track+0x20/0x40
[   31.162625]  kasan_save_free_info+0x4c/0x78
[   31.162699]  __kasan_slab_free+0x6c/0x98
[   31.162895]  kfree+0x214/0x3c8
[   31.162987]  kmalloc_uaf+0x11c/0x338
[   31.163193]  kunit_try_run_case+0x170/0x3f0
[   31.163534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.163657]  kthread+0x328/0x630
[   31.163740]  ret_from_fork+0x10/0x20
[   31.163979] 
[   31.164030] The buggy address belongs to the object at fff00000c8603ec0
[   31.164030]  which belongs to the cache kmalloc-16 of size 16
[   31.164191] The buggy address is located 8 bytes inside of
[   31.164191]  freed 16-byte region [fff00000c8603ec0, fff00000c8603ed0)
[   31.164293] 
[   31.164339] The buggy address belongs to the physical page:
[   31.164395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603
[   31.164458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.164516] page_type: f5(slab)
[   31.164953] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.165042] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000
[   31.165107] page dumped because: kasan: bad access detected
[   31.165264] 
[   31.165323] Memory state around the buggy address:
[   31.165481]  fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.165598]  fff00000c8603e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.165707] >fff00000c8603e80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   31.165835]                                               ^
[   31.165893]  fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.165949]  fff00000c8603f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.166201] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   31.138266] ==================================================================
[   31.138339] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   31.138585] Read of size 64 at addr fff00000c9a6f604 by task kunit_try_catch/215
[   31.138681] 
[   31.138725] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.138852] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.138885] Hardware name: linux,dummy-virt (DT)
[   31.138928] Call trace:
[   31.139252]  show_stack+0x20/0x38 (C)
[   31.139653]  dump_stack_lvl+0x8c/0xd0
[   31.139956]  print_report+0x118/0x5e8
[   31.140011]  kasan_report+0xdc/0x128
[   31.140067]  kasan_check_range+0x100/0x1a8
[   31.140134]  __asan_memmove+0x3c/0x98
[   31.140186]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   31.140391]  kunit_try_run_case+0x170/0x3f0
[   31.140442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.140494]  kthread+0x328/0x630
[   31.140548]  ret_from_fork+0x10/0x20
[   31.140946] 
[   31.140991] Allocated by task 215:
[   31.141220]  kasan_save_stack+0x3c/0x68
[   31.141748]  kasan_save_track+0x20/0x40
[   31.141818]  kasan_save_alloc_info+0x40/0x58
[   31.141883]  __kasan_kmalloc+0xd4/0xd8
[   31.141947]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.142148]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   31.142213]  kunit_try_run_case+0x170/0x3f0
[   31.142252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.142537]  kthread+0x328/0x630
[   31.142625]  ret_from_fork+0x10/0x20
[   31.142702] 
[   31.143131] The buggy address belongs to the object at fff00000c9a6f600
[   31.143131]  which belongs to the cache kmalloc-64 of size 64
[   31.143201] The buggy address is located 4 bytes inside of
[   31.143201]  allocated 64-byte region [fff00000c9a6f600, fff00000c9a6f640)
[   31.143290] 
[   31.143320] The buggy address belongs to the physical page:
[   31.143368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a6f
[   31.143811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.143888] page_type: f5(slab)
[   31.143960] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.144677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.144741] page dumped because: kasan: bad access detected
[   31.144774] 
[   31.144798] Memory state around the buggy address:
[   31.144859]  fff00000c9a6f500: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.144914]  fff00000c9a6f580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.144957] >fff00000c9a6f600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.145289]                                            ^
[   31.145371]  fff00000c9a6f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.145537]  fff00000c9a6f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.145755] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   30.483423] ==================================================================
[   30.483823] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   30.483919] Read of size 18446744073709551614 at addr fff00000ffebe004 by task kunit_try_catch/213
[   30.484268] 
[   30.484352] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.484682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.484841] Hardware name: linux,dummy-virt (DT)
[   30.484986] Call trace:
[   30.485014]  show_stack+0x20/0x38 (C)
[   30.485068]  dump_stack_lvl+0x8c/0xd0
[   30.485262]  print_report+0x118/0x5e8
[   30.485414]  kasan_report+0xdc/0x128
[   30.485569]  kasan_check_range+0x100/0x1a8
[   30.485640]  __asan_memmove+0x3c/0x98
[   30.486045]  kmalloc_memmove_negative_size+0x154/0x2e0
[   30.486166]  kunit_try_run_case+0x170/0x3f0
[   30.486293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.486538]  kthread+0x328/0x630
[   30.486798]  ret_from_fork+0x10/0x20
[   30.487151] 
[   30.487197] Allocated by task 2846403498:
[   30.487723] ------------[ cut here ]------------
[   30.487945] pool index 44973 out of bounds (219) for stack id adacafae
[   30.491715] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#0: kunit_try_catch/213
[   31.038074] Modules linked in:
[   31.039604] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.040876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.041532] Hardware name: linux,dummy-virt (DT)
[   31.042293] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   31.043298] pc : depot_fetch_stack+0x68/0x88
[   31.043998] lr : depot_fetch_stack+0x68/0x88
[   31.044662] sp : ffff8000809c7a20
[   31.045263] x29: ffff8000809c7a20 x28: ffff91bcfe190000 x27: 1ffff00010010f61
[   31.046414] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4
[   31.047408] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0
[   31.048298] x20: fff00000ffebe004 x19: ffff8000809c7b30 x18: 00000000f558d2a4
[   31.048663] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 0000000000000007
[   31.049017] x14: 0000000000000000 x13: 0000000000000007 x12: ffff700010138ea1
[   31.049358] x11: 1ffff00010138ea0 x10: ffff700010138ea0 x9 : ffff91bcf68f11ec
[   31.049748] x8 : ffff8000809c7507 x7 : 0000000000000001 x6 : ffff700010138ea0
[   31.050936] x5 : ffff8000809c7500 x4 : 1ffe000019367289 x3 : dfff800000000000
[   31.052016] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440
[   31.052948] Call trace:
[   31.053121]  depot_fetch_stack+0x68/0x88 (P)
[   31.053343]  stack_depot_print+0x24/0x60
[   31.053535]  print_report+0x5dc/0x5e8
[   31.053720]  kasan_report+0xdc/0x128
[   31.054304]  kasan_check_range+0x100/0x1a8
[   31.054867]  __asan_memmove+0x3c/0x98
[   31.055465]  kmalloc_memmove_negative_size+0x154/0x2e0
[   31.056305]  kunit_try_run_case+0x170/0x3f0
[   31.056840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.057663]  kthread+0x328/0x630
[   31.058210]  ret_from_fork+0x10/0x20
[   31.058841] ---[ end trace 0000000000000000 ]---
[   31.059815] ------------[ cut here ]------------
[   31.059875] corrupt handle or use after stack_depot_put()
[   31.060163] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/213
[   31.062284] Modules linked in:
[   31.062505] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.063232] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.063976] Hardware name: linux,dummy-virt (DT)
[   31.064668] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   31.065618] pc : stack_depot_print+0x54/0x60
[   31.066265] lr : stack_depot_print+0x54/0x60
[   31.066913] sp : ffff8000809c7a30
[   31.067507] x29: ffff8000809c7a30 x28: ffff91bcfe190000 x27: 1ffff00010010f61
[   31.068344] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4
[   31.068714] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0
[   31.069803] x20: fff00000ffebe004 x19: ffff8000809c7b30 x18: 00000000f558d2a4
[   31.070936] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   31.071974] x14: ffff700010138f26 x13: 1ffe000019367289 x12: ffff72379fb15509
[   31.073015] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec
[   31.073771] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508
[   31.074152] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000
[   31.074509] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440
[   31.074857] Call trace:
[   31.075526]  stack_depot_print+0x54/0x60 (P)
[   31.076478]  print_report+0x5dc/0x5e8
[   31.077040]  kasan_report+0xdc/0x128
[   31.077631]  kasan_check_range+0x100/0x1a8
[   31.078338]  __asan_memmove+0x3c/0x98
[   31.078949]  kmalloc_memmove_negative_size+0x154/0x2e0
[   31.079728]  kunit_try_run_case+0x170/0x3f0
[   31.080373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.081185]  kthread+0x328/0x630
[   31.081717]  ret_from_fork+0x10/0x20
[   31.082170] ---[ end trace 0000000000000000 ]---
[   31.082494] 
[   31.082528] Last potentially related work creation:
[   31.082567] ------------[ cut here ]------------
[   31.082591] pool index 43945 out of bounds (219) for stack id a9a8abaa
[   31.082694] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#0: kunit_try_catch/213
[   31.083950] Modules linked in:
[   31.084192] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.084727] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.084985] Hardware name: linux,dummy-virt (DT)
[   31.085246] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   31.085612] pc : depot_fetch_stack+0x68/0x88
[   31.085871] lr : depot_fetch_stack+0x68/0x88
[   31.086092] sp : ffff8000809c7a00
[   31.086285] x29: ffff8000809c7a00 x28: ffff91bcfe190000 x27: 1ffff00010010f61
[   31.086748] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4
[   31.087160] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0
[   31.087574] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4
[   31.088012] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 0000000000000007
[   31.088416] x14: 0000000000000000 x13: 0000000000000007 x12: ffff72379fb15509
[   31.088828] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec
[   31.089235] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508
[   31.089664] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000
[   31.090081] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440
[   31.090538] Call trace:
[   31.090684]  depot_fetch_stack+0x68/0x88 (P)
[   31.090971]  stack_depot_print+0x24/0x60
[   31.091228]  kasan_print_aux_stacks+0x50/0x98
[   31.091480]  print_report+0x348/0x5e8
[   31.091737]  kasan_report+0xdc/0x128
[   31.091974]  kasan_check_range+0x100/0x1a8
[   31.092195]  __asan_memmove+0x3c/0x98
[   31.092436]  kmalloc_memmove_negative_size+0x154/0x2e0
[   31.092721]  kunit_try_run_case+0x170/0x3f0
[   31.092966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.093278]  kthread+0x328/0x630
[   31.093490]  ret_from_fork+0x10/0x20
[   31.093692] ---[ end trace 0000000000000000 ]---
[   31.093946] ------------[ cut here ]------------
[   31.093974] corrupt handle or use after stack_depot_put()
[   31.094060] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/213
[   31.095024] Modules linked in:
[   31.095269] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.095817] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.096059] Hardware name: linux,dummy-virt (DT)
[   31.096330] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   31.096688] pc : stack_depot_print+0x54/0x60
[   31.096973] lr : stack_depot_print+0x54/0x60
[   31.097211] sp : ffff8000809c7a10
[   31.097421] x29: ffff8000809c7a10 x28: ffff91bcfe190000 x27: 1ffff00010010f61
[   31.097848] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4
[   31.098277] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0
[   31.098691] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4
[   31.099106] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   31.099568] x14: ffff700010138f22 x13: 1ffe000019367289 x12: ffff72379fb15509
[   31.100027] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec
[   31.100451] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508
[   31.100865] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000
[   31.101288] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440
[   31.101697] Call trace:
[   31.101870]  stack_depot_print+0x54/0x60 (P)
[   31.102138]  kasan_print_aux_stacks+0x50/0x98
[   31.102403]  print_report+0x348/0x5e8
[   31.102650]  kasan_report+0xdc/0x128
[   31.102863]  kasan_check_range+0x100/0x1a8
[   31.103133]  __asan_memmove+0x3c/0x98
[   31.103363]  kmalloc_memmove_negative_size+0x154/0x2e0
[   31.103670]  kunit_try_run_case+0x170/0x3f0
[   31.103944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.104251]  kthread+0x328/0x630
[   31.104447]  ret_from_fork+0x10/0x20
[   31.104695] ---[ end trace 0000000000000000 ]---
[   31.104988] 
[   31.105030] Second to last potentially related work creation:
[   31.105069] ------------[ cut here ]------------
[   31.105094] pool index 44973 out of bounds (219) for stack id adacafae
[   31.105200] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#0: kunit_try_catch/213
[   31.106545] Modules linked in:
[   31.106796] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.107355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.107600] Hardware name: linux,dummy-virt (DT)
[   31.107873] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   31.108204] pc : depot_fetch_stack+0x68/0x88
[   31.108472] lr : depot_fetch_stack+0x68/0x88
[   31.108735] sp : ffff8000809c7a00
[   31.108942] x29: ffff8000809c7a00 x28: ffff91bcfe190000 x27: 1ffff00010010f61
[   31.109369] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4
[   31.109756] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0
[   31.110151] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4
[   31.110607] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 0000000000000007
[   31.111046] x14: 0000000000000000 x13: 0000000000000007 x12: ffff72379fb15509
[   31.111473] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec
[   31.111889] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508
[   31.112318] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000
[   31.112709] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440
[   31.113158] Call trace:
[   31.113323]  depot_fetch_stack+0x68/0x88 (P)
[   31.113598]  stack_depot_print+0x24/0x60
[   31.113802]  kasan_print_aux_stacks+0x78/0x98
[   31.114090]  print_report+0x348/0x5e8
[   31.114282]  kasan_report+0xdc/0x128
[   31.114530]  kasan_check_range+0x100/0x1a8
[   31.114767]  __asan_memmove+0x3c/0x98
[   31.115022]  kmalloc_memmove_negative_size+0x154/0x2e0
[   31.115299]  kunit_try_run_case+0x170/0x3f0
[   31.115544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.115856]  kthread+0x328/0x630
[   31.116091]  ret_from_fork+0x10/0x20
[   31.116294] ---[ end trace 0000000000000000 ]---
[   31.116576] ------------[ cut here ]------------
[   31.116607] corrupt handle or use after stack_depot_put()
[   31.116697] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/213
[   31.117618] Modules linked in:
[   31.117859] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.118426] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.118675] Hardware name: linux,dummy-virt (DT)
[   31.118954] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   31.119309] pc : stack_depot_print+0x54/0x60
[   31.119565] lr : stack_depot_print+0x54/0x60
[   31.119811] sp : ffff8000809c7a10
[   31.120007] x29: ffff8000809c7a10 x28: ffff91bcfe190000 x27: 1ffff00010010f61
[   31.120417] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4
[   31.120869] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0
[   31.121254] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4
[   31.121715] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   31.122178] x14: ffff700010138f22 x13: 1ffe000019367289 x12: ffff72379fb15509
[   31.122609] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec
[   31.123035] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508
[   31.123444] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000
[   31.123853] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440
[   31.124268] Call trace:
[   31.124439]  stack_depot_print+0x54/0x60 (P)
[   31.124694]  kasan_print_aux_stacks+0x78/0x98
[   31.124957]  print_report+0x348/0x5e8
[   31.125189]  kasan_report+0xdc/0x128
[   31.125407]  kasan_check_range+0x100/0x1a8
[   31.125690]  __asan_memmove+0x3c/0x98
[   31.125928]  kmalloc_memmove_negative_size+0x154/0x2e0
[   31.126221]  kunit_try_run_case+0x170/0x3f0
[   31.126470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.126794]  kthread+0x328/0x630
[   31.127006]  ret_from_fork+0x10/0x20
[   31.127254] ---[ end trace 0000000000000000 ]---
[   31.127569] 
[   31.127612] The buggy address belongs to the object at fff00000ffebe000
[   31.127612]  which belongs to the cache kmalloc-64 of size 64
[   31.127676] The buggy address is located 4 bytes inside of
[   31.127676]  64-byte region [fff00000ffebe000, fff00000ffebe040)
[   31.127735] 
[   31.127760] The buggy address belongs to the physical page:
[   31.127799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13febe
[   31.127863] memcg:fff00000d9d43e71
[   31.127892] flags: 0xbfffe0000002000(reserved|node=0|zone=2|lastcpupid=0x1ffff)
[   31.127968] page_type: f5(slab)
[   31.128009] raw: 0bfffe0000002000 fff00000c00018c0 ffffc1ffc3ffaf88 0000000000000000
[   31.128061] raw: 0000000000000000 0000000000010000 00000001f5000000 fff00000d9d43e71
[   31.128102] page dumped because: kasan: bad access detected
[   31.128131] 
[   31.128151] Memory state around the buggy address:
[   31.128185]  fff00000ffebdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.128229]  fff00000ffebdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.128272] >fff00000ffebe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.128310]                    ^
[   31.128343]  fff00000ffebe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.128385]  fff00000ffebe100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.128427] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   30.466204] ==================================================================
[   30.466274] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.466413] Write of size 16 at addr fff00000c99bcd69 by task kunit_try_catch/211
[   30.466465] 
[   30.466786] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.467006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.467067] Hardware name: linux,dummy-virt (DT)
[   30.467105] Call trace:
[   30.467143]  show_stack+0x20/0x38 (C)
[   30.467251]  dump_stack_lvl+0x8c/0xd0
[   30.467297]  print_report+0x118/0x5e8
[   30.467339]  kasan_report+0xdc/0x128
[   30.467386]  kasan_check_range+0x100/0x1a8
[   30.467429]  __asan_memset+0x34/0x78
[   30.467615]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.467678]  kunit_try_run_case+0x170/0x3f0
[   30.467725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.467911]  kthread+0x328/0x630
[   30.467968]  ret_from_fork+0x10/0x20
[   30.468017] 
[   30.468035] Allocated by task 211:
[   30.468062]  kasan_save_stack+0x3c/0x68
[   30.468101]  kasan_save_track+0x20/0x40
[   30.468135]  kasan_save_alloc_info+0x40/0x58
[   30.468171]  __kasan_kmalloc+0xd4/0xd8
[   30.468204]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.468244]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.468281]  kunit_try_run_case+0x170/0x3f0
[   30.468317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.468358]  kthread+0x328/0x630
[   30.468389]  ret_from_fork+0x10/0x20
[   30.468423] 
[   30.468515] The buggy address belongs to the object at fff00000c99bcd00
[   30.468515]  which belongs to the cache kmalloc-128 of size 128
[   30.468826] The buggy address is located 105 bytes inside of
[   30.468826]  allocated 120-byte region [fff00000c99bcd00, fff00000c99bcd78)
[   30.469479] 
[   30.469523] The buggy address belongs to the physical page:
[   30.469663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   30.469778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.469959] page_type: f5(slab)
[   30.470014] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.470168] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.470278] page dumped because: kasan: bad access detected
[   30.470334] 
[   30.470361] Memory state around the buggy address:
[   30.470585]  fff00000c99bcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.470822]  fff00000c99bcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.470873] >fff00000c99bcd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.471088]                                                                 ^
[   30.471691]  fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.471762]  fff00000c99bce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.472060] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   30.448381] ==================================================================
[   30.448606] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   30.448958] Write of size 8 at addr fff00000c99bcc71 by task kunit_try_catch/209
[   30.449019] 
[   30.449056] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.449143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.449168] Hardware name: linux,dummy-virt (DT)
[   30.449599] Call trace:
[   30.449681]  show_stack+0x20/0x38 (C)
[   30.449944]  dump_stack_lvl+0x8c/0xd0
[   30.450110]  print_report+0x118/0x5e8
[   30.450217]  kasan_report+0xdc/0x128
[   30.450273]  kasan_check_range+0x100/0x1a8
[   30.450492]  __asan_memset+0x34/0x78
[   30.450546]  kmalloc_oob_memset_8+0x150/0x2f8
[   30.450592]  kunit_try_run_case+0x170/0x3f0
[   30.450762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.450851]  kthread+0x328/0x630
[   30.450893]  ret_from_fork+0x10/0x20
[   30.450961] 
[   30.450979] Allocated by task 209:
[   30.451022]  kasan_save_stack+0x3c/0x68
[   30.451064]  kasan_save_track+0x20/0x40
[   30.451098]  kasan_save_alloc_info+0x40/0x58
[   30.451142]  __kasan_kmalloc+0xd4/0xd8
[   30.451192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.451243]  kmalloc_oob_memset_8+0xb0/0x2f8
[   30.451281]  kunit_try_run_case+0x170/0x3f0
[   30.451324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.451375]  kthread+0x328/0x630
[   30.451409]  ret_from_fork+0x10/0x20
[   30.451454] 
[   30.451494] The buggy address belongs to the object at fff00000c99bcc00
[   30.451494]  which belongs to the cache kmalloc-128 of size 128
[   30.451550] The buggy address is located 113 bytes inside of
[   30.451550]  allocated 120-byte region [fff00000c99bcc00, fff00000c99bcc78)
[   30.451612] 
[   30.451641] The buggy address belongs to the physical page:
[   30.451676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   30.451728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.451776] page_type: f5(slab)
[   30.451813] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.451860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.451908] page dumped because: kasan: bad access detected
[   30.451978] 
[   30.452026] Memory state around the buggy address:
[   30.452080]  fff00000c99bcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.452617]  fff00000c99bcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.452777] >fff00000c99bcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.452819]                                                                 ^
[   30.453134]  fff00000c99bcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.453181]  fff00000c99bcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.453454] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   30.427375] ==================================================================
[   30.427432] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   30.427494] Write of size 4 at addr fff00000c99bcb75 by task kunit_try_catch/207
[   30.427541] 
[   30.427575] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.427678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.427705] Hardware name: linux,dummy-virt (DT)
[   30.427745] Call trace:
[   30.427768]  show_stack+0x20/0x38 (C)
[   30.427816]  dump_stack_lvl+0x8c/0xd0
[   30.427871]  print_report+0x118/0x5e8
[   30.428784]  kasan_report+0xdc/0x128
[   30.428841]  kasan_check_range+0x100/0x1a8
[   30.428889]  __asan_memset+0x34/0x78
[   30.428942]  kmalloc_oob_memset_4+0x150/0x300
[   30.428988]  kunit_try_run_case+0x170/0x3f0
[   30.429659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.429755]  kthread+0x328/0x630
[   30.429888]  ret_from_fork+0x10/0x20
[   30.429975] 
[   30.430032] Allocated by task 207:
[   30.430213]  kasan_save_stack+0x3c/0x68
[   30.430426]  kasan_save_track+0x20/0x40
[   30.430508]  kasan_save_alloc_info+0x40/0x58
[   30.430682]  __kasan_kmalloc+0xd4/0xd8
[   30.430758]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.430820]  kmalloc_oob_memset_4+0xb0/0x300
[   30.431052]  kunit_try_run_case+0x170/0x3f0
[   30.431171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.431329]  kthread+0x328/0x630
[   30.431493]  ret_from_fork+0x10/0x20
[   30.431574] 
[   30.431692] The buggy address belongs to the object at fff00000c99bcb00
[   30.431692]  which belongs to the cache kmalloc-128 of size 128
[   30.431770] The buggy address is located 117 bytes inside of
[   30.431770]  allocated 120-byte region [fff00000c99bcb00, fff00000c99bcb78)
[   30.431871] 
[   30.432111] The buggy address belongs to the physical page:
[   30.432725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   30.433170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.433245] page_type: f5(slab)
[   30.433319] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.433395] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.433529] page dumped because: kasan: bad access detected
[   30.433833] 
[   30.433995] Memory state around the buggy address:
[   30.434055]  fff00000c99bca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.434606]  fff00000c99bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.434666] >fff00000c99bcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.434750]                                                                 ^
[   30.435038]  fff00000c99bcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.435256]  fff00000c99bcc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.435490] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   30.411571] ==================================================================
[   30.411653] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   30.411909] Write of size 2 at addr fff00000c99bca77 by task kunit_try_catch/205
[   30.411975] 
[   30.412035] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.412276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.412302] Hardware name: linux,dummy-virt (DT)
[   30.412648] Call trace:
[   30.412694]  show_stack+0x20/0x38 (C)
[   30.412785]  dump_stack_lvl+0x8c/0xd0
[   30.412893]  print_report+0x118/0x5e8
[   30.412987]  kasan_report+0xdc/0x128
[   30.413333]  kasan_check_range+0x100/0x1a8
[   30.413472]  __asan_memset+0x34/0x78
[   30.413541]  kmalloc_oob_memset_2+0x150/0x2f8
[   30.413784]  kunit_try_run_case+0x170/0x3f0
[   30.414026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.414139]  kthread+0x328/0x630
[   30.414294]  ret_from_fork+0x10/0x20
[   30.414433] 
[   30.414483] Allocated by task 205:
[   30.414565]  kasan_save_stack+0x3c/0x68
[   30.415042]  kasan_save_track+0x20/0x40
[   30.415182]  kasan_save_alloc_info+0x40/0x58
[   30.415261]  __kasan_kmalloc+0xd4/0xd8
[   30.415430]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.415487]  kmalloc_oob_memset_2+0xb0/0x2f8
[   30.415557]  kunit_try_run_case+0x170/0x3f0
[   30.415805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.416106]  kthread+0x328/0x630
[   30.416308]  ret_from_fork+0x10/0x20
[   30.416383] 
[   30.416660] The buggy address belongs to the object at fff00000c99bca00
[   30.416660]  which belongs to the cache kmalloc-128 of size 128
[   30.416842] The buggy address is located 119 bytes inside of
[   30.416842]  allocated 120-byte region [fff00000c99bca00, fff00000c99bca78)
[   30.417009] 
[   30.417068] The buggy address belongs to the physical page:
[   30.417224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   30.417329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.417431] page_type: f5(slab)
[   30.417473] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.417542] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.417939] page dumped because: kasan: bad access detected
[   30.418095] 
[   30.418154] Memory state around the buggy address:
[   30.418223]  fff00000c99bc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.418407]  fff00000c99bc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.418467] >fff00000c99bca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.418664]                                                                 ^
[   30.418976]  fff00000c99bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.419079]  fff00000c99bcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.419180] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   30.390481] ==================================================================
[   30.390928] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   30.391228] Write of size 128 at addr fff00000c99bc900 by task kunit_try_catch/203
[   30.391500] 
[   30.391600] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.391762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.391846] Hardware name: linux,dummy-virt (DT)
[   30.391880] Call trace:
[   30.391914]  show_stack+0x20/0x38 (C)
[   30.391967]  dump_stack_lvl+0x8c/0xd0
[   30.392193]  print_report+0x118/0x5e8
[   30.392240]  kasan_report+0xdc/0x128
[   30.392283]  kasan_check_range+0x100/0x1a8
[   30.392564]  __asan_memset+0x34/0x78
[   30.392651]  kmalloc_oob_in_memset+0x144/0x2d0
[   30.392745]  kunit_try_run_case+0x170/0x3f0
[   30.392974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.393231]  kthread+0x328/0x630
[   30.393318]  ret_from_fork+0x10/0x20
[   30.393450] 
[   30.393499] Allocated by task 203:
[   30.393545]  kasan_save_stack+0x3c/0x68
[   30.393681]  kasan_save_track+0x20/0x40
[   30.393758]  kasan_save_alloc_info+0x40/0x58
[   30.393913]  __kasan_kmalloc+0xd4/0xd8
[   30.393965]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.394219]  kmalloc_oob_in_memset+0xb0/0x2d0
[   30.394428]  kunit_try_run_case+0x170/0x3f0
[   30.394503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.394713]  kthread+0x328/0x630
[   30.394965]  ret_from_fork+0x10/0x20
[   30.395110] 
[   30.395213] The buggy address belongs to the object at fff00000c99bc900
[   30.395213]  which belongs to the cache kmalloc-128 of size 128
[   30.395343] The buggy address is located 0 bytes inside of
[   30.395343]  allocated 120-byte region [fff00000c99bc900, fff00000c99bc978)
[   30.395831] 
[   30.395875] The buggy address belongs to the physical page:
[   30.395935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   30.396294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.396515] page_type: f5(slab)
[   30.396732] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.397068] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.397145] page dumped because: kasan: bad access detected
[   30.397200] 
[   30.397338] Memory state around the buggy address:
[   30.397447]  fff00000c99bc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.397604]  fff00000c99bc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.397776] >fff00000c99bc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.397956]                                                                 ^
[   30.398117]  fff00000c99bc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.398199]  fff00000c99bca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.398289] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   30.368340] ==================================================================
[   30.368587] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   30.368690] Read of size 16 at addr fff00000c8603ea0 by task kunit_try_catch/201
[   30.368743] 
[   30.368799] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.369058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.369087] Hardware name: linux,dummy-virt (DT)
[   30.369120] Call trace:
[   30.369276]  show_stack+0x20/0x38 (C)
[   30.369433]  dump_stack_lvl+0x8c/0xd0
[   30.369562]  print_report+0x118/0x5e8
[   30.369664]  kasan_report+0xdc/0x128
[   30.369829]  __asan_report_load16_noabort+0x20/0x30
[   30.369932]  kmalloc_uaf_16+0x3bc/0x438
[   30.369991]  kunit_try_run_case+0x170/0x3f0
[   30.370435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.371309]  kthread+0x328/0x630
[   30.371388]  ret_from_fork+0x10/0x20
[   30.371520] 
[   30.371540] Allocated by task 201:
[   30.371588]  kasan_save_stack+0x3c/0x68
[   30.371925]  kasan_save_track+0x20/0x40
[   30.372070]  kasan_save_alloc_info+0x40/0x58
[   30.372166]  __kasan_kmalloc+0xd4/0xd8
[   30.372340]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.372469]  kmalloc_uaf_16+0x140/0x438
[   30.372509]  kunit_try_run_case+0x170/0x3f0
[   30.372565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.372750]  kthread+0x328/0x630
[   30.372983]  ret_from_fork+0x10/0x20
[   30.373286] 
[   30.373312] Freed by task 201:
[   30.373491]  kasan_save_stack+0x3c/0x68
[   30.374319]  kasan_save_track+0x20/0x40
[   30.374420]  kasan_save_free_info+0x4c/0x78
[   30.374611]  __kasan_slab_free+0x6c/0x98
[   30.374685]  kfree+0x214/0x3c8
[   30.375149]  kmalloc_uaf_16+0x190/0x438
[   30.375404]  kunit_try_run_case+0x170/0x3f0
[   30.375481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.375641]  kthread+0x328/0x630
[   30.375708]  ret_from_fork+0x10/0x20
[   30.375816] 
[   30.375866] The buggy address belongs to the object at fff00000c8603ea0
[   30.375866]  which belongs to the cache kmalloc-16 of size 16
[   30.375985] The buggy address is located 0 bytes inside of
[   30.375985]  freed 16-byte region [fff00000c8603ea0, fff00000c8603eb0)
[   30.376241] 
[   30.376516] The buggy address belongs to the physical page:
[   30.376570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603
[   30.376632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.376682] page_type: f5(slab)
[   30.376953] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.377132] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000
[   30.377254] page dumped because: kasan: bad access detected
[   30.377285] 
[   30.377349] Memory state around the buggy address:
[   30.377522]  fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.377569]  fff00000c8603e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.377734] >fff00000c8603e80: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.377819]                                ^
[   30.377880]  fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.377950]  fff00000c8603f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.377996] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   30.351937] ==================================================================
[   30.352008] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   30.352061] Write of size 16 at addr fff00000c8603e40 by task kunit_try_catch/199
[   30.352110] 
[   30.352208] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.352316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.352352] Hardware name: linux,dummy-virt (DT)
[   30.352382] Call trace:
[   30.352411]  show_stack+0x20/0x38 (C)
[   30.352467]  dump_stack_lvl+0x8c/0xd0
[   30.352514]  print_report+0x118/0x5e8
[   30.353360]  kasan_report+0xdc/0x128
[   30.353472]  __asan_report_store16_noabort+0x20/0x30
[   30.353551]  kmalloc_oob_16+0x3a0/0x3f8
[   30.353797]  kunit_try_run_case+0x170/0x3f0
[   30.354059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.354195]  kthread+0x328/0x630
[   30.354294]  ret_from_fork+0x10/0x20
[   30.354423] 
[   30.354472] Allocated by task 199:
[   30.354539]  kasan_save_stack+0x3c/0x68
[   30.354870]  kasan_save_track+0x20/0x40
[   30.355044]  kasan_save_alloc_info+0x40/0x58
[   30.355135]  __kasan_kmalloc+0xd4/0xd8
[   30.355242]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.355320]  kmalloc_oob_16+0xb4/0x3f8
[   30.355425]  kunit_try_run_case+0x170/0x3f0
[   30.355495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.355537]  kthread+0x328/0x630
[   30.355728]  ret_from_fork+0x10/0x20
[   30.355922] 
[   30.356084] The buggy address belongs to the object at fff00000c8603e40
[   30.356084]  which belongs to the cache kmalloc-16 of size 16
[   30.356177] The buggy address is located 0 bytes inside of
[   30.356177]  allocated 13-byte region [fff00000c8603e40, fff00000c8603e4d)
[   30.356303] 
[   30.356351] The buggy address belongs to the physical page:
[   30.356389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603
[   30.356798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.356857] page_type: f5(slab)
[   30.356907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.357263] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000
[   30.357518] page dumped because: kasan: bad access detected
[   30.357608] 
[   30.357700] Memory state around the buggy address:
[   30.357804]  fff00000c8603d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.357875]  fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.357974] >fff00000c8603e00: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   30.358140]                                               ^
[   30.358336]  fff00000c8603e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.358518]  fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.358662] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   30.318864] ==================================================================
[   30.318982] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   30.319281] Read of size 1 at addr fff00000c91e6600 by task kunit_try_catch/197
[   30.319463] 
[   30.319512] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.319760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.319831] Hardware name: linux,dummy-virt (DT)
[   30.320123] Call trace:
[   30.320180]  show_stack+0x20/0x38 (C)
[   30.320645]  dump_stack_lvl+0x8c/0xd0
[   30.320828]  print_report+0x118/0x5e8
[   30.321164]  kasan_report+0xdc/0x128
[   30.321246]  __kasan_check_byte+0x54/0x70
[   30.321354]  krealloc_noprof+0x44/0x360
[   30.321421]  krealloc_uaf+0x180/0x520
[   30.321529]  kunit_try_run_case+0x170/0x3f0
[   30.321631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.321729]  kthread+0x328/0x630
[   30.321837]  ret_from_fork+0x10/0x20
[   30.321954] 
[   30.322013] Allocated by task 197:
[   30.322071]  kasan_save_stack+0x3c/0x68
[   30.322143]  kasan_save_track+0x20/0x40
[   30.322614]  kasan_save_alloc_info+0x40/0x58
[   30.322680]  __kasan_kmalloc+0xd4/0xd8
[   30.322865]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.323052]  krealloc_uaf+0xc8/0x520
[   30.323260]  kunit_try_run_case+0x170/0x3f0
[   30.323316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.323497]  kthread+0x328/0x630
[   30.323628]  ret_from_fork+0x10/0x20
[   30.323793] 
[   30.323983] Freed by task 197:
[   30.324159]  kasan_save_stack+0x3c/0x68
[   30.324516]  kasan_save_track+0x20/0x40
[   30.324768]  kasan_save_free_info+0x4c/0x78
[   30.324816]  __kasan_slab_free+0x6c/0x98
[   30.324954]  kfree+0x214/0x3c8
[   30.325040]  krealloc_uaf+0x12c/0x520
[   30.325223]  kunit_try_run_case+0x170/0x3f0
[   30.325310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.325704]  kthread+0x328/0x630
[   30.325933]  ret_from_fork+0x10/0x20
[   30.326218] 
[   30.326365] The buggy address belongs to the object at fff00000c91e6600
[   30.326365]  which belongs to the cache kmalloc-256 of size 256
[   30.326504] The buggy address is located 0 bytes inside of
[   30.326504]  freed 256-byte region [fff00000c91e6600, fff00000c91e6700)
[   30.326950] 
[   30.327005] The buggy address belongs to the physical page:
[   30.327050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6
[   30.327293] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.327548] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.327771] page_type: f5(slab)
[   30.327968] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.328137] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.328234] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.328487] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.328745] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff
[   30.328799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.329076] page dumped because: kasan: bad access detected
[   30.329204] 
[   30.329275] Memory state around the buggy address:
[   30.329363]  fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.329416]  fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.329607] >fff00000c91e6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.329856]                    ^
[   30.330048]  fff00000c91e6680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.330415]  fff00000c91e6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.330575] ==================================================================
[   30.334027] ==================================================================
[   30.334081] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   30.334132] Read of size 1 at addr fff00000c91e6600 by task kunit_try_catch/197
[   30.334512] 
[   30.334725] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.334818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.334844] Hardware name: linux,dummy-virt (DT)
[   30.335058] Call trace:
[   30.335081]  show_stack+0x20/0x38 (C)
[   30.335133]  dump_stack_lvl+0x8c/0xd0
[   30.335574]  print_report+0x118/0x5e8
[   30.335644]  kasan_report+0xdc/0x128
[   30.335948]  __asan_report_load1_noabort+0x20/0x30
[   30.336076]  krealloc_uaf+0x4c8/0x520
[   30.336187]  kunit_try_run_case+0x170/0x3f0
[   30.336245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.336312]  kthread+0x328/0x630
[   30.336408]  ret_from_fork+0x10/0x20
[   30.336475] 
[   30.336513] Allocated by task 197:
[   30.336547]  kasan_save_stack+0x3c/0x68
[   30.336587]  kasan_save_track+0x20/0x40
[   30.336944]  kasan_save_alloc_info+0x40/0x58
[   30.337077]  __kasan_kmalloc+0xd4/0xd8
[   30.337144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.337306]  krealloc_uaf+0xc8/0x520
[   30.337383]  kunit_try_run_case+0x170/0x3f0
[   30.337488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.337554]  kthread+0x328/0x630
[   30.337607]  ret_from_fork+0x10/0x20
[   30.337980] 
[   30.338059] Freed by task 197:
[   30.338088]  kasan_save_stack+0x3c/0x68
[   30.338150]  kasan_save_track+0x20/0x40
[   30.338194]  kasan_save_free_info+0x4c/0x78
[   30.338239]  __kasan_slab_free+0x6c/0x98
[   30.338273]  kfree+0x214/0x3c8
[   30.338306]  krealloc_uaf+0x12c/0x520
[   30.338358]  kunit_try_run_case+0x170/0x3f0
[   30.338403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.338453]  kthread+0x328/0x630
[   30.338503]  ret_from_fork+0x10/0x20
[   30.338538] 
[   30.338556] The buggy address belongs to the object at fff00000c91e6600
[   30.338556]  which belongs to the cache kmalloc-256 of size 256
[   30.338628] The buggy address is located 0 bytes inside of
[   30.338628]  freed 256-byte region [fff00000c91e6600, fff00000c91e6700)
[   30.338700] 
[   30.338738] The buggy address belongs to the physical page:
[   30.338773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6
[   30.338833] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.338877] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.339213] page_type: f5(slab)
[   30.339517] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.339600] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.339757] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.339847] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.339960] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff
[   30.340019] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.340113] page dumped because: kasan: bad access detected
[   30.340372] 
[   30.340515] Memory state around the buggy address:
[   30.340613]  fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.340721]  fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.340859] >fff00000c91e6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.340919]                    ^
[   30.340949]  fff00000c91e6680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.340995]  fff00000c91e6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.341031] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   30.292031] ==================================================================
[   30.292087] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.292140] Write of size 1 at addr fff00000c9ae60da by task kunit_try_catch/195
[   30.292188] 
[   30.292414] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.292564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.292700] Hardware name: linux,dummy-virt (DT)
[   30.292736] Call trace:
[   30.293452]  show_stack+0x20/0x38 (C)
[   30.293540]  dump_stack_lvl+0x8c/0xd0
[   30.293618]  print_report+0x118/0x5e8
[   30.293664]  kasan_report+0xdc/0x128
[   30.293876]  __asan_report_store1_noabort+0x20/0x30
[   30.294178]  krealloc_less_oob_helper+0xa80/0xc50
[   30.294425]  krealloc_large_less_oob+0x20/0x38
[   30.294513]  kunit_try_run_case+0x170/0x3f0
[   30.294598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.294650]  kthread+0x328/0x630
[   30.294699]  ret_from_fork+0x10/0x20
[   30.294748] 
[   30.294769] The buggy address belongs to the physical page:
[   30.294805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4
[   30.294856] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.294920] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.294972] page_type: f8(unknown)
[   30.295018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.295072] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.295118] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.295173] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.295236] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff
[   30.295298] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.295336] page dumped because: kasan: bad access detected
[   30.295365] 
[   30.295388] Memory state around the buggy address:
[   30.295433]  fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.295474]  fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.295514] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.295560]                                                     ^
[   30.295598]  fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.295648]  fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.295684] ==================================================================
[   30.284304] ==================================================================
[   30.284350] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.284509] Write of size 1 at addr fff00000c9ae60d0 by task kunit_try_catch/195
[   30.285045] 
[   30.285153] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.285239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.285265] Hardware name: linux,dummy-virt (DT)
[   30.285294] Call trace:
[   30.285315]  show_stack+0x20/0x38 (C)
[   30.285891]  dump_stack_lvl+0x8c/0xd0
[   30.286011]  print_report+0x118/0x5e8
[   30.286157]  kasan_report+0xdc/0x128
[   30.286233]  __asan_report_store1_noabort+0x20/0x30
[   30.286304]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.286687]  krealloc_large_less_oob+0x20/0x38
[   30.286834]  kunit_try_run_case+0x170/0x3f0
[   30.287001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.287248]  kthread+0x328/0x630
[   30.287487]  ret_from_fork+0x10/0x20
[   30.287570] 
[   30.287591] The buggy address belongs to the physical page:
[   30.287786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4
[   30.288049] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.288194] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.288300] page_type: f8(unknown)
[   30.288377] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.288662] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.288845] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.289012] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.289100] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff
[   30.289253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.289343] page dumped because: kasan: bad access detected
[   30.289399] 
[   30.289422] Memory state around the buggy address:
[   30.289453]  fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.289496]  fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.289745] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.289987]                                                  ^
[   30.290126]  fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.290201]  fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.290250] ==================================================================
[   30.218815] ==================================================================
[   30.218883] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.218969] Write of size 1 at addr fff00000c91e64c9 by task kunit_try_catch/191
[   30.219072] 
[   30.219163] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.219269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.219306] Hardware name: linux,dummy-virt (DT)
[   30.219339] Call trace:
[   30.219362]  show_stack+0x20/0x38 (C)
[   30.219652]  dump_stack_lvl+0x8c/0xd0
[   30.219699]  print_report+0x118/0x5e8
[   30.219760]  kasan_report+0xdc/0x128
[   30.219834]  __asan_report_store1_noabort+0x20/0x30
[   30.219923]  krealloc_less_oob_helper+0xa48/0xc50
[   30.219996]  krealloc_less_oob+0x20/0x38
[   30.220043]  kunit_try_run_case+0x170/0x3f0
[   30.220111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.220195]  kthread+0x328/0x630
[   30.220498]  ret_from_fork+0x10/0x20
[   30.220563] 
[   30.220581] Allocated by task 191:
[   30.220609]  kasan_save_stack+0x3c/0x68
[   30.220670]  kasan_save_track+0x20/0x40
[   30.220704]  kasan_save_alloc_info+0x40/0x58
[   30.220800]  __kasan_krealloc+0x118/0x178
[   30.220860]  krealloc_noprof+0x128/0x360
[   30.221002]  krealloc_less_oob_helper+0x168/0xc50
[   30.221070]  krealloc_less_oob+0x20/0x38
[   30.221188]  kunit_try_run_case+0x170/0x3f0
[   30.221276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.221368]  kthread+0x328/0x630
[   30.221402]  ret_from_fork+0x10/0x20
[   30.221436] 
[   30.221472] The buggy address belongs to the object at fff00000c91e6400
[   30.221472]  which belongs to the cache kmalloc-256 of size 256
[   30.221709] The buggy address is located 0 bytes to the right of
[   30.221709]  allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9)
[   30.221774] 
[   30.221794] The buggy address belongs to the physical page:
[   30.221834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6
[   30.221944] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.222025] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.222103] page_type: f5(slab)
[   30.222143] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.222190] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.222237] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.222355] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.222402] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff
[   30.222448] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.222523] page dumped because: kasan: bad access detected
[   30.222619] 
[   30.222688] Memory state around the buggy address:
[   30.222744]  fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.222812]  fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.222870] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.222917]                                               ^
[   30.222953]  fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.222995]  fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.223068] ==================================================================
[   30.239088] ==================================================================
[   30.239136] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.239186] Write of size 1 at addr fff00000c91e64eb by task kunit_try_catch/191
[   30.239234] 
[   30.239262] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.239343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.239368] Hardware name: linux,dummy-virt (DT)
[   30.239419] Call trace:
[   30.239442]  show_stack+0x20/0x38 (C)
[   30.239490]  dump_stack_lvl+0x8c/0xd0
[   30.239534]  print_report+0x118/0x5e8
[   30.239576]  kasan_report+0xdc/0x128
[   30.239617]  __asan_report_store1_noabort+0x20/0x30
[   30.239665]  krealloc_less_oob_helper+0xa58/0xc50
[   30.239714]  krealloc_less_oob+0x20/0x38
[   30.239759]  kunit_try_run_case+0x170/0x3f0
[   30.239803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.239852]  kthread+0x328/0x630
[   30.240072]  ret_from_fork+0x10/0x20
[   30.240138] 
[   30.240157] Allocated by task 191:
[   30.240247]  kasan_save_stack+0x3c/0x68
[   30.240298]  kasan_save_track+0x20/0x40
[   30.240492]  kasan_save_alloc_info+0x40/0x58
[   30.240560]  __kasan_krealloc+0x118/0x178
[   30.240639]  krealloc_noprof+0x128/0x360
[   30.240673]  krealloc_less_oob_helper+0x168/0xc50
[   30.240712]  krealloc_less_oob+0x20/0x38
[   30.241229]  kunit_try_run_case+0x170/0x3f0
[   30.241632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.241712]  kthread+0x328/0x630
[   30.241764]  ret_from_fork+0x10/0x20
[   30.241817] 
[   30.242258] The buggy address belongs to the object at fff00000c91e6400
[   30.242258]  which belongs to the cache kmalloc-256 of size 256
[   30.242364] The buggy address is located 34 bytes to the right of
[   30.242364]  allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9)
[   30.242570] 
[   30.242654] The buggy address belongs to the physical page:
[   30.242745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6
[   30.242850] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.242960] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.243285] page_type: f5(slab)
[   30.243344] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.243483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.243595] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.243660] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.243761] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff
[   30.243814] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.243852] page dumped because: kasan: bad access detected
[   30.243881] 
[   30.243915] Memory state around the buggy address:
[   30.243946]  fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.244010]  fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.244059] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.244104]                                                           ^
[   30.244152]  fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.244202]  fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.244238] ==================================================================
[   30.228032] ==================================================================
[   30.228079] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.228154] Write of size 1 at addr fff00000c91e64da by task kunit_try_catch/191
[   30.228202] 
[   30.228255] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.228342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.228368] Hardware name: linux,dummy-virt (DT)
[   30.228398] Call trace:
[   30.228453]  show_stack+0x20/0x38 (C)
[   30.228506]  dump_stack_lvl+0x8c/0xd0
[   30.228566]  print_report+0x118/0x5e8
[   30.228666]  kasan_report+0xdc/0x128
[   30.228792]  __asan_report_store1_noabort+0x20/0x30
[   30.228880]  krealloc_less_oob_helper+0xa80/0xc50
[   30.228991]  krealloc_less_oob+0x20/0x38
[   30.229068]  kunit_try_run_case+0x170/0x3f0
[   30.229145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.229195]  kthread+0x328/0x630
[   30.229401]  ret_from_fork+0x10/0x20
[   30.229451] 
[   30.229469] Allocated by task 191:
[   30.229495]  kasan_save_stack+0x3c/0x68
[   30.229534]  kasan_save_track+0x20/0x40
[   30.229567]  kasan_save_alloc_info+0x40/0x58
[   30.229603]  __kasan_krealloc+0x118/0x178
[   30.229660]  krealloc_noprof+0x128/0x360
[   30.229730]  krealloc_less_oob_helper+0x168/0xc50
[   30.229776]  krealloc_less_oob+0x20/0x38
[   30.229847]  kunit_try_run_case+0x170/0x3f0
[   30.229954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.230046]  kthread+0x328/0x630
[   30.230084]  ret_from_fork+0x10/0x20
[   30.230131] 
[   30.230148] The buggy address belongs to the object at fff00000c91e6400
[   30.230148]  which belongs to the cache kmalloc-256 of size 256
[   30.230203] The buggy address is located 17 bytes to the right of
[   30.230203]  allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9)
[   30.230265] 
[   30.230304] The buggy address belongs to the physical page:
[   30.230355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6
[   30.230414] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.230468] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.230517] page_type: f5(slab)
[   30.230552] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.230599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.230646] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.230702] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.230749] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff
[   30.230794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.230832] page dumped because: kasan: bad access detected
[   30.230861] 
[   30.230887] Memory state around the buggy address:
[   30.231257]  fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.231520]  fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.231565] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.231748]                                                     ^
[   30.231852]  fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.231976]  fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.232048] ==================================================================
[   30.303961] ==================================================================
[   30.304109] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.304183] Write of size 1 at addr fff00000c9ae60eb by task kunit_try_catch/195
[   30.304386] 
[   30.304431] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.304517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.304804] Hardware name: linux,dummy-virt (DT)
[   30.304877] Call trace:
[   30.304976]  show_stack+0x20/0x38 (C)
[   30.305211]  dump_stack_lvl+0x8c/0xd0
[   30.305430]  print_report+0x118/0x5e8
[   30.305554]  kasan_report+0xdc/0x128
[   30.305601]  __asan_report_store1_noabort+0x20/0x30
[   30.305678]  krealloc_less_oob_helper+0xa58/0xc50
[   30.306029]  krealloc_large_less_oob+0x20/0x38
[   30.306122]  kunit_try_run_case+0x170/0x3f0
[   30.306255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.306343]  kthread+0x328/0x630
[   30.306475]  ret_from_fork+0x10/0x20
[   30.306535] 
[   30.306562] The buggy address belongs to the physical page:
[   30.306882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4
[   30.307065] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.307147] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.307294] page_type: f8(unknown)
[   30.307351] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.307430] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.307514] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.307942] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.308067] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff
[   30.308196] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.308273] page dumped because: kasan: bad access detected
[   30.308388] 
[   30.308440] Memory state around the buggy address:
[   30.308517]  fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.308562]  fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.309007] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.309137]                                                           ^
[   30.309206]  fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.309348]  fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.309434] ==================================================================
[   30.232519] ==================================================================
[   30.232596] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.232674] Write of size 1 at addr fff00000c91e64ea by task kunit_try_catch/191
[   30.232765] 
[   30.232801] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.232958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.233011] Hardware name: linux,dummy-virt (DT)
[   30.233041] Call trace:
[   30.233062]  show_stack+0x20/0x38 (C)
[   30.233108]  dump_stack_lvl+0x8c/0xd0
[   30.233153]  print_report+0x118/0x5e8
[   30.233253]  kasan_report+0xdc/0x128
[   30.233388]  __asan_report_store1_noabort+0x20/0x30
[   30.233475]  krealloc_less_oob_helper+0xae4/0xc50
[   30.233563]  krealloc_less_oob+0x20/0x38
[   30.233685]  kunit_try_run_case+0x170/0x3f0
[   30.233773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.233848]  kthread+0x328/0x630
[   30.233889]  ret_from_fork+0x10/0x20
[   30.234224] 
[   30.234294] Allocated by task 191:
[   30.234378]  kasan_save_stack+0x3c/0x68
[   30.234477]  kasan_save_track+0x20/0x40
[   30.234558]  kasan_save_alloc_info+0x40/0x58
[   30.234651]  __kasan_krealloc+0x118/0x178
[   30.234726]  krealloc_noprof+0x128/0x360
[   30.234783]  krealloc_less_oob_helper+0x168/0xc50
[   30.234824]  krealloc_less_oob+0x20/0x38
[   30.234860]  kunit_try_run_case+0x170/0x3f0
[   30.235158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.235284]  kthread+0x328/0x630
[   30.235362]  ret_from_fork+0x10/0x20
[   30.235428] 
[   30.235496] The buggy address belongs to the object at fff00000c91e6400
[   30.235496]  which belongs to the cache kmalloc-256 of size 256
[   30.235581] The buggy address is located 33 bytes to the right of
[   30.235581]  allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9)
[   30.235685] 
[   30.235712] The buggy address belongs to the physical page:
[   30.235753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6
[   30.235803] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.236066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.236214] page_type: f5(slab)
[   30.236309] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.236396] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.236508] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.236554] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.236750] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff
[   30.236804] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.237045] page dumped because: kasan: bad access detected
[   30.237129] 
[   30.237194] Memory state around the buggy address:
[   30.237291]  fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.237369]  fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.237492] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.237563]                                                           ^
[   30.237614]  fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.237931]  fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.238031] ==================================================================
[   30.223482] ==================================================================
[   30.223547] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.223616] Write of size 1 at addr fff00000c91e64d0 by task kunit_try_catch/191
[   30.223664] 
[   30.223693] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.223860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.223889] Hardware name: linux,dummy-virt (DT)
[   30.223931] Call trace:
[   30.223952]  show_stack+0x20/0x38 (C)
[   30.224040]  dump_stack_lvl+0x8c/0xd0
[   30.224097]  print_report+0x118/0x5e8
[   30.224165]  kasan_report+0xdc/0x128
[   30.224223]  __asan_report_store1_noabort+0x20/0x30
[   30.224318]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.224383]  krealloc_less_oob+0x20/0x38
[   30.224428]  kunit_try_run_case+0x170/0x3f0
[   30.224473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.224637]  kthread+0x328/0x630
[   30.224683]  ret_from_fork+0x10/0x20
[   30.224741] 
[   30.224759] Allocated by task 191:
[   30.224837]  kasan_save_stack+0x3c/0x68
[   30.224975]  kasan_save_track+0x20/0x40
[   30.225037]  kasan_save_alloc_info+0x40/0x58
[   30.225083]  __kasan_krealloc+0x118/0x178
[   30.225134]  krealloc_noprof+0x128/0x360
[   30.225168]  krealloc_less_oob_helper+0x168/0xc50
[   30.225209]  krealloc_less_oob+0x20/0x38
[   30.225246]  kunit_try_run_case+0x170/0x3f0
[   30.225410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.225453]  kthread+0x328/0x630
[   30.225484]  ret_from_fork+0x10/0x20
[   30.225518] 
[   30.225536] The buggy address belongs to the object at fff00000c91e6400
[   30.225536]  which belongs to the cache kmalloc-256 of size 256
[   30.225591] The buggy address is located 7 bytes to the right of
[   30.225591]  allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9)
[   30.225718] 
[   30.225797] The buggy address belongs to the physical page:
[   30.225880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6
[   30.225993] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.226087] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.226192] page_type: f5(slab)
[   30.226270] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.226332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.226387] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.226561] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.226609] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff
[   30.226669] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.226776] page dumped because: kasan: bad access detected
[   30.226926] 
[   30.226996] Memory state around the buggy address:
[   30.227084]  fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.227173]  fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.227226] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.227278]                                                  ^
[   30.227315]  fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.227372]  fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.227410] ==================================================================
[   30.279215] ==================================================================
[   30.279292] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.279352] Write of size 1 at addr fff00000c9ae60c9 by task kunit_try_catch/195
[   30.279598] 
[   30.279663] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.279946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.280025] Hardware name: linux,dummy-virt (DT)
[   30.280059] Call trace:
[   30.280100]  show_stack+0x20/0x38 (C)
[   30.280224]  dump_stack_lvl+0x8c/0xd0
[   30.280300]  print_report+0x118/0x5e8
[   30.280344]  kasan_report+0xdc/0x128
[   30.280530]  __asan_report_store1_noabort+0x20/0x30
[   30.280765]  krealloc_less_oob_helper+0xa48/0xc50
[   30.280852]  krealloc_large_less_oob+0x20/0x38
[   30.280999]  kunit_try_run_case+0x170/0x3f0
[   30.281081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.281219]  kthread+0x328/0x630
[   30.281285]  ret_from_fork+0x10/0x20
[   30.281341] 
[   30.281361] The buggy address belongs to the physical page:
[   30.281396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4
[   30.281867] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.281981] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.282070] page_type: f8(unknown)
[   30.282198] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.282292] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.282542] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.282749] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.282964] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff
[   30.283041] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.283172] page dumped because: kasan: bad access detected
[   30.283215] 
[   30.283234] Memory state around the buggy address:
[   30.283265]  fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.283347]  fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.283388] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.283433]                                               ^
[   30.283470]  fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.283520]  fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.283562] ==================================================================
[   30.296738] ==================================================================
[   30.297050] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.297220] Write of size 1 at addr fff00000c9ae60ea by task kunit_try_catch/195
[   30.297277] 
[   30.297688] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.298110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.298165] Hardware name: linux,dummy-virt (DT)
[   30.298295] Call trace:
[   30.298321]  show_stack+0x20/0x38 (C)
[   30.298378]  dump_stack_lvl+0x8c/0xd0
[   30.298425]  print_report+0x118/0x5e8
[   30.298478]  kasan_report+0xdc/0x128
[   30.298645]  __asan_report_store1_noabort+0x20/0x30
[   30.298708]  krealloc_less_oob_helper+0xae4/0xc50
[   30.298818]  krealloc_large_less_oob+0x20/0x38
[   30.299166]  kunit_try_run_case+0x170/0x3f0
[   30.299442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.299511]  kthread+0x328/0x630
[   30.299570]  ret_from_fork+0x10/0x20
[   30.299825] 
[   30.299980] The buggy address belongs to the physical page:
[   30.300026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4
[   30.300079] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.300123] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.300306] page_type: f8(unknown)
[   30.300437] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.300578] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.300633] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.300681] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.301039] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff
[   30.301187] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.301228] page dumped because: kasan: bad access detected
[   30.301435] 
[   30.301464] Memory state around the buggy address:
[   30.301622]  fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.301947]  fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.302147] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.302191]                                                           ^
[   30.302543]  fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.302678]  fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.302764] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   30.254124] ==================================================================
[   30.254473] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.254561] Write of size 1 at addr fff00000c9ae60eb by task kunit_try_catch/193
[   30.254614] 
[   30.254827] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.255101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.255167] Hardware name: linux,dummy-virt (DT)
[   30.255217] Call trace:
[   30.255245]  show_stack+0x20/0x38 (C)
[   30.255816]  dump_stack_lvl+0x8c/0xd0
[   30.256069]  print_report+0x118/0x5e8
[   30.256127]  kasan_report+0xdc/0x128
[   30.256171]  __asan_report_store1_noabort+0x20/0x30
[   30.256218]  krealloc_more_oob_helper+0x60c/0x678
[   30.256418]  krealloc_large_more_oob+0x20/0x38
[   30.256886]  kunit_try_run_case+0x170/0x3f0
[   30.257072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.257230]  kthread+0x328/0x630
[   30.257319]  ret_from_fork+0x10/0x20
[   30.257461] 
[   30.257501] The buggy address belongs to the physical page:
[   30.257556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4
[   30.257675] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.257745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.257957] page_type: f8(unknown)
[   30.258164] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.258275] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.258367] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.258585] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.258698] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff
[   30.258884] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.259016] page dumped because: kasan: bad access detected
[   30.259057] 
[   30.259085] Memory state around the buggy address:
[   30.259249]  fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.259640]  fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.259869] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.259923]                                                           ^
[   30.260276]  fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.260410]  fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.260474] ==================================================================
[   30.169020] ==================================================================
[   30.169078] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.169132] Write of size 1 at addr fff00000c91e62eb by task kunit_try_catch/189
[   30.169195] 
[   30.169225] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.169565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.169604] Hardware name: linux,dummy-virt (DT)
[   30.169725] Call trace:
[   30.169809]  show_stack+0x20/0x38 (C)
[   30.169884]  dump_stack_lvl+0x8c/0xd0
[   30.169941]  print_report+0x118/0x5e8
[   30.169984]  kasan_report+0xdc/0x128
[   30.170032]  __asan_report_store1_noabort+0x20/0x30
[   30.170258]  krealloc_more_oob_helper+0x60c/0x678
[   30.170353]  krealloc_more_oob+0x20/0x38
[   30.170469]  kunit_try_run_case+0x170/0x3f0
[   30.170521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.170577]  kthread+0x328/0x630
[   30.170631]  ret_from_fork+0x10/0x20
[   30.170678] 
[   30.170697] Allocated by task 189:
[   30.170756]  kasan_save_stack+0x3c/0x68
[   30.170917]  kasan_save_track+0x20/0x40
[   30.170951]  kasan_save_alloc_info+0x40/0x58
[   30.170987]  __kasan_krealloc+0x118/0x178
[   30.171021]  krealloc_noprof+0x128/0x360
[   30.171055]  krealloc_more_oob_helper+0x168/0x678
[   30.171395]  krealloc_more_oob+0x20/0x38
[   30.171457]  kunit_try_run_case+0x170/0x3f0
[   30.171493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.171535]  kthread+0x328/0x630
[   30.171914]  ret_from_fork+0x10/0x20
[   30.171966] 
[   30.171988] The buggy address belongs to the object at fff00000c91e6200
[   30.171988]  which belongs to the cache kmalloc-256 of size 256
[   30.172046] The buggy address is located 0 bytes to the right of
[   30.172046]  allocated 235-byte region [fff00000c91e6200, fff00000c91e62eb)
[   30.172108] 
[   30.172129] The buggy address belongs to the physical page:
[   30.172166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6
[   30.172237] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.172327] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.172444] page_type: f5(slab)
[   30.172480] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.172779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.173379] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.173446] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.174007] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff
[   30.174058] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.174096] page dumped because: kasan: bad access detected
[   30.174125] 
[   30.174142] Memory state around the buggy address:
[   30.174957]  fff00000c91e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.175297]  fff00000c91e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.175812] >fff00000c91e6280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.175878]                                                           ^
[   30.176483]  fff00000c91e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.176766]  fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.177180] ==================================================================
[   30.179035] ==================================================================
[   30.180670] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.181075] Write of size 1 at addr fff00000c91e62f0 by task kunit_try_catch/189
[   30.181520] 
[   30.182073] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.182878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.182920] Hardware name: linux,dummy-virt (DT)
[   30.183789] Call trace:
[   30.183832]  show_stack+0x20/0x38 (C)
[   30.184194]  dump_stack_lvl+0x8c/0xd0
[   30.184248]  print_report+0x118/0x5e8
[   30.184292]  kasan_report+0xdc/0x128
[   30.184333]  __asan_report_store1_noabort+0x20/0x30
[   30.184380]  krealloc_more_oob_helper+0x5c0/0x678
[   30.185395]  krealloc_more_oob+0x20/0x38
[   30.185849]  kunit_try_run_case+0x170/0x3f0
[   30.186081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.186709]  kthread+0x328/0x630
[   30.187195]  ret_from_fork+0x10/0x20
[   30.187339] 
[   30.187406] Allocated by task 189:
[   30.187434]  kasan_save_stack+0x3c/0x68
[   30.187476]  kasan_save_track+0x20/0x40
[   30.188499]  kasan_save_alloc_info+0x40/0x58
[   30.188554]  __kasan_krealloc+0x118/0x178
[   30.189350]  krealloc_noprof+0x128/0x360
[   30.189509]  krealloc_more_oob_helper+0x168/0x678
[   30.189657]  krealloc_more_oob+0x20/0x38
[   30.190054]  kunit_try_run_case+0x170/0x3f0
[   30.190548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.190743]  kthread+0x328/0x630
[   30.191050]  ret_from_fork+0x10/0x20
[   30.191463] 
[   30.191502] The buggy address belongs to the object at fff00000c91e6200
[   30.191502]  which belongs to the cache kmalloc-256 of size 256
[   30.192129] The buggy address is located 5 bytes to the right of
[   30.192129]  allocated 235-byte region [fff00000c91e6200, fff00000c91e62eb)
[   30.192252] 
[   30.192858] The buggy address belongs to the physical page:
[   30.192929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6
[   30.193728] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.193786] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.194531] page_type: f5(slab)
[   30.194615] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.194850] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.195233] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.195752] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.195859] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff
[   30.195940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.196685] page dumped because: kasan: bad access detected
[   30.196724] 
[   30.196745] Memory state around the buggy address:
[   30.197299]  fff00000c91e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.197490]  fff00000c91e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.197581] >fff00000c91e6280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.197734]                                                              ^
[   30.198467]  fff00000c91e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.198762]  fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.199129] ==================================================================
[   30.263613] ==================================================================
[   30.263668] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.263996] Write of size 1 at addr fff00000c9ae60f0 by task kunit_try_catch/193
[   30.264127] 
[   30.264165] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.264249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.264402] Hardware name: linux,dummy-virt (DT)
[   30.264464] Call trace:
[   30.264488]  show_stack+0x20/0x38 (C)
[   30.264772]  dump_stack_lvl+0x8c/0xd0
[   30.265019]  print_report+0x118/0x5e8
[   30.265073]  kasan_report+0xdc/0x128
[   30.265116]  __asan_report_store1_noabort+0x20/0x30
[   30.265163]  krealloc_more_oob_helper+0x5c0/0x678
[   30.265635]  krealloc_large_more_oob+0x20/0x38
[   30.265735]  kunit_try_run_case+0x170/0x3f0
[   30.265931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.266155]  kthread+0x328/0x630
[   30.266227]  ret_from_fork+0x10/0x20
[   30.266541] 
[   30.266670] The buggy address belongs to the physical page:
[   30.266838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4
[   30.267068] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.267195] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.267421] page_type: f8(unknown)
[   30.267659] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.267775] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.267832] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.268158] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.268310] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff
[   30.268385] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.268667] page dumped because: kasan: bad access detected
[   30.268883] 
[   30.268984] Memory state around the buggy address:
[   30.269018]  fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.269309]  fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.269473] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.269566]                                                              ^
[   30.269634]  fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.269681]  fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.269743] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   30.158508] ==================================================================
[   30.158567] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   30.158884] Read of size 1 at addr fff00000c9b10000 by task kunit_try_catch/187
[   30.158949] 
[   30.158982] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.159064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.159101] Hardware name: linux,dummy-virt (DT)
[   30.159206] Call trace:
[   30.159309]  show_stack+0x20/0x38 (C)
[   30.159367]  dump_stack_lvl+0x8c/0xd0
[   30.159700]  print_report+0x118/0x5e8
[   30.159791]  kasan_report+0xdc/0x128
[   30.159834]  __asan_report_load1_noabort+0x20/0x30
[   30.159881]  page_alloc_uaf+0x328/0x350
[   30.159937]  kunit_try_run_case+0x170/0x3f0
[   30.159994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.160078]  kthread+0x328/0x630
[   30.160119]  ret_from_fork+0x10/0x20
[   30.160166] 
[   30.160185] The buggy address belongs to the physical page:
[   30.160249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   30.160357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.160434] page_type: f0(buddy)
[   30.160670] raw: 0bfffe0000000000 fff00000ff6160e0 fff00000ff6160e0 0000000000000000
[   30.160838] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   30.160917] page dumped because: kasan: bad access detected
[   30.160946] 
[   30.160964] Memory state around the buggy address:
[   30.161005]  fff00000c9b0ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161048]  fff00000c9b0ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161088] >fff00000c9b10000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161376]                    ^
[   30.161415]  fff00000c9b10080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161543]  fff00000c9b10100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161580] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   30.139037] ==================================================================
[   30.139231] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   30.139511] Free of addr fff00000c9ae0001 by task kunit_try_catch/183
[   30.139716] 
[   30.139782] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.139870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.140003] Hardware name: linux,dummy-virt (DT)
[   30.140146] Call trace:
[   30.140228]  show_stack+0x20/0x38 (C)
[   30.140282]  dump_stack_lvl+0x8c/0xd0
[   30.140437]  print_report+0x118/0x5e8
[   30.140491]  kasan_report_invalid_free+0xc0/0xe8
[   30.140586]  __kasan_kfree_large+0x5c/0xa8
[   30.140630]  free_large_kmalloc+0x68/0x150
[   30.140675]  kfree+0x270/0x3c8
[   30.140717]  kmalloc_large_invalid_free+0x108/0x270
[   30.140766]  kunit_try_run_case+0x170/0x3f0
[   30.140886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.141170]  kthread+0x328/0x630
[   30.141233]  ret_from_fork+0x10/0x20
[   30.141320] 
[   30.141427] The buggy address belongs to the physical page:
[   30.141806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae0
[   30.142057] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.142128] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.142254] page_type: f8(unknown)
[   30.142324] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.142425] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.142561] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.142609] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.142664] head: 0bfffe0000000002 ffffc1ffc326b801 00000000ffffffff 00000000ffffffff
[   30.142886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.143137] page dumped because: kasan: bad access detected
[   30.143246] 
[   30.143266] Memory state around the buggy address:
[   30.143303]  fff00000c9adff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.143347]  fff00000c9adff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.143390] >fff00000c9ae0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.143428]                    ^
[   30.143457]  fff00000c9ae0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.143499]  fff00000c9ae0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.144040] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   30.126773] ==================================================================
[   30.127244] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   30.127474] Read of size 1 at addr fff00000c9ae0000 by task kunit_try_catch/181
[   30.127524] 
[   30.127565] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.127652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.127679] Hardware name: linux,dummy-virt (DT)
[   30.128199] Call trace:
[   30.128262]  show_stack+0x20/0x38 (C)
[   30.128324]  dump_stack_lvl+0x8c/0xd0
[   30.128378]  print_report+0x118/0x5e8
[   30.128421]  kasan_report+0xdc/0x128
[   30.128767]  __asan_report_load1_noabort+0x20/0x30
[   30.128818]  kmalloc_large_uaf+0x2cc/0x2f8
[   30.128864]  kunit_try_run_case+0x170/0x3f0
[   30.128920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.129041]  kthread+0x328/0x630
[   30.129125]  ret_from_fork+0x10/0x20
[   30.129412] 
[   30.129437] The buggy address belongs to the physical page:
[   30.129501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae0
[   30.129668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.129737] raw: 0bfffe0000000000 ffffc1ffc326b908 fff00000da44ed00 0000000000000000
[   30.129810] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   30.129852] page dumped because: kasan: bad access detected
[   30.129887] 
[   30.129923] Memory state around the buggy address:
[   30.129955]  fff00000c9adff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.129996]  fff00000c9adff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.130193] >fff00000c9ae0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.130357]                    ^
[   30.130460]  fff00000c9ae0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.130512]  fff00000c9ae0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.130595] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   30.107555] ==================================================================
[   30.107907] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   30.107972] Write of size 1 at addr fff00000c9ae200a by task kunit_try_catch/179
[   30.108021] 
[   30.108085] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.108174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.108200] Hardware name: linux,dummy-virt (DT)
[   30.108230] Call trace:
[   30.108253]  show_stack+0x20/0x38 (C)
[   30.108301]  dump_stack_lvl+0x8c/0xd0
[   30.108347]  print_report+0x118/0x5e8
[   30.108388]  kasan_report+0xdc/0x128
[   30.108428]  __asan_report_store1_noabort+0x20/0x30
[   30.108474]  kmalloc_large_oob_right+0x278/0x2b8
[   30.109674]  kunit_try_run_case+0x170/0x3f0
[   30.109740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.109792]  kthread+0x328/0x630
[   30.110022]  ret_from_fork+0x10/0x20
[   30.110295] 
[   30.110338] The buggy address belongs to the physical page:
[   30.110500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae0
[   30.110867] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.110933] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.111375] page_type: f8(unknown)
[   30.111586] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.111782] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.111834] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.112171] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.112242] head: 0bfffe0000000002 ffffc1ffc326b801 00000000ffffffff 00000000ffffffff
[   30.112348] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.112436] page dumped because: kasan: bad access detected
[   30.112501] 
[   30.112549] Memory state around the buggy address:
[   30.112582]  fff00000c9ae1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.112624]  fff00000c9ae1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.113081] >fff00000c9ae2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.113125]                       ^
[   30.113158]  fff00000c9ae2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.113247]  fff00000c9ae2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.113402] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   30.092029] ==================================================================
[   30.092226] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   30.092288] Write of size 1 at addr fff00000c1addf00 by task kunit_try_catch/177
[   30.092336] 
[   30.092569] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.092962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.092989] Hardware name: linux,dummy-virt (DT)
[   30.093019] Call trace:
[   30.093042]  show_stack+0x20/0x38 (C)
[   30.093237]  dump_stack_lvl+0x8c/0xd0
[   30.093287]  print_report+0x118/0x5e8
[   30.093339]  kasan_report+0xdc/0x128
[   30.093582]  __asan_report_store1_noabort+0x20/0x30
[   30.093639]  kmalloc_big_oob_right+0x2a4/0x2f0
[   30.093686]  kunit_try_run_case+0x170/0x3f0
[   30.093734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.093906]  kthread+0x328/0x630
[   30.094101]  ret_from_fork+0x10/0x20
[   30.094157] 
[   30.094245] Allocated by task 177:
[   30.094336]  kasan_save_stack+0x3c/0x68
[   30.094386]  kasan_save_track+0x20/0x40
[   30.094420]  kasan_save_alloc_info+0x40/0x58
[   30.094463]  __kasan_kmalloc+0xd4/0xd8
[   30.094562]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.094624]  kmalloc_big_oob_right+0xb8/0x2f0
[   30.094663]  kunit_try_run_case+0x170/0x3f0
[   30.094738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.094893]  kthread+0x328/0x630
[   30.095246]  ret_from_fork+0x10/0x20
[   30.095528] 
[   30.095552] The buggy address belongs to the object at fff00000c1adc000
[   30.095552]  which belongs to the cache kmalloc-8k of size 8192
[   30.095736] The buggy address is located 0 bytes to the right of
[   30.095736]  allocated 7936-byte region [fff00000c1adc000, fff00000c1addf00)
[   30.095889] 
[   30.095924] The buggy address belongs to the physical page:
[   30.096042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ad8
[   30.096734] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.096858] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.097202] page_type: f5(slab)
[   30.097301] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   30.097356] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.097512] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   30.097751] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.097800] head: 0bfffe0000000003 ffffc1ffc306b601 00000000ffffffff 00000000ffffffff
[   30.097870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.098021] page dumped because: kasan: bad access detected
[   30.098082] 
[   30.098101] Memory state around the buggy address:
[   30.098133]  fff00000c1adde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.098465]  fff00000c1adde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.098711] >fff00000c1addf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.098762]                    ^
[   30.098839]  fff00000c1addf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.098879]  fff00000c1ade000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.098925] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   30.074599] ==================================================================
[   30.074647] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   30.075257] Write of size 1 at addr fff00000c99bc878 by task kunit_try_catch/175
[   30.075428] 
[   30.075502] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.075667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.075693] Hardware name: linux,dummy-virt (DT)
[   30.075729] Call trace:
[   30.075830]  show_stack+0x20/0x38 (C)
[   30.075886]  dump_stack_lvl+0x8c/0xd0
[   30.076251]  print_report+0x118/0x5e8
[   30.076538]  kasan_report+0xdc/0x128
[   30.076621]  __asan_report_store1_noabort+0x20/0x30
[   30.076716]  kmalloc_track_caller_oob_right+0x418/0x488
[   30.076923]  kunit_try_run_case+0x170/0x3f0
[   30.077250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.077314]  kthread+0x328/0x630
[   30.077361]  ret_from_fork+0x10/0x20
[   30.077407] 
[   30.077640] Allocated by task 175:
[   30.077818]  kasan_save_stack+0x3c/0x68
[   30.077864]  kasan_save_track+0x20/0x40
[   30.077910]  kasan_save_alloc_info+0x40/0x58
[   30.077946]  __kasan_kmalloc+0xd4/0xd8
[   30.077988]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.078029]  kmalloc_track_caller_oob_right+0x184/0x488
[   30.078324]  kunit_try_run_case+0x170/0x3f0
[   30.078748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.078851]  kthread+0x328/0x630
[   30.078883]  ret_from_fork+0x10/0x20
[   30.078927] 
[   30.078946] The buggy address belongs to the object at fff00000c99bc800
[   30.078946]  which belongs to the cache kmalloc-128 of size 128
[   30.079400] The buggy address is located 0 bytes to the right of
[   30.079400]  allocated 120-byte region [fff00000c99bc800, fff00000c99bc878)
[   30.079828] 
[   30.079875] The buggy address belongs to the physical page:
[   30.079918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   30.079971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.080183] page_type: f5(slab)
[   30.080393] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.080445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.080483] page dumped because: kasan: bad access detected
[   30.080512] 
[   30.080557] Memory state around the buggy address:
[   30.080587]  fff00000c99bc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.080779]  fff00000c99bc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.080970] >fff00000c99bc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.081007]                                                                 ^
[   30.081048]  fff00000c99bc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.081265]  fff00000c99bc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.081306] ==================================================================
[   30.067980] ==================================================================
[   30.068041] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   30.068108] Write of size 1 at addr fff00000c99bc778 by task kunit_try_catch/175
[   30.068415] 
[   30.068461] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.068644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.068727] Hardware name: linux,dummy-virt (DT)
[   30.068802] Call trace:
[   30.068911]  show_stack+0x20/0x38 (C)
[   30.069009]  dump_stack_lvl+0x8c/0xd0
[   30.069129]  print_report+0x118/0x5e8
[   30.069195]  kasan_report+0xdc/0x128
[   30.069238]  __asan_report_store1_noabort+0x20/0x30
[   30.069286]  kmalloc_track_caller_oob_right+0x40c/0x488
[   30.069363]  kunit_try_run_case+0x170/0x3f0
[   30.069409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.069737]  kthread+0x328/0x630
[   30.069791]  ret_from_fork+0x10/0x20
[   30.069861] 
[   30.069879] Allocated by task 175:
[   30.069917]  kasan_save_stack+0x3c/0x68
[   30.069966]  kasan_save_track+0x20/0x40
[   30.070010]  kasan_save_alloc_info+0x40/0x58
[   30.070056]  __kasan_kmalloc+0xd4/0xd8
[   30.070089]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.070130]  kmalloc_track_caller_oob_right+0xa8/0x488
[   30.070180]  kunit_try_run_case+0x170/0x3f0
[   30.070218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.070299]  kthread+0x328/0x630
[   30.070422]  ret_from_fork+0x10/0x20
[   30.070456] 
[   30.070474] The buggy address belongs to the object at fff00000c99bc700
[   30.070474]  which belongs to the cache kmalloc-128 of size 128
[   30.070616] The buggy address is located 0 bytes to the right of
[   30.070616]  allocated 120-byte region [fff00000c99bc700, fff00000c99bc778)
[   30.070678] 
[   30.070697] The buggy address belongs to the physical page:
[   30.070738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   30.071361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.071419] page_type: f5(slab)
[   30.071458] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.071640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.072392] page dumped because: kasan: bad access detected
[   30.072654] 
[   30.072683] Memory state around the buggy address:
[   30.072716]  fff00000c99bc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.072758]  fff00000c99bc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.072799] >fff00000c99bc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.072838]                                                                 ^
[   30.072933]  fff00000c99bc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.073104]  fff00000c99bc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.073341] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   30.046623] ==================================================================
[   30.046743] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   30.046812] Read of size 1 at addr fff00000c8603e1f by task kunit_try_catch/171
[   30.046861] 
[   30.046925] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.047013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.047039] Hardware name: linux,dummy-virt (DT)
[   30.047070] Call trace:
[   30.047094]  show_stack+0x20/0x38 (C)
[   30.047145]  dump_stack_lvl+0x8c/0xd0
[   30.047192]  print_report+0x118/0x5e8
[   30.047235]  kasan_report+0xdc/0x128
[   30.047286]  __asan_report_load1_noabort+0x20/0x30
[   30.047335]  kmalloc_oob_left+0x2ec/0x320
[   30.047380]  kunit_try_run_case+0x170/0x3f0
[   30.047427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.047477]  kthread+0x328/0x630
[   30.047526]  ret_from_fork+0x10/0x20
[   30.047574] 
[   30.047598] Allocated by task 111:
[   30.047627]  kasan_save_stack+0x3c/0x68
[   30.047666]  kasan_save_track+0x20/0x40
[   30.047704]  kasan_save_alloc_info+0x40/0x58
[   30.047741]  __kasan_kmalloc+0xd4/0xd8
[   30.047773]  __kmalloc_noprof+0x198/0x4c8
[   30.047813]  kunit_kmalloc_array+0x34/0x88
[   30.047857]  test_readerwriter+0x3b0/0x948
[   30.047908]  kunit_try_run_case+0x170/0x3f0
[   30.047943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.047984]  kthread+0x328/0x630
[   30.048415]  ret_from_fork+0x10/0x20
[   30.048494] 
[   30.048515] The buggy address belongs to the object at fff00000c8603e00
[   30.048515]  which belongs to the cache kmalloc-16 of size 16
[   30.048706] The buggy address is located 15 bytes to the right of
[   30.048706]  allocated 16-byte region [fff00000c8603e00, fff00000c8603e10)
[   30.048808] 
[   30.048858] The buggy address belongs to the physical page:
[   30.048951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603
[   30.049031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.049183] page_type: f5(slab)
[   30.049243] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.049291] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000
[   30.049331] page dumped because: kasan: bad access detected
[   30.049360] 
[   30.049444] Memory state around the buggy address:
[   30.049570]  fff00000c8603d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.049618]  fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.049660] >fff00000c8603e00: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   30.049720]                             ^
[   30.049779]  fff00000c8603e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.049891]  fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.049983] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   30.018758] ==================================================================
[   30.019125] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.019944] Write of size 1 at addr fff00000c99bc573 by task kunit_try_catch/169
[   30.020052] 
[   30.020888] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.021063] Tainted: [N]=TEST
[   30.021096] Hardware name: linux,dummy-virt (DT)
[   30.021312] Call trace:
[   30.021482]  show_stack+0x20/0x38 (C)
[   30.021617]  dump_stack_lvl+0x8c/0xd0
[   30.021668]  print_report+0x118/0x5e8
[   30.021712]  kasan_report+0xdc/0x128
[   30.021753]  __asan_report_store1_noabort+0x20/0x30
[   30.021801]  kmalloc_oob_right+0x5a4/0x660
[   30.021847]  kunit_try_run_case+0x170/0x3f0
[   30.021908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.021959]  kthread+0x328/0x630
[   30.022002]  ret_from_fork+0x10/0x20
[   30.022166] 
[   30.022228] Allocated by task 169:
[   30.022344]  kasan_save_stack+0x3c/0x68
[   30.022418]  kasan_save_track+0x20/0x40
[   30.022464]  kasan_save_alloc_info+0x40/0x58
[   30.022501]  __kasan_kmalloc+0xd4/0xd8
[   30.022534]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.022576]  kmalloc_oob_right+0xb0/0x660
[   30.022613]  kunit_try_run_case+0x170/0x3f0
[   30.022649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.022690]  kthread+0x328/0x630
[   30.022722]  ret_from_fork+0x10/0x20
[   30.022775] 
[   30.022832] The buggy address belongs to the object at fff00000c99bc500
[   30.022832]  which belongs to the cache kmalloc-128 of size 128
[   30.022939] The buggy address is located 0 bytes to the right of
[   30.022939]  allocated 115-byte region [fff00000c99bc500, fff00000c99bc573)
[   30.023006] 
[   30.023085] The buggy address belongs to the physical page:
[   30.023430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   30.023669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.023958] page_type: f5(slab)
[   30.024248] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.024308] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.024406] page dumped because: kasan: bad access detected
[   30.024446] 
[   30.024472] Memory state around the buggy address:
[   30.024748]  fff00000c99bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.024821]  fff00000c99bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.024873] >fff00000c99bc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.024937]                                                              ^
[   30.025024]  fff00000c99bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.025066]  fff00000c99bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.025128] ==================================================================
[   30.027468] ==================================================================
[   30.027509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.027561] Write of size 1 at addr fff00000c99bc578 by task kunit_try_catch/169
[   30.027609] 
[   30.027642] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.027727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.027753] Hardware name: linux,dummy-virt (DT)
[   30.027784] Call trace:
[   30.027807]  show_stack+0x20/0x38 (C)
[   30.027854]  dump_stack_lvl+0x8c/0xd0
[   30.027915]  print_report+0x118/0x5e8
[   30.027959]  kasan_report+0xdc/0x128
[   30.028000]  __asan_report_store1_noabort+0x20/0x30
[   30.028048]  kmalloc_oob_right+0x538/0x660
[   30.028093]  kunit_try_run_case+0x170/0x3f0
[   30.028140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.028190]  kthread+0x328/0x630
[   30.028231]  ret_from_fork+0x10/0x20
[   30.028277] 
[   30.029375] Allocated by task 169:
[   30.029420]  kasan_save_stack+0x3c/0x68
[   30.029469]  kasan_save_track+0x20/0x40
[   30.029507]  kasan_save_alloc_info+0x40/0x58
[   30.029544]  __kasan_kmalloc+0xd4/0xd8
[   30.029577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.029618]  kmalloc_oob_right+0xb0/0x660
[   30.029654]  kunit_try_run_case+0x170/0x3f0
[   30.029690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.029731]  kthread+0x328/0x630
[   30.029763]  ret_from_fork+0x10/0x20
[   30.029797] 
[   30.029816] The buggy address belongs to the object at fff00000c99bc500
[   30.029816]  which belongs to the cache kmalloc-128 of size 128
[   30.029872] The buggy address is located 5 bytes to the right of
[   30.029872]  allocated 115-byte region [fff00000c99bc500, fff00000c99bc573)
[   30.029947] 
[   30.029967] The buggy address belongs to the physical page:
[   30.030000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   30.030051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.030098] page_type: f5(slab)
[   30.030135] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.030182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.030220] page dumped because: kasan: bad access detected
[   30.030251] 
[   30.030269] Memory state around the buggy address:
[   30.030300]  fff00000c99bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.030342]  fff00000c99bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.030390] >fff00000c99bc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.030426]                                                                 ^
[   30.030467]  fff00000c99bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.030507]  fff00000c99bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.030543] ==================================================================
[   30.031135] ==================================================================
[   30.031184] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.031231] Read of size 1 at addr fff00000c99bc580 by task kunit_try_catch/169
[   30.031279] 
[   30.031308] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   30.031458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.031576] Hardware name: linux,dummy-virt (DT)
[   30.031612] Call trace:
[   30.031734]  show_stack+0x20/0x38 (C)
[   30.031803]  dump_stack_lvl+0x8c/0xd0
[   30.031851]  print_report+0x118/0x5e8
[   30.032132]  kasan_report+0xdc/0x128
[   30.032289]  __asan_report_load1_noabort+0x20/0x30
[   30.032354]  kmalloc_oob_right+0x5d0/0x660
[   30.032401]  kunit_try_run_case+0x170/0x3f0
[   30.032448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.032509]  kthread+0x328/0x630
[   30.032551]  ret_from_fork+0x10/0x20
[   30.032597] 
[   30.032615] Allocated by task 169:
[   30.032778]  kasan_save_stack+0x3c/0x68
[   30.032822]  kasan_save_track+0x20/0x40
[   30.032960]  kasan_save_alloc_info+0x40/0x58
[   30.033090]  __kasan_kmalloc+0xd4/0xd8
[   30.033160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.033292]  kmalloc_oob_right+0xb0/0x660
[   30.033393]  kunit_try_run_case+0x170/0x3f0
[   30.033440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.033481]  kthread+0x328/0x630
[   30.033824]  ret_from_fork+0x10/0x20
[   30.033924] 
[   30.033985] The buggy address belongs to the object at fff00000c99bc500
[   30.033985]  which belongs to the cache kmalloc-128 of size 128
[   30.034097] The buggy address is located 13 bytes to the right of
[   30.034097]  allocated 115-byte region [fff00000c99bc500, fff00000c99bc573)
[   30.034163] 
[   30.034183] The buggy address belongs to the physical page:
[   30.034218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   30.034281] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.034329] page_type: f5(slab)
[   30.034377] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.034426] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.034464] page dumped because: kasan: bad access detected
[   30.034493] 
[   30.034520] Memory state around the buggy address:
[   30.034550]  fff00000c99bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.034591]  fff00000c99bc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.034631] >fff00000c99bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.034676]                    ^
[   30.034712]  fff00000c99bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.034767]  fff00000c99bc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.034819] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  109.624320] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/691
[  109.626250] Modules linked in:
[  109.626766] CPU: 0 UID: 0 PID: 691 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[  109.627223] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  109.627453] Hardware name: linux,dummy-virt (DT)
[  109.627651] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.628265] pc : intlog10+0x38/0x48
[  109.628836] lr : intlog10_test+0xe4/0x200
[  109.629635] sp : ffff800082257c10
[  109.630060] x29: ffff800082257c90 x28: 0000000000000000 x27: 0000000000000000
[  109.631058] x26: 1ffe00001917b2a1 x25: 0000000000000000 x24: ffff800082257ce0
[  109.632019] x23: ffff800082257d00 x22: 0000000000000000 x21: 1ffff0001044af82
[  109.633180] x20: ffff91bcfa251e60 x19: ffff800080087990 x18: 00000000c2bfebc6
[  109.634153] x17: 0000000076da895b x16: 00000000bda69549 x15: 00000000d8cba519
[  109.635174] x14: 0000000045dff68e x13: 000000004e992115 x12: ffff72379fc2b589
[  109.636143] x11: 1ffff2379fc2b588 x10: ffff72379fc2b588 x9 : ffff91bcf785c2a4
[  109.637230] x8 : ffff91bcfe15ac43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.637817] x5 : ffff70001044af82 x4 : 1ffff00010010f3b x3 : 1ffff2379f44a3cc
[  109.638184] x2 : 1ffff2379f44a3cc x1 : 0000000000000003 x0 : 0000000000000000
[  109.638543] Call trace:
[  109.638684]  intlog10+0x38/0x48 (P)
[  109.638879]  kunit_try_run_case+0x170/0x3f0
[  109.639856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.640668]  kthread+0x328/0x630
[  109.641212]  ret_from_fork+0x10/0x20
[  109.641880] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  109.578485] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/673
[  109.580175] Modules linked in:
[  109.580399] CPU: 0 UID: 0 PID: 673 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[  109.581669] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  109.582547] Hardware name: linux,dummy-virt (DT)
[  109.583194] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.583953] pc : intlog2+0xd8/0xf8
[  109.584162] lr : intlog2_test+0xe4/0x200
[  109.584723] sp : ffff8000822f7c10
[  109.585282] x29: ffff8000822f7c90 x28: 0000000000000000 x27: 0000000000000000
[  109.585678] x26: 1ffe000019563fa1 x25: 0000000000000000 x24: ffff8000822f7ce0
[  109.586279] x23: ffff8000822f7d00 x22: 0000000000000000 x21: 1ffff0001045ef82
[  109.587050] x20: ffff91bcfa251d60 x19: ffff800080087990 x18: 000000005d3b5737
[  109.587794] x17: 0000000066def55e x16: fff00000c1baa03c x15: 000000002ec036d0
[  109.588584] x14: 00000000870d5c2c x13: 1ffe00001b48d9dd x12: ffff72379fc2b589
[  109.589114] x11: 1ffff2379fc2b588 x10: ffff72379fc2b588 x9 : ffff91bcf785c4a4
[  109.589995] x8 : ffff91bcfe15ac43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.590972] x5 : ffff70001045ef82 x4 : 1ffff00010010f3b x3 : 1ffff2379f44a3ac
[  109.591655] x2 : 1ffff2379f44a3ac x1 : 0000000000000003 x0 : 0000000000000000
[  109.592027] Call trace:
[  109.592168]  intlog2+0xd8/0xf8 (P)
[  109.592358]  kunit_try_run_case+0x170/0x3f0
[  109.592657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.593364]  kthread+0x328/0x630
[  109.593804]  ret_from_fork+0x10/0x20
[  109.594324] ---[ end trace 0000000000000000 ]---