Hay
Date
July 24, 2025, 4:41 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   34.877406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   34.900335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[   64.971434] Internal error: Oops: 0000000096000005 [#1]  SMP
[   64.975412] Modules linked in:
[   64.976041] CPU: 1 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   64.976642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.977029] Hardware name: linux,dummy-virt (DT)
[   64.977557] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   64.978302] pc : ext4_mb_release+0x394/0xaf8
[   64.978770] lr : ext4_mb_release+0x37c/0xaf8
[   64.979100] sp : ffff800080c27c50
[   64.979502] x29: ffff800080c27c60 x28: dfff800000000000 x27: 0000000000000000
[   64.980400] x26: fff00000c6145000 x25: fff00000c7482740 x24: 1ffe000018e904e8
[   64.980896] x23: fffd800018e904e8 x22: fff00000c7482618 x21: 1ffe000018e904c3
[   64.981239] x20: 0000000000000000 x19: fff00000c7482400 x18: 0000000015c8c139
[   64.981581] x17: 0000000000000001 x16: fff00000da46eda8 x15: 000000001512c01f
[   64.982243] x14: 00000000aea3e7ac x13: 1ffe000019233ef4 x12: fffd800019373a81
[   64.983003] x11: 1ffe000019373a80 x10: fffd800019373a80 x9 : ffffa667eed8d3fc
[   64.984125] x8 : ffff800080c279f8 x7 : 0000000000000001 x6 : ffff800080c27b10
[   64.984951] x5 : 0000000000000001 x4 : 1ffe0000196cb511 x3 : dfff800000000000
[   64.985829] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   64.986625] Call trace:
[   64.987004]  ext4_mb_release+0x394/0xaf8 (P)
[   64.987551]  mbt_kunit_exit+0x9c/0x2c8
[   64.988053]  kunit_try_run_case_cleanup+0x9c/0xe0
[   64.988463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.988702]  kthread+0x328/0x630
[   64.988895]  ret_from_fork+0x10/0x20
[   64.989316] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   64.989810] ---[ end trace 0000000000000000 ]---
[   65.412256] Internal error: Oops: 0000000096000005 [#15]  SMP
[   65.415576] Modules linked in:
[   65.415853] CPU: 0 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.416276] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.416551] Hardware name: linux,dummy-virt (DT)
[   65.416823] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.417194] pc : ext4_mb_release+0x394/0xaf8
[   65.417473] lr : ext4_mb_release+0x37c/0xaf8
[   65.417725] sp : ffff800080b97c50
[   65.417895] x29: ffff800080b97c60 x28: dfff800000000000 x27: 0000000000000000
[   65.418271] x26: fff00000cb286000 x25: fff00000c6a3c740 x24: 1ffe000018d478e8
[   65.418711] x23: fffd800018d478e8 x22: fff00000c6a3c618 x21: 1ffe000018d478c3
[   65.419118] x20: 0000000000000000 x19: fff00000c6a3c400 x18: 1ffff4ccfe232c2e
[   65.419505] x17: 0000000000000001 x16: fff00000da46eda8 x15: 0000000000000007
[   65.419931] x14: 0000000000000000 x13: 1ffe000019233ef4 x12: fffd800018c72701
[   65.420341] x11: 1ffe000018c72700 x10: fffd800018c72700 x9 : ffffa667eed8d3fc
[   65.421427] x8 : ffff800080b979f8 x7 : 0000000000000001 x6 : ffff800080b97b10
[   65.421841] x5 : 0000000000000001 x4 : 1ffe000018f29ca9 x3 : dfff800000000000
[   65.422291] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.422730] Call trace:
[   65.422914]  ext4_mb_release+0x394/0xaf8 (P)
[   65.423374]  mbt_kunit_exit+0x9c/0x2c8
[   65.423622]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.423919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.424194]  kthread+0x328/0x630
[   65.424414]  ret_from_fork+0x10/0x20
[   65.424673] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.425085] ---[ end trace 0000000000000000 ]---
[  108.561318] Internal error: Oops: 0000000096000005 [#22]  SMP
[  108.566074] Modules linked in:
[  108.567506] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[  108.568050] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  108.568341] Hardware name: linux,dummy-virt (DT)
[  108.568540] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  108.568897] pc : kunit_test_null_dereference+0x70/0x170
[  108.569228] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.569542] sp : ffff800080f57d30
[  108.569702] x29: ffff800080f57d90 x28: 0000000000000000 x27: 0000000000000000
[  108.570174] x26: 1ffe000019372361 x25: 0000000000000000 x24: 0000000000000004
[  108.570594] x23: fff00000c9b91b0c x22: ffffa667ec648250 x21: fff00000c130ae08
[  108.571074] x20: 1ffff000101eafa6 x19: ffff800080087990 x18: 0000000075e895cb
[  108.571493] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000b81839f5
[  108.571962] x14: 00000000bfc84c46 x13: 1ffe000019233ef4 x12: fffd80001966d11c
[  108.572414] x11: 1ffe00001966d11b x10: fffd80001966d11b x9 : ffffa667ec63f9d8
[  108.572829] x8 : ffff800080f57c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  108.573238] x5 : ffff7000101eafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  108.573644] x2 : dfff800000000000 x1 : fff00000cb368000 x0 : ffff800080087990
[  108.574076] Call trace:
[  108.574263]  kunit_test_null_dereference+0x70/0x170 (P)
[  108.574549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.574864]  kthread+0x328/0x630
[  108.575227]  ret_from_fork+0x10/0x20
[  108.575477] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  108.575805] ---[ end trace 0000000000000000 ]---
[   65.288198] Internal error: Oops: 0000000096000005 [#11]  SMP
[   65.294658] Modules linked in:
[   65.295618] CPU: 1 UID: 0 PID: 399 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.296530] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.297164] Hardware name: linux,dummy-virt (DT)
[   65.297660] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.298175] pc : ext4_mb_release+0x394/0xaf8
[   65.298612] lr : ext4_mb_release+0x37c/0xaf8
[   65.299099] sp : ffff800080c67c50
[   65.299279] x29: ffff800080c67c60 x28: dfff800000000000 x27: 0000000000000000
[   65.299917] x26: fff00000c7461000 x25: fff00000c73dc740 x24: 1ffe000018e7b8e8
[   65.300457] x23: fffd800018e7b8e8 x22: fff00000c73dc618 x21: 1ffe000018e7b8c3
[   65.300901] x20: 0000000000000000 x19: fff00000c73dc400 x18: 000000009c22f5f4
[   65.301327] x17: 0000000000000001 x16: fff00000da46eda8 x15: 000000000cb40f1f
[   65.301721] x14: 000000002ec958d2 x13: 1ffe000019233ef4 x12: fffd800019223941
[   65.302232] x11: 1ffe000019223940 x10: fffd800019223940 x9 : ffffa667eed8d3fc
[   65.302724] x8 : ffff800080c679f8 x7 : 0000000000000001 x6 : ffff800080c67b10
[   65.303334] x5 : 0000000000000001 x4 : 1ffe000018f29001 x3 : dfff800000000000
[   65.303911] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.304406] Call trace:
[   65.304620]  ext4_mb_release+0x394/0xaf8 (P)
[   65.304921]  mbt_kunit_exit+0x9c/0x2c8
[   65.305229]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.305520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.305817]  kthread+0x328/0x630
[   65.306149]  ret_from_fork+0x10/0x20
[   65.306405] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.306775] ---[ end trace 0000000000000000 ]---
[   65.001086] Internal error: Oops: 0000000096000005 [#2]  SMP
[   65.011961] Modules linked in:
[   65.012238] CPU: 0 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.013701] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.013931] Hardware name: linux,dummy-virt (DT)
[   65.014209] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.014578] pc : ext4_mb_release+0x394/0xaf8
[   65.015309] lr : ext4_mb_release+0x37c/0xaf8
[   65.016006] sp : ffff800080b97c50
[   65.016277] x29: ffff800080b97c60 x28: dfff800000000000 x27: 0000000000000000
[   65.016985] x26: fff00000c481e000 x25: fff00000c6216740 x24: 1ffe000018c42ce8
[   65.017639] x23: fffd800018c42ce8 x22: fff00000c6216618 x21: 1ffe000018c42cc3
[   65.018325] x20: 0000000000000000 x19: fff00000c6216400 x18: 000000005ec3f01f
[   65.019198] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000039b35f7e
[   65.019815] x14: 00000000f1f1f1f1 x13: 1ffe000019233ec4 x12: fffd800019223bc1
[   65.020244] x11: 1ffe000019223bc0 x10: fffd800019223bc0 x9 : ffffa667eed8d3fc
[   65.020756] x8 : ffff800080b979f8 x7 : 0000000000000001 x6 : ffff800080b97b10
[   65.021215] x5 : 0000000000000001 x4 : 1ffe000018be6289 x3 : dfff800000000000
[   65.021696] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.022197] Call trace:
[   65.022394]  ext4_mb_release+0x394/0xaf8 (P)
[   65.022657]  mbt_kunit_exit+0x9c/0x2c8
[   65.022909]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.023243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.023870]  kthread+0x328/0x630
[   65.024123]  ret_from_fork+0x10/0x20
[   65.024385] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.024738] ---[ end trace 0000000000000000 ]---
[   65.377980] Internal error: Oops: 0000000096000005 [#14]  SMP
[   65.384025] Modules linked in:
[   65.385623] CPU: 1 UID: 0 PID: 405 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.387095] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.387831] Hardware name: linux,dummy-virt (DT)
[   65.388525] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.389338] pc : ext4_mb_release+0x394/0xaf8
[   65.389968] lr : ext4_mb_release+0x37c/0xaf8
[   65.390571] sp : ffff800080c67c50
[   65.391137] x29: ffff800080c67c60 x28: dfff800000000000 x27: 0000000000000000
[   65.392030] x26: fff00000cb283000 x25: fff00000c69f0740 x24: 1ffe000018d3e0e8
[   65.392381] x23: fffd800018d3e0e8 x22: fff00000c69f0618 x21: 1ffe000018d3e0c3
[   65.392714] x20: 0000000000000000 x19: fff00000c69f0400 x18: 00000000361a65dd
[   65.393350] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000fc322507
[   65.394173] x14: 00000000097965a4 x13: 1ffe000019233ef4 x12: fffd80001924c001
[   65.395109] x11: 1ffe00001924c000 x10: fffd80001924c000 x9 : ffffa667eed8d3fc
[   65.395928] x8 : ffff800080c679f8 x7 : 0000000000000001 x6 : ffff800080c67b10
[   65.396696] x5 : 0000000000000001 x4 : 1ffe000018d4b511 x3 : dfff800000000000
[   65.397473] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.398241] Call trace:
[   65.398542]  ext4_mb_release+0x394/0xaf8 (P)
[   65.399800]  mbt_kunit_exit+0x9c/0x2c8
[   65.400226]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.400457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.400693]  kthread+0x328/0x630
[   65.400889]  ret_from_fork+0x10/0x20
[   65.401127] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.401467] ---[ end trace 0000000000000000 ]---
[   65.190724] Internal error: Oops: 0000000096000005 [#8]  SMP
[   65.194543] Modules linked in:
[   65.195839] CPU: 1 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.196799] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.197288] Hardware name: linux,dummy-virt (DT)
[   65.197849] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.198273] pc : ext4_mb_release+0x394/0xaf8
[   65.198558] lr : ext4_mb_release+0x37c/0xaf8
[   65.199046] sp : ffff800080c47c50
[   65.199469] x29: ffff800080c47c60 x28: dfff800000000000 x27: 0000000000000000
[   65.200292] x26: fff00000c6a83000 x25: fff00000c1c00740 x24: 1ffe0000183800e8
[   65.200851] x23: fffd8000183800e8 x22: fff00000c1c00618 x21: 1ffe0000183800c3
[   65.201413] x20: 0000000000000000 x19: fff00000c1c00400 x18: 00000000f7fb3aca
[   65.201795] x17: 0000000000000001 x16: fff00000da46eda8 x15: 0000000046f67f02
[   65.202230] x14: 00000000edf387bb x13: 1ffe000019233ef4 x12: fffd8000192238c1
[   65.202617] x11: 1ffe0000192238c0 x10: fffd8000192238c0 x9 : ffffa667eed8d3fc
[   65.203244] x8 : ffff800080c479f8 x7 : 0000000000000001 x6 : ffff800080c47b10
[   65.203672] x5 : 0000000000000001 x4 : 1ffe0000193b4511 x3 : dfff800000000000
[   65.204120] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.204528] Call trace:
[   65.204683]  ext4_mb_release+0x394/0xaf8 (P)
[   65.204999]  mbt_kunit_exit+0x9c/0x2c8
[   65.205214]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.205487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.205776]  kthread+0x328/0x630
[   65.206003]  ret_from_fork+0x10/0x20
[   65.206270] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.206556] ---[ end trace 0000000000000000 ]---
[   65.096131] Internal error: Oops: 0000000096000005 [#5]  SMP
[   65.101929] Modules linked in:
[   65.102733] CPU: 1 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.104538] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.105215] Hardware name: linux,dummy-virt (DT)
[   65.105740] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.106036] pc : ext4_mb_release+0x394/0xaf8
[   65.106267] lr : ext4_mb_release+0x37c/0xaf8
[   65.106461] sp : ffff800080c37c50
[   65.106616] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000
[   65.107557] x26: fff00000c6a80000 x25: fff00000c6254740 x24: 1ffe000018c4a8e8
[   65.108531] x23: fffd800018c4a8e8 x22: fff00000c6254618 x21: 1ffe000018c4a8c3
[   65.109296] x20: 0000000000000000 x19: fff00000c6254400 x18: 00000000b001a9fd
[   65.110038] x17: 0000000000000001 x16: fff00000da46eda8 x15: fff00000ff616b48
[   65.110799] x14: 0000000000018fff x13: 1ffe000019233ef4 x12: fffd800019223841
[   65.111681] x11: 1ffe000019223840 x10: fffd800019223840 x9 : ffffa667eed8d3fc
[   65.112523] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10
[   65.113295] x5 : 0000000000000001 x4 : 1ffe0000193b4ca9 x3 : dfff800000000000
[   65.113639] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.113984] Call trace:
[   65.114133]  ext4_mb_release+0x394/0xaf8 (P)
[   65.114360]  mbt_kunit_exit+0x9c/0x2c8
[   65.114547]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.114780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.115412]  kthread+0x328/0x630
[   65.115780]  ret_from_fork+0x10/0x20
[   65.116247] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.117053] ---[ end trace 0000000000000000 ]---
[   65.163742] Internal error: Oops: 0000000096000005 [#7]  SMP
[   65.169525] Modules linked in:
[   65.169859] CPU: 0 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.170293] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.170499] Hardware name: linux,dummy-virt (DT)
[   65.170696] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.171078] pc : ext4_mb_release+0x394/0xaf8
[   65.171347] lr : ext4_mb_release+0x37c/0xaf8
[   65.171607] sp : ffff800080c37c50
[   65.171786] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000
[   65.172212] x26: fff00000c742a000 x25: fff00000c69f6740 x24: 1ffe000018d3ece8
[   65.172624] x23: fffd800018d3ece8 x22: fff00000c69f6618 x21: 1ffe000018d3ecc3
[   65.173619] x20: 0000000000000000 x19: fff00000c69f6400 x18: 00000000884044ce
[   65.174017] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000042c68eb0
[   65.174468] x14: 000000006786708d x13: 1ffe000019233ec4 x12: fffd800019373bc1
[   65.174911] x11: 1ffe000019373bc0 x10: fffd800019373bc0 x9 : ffffa667eed8d3fc
[   65.175600] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10
[   65.175997] x5 : 0000000000000001 x4 : 1ffe000018cc4ca9 x3 : dfff800000000000
[   65.176442] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.176857] Call trace:
[   65.177027]  ext4_mb_release+0x394/0xaf8 (P)
[   65.177294]  mbt_kunit_exit+0x9c/0x2c8
[   65.177512]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.177775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.178098]  kthread+0x328/0x630
[   65.178312]  ret_from_fork+0x10/0x20
[   65.178567] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.178936] ---[ end trace 0000000000000000 ]---
[   65.464712] Internal error: Oops: 0000000096000005 [#17]  SMP
[   65.470504] Modules linked in:
[   65.470942] CPU: 1 UID: 0 PID: 411 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.472166] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.472653] Hardware name: linux,dummy-virt (DT)
[   65.473196] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.473992] pc : ext4_mb_release+0x394/0xaf8
[   65.474564] lr : ext4_mb_release+0x37c/0xaf8
[   65.475215] sp : ffff800080b97c50
[   65.475689] x29: ffff800080b97c60 x28: dfff800000000000 x27: 0000000000000000
[   65.476588] x26: fff00000c7467000 x25: fff00000c7576740 x24: 1ffe000018eaece8
[   65.477447] x23: fffd800018eaece8 x22: fff00000c7576618 x21: 1ffe000018eaecc3
[   65.478211] x20: 0000000000000000 x19: fff00000c7576400 x18: 1ffff4ccfe232c2e
[   65.478811] x17: 0000000000000000 x16: fff00000da46eda8 x15: 0000000000000007
[   65.479679] x14: 00000000f1f1f1f1 x13: 1ffe000019233ef4 x12: fffd8000192239c1
[   65.480549] x11: 1ffe0000192239c0 x10: fffd8000192239c0 x9 : ffffa667eed8d3fc
[   65.481197] x8 : ffff800080b979f8 x7 : 0000000000000001 x6 : ffff800080b97b10
[   65.481541] x5 : 0000000000000001 x4 : 1ffe000019614511 x3 : dfff800000000000
[   65.481915] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.482357] Call trace:
[   65.482533]  ext4_mb_release+0x394/0xaf8 (P)
[   65.482858]  mbt_kunit_exit+0x9c/0x2c8
[   65.483196]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.483499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.483978]  kthread+0x328/0x630
[   65.484212]  ret_from_fork+0x10/0x20
[   65.484482] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.484825] ---[ end trace 0000000000000000 ]---
[   65.220302] Internal error: Oops: 0000000096000005 [#9]  SMP
[   65.226742] Modules linked in:
[   65.227179] CPU: 0 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.228274] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.228499] Hardware name: linux,dummy-virt (DT)
[   65.228707] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.229474] pc : ext4_mb_release+0x394/0xaf8
[   65.229986] lr : ext4_mb_release+0x37c/0xaf8
[   65.230502] sp : ffff800080c67c50
[   65.230886] x29: ffff800080c67c60 x28: dfff800000000000 x27: 0000000000000000
[   65.231766] x26: fff00000c742d000 x25: fff00000c69f4740 x24: 1ffe000018d3e8e8
[   65.232596] x23: fffd800018d3e8e8 x22: fff00000c69f4618 x21: 1ffe000018d3e8c3
[   65.233473] x20: 0000000000000000 x19: fff00000c69f4400 x18: 1ffff4ccfe232c2e
[   65.234208] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000000000007
[   65.234553] x14: 00000000f1f1f1f1 x13: 1ffe000019233ec4 x12: fffd800018c72481
[   65.234938] x11: 1ffe000018c72480 x10: fffd800018c72480 x9 : ffffa667eed8d3fc
[   65.235369] x8 : ffff800080c679f8 x7 : 0000000000000001 x6 : ffff800080c67b10
[   65.235828] x5 : 0000000000000001 x4 : 1ffe000018cc4511 x3 : dfff800000000000
[   65.236278] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.236718] Call trace:
[   65.236929]  ext4_mb_release+0x394/0xaf8 (P)
[   65.237210]  mbt_kunit_exit+0x9c/0x2c8
[   65.237451]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.237736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.238076]  kthread+0x328/0x630
[   65.238327]  ret_from_fork+0x10/0x20
[   65.238579] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.238913] ---[ end trace 0000000000000000 ]---
[  108.179709] Internal error: Oops: 0000000096000005 [#20]  SMP
[  108.185702] Modules linked in:
[  108.186675] CPU: 1 UID: 0 PID: 417 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[  108.187895] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  108.188420] Hardware name: linux,dummy-virt (DT)
[  108.188877] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  108.189324] pc : ext4_mb_release+0x394/0xaf8
[  108.189775] lr : ext4_mb_release+0x37c/0xaf8
[  108.190035] sp : ffff800080c87c50
[  108.190203] x29: ffff800080c87c60 x28: dfff800000000000 x27: 0000000000000000
[  108.190649] x26: fff00000c69ca000 x25: fff00000fff7e740 x24: 1ffe00001ffefce8
[  108.191088] x23: fffd80001ffefce8 x22: fff00000fff7e618 x21: 1ffe00001ffefcc3
[  108.191460] x20: 0000000000000000 x19: fff00000fff7e400 x18: 0000000005215f07
[  108.191881] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000bcfc7306
[  108.192286] x14: 00000000e7b51125 x13: 1ffe000019233ef4 x12: fffd800019223a41
[  108.192695] x11: 1ffe000019223a40 x10: fffd800019223a40 x9 : ffffa667eed8d3fc
[  108.193110] x8 : ffff800080c879f8 x7 : 0000000000000001 x6 : ffff800080c87b10
[  108.193495] x5 : 0000000000000001 x4 : 1ffe00001957d289 x3 : dfff800000000000
[  108.193898] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[  108.194284] Call trace:
[  108.194459]  ext4_mb_release+0x394/0xaf8 (P)
[  108.194698]  mbt_kunit_exit+0x9c/0x2c8
[  108.194955]  kunit_try_run_case_cleanup+0x9c/0xe0
[  108.195176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.195491]  kthread+0x328/0x630
[  108.195675]  ret_from_fork+0x10/0x20
[  108.195937] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[  108.196243] ---[ end trace 0000000000000000 ]---
[   86.855082] Internal error: Oops: 0000000096000005 [#19]  SMP
[   86.858156] Modules linked in:
[   86.858429] CPU: 0 UID: 0 PID: 415 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   86.859180] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   86.859569] Hardware name: linux,dummy-virt (DT)
[   86.859853] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   86.860195] pc : ext4_mb_release+0x394/0xaf8
[   86.860412] lr : ext4_mb_release+0x37c/0xaf8
[   86.860604] sp : ffff800080c87c50
[   86.860822] x29: ffff800080c87c60 x28: dfff800000000000 x27: 0000000000000000
[   86.861390] x26: fff00000c617f000 x25: fff00000cb0b2740 x24: 1ffe0000196164e8
[   86.861882] x23: fffd8000196164e8 x22: fff00000cb0b2618 x21: 1ffe0000196164c3
[   86.862310] x20: 0000000000000000 x19: fff00000cb0b2400 x18: fff00000cb344800
[   86.862806] x17: 0000000054d4944d x16: fff00000c99d483c x15: 0000000000000000
[   86.863257] x14: 00000000f1f1f1f1 x13: 1ffe00001b48dddd x12: fffd8000194a90c1
[   86.863844] x11: 1ffe0000194a90c0 x10: fffd8000194a90c0 x9 : ffffa667eed8d3fc
[   86.864381] x8 : ffff800080c879f8 x7 : 0000000000000001 x6 : ffff800080c87b10
[   86.865226] x5 : 0000000000000001 x4 : 1ffe00001957d001 x3 : dfff800000000000
[   86.866406] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   86.866856] Call trace:
[   86.867197]  ext4_mb_release+0x394/0xaf8 (P)
[   86.867471]  mbt_kunit_exit+0x9c/0x2c8
[   86.867695]  kunit_try_run_case_cleanup+0x9c/0xe0
[   86.867962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.868238]  kthread+0x328/0x630
[   86.868439]  ret_from_fork+0x10/0x20
[   86.868692] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   86.869593] ---[ end trace 0000000000000000 ]---
[   65.253039] Internal error: Oops: 0000000096000005 [#10]  SMP
[   65.261734] Modules linked in:
[   65.262934] CPU: 0 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.264169] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.264766] Hardware name: linux,dummy-virt (DT)
[   65.265297] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.266040] pc : ext4_mb_release+0x394/0xaf8
[   65.266400] lr : ext4_mb_release+0x37c/0xaf8
[   65.266599] sp : ffff800080c37c50
[   65.266775] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000
[   65.267140] x26: fff00000c6a86000 x25: fff00000c73de740 x24: 1ffe000018e7bce8
[   65.267775] x23: fffd800018e7bce8 x22: fff00000c73de618 x21: 1ffe000018e7bcc3
[   65.268682] x20: 0000000000000000 x19: fff00000c73de400 x18: 00000000754074e2
[   65.269571] x17: 0000000000000000 x16: fff00000da44cda8 x15: 00000000ba999284
[   65.270320] x14: 000000000582ddc8 x13: 1ffe000019233ec4 x12: fffd80001883c801
[   65.271112] x11: 1ffe00001883c800 x10: fffd80001883c800 x9 : ffffa667eed8d3fc
[   65.271989] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10
[   65.272889] x5 : 0000000000000001 x4 : 1ffe0000193b4001 x3 : dfff800000000000
[   65.273646] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.274401] Call trace:
[   65.274684]  ext4_mb_release+0x394/0xaf8 (P)
[   65.275252]  mbt_kunit_exit+0x9c/0x2c8
[   65.275689]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.276248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.276690]  kthread+0x328/0x630
[   65.276881]  ret_from_fork+0x10/0x20
[   65.277093] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.277337] ---[ end trace 0000000000000000 ]---
[   65.318338] Internal error: Oops: 0000000096000005 [#12]  SMP
[   65.325330] Modules linked in:
[   65.326390] CPU: 0 UID: 0 PID: 401 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.327384] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.327604] Hardware name: linux,dummy-virt (DT)
[   65.328145] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.329118] pc : ext4_mb_release+0x394/0xaf8
[   65.329783] lr : ext4_mb_release+0x37c/0xaf8
[   65.330421] sp : ffff800080c47c50
[   65.330935] x29: ffff800080c47c60 x28: dfff800000000000 x27: 0000000000000000
[   65.332061] x26: fff00000cb280000 x25: fff00000c69f2740 x24: 1ffe000018d3e4e8
[   65.332883] x23: fffd800018d3e4e8 x22: fff00000c69f2618 x21: 1ffe000018d3e4c3
[   65.333243] x20: 0000000000000000 x19: fff00000c69f2400 x18: 000000000fc2155b
[   65.333587] x17: 0000000000000000 x16: fff00000da44cda8 x15: 0000000002b0de14
[   65.334602] x14: 000000003550ba4d x13: 1ffe000019233ec4 x12: fffd800018c72581
[   65.335791] x11: 1ffe000018c72580 x10: fffd800018c72580 x9 : ffffa667eed8d3fc
[   65.336648] x8 : ffff800080c479f8 x7 : 0000000000000001 x6 : ffff800080c47b10
[   65.337017] x5 : 0000000000000001 x4 : 1ffe000018d4b001 x3 : dfff800000000000
[   65.337351] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.337687] Call trace:
[   65.338340]  ext4_mb_release+0x394/0xaf8 (P)
[   65.339103]  mbt_kunit_exit+0x9c/0x2c8
[   65.339832]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.340605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.341365]  kthread+0x328/0x630
[   65.341906]  ret_from_fork+0x10/0x20
[   65.342509] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.343325] ---[ end trace 0000000000000000 ]---
[   65.438818] Internal error: Oops: 0000000096000005 [#16]  SMP
[   65.441237] Modules linked in:
[   65.441503] CPU: 0 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.442066] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.443900] Hardware name: linux,dummy-virt (DT)
[   65.444191] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.444536] pc : ext4_mb_release+0x394/0xaf8
[   65.444826] lr : ext4_mb_release+0x37c/0xaf8
[   65.445071] sp : ffff800080c67c50
[   65.445274] x29: ffff800080c67c60 x28: dfff800000000000 x27: 0000000000000000
[   65.445688] x26: fff00000c6179000 x25: fff00000c6a3e740 x24: 1ffe000018d47ce8
[   65.446092] x23: fffd800018d47ce8 x22: fff00000c6a3e618 x21: 1ffe000018d47cc3
[   65.447337] x20: 0000000000000000 x19: fff00000c6a3e400 x18: 00000000898c748e
[   65.448414] x17: 0000000000000000 x16: fff00000da44cda8 x15: 000000007b5762fa
[   65.448886] x14: 00000000cf5214d3 x13: 1ffe000019233ec4 x12: fffd8000194a91a1
[   65.449305] x11: 1ffe0000194a91a0 x10: fffd8000194a91a0 x9 : ffffa667eed8d3fc
[   65.449716] x8 : ffff800080c679f8 x7 : 0000000000000001 x6 : ffff800080c67b10
[   65.450428] x5 : 0000000000000001 x4 : 1ffe000018d4b799 x3 : dfff800000000000
[   65.451256] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.451698] Call trace:
[   65.452166]  ext4_mb_release+0x394/0xaf8 (P)
[   65.452571]  mbt_kunit_exit+0x9c/0x2c8
[   65.453014]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.453603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.454022]  kthread+0x328/0x630
[   65.454216]  ret_from_fork+0x10/0x20
[   65.454429] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.454674] ---[ end trace 0000000000000000 ]---
[   65.493576] Internal error: Oops: 0000000096000005 [#18]  SMP
[   65.499428] Modules linked in:
[   65.500031] CPU: 0 UID: 0 PID: 413 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.500968] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.501180] Hardware name: linux,dummy-virt (DT)
[   65.501400] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.501812] pc : ext4_mb_release+0x394/0xaf8
[   65.502099] lr : ext4_mb_release+0x37c/0xaf8
[   65.502358] sp : ffff800080c87c50
[   65.502588] x29: ffff800080c87c60 x28: dfff800000000000 x27: 0000000000000000
[   65.503094] x26: fff00000c617c000 x25: fff00000cb0b0740 x24: 1ffe0000196160e8
[   65.503560] x23: fffd8000196160e8 x22: fff00000cb0b0618 x21: 1ffe0000196160c3
[   65.503993] x20: 0000000000000000 x19: fff00000cb0b0400 x18: 1ffff4ccfe232c2e
[   65.504430] x17: 0000000000000001 x16: fff00000c99d483c x15: fff00000ff616b48
[   65.505114] x14: 0000000000018fff x13: 1ffe00001b48dddd x12: fffd800018194d81
[   65.505692] x11: 1ffe000018194d80 x10: fffd800018194d80 x9 : ffffa667eed8d3fc
[   65.506150] x8 : ffff800080c879f8 x7 : 0000000000000001 x6 : ffff800080c87b10
[   65.506608] x5 : 0000000000000001 x4 : 1ffe000019614a21 x3 : dfff800000000000
[   65.507256] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.507709] Call trace:
[   65.507900]  ext4_mb_release+0x394/0xaf8 (P)
[   65.508225]  mbt_kunit_exit+0x9c/0x2c8
[   65.508465]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.508772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.509112]  kthread+0x328/0x630
[   65.509308]  ret_from_fork+0x10/0x20
[   65.509588] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.509961] ---[ end trace 0000000000000000 ]---
[   65.036620] Internal error: Oops: 0000000096000005 [#3]  SMP
[   65.040182] Modules linked in:
[   65.040431] CPU: 0 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.040930] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.041150] Hardware name: linux,dummy-virt (DT)
[   65.041819] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.042229] pc : ext4_mb_release+0x394/0xaf8
[   65.042511] lr : ext4_mb_release+0x37c/0xaf8
[   65.042779] sp : ffff800080aa7c50
[   65.042983] x29: ffff800080aa7c60 x28: dfff800000000000 x27: 0000000000000000
[   65.043445] x26: fff00000c096e000 x25: fff00000c7484740 x24: 1ffe000018e908e8
[   65.043912] x23: fffd800018e908e8 x22: fff00000c7484618 x21: 1ffe000018e908c3
[   65.044374] x20: 0000000000000000 x19: fff00000c7484400 x18: 1ffff4ccfe232c2e
[   65.044849] x17: 0000000000000000 x16: fff00000da44cda8 x15: 0000000000000007
[   65.045270] x14: 0000000000000000 x13: 1ffe000019233ec4 x12: fffd800018c72381
[   65.045690] x11: 1ffe000018c72380 x10: fffd800018c72380 x9 : ffffa667eed8d3fc
[   65.046176] x8 : ffff800080aa79f8 x7 : 0000000000000001 x6 : ffff800080aa7b10
[   65.046591] x5 : 0000000000000001 x4 : 1ffe000018be6ca9 x3 : dfff800000000000
[   65.047231] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.047658] Call trace:
[   65.047883]  ext4_mb_release+0x394/0xaf8 (P)
[   65.048110]  mbt_kunit_exit+0x9c/0x2c8
[   65.048302]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.048515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.048870]  kthread+0x328/0x630
[   65.049101]  ret_from_fork+0x10/0x20
[   65.049382] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.049742] ---[ end trace 0000000000000000 ]---
[  108.206150] Internal error: Oops: 0000000096000005 [#21]  SMP
[  108.210653] Modules linked in:
[  108.212187] CPU: 0 UID: 0 PID: 419 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[  108.213647] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  108.214374] Hardware name: linux,dummy-virt (DT)
[  108.215455] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  108.216353] pc : ext4_mb_release+0x394/0xaf8
[  108.216880] lr : ext4_mb_release+0x37c/0xaf8
[  108.217137] sp : ffff800080c67c50
[  108.217314] x29: ffff800080c67c60 x28: dfff800000000000 x27: 0000000000000000
[  108.217775] x26: fff00000cbfea000 x25: fff00000cb0b4740 x24: 1ffe0000196168e8
[  108.218193] x23: fffd8000196168e8 x22: fff00000cb0b4618 x21: 1ffe0000196168c3
[  108.218593] x20: 0000000000000000 x19: fff00000cb0b4400 x18: 00000000daa94a48
[  108.218978] x17: 0000000000000001 x16: fff00000da44cda8 x15: fff00000ff616b48
[  108.219423] x14: 00000000f1f1f1f1 x13: 1ffe000019233ec4 x12: fffd800018124c81
[  108.220027] x11: 1ffe000018124c80 x10: fffd800018124c80 x9 : ffffa667eed8d3fc
[  108.220446] x8 : ffff800080c679f8 x7 : 0000000000000001 x6 : ffff800080c67b10
[  108.220867] x5 : 0000000000000001 x4 : 1ffe000018d4bca9 x3 : dfff800000000000
[  108.221276] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[  108.221675] Call trace:
[  108.221899]  ext4_mb_release+0x394/0xaf8 (P)
[  108.222162]  mbt_kunit_exit+0x9c/0x2c8
[  108.222396]  kunit_try_run_case_cleanup+0x9c/0xe0
[  108.222679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  108.222977]  kthread+0x328/0x630
[  108.223602]  ret_from_fork+0x10/0x20
[  108.223862] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[  108.224181] ---[ end trace 0000000000000000 ]---
[   65.128096] Internal error: Oops: 0000000096000005 [#6]  SMP
[   65.133828] Modules linked in:
[   65.134487] CPU: 0 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.136297] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.137010] Hardware name: linux,dummy-virt (DT)
[   65.137549] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.138135] pc : ext4_mb_release+0x394/0xaf8
[   65.138765] lr : ext4_mb_release+0x37c/0xaf8
[   65.139366] sp : ffff800080c57c50
[   65.139842] x29: ffff800080c57c60 x28: dfff800000000000 x27: 0000000000000000
[   65.140488] x26: fff00000c0ccd000 x25: fff00000c7486740 x24: 1ffe000018e90ce8
[   65.140854] x23: fffd800018e90ce8 x22: fff00000c7486618 x21: 1ffe000018e90cc3
[   65.141200] x20: 0000000000000000 x19: fff00000c7486400 x18: 000000005789b7f3
[   65.141541] x17: 0000000000000000 x16: fff00000c99d4c3c x15: 0000000068e9016b
[   65.142268] x14: 000000004ee7f9bc x13: 1ffe00001b4899dd x12: fffd800018c72001
[   65.143150] x11: 1ffe000018c72000 x10: fffd800018c72000 x9 : ffffa667eed8d3fc
[   65.144108] x8 : ffff800080c579f8 x7 : 0000000000000001 x6 : ffff800080c57b10
[   65.144925] x5 : 0000000000000001 x4 : 1ffe000018cc4a21 x3 : dfff800000000000
[   65.145711] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.146499] Call trace:
[   65.146832]  ext4_mb_release+0x394/0xaf8 (P)
[   65.147525]  mbt_kunit_exit+0x9c/0x2c8
[   65.148096]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.148633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.149225]  kthread+0x328/0x630
[   65.149594]  ret_from_fork+0x10/0x20
[   65.150037] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.150640] ---[ end trace 0000000000000000 ]---
[   65.354780] Internal error: Oops: 0000000096000005 [#13]  SMP
[   65.358466] Modules linked in:
[   65.358778] CPU: 1 UID: 0 PID: 403 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.359287] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.359495] Hardware name: linux,dummy-virt (DT)
[   65.359781] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.360156] pc : ext4_mb_release+0x394/0xaf8
[   65.360437] lr : ext4_mb_release+0x37c/0xaf8
[   65.360676] sp : ffff800080c37c50
[   65.360874] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000
[   65.361266] x26: fff00000c7464000 x25: fff00000c7574740 x24: 1ffe000018eae8e8
[   65.361755] x23: fffd800018eae8e8 x22: fff00000c7574618 x21: 1ffe000018eae8c3
[   65.362213] x20: 0000000000000000 x19: fff00000c7574400 x18: fff00000c3ee9800
[   65.362616] x17: 0000000000000001 x16: fff00000da46eda8 x15: 1ffe0000187dd30f
[   65.363061] x14: 0000000000000000 x13: 1ffe000019233ef4 x12: fffd80001881b001
[   65.363430] x11: 1ffe00001881b000 x10: fffd80001881b000 x9 : ffffa667eed8d3fc
[   65.363927] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10
[   65.364332] x5 : 0000000000000001 x4 : 1ffe000018f29511 x3 : dfff800000000000
[   65.364779] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.365233] Call trace:
[   65.365506]  ext4_mb_release+0x394/0xaf8 (P)
[   65.365775]  mbt_kunit_exit+0x9c/0x2c8
[   65.365969]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.366190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.366424]  kthread+0x328/0x630
[   65.366652]  ret_from_fork+0x10/0x20
[   65.366916] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.367439] ---[ end trace 0000000000000000 ]---
[   65.064943] Internal error: Oops: 0000000096000005 [#4]  SMP
[   65.070979] Modules linked in:
[   65.072442] CPU: 0 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   65.072904] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.073204] Hardware name: linux,dummy-virt (DT)
[   65.073715] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   65.074440] pc : ext4_mb_release+0x394/0xaf8
[   65.075252] lr : ext4_mb_release+0x37c/0xaf8
[   65.075725] sp : ffff800080c47c50
[   65.076106] x29: ffff800080c47c60 x28: dfff800000000000 x27: 0000000000000000
[   65.076497] x26: fff00000c1b88000 x25: fff00000c6252740 x24: 1ffe000018c4a4e8
[   65.076849] x23: fffd800018c4a4e8 x22: fff00000c6252618 x21: 1ffe000018c4a4c3
[   65.077190] x20: 0000000000000000 x19: fff00000c6252400 x18: 1ffff4ccfe232c2e
[   65.077529] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000000000007
[   65.078089] x14: 0000000000000000 x13: 1ffe000019233ec4 x12: fffd800018390541
[   65.078863] x11: 1ffe000018390540 x10: fffd800018390540 x9 : ffffa667eed8d3fc
[   65.080229] x8 : ffff800080c479f8 x7 : 0000000000000001 x6 : ffff800080c47b10
[   65.080995] x5 : 0000000000000001 x4 : 1ffe000018368a21 x3 : dfff800000000000
[   65.081731] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   65.082488] Call trace:
[   65.082777]  ext4_mb_release+0x394/0xaf8 (P)
[   65.083415]  mbt_kunit_exit+0x9c/0x2c8
[   65.083975]  kunit_try_run_case_cleanup+0x9c/0xe0
[   65.084484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.085065]  kthread+0x328/0x630
[   65.085441]  ret_from_fork+0x10/0x20
[   65.085844] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   65.086095] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   64.804078] ==================================================================
[   64.804175] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   64.804175] 
[   64.804268] Use-after-free read at 0x00000000741b1bf1 (in kfence-#182):
[   64.804321]  test_krealloc+0x51c/0x830
[   64.804364]  kunit_try_run_case+0x170/0x3f0
[   64.804407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.804451]  kthread+0x328/0x630
[   64.804491]  ret_from_fork+0x10/0x20
[   64.804530] 
[   64.804557] kfence-#182: 0x00000000741b1bf1-0x000000008628295a, size=32, cache=kmalloc-32
[   64.804557] 
[   64.804612] allocated by task 368 on cpu 1 at 64.803406s (0.001203s ago):
[   64.804683]  test_alloc+0x29c/0x628
[   64.804721]  test_krealloc+0xc0/0x830
[   64.804771]  kunit_try_run_case+0x170/0x3f0
[   64.804812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.804855]  kthread+0x328/0x630
[   64.804891]  ret_from_fork+0x10/0x20
[   64.804928] 
[   64.804953] freed by task 368 on cpu 1 at 64.803652s (0.001297s ago):
[   64.805015]  krealloc_noprof+0x148/0x360
[   64.805055]  test_krealloc+0x1dc/0x830
[   64.805093]  kunit_try_run_case+0x170/0x3f0
[   64.805130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.805171]  kthread+0x328/0x630
[   64.805208]  ret_from_fork+0x10/0x20
[   64.805245] 
[   64.805292] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   64.805372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.805401] Hardware name: linux,dummy-virt (DT)
[   64.805436] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   64.715479] ==================================================================
[   64.715579] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   64.715579] 
[   64.715679] Use-after-free read at 0x000000007933e713 (in kfence-#181):
[   64.715734]  test_memcache_typesafe_by_rcu+0x280/0x560
[   64.715799]  kunit_try_run_case+0x170/0x3f0
[   64.715843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.715888]  kthread+0x328/0x630
[   64.715927]  ret_from_fork+0x10/0x20
[   64.715967] 
[   64.715994] kfence-#181: 0x000000007933e713-0x00000000f8e367cb, size=32, cache=test
[   64.715994] 
[   64.716046] allocated by task 366 on cpu 0 at 64.698125s (0.017917s ago):
[   64.716119]  test_alloc+0x230/0x628
[   64.716156]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   64.716196]  kunit_try_run_case+0x170/0x3f0
[   64.716235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.716279]  kthread+0x328/0x630
[   64.716322]  ret_from_fork+0x10/0x20
[   64.716360] 
[   64.716384] freed by task 366 on cpu 0 at 64.698236s (0.018143s ago):
[   64.716440]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   64.716479]  kunit_try_run_case+0x170/0x3f0
[   64.716518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.716561]  kthread+0x328/0x630
[   64.716596]  ret_from_fork+0x10/0x20
[   64.716635] 
[   64.716684] CPU: 0 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   64.716772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.716802] Hardware name: linux,dummy-virt (DT)
[   64.716838] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   41.726948] ==================================================================
[   41.727106] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   41.727106] 
[   41.727205] Invalid read at 0x00000000467f757d:
[   41.727312]  test_invalid_access+0xdc/0x1f0
[   41.727827]  kunit_try_run_case+0x170/0x3f0
[   41.727895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.727943]  kthread+0x328/0x630
[   41.727990]  ret_from_fork+0x10/0x20
[   41.728047] 
[   41.728101] CPU: 1 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   41.728223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.728260] Hardware name: linux,dummy-virt (DT)
[   41.728302] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   41.499659] ==================================================================
[   41.499771] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.499771] 
[   41.499838] Corrupted memory at 0x00000000f3dccbe0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#177):
[   41.500157]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.500205]  kunit_try_run_case+0x170/0x3f0
[   41.500250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.500296]  kthread+0x328/0x630
[   41.500335]  ret_from_fork+0x10/0x20
[   41.500375] 
[   41.500400] kfence-#177: 0x00000000325e471f-0x000000006c6eb615, size=73, cache=kmalloc-96
[   41.500400] 
[   41.500459] allocated by task 356 on cpu 1 at 41.499421s (0.001034s ago):
[   41.500527]  test_alloc+0x29c/0x628
[   41.500565]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   41.500609]  kunit_try_run_case+0x170/0x3f0
[   41.500650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.500693]  kthread+0x328/0x630
[   41.500728]  ret_from_fork+0x10/0x20
[   41.500782] 
[   41.500807] freed by task 356 on cpu 1 at 41.499567s (0.001235s ago):
[   41.500870]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.500911]  kunit_try_run_case+0x170/0x3f0
[   41.500950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.500993]  kthread+0x328/0x630
[   41.501030]  ret_from_fork+0x10/0x20
[   41.501069] 
[   41.501115] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   41.501196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.501225] Hardware name: linux,dummy-virt (DT)
[   41.501259] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   41.395596] ==================================================================
[   41.395691] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   41.395691] 
[   41.395810] Out-of-bounds read at 0x0000000014788ace (105B right of kfence-#176):
[   41.395876]  test_kmalloc_aligned_oob_read+0x238/0x468
[   41.395929]  kunit_try_run_case+0x170/0x3f0
[   41.395979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.396024]  kthread+0x328/0x630
[   41.396065]  ret_from_fork+0x10/0x20
[   41.396107] 
[   41.396133] kfence-#176: 0x000000000cbe12dd-0x00000000f4aa4997, size=73, cache=kmalloc-96
[   41.396133] 
[   41.396192] allocated by task 354 on cpu 1 at 41.395349s (0.000838s ago):
[   41.396266]  test_alloc+0x29c/0x628
[   41.396307]  test_kmalloc_aligned_oob_read+0x100/0x468
[   41.396349]  kunit_try_run_case+0x170/0x3f0
[   41.396390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.396436]  kthread+0x328/0x630
[   41.396474]  ret_from_fork+0x10/0x20
[   41.396513] 
[   41.396563] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   41.396652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.396683] Hardware name: linux,dummy-virt (DT)
[   41.396722] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   38.063519] ==================================================================
[   38.063611] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   38.063611] 
[   38.063671] Corrupted memory at 0x0000000022a9c0af [ ! ] (in kfence-#144):
[   38.063801]  test_corruption+0x1d8/0x378
[   38.063845]  kunit_try_run_case+0x170/0x3f0
[   38.063886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.063929]  kthread+0x328/0x630
[   38.063970]  ret_from_fork+0x10/0x20
[   38.064012] 
[   38.064038] kfence-#144: 0x00000000bb7dd624-0x000000005d83b3f4, size=32, cache=test
[   38.064038] 
[   38.064092] allocated by task 344 on cpu 0 at 38.063375s (0.000713s ago):
[   38.064152]  test_alloc+0x230/0x628
[   38.064190]  test_corruption+0x198/0x378
[   38.064228]  kunit_try_run_case+0x170/0x3f0
[   38.064267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.064310]  kthread+0x328/0x630
[   38.064346]  ret_from_fork+0x10/0x20
[   38.064385] 
[   38.064408] freed by task 344 on cpu 0 at 38.063436s (0.000969s ago):
[   38.064467]  test_corruption+0x1d8/0x378
[   38.064505]  kunit_try_run_case+0x170/0x3f0
[   38.064543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.064586]  kthread+0x328/0x630
[   38.064622]  ret_from_fork+0x10/0x20
[   38.064660] 
[   38.064703] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   38.064793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.064823] Hardware name: linux,dummy-virt (DT)
[   38.064857] ==================================================================
[   37.959512] ==================================================================
[   37.959606] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   37.959606] 
[   37.959666] Corrupted memory at 0x00000000ed84e9a0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#143):
[   37.959990]  test_corruption+0x120/0x378
[   37.960035]  kunit_try_run_case+0x170/0x3f0
[   37.960077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.960120]  kthread+0x328/0x630
[   37.960160]  ret_from_fork+0x10/0x20
[   37.960198] 
[   37.960221] kfence-#143: 0x000000005611c5ea-0x000000003ed12cd5, size=32, cache=test
[   37.960221] 
[   37.960274] allocated by task 344 on cpu 0 at 37.959366s (0.000904s ago):
[   37.960333]  test_alloc+0x230/0x628
[   37.960371]  test_corruption+0xdc/0x378
[   37.960408]  kunit_try_run_case+0x170/0x3f0
[   37.960447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.960487]  kthread+0x328/0x630
[   37.960523]  ret_from_fork+0x10/0x20
[   37.960560] 
[   37.960584] freed by task 344 on cpu 0 at 37.959428s (0.001153s ago):
[   37.960644]  test_corruption+0x120/0x378
[   37.960680]  kunit_try_run_case+0x170/0x3f0
[   37.960718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.960774]  kthread+0x328/0x630
[   37.960809]  ret_from_fork+0x10/0x20
[   37.960848] 
[   37.960890] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   37.960968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.960996] Hardware name: linux,dummy-virt (DT)
[   37.961030] ==================================================================
[   37.855727] ==================================================================
[   37.855839] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   37.855839] 
[   37.855899] Corrupted memory at 0x000000004117905b [ ! ] (in kfence-#142):
[   37.856028]  test_corruption+0x284/0x378
[   37.856072]  kunit_try_run_case+0x170/0x3f0
[   37.856114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.856158]  kthread+0x328/0x630
[   37.856196]  ret_from_fork+0x10/0x20
[   37.856236] 
[   37.856261] kfence-#142: 0x000000005ec2f84c-0x000000000b84dc72, size=32, cache=kmalloc-32
[   37.856261] 
[   37.856316] allocated by task 342 on cpu 0 at 37.855453s (0.000860s ago):
[   37.856377]  test_alloc+0x29c/0x628
[   37.856413]  test_corruption+0x198/0x378
[   37.856451]  kunit_try_run_case+0x170/0x3f0
[   37.856489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.856531]  kthread+0x328/0x630
[   37.856566]  ret_from_fork+0x10/0x20
[   37.856607] 
[   37.856630] freed by task 342 on cpu 0 at 37.855555s (0.001071s ago):
[   37.856690]  test_corruption+0x284/0x378
[   37.856728]  kunit_try_run_case+0x170/0x3f0
[   37.856780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.856823]  kthread+0x328/0x630
[   37.856860]  ret_from_fork+0x10/0x20
[   37.856899] 
[   37.856945] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   37.857024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.857054] Hardware name: linux,dummy-virt (DT)
[   37.857088] ==================================================================
[   37.647644] ==================================================================
[   37.647771] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   37.647771] 
[   37.647838] Corrupted memory at 0x00000000039a2db0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#140):
[   37.648285]  test_corruption+0x278/0x378
[   37.648330]  kunit_try_run_case+0x170/0x3f0
[   37.648375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.648419]  kthread+0x328/0x630
[   37.648460]  ret_from_fork+0x10/0x20
[   37.648502] 
[   37.648526] kfence-#140: 0x0000000025758105-0x0000000025af0435, size=32, cache=kmalloc-32
[   37.648526] 
[   37.648582] allocated by task 342 on cpu 0 at 37.647346s (0.001232s ago):
[   37.648645]  test_alloc+0x29c/0x628
[   37.648683]  test_corruption+0xdc/0x378
[   37.648721]  kunit_try_run_case+0x170/0x3f0
[   37.648773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.648816]  kthread+0x328/0x630
[   37.648853]  ret_from_fork+0x10/0x20
[   37.648891] 
[   37.648914] freed by task 342 on cpu 0 at 37.647460s (0.001450s ago):
[   37.648977]  test_corruption+0x278/0x378
[   37.649014]  kunit_try_run_case+0x170/0x3f0
[   37.649051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.649095]  kthread+0x328/0x630
[   37.649129]  ret_from_fork+0x10/0x20
[   37.649169] 
[   37.649215] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   37.649293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.649324] Hardware name: linux,dummy-virt (DT)
[   37.649358] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   37.439485] ==================================================================
[   37.439580] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   37.439580] 
[   37.439643] Invalid free of 0x0000000075884a6a (in kfence-#138):
[   37.439703]  test_invalid_addr_free+0x1ac/0x238
[   37.439766]  kunit_try_run_case+0x170/0x3f0
[   37.439814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.439860]  kthread+0x328/0x630
[   37.439901]  ret_from_fork+0x10/0x20
[   37.439943] 
[   37.439969] kfence-#138: 0x000000004b006104-0x00000000e61c5721, size=32, cache=kmalloc-32
[   37.439969] 
[   37.440030] allocated by task 338 on cpu 1 at 37.439337s (0.000688s ago):
[   37.440099]  test_alloc+0x29c/0x628
[   37.440139]  test_invalid_addr_free+0xd4/0x238
[   37.440181]  kunit_try_run_case+0x170/0x3f0
[   37.440223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.440271]  kthread+0x328/0x630
[   37.440308]  ret_from_fork+0x10/0x20
[   37.440348] 
[   37.440395] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   37.440488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.440522] Hardware name: linux,dummy-virt (DT)
[   37.440558] ==================================================================
[   37.543455] ==================================================================
[   37.543564] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   37.543564] 
[   37.543628] Invalid free of 0x00000000e0604e65 (in kfence-#139):
[   37.543694]  test_invalid_addr_free+0xec/0x238
[   37.543741]  kunit_try_run_case+0x170/0x3f0
[   37.543803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.543851]  kthread+0x328/0x630
[   37.543891]  ret_from_fork+0x10/0x20
[   37.543933] 
[   37.543958] kfence-#139: 0x00000000d56eae87-0x00000000d040da28, size=32, cache=test
[   37.543958] 
[   37.544020] allocated by task 340 on cpu 1 at 37.543322s (0.000694s ago):
[   37.544092]  test_alloc+0x230/0x628
[   37.544132]  test_invalid_addr_free+0xd4/0x238
[   37.544173]  kunit_try_run_case+0x170/0x3f0
[   37.544215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.544263]  kthread+0x328/0x630
[   37.544299]  ret_from_fork+0x10/0x20
[   37.544341] 
[   37.544387] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   37.544482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.544513] Hardware name: linux,dummy-virt (DT)
[   37.544551] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   37.335506] ==================================================================
[   37.335602] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   37.335602] 
[   37.335661] Invalid free of 0x0000000064110552 (in kfence-#137):
[   37.335712]  test_double_free+0x100/0x238
[   37.335772]  kunit_try_run_case+0x170/0x3f0
[   37.335816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.335859]  kthread+0x328/0x630
[   37.335896]  ret_from_fork+0x10/0x20
[   37.335934] 
[   37.335960] kfence-#137: 0x0000000064110552-0x00000000dc3aa18e, size=32, cache=test
[   37.335960] 
[   37.336012] allocated by task 336 on cpu 0 at 37.335314s (0.000694s ago):
[   37.336073]  test_alloc+0x230/0x628
[   37.336110]  test_double_free+0xd4/0x238
[   37.336148]  kunit_try_run_case+0x170/0x3f0
[   37.336188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.336228]  kthread+0x328/0x630
[   37.336265]  ret_from_fork+0x10/0x20
[   37.336303] 
[   37.336326] freed by task 336 on cpu 0 at 37.335376s (0.000947s ago):
[   37.336387]  test_double_free+0xf0/0x238
[   37.336425]  kunit_try_run_case+0x170/0x3f0
[   37.336462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.336505]  kthread+0x328/0x630
[   37.336539]  ret_from_fork+0x10/0x20
[   37.336579] 
[   37.336622] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   37.336701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.336730] Hardware name: linux,dummy-virt (DT)
[   37.336774] ==================================================================
[   37.231623] ==================================================================
[   37.231736] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   37.231736] 
[   37.231826] Invalid free of 0x000000004b691858 (in kfence-#136):
[   37.231895]  test_double_free+0x1bc/0x238
[   37.231939]  kunit_try_run_case+0x170/0x3f0
[   37.231982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.232027]  kthread+0x328/0x630
[   37.232066]  ret_from_fork+0x10/0x20
[   37.232105] 
[   37.232132] kfence-#136: 0x000000004b691858-0x000000000042badf, size=32, cache=kmalloc-32
[   37.232132] 
[   37.232188] allocated by task 334 on cpu 0 at 37.231307s (0.000877s ago):
[   37.232252]  test_alloc+0x29c/0x628
[   37.232290]  test_double_free+0xd4/0x238
[   37.232328]  kunit_try_run_case+0x170/0x3f0
[   37.232371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.232415]  kthread+0x328/0x630
[   37.232451]  ret_from_fork+0x10/0x20
[   37.232491] 
[   37.232515] freed by task 334 on cpu 0 at 37.231386s (0.001125s ago):
[   37.232577]  test_double_free+0x1ac/0x238
[   37.232616]  kunit_try_run_case+0x170/0x3f0
[   37.232655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.232698]  kthread+0x328/0x630
[   37.232735]  ret_from_fork+0x10/0x20
[   37.232788] 
[   37.232838] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   37.232919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.232950] Hardware name: linux,dummy-virt (DT)
[   37.232984] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   36.911946] ==================================================================
[   36.912034] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   36.912034] 
[   36.912172] Use-after-free read at 0x0000000082be0eff (in kfence-#133):
[   36.912232]  test_use_after_free_read+0x114/0x248
[   36.912278]  kunit_try_run_case+0x170/0x3f0
[   36.912595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.912696]  kthread+0x328/0x630
[   36.912741]  ret_from_fork+0x10/0x20
[   36.912811] 
[   36.912837] kfence-#133: 0x0000000082be0eff-0x0000000041af37b7, size=32, cache=test
[   36.912837] 
[   36.912926] allocated by task 328 on cpu 1 at 36.911600s (0.001315s ago):
[   36.913000]  test_alloc+0x230/0x628
[   36.913038]  test_use_after_free_read+0xd0/0x248
[   36.913079]  kunit_try_run_case+0x170/0x3f0
[   36.913301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.913363]  kthread+0x328/0x630
[   36.913400]  ret_from_fork+0x10/0x20
[   36.913527] 
[   36.913610] freed by task 328 on cpu 1 at 36.911700s (0.001878s ago):
[   36.914048]  test_use_after_free_read+0xf0/0x248
[   36.914149]  kunit_try_run_case+0x170/0x3f0
[   36.914194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.914239]  kthread+0x328/0x630
[   36.914304]  ret_from_fork+0x10/0x20
[   36.914346] 
[   36.914596] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   36.914777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.914835] Hardware name: linux,dummy-virt (DT)
[   36.914891] ==================================================================
[   36.804575] ==================================================================
[   36.804681] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   36.804681] 
[   36.804834] Use-after-free read at 0x00000000555555e0 (in kfence-#132):
[   36.804912]  test_use_after_free_read+0x114/0x248
[   36.804966]  kunit_try_run_case+0x170/0x3f0
[   36.805015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.805059]  kthread+0x328/0x630
[   36.805099]  ret_from_fork+0x10/0x20
[   36.805140] 
[   36.805166] kfence-#132: 0x00000000555555e0-0x0000000077d5c124, size=32, cache=kmalloc-32
[   36.805166] 
[   36.805402] allocated by task 326 on cpu 1 at 36.803917s (0.001473s ago):
[   36.805646]  test_alloc+0x29c/0x628
[   36.805728]  test_use_after_free_read+0xd0/0x248
[   36.805844]  kunit_try_run_case+0x170/0x3f0
[   36.805891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.805957]  kthread+0x328/0x630
[   36.806001]  ret_from_fork+0x10/0x20
[   36.806103] 
[   36.806544] freed by task 326 on cpu 1 at 36.804274s (0.001909s ago):
[   36.806784]  test_use_after_free_read+0x1c0/0x248
[   36.806851]  kunit_try_run_case+0x170/0x3f0
[   36.806895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.806940]  kthread+0x328/0x630
[   36.806978]  ret_from_fork+0x10/0x20
[   36.807097] 
[   36.807161] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   36.807263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.807294] Hardware name: linux,dummy-virt (DT)
[   36.807587] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   36.493191] ==================================================================
[   36.493339] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   36.493339] 
[   36.493438] Out-of-bounds write at 0x000000001f5983cf (1B left of kfence-#129):
[   36.493501]  test_out_of_bounds_write+0x100/0x240
[   36.493547]  kunit_try_run_case+0x170/0x3f0
[   36.493609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.493675]  kthread+0x328/0x630
[   36.493722]  ret_from_fork+0x10/0x20
[   36.493778] 
[   36.493808] kfence-#129: 0x000000003e2f7f0e-0x0000000045f19edc, size=32, cache=kmalloc-32
[   36.493808] 
[   36.493883] allocated by task 322 on cpu 1 at 36.492657s (0.001205s ago):
[   36.493981]  test_alloc+0x29c/0x628
[   36.494024]  test_out_of_bounds_write+0xc8/0x240
[   36.494063]  kunit_try_run_case+0x170/0x3f0
[   36.494103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.494151]  kthread+0x328/0x630
[   36.494412]  ret_from_fork+0x10/0x20
[   36.494468] 
[   36.494520] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   36.494628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.494665] Hardware name: linux,dummy-virt (DT)
[   36.494735] ==================================================================
[   36.700576] ==================================================================
[   36.700681] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   36.700681] 
[   36.700784] Out-of-bounds write at 0x000000007d5ab416 (1B left of kfence-#131):
[   36.700868]  test_out_of_bounds_write+0x100/0x240
[   36.700946]  kunit_try_run_case+0x170/0x3f0
[   36.701012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.701057]  kthread+0x328/0x630
[   36.701096]  ret_from_fork+0x10/0x20
[   36.701135] 
[   36.701162] kfence-#131: 0x000000003a3e326f-0x000000006323d974, size=32, cache=test
[   36.701162] 
[   36.701365] allocated by task 324 on cpu 1 at 36.700475s (0.000884s ago):
[   36.701487]  test_alloc+0x230/0x628
[   36.701531]  test_out_of_bounds_write+0xc8/0x240
[   36.701592]  kunit_try_run_case+0x170/0x3f0
[   36.701649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.701695]  kthread+0x328/0x630
[   36.701773]  ret_from_fork+0x10/0x20
[   36.701815] 
[   36.701860] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   36.701949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.701977] Hardware name: linux,dummy-virt (DT)
[   36.702232] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   35.752288] ==================================================================
[   35.752388] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   35.752388] 
[   35.752766] Out-of-bounds read at 0x0000000049e1fe5d (32B right of kfence-#122):
[   35.752862]  test_out_of_bounds_read+0x1c8/0x3e0
[   35.753249]  kunit_try_run_case+0x170/0x3f0
[   35.753434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.753670]  kthread+0x328/0x630
[   35.753774]  ret_from_fork+0x10/0x20
[   35.753838] 
[   35.753864] kfence-#122: 0x000000004833623a-0x00000000bf581e1d, size=32, cache=kmalloc-32
[   35.753864] 
[   35.754106] allocated by task 318 on cpu 1 at 35.751737s (0.002261s ago):
[   35.754306]  test_alloc+0x29c/0x628
[   35.754354]  test_out_of_bounds_read+0x198/0x3e0
[   35.754620]  kunit_try_run_case+0x170/0x3f0
[   35.754918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.755010]  kthread+0x328/0x630
[   35.755113]  ret_from_fork+0x10/0x20
[   35.755295] 
[   35.755347] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.755437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.755469] Hardware name: linux,dummy-virt (DT)
[   35.756085] ==================================================================
[   35.964022] ==================================================================
[   35.964137] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   35.964137] 
[   35.964283] Out-of-bounds read at 0x000000002ac74a1c (32B right of kfence-#124):
[   35.964358]  test_out_of_bounds_read+0x1c8/0x3e0
[   35.964406]  kunit_try_run_case+0x170/0x3f0
[   35.964451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.964496]  kthread+0x328/0x630
[   35.964736]  ret_from_fork+0x10/0x20
[   35.964984] 
[   35.965104] kfence-#124: 0x0000000063632c37-0x000000000dfcddda, size=32, cache=test
[   35.965104] 
[   35.965188] allocated by task 320 on cpu 1 at 35.963652s (0.001514s ago):
[   35.965568]  test_alloc+0x230/0x628
[   35.965633]  test_out_of_bounds_read+0x198/0x3e0
[   35.965755]  kunit_try_run_case+0x170/0x3f0
[   35.965802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.965849]  kthread+0x328/0x630
[   35.965886]  ret_from_fork+0x10/0x20
[   35.966191] 
[   35.966503] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.966639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.966776] Hardware name: linux,dummy-virt (DT)
[   35.966820] ==================================================================
[   35.861351] ==================================================================
[   35.861432] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   35.861432] 
[   35.861513] Out-of-bounds read at 0x0000000098996d79 (1B left of kfence-#123):
[   35.861883]  test_out_of_bounds_read+0x114/0x3e0
[   35.861959]  kunit_try_run_case+0x170/0x3f0
[   35.862009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.862055]  kthread+0x328/0x630
[   35.862098]  ret_from_fork+0x10/0x20
[   35.862144] 
[   35.862284] kfence-#123: 0x0000000083740b85-0x000000002da4efeb, size=32, cache=test
[   35.862284] 
[   35.862373] allocated by task 320 on cpu 1 at 35.861261s (0.001107s ago):
[   35.862519]  test_alloc+0x230/0x628
[   35.862562]  test_out_of_bounds_read+0xdc/0x3e0
[   35.862603]  kunit_try_run_case+0x170/0x3f0
[   35.862643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.862688]  kthread+0x328/0x630
[   35.862724]  ret_from_fork+0x10/0x20
[   35.862779] 
[   35.862825] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.862933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.863445] Hardware name: linux,dummy-virt (DT)
[   35.863765] ==================================================================
[   35.541589] ==================================================================
[   35.541824] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   35.541824] 
[   35.541966] Out-of-bounds read at 0x00000000e78d26cc (1B left of kfence-#120):
[   35.542240]  test_out_of_bounds_read+0x114/0x3e0
[   35.542317]  kunit_try_run_case+0x170/0x3f0
[   35.542366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.542411]  kthread+0x328/0x630
[   35.542452]  ret_from_fork+0x10/0x20
[   35.542511] 
[   35.542689] kfence-#120: 0x0000000038eb3b80-0x000000007d9fe70f, size=32, cache=kmalloc-32
[   35.542689] 
[   35.542895] allocated by task 318 on cpu 1 at 35.539789s (0.003037s ago):
[   35.545038]  test_alloc+0x29c/0x628
[   35.545134]  test_out_of_bounds_read+0xdc/0x3e0
[   35.545187]  kunit_try_run_case+0x170/0x3f0
[   35.545242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.545293]  kthread+0x328/0x630
[   35.545344]  ret_from_fork+0x10/0x20
[   35.545445] 
[   35.545559] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.545664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.545706] Hardware name: linux,dummy-virt (DT)
[   35.545769] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   35.423974] ==================================================================
[   35.424027] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   35.424082] Write of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316
[   35.424134] 
[   35.424332] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.424549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.424581] Hardware name: linux,dummy-virt (DT)
[   35.424614] Call trace:
[   35.424732]  show_stack+0x20/0x38 (C)
[   35.424804]  dump_stack_lvl+0x8c/0xd0
[   35.424880]  print_report+0x118/0x5e8
[   35.424928]  kasan_report+0xdc/0x128
[   35.424974]  kasan_check_range+0x100/0x1a8
[   35.425040]  __kasan_check_write+0x20/0x30
[   35.425088]  strncpy_from_user+0x3c/0x2a0
[   35.425142]  copy_user_test_oob+0x5c0/0xec8
[   35.425194]  kunit_try_run_case+0x170/0x3f0
[   35.425242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.425301]  kthread+0x328/0x630
[   35.425344]  ret_from_fork+0x10/0x20
[   35.425403] 
[   35.425429] Allocated by task 316:
[   35.425461]  kasan_save_stack+0x3c/0x68
[   35.425500]  kasan_save_track+0x20/0x40
[   35.425541]  kasan_save_alloc_info+0x40/0x58
[   35.425582]  __kasan_kmalloc+0xd4/0xd8
[   35.425619]  __kmalloc_noprof+0x198/0x4c8
[   35.425674]  kunit_kmalloc_array+0x34/0x88
[   35.425713]  copy_user_test_oob+0xac/0xec8
[   35.426032]  kunit_try_run_case+0x170/0x3f0
[   35.426091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.426144]  kthread+0x328/0x630
[   35.426181]  ret_from_fork+0x10/0x20
[   35.426219] 
[   35.426241] The buggy address belongs to the object at fff00000c9b92400
[   35.426241]  which belongs to the cache kmalloc-128 of size 128
[   35.426509] The buggy address is located 0 bytes inside of
[   35.426509]  allocated 120-byte region [fff00000c9b92400, fff00000c9b92478)
[   35.426614] 
[   35.426639] The buggy address belongs to the physical page:
[   35.426676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92
[   35.426887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.427017] page_type: f5(slab)
[   35.427091] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.427192] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.427270] page dumped because: kasan: bad access detected
[   35.427433] 
[   35.427456] Memory state around the buggy address:
[   35.427591]  fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.427647]  fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.427722] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.427813]                                                                 ^
[   35.427946]  fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.428036]  fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.428408] ==================================================================
[   35.428881] ==================================================================
[   35.428952] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   35.429019] Write of size 1 at addr fff00000c9b92478 by task kunit_try_catch/316
[   35.429091] 
[   35.429124] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.429418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.429460] Hardware name: linux,dummy-virt (DT)
[   35.429511] Call trace:
[   35.429537]  show_stack+0x20/0x38 (C)
[   35.429590]  dump_stack_lvl+0x8c/0xd0
[   35.429637]  print_report+0x118/0x5e8
[   35.429682]  kasan_report+0xdc/0x128
[   35.429727]  __asan_report_store1_noabort+0x20/0x30
[   35.429820]  strncpy_from_user+0x270/0x2a0
[   35.429886]  copy_user_test_oob+0x5c0/0xec8
[   35.429947]  kunit_try_run_case+0x170/0x3f0
[   35.430014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.430068]  kthread+0x328/0x630
[   35.430133]  ret_from_fork+0x10/0x20
[   35.430183] 
[   35.430206] Allocated by task 316:
[   35.430235]  kasan_save_stack+0x3c/0x68
[   35.430277]  kasan_save_track+0x20/0x40
[   35.430313]  kasan_save_alloc_info+0x40/0x58
[   35.430352]  __kasan_kmalloc+0xd4/0xd8
[   35.430411]  __kmalloc_noprof+0x198/0x4c8
[   35.430590]  kunit_kmalloc_array+0x34/0x88
[   35.430664]  copy_user_test_oob+0xac/0xec8
[   35.430724]  kunit_try_run_case+0x170/0x3f0
[   35.430787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.430851]  kthread+0x328/0x630
[   35.430886]  ret_from_fork+0x10/0x20
[   35.431066] 
[   35.431188] The buggy address belongs to the object at fff00000c9b92400
[   35.431188]  which belongs to the cache kmalloc-128 of size 128
[   35.431254] The buggy address is located 0 bytes to the right of
[   35.431254]  allocated 120-byte region [fff00000c9b92400, fff00000c9b92478)
[   35.431443] 
[   35.431469] The buggy address belongs to the physical page:
[   35.431507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92
[   35.431564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.431666] page_type: f5(slab)
[   35.431797] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.431882] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.431985] page dumped because: kasan: bad access detected
[   35.432064] 
[   35.432257] Memory state around the buggy address:
[   35.432307]  fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.432490]  fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.432641] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.432723]                                                                 ^
[   35.432779]  fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.432822]  fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.433075] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   35.385789] ==================================================================
[   35.385941] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   35.386037] Write of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316
[   35.386103] 
[   35.386158] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.386251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.386281] Hardware name: linux,dummy-virt (DT)
[   35.386318] Call trace:
[   35.386347]  show_stack+0x20/0x38 (C)
[   35.386402]  dump_stack_lvl+0x8c/0xd0
[   35.386466]  print_report+0x118/0x5e8
[   35.386511]  kasan_report+0xdc/0x128
[   35.386558]  kasan_check_range+0x100/0x1a8
[   35.386606]  __kasan_check_write+0x20/0x30
[   35.386655]  copy_user_test_oob+0x234/0xec8
[   35.386704]  kunit_try_run_case+0x170/0x3f0
[   35.386767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.386821]  kthread+0x328/0x630
[   35.386870]  ret_from_fork+0x10/0x20
[   35.387527] 
[   35.387574] Allocated by task 316:
[   35.387635]  kasan_save_stack+0x3c/0x68
[   35.387708]  kasan_save_track+0x20/0x40
[   35.387793]  kasan_save_alloc_info+0x40/0x58
[   35.387876]  __kasan_kmalloc+0xd4/0xd8
[   35.387955]  __kmalloc_noprof+0x198/0x4c8
[   35.388034]  kunit_kmalloc_array+0x34/0x88
[   35.388124]  copy_user_test_oob+0xac/0xec8
[   35.388234]  kunit_try_run_case+0x170/0x3f0
[   35.388323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.388419]  kthread+0x328/0x630
[   35.388460]  ret_from_fork+0x10/0x20
[   35.388499] 
[   35.388522] The buggy address belongs to the object at fff00000c9b92400
[   35.388522]  which belongs to the cache kmalloc-128 of size 128
[   35.388586] The buggy address is located 0 bytes inside of
[   35.388586]  allocated 120-byte region [fff00000c9b92400, fff00000c9b92478)
[   35.388703] 
[   35.388730] The buggy address belongs to the physical page:
[   35.388788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92
[   35.389025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.389157] page_type: f5(slab)
[   35.389240] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.389496] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.389548] page dumped because: kasan: bad access detected
[   35.389647] 
[   35.389696] Memory state around the buggy address:
[   35.389815]  fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.389881]  fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.389927] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.389970]                                                                 ^
[   35.390015]  fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.390060]  fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.390099] ==================================================================
[   35.418911] ==================================================================
[   35.418995] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   35.419046] Read of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316
[   35.419259] 
[   35.419360] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.419499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.419556] Hardware name: linux,dummy-virt (DT)
[   35.419588] Call trace:
[   35.419615]  show_stack+0x20/0x38 (C)
[   35.419838]  dump_stack_lvl+0x8c/0xd0
[   35.419972]  print_report+0x118/0x5e8
[   35.420040]  kasan_report+0xdc/0x128
[   35.420147]  kasan_check_range+0x100/0x1a8
[   35.420234]  __kasan_check_read+0x20/0x30
[   35.420301]  copy_user_test_oob+0x4a0/0xec8
[   35.420393]  kunit_try_run_case+0x170/0x3f0
[   35.420467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.420522]  kthread+0x328/0x630
[   35.420589]  ret_from_fork+0x10/0x20
[   35.420639] 
[   35.420685] Allocated by task 316:
[   35.420717]  kasan_save_stack+0x3c/0x68
[   35.420769]  kasan_save_track+0x20/0x40
[   35.420807]  kasan_save_alloc_info+0x40/0x58
[   35.420846]  __kasan_kmalloc+0xd4/0xd8
[   35.421022]  __kmalloc_noprof+0x198/0x4c8
[   35.421137]  kunit_kmalloc_array+0x34/0x88
[   35.421205]  copy_user_test_oob+0xac/0xec8
[   35.421273]  kunit_try_run_case+0x170/0x3f0
[   35.421360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.421418]  kthread+0x328/0x630
[   35.421454]  ret_from_fork+0x10/0x20
[   35.421521] 
[   35.421651] The buggy address belongs to the object at fff00000c9b92400
[   35.421651]  which belongs to the cache kmalloc-128 of size 128
[   35.421719] The buggy address is located 0 bytes inside of
[   35.421719]  allocated 120-byte region [fff00000c9b92400, fff00000c9b92478)
[   35.421798] 
[   35.421822] The buggy address belongs to the physical page:
[   35.421858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92
[   35.422064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.422165] page_type: f5(slab)
[   35.422273] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.422350] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.422404] page dumped because: kasan: bad access detected
[   35.422439] 
[   35.422460] Memory state around the buggy address:
[   35.422617]  fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.422712]  fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.422824] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.422923]                                                                 ^
[   35.423043]  fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.423091]  fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.423133] ==================================================================
[   35.414343] ==================================================================
[   35.414406] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   35.414460] Write of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316
[   35.414522] 
[   35.414554] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.414642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.414682] Hardware name: linux,dummy-virt (DT)
[   35.414724] Call trace:
[   35.414762]  show_stack+0x20/0x38 (C)
[   35.414810]  dump_stack_lvl+0x8c/0xd0
[   35.414858]  print_report+0x118/0x5e8
[   35.414903]  kasan_report+0xdc/0x128
[   35.414955]  kasan_check_range+0x100/0x1a8
[   35.415002]  __kasan_check_write+0x20/0x30
[   35.415050]  copy_user_test_oob+0x434/0xec8
[   35.415100]  kunit_try_run_case+0x170/0x3f0
[   35.415148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.415204]  kthread+0x328/0x630
[   35.415271]  ret_from_fork+0x10/0x20
[   35.415322] 
[   35.415342] Allocated by task 316:
[   35.415373]  kasan_save_stack+0x3c/0x68
[   35.415568]  kasan_save_track+0x20/0x40
[   35.415894]  kasan_save_alloc_info+0x40/0x58
[   35.415944]  __kasan_kmalloc+0xd4/0xd8
[   35.416003]  __kmalloc_noprof+0x198/0x4c8
[   35.416047]  kunit_kmalloc_array+0x34/0x88
[   35.416086]  copy_user_test_oob+0xac/0xec8
[   35.416126]  kunit_try_run_case+0x170/0x3f0
[   35.416164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.416234]  kthread+0x328/0x630
[   35.416416]  ret_from_fork+0x10/0x20
[   35.416529] 
[   35.416589] The buggy address belongs to the object at fff00000c9b92400
[   35.416589]  which belongs to the cache kmalloc-128 of size 128
[   35.416699] The buggy address is located 0 bytes inside of
[   35.416699]  allocated 120-byte region [fff00000c9b92400, fff00000c9b92478)
[   35.416932] 
[   35.416961] The buggy address belongs to the physical page:
[   35.417071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92
[   35.417188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.417288] page_type: f5(slab)
[   35.417364] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.417438] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.417482] page dumped because: kasan: bad access detected
[   35.417516] 
[   35.417550] Memory state around the buggy address:
[   35.417692]  fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.417810]  fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.417992] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.418066]                                                                 ^
[   35.418154]  fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.418199]  fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.418241] ==================================================================
[   35.395987] ==================================================================
[   35.396081] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   35.396140] Read of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316
[   35.396216] 
[   35.396262] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.396354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.396389] Hardware name: linux,dummy-virt (DT)
[   35.396424] Call trace:
[   35.396452]  show_stack+0x20/0x38 (C)
[   35.396503]  dump_stack_lvl+0x8c/0xd0
[   35.396549]  print_report+0x118/0x5e8
[   35.396607]  kasan_report+0xdc/0x128
[   35.396652]  kasan_check_range+0x100/0x1a8
[   35.396699]  __kasan_check_read+0x20/0x30
[   35.396766]  copy_user_test_oob+0x728/0xec8
[   35.396817]  kunit_try_run_case+0x170/0x3f0
[   35.396865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.396919]  kthread+0x328/0x630
[   35.396962]  ret_from_fork+0x10/0x20
[   35.397011] 
[   35.397033] Allocated by task 316:
[   35.397062]  kasan_save_stack+0x3c/0x68
[   35.397104]  kasan_save_track+0x20/0x40
[   35.397141]  kasan_save_alloc_info+0x40/0x58
[   35.397181]  __kasan_kmalloc+0xd4/0xd8
[   35.397217]  __kmalloc_noprof+0x198/0x4c8
[   35.397259]  kunit_kmalloc_array+0x34/0x88
[   35.397297]  copy_user_test_oob+0xac/0xec8
[   35.397339]  kunit_try_run_case+0x170/0x3f0
[   35.397377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.397421]  kthread+0x328/0x630
[   35.397457]  ret_from_fork+0x10/0x20
[   35.397495] 
[   35.397517] The buggy address belongs to the object at fff00000c9b92400
[   35.397517]  which belongs to the cache kmalloc-128 of size 128
[   35.397578] The buggy address is located 0 bytes inside of
[   35.397578]  allocated 120-byte region [fff00000c9b92400, fff00000c9b92478)
[   35.397660] 
[   35.397684] The buggy address belongs to the physical page:
[   35.397730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92
[   35.397798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.397848] page_type: f5(slab)
[   35.398463] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.398536] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.398581] page dumped because: kasan: bad access detected
[   35.398618] 
[   35.398666] Memory state around the buggy address:
[   35.398703]  fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.398765]  fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.398812] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.398853]                                                                 ^
[   35.398897]  fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.398971]  fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.399165] ==================================================================
[   35.410193] ==================================================================
[   35.410270] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   35.410349] Read of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316
[   35.410415] 
[   35.410463] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.410551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.410580] Hardware name: linux,dummy-virt (DT)
[   35.410786] Call trace:
[   35.410822]  show_stack+0x20/0x38 (C)
[   35.410889]  dump_stack_lvl+0x8c/0xd0
[   35.410998]  print_report+0x118/0x5e8
[   35.411095]  kasan_report+0xdc/0x128
[   35.411153]  kasan_check_range+0x100/0x1a8
[   35.411239]  __kasan_check_read+0x20/0x30
[   35.411310]  copy_user_test_oob+0x3c8/0xec8
[   35.411401]  kunit_try_run_case+0x170/0x3f0
[   35.411535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.411601]  kthread+0x328/0x630
[   35.411643]  ret_from_fork+0x10/0x20
[   35.411719] 
[   35.411740] Allocated by task 316:
[   35.411781]  kasan_save_stack+0x3c/0x68
[   35.411821]  kasan_save_track+0x20/0x40
[   35.411859]  kasan_save_alloc_info+0x40/0x58
[   35.411898]  __kasan_kmalloc+0xd4/0xd8
[   35.411935]  __kmalloc_noprof+0x198/0x4c8
[   35.412119]  kunit_kmalloc_array+0x34/0x88
[   35.412203]  copy_user_test_oob+0xac/0xec8
[   35.412274]  kunit_try_run_case+0x170/0x3f0
[   35.412354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.412440]  kthread+0x328/0x630
[   35.412487]  ret_from_fork+0x10/0x20
[   35.412524] 
[   35.412547] The buggy address belongs to the object at fff00000c9b92400
[   35.412547]  which belongs to the cache kmalloc-128 of size 128
[   35.412710] The buggy address is located 0 bytes inside of
[   35.412710]  allocated 120-byte region [fff00000c9b92400, fff00000c9b92478)
[   35.412839] 
[   35.412919] The buggy address belongs to the physical page:
[   35.412980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92
[   35.413066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.413182] page_type: f5(slab)
[   35.413283] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.413355] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.413399] page dumped because: kasan: bad access detected
[   35.413435] 
[   35.413456] Memory state around the buggy address:
[   35.413490]  fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.413537]  fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.413583] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.413809]                                                                 ^
[   35.413907]  fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.413985]  fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.414053] ==================================================================
[   35.404877] ==================================================================
[   35.404939] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   35.405024] Write of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316
[   35.405081] 
[   35.405116] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.405321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.405351] Hardware name: linux,dummy-virt (DT)
[   35.405530] Call trace:
[   35.405565]  show_stack+0x20/0x38 (C)
[   35.405619]  dump_stack_lvl+0x8c/0xd0
[   35.405685]  print_report+0x118/0x5e8
[   35.405772]  kasan_report+0xdc/0x128
[   35.405838]  kasan_check_range+0x100/0x1a8
[   35.405888]  __kasan_check_write+0x20/0x30
[   35.405953]  copy_user_test_oob+0x35c/0xec8
[   35.406019]  kunit_try_run_case+0x170/0x3f0
[   35.406084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.406168]  kthread+0x328/0x630
[   35.406211]  ret_from_fork+0x10/0x20
[   35.406267] 
[   35.406288] Allocated by task 316:
[   35.406318]  kasan_save_stack+0x3c/0x68
[   35.406359]  kasan_save_track+0x20/0x40
[   35.406493]  kasan_save_alloc_info+0x40/0x58
[   35.406594]  __kasan_kmalloc+0xd4/0xd8
[   35.406705]  __kmalloc_noprof+0x198/0x4c8
[   35.406825]  kunit_kmalloc_array+0x34/0x88
[   35.406884]  copy_user_test_oob+0xac/0xec8
[   35.406941]  kunit_try_run_case+0x170/0x3f0
[   35.407017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.407062]  kthread+0x328/0x630
[   35.407096]  ret_from_fork+0x10/0x20
[   35.407159] 
[   35.407334] The buggy address belongs to the object at fff00000c9b92400
[   35.407334]  which belongs to the cache kmalloc-128 of size 128
[   35.407438] The buggy address is located 0 bytes inside of
[   35.407438]  allocated 120-byte region [fff00000c9b92400, fff00000c9b92478)
[   35.407548] 
[   35.407616] The buggy address belongs to the physical page:
[   35.407678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92
[   35.407780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.407848] page_type: f5(slab)
[   35.407940] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.408024] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.408115] page dumped because: kasan: bad access detected
[   35.408149] 
[   35.408170] Memory state around the buggy address:
[   35.408230]  fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.408276]  fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.408322] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.408376]                                                                 ^
[   35.408417]  fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.408462]  fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.408501] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   35.354700] ==================================================================
[   35.354879] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   35.354966] Read of size 8 at addr fff00000c9b92378 by task kunit_try_catch/312
[   35.355224] 
[   35.355334] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.355506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.355597] Hardware name: linux,dummy-virt (DT)
[   35.355666] Call trace:
[   35.355726]  show_stack+0x20/0x38 (C)
[   35.355830]  dump_stack_lvl+0x8c/0xd0
[   35.355918]  print_report+0x118/0x5e8
[   35.356016]  kasan_report+0xdc/0x128
[   35.356094]  __asan_report_load8_noabort+0x20/0x30
[   35.356191]  copy_to_kernel_nofault+0x204/0x250
[   35.356275]  copy_to_kernel_nofault_oob+0x158/0x418
[   35.356416]  kunit_try_run_case+0x170/0x3f0
[   35.356501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.356556]  kthread+0x328/0x630
[   35.356600]  ret_from_fork+0x10/0x20
[   35.356654] 
[   35.356675] Allocated by task 312:
[   35.356973]  kasan_save_stack+0x3c/0x68
[   35.357128]  kasan_save_track+0x20/0x40
[   35.357222]  kasan_save_alloc_info+0x40/0x58
[   35.357315]  __kasan_kmalloc+0xd4/0xd8
[   35.357386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.357454]  copy_to_kernel_nofault_oob+0xc8/0x418
[   35.357522]  kunit_try_run_case+0x170/0x3f0
[   35.357924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.357998]  kthread+0x328/0x630
[   35.358059]  ret_from_fork+0x10/0x20
[   35.358157] 
[   35.358210] The buggy address belongs to the object at fff00000c9b92300
[   35.358210]  which belongs to the cache kmalloc-128 of size 128
[   35.358301] The buggy address is located 0 bytes to the right of
[   35.358301]  allocated 120-byte region [fff00000c9b92300, fff00000c9b92378)
[   35.358689] 
[   35.358719] The buggy address belongs to the physical page:
[   35.358894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92
[   35.359194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.359533] page_type: f5(slab)
[   35.359622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.359743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.359846] page dumped because: kasan: bad access detected
[   35.359881] 
[   35.359902] Memory state around the buggy address:
[   35.359940]  fff00000c9b92200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.359987]  fff00000c9b92280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.360272] >fff00000c9b92300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.360423]                                                                 ^
[   35.360507]  fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.360782]  fff00000c9b92400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.360913] ==================================================================
[   35.361818] ==================================================================
[   35.361873] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   35.361928] Write of size 8 at addr fff00000c9b92378 by task kunit_try_catch/312
[   35.362005] 
[   35.362040] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.362133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.362165] Hardware name: linux,dummy-virt (DT)
[   35.362198] Call trace:
[   35.362222]  show_stack+0x20/0x38 (C)
[   35.362291]  dump_stack_lvl+0x8c/0xd0
[   35.362346]  print_report+0x118/0x5e8
[   35.362393]  kasan_report+0xdc/0x128
[   35.362438]  kasan_check_range+0x100/0x1a8
[   35.362486]  __kasan_check_write+0x20/0x30
[   35.362534]  copy_to_kernel_nofault+0x8c/0x250
[   35.362591]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   35.362643]  kunit_try_run_case+0x170/0x3f0
[   35.362764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.362824]  kthread+0x328/0x630
[   35.362868]  ret_from_fork+0x10/0x20
[   35.362919] 
[   35.362939] Allocated by task 312:
[   35.362976]  kasan_save_stack+0x3c/0x68
[   35.363411]  kasan_save_track+0x20/0x40
[   35.363473]  kasan_save_alloc_info+0x40/0x58
[   35.363516]  __kasan_kmalloc+0xd4/0xd8
[   35.363603]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.363717]  copy_to_kernel_nofault_oob+0xc8/0x418
[   35.363788]  kunit_try_run_case+0x170/0x3f0
[   35.363899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.363986]  kthread+0x328/0x630
[   35.364021]  ret_from_fork+0x10/0x20
[   35.364060] 
[   35.364083] The buggy address belongs to the object at fff00000c9b92300
[   35.364083]  which belongs to the cache kmalloc-128 of size 128
[   35.364146] The buggy address is located 0 bytes to the right of
[   35.364146]  allocated 120-byte region [fff00000c9b92300, fff00000c9b92378)
[   35.364418] 
[   35.364479] The buggy address belongs to the physical page:
[   35.364530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92
[   35.364606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.364669] page_type: f5(slab)
[   35.364710] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.364775] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.364973] page dumped because: kasan: bad access detected
[   35.365049] 
[   35.365119] Memory state around the buggy address:
[   35.365212]  fff00000c9b92200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.365261]  fff00000c9b92280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.365308] >fff00000c9b92300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.365624]                                                                 ^
[   35.365703]  fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.365801]  fff00000c9b92400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.365911] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   35.322244] ==================================================================
[   35.322297] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   35.322348] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300
[   35.322414] 
[   35.322474] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.322580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.322618] Hardware name: linux,dummy-virt (DT)
[   35.322653] Call trace:
[   35.322683]  show_stack+0x20/0x38 (C)
[   35.322733]  dump_stack_lvl+0x8c/0xd0
[   35.322793]  print_report+0x310/0x5e8
[   35.322927]  kasan_report+0xdc/0x128
[   35.323189]  __asan_report_load1_noabort+0x20/0x30
[   35.323253]  vmalloc_oob+0x51c/0x5d0
[   35.323300]  kunit_try_run_case+0x170/0x3f0
[   35.323350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.323404]  kthread+0x328/0x630
[   35.323447]  ret_from_fork+0x10/0x20
[   35.323496] 
[   35.323529] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0
[   35.323631] The buggy address belongs to the physical page:
[   35.323681] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b6a
[   35.323736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.323811] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.323864] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.323915] page dumped because: kasan: bad access detected
[   35.323962] 
[   35.323993] Memory state around the buggy address:
[   35.324027]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.324084]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.324130] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   35.324172]                                                                 ^
[   35.324220]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.324266]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.324309] ==================================================================
[   35.317236] ==================================================================
[   35.317308] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   35.317520] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300
[   35.317584] 
[   35.317642] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.317777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.317815] Hardware name: linux,dummy-virt (DT)
[   35.317851] Call trace:
[   35.317879]  show_stack+0x20/0x38 (C)
[   35.317967]  dump_stack_lvl+0x8c/0xd0
[   35.318019]  print_report+0x310/0x5e8
[   35.318100]  kasan_report+0xdc/0x128
[   35.318153]  __asan_report_load1_noabort+0x20/0x30
[   35.318213]  vmalloc_oob+0x578/0x5d0
[   35.318261]  kunit_try_run_case+0x170/0x3f0
[   35.318328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.318559]  kthread+0x328/0x630
[   35.318619]  ret_from_fork+0x10/0x20
[   35.318675] 
[   35.318702] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0
[   35.319167] The buggy address belongs to the physical page:
[   35.319212] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b6a
[   35.319389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.319464] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.319720] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.319846] page dumped because: kasan: bad access detected
[   35.319941] 
[   35.320177] Memory state around the buggy address:
[   35.320297]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.320412]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.320478] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   35.320524]                                                              ^
[   35.320832]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.320951]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.321030] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   35.140472] ==================================================================
[   35.140574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.140627] Read of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.140680] 
[   35.140712] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.140933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.140998] Hardware name: linux,dummy-virt (DT)
[   35.141033] Call trace:
[   35.141072]  show_stack+0x20/0x38 (C)
[   35.141124]  dump_stack_lvl+0x8c/0xd0
[   35.141198]  print_report+0x118/0x5e8
[   35.141262]  kasan_report+0xdc/0x128
[   35.141307]  __asan_report_load4_noabort+0x20/0x30
[   35.141358]  kasan_atomics_helper+0x3e04/0x4858
[   35.141408]  kasan_atomics+0x198/0x2e0
[   35.141458]  kunit_try_run_case+0x170/0x3f0
[   35.141625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.141683]  kthread+0x328/0x630
[   35.141728]  ret_from_fork+0x10/0x20
[   35.141791] 
[   35.141811] Allocated by task 296:
[   35.141842]  kasan_save_stack+0x3c/0x68
[   35.141883]  kasan_save_track+0x20/0x40
[   35.141920]  kasan_save_alloc_info+0x40/0x58
[   35.142116]  __kasan_kmalloc+0xd4/0xd8
[   35.142168]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.142228]  kasan_atomics+0xb8/0x2e0
[   35.142304]  kunit_try_run_case+0x170/0x3f0
[   35.142361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.142409]  kthread+0x328/0x630
[   35.142443]  ret_from_fork+0x10/0x20
[   35.142479] 
[   35.142505] The buggy address belongs to the object at fff00000c9b8ff80
[   35.142505]  which belongs to the cache kmalloc-64 of size 64
[   35.142671] The buggy address is located 0 bytes to the right of
[   35.142671]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.142807] 
[   35.142836] The buggy address belongs to the physical page:
[   35.142902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.143001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.143091] page_type: f5(slab)
[   35.143159] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.143211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.143255] page dumped because: kasan: bad access detected
[   35.143287] 
[   35.143309] Memory state around the buggy address:
[   35.143340]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.143691]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.143842] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.143923]                                      ^
[   35.143992]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.144310]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.144418] ==================================================================
[   35.278182] ==================================================================
[   35.278257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   35.278349] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.278401] 
[   35.278459] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.278547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.278578] Hardware name: linux,dummy-virt (DT)
[   35.278610] Call trace:
[   35.278674]  show_stack+0x20/0x38 (C)
[   35.278833]  dump_stack_lvl+0x8c/0xd0
[   35.278896]  print_report+0x118/0x5e8
[   35.278941]  kasan_report+0xdc/0x128
[   35.279000]  kasan_check_range+0x100/0x1a8
[   35.279094]  __kasan_check_write+0x20/0x30
[   35.279268]  kasan_atomics_helper+0x16d0/0x4858
[   35.279344]  kasan_atomics+0x198/0x2e0
[   35.279698]  kunit_try_run_case+0x170/0x3f0
[   35.279824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.279919]  kthread+0x328/0x630
[   35.280008]  ret_from_fork+0x10/0x20
[   35.280156] 
[   35.280216] Allocated by task 296:
[   35.280352]  kasan_save_stack+0x3c/0x68
[   35.280413]  kasan_save_track+0x20/0x40
[   35.280450]  kasan_save_alloc_info+0x40/0x58
[   35.280491]  __kasan_kmalloc+0xd4/0xd8
[   35.280706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.280769]  kasan_atomics+0xb8/0x2e0
[   35.280810]  kunit_try_run_case+0x170/0x3f0
[   35.281041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.281164]  kthread+0x328/0x630
[   35.281473]  ret_from_fork+0x10/0x20
[   35.281568] 
[   35.281639] The buggy address belongs to the object at fff00000c9b8ff80
[   35.281639]  which belongs to the cache kmalloc-64 of size 64
[   35.281828] The buggy address is located 0 bytes to the right of
[   35.281828]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.281908] 
[   35.281932] The buggy address belongs to the physical page:
[   35.282213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.282277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.282391] page_type: f5(slab)
[   35.282432] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.282486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.282530] page dumped because: kasan: bad access detected
[   35.282764] 
[   35.282845] Memory state around the buggy address:
[   35.282893]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.282956]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.283058] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.283101]                                      ^
[   35.283137]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.283182]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.283261] ==================================================================
[   35.283513] ==================================================================
[   35.283562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   35.283627] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.283712] 
[   35.283793] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.283883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.283918] Hardware name: linux,dummy-virt (DT)
[   35.283955] Call trace:
[   35.283982]  show_stack+0x20/0x38 (C)
[   35.284041]  dump_stack_lvl+0x8c/0xd0
[   35.284091]  print_report+0x118/0x5e8
[   35.284137]  kasan_report+0xdc/0x128
[   35.284182]  __asan_report_load8_noabort+0x20/0x30
[   35.284247]  kasan_atomics_helper+0x3e10/0x4858
[   35.284307]  kasan_atomics+0x198/0x2e0
[   35.284357]  kunit_try_run_case+0x170/0x3f0
[   35.284406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.284461]  kthread+0x328/0x630
[   35.284525]  ret_from_fork+0x10/0x20
[   35.284584] 
[   35.284607] Allocated by task 296:
[   35.284637]  kasan_save_stack+0x3c/0x68
[   35.284687]  kasan_save_track+0x20/0x40
[   35.284725]  kasan_save_alloc_info+0x40/0x58
[   35.284776]  __kasan_kmalloc+0xd4/0xd8
[   35.284811]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.284855]  kasan_atomics+0xb8/0x2e0
[   35.284893]  kunit_try_run_case+0x170/0x3f0
[   35.284932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.284977]  kthread+0x328/0x630
[   35.285011]  ret_from_fork+0x10/0x20
[   35.285050] 
[   35.285070] The buggy address belongs to the object at fff00000c9b8ff80
[   35.285070]  which belongs to the cache kmalloc-64 of size 64
[   35.285401] The buggy address is located 0 bytes to the right of
[   35.285401]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.285510] 
[   35.285535] The buggy address belongs to the physical page:
[   35.285592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.285929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.286003] page_type: f5(slab)
[   35.286054] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.286113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.286172] page dumped because: kasan: bad access detected
[   35.286208] 
[   35.286247] Memory state around the buggy address:
[   35.286282]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.286355]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.286403] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.286444]                                      ^
[   35.286477]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.286522]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.286565] ==================================================================
[   35.160647] ==================================================================
[   35.160695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   35.160772] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.160823] 
[   35.160855] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.160940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.160970] Hardware name: linux,dummy-virt (DT)
[   35.161056] Call trace:
[   35.161082]  show_stack+0x20/0x38 (C)
[   35.161133]  dump_stack_lvl+0x8c/0xd0
[   35.161300]  print_report+0x118/0x5e8
[   35.161390]  kasan_report+0xdc/0x128
[   35.161480]  __asan_report_store8_noabort+0x20/0x30
[   35.161534]  kasan_atomics_helper+0x3e5c/0x4858
[   35.161587]  kasan_atomics+0x198/0x2e0
[   35.161655]  kunit_try_run_case+0x170/0x3f0
[   35.161811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.161872]  kthread+0x328/0x630
[   35.161918]  ret_from_fork+0x10/0x20
[   35.162040] 
[   35.162068] Allocated by task 296:
[   35.162101]  kasan_save_stack+0x3c/0x68
[   35.162150]  kasan_save_track+0x20/0x40
[   35.162187]  kasan_save_alloc_info+0x40/0x58
[   35.162227]  __kasan_kmalloc+0xd4/0xd8
[   35.162264]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.162443]  kasan_atomics+0xb8/0x2e0
[   35.162501]  kunit_try_run_case+0x170/0x3f0
[   35.162577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.162644]  kthread+0x328/0x630
[   35.162679]  ret_from_fork+0x10/0x20
[   35.162918] 
[   35.162989] The buggy address belongs to the object at fff00000c9b8ff80
[   35.162989]  which belongs to the cache kmalloc-64 of size 64
[   35.163095] The buggy address is located 0 bytes to the right of
[   35.163095]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.163175] 
[   35.163215] The buggy address belongs to the physical page:
[   35.163271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.163328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.163594] page_type: f5(slab)
[   35.163644] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.163697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.163740] page dumped because: kasan: bad access detected
[   35.163784] 
[   35.163899] Memory state around the buggy address:
[   35.163965]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.164013]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.164068] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.164152]                                      ^
[   35.164259]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.164342]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.164384] ==================================================================
[   35.206807] ==================================================================
[   35.207100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   35.207166] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.207490] 
[   35.207561] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.207714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.207742] Hardware name: linux,dummy-virt (DT)
[   35.207789] Call trace:
[   35.207822]  show_stack+0x20/0x38 (C)
[   35.207875]  dump_stack_lvl+0x8c/0xd0
[   35.207947]  print_report+0x118/0x5e8
[   35.207994]  kasan_report+0xdc/0x128
[   35.208039]  kasan_check_range+0x100/0x1a8
[   35.208085]  __kasan_check_write+0x20/0x30
[   35.208133]  kasan_atomics_helper+0x11f8/0x4858
[   35.208348]  kasan_atomics+0x198/0x2e0
[   35.208445]  kunit_try_run_case+0x170/0x3f0
[   35.208597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.208701]  kthread+0x328/0x630
[   35.209039]  ret_from_fork+0x10/0x20
[   35.209140] 
[   35.209201] Allocated by task 296:
[   35.209279]  kasan_save_stack+0x3c/0x68
[   35.209396]  kasan_save_track+0x20/0x40
[   35.209452]  kasan_save_alloc_info+0x40/0x58
[   35.209493]  __kasan_kmalloc+0xd4/0xd8
[   35.209531]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.209584]  kasan_atomics+0xb8/0x2e0
[   35.209624]  kunit_try_run_case+0x170/0x3f0
[   35.209675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.209721]  kthread+0x328/0x630
[   35.209767]  ret_from_fork+0x10/0x20
[   35.209806] 
[   35.209828] The buggy address belongs to the object at fff00000c9b8ff80
[   35.209828]  which belongs to the cache kmalloc-64 of size 64
[   35.209915] The buggy address is located 0 bytes to the right of
[   35.209915]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.209981] 
[   35.210011] The buggy address belongs to the physical page:
[   35.210065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.210148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.210205] page_type: f5(slab)
[   35.210246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.210297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.210342] page dumped because: kasan: bad access detected
[   35.210375] 
[   35.210396] Memory state around the buggy address:
[   35.210444]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.210491]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.210535] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.210576]                                      ^
[   35.210619]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.210682]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.210725] ==================================================================
[   35.150464] ==================================================================
[   35.150518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   35.150573] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.150623] 
[   35.150928] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.151103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.151388] Hardware name: linux,dummy-virt (DT)
[   35.151458] Call trace:
[   35.151530]  show_stack+0x20/0x38 (C)
[   35.151595]  dump_stack_lvl+0x8c/0xd0
[   35.151646]  print_report+0x118/0x5e8
[   35.151694]  kasan_report+0xdc/0x128
[   35.151741]  __asan_report_load8_noabort+0x20/0x30
[   35.151840]  kasan_atomics_helper+0x3f58/0x4858
[   35.151894]  kasan_atomics+0x198/0x2e0
[   35.152054]  kunit_try_run_case+0x170/0x3f0
[   35.152140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.152217]  kthread+0x328/0x630
[   35.152352]  ret_from_fork+0x10/0x20
[   35.152469] 
[   35.152492] Allocated by task 296:
[   35.152523]  kasan_save_stack+0x3c/0x68
[   35.152565]  kasan_save_track+0x20/0x40
[   35.152741]  kasan_save_alloc_info+0x40/0x58
[   35.152840]  __kasan_kmalloc+0xd4/0xd8
[   35.152890]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.152947]  kasan_atomics+0xb8/0x2e0
[   35.153026]  kunit_try_run_case+0x170/0x3f0
[   35.153119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.153176]  kthread+0x328/0x630
[   35.153210]  ret_from_fork+0x10/0x20
[   35.153249] 
[   35.153271] The buggy address belongs to the object at fff00000c9b8ff80
[   35.153271]  which belongs to the cache kmalloc-64 of size 64
[   35.153370] The buggy address is located 0 bytes to the right of
[   35.153370]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.153534] 
[   35.153585] The buggy address belongs to the physical page:
[   35.153642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.153722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.153850] page_type: f5(slab)
[   35.153908] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.153960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.154002] page dumped because: kasan: bad access detected
[   35.154162] 
[   35.154186] Memory state around the buggy address:
[   35.154222]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.154271]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.154483] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.154542]                                      ^
[   35.154609]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.154689]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.154997] ==================================================================
[   35.259976] ==================================================================
[   35.260095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   35.260149] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.260201] 
[   35.260238] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.260450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.260485] Hardware name: linux,dummy-virt (DT)
[   35.260614] Call trace:
[   35.260649]  show_stack+0x20/0x38 (C)
[   35.260771]  dump_stack_lvl+0x8c/0xd0
[   35.260849]  print_report+0x118/0x5e8
[   35.260915]  kasan_report+0xdc/0x128
[   35.261265]  kasan_check_range+0x100/0x1a8
[   35.261329]  __kasan_check_write+0x20/0x30
[   35.261379]  kasan_atomics_helper+0x15b4/0x4858
[   35.261494]  kasan_atomics+0x198/0x2e0
[   35.261546]  kunit_try_run_case+0x170/0x3f0
[   35.261601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.261720]  kthread+0x328/0x630
[   35.261802]  ret_from_fork+0x10/0x20
[   35.261861] 
[   35.261901] Allocated by task 296:
[   35.261960]  kasan_save_stack+0x3c/0x68
[   35.262003]  kasan_save_track+0x20/0x40
[   35.262041]  kasan_save_alloc_info+0x40/0x58
[   35.262081]  __kasan_kmalloc+0xd4/0xd8
[   35.262123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.262166]  kasan_atomics+0xb8/0x2e0
[   35.262315]  kunit_try_run_case+0x170/0x3f0
[   35.262453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.262528]  kthread+0x328/0x630
[   35.262565]  ret_from_fork+0x10/0x20
[   35.262604] 
[   35.262626] The buggy address belongs to the object at fff00000c9b8ff80
[   35.262626]  which belongs to the cache kmalloc-64 of size 64
[   35.262705] The buggy address is located 0 bytes to the right of
[   35.262705]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.262792] 
[   35.262815] The buggy address belongs to the physical page:
[   35.262861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.262916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.262967] page_type: f5(slab)
[   35.263005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.263059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.263101] page dumped because: kasan: bad access detected
[   35.263140] 
[   35.263161] Memory state around the buggy address:
[   35.263196]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.263242]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.263289] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.263329]                                      ^
[   35.263366]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.263418]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.263459] ==================================================================
[   35.243449] ==================================================================
[   35.243502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   35.243559] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.243611] 
[   35.243665] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.243766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.243819] Hardware name: linux,dummy-virt (DT)
[   35.243893] Call trace:
[   35.243952]  show_stack+0x20/0x38 (C)
[   35.244003]  dump_stack_lvl+0x8c/0xd0
[   35.244081]  print_report+0x118/0x5e8
[   35.244148]  kasan_report+0xdc/0x128
[   35.244193]  kasan_check_range+0x100/0x1a8
[   35.244259]  __kasan_check_write+0x20/0x30
[   35.244317]  kasan_atomics_helper+0x147c/0x4858
[   35.244369]  kasan_atomics+0x198/0x2e0
[   35.244438]  kunit_try_run_case+0x170/0x3f0
[   35.244487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.244542]  kthread+0x328/0x630
[   35.244601]  ret_from_fork+0x10/0x20
[   35.244678] 
[   35.244702] Allocated by task 296:
[   35.244732]  kasan_save_stack+0x3c/0x68
[   35.244782]  kasan_save_track+0x20/0x40
[   35.244843]  kasan_save_alloc_info+0x40/0x58
[   35.244884]  __kasan_kmalloc+0xd4/0xd8
[   35.244921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.244965]  kasan_atomics+0xb8/0x2e0
[   35.245004]  kunit_try_run_case+0x170/0x3f0
[   35.245266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.245331]  kthread+0x328/0x630
[   35.245725]  ret_from_fork+0x10/0x20
[   35.245803] 
[   35.245881] The buggy address belongs to the object at fff00000c9b8ff80
[   35.245881]  which belongs to the cache kmalloc-64 of size 64
[   35.245962] The buggy address is located 0 bytes to the right of
[   35.245962]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.246032] 
[   35.246332] The buggy address belongs to the physical page:
[   35.246394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.246452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.246506] page_type: f5(slab)
[   35.247004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.247246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.247324] page dumped because: kasan: bad access detected
[   35.247362] 
[   35.247413] Memory state around the buggy address:
[   35.247459]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.247517]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.247563] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.247605]                                      ^
[   35.247821]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.248781]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.248832] ==================================================================
[   35.286899] ==================================================================
[   35.287014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   35.287121] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.287268] 
[   35.287650] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.287862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.287941] Hardware name: linux,dummy-virt (DT)
[   35.288015] Call trace:
[   35.288116]  show_stack+0x20/0x38 (C)
[   35.288224]  dump_stack_lvl+0x8c/0xd0
[   35.288329]  print_report+0x118/0x5e8
[   35.289690]  kasan_report+0xdc/0x128
[   35.290794]  kasan_check_range+0x100/0x1a8
[   35.290864]  __kasan_check_write+0x20/0x30
[   35.291007]  kasan_atomics_helper+0x175c/0x4858
[   35.291175]  kasan_atomics+0x198/0x2e0
[   35.291229]  kunit_try_run_case+0x170/0x3f0
[   35.291329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.291445]  kthread+0x328/0x630
[   35.291589]  ret_from_fork+0x10/0x20
[   35.291713] 
[   35.291937] Allocated by task 296:
[   35.291972]  kasan_save_stack+0x3c/0x68
[   35.292017]  kasan_save_track+0x20/0x40
[   35.292104]  kasan_save_alloc_info+0x40/0x58
[   35.292207]  __kasan_kmalloc+0xd4/0xd8
[   35.292371]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.292470]  kasan_atomics+0xb8/0x2e0
[   35.292520]  kunit_try_run_case+0x170/0x3f0
[   35.292560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.292801]  kthread+0x328/0x630
[   35.292839]  ret_from_fork+0x10/0x20
[   35.292892] 
[   35.292914] The buggy address belongs to the object at fff00000c9b8ff80
[   35.292914]  which belongs to the cache kmalloc-64 of size 64
[   35.292977] The buggy address is located 0 bytes to the right of
[   35.292977]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.293135] 
[   35.293216] The buggy address belongs to the physical page:
[   35.293271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.293342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.293401] page_type: f5(slab)
[   35.293442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.293501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.293543] page dumped because: kasan: bad access detected
[   35.293583] 
[   35.293603] Memory state around the buggy address:
[   35.293639]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.293684]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.293732] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.293783]                                      ^
[   35.293817]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.293861]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.293905] ==================================================================
[   35.294455] ==================================================================
[   35.294507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   35.294724] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.294792] 
[   35.294828] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.294958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.295046] Hardware name: linux,dummy-virt (DT)
[   35.295170] Call trace:
[   35.295232]  show_stack+0x20/0x38 (C)
[   35.295373]  dump_stack_lvl+0x8c/0xd0
[   35.295451]  print_report+0x118/0x5e8
[   35.295578]  kasan_report+0xdc/0x128
[   35.295739]  __asan_report_load8_noabort+0x20/0x30
[   35.295836]  kasan_atomics_helper+0x3e20/0x4858
[   35.296073]  kasan_atomics+0x198/0x2e0
[   35.296123]  kunit_try_run_case+0x170/0x3f0
[   35.296171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.296281]  kthread+0x328/0x630
[   35.296326]  ret_from_fork+0x10/0x20
[   35.296400] 
[   35.296507] Allocated by task 296:
[   35.296575]  kasan_save_stack+0x3c/0x68
[   35.296720]  kasan_save_track+0x20/0x40
[   35.296803]  kasan_save_alloc_info+0x40/0x58
[   35.297049]  __kasan_kmalloc+0xd4/0xd8
[   35.297090]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.297133]  kasan_atomics+0xb8/0x2e0
[   35.297204]  kunit_try_run_case+0x170/0x3f0
[   35.298139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.298217]  kthread+0x328/0x630
[   35.298255]  ret_from_fork+0x10/0x20
[   35.298318] 
[   35.298391] The buggy address belongs to the object at fff00000c9b8ff80
[   35.298391]  which belongs to the cache kmalloc-64 of size 64
[   35.298821] The buggy address is located 0 bytes to the right of
[   35.298821]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.298974] 
[   35.299074] The buggy address belongs to the physical page:
[   35.299165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.299268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.299322] page_type: f5(slab)
[   35.299522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.299575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.299618] page dumped because: kasan: bad access detected
[   35.299652] 
[   35.299673] Memory state around the buggy address:
[   35.299708]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.299775]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.299820] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.299905]                                      ^
[   35.299973]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.300113]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.300155] ==================================================================
[   35.181761] ==================================================================
[   35.182052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   35.182148] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.182203] 
[   35.182235] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.182322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.182351] Hardware name: linux,dummy-virt (DT)
[   35.182384] Call trace:
[   35.182429]  show_stack+0x20/0x38 (C)
[   35.182478]  dump_stack_lvl+0x8c/0xd0
[   35.182525]  print_report+0x118/0x5e8
[   35.182570]  kasan_report+0xdc/0x128
[   35.182634]  kasan_check_range+0x100/0x1a8
[   35.182682]  __kasan_check_write+0x20/0x30
[   35.182730]  kasan_atomics_helper+0xff0/0x4858
[   35.182792]  kasan_atomics+0x198/0x2e0
[   35.182850]  kunit_try_run_case+0x170/0x3f0
[   35.182909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.182972]  kthread+0x328/0x630
[   35.183018]  ret_from_fork+0x10/0x20
[   35.183064] 
[   35.183094] Allocated by task 296:
[   35.183124]  kasan_save_stack+0x3c/0x68
[   35.183164]  kasan_save_track+0x20/0x40
[   35.183202]  kasan_save_alloc_info+0x40/0x58
[   35.183249]  __kasan_kmalloc+0xd4/0xd8
[   35.183303]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.183347]  kasan_atomics+0xb8/0x2e0
[   35.183401]  kunit_try_run_case+0x170/0x3f0
[   35.183442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.183488]  kthread+0x328/0x630
[   35.183531]  ret_from_fork+0x10/0x20
[   35.183570] 
[   35.183591] The buggy address belongs to the object at fff00000c9b8ff80
[   35.183591]  which belongs to the cache kmalloc-64 of size 64
[   35.183651] The buggy address is located 0 bytes to the right of
[   35.183651]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.183723] 
[   35.183756] The buggy address belongs to the physical page:
[   35.183792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.183846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.183894] page_type: f5(slab)
[   35.183933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.183987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.184029] page dumped because: kasan: bad access detected
[   35.184062] 
[   35.184082] Memory state around the buggy address:
[   35.184665]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.184777]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.184873] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.185041]                                      ^
[   35.185080]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.185125]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.185166] ==================================================================
[   35.176596] ==================================================================
[   35.176671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   35.176741] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.176806] 
[   35.177054] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.177267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.177297] Hardware name: linux,dummy-virt (DT)
[   35.177437] Call trace:
[   35.177466]  show_stack+0x20/0x38 (C)
[   35.177520]  dump_stack_lvl+0x8c/0xd0
[   35.177649]  print_report+0x118/0x5e8
[   35.177773]  kasan_report+0xdc/0x128
[   35.177839]  kasan_check_range+0x100/0x1a8
[   35.177890]  __kasan_check_write+0x20/0x30
[   35.178096]  kasan_atomics_helper+0xf88/0x4858
[   35.178358]  kasan_atomics+0x198/0x2e0
[   35.178423]  kunit_try_run_case+0x170/0x3f0
[   35.178473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.178539]  kthread+0x328/0x630
[   35.178583]  ret_from_fork+0x10/0x20
[   35.178641] 
[   35.178664] Allocated by task 296:
[   35.178700]  kasan_save_stack+0x3c/0x68
[   35.178741]  kasan_save_track+0x20/0x40
[   35.178790]  kasan_save_alloc_info+0x40/0x58
[   35.178831]  __kasan_kmalloc+0xd4/0xd8
[   35.178910]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.179159]  kasan_atomics+0xb8/0x2e0
[   35.179290]  kunit_try_run_case+0x170/0x3f0
[   35.179391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.179479]  kthread+0x328/0x630
[   35.179558]  ret_from_fork+0x10/0x20
[   35.179650] 
[   35.179710] The buggy address belongs to the object at fff00000c9b8ff80
[   35.179710]  which belongs to the cache kmalloc-64 of size 64
[   35.179786] The buggy address is located 0 bytes to the right of
[   35.179786]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.179891] 
[   35.179914] The buggy address belongs to the physical page:
[   35.179954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.180008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.180061] page_type: f5(slab)
[   35.180099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.180255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.180369] page dumped because: kasan: bad access detected
[   35.180427] 
[   35.180491] Memory state around the buggy address:
[   35.180739]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.180848]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.180925] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.180994]                                      ^
[   35.181068]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.181131]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.181199] ==================================================================
[   35.145071] ==================================================================
[   35.145144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.145206] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.145256] 
[   35.145296] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.145393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.145433] Hardware name: linux,dummy-virt (DT)
[   35.145467] Call trace:
[   35.145492]  show_stack+0x20/0x38 (C)
[   35.145541]  dump_stack_lvl+0x8c/0xd0
[   35.145588]  print_report+0x118/0x5e8
[   35.145633]  kasan_report+0xdc/0x128
[   35.145678]  kasan_check_range+0x100/0x1a8
[   35.145735]  __kasan_check_read+0x20/0x30
[   35.145796]  kasan_atomics_helper+0xdd4/0x4858
[   35.145845]  kasan_atomics+0x198/0x2e0
[   35.145893]  kunit_try_run_case+0x170/0x3f0
[   35.145942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.146005]  kthread+0x328/0x630
[   35.146057]  ret_from_fork+0x10/0x20
[   35.146112] 
[   35.146140] Allocated by task 296:
[   35.146178]  kasan_save_stack+0x3c/0x68
[   35.146220]  kasan_save_track+0x20/0x40
[   35.146258]  kasan_save_alloc_info+0x40/0x58
[   35.146298]  __kasan_kmalloc+0xd4/0xd8
[   35.146333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.146387]  kasan_atomics+0xb8/0x2e0
[   35.146436]  kunit_try_run_case+0x170/0x3f0
[   35.146477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.146522]  kthread+0x328/0x630
[   35.146564]  ret_from_fork+0x10/0x20
[   35.146601] 
[   35.146624] The buggy address belongs to the object at fff00000c9b8ff80
[   35.146624]  which belongs to the cache kmalloc-64 of size 64
[   35.146682] The buggy address is located 0 bytes to the right of
[   35.146682]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.147442] 
[   35.147493] The buggy address belongs to the physical page:
[   35.147543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.147602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.147652] page_type: f5(slab)
[   35.147691] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.147994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.148287] page dumped because: kasan: bad access detected
[   35.148391] 
[   35.148451] Memory state around the buggy address:
[   35.148766]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.148887]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.149048] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.149143]                                      ^
[   35.149272]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.149318]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.149359] ==================================================================
[   35.223744] ==================================================================
[   35.224072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   35.224303] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.224385] 
[   35.224420] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.224776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.224834] Hardware name: linux,dummy-virt (DT)
[   35.225052] Call trace:
[   35.225147]  show_stack+0x20/0x38 (C)
[   35.225206]  dump_stack_lvl+0x8c/0xd0
[   35.225403]  print_report+0x118/0x5e8
[   35.225451]  kasan_report+0xdc/0x128
[   35.225496]  kasan_check_range+0x100/0x1a8
[   35.225543]  __kasan_check_write+0x20/0x30
[   35.225593]  kasan_atomics_helper+0x1384/0x4858
[   35.225645]  kasan_atomics+0x198/0x2e0
[   35.225692]  kunit_try_run_case+0x170/0x3f0
[   35.225741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.225829]  kthread+0x328/0x630
[   35.225875]  ret_from_fork+0x10/0x20
[   35.225925] 
[   35.225948] Allocated by task 296:
[   35.225978]  kasan_save_stack+0x3c/0x68
[   35.226019]  kasan_save_track+0x20/0x40
[   35.226056]  kasan_save_alloc_info+0x40/0x58
[   35.226097]  __kasan_kmalloc+0xd4/0xd8
[   35.226139]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.226191]  kasan_atomics+0xb8/0x2e0
[   35.226231]  kunit_try_run_case+0x170/0x3f0
[   35.226272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.226317]  kthread+0x328/0x630
[   35.226362]  ret_from_fork+0x10/0x20
[   35.226409] 
[   35.226452] The buggy address belongs to the object at fff00000c9b8ff80
[   35.226452]  which belongs to the cache kmalloc-64 of size 64
[   35.226514] The buggy address is located 0 bytes to the right of
[   35.226514]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.226580] 
[   35.226602] The buggy address belongs to the physical page:
[   35.226643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.226695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.226754] page_type: f5(slab)
[   35.227177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.227248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.227292] page dumped because: kasan: bad access detected
[   35.227335] 
[   35.227378] Memory state around the buggy address:
[   35.227416]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.227858]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.227955] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.228596]                                      ^
[   35.228646]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.228694]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.228735] ==================================================================
[   35.196738] ==================================================================
[   35.196802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   35.196879] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.196950] 
[   35.196981] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.197070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.197097] Hardware name: linux,dummy-virt (DT)
[   35.197130] Call trace:
[   35.197155]  show_stack+0x20/0x38 (C)
[   35.197366]  dump_stack_lvl+0x8c/0xd0
[   35.197425]  print_report+0x118/0x5e8
[   35.197499]  kasan_report+0xdc/0x128
[   35.197544]  kasan_check_range+0x100/0x1a8
[   35.197610]  __kasan_check_write+0x20/0x30
[   35.197676]  kasan_atomics_helper+0x1128/0x4858
[   35.197731]  kasan_atomics+0x198/0x2e0
[   35.197794]  kunit_try_run_case+0x170/0x3f0
[   35.197842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.197896]  kthread+0x328/0x630
[   35.197958]  ret_from_fork+0x10/0x20
[   35.198010] 
[   35.198168] Allocated by task 296:
[   35.198227]  kasan_save_stack+0x3c/0x68
[   35.198272]  kasan_save_track+0x20/0x40
[   35.198308]  kasan_save_alloc_info+0x40/0x58
[   35.198349]  __kasan_kmalloc+0xd4/0xd8
[   35.198387]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.198429]  kasan_atomics+0xb8/0x2e0
[   35.198586]  kunit_try_run_case+0x170/0x3f0
[   35.198782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.198853]  kthread+0x328/0x630
[   35.198892]  ret_from_fork+0x10/0x20
[   35.198930] 
[   35.198953] The buggy address belongs to the object at fff00000c9b8ff80
[   35.198953]  which belongs to the cache kmalloc-64 of size 64
[   35.199026] The buggy address is located 0 bytes to the right of
[   35.199026]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.199093] 
[   35.199116] The buggy address belongs to the physical page:
[   35.199306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.199405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.199473] page_type: f5(slab)
[   35.199549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.199809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.199941] page dumped because: kasan: bad access detected
[   35.200030] 
[   35.200066] Memory state around the buggy address:
[   35.200103]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.200149]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.200337] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.200384]                                      ^
[   35.200420]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.200589]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.200674] ==================================================================
[   35.253637] ==================================================================
[   35.253686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   35.253736] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.253908] 
[   35.254166] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.254371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.254429] Hardware name: linux,dummy-virt (DT)
[   35.254464] Call trace:
[   35.254533]  show_stack+0x20/0x38 (C)
[   35.254601]  dump_stack_lvl+0x8c/0xd0
[   35.254654]  print_report+0x118/0x5e8
[   35.254713]  kasan_report+0xdc/0x128
[   35.254779]  kasan_check_range+0x100/0x1a8
[   35.254826]  __kasan_check_write+0x20/0x30
[   35.254874]  kasan_atomics_helper+0x154c/0x4858
[   35.254925]  kasan_atomics+0x198/0x2e0
[   35.254987]  kunit_try_run_case+0x170/0x3f0
[   35.255035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.255228]  kthread+0x328/0x630
[   35.255326]  ret_from_fork+0x10/0x20
[   35.255463] 
[   35.255519] Allocated by task 296:
[   35.255587]  kasan_save_stack+0x3c/0x68
[   35.255859]  kasan_save_track+0x20/0x40
[   35.255977]  kasan_save_alloc_info+0x40/0x58
[   35.256060]  __kasan_kmalloc+0xd4/0xd8
[   35.256172]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.256218]  kasan_atomics+0xb8/0x2e0
[   35.256274]  kunit_try_run_case+0x170/0x3f0
[   35.256321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.256366]  kthread+0x328/0x630
[   35.256709]  ret_from_fork+0x10/0x20
[   35.256842] 
[   35.256894] The buggy address belongs to the object at fff00000c9b8ff80
[   35.256894]  which belongs to the cache kmalloc-64 of size 64
[   35.257125] The buggy address is located 0 bytes to the right of
[   35.257125]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.257296] 
[   35.257391] The buggy address belongs to the physical page:
[   35.257495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.257606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.257678] page_type: f5(slab)
[   35.257868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.258022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.258178] page dumped because: kasan: bad access detected
[   35.258270] 
[   35.258446] Memory state around the buggy address:
[   35.258597]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.258649]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.258695] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.258738]                                      ^
[   35.258807]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.258863]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.258904] ==================================================================
[   35.136198] ==================================================================
[   35.136281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.136372] Write of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.136424] 
[   35.136485] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.136594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.136639] Hardware name: linux,dummy-virt (DT)
[   35.136674] Call trace:
[   35.136698]  show_stack+0x20/0x38 (C)
[   35.136759]  dump_stack_lvl+0x8c/0xd0
[   35.136810]  print_report+0x118/0x5e8
[   35.136854]  kasan_report+0xdc/0x128
[   35.137031]  kasan_check_range+0x100/0x1a8
[   35.137082]  __kasan_check_write+0x20/0x30
[   35.137133]  kasan_atomics_helper+0xd3c/0x4858
[   35.137207]  kasan_atomics+0x198/0x2e0
[   35.137264]  kunit_try_run_case+0x170/0x3f0
[   35.137327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.137382]  kthread+0x328/0x630
[   35.137440]  ret_from_fork+0x10/0x20
[   35.137521] 
[   35.137544] Allocated by task 296:
[   35.137594]  kasan_save_stack+0x3c/0x68
[   35.137650]  kasan_save_track+0x20/0x40
[   35.137847]  kasan_save_alloc_info+0x40/0x58
[   35.138069]  __kasan_kmalloc+0xd4/0xd8
[   35.138159]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.138251]  kasan_atomics+0xb8/0x2e0
[   35.138320]  kunit_try_run_case+0x170/0x3f0
[   35.138361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.138405]  kthread+0x328/0x630
[   35.138441]  ret_from_fork+0x10/0x20
[   35.138478] 
[   35.138499] The buggy address belongs to the object at fff00000c9b8ff80
[   35.138499]  which belongs to the cache kmalloc-64 of size 64
[   35.138561] The buggy address is located 0 bytes to the right of
[   35.138561]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.138626] 
[   35.138785] The buggy address belongs to the physical page:
[   35.138861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.138941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.139011] page_type: f5(slab)
[   35.139239] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.139382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.139440] page dumped because: kasan: bad access detected
[   35.139513] 
[   35.139659] Memory state around the buggy address:
[   35.139730]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.139851]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.140012] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.140092]                                      ^
[   35.140167]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.140218]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.140281] ==================================================================
[   35.170998] ==================================================================
[   35.171341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   35.171448] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.171744] 
[   35.171823] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.171941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.172018] Hardware name: linux,dummy-virt (DT)
[   35.172070] Call trace:
[   35.172132]  show_stack+0x20/0x38 (C)
[   35.172192]  dump_stack_lvl+0x8c/0xd0
[   35.172263]  print_report+0x118/0x5e8
[   35.172319]  kasan_report+0xdc/0x128
[   35.172365]  kasan_check_range+0x100/0x1a8
[   35.172413]  __kasan_check_write+0x20/0x30
[   35.172461]  kasan_atomics_helper+0xf20/0x4858
[   35.172515]  kasan_atomics+0x198/0x2e0
[   35.172561]  kunit_try_run_case+0x170/0x3f0
[   35.172620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.172684]  kthread+0x328/0x630
[   35.172735]  ret_from_fork+0x10/0x20
[   35.172797] 
[   35.172817] Allocated by task 296:
[   35.172848]  kasan_save_stack+0x3c/0x68
[   35.172887]  kasan_save_track+0x20/0x40
[   35.172926]  kasan_save_alloc_info+0x40/0x58
[   35.173002]  __kasan_kmalloc+0xd4/0xd8
[   35.173212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.173329]  kasan_atomics+0xb8/0x2e0
[   35.173405]  kunit_try_run_case+0x170/0x3f0
[   35.173490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.173547]  kthread+0x328/0x630
[   35.173583]  ret_from_fork+0x10/0x20
[   35.173620] 
[   35.173644] The buggy address belongs to the object at fff00000c9b8ff80
[   35.173644]  which belongs to the cache kmalloc-64 of size 64
[   35.173756] The buggy address is located 0 bytes to the right of
[   35.173756]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.173964] 
[   35.174072] The buggy address belongs to the physical page:
[   35.174145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.174459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.174557] page_type: f5(slab)
[   35.174682] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.174765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.174840] page dumped because: kasan: bad access detected
[   35.174988] 
[   35.175009] Memory state around the buggy address:
[   35.175042]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.175148]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.175195] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.175236]                                      ^
[   35.175360]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.175474]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.175543] ==================================================================
[   35.300482] ==================================================================
[   35.300534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   35.300689] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.300780] 
[   35.300816] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.300911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.300970] Hardware name: linux,dummy-virt (DT)
[   35.301019] Call trace:
[   35.301047]  show_stack+0x20/0x38 (C)
[   35.301122]  dump_stack_lvl+0x8c/0xd0
[   35.301172]  print_report+0x118/0x5e8
[   35.301222]  kasan_report+0xdc/0x128
[   35.301267]  kasan_check_range+0x100/0x1a8
[   35.301313]  __kasan_check_write+0x20/0x30
[   35.301362]  kasan_atomics_helper+0x17ec/0x4858
[   35.301418]  kasan_atomics+0x198/0x2e0
[   35.301466]  kunit_try_run_case+0x170/0x3f0
[   35.301515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.301573]  kthread+0x328/0x630
[   35.301617]  ret_from_fork+0x10/0x20
[   35.301666] 
[   35.301689] Allocated by task 296:
[   35.301725]  kasan_save_stack+0x3c/0x68
[   35.302025]  kasan_save_track+0x20/0x40
[   35.302079]  kasan_save_alloc_info+0x40/0x58
[   35.302316]  __kasan_kmalloc+0xd4/0xd8
[   35.302371]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.302582]  kasan_atomics+0xb8/0x2e0
[   35.302636]  kunit_try_run_case+0x170/0x3f0
[   35.302677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.302721]  kthread+0x328/0x630
[   35.302768]  ret_from_fork+0x10/0x20
[   35.302832] 
[   35.302858] The buggy address belongs to the object at fff00000c9b8ff80
[   35.302858]  which belongs to the cache kmalloc-64 of size 64
[   35.302923] The buggy address is located 0 bytes to the right of
[   35.302923]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.303043] 
[   35.303068] The buggy address belongs to the physical page:
[   35.303129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.303299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.303424] page_type: f5(slab)
[   35.303545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.303628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.303720] page dumped because: kasan: bad access detected
[   35.304125] 
[   35.304185] Memory state around the buggy address:
[   35.304221]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.304451]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.304642] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.304773]                                      ^
[   35.304851]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.304944]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.305314] ==================================================================
[   35.190922] ==================================================================
[   35.190983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   35.191078] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.191183] 
[   35.191254] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.191361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.191389] Hardware name: linux,dummy-virt (DT)
[   35.191462] Call trace:
[   35.191595]  show_stack+0x20/0x38 (C)
[   35.191649]  dump_stack_lvl+0x8c/0xd0
[   35.191730]  print_report+0x118/0x5e8
[   35.191873]  kasan_report+0xdc/0x128
[   35.191940]  kasan_check_range+0x100/0x1a8
[   35.192055]  __kasan_check_write+0x20/0x30
[   35.192137]  kasan_atomics_helper+0x10c0/0x4858
[   35.192328]  kasan_atomics+0x198/0x2e0
[   35.192466]  kunit_try_run_case+0x170/0x3f0
[   35.192728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.193221]  kthread+0x328/0x630
[   35.193311]  ret_from_fork+0x10/0x20
[   35.193429] 
[   35.193502] Allocated by task 296:
[   35.193576]  kasan_save_stack+0x3c/0x68
[   35.193765]  kasan_save_track+0x20/0x40
[   35.193945]  kasan_save_alloc_info+0x40/0x58
[   35.194077]  __kasan_kmalloc+0xd4/0xd8
[   35.194408]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.194511]  kasan_atomics+0xb8/0x2e0
[   35.194607]  kunit_try_run_case+0x170/0x3f0
[   35.194697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.194794]  kthread+0x328/0x630
[   35.194882]  ret_from_fork+0x10/0x20
[   35.194920] 
[   35.194944] The buggy address belongs to the object at fff00000c9b8ff80
[   35.194944]  which belongs to the cache kmalloc-64 of size 64
[   35.195007] The buggy address is located 0 bytes to the right of
[   35.195007]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.195074] 
[   35.195133] The buggy address belongs to the physical page:
[   35.195293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.195418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.195502] page_type: f5(slab)
[   35.195557] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.195820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.195892] page dumped because: kasan: bad access detected
[   35.195951] 
[   35.196004] Memory state around the buggy address:
[   35.196051]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.196116]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.196166] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.196207]                                      ^
[   35.196242]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.196320]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.196442] ==================================================================
[   35.076505] ==================================================================
[   35.076553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.076602] Write of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.076653] 
[   35.076684] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.076839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.076898] Hardware name: linux,dummy-virt (DT)
[   35.076957] Call trace:
[   35.077058]  dump_stack_lvl+0x8c/0xd0
[   35.078317]  kasan_save_alloc_info+0x40/0x58
[   35.079109] The buggy address is located 0 bytes to the right of
[   35.079109]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.080032]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.082368]  print_report+0x118/0x5e8
[   35.084262]  kasan_atomics+0xb8/0x2e0
[   35.084981] 
[   35.085053] The buggy address belongs to the physical page:
[   35.085245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.085445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.085570] page_type: f5(slab)
[   35.085649] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.085766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.085862] page dumped because: kasan: bad access detected
[   35.085936] 
[   35.086008] Memory state around the buggy address:
[   35.086074]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.086150]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.086196] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.086239]                                      ^
[   35.086403]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.086548]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.086593] ==================================================================
[   35.263538] ==================================================================
[   35.263580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   35.263625] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.263676] 
[   35.263708] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.263806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.263836] Hardware name: linux,dummy-virt (DT)
[   35.263868] Call trace:
[   35.263932]  show_stack+0x20/0x38 (C)
[   35.263984]  dump_stack_lvl+0x8c/0xd0
[   35.264295]  print_report+0x118/0x5e8
[   35.264378]  kasan_report+0xdc/0x128
[   35.264466]  __asan_report_load8_noabort+0x20/0x30
[   35.264522]  kasan_atomics_helper+0x3db0/0x4858
[   35.264575]  kasan_atomics+0x198/0x2e0
[   35.264701]  kunit_try_run_case+0x170/0x3f0
[   35.264857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.264943]  kthread+0x328/0x630
[   35.264993]  ret_from_fork+0x10/0x20
[   35.265109] 
[   35.265213] Allocated by task 296:
[   35.265282]  kasan_save_stack+0x3c/0x68
[   35.265601]  kasan_save_track+0x20/0x40
[   35.265651]  kasan_save_alloc_info+0x40/0x58
[   35.265728]  __kasan_kmalloc+0xd4/0xd8
[   35.265778]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.265821]  kasan_atomics+0xb8/0x2e0
[   35.265862]  kunit_try_run_case+0x170/0x3f0
[   35.265902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.265948]  kthread+0x328/0x630
[   35.266136]  ret_from_fork+0x10/0x20
[   35.266300] 
[   35.266370] The buggy address belongs to the object at fff00000c9b8ff80
[   35.266370]  which belongs to the cache kmalloc-64 of size 64
[   35.266624] The buggy address is located 0 bytes to the right of
[   35.266624]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.266788] 
[   35.266849] The buggy address belongs to the physical page:
[   35.266975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.267079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.267210] page_type: f5(slab)
[   35.267270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.267321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.267364] page dumped because: kasan: bad access detected
[   35.267397] 
[   35.267418] Memory state around the buggy address:
[   35.267452]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.267500]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.267547] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.267707]                                      ^
[   35.267784]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.267844]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.267912] ==================================================================
[   35.086833] ==================================================================
[   35.087158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.087273] Write of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.087573] 
[   35.087652] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.088348]  __kasan_check_write+0x20/0x30
[   35.090467] The buggy address is located 0 bytes to the right of
[   35.090467]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.090630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.090687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.090737] page_type: f5(slab)
[   35.090806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.091093] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.092929] 
[   35.093535]  print_report+0x118/0x5e8
[   35.096068] 
[   35.096301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.096394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.096447] page_type: f5(slab)
[   35.096612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.096841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.098585] ==================================================================
[   35.066538] ==================================================================
[   35.066584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.066632] Read of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.066683] 
[   35.066715] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.067137] Call trace:
[   35.068255] Allocated by task 296:
[   35.069537] 
[   35.070094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.070819] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.072307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.073611]  kasan_save_track+0x20/0x40
[   35.073711]  __kasan_kmalloc+0xd4/0xd8
[   35.073762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.074018]  kasan_atomics+0xb8/0x2e0
[   35.074091]  kunit_try_run_case+0x170/0x3f0
[   35.074146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.074204]  kthread+0x328/0x630
[   35.074254]  ret_from_fork+0x10/0x20
[   35.074293] 
[   35.074354] The buggy address belongs to the object at fff00000c9b8ff80
[   35.074354]  which belongs to the cache kmalloc-64 of size 64
[   35.074438] The buggy address is located 0 bytes to the right of
[   35.074438]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.074730] 
[   35.074809] The buggy address belongs to the physical page:
[   35.074868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.074996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.075053] page_type: f5(slab)
[   35.075093] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.075351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.075445] page dumped because: kasan: bad access detected
[   35.075526] 
[   35.075587] Memory state around the buggy address:
[   35.075677]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.075770]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.075815] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.075866]                                      ^
[   35.075902]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.076235]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.076282] ==================================================================
[   35.155713] ==================================================================
[   35.155808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   35.155861] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.156035] 
[   35.156072] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.156160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.156189] Hardware name: linux,dummy-virt (DT)
[   35.156223] Call trace:
[   35.156249]  show_stack+0x20/0x38 (C)
[   35.156298]  dump_stack_lvl+0x8c/0xd0
[   35.156346]  print_report+0x118/0x5e8
[   35.156392]  kasan_report+0xdc/0x128
[   35.156438]  kasan_check_range+0x100/0x1a8
[   35.156623]  __kasan_check_write+0x20/0x30
[   35.156714]  kasan_atomics_helper+0xe44/0x4858
[   35.156806]  kasan_atomics+0x198/0x2e0
[   35.156861]  kunit_try_run_case+0x170/0x3f0
[   35.157076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.157189]  kthread+0x328/0x630
[   35.157255]  ret_from_fork+0x10/0x20
[   35.157317] 
[   35.157357] Allocated by task 296:
[   35.157389]  kasan_save_stack+0x3c/0x68
[   35.157430]  kasan_save_track+0x20/0x40
[   35.157708]  kasan_save_alloc_info+0x40/0x58
[   35.157776]  __kasan_kmalloc+0xd4/0xd8
[   35.157816]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.157859]  kasan_atomics+0xb8/0x2e0
[   35.157952]  kunit_try_run_case+0x170/0x3f0
[   35.157994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.158040]  kthread+0x328/0x630
[   35.158082]  ret_from_fork+0x10/0x20
[   35.158206] 
[   35.158245] The buggy address belongs to the object at fff00000c9b8ff80
[   35.158245]  which belongs to the cache kmalloc-64 of size 64
[   35.158434] The buggy address is located 0 bytes to the right of
[   35.158434]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.158558] 
[   35.158599] The buggy address belongs to the physical page:
[   35.158656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.158712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.158774] page_type: f5(slab)
[   35.159009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.159105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.159189] page dumped because: kasan: bad access detected
[   35.159257] 
[   35.159324] Memory state around the buggy address:
[   35.159414]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.159500]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.159901] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.159997]                                      ^
[   35.160070]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.160173]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.160243] ==================================================================
[   35.249062] ==================================================================
[   35.249115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   35.249166] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.249216] 
[   35.249251] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.249338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.249367] Hardware name: linux,dummy-virt (DT)
[   35.249400] Call trace:
[   35.249426]  show_stack+0x20/0x38 (C)
[   35.249473]  dump_stack_lvl+0x8c/0xd0
[   35.249522]  print_report+0x118/0x5e8
[   35.249568]  kasan_report+0xdc/0x128
[   35.249611]  kasan_check_range+0x100/0x1a8
[   35.249657]  __kasan_check_write+0x20/0x30
[   35.249705]  kasan_atomics_helper+0x14e4/0x4858
[   35.249789]  kasan_atomics+0x198/0x2e0
[   35.249873]  kunit_try_run_case+0x170/0x3f0
[   35.249941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.250025]  kthread+0x328/0x630
[   35.250069]  ret_from_fork+0x10/0x20
[   35.250159] 
[   35.250240] Allocated by task 296:
[   35.250300]  kasan_save_stack+0x3c/0x68
[   35.250369]  kasan_save_track+0x20/0x40
[   35.250425]  kasan_save_alloc_info+0x40/0x58
[   35.250485]  __kasan_kmalloc+0xd4/0xd8
[   35.250543]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.250588]  kasan_atomics+0xb8/0x2e0
[   35.250628]  kunit_try_run_case+0x170/0x3f0
[   35.250668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.250879]  kthread+0x328/0x630
[   35.250967]  ret_from_fork+0x10/0x20
[   35.251029] 
[   35.251196] The buggy address belongs to the object at fff00000c9b8ff80
[   35.251196]  which belongs to the cache kmalloc-64 of size 64
[   35.251332] The buggy address is located 0 bytes to the right of
[   35.251332]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.251454] 
[   35.251622] The buggy address belongs to the physical page:
[   35.251675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.251951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.252190] page_type: f5(slab)
[   35.252232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.252286] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.252487] page dumped because: kasan: bad access detected
[   35.252629] 
[   35.252707] Memory state around the buggy address:
[   35.252826]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.253032]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.253159] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.253235]                                      ^
[   35.253285]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.253331]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.253372] ==================================================================
[   35.185393] ==================================================================
[   35.185542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   35.185599] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.185665] 
[   35.185724] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.185842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.185890] Hardware name: linux,dummy-virt (DT)
[   35.185924] Call trace:
[   35.186172]  show_stack+0x20/0x38 (C)
[   35.186255]  dump_stack_lvl+0x8c/0xd0
[   35.186308]  print_report+0x118/0x5e8
[   35.186353]  kasan_report+0xdc/0x128
[   35.186418]  kasan_check_range+0x100/0x1a8
[   35.186483]  __kasan_check_write+0x20/0x30
[   35.186574]  kasan_atomics_helper+0x1058/0x4858
[   35.186627]  kasan_atomics+0x198/0x2e0
[   35.186694]  kunit_try_run_case+0x170/0x3f0
[   35.186787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.186862]  kthread+0x328/0x630
[   35.187100]  ret_from_fork+0x10/0x20
[   35.187266] 
[   35.187324] Allocated by task 296:
[   35.187422]  kasan_save_stack+0x3c/0x68
[   35.187500]  kasan_save_track+0x20/0x40
[   35.187829]  kasan_save_alloc_info+0x40/0x58
[   35.187919]  __kasan_kmalloc+0xd4/0xd8
[   35.187994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.188061]  kasan_atomics+0xb8/0x2e0
[   35.188139]  kunit_try_run_case+0x170/0x3f0
[   35.188219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.188318]  kthread+0x328/0x630
[   35.188412]  ret_from_fork+0x10/0x20
[   35.188499] 
[   35.188532] The buggy address belongs to the object at fff00000c9b8ff80
[   35.188532]  which belongs to the cache kmalloc-64 of size 64
[   35.188594] The buggy address is located 0 bytes to the right of
[   35.188594]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.188773] 
[   35.188798] The buggy address belongs to the physical page:
[   35.188838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.189003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.189107] page_type: f5(slab)
[   35.189194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.189262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.189342] page dumped because: kasan: bad access detected
[   35.189594] 
[   35.189660] Memory state around the buggy address:
[   35.189727]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.189832]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.189917] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.190003]                                      ^
[   35.190093]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.190179]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.190478] ==================================================================
[   35.234768] ==================================================================
[   35.234821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   35.234891] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.234953] 
[   35.234985] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.235157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.235315] Hardware name: linux,dummy-virt (DT)
[   35.235409] Call trace:
[   35.235480]  show_stack+0x20/0x38 (C)
[   35.235569]  dump_stack_lvl+0x8c/0xd0
[   35.235806]  print_report+0x118/0x5e8
[   35.236057]  kasan_report+0xdc/0x128
[   35.236159]  kasan_check_range+0x100/0x1a8
[   35.236278]  __kasan_check_write+0x20/0x30
[   35.236365]  kasan_atomics_helper+0x1414/0x4858
[   35.236472]  kasan_atomics+0x198/0x2e0
[   35.236548]  kunit_try_run_case+0x170/0x3f0
[   35.236615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.236673]  kthread+0x328/0x630
[   35.236715]  ret_from_fork+0x10/0x20
[   35.236774] 
[   35.236798] Allocated by task 296:
[   35.236827]  kasan_save_stack+0x3c/0x68
[   35.237144]  kasan_save_track+0x20/0x40
[   35.237252]  kasan_save_alloc_info+0x40/0x58
[   35.237320]  __kasan_kmalloc+0xd4/0xd8
[   35.237380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.237457]  kasan_atomics+0xb8/0x2e0
[   35.237508]  kunit_try_run_case+0x170/0x3f0
[   35.237549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.237769]  kthread+0x328/0x630
[   35.237866]  ret_from_fork+0x10/0x20
[   35.237943] 
[   35.238000] The buggy address belongs to the object at fff00000c9b8ff80
[   35.238000]  which belongs to the cache kmalloc-64 of size 64
[   35.238113] The buggy address is located 0 bytes to the right of
[   35.238113]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.238180] 
[   35.238434] The buggy address belongs to the physical page:
[   35.238591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.238692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.238779] page_type: f5(slab)
[   35.238963] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.239253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.239314] page dumped because: kasan: bad access detected
[   35.239349] 
[   35.239369] Memory state around the buggy address:
[   35.239404]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.239450]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.241116] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.242978]                                      ^
[   35.243044]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.243092]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.243135] ==================================================================
[   35.165483] ==================================================================
[   35.165539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   35.165590] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.165679] 
[   35.165938] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.166069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.166122] Hardware name: linux,dummy-virt (DT)
[   35.166157] Call trace:
[   35.166184]  show_stack+0x20/0x38 (C)
[   35.166241]  dump_stack_lvl+0x8c/0xd0
[   35.166317]  print_report+0x118/0x5e8
[   35.166383]  kasan_report+0xdc/0x128
[   35.166430]  kasan_check_range+0x100/0x1a8
[   35.166477]  __kasan_check_write+0x20/0x30
[   35.166535]  kasan_atomics_helper+0xeb8/0x4858
[   35.166586]  kasan_atomics+0x198/0x2e0
[   35.166635]  kunit_try_run_case+0x170/0x3f0
[   35.166681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.166735]  kthread+0x328/0x630
[   35.166790]  ret_from_fork+0x10/0x20
[   35.166839] 
[   35.166859] Allocated by task 296:
[   35.167516]  kasan_save_stack+0x3c/0x68
[   35.167823]  kasan_save_track+0x20/0x40
[   35.167931]  kasan_save_alloc_info+0x40/0x58
[   35.168042]  __kasan_kmalloc+0xd4/0xd8
[   35.168141]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.168241]  kasan_atomics+0xb8/0x2e0
[   35.168312]  kunit_try_run_case+0x170/0x3f0
[   35.168352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.168549]  kthread+0x328/0x630
[   35.168589]  ret_from_fork+0x10/0x20
[   35.168628] 
[   35.168651] The buggy address belongs to the object at fff00000c9b8ff80
[   35.168651]  which belongs to the cache kmalloc-64 of size 64
[   35.168716] The buggy address is located 0 bytes to the right of
[   35.168716]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.168929] 
[   35.168992] The buggy address belongs to the physical page:
[   35.169051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.169141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.169389] page_type: f5(slab)
[   35.169484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.169602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.169680] page dumped because: kasan: bad access detected
[   35.169732] 
[   35.169818] Memory state around the buggy address:
[   35.169883]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.169973]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.170055] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.170323]                                      ^
[   35.170403]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.170461]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.170503] ==================================================================
[   35.129649] ==================================================================
[   35.129700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.129770] Read of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.129849] 
[   35.129885] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.129991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.130023] Hardware name: linux,dummy-virt (DT)
[   35.130058] Call trace:
[   35.130084]  show_stack+0x20/0x38 (C)
[   35.130141]  dump_stack_lvl+0x8c/0xd0
[   35.130191]  print_report+0x118/0x5e8
[   35.130237]  kasan_report+0xdc/0x128
[   35.130406]  __asan_report_load4_noabort+0x20/0x30
[   35.130539]  kasan_atomics_helper+0x3dd8/0x4858
[   35.130594]  kasan_atomics+0x198/0x2e0
[   35.130670]  kunit_try_run_case+0x170/0x3f0
[   35.130721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.130992]  kthread+0x328/0x630
[   35.131138]  ret_from_fork+0x10/0x20
[   35.131308] 
[   35.131369] Allocated by task 296:
[   35.131427]  kasan_save_stack+0x3c/0x68
[   35.131469]  kasan_save_track+0x20/0x40
[   35.131716]  kasan_save_alloc_info+0x40/0x58
[   35.131780]  __kasan_kmalloc+0xd4/0xd8
[   35.131910]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.132007]  kasan_atomics+0xb8/0x2e0
[   35.132097]  kunit_try_run_case+0x170/0x3f0
[   35.132203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.132278]  kthread+0x328/0x630
[   35.132357]  ret_from_fork+0x10/0x20
[   35.132588] 
[   35.132717] The buggy address belongs to the object at fff00000c9b8ff80
[   35.132717]  which belongs to the cache kmalloc-64 of size 64
[   35.132881] The buggy address is located 0 bytes to the right of
[   35.132881]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.132960] 
[   35.132983] The buggy address belongs to the physical page:
[   35.133035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.133363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.133519] page_type: f5(slab)
[   35.133724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.133933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.134067] page dumped because: kasan: bad access detected
[   35.134160] 
[   35.134217] Memory state around the buggy address:
[   35.134333]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.134409]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.134492] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.134613]                                      ^
[   35.134700]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.134767]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.134806] ==================================================================
[   35.217383] ==================================================================
[   35.217437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   35.217490] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.217638] 
[   35.217704] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.217808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.217837] Hardware name: linux,dummy-virt (DT)
[   35.217871] Call trace:
[   35.217895]  show_stack+0x20/0x38 (C)
[   35.217945]  dump_stack_lvl+0x8c/0xd0
[   35.218327]  print_report+0x118/0x5e8
[   35.218389]  kasan_report+0xdc/0x128
[   35.218435]  kasan_check_range+0x100/0x1a8
[   35.218524]  __kasan_check_write+0x20/0x30
[   35.218575]  kasan_atomics_helper+0x12d8/0x4858
[   35.218665]  kasan_atomics+0x198/0x2e0
[   35.218715]  kunit_try_run_case+0x170/0x3f0
[   35.218877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.218932]  kthread+0x328/0x630
[   35.219206]  ret_from_fork+0x10/0x20
[   35.219566] 
[   35.219638] Allocated by task 296:
[   35.219852]  kasan_save_stack+0x3c/0x68
[   35.220004]  kasan_save_track+0x20/0x40
[   35.220125]  kasan_save_alloc_info+0x40/0x58
[   35.220243]  __kasan_kmalloc+0xd4/0xd8
[   35.220282]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.220348]  kasan_atomics+0xb8/0x2e0
[   35.220389]  kunit_try_run_case+0x170/0x3f0
[   35.220625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.220817]  kthread+0x328/0x630
[   35.220957]  ret_from_fork+0x10/0x20
[   35.221044] 
[   35.221088] The buggy address belongs to the object at fff00000c9b8ff80
[   35.221088]  which belongs to the cache kmalloc-64 of size 64
[   35.221246] The buggy address is located 0 bytes to the right of
[   35.221246]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.221428] 
[   35.221470] The buggy address belongs to the physical page:
[   35.221583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.221642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.221692] page_type: f5(slab)
[   35.221774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.222099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.222193] page dumped because: kasan: bad access detected
[   35.222381] 
[   35.222516] Memory state around the buggy address:
[   35.222589]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.222659]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.222706] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.222774]                                      ^
[   35.222809]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.222856]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.222976] ==================================================================
[   35.210977] ==================================================================
[   35.211029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   35.211079] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.211135] 
[   35.211167] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.211618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.211663] Hardware name: linux,dummy-virt (DT)
[   35.211699] Call trace:
[   35.211724]  show_stack+0x20/0x38 (C)
[   35.211789]  dump_stack_lvl+0x8c/0xd0
[   35.211838]  print_report+0x118/0x5e8
[   35.211897]  kasan_report+0xdc/0x128
[   35.211975]  kasan_check_range+0x100/0x1a8
[   35.212022]  __kasan_check_write+0x20/0x30
[   35.212069]  kasan_atomics_helper+0x126c/0x4858
[   35.212250]  kasan_atomics+0x198/0x2e0
[   35.212349]  kunit_try_run_case+0x170/0x3f0
[   35.212462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.212599]  kthread+0x328/0x630
[   35.212949]  ret_from_fork+0x10/0x20
[   35.213098] 
[   35.213161] Allocated by task 296:
[   35.213204]  kasan_save_stack+0x3c/0x68
[   35.213275]  kasan_save_track+0x20/0x40
[   35.213345]  kasan_save_alloc_info+0x40/0x58
[   35.213437]  __kasan_kmalloc+0xd4/0xd8
[   35.213474]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.213529]  kasan_atomics+0xb8/0x2e0
[   35.213870]  kunit_try_run_case+0x170/0x3f0
[   35.213982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.214096]  kthread+0x328/0x630
[   35.214353]  ret_from_fork+0x10/0x20
[   35.214460] 
[   35.214529] The buggy address belongs to the object at fff00000c9b8ff80
[   35.214529]  which belongs to the cache kmalloc-64 of size 64
[   35.214653] The buggy address is located 0 bytes to the right of
[   35.214653]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.214784] 
[   35.214884] The buggy address belongs to the physical page:
[   35.214981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.215043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.215397] page_type: f5(slab)
[   35.215465] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.215616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.215691] page dumped because: kasan: bad access detected
[   35.216027] 
[   35.216072] Memory state around the buggy address:
[   35.216162]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.216258]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.216382] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.216450]                                      ^
[   35.216535]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.216627]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.216734] ==================================================================
[   35.273842] ==================================================================
[   35.273895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   35.273989] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.274043] 
[   35.274099] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.274192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.274221] Hardware name: linux,dummy-virt (DT)
[   35.274275] Call trace:
[   35.274300]  show_stack+0x20/0x38 (C)
[   35.274374]  dump_stack_lvl+0x8c/0xd0
[   35.274423]  print_report+0x118/0x5e8
[   35.274470]  kasan_report+0xdc/0x128
[   35.274521]  __asan_report_load8_noabort+0x20/0x30
[   35.274982]  kasan_atomics_helper+0x3df4/0x4858
[   35.275086]  kasan_atomics+0x198/0x2e0
[   35.275151]  kunit_try_run_case+0x170/0x3f0
[   35.275520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.275629]  kthread+0x328/0x630
[   35.275734]  ret_from_fork+0x10/0x20
[   35.275857] 
[   35.275880] Allocated by task 296:
[   35.275937]  kasan_save_stack+0x3c/0x68
[   35.275980]  kasan_save_track+0x20/0x40
[   35.276018]  kasan_save_alloc_info+0x40/0x58
[   35.276058]  __kasan_kmalloc+0xd4/0xd8
[   35.276095]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.276177]  kasan_atomics+0xb8/0x2e0
[   35.276256]  kunit_try_run_case+0x170/0x3f0
[   35.276296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.276364]  kthread+0x328/0x630
[   35.276422]  ret_from_fork+0x10/0x20
[   35.276547] 
[   35.276605] The buggy address belongs to the object at fff00000c9b8ff80
[   35.276605]  which belongs to the cache kmalloc-64 of size 64
[   35.276733] The buggy address is located 0 bytes to the right of
[   35.276733]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.276825] 
[   35.276849] The buggy address belongs to the physical page:
[   35.276888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.276944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.276994] page_type: f5(slab)
[   35.277032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.277125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.277170] page dumped because: kasan: bad access detected
[   35.277203] 
[   35.277224] Memory state around the buggy address:
[   35.277404]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.277487]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.277561] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.277611]                                      ^
[   35.277647]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.277693]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.277742] ==================================================================
[   35.229083] ==================================================================
[   35.229159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   35.229213] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.229264] 
[   35.229297] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.229384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.229413] Hardware name: linux,dummy-virt (DT)
[   35.229446] Call trace:
[   35.229471]  show_stack+0x20/0x38 (C)
[   35.229561]  dump_stack_lvl+0x8c/0xd0
[   35.229721]  print_report+0x118/0x5e8
[   35.229853]  kasan_report+0xdc/0x128
[   35.229910]  __asan_report_load8_noabort+0x20/0x30
[   35.229970]  kasan_atomics_helper+0x3f04/0x4858
[   35.230023]  kasan_atomics+0x198/0x2e0
[   35.230145]  kunit_try_run_case+0x170/0x3f0
[   35.230406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.230494]  kthread+0x328/0x630
[   35.230538]  ret_from_fork+0x10/0x20
[   35.230606] 
[   35.230667] Allocated by task 296:
[   35.230705]  kasan_save_stack+0x3c/0x68
[   35.230783]  kasan_save_track+0x20/0x40
[   35.230822]  kasan_save_alloc_info+0x40/0x58
[   35.230862]  __kasan_kmalloc+0xd4/0xd8
[   35.230898]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.231176]  kasan_atomics+0xb8/0x2e0
[   35.231299]  kunit_try_run_case+0x170/0x3f0
[   35.231425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.231512]  kthread+0x328/0x630
[   35.231822]  ret_from_fork+0x10/0x20
[   35.231944] 
[   35.232006] The buggy address belongs to the object at fff00000c9b8ff80
[   35.232006]  which belongs to the cache kmalloc-64 of size 64
[   35.232154] The buggy address is located 0 bytes to the right of
[   35.232154]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.232250] 
[   35.232353] The buggy address belongs to the physical page:
[   35.232405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.232461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.232530] page_type: f5(slab)
[   35.232570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.232870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.232993] page dumped because: kasan: bad access detected
[   35.233065] 
[   35.233209] Memory state around the buggy address:
[   35.233419]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.233473]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.233518] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.233775]                                      ^
[   35.233895]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.233984]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.234171] ==================================================================
[   35.268707] ==================================================================
[   35.268812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   35.268886] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.268956] 
[   35.268990] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.269080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.269140] Hardware name: linux,dummy-virt (DT)
[   35.269174] Call trace:
[   35.269199]  show_stack+0x20/0x38 (C)
[   35.269248]  dump_stack_lvl+0x8c/0xd0
[   35.269294]  print_report+0x118/0x5e8
[   35.269340]  kasan_report+0xdc/0x128
[   35.269385]  kasan_check_range+0x100/0x1a8
[   35.269483]  __kasan_check_write+0x20/0x30
[   35.269536]  kasan_atomics_helper+0x1644/0x4858
[   35.269699]  kasan_atomics+0x198/0x2e0
[   35.269770]  kunit_try_run_case+0x170/0x3f0
[   35.269826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.269900]  kthread+0x328/0x630
[   35.269943]  ret_from_fork+0x10/0x20
[   35.269993] 
[   35.270015] Allocated by task 296:
[   35.270046]  kasan_save_stack+0x3c/0x68
[   35.270085]  kasan_save_track+0x20/0x40
[   35.270127]  kasan_save_alloc_info+0x40/0x58
[   35.270168]  __kasan_kmalloc+0xd4/0xd8
[   35.270205]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.270248]  kasan_atomics+0xb8/0x2e0
[   35.270418]  kunit_try_run_case+0x170/0x3f0
[   35.270556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.270680]  kthread+0x328/0x630
[   35.270760]  ret_from_fork+0x10/0x20
[   35.270808] 
[   35.270995] The buggy address belongs to the object at fff00000c9b8ff80
[   35.270995]  which belongs to the cache kmalloc-64 of size 64
[   35.271193] The buggy address is located 0 bytes to the right of
[   35.271193]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.271318] 
[   35.271386] The buggy address belongs to the physical page:
[   35.271426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.271483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.271738] page_type: f5(slab)
[   35.271831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.271981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.272067] page dumped because: kasan: bad access detected
[   35.272200] 
[   35.272258] Memory state around the buggy address:
[   35.272354]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.272666]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.272780] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.272900]                                      ^
[   35.272965]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.273033]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.273170] ==================================================================
[   35.201347] ==================================================================
[   35.201400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   35.201676] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296
[   35.201765] 
[   35.201809] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   35.201898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.201937] Hardware name: linux,dummy-virt (DT)
[   35.201969] Call trace:
[   35.201995]  show_stack+0x20/0x38 (C)
[   35.202121]  dump_stack_lvl+0x8c/0xd0
[   35.202178]  print_report+0x118/0x5e8
[   35.202222]  kasan_report+0xdc/0x128
[   35.202309]  kasan_check_range+0x100/0x1a8
[   35.202614]  __kasan_check_write+0x20/0x30
[   35.202679]  kasan_atomics_helper+0x1190/0x4858
[   35.202734]  kasan_atomics+0x198/0x2e0
[   35.203025]  kunit_try_run_case+0x170/0x3f0
[   35.203171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.203360]  kthread+0x328/0x630
[   35.203989]  ret_from_fork+0x10/0x20
[   35.204248] 
[   35.204289] Allocated by task 296:
[   35.204322]  kasan_save_stack+0x3c/0x68
[   35.204393]  kasan_save_track+0x20/0x40
[   35.205079]  kasan_save_alloc_info+0x40/0x58
[   35.205211]  __kasan_kmalloc+0xd4/0xd8
[   35.205456]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.205528]  kasan_atomics+0xb8/0x2e0
[   35.205571]  kunit_try_run_case+0x170/0x3f0
[   35.205611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.205658]  kthread+0x328/0x630
[   35.205694]  ret_from_fork+0x10/0x20
[   35.205733] 
[   35.205765] The buggy address belongs to the object at fff00000c9b8ff80
[   35.205765]  which belongs to the cache kmalloc-64 of size 64
[   35.205830] The buggy address is located 0 bytes to the right of
[   35.205830]  allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0)
[   35.205896] 
[   35.205918] The buggy address belongs to the physical page:
[   35.205958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f
[   35.206015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.206064] page_type: f5(slab)
[   35.206105] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.206160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.206204] page dumped because: kasan: bad access detected
[   35.206238] 
[   35.206260] Memory state around the buggy address:
[   35.206295]  fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.206342]  fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.206388] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.206428]                                      ^
[   35.206462]  fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.206508]  fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.206549] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   34.777853] ==================================================================
[   34.777963] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   34.778051] Read of size 1 at addr fff00000c9b90d10 by task kunit_try_catch/290
[   34.778106] 
[   34.778170] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.778289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.778320] Hardware name: linux,dummy-virt (DT)
[   34.778357] Call trace:
[   34.778504]  show_stack+0x20/0x38 (C)
[   34.778572]  dump_stack_lvl+0x8c/0xd0
[   34.778733]  print_report+0x118/0x5e8
[   34.778819]  kasan_report+0xdc/0x128
[   34.778865]  __asan_report_load1_noabort+0x20/0x30
[   34.779114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.781246]  kasan_strings+0x24c/0xb00
[   34.782317] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.783921] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   34.770724] ==================================================================
[   34.771205] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   34.771526] Read of size 1 at addr fff00000c9b90d10 by task kunit_try_catch/290
[   34.771642] 
[   34.771718] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.771874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.771916] Hardware name: linux,dummy-virt (DT)
[   34.771952] Call trace:
[   34.771981]  show_stack+0x20/0x38 (C)
[   34.772141]  dump_stack_lvl+0x8c/0xd0
[   34.772271]  print_report+0x118/0x5e8
[   34.772326]  kasan_report+0xdc/0x128
[   34.772425]  __asan_report_load1_noabort+0x20/0x30
[   34.772521]  strcmp+0xc0/0xc8
[   34.772595]  kasan_strings+0x340/0xb00
[   34.772679]  kunit_try_run_case+0x170/0x3f0
[   34.772796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.772880]  kthread+0x328/0x630
[   34.772924]  ret_from_fork+0x10/0x20
[   34.772976] 
[   34.772997] Allocated by task 290:
[   34.773055]  kasan_save_stack+0x3c/0x68
[   34.773196]  kasan_save_track+0x20/0x40
[   34.773309]  kasan_save_alloc_info+0x40/0x58
[   34.773360]  __kasan_kmalloc+0xd4/0xd8
[   34.773398]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.773684]  kasan_strings+0xc8/0xb00
[   34.773805]  kunit_try_run_case+0x170/0x3f0
[   34.773861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.773963]  kthread+0x328/0x630
[   34.774033]  ret_from_fork+0x10/0x20
[   34.774133] 
[   34.774207] Freed by task 290:
[   34.774266]  kasan_save_stack+0x3c/0x68
[   34.774318]  kasan_save_track+0x20/0x40
[   34.774355]  kasan_save_free_info+0x4c/0x78
[   34.774586]  __kasan_slab_free+0x6c/0x98
[   34.774718]  kfree+0x214/0x3c8
[   34.774834]  kasan_strings+0x24c/0xb00
[   34.774937]  kunit_try_run_case+0x170/0x3f0
[   34.775083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.775140]  kthread+0x328/0x630
[   34.775213]  ret_from_fork+0x10/0x20
[   34.775300] 
[   34.775336] The buggy address belongs to the object at fff00000c9b90d00
[   34.775336]  which belongs to the cache kmalloc-32 of size 32
[   34.775434] The buggy address is located 16 bytes inside of
[   34.775434]  freed 32-byte region [fff00000c9b90d00, fff00000c9b90d20)
[   34.775554] 
[   34.775624] The buggy address belongs to the physical page:
[   34.775690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90
[   34.775760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.775830] page_type: f5(slab)
[   34.775875] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.775929] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.775971] page dumped because: kasan: bad access detected
[   34.776032] 
[   34.776053] Memory state around the buggy address:
[   34.776208]  fff00000c9b90c00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.776259]  fff00000c9b90c80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.776313] >fff00000c9b90d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.776405]                          ^
[   34.776452]  fff00000c9b90d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.776534]  fff00000c9b90e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.776663] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   34.759882] ==================================================================
[   34.760117] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   34.760213] Read of size 1 at addr fff00000c9b90b58 by task kunit_try_catch/288
[   34.760269] 
[   34.760314] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.760422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.760489] Hardware name: linux,dummy-virt (DT)
[   34.760527] Call trace:
[   34.760555]  show_stack+0x20/0x38 (C)
[   34.760611]  dump_stack_lvl+0x8c/0xd0
[   34.760808]  print_report+0x118/0x5e8
[   34.760861]  kasan_report+0xdc/0x128
[   34.760907]  __asan_report_load1_noabort+0x20/0x30
[   34.760959]  memcmp+0x198/0x1d8
[   34.761006]  kasan_memcmp+0x16c/0x300
[   34.761171]  kunit_try_run_case+0x170/0x3f0
[   34.761237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.761310]  kthread+0x328/0x630
[   34.761359]  ret_from_fork+0x10/0x20
[   34.761416] 
[   34.761445] Allocated by task 288:
[   34.761482]  kasan_save_stack+0x3c/0x68
[   34.761542]  kasan_save_track+0x20/0x40
[   34.761599]  kasan_save_alloc_info+0x40/0x58
[   34.761683]  __kasan_kmalloc+0xd4/0xd8
[   34.761740]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.761800]  kasan_memcmp+0xbc/0x300
[   34.761841]  kunit_try_run_case+0x170/0x3f0
[   34.761879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.761925]  kthread+0x328/0x630
[   34.761960]  ret_from_fork+0x10/0x20
[   34.762000] 
[   34.762022] The buggy address belongs to the object at fff00000c9b90b40
[   34.762022]  which belongs to the cache kmalloc-32 of size 32
[   34.762116] The buggy address is located 0 bytes to the right of
[   34.762116]  allocated 24-byte region [fff00000c9b90b40, fff00000c9b90b58)
[   34.762204] 
[   34.762244] The buggy address belongs to the physical page:
[   34.762289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90
[   34.762359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.762414] page_type: f5(slab)
[   34.762459] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.762725] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.762832] page dumped because: kasan: bad access detected
[   34.762870] 
[   34.762899] Memory state around the buggy address:
[   34.762935]  fff00000c9b90a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.763012]  fff00000c9b90a80: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   34.763077] >fff00000c9b90b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.763193]                                                     ^
[   34.763236]  fff00000c9b90b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.763279]  fff00000c9b90c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.763487] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   34.744457] ==================================================================
[   34.744539] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   34.744610] Read of size 1 at addr ffff800080aa7b4a by task kunit_try_catch/284
[   34.744663] 
[   34.744702] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.744807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.744836] Hardware name: linux,dummy-virt (DT)
[   34.744881] Call trace:
[   34.744908]  show_stack+0x20/0x38 (C)
[   34.744962]  dump_stack_lvl+0x8c/0xd0
[   34.745010]  print_report+0x310/0x5e8
[   34.745057]  kasan_report+0xdc/0x128
[   34.745111]  __asan_report_load1_noabort+0x20/0x30
[   34.745162]  kasan_alloca_oob_right+0x2dc/0x340
[   34.745211]  kunit_try_run_case+0x170/0x3f0
[   34.745262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.745314]  kthread+0x328/0x630
[   34.745359]  ret_from_fork+0x10/0x20
[   34.745409] 
[   34.745441] The buggy address belongs to stack of task kunit_try_catch/284
[   34.745497] 
[   34.745519] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080aa0000 allocated at kernel_clone+0x150/0x7b0
[   34.745633] The buggy address belongs to the physical page:
[   34.745671] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a09
[   34.745729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.745814] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.745867] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.745910] page dumped because: kasan: bad access detected
[   34.746427] 
[   34.746487] Memory state around the buggy address:
[   34.746545]  ffff800080aa7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.746611]  ffff800080aa7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.746676] >ffff800080aa7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   34.746723]                                               ^
[   34.746777]  ffff800080aa7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   34.746871]  ffff800080aa7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   34.746918] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   34.736778] ==================================================================
[   34.736906] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   34.736983] Read of size 1 at addr ffff800080ac7b5f by task kunit_try_catch/282
[   34.737037] 
[   34.737078] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.737314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.737376] Hardware name: linux,dummy-virt (DT)
[   34.737433] Call trace:
[   34.737461]  show_stack+0x20/0x38 (C)
[   34.737518]  dump_stack_lvl+0x8c/0xd0
[   34.737585]  print_report+0x310/0x5e8
[   34.737651]  kasan_report+0xdc/0x128
[   34.737698]  __asan_report_load1_noabort+0x20/0x30
[   34.737783]  kasan_alloca_oob_left+0x2b8/0x310
[   34.737882]  kunit_try_run_case+0x170/0x3f0
[   34.737934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.737989]  kthread+0x328/0x630
[   34.738033]  ret_from_fork+0x10/0x20
[   34.738085] 
[   34.738141] The buggy address belongs to stack of task kunit_try_catch/282
[   34.738246] 
[   34.738269] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080ac0000 allocated at kernel_clone+0x150/0x7b0
[   34.738378] The buggy address belongs to the physical page:
[   34.738417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a37
[   34.738476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.738682] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.738737] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.738815] page dumped because: kasan: bad access detected
[   34.738850] 
[   34.738890] Memory state around the buggy address:
[   34.738926]  ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.739060]  ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.739152] >ffff800080ac7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   34.739263]                                                     ^
[   34.739366]  ffff800080ac7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   34.739438]  ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   34.739557] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   34.726316] ==================================================================
[   34.726398] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   34.726660] Read of size 1 at addr ffff800080ac7c2a by task kunit_try_catch/280
[   34.726761] 
[   34.726853] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.727012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.727093] Hardware name: linux,dummy-virt (DT)
[   34.727152] Call trace:
[   34.727182]  show_stack+0x20/0x38 (C)
[   34.727239]  dump_stack_lvl+0x8c/0xd0
[   34.727290]  print_report+0x310/0x5e8
[   34.727394]  kasan_report+0xdc/0x128
[   34.727441]  __asan_report_load1_noabort+0x20/0x30
[   34.727606]  kasan_stack_oob+0x238/0x270
[   34.727660]  kunit_try_run_case+0x170/0x3f0
[   34.727738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.727830]  kthread+0x328/0x630
[   34.727876]  ret_from_fork+0x10/0x20
[   34.727928] 
[   34.728000] The buggy address belongs to stack of task kunit_try_catch/280
[   34.728155]  and is located at offset 138 in frame:
[   34.728210]  kasan_stack_oob+0x0/0x270
[   34.728379] 
[   34.728431] This frame has 4 objects:
[   34.728570]  [48, 49) '__assertion'
[   34.728620]  [64, 72) 'array'
[   34.728676]  [96, 112) '__assertion'
[   34.728729]  [128, 138) 'stack_array'
[   34.728785] 
[   34.728826] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080ac0000 allocated at kernel_clone+0x150/0x7b0
[   34.729075] The buggy address belongs to the physical page:
[   34.729116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a37
[   34.729176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.729248] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.729301] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.729354] page dumped because: kasan: bad access detected
[   34.729403] 
[   34.729433] Memory state around the buggy address:
[   34.729483]  ffff800080ac7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.729535]  ffff800080ac7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   34.729580] >ffff800080ac7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   34.729629]                                   ^
[   34.729662]  ffff800080ac7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   34.729707]  ffff800080ac7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   34.730292] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   34.708789] ==================================================================
[   34.708868] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   34.708938] Read of size 1 at addr ffffa667f2f8e68d by task kunit_try_catch/276
[   34.708994] 
[   34.709057] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.709156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.709194] Hardware name: linux,dummy-virt (DT)
[   34.709231] Call trace:
[   34.709267]  show_stack+0x20/0x38 (C)
[   34.709322]  dump_stack_lvl+0x8c/0xd0
[   34.709373]  print_report+0x310/0x5e8
[   34.709420]  kasan_report+0xdc/0x128
[   34.709474]  __asan_report_load1_noabort+0x20/0x30
[   34.709525]  kasan_global_oob_right+0x230/0x270
[   34.709574]  kunit_try_run_case+0x170/0x3f0
[   34.709625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.709687]  kthread+0x328/0x630
[   34.709738]  ret_from_fork+0x10/0x20
[   34.710068] 
[   34.710364] The buggy address belongs to the variable:
[   34.710414]  global_array+0xd/0x40
[   34.710474] 
[   34.710534] The buggy address belongs to a vmalloc virtual mapping
[   34.712563] The buggy address belongs to the physical page:
[   34.712613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d8e
[   34.712700] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   34.712806] raw: 03fffe0000002000 ffffc1ffc01f6388 ffffc1ffc01f6388 0000000000000000
[   34.712859] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.713083] page dumped because: kasan: bad access detected
[   34.713167] 
[   34.713207] Memory state around the buggy address:
[   34.713249]  ffffa667f2f8e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.713317]  ffffa667f2f8e600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   34.713396] >ffffa667f2f8e680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   34.713528]                       ^
[   34.713592]  ffffa667f2f8e700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   34.713687]  ffffa667f2f8e780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.713779] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   34.697603] ==================================================================
[   34.697681] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.697770] Free of addr fff00000c9bc8001 by task kunit_try_catch/274
[   34.697814] 
[   34.697958] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.698140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.698175] Hardware name: linux,dummy-virt (DT)
[   34.698226] Call trace:
[   34.698271]  show_stack+0x20/0x38 (C)
[   34.698354]  dump_stack_lvl+0x8c/0xd0
[   34.698421]  print_report+0x118/0x5e8
[   34.698467]  kasan_report_invalid_free+0xc0/0xe8
[   34.698531]  __kasan_mempool_poison_object+0xfc/0x150
[   34.698786]  mempool_free+0x3f4/0x5f0
[   34.698902]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.698959]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   34.699080]  kunit_try_run_case+0x170/0x3f0
[   34.699128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.699195]  kthread+0x328/0x630
[   34.699238]  ret_from_fork+0x10/0x20
[   34.699287] 
[   34.699309] The buggy address belongs to the physical page:
[   34.699390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc8
[   34.699448] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.699612] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.699715] page_type: f8(unknown)
[   34.699854] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.699981] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.700082] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.700215] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.700294] head: 0bfffe0000000002 ffffc1ffc326f201 00000000ffffffff 00000000ffffffff
[   34.700343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.700664] page dumped because: kasan: bad access detected
[   34.700801] 
[   34.700905] Memory state around the buggy address:
[   34.700984]  fff00000c9bc7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.701057]  fff00000c9bc7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.701204] >fff00000c9bc8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.701291]                    ^
[   34.701356]  fff00000c9bc8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.701445]  fff00000c9bc8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.701534] ==================================================================
[   34.684942] ==================================================================
[   34.685028] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.685115] Free of addr fff00000c4564f01 by task kunit_try_catch/272
[   34.685167] 
[   34.685208] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.685298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.685327] Hardware name: linux,dummy-virt (DT)
[   34.685366] Call trace:
[   34.685391]  show_stack+0x20/0x38 (C)
[   34.685454]  dump_stack_lvl+0x8c/0xd0
[   34.685503]  print_report+0x118/0x5e8
[   34.685547]  kasan_report_invalid_free+0xc0/0xe8
[   34.685604]  check_slab_allocation+0xfc/0x108
[   34.685654]  __kasan_mempool_poison_object+0x78/0x150
[   34.685701]  mempool_free+0x3f4/0x5f0
[   34.686593]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.686679]  mempool_kmalloc_invalid_free+0xc0/0x118
[   34.686989]  kunit_try_run_case+0x170/0x3f0
[   34.687063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.687118]  kthread+0x328/0x630
[   34.687160]  ret_from_fork+0x10/0x20
[   34.687211] 
[   34.687230] Allocated by task 272:
[   34.687258]  kasan_save_stack+0x3c/0x68
[   34.687298]  kasan_save_track+0x20/0x40
[   34.687334]  kasan_save_alloc_info+0x40/0x58
[   34.687371]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.687412]  remove_element+0x130/0x1f8
[   34.687449]  mempool_alloc_preallocated+0x58/0xc0
[   34.687489]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   34.687533]  mempool_kmalloc_invalid_free+0xc0/0x118
[   34.687576]  kunit_try_run_case+0x170/0x3f0
[   34.687614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.687656]  kthread+0x328/0x630
[   34.687688]  ret_from_fork+0x10/0x20
[   34.687723] 
[   34.687744] The buggy address belongs to the object at fff00000c4564f00
[   34.687744]  which belongs to the cache kmalloc-128 of size 128
[   34.687823] The buggy address is located 1 bytes inside of
[   34.687823]  128-byte region [fff00000c4564f00, fff00000c4564f80)
[   34.687883] 
[   34.687905] The buggy address belongs to the physical page:
[   34.687946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104564
[   34.688001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.688054] page_type: f5(slab)
[   34.688095] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   34.688511] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   34.688617] page dumped because: kasan: bad access detected
[   34.688677] 
[   34.688699] Memory state around the buggy address:
[   34.688733]  fff00000c4564e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.688793]  fff00000c4564e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.688838] >fff00000c4564f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.688875]                    ^
[   34.688905]  fff00000c4564f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.689344]  fff00000c4565000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.689499] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   34.671081] ==================================================================
[   34.671190] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.671408] Free of addr fff00000c9bac000 by task kunit_try_catch/270
[   34.671458] 
[   34.671556] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.671779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.671885] Hardware name: linux,dummy-virt (DT)
[   34.671985] Call trace:
[   34.672055]  show_stack+0x20/0x38 (C)
[   34.672155]  dump_stack_lvl+0x8c/0xd0
[   34.672241]  print_report+0x118/0x5e8
[   34.672457]  kasan_report_invalid_free+0xc0/0xe8
[   34.672515]  __kasan_mempool_poison_pages+0xe0/0xe8
[   34.672620]  mempool_free+0x3ac/0x5f0
[   34.672800]  mempool_double_free_helper+0x150/0x2e8
[   34.672858]  mempool_page_alloc_double_free+0xbc/0x118
[   34.672928]  kunit_try_run_case+0x170/0x3f0
[   34.672988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.673055]  kthread+0x328/0x630
[   34.673097]  ret_from_fork+0x10/0x20
[   34.673153] 
[   34.673177] The buggy address belongs to the physical page:
[   34.673215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bac
[   34.673273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.673352] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.673402] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.673457] page dumped because: kasan: bad access detected
[   34.673488] 
[   34.673509] Memory state around the buggy address:
[   34.673544]  fff00000c9babf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.673597]  fff00000c9babf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.673656] >fff00000c9bac000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.673695]                    ^
[   34.673739]  fff00000c9bac080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.673792]  fff00000c9bac100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.674140] ==================================================================
[   34.633059] ==================================================================
[   34.633202] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.633273] Free of addr fff00000c4564b00 by task kunit_try_catch/266
[   34.633379] 
[   34.633421] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.633692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.633741] Hardware name: linux,dummy-virt (DT)
[   34.633901] Call trace:
[   34.633938]  show_stack+0x20/0x38 (C)
[   34.633992]  dump_stack_lvl+0x8c/0xd0
[   34.634061]  print_report+0x118/0x5e8
[   34.634106]  kasan_report_invalid_free+0xc0/0xe8
[   34.634249]  check_slab_allocation+0xd4/0x108
[   34.634326]  __kasan_mempool_poison_object+0x78/0x150
[   34.634378]  mempool_free+0x3f4/0x5f0
[   34.634588]  mempool_double_free_helper+0x150/0x2e8
[   34.634689]  mempool_kmalloc_double_free+0xc0/0x118
[   34.634832]  kunit_try_run_case+0x170/0x3f0
[   34.634887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.635134]  kthread+0x328/0x630
[   34.635188]  ret_from_fork+0x10/0x20
[   34.635363] 
[   34.635464] Allocated by task 266:
[   34.635525]  kasan_save_stack+0x3c/0x68
[   34.635592]  kasan_save_track+0x20/0x40
[   34.635840]  kasan_save_alloc_info+0x40/0x58
[   34.635888]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.635939]  remove_element+0x130/0x1f8
[   34.635979]  mempool_alloc_preallocated+0x58/0xc0
[   34.636047]  mempool_double_free_helper+0x94/0x2e8
[   34.636110]  mempool_kmalloc_double_free+0xc0/0x118
[   34.636283]  kunit_try_run_case+0x170/0x3f0
[   34.636467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.636559]  kthread+0x328/0x630
[   34.636601]  ret_from_fork+0x10/0x20
[   34.636639] 
[   34.636708] Freed by task 266:
[   34.636738]  kasan_save_stack+0x3c/0x68
[   34.636806]  kasan_save_track+0x20/0x40
[   34.636848]  kasan_save_free_info+0x4c/0x78
[   34.636897]  __kasan_mempool_poison_object+0xc0/0x150
[   34.636944]  mempool_free+0x3f4/0x5f0
[   34.636982]  mempool_double_free_helper+0x100/0x2e8
[   34.637038]  mempool_kmalloc_double_free+0xc0/0x118
[   34.637090]  kunit_try_run_case+0x170/0x3f0
[   34.637127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.637172]  kthread+0x328/0x630
[   34.637204]  ret_from_fork+0x10/0x20
[   34.637241] 
[   34.637260] The buggy address belongs to the object at fff00000c4564b00
[   34.637260]  which belongs to the cache kmalloc-128 of size 128
[   34.637329] The buggy address is located 0 bytes inside of
[   34.637329]  128-byte region [fff00000c4564b00, fff00000c4564b80)
[   34.637390] 
[   34.637412] The buggy address belongs to the physical page:
[   34.637452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104564
[   34.637519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.637581] page_type: f5(slab)
[   34.637626] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   34.637677] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.637727] page dumped because: kasan: bad access detected
[   34.637805] 
[   34.638225] Memory state around the buggy address:
[   34.638875]  fff00000c4564a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.639240]  fff00000c4564a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.639419] >fff00000c4564b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.639503]                    ^
[   34.639538]  fff00000c4564b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.639582]  fff00000c4564c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.639620] ==================================================================
[   34.652875] ==================================================================
[   34.652959] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.653030] Free of addr fff00000c9bac000 by task kunit_try_catch/268
[   34.653075] 
[   34.653117] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.653208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.653234] Hardware name: linux,dummy-virt (DT)
[   34.653338] Call trace:
[   34.653367]  show_stack+0x20/0x38 (C)
[   34.653443]  dump_stack_lvl+0x8c/0xd0
[   34.653492]  print_report+0x118/0x5e8
[   34.653537]  kasan_report_invalid_free+0xc0/0xe8
[   34.653583]  __kasan_mempool_poison_object+0x14c/0x150
[   34.653643]  mempool_free+0x3f4/0x5f0
[   34.653699]  mempool_double_free_helper+0x150/0x2e8
[   34.654441]  mempool_kmalloc_large_double_free+0xc0/0x118
[   34.654761]  kunit_try_run_case+0x170/0x3f0
[   34.654981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.655360]  kthread+0x328/0x630
[   34.655426]  ret_from_fork+0x10/0x20
[   34.655524] 
[   34.655610] The buggy address belongs to the physical page:
[   34.655666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bac
[   34.655804] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.655876] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.655937] page_type: f8(unknown)
[   34.656005] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.656380] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.656506] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.656624] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.656771] head: 0bfffe0000000002 ffffc1ffc326eb01 00000000ffffffff 00000000ffffffff
[   34.656870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.656980] page dumped because: kasan: bad access detected
[   34.657026] 
[   34.657045] Memory state around the buggy address:
[   34.657389]  fff00000c9babf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.657610]  fff00000c9babf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.657677] >fff00000c9bac000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.657836]                    ^
[   34.657902]  fff00000c9bac080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.657980]  fff00000c9bac100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.658340] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   34.546913] ==================================================================
[   34.548328] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   34.548723] Read of size 1 at addr fff00000c9b74000 by task kunit_try_catch/260
[   34.549171] 
[   34.549641] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.550465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.550588] Hardware name: linux,dummy-virt (DT)
[   34.551013] Call trace:
[   34.551056]  show_stack+0x20/0x38 (C)
[   34.551117]  dump_stack_lvl+0x8c/0xd0
[   34.551727]  print_report+0x118/0x5e8
[   34.551876]  kasan_report+0xdc/0x128
[   34.551923]  __asan_report_load1_noabort+0x20/0x30
[   34.553068]  mempool_uaf_helper+0x314/0x340
[   34.553139]  mempool_kmalloc_large_uaf+0xc4/0x120
[   34.553192]  kunit_try_run_case+0x170/0x3f0
[   34.554022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.554451]  kthread+0x328/0x630
[   34.554965]  ret_from_fork+0x10/0x20
[   34.555415] 
[   34.555440] The buggy address belongs to the physical page:
[   34.555667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b74
[   34.556310] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.556671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.557254] page_type: f8(unknown)
[   34.557303] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.557943] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.558466] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.558826] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.558881] head: 0bfffe0000000002 ffffc1ffc326dd01 00000000ffffffff 00000000ffffffff
[   34.558931] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.559689] page dumped because: kasan: bad access detected
[   34.559765] 
[   34.559785] Memory state around the buggy address:
[   34.560154]  fff00000c9b73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.560206]  fff00000c9b73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.560250] >fff00000c9b74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.560945]                    ^
[   34.561315]  fff00000c9b74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.561361]  fff00000c9b74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.561401] ==================================================================
[   34.620299] ==================================================================
[   34.620380] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   34.620598] Read of size 1 at addr fff00000c9bac000 by task kunit_try_catch/264
[   34.620688] 
[   34.620736] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.620844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.620874] Hardware name: linux,dummy-virt (DT)
[   34.621065] Call trace:
[   34.621225]  show_stack+0x20/0x38 (C)
[   34.621283]  dump_stack_lvl+0x8c/0xd0
[   34.621393]  print_report+0x118/0x5e8
[   34.621443]  kasan_report+0xdc/0x128
[   34.621503]  __asan_report_load1_noabort+0x20/0x30
[   34.621552]  mempool_uaf_helper+0x314/0x340
[   34.621600]  mempool_page_alloc_uaf+0xc0/0x118
[   34.621648]  kunit_try_run_case+0x170/0x3f0
[   34.621699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.621760]  kthread+0x328/0x630
[   34.621806]  ret_from_fork+0x10/0x20
[   34.621878] 
[   34.621908] The buggy address belongs to the physical page:
[   34.621966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bac
[   34.622025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.622105] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.622161] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.622203] page dumped because: kasan: bad access detected
[   34.622235] 
[   34.622260] Memory state around the buggy address:
[   34.622293]  fff00000c9babf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.622347]  fff00000c9babf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.622399] >fff00000c9bac000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.622447]                    ^
[   34.622475]  fff00000c9bac080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.622525]  fff00000c9bac100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.622575] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   34.520484] ==================================================================
[   34.520565] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   34.520639] Read of size 1 at addr fff00000c9a8bd00 by task kunit_try_catch/258
[   34.520692] 
[   34.520735] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.520846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.520876] Hardware name: linux,dummy-virt (DT)
[   34.520910] Call trace:
[   34.520937]  show_stack+0x20/0x38 (C)
[   34.520989]  dump_stack_lvl+0x8c/0xd0
[   34.521039]  print_report+0x118/0x5e8
[   34.521083]  kasan_report+0xdc/0x128
[   34.521125]  __asan_report_load1_noabort+0x20/0x30
[   34.521174]  mempool_uaf_helper+0x314/0x340
[   34.521221]  mempool_kmalloc_uaf+0xc4/0x120
[   34.521268]  kunit_try_run_case+0x170/0x3f0
[   34.521318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.521370]  kthread+0x328/0x630
[   34.521413]  ret_from_fork+0x10/0x20
[   34.521463] 
[   34.521482] Allocated by task 258:
[   34.521510]  kasan_save_stack+0x3c/0x68
[   34.521548]  kasan_save_track+0x20/0x40
[   34.521583]  kasan_save_alloc_info+0x40/0x58
[   34.521620]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.521662]  remove_element+0x130/0x1f8
[   34.521702]  mempool_alloc_preallocated+0x58/0xc0
[   34.521742]  mempool_uaf_helper+0xa4/0x340
[   34.521790]  mempool_kmalloc_uaf+0xc4/0x120
[   34.521829]  kunit_try_run_case+0x170/0x3f0
[   34.521865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.521908]  kthread+0x328/0x630
[   34.521940]  ret_from_fork+0x10/0x20
[   34.521976] 
[   34.521996] Freed by task 258:
[   34.522021]  kasan_save_stack+0x3c/0x68
[   34.522055]  kasan_save_track+0x20/0x40
[   34.522090]  kasan_save_free_info+0x4c/0x78
[   34.522133]  __kasan_mempool_poison_object+0xc0/0x150
[   34.522174]  mempool_free+0x3f4/0x5f0
[   34.522209]  mempool_uaf_helper+0x104/0x340
[   34.522247]  mempool_kmalloc_uaf+0xc4/0x120
[   34.522286]  kunit_try_run_case+0x170/0x3f0
[   34.522322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.522365]  kthread+0x328/0x630
[   34.522397]  ret_from_fork+0x10/0x20
[   34.522433] 
[   34.522452] The buggy address belongs to the object at fff00000c9a8bd00
[   34.522452]  which belongs to the cache kmalloc-128 of size 128
[   34.522512] The buggy address is located 0 bytes inside of
[   34.522512]  freed 128-byte region [fff00000c9a8bd00, fff00000c9a8bd80)
[   34.522572] 
[   34.522594] The buggy address belongs to the physical page:
[   34.522634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   34.522691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.522743] page_type: f5(slab)
[   34.522795] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.522847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.522887] page dumped because: kasan: bad access detected
[   34.522919] 
[   34.522937] Memory state around the buggy address:
[   34.523087]  fff00000c9a8bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.523135]  fff00000c9a8bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.523179] >fff00000c9a8bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.523218]                    ^
[   34.523245]  fff00000c9a8bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.523290]  fff00000c9a8be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.523330] ==================================================================
[   34.585005] ==================================================================
[   34.585107] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   34.585186] Read of size 1 at addr fff00000c9b5e240 by task kunit_try_catch/262
[   34.585239] 
[   34.585283] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.585375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.585402] Hardware name: linux,dummy-virt (DT)
[   34.585438] Call trace:
[   34.585464]  show_stack+0x20/0x38 (C)
[   34.585516]  dump_stack_lvl+0x8c/0xd0
[   34.585568]  print_report+0x118/0x5e8
[   34.585612]  kasan_report+0xdc/0x128
[   34.585655]  __asan_report_load1_noabort+0x20/0x30
[   34.585704]  mempool_uaf_helper+0x314/0x340
[   34.585766]  mempool_slab_uaf+0xc0/0x118
[   34.585812]  kunit_try_run_case+0x170/0x3f0
[   34.585862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.585914]  kthread+0x328/0x630
[   34.585957]  ret_from_fork+0x10/0x20
[   34.586007] 
[   34.586026] Allocated by task 262:
[   34.586056]  kasan_save_stack+0x3c/0x68
[   34.586096]  kasan_save_track+0x20/0x40
[   34.586138]  kasan_save_alloc_info+0x40/0x58
[   34.586177]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.586220]  remove_element+0x16c/0x1f8
[   34.586259]  mempool_alloc_preallocated+0x58/0xc0
[   34.586301]  mempool_uaf_helper+0xa4/0x340
[   34.586341]  mempool_slab_uaf+0xc0/0x118
[   34.586379]  kunit_try_run_case+0x170/0x3f0
[   34.586417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.586461]  kthread+0x328/0x630
[   34.586493]  ret_from_fork+0x10/0x20
[   34.586530] 
[   34.586550] Freed by task 262:
[   34.586577]  kasan_save_stack+0x3c/0x68
[   34.586613]  kasan_save_track+0x20/0x40
[   34.586647]  kasan_save_free_info+0x4c/0x78
[   34.586688]  __kasan_mempool_poison_object+0xc0/0x150
[   34.586729]  mempool_free+0x3f4/0x5f0
[   34.586773]  mempool_uaf_helper+0x104/0x340
[   34.586811]  mempool_slab_uaf+0xc0/0x118
[   34.586850]  kunit_try_run_case+0x170/0x3f0
[   34.586888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.586929]  kthread+0x328/0x630
[   34.586982]  ret_from_fork+0x10/0x20
[   34.587017] 
[   34.587037] The buggy address belongs to the object at fff00000c9b5e240
[   34.587037]  which belongs to the cache test_cache of size 123
[   34.587096] The buggy address is located 0 bytes inside of
[   34.587096]  freed 123-byte region [fff00000c9b5e240, fff00000c9b5e2bb)
[   34.587157] 
[   34.587180] The buggy address belongs to the physical page:
[   34.587236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b5e
[   34.587294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.587347] page_type: f5(slab)
[   34.587391] raw: 0bfffe0000000000 fff00000ffee4f00 dead000000000122 0000000000000000
[   34.587441] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.587483] page dumped because: kasan: bad access detected
[   34.587516] 
[   34.587534] Memory state around the buggy address:
[   34.587568]  fff00000c9b5e100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.587613]  fff00000c9b5e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.587656] >fff00000c9b5e200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   34.587694]                                            ^
[   34.587730]  fff00000c9b5e280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.587788]  fff00000c9b5e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.587827] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   34.454730] ==================================================================
[   34.454942] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.455026] Read of size 1 at addr fff00000c9b6d2bb by task kunit_try_catch/256
[   34.455077] 
[   34.455117] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.455209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.455236] Hardware name: linux,dummy-virt (DT)
[   34.455270] Call trace:
[   34.455296]  show_stack+0x20/0x38 (C)
[   34.455346]  dump_stack_lvl+0x8c/0xd0
[   34.455394]  print_report+0x118/0x5e8
[   34.455437]  kasan_report+0xdc/0x128
[   34.455480]  __asan_report_load1_noabort+0x20/0x30
[   34.455527]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.455631]  mempool_slab_oob_right+0xc0/0x118
[   34.455825]  kunit_try_run_case+0x170/0x3f0
[   34.455975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.456162]  kthread+0x328/0x630
[   34.456220]  ret_from_fork+0x10/0x20
[   34.456321] 
[   34.456354] Allocated by task 256:
[   34.456448]  kasan_save_stack+0x3c/0x68
[   34.456534]  kasan_save_track+0x20/0x40
[   34.456569]  kasan_save_alloc_info+0x40/0x58
[   34.457031]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.457206]  remove_element+0x16c/0x1f8
[   34.457493]  mempool_alloc_preallocated+0x58/0xc0
[   34.457725]  mempool_oob_right_helper+0x98/0x2f0
[   34.458105]  mempool_slab_oob_right+0xc0/0x118
[   34.458324]  kunit_try_run_case+0x170/0x3f0
[   34.458626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.458899]  kthread+0x328/0x630
[   34.459051]  ret_from_fork+0x10/0x20
[   34.459093] 
[   34.459116] The buggy address belongs to the object at fff00000c9b6d240
[   34.459116]  which belongs to the cache test_cache of size 123
[   34.459178] The buggy address is located 0 bytes to the right of
[   34.459178]  allocated 123-byte region [fff00000c9b6d240, fff00000c9b6d2bb)
[   34.459243] 
[   34.459266] The buggy address belongs to the physical page:
[   34.459826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b6d
[   34.459912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.459976] page_type: f5(slab)
[   34.460044] raw: 0bfffe0000000000 fff00000c58d7a00 dead000000000122 0000000000000000
[   34.460098] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.460180] page dumped because: kasan: bad access detected
[   34.460243] 
[   34.460262] Memory state around the buggy address:
[   34.460385]  fff00000c9b6d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.460443]  fff00000c9b6d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   34.460557] >fff00000c9b6d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   34.460601]                                         ^
[   34.460637]  fff00000c9b6d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.460679]  fff00000c9b6d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.460719] ==================================================================
[   34.417562] ==================================================================
[   34.417641] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.417716] Read of size 1 at addr fff00000c9a8b973 by task kunit_try_catch/252
[   34.417780] 
[   34.417824] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.417913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.417942] Hardware name: linux,dummy-virt (DT)
[   34.417974] Call trace:
[   34.418002]  show_stack+0x20/0x38 (C)
[   34.418055]  dump_stack_lvl+0x8c/0xd0
[   34.418103]  print_report+0x118/0x5e8
[   34.418152]  kasan_report+0xdc/0x128
[   34.418193]  __asan_report_load1_noabort+0x20/0x30
[   34.418242]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.418291]  mempool_kmalloc_oob_right+0xc4/0x120
[   34.418340]  kunit_try_run_case+0x170/0x3f0
[   34.418388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.418441]  kthread+0x328/0x630
[   34.418484]  ret_from_fork+0x10/0x20
[   34.418535] 
[   34.418553] Allocated by task 252:
[   34.418583]  kasan_save_stack+0x3c/0x68
[   34.418620]  kasan_save_track+0x20/0x40
[   34.418656]  kasan_save_alloc_info+0x40/0x58
[   34.418692]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.418733]  remove_element+0x130/0x1f8
[   34.418782]  mempool_alloc_preallocated+0x58/0xc0
[   34.418822]  mempool_oob_right_helper+0x98/0x2f0
[   34.418863]  mempool_kmalloc_oob_right+0xc4/0x120
[   34.418907]  kunit_try_run_case+0x170/0x3f0
[   34.418943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.419001]  kthread+0x328/0x630
[   34.419033]  ret_from_fork+0x10/0x20
[   34.419085] 
[   34.419112] The buggy address belongs to the object at fff00000c9a8b900
[   34.419112]  which belongs to the cache kmalloc-128 of size 128
[   34.419173] The buggy address is located 0 bytes to the right of
[   34.419173]  allocated 115-byte region [fff00000c9a8b900, fff00000c9a8b973)
[   34.419238] 
[   34.419258] The buggy address belongs to the physical page:
[   34.419300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   34.419358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.419411] page_type: f5(slab)
[   34.419455] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.419506] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.419548] page dumped because: kasan: bad access detected
[   34.419580] 
[   34.419598] Memory state around the buggy address:
[   34.419632]  fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.419678]  fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.419721] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.419773]                                                              ^
[   34.419814]  fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.419856]  fff00000c9a8ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.419895] ==================================================================
[   34.431697] ==================================================================
[   34.431787] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.431855] Read of size 1 at addr fff00000c9b72001 by task kunit_try_catch/254
[   34.431905] 
[   34.431944] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.432035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.432063] Hardware name: linux,dummy-virt (DT)
[   34.432096] Call trace:
[   34.432121]  show_stack+0x20/0x38 (C)
[   34.432171]  dump_stack_lvl+0x8c/0xd0
[   34.432217]  print_report+0x118/0x5e8
[   34.432260]  kasan_report+0xdc/0x128
[   34.432301]  __asan_report_load1_noabort+0x20/0x30
[   34.432348]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.432398]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   34.432448]  kunit_try_run_case+0x170/0x3f0
[   34.432495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.432546]  kthread+0x328/0x630
[   34.432589]  ret_from_fork+0x10/0x20
[   34.432637] 
[   34.432659] The buggy address belongs to the physical page:
[   34.432699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b70
[   34.432767] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.432815] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.432874] page_type: f8(unknown)
[   34.432916] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.433406] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.434034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.434372] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.434433] head: 0bfffe0000000002 ffffc1ffc326dc01 00000000ffffffff 00000000ffffffff
[   34.434483] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.434525] page dumped because: kasan: bad access detected
[   34.435191] 
[   34.435247] Memory state around the buggy address:
[   34.435474]  fff00000c9b71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.435527]  fff00000c9b71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.435582] >fff00000c9b72000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.435717]                    ^
[   34.436062]  fff00000c9b72080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.436305]  fff00000c9b72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.436606] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   33.850118] ==================================================================
[   33.850211] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   33.850291] Read of size 1 at addr fff00000c4565640 by task kunit_try_catch/246
[   33.850344] 
[   33.850390] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   33.850481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.850510] Hardware name: linux,dummy-virt (DT)
[   33.850543] Call trace:
[   33.850571]  show_stack+0x20/0x38 (C)
[   33.850624]  dump_stack_lvl+0x8c/0xd0
[   33.850674]  print_report+0x118/0x5e8
[   33.850719]  kasan_report+0xdc/0x128
[   33.850774]  __kasan_check_byte+0x54/0x70
[   33.850820]  kmem_cache_destroy+0x34/0x218
[   33.850868]  kmem_cache_double_destroy+0x174/0x300
[   33.850920]  kunit_try_run_case+0x170/0x3f0
[   33.850998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.851052]  kthread+0x328/0x630
[   33.851095]  ret_from_fork+0x10/0x20
[   33.851146] 
[   33.851165] Allocated by task 246:
[   33.851196]  kasan_save_stack+0x3c/0x68
[   33.851237]  kasan_save_track+0x20/0x40
[   33.851273]  kasan_save_alloc_info+0x40/0x58
[   33.851313]  __kasan_slab_alloc+0xa8/0xb0
[   33.851349]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.851392]  __kmem_cache_create_args+0x178/0x280
[   33.851433]  kmem_cache_double_destroy+0xc0/0x300
[   33.851475]  kunit_try_run_case+0x170/0x3f0
[   33.851511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.851556]  kthread+0x328/0x630
[   33.851588]  ret_from_fork+0x10/0x20
[   33.851625] 
[   33.851644] Freed by task 246:
[   33.851672]  kasan_save_stack+0x3c/0x68
[   33.851706]  kasan_save_track+0x20/0x40
[   33.851742]  kasan_save_free_info+0x4c/0x78
[   33.851789]  __kasan_slab_free+0x6c/0x98
[   33.851825]  kmem_cache_free+0x260/0x468
[   33.851863]  slab_kmem_cache_release+0x38/0x50
[   33.851904]  kmem_cache_release+0x1c/0x30
[   33.851942]  kobject_put+0x17c/0x420
[   33.851983]  sysfs_slab_release+0x1c/0x30
[   33.852018]  kmem_cache_destroy+0x118/0x218
[   33.852059]  kmem_cache_double_destroy+0x128/0x300
[   33.852099]  kunit_try_run_case+0x170/0x3f0
[   33.852135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.852179]  kthread+0x328/0x630
[   33.852213]  ret_from_fork+0x10/0x20
[   33.852250] 
[   33.852270] The buggy address belongs to the object at fff00000c4565640
[   33.852270]  which belongs to the cache kmem_cache of size 208
[   33.852330] The buggy address is located 0 bytes inside of
[   33.852330]  freed 208-byte region [fff00000c4565640, fff00000c4565710)
[   33.852392] 
[   33.852414] The buggy address belongs to the physical page:
[   33.852457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104565
[   33.852516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.852571] page_type: f5(slab)
[   33.852618] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122
[   33.852670] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   33.852713] page dumped because: kasan: bad access detected
[   33.852755] 
[   33.852775] Memory state around the buggy address:
[   33.852811]  fff00000c4565500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.852857]  fff00000c4565580: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[   33.852901] >fff00000c4565600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   33.852941]                                            ^
[   33.852975]  fff00000c4565680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.853018]  fff00000c4565700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.853055] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   33.779417] ==================================================================
[   33.779553] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   33.779642] Read of size 1 at addr fff00000c9a96000 by task kunit_try_catch/244
[   33.779697] 
[   33.779742] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   33.779852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.779881] Hardware name: linux,dummy-virt (DT)
[   33.779917] Call trace:
[   33.779942]  show_stack+0x20/0x38 (C)
[   33.779995]  dump_stack_lvl+0x8c/0xd0
[   33.780046]  print_report+0x118/0x5e8
[   33.780091]  kasan_report+0xdc/0x128
[   33.780135]  __asan_report_load1_noabort+0x20/0x30
[   33.780184]  kmem_cache_rcu_uaf+0x388/0x468
[   33.780233]  kunit_try_run_case+0x170/0x3f0
[   33.780283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.780337]  kthread+0x328/0x630
[   33.780382]  ret_from_fork+0x10/0x20
[   33.780435] 
[   33.780453] Allocated by task 244:
[   33.780484]  kasan_save_stack+0x3c/0x68
[   33.780523]  kasan_save_track+0x20/0x40
[   33.780559]  kasan_save_alloc_info+0x40/0x58
[   33.780595]  __kasan_slab_alloc+0xa8/0xb0
[   33.780632]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.780675]  kmem_cache_rcu_uaf+0x12c/0x468
[   33.780715]  kunit_try_run_case+0x170/0x3f0
[   33.780760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.780803]  kthread+0x328/0x630
[   33.780835]  ret_from_fork+0x10/0x20
[   33.780872] 
[   33.780890] Freed by task 0:
[   33.780919]  kasan_save_stack+0x3c/0x68
[   33.780954]  kasan_save_track+0x20/0x40
[   33.780989]  kasan_save_free_info+0x4c/0x78
[   33.781025]  __kasan_slab_free+0x6c/0x98
[   33.781062]  slab_free_after_rcu_debug+0xd4/0x2f8
[   33.781102]  rcu_core+0x9f4/0x1e58
[   33.781141]  rcu_core_si+0x18/0x30
[   33.781176]  handle_softirqs+0x374/0xb28
[   33.781214]  __do_softirq+0x1c/0x28
[   33.781248] 
[   33.781267] Last potentially related work creation:
[   33.781295]  kasan_save_stack+0x3c/0x68
[   33.781330]  kasan_record_aux_stack+0xb4/0xc8
[   33.781369]  kmem_cache_free+0x120/0x468
[   33.781407]  kmem_cache_rcu_uaf+0x16c/0x468
[   33.781445]  kunit_try_run_case+0x170/0x3f0
[   33.781482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.781523]  kthread+0x328/0x630
[   33.781556]  ret_from_fork+0x10/0x20
[   33.781591] 
[   33.781611] The buggy address belongs to the object at fff00000c9a96000
[   33.781611]  which belongs to the cache test_cache of size 200
[   33.781669] The buggy address is located 0 bytes inside of
[   33.781669]  freed 200-byte region [fff00000c9a96000, fff00000c9a960c8)
[   33.781732] 
[   33.781764] The buggy address belongs to the physical page:
[   33.781806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a96
[   33.781863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.781918] page_type: f5(slab)
[   33.781961] raw: 0bfffe0000000000 fff00000c58d78c0 dead000000000122 0000000000000000
[   33.782012] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.782054] page dumped because: kasan: bad access detected
[   33.782086] 
[   33.782106] Memory state around the buggy address:
[   33.782146]  fff00000c9a95f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.782192]  fff00000c9a95f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.782238] >fff00000c9a96000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.782278]                    ^
[   33.782307]  fff00000c9a96080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.782352]  fff00000c9a96100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.782393] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   33.262196] ==================================================================
[   33.262281] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   33.263225] Free of addr fff00000c9a95001 by task kunit_try_catch/242
[   33.263907] 
[   33.263957] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   33.264221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.264295] Hardware name: linux,dummy-virt (DT)
[   33.264692] Call trace:
[   33.265096]  show_stack+0x20/0x38 (C)
[   33.265504]  dump_stack_lvl+0x8c/0xd0
[   33.265967]  print_report+0x118/0x5e8
[   33.266733]  kasan_report_invalid_free+0xc0/0xe8
[   33.266808]  check_slab_allocation+0xfc/0x108
[   33.266855]  __kasan_slab_pre_free+0x2c/0x48
[   33.266910]  kmem_cache_free+0xf0/0x468
[   33.267120]  kmem_cache_invalid_free+0x184/0x3c8
[   33.267174]  kunit_try_run_case+0x170/0x3f0
[   33.267234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.267626]  kthread+0x328/0x630
[   33.267803]  ret_from_fork+0x10/0x20
[   33.267866] 
[   33.267889] Allocated by task 242:
[   33.268087]  kasan_save_stack+0x3c/0x68
[   33.268135]  kasan_save_track+0x20/0x40
[   33.268171]  kasan_save_alloc_info+0x40/0x58
[   33.268244]  __kasan_slab_alloc+0xa8/0xb0
[   33.268514]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.268736]  kmem_cache_invalid_free+0x12c/0x3c8
[   33.268796]  kunit_try_run_case+0x170/0x3f0
[   33.269084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.269398]  kthread+0x328/0x630
[   33.269546]  ret_from_fork+0x10/0x20
[   33.269731] 
[   33.269766] The buggy address belongs to the object at fff00000c9a95000
[   33.269766]  which belongs to the cache test_cache of size 200
[   33.269828] The buggy address is located 1 bytes inside of
[   33.269828]  200-byte region [fff00000c9a95000, fff00000c9a950c8)
[   33.269890] 
[   33.269913] The buggy address belongs to the physical page:
[   33.269957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95
[   33.270248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.270524] page_type: f5(slab)
[   33.270759] raw: 0bfffe0000000000 fff00000c58d7780 dead000000000122 0000000000000000
[   33.270867] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.271229] page dumped because: kasan: bad access detected
[   33.271366] 
[   33.271386] Memory state around the buggy address:
[   33.271423]  fff00000c9a94f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.271898]  fff00000c9a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.272018] >fff00000c9a95000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.272059]                    ^
[   33.272352]  fff00000c9a95080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.272672]  fff00000c9a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.272790] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   33.200413] ==================================================================
[   33.200889] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   33.200964] Free of addr fff00000c9a94000 by task kunit_try_catch/240
[   33.201026] 
[   33.201148] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   33.201595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.201669] Hardware name: linux,dummy-virt (DT)
[   33.201734] Call trace:
[   33.201884]  show_stack+0x20/0x38 (C)
[   33.202081]  dump_stack_lvl+0x8c/0xd0
[   33.202247]  print_report+0x118/0x5e8
[   33.202803]  kasan_report_invalid_free+0xc0/0xe8
[   33.203646]  check_slab_allocation+0xd4/0x108
[   33.203710]  __kasan_slab_pre_free+0x2c/0x48
[   33.203772]  kmem_cache_free+0xf0/0x468
[   33.203825]  kmem_cache_double_free+0x190/0x3c8
[   33.203896]  kunit_try_run_case+0x170/0x3f0
[   33.203948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.204001]  kthread+0x328/0x630
[   33.204047]  ret_from_fork+0x10/0x20
[   33.204921] 
[   33.205255] Allocated by task 240:
[   33.205292]  kasan_save_stack+0x3c/0x68
[   33.205685]  kasan_save_track+0x20/0x40
[   33.206037]  kasan_save_alloc_info+0x40/0x58
[   33.206223]  __kasan_slab_alloc+0xa8/0xb0
[   33.206549]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.206763]  kmem_cache_double_free+0x12c/0x3c8
[   33.206812]  kunit_try_run_case+0x170/0x3f0
[   33.206848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.206891]  kthread+0x328/0x630
[   33.206923]  ret_from_fork+0x10/0x20
[   33.207004] 
[   33.207024] Freed by task 240:
[   33.207054]  kasan_save_stack+0x3c/0x68
[   33.207089]  kasan_save_track+0x20/0x40
[   33.207124]  kasan_save_free_info+0x4c/0x78
[   33.207286]  __kasan_slab_free+0x6c/0x98
[   33.207505]  kmem_cache_free+0x260/0x468
[   33.207550]  kmem_cache_double_free+0x140/0x3c8
[   33.207592]  kunit_try_run_case+0x170/0x3f0
[   33.207627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.207715]  kthread+0x328/0x630
[   33.207780]  ret_from_fork+0x10/0x20
[   33.207823] 
[   33.207926] The buggy address belongs to the object at fff00000c9a94000
[   33.207926]  which belongs to the cache test_cache of size 200
[   33.208154] The buggy address is located 0 bytes inside of
[   33.208154]  200-byte region [fff00000c9a94000, fff00000c9a940c8)
[   33.208231] 
[   33.208257] The buggy address belongs to the physical page:
[   33.208579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94
[   33.208831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.209372] page_type: f5(slab)
[   33.209534] raw: 0bfffe0000000000 fff00000c58d7640 dead000000000122 0000000000000000
[   33.209597] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.209638] page dumped because: kasan: bad access detected
[   33.209998] 
[   33.210020] Memory state around the buggy address:
[   33.210059]  fff00000c9a93f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.210106]  fff00000c9a93f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.210493] >fff00000c9a94000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.210539]                    ^
[   33.210568]  fff00000c9a94080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.210819]  fff00000c9a94100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.210861] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   33.012513] ==================================================================
[   33.012594] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   33.012664] Read of size 1 at addr fff00000c9a940c8 by task kunit_try_catch/238
[   33.012713] 
[   33.013289] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   33.013398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.013425] Hardware name: linux,dummy-virt (DT)
[   33.014035] Call trace:
[   33.014089]  show_stack+0x20/0x38 (C)
[   33.014209]  dump_stack_lvl+0x8c/0xd0
[   33.014261]  print_report+0x118/0x5e8
[   33.014308]  kasan_report+0xdc/0x128
[   33.014352]  __asan_report_load1_noabort+0x20/0x30
[   33.014466]  kmem_cache_oob+0x344/0x430
[   33.014513]  kunit_try_run_case+0x170/0x3f0
[   33.014612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.014677]  kthread+0x328/0x630
[   33.014959]  ret_from_fork+0x10/0x20
[   33.015291] 
[   33.015358] Allocated by task 238:
[   33.015494]  kasan_save_stack+0x3c/0x68
[   33.015596]  kasan_save_track+0x20/0x40
[   33.015666]  kasan_save_alloc_info+0x40/0x58
[   33.015845]  __kasan_slab_alloc+0xa8/0xb0
[   33.015889]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.015931]  kmem_cache_oob+0x12c/0x430
[   33.015983]  kunit_try_run_case+0x170/0x3f0
[   33.016023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.016448]  kthread+0x328/0x630
[   33.016583]  ret_from_fork+0x10/0x20
[   33.016671] 
[   33.016836] The buggy address belongs to the object at fff00000c9a94000
[   33.016836]  which belongs to the cache test_cache of size 200
[   33.017006] The buggy address is located 0 bytes to the right of
[   33.017006]  allocated 200-byte region [fff00000c9a94000, fff00000c9a940c8)
[   33.017115] 
[   33.017380] The buggy address belongs to the physical page:
[   33.017559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94
[   33.017755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.017905] page_type: f5(slab)
[   33.018004] raw: 0bfffe0000000000 fff00000c58d7500 dead000000000122 0000000000000000
[   33.018316] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.018485] page dumped because: kasan: bad access detected
[   33.018586] 
[   33.018662] Memory state around the buggy address:
[   33.018742]  fff00000c9a93f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.018896]  fff00000c9a94000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.019070] >fff00000c9a94080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.019136]                                               ^
[   33.019181]  fff00000c9a94100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.019224]  fff00000c9a94180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.019265] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   32.973089] ==================================================================
[   32.973170] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   32.973236] Read of size 8 at addr fff00000c9a90600 by task kunit_try_catch/231
[   32.973319] 
[   32.973359] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.973995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.974068] Hardware name: linux,dummy-virt (DT)
[   32.974116] Call trace:
[   32.974144]  show_stack+0x20/0x38 (C)
[   32.974198]  dump_stack_lvl+0x8c/0xd0
[   32.974245]  print_report+0x118/0x5e8
[   32.974386]  kasan_report+0xdc/0x128
[   32.974454]  __asan_report_load8_noabort+0x20/0x30
[   32.974505]  workqueue_uaf+0x480/0x4a8
[   32.974636]  kunit_try_run_case+0x170/0x3f0
[   32.974714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.974836]  kthread+0x328/0x630
[   32.974898]  ret_from_fork+0x10/0x20
[   32.975304] 
[   32.975343] Allocated by task 231:
[   32.975383]  kasan_save_stack+0x3c/0x68
[   32.975510]  kasan_save_track+0x20/0x40
[   32.975597]  kasan_save_alloc_info+0x40/0x58
[   32.975720]  __kasan_kmalloc+0xd4/0xd8
[   32.975828]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.975907]  workqueue_uaf+0x13c/0x4a8
[   32.975946]  kunit_try_run_case+0x170/0x3f0
[   32.975985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.976327]  kthread+0x328/0x630
[   32.976468]  ret_from_fork+0x10/0x20
[   32.976567] 
[   32.976679] Freed by task 75:
[   32.976803]  kasan_save_stack+0x3c/0x68
[   32.976855]  kasan_save_track+0x20/0x40
[   32.976941]  kasan_save_free_info+0x4c/0x78
[   32.976981]  __kasan_slab_free+0x6c/0x98
[   32.977016]  kfree+0x214/0x3c8
[   32.977053]  workqueue_uaf_work+0x18/0x30
[   32.977090]  process_one_work+0x530/0xf88
[   32.977156]  worker_thread+0x618/0xf38
[   32.977192]  kthread+0x328/0x630
[   32.977227]  ret_from_fork+0x10/0x20
[   32.977271] 
[   32.977292] Last potentially related work creation:
[   32.977318]  kasan_save_stack+0x3c/0x68
[   32.977365]  kasan_record_aux_stack+0xb4/0xc8
[   32.977411]  __queue_work+0x65c/0xfe0
[   32.977448]  queue_work_on+0xbc/0xf8
[   32.977482]  workqueue_uaf+0x210/0x4a8
[   32.977520]  kunit_try_run_case+0x170/0x3f0
[   32.977567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.977612]  kthread+0x328/0x630
[   32.977654]  ret_from_fork+0x10/0x20
[   32.977691] 
[   32.977713] The buggy address belongs to the object at fff00000c9a90600
[   32.977713]  which belongs to the cache kmalloc-32 of size 32
[   32.977784] The buggy address is located 0 bytes inside of
[   32.977784]  freed 32-byte region [fff00000c9a90600, fff00000c9a90620)
[   32.977856] 
[   32.977890] The buggy address belongs to the physical page:
[   32.977937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a90
[   32.978003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.978058] page_type: f5(slab)
[   32.978115] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.978167] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.978210] page dumped because: kasan: bad access detected
[   32.978243] 
[   32.978275] Memory state around the buggy address:
[   32.978309]  fff00000c9a90500: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.978369]  fff00000c9a90580: 00 00 00 07 fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.978422] >fff00000c9a90600: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.978462]                    ^
[   32.978491]  fff00000c9a90680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.978534]  fff00000c9a90700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.978584] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   32.957394] ==================================================================
[   32.957535] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   32.957606] Read of size 4 at addr fff00000c9a90400 by task swapper/0/0
[   32.957655] 
[   32.957701] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.957859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.957899] Hardware name: linux,dummy-virt (DT)
[   32.957935] Call trace:
[   32.957959]  show_stack+0x20/0x38 (C)
[   32.958010]  dump_stack_lvl+0x8c/0xd0
[   32.958055]  print_report+0x118/0x5e8
[   32.958098]  kasan_report+0xdc/0x128
[   32.958153]  __asan_report_load4_noabort+0x20/0x30
[   32.958202]  rcu_uaf_reclaim+0x64/0x70
[   32.958255]  rcu_core+0x9f4/0x1e58
[   32.958307]  rcu_core_si+0x18/0x30
[   32.958351]  handle_softirqs+0x374/0xb28
[   32.958398]  __do_softirq+0x1c/0x28
[   32.958444]  ____do_softirq+0x18/0x30
[   32.958496]  call_on_irq_stack+0x30/0x48
[   32.958542]  do_softirq_own_stack+0x24/0x38
[   32.958587]  __irq_exit_rcu+0x1fc/0x318
[   32.958639]  irq_exit_rcu+0x1c/0x80
[   32.958695]  el1_interrupt+0x38/0x58
[   32.958742]  el1h_64_irq_handler+0x18/0x28
[   32.958800]  el1h_64_irq+0x6c/0x70
[   32.958897]  arch_local_irq_enable+0x4/0x8 (P)
[   32.958951]  do_idle+0x384/0x4e8
[   32.958995]  cpu_startup_entry+0x68/0x80
[   32.959041]  rest_init+0x160/0x188
[   32.959086]  start_kernel+0x30c/0x3d0
[   32.959136]  __primary_switched+0x8c/0xa0
[   32.959199] 
[   32.959220] Allocated by task 229:
[   32.959249]  kasan_save_stack+0x3c/0x68
[   32.959289]  kasan_save_track+0x20/0x40
[   32.959334]  kasan_save_alloc_info+0x40/0x58
[   32.959374]  __kasan_kmalloc+0xd4/0xd8
[   32.959410]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.959451]  rcu_uaf+0xb0/0x2d8
[   32.959486]  kunit_try_run_case+0x170/0x3f0
[   32.959535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.959587]  kthread+0x328/0x630
[   32.959623]  ret_from_fork+0x10/0x20
[   32.959658] 
[   32.959687] Freed by task 0:
[   32.959720]  kasan_save_stack+0x3c/0x68
[   32.960666]  kasan_save_track+0x20/0x40
[   32.960818]  kasan_save_free_info+0x4c/0x78
[   32.960882]  __kasan_slab_free+0x6c/0x98
[   32.960919]  kfree+0x214/0x3c8
[   32.961027]  rcu_uaf_reclaim+0x28/0x70
[   32.961151]  rcu_core+0x9f4/0x1e58
[   32.961251]  rcu_core_si+0x18/0x30
[   32.961297]  handle_softirqs+0x374/0xb28
[   32.961360]  __do_softirq+0x1c/0x28
[   32.961439] 
[   32.961481] Last potentially related work creation:
[   32.961569]  kasan_save_stack+0x3c/0x68
[   32.961708]  kasan_record_aux_stack+0xb4/0xc8
[   32.961778]  __call_rcu_common.constprop.0+0x74/0x8c8
[   32.961820]  call_rcu+0x18/0x30
[   32.961854]  rcu_uaf+0x14c/0x2d8
[   32.961888]  kunit_try_run_case+0x170/0x3f0
[   32.961925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.961968]  kthread+0x328/0x630
[   32.962000]  ret_from_fork+0x10/0x20
[   32.962041] 
[   32.962068] The buggy address belongs to the object at fff00000c9a90400
[   32.962068]  which belongs to the cache kmalloc-32 of size 32
[   32.962133] The buggy address is located 0 bytes inside of
[   32.962133]  freed 32-byte region [fff00000c9a90400, fff00000c9a90420)
[   32.962194] 
[   32.962215] The buggy address belongs to the physical page:
[   32.962279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a90
[   32.962336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.962389] page_type: f5(slab)
[   32.962432] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.962559] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.962708] page dumped because: kasan: bad access detected
[   32.962761] 
[   32.962779] Memory state around the buggy address:
[   32.963140]  fff00000c9a90300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.963195]  fff00000c9a90380: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.963363] >fff00000c9a90400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   32.963476]                    ^
[   32.963526]  fff00000c9a90480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.963626]  fff00000c9a90500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.963715] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   32.793125] ==================================================================
[   32.793184] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   32.793238] Read of size 1 at addr fff00000c9a8b600 by task kunit_try_catch/227
[   32.793680] 
[   32.793726] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.793831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.793860] Hardware name: linux,dummy-virt (DT)
[   32.794242] Call trace:
[   32.794292]  show_stack+0x20/0x38 (C)
[   32.794391]  dump_stack_lvl+0x8c/0xd0
[   32.794439]  print_report+0x118/0x5e8
[   32.794494]  kasan_report+0xdc/0x128
[   32.794537]  __asan_report_load1_noabort+0x20/0x30
[   32.794586]  ksize_uaf+0x598/0x5f8
[   32.794629]  kunit_try_run_case+0x170/0x3f0
[   32.794683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.794737]  kthread+0x328/0x630
[   32.794788]  ret_from_fork+0x10/0x20
[   32.794836] 
[   32.794855] Allocated by task 227:
[   32.794892]  kasan_save_stack+0x3c/0x68
[   32.794931]  kasan_save_track+0x20/0x40
[   32.795392]  kasan_save_alloc_info+0x40/0x58
[   32.795567]  __kasan_kmalloc+0xd4/0xd8
[   32.795638]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.795819]  ksize_uaf+0xb8/0x5f8
[   32.795898]  kunit_try_run_case+0x170/0x3f0
[   32.796054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.796129]  kthread+0x328/0x630
[   32.796349]  ret_from_fork+0x10/0x20
[   32.796972] 
[   32.797271] Freed by task 227:
[   32.797350]  kasan_save_stack+0x3c/0x68
[   32.797421]  kasan_save_track+0x20/0x40
[   32.797488]  kasan_save_free_info+0x4c/0x78
[   32.797849]  __kasan_slab_free+0x6c/0x98
[   32.798314]  kfree+0x214/0x3c8
[   32.798398]  ksize_uaf+0x11c/0x5f8
[   32.798666]  kunit_try_run_case+0x170/0x3f0
[   32.798730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.799138]  kthread+0x328/0x630
[   32.799191]  ret_from_fork+0x10/0x20
[   32.799229] 
[   32.799250] The buggy address belongs to the object at fff00000c9a8b600
[   32.799250]  which belongs to the cache kmalloc-128 of size 128
[   32.799860] The buggy address is located 0 bytes inside of
[   32.799860]  freed 128-byte region [fff00000c9a8b600, fff00000c9a8b680)
[   32.799998] 
[   32.800093] The buggy address belongs to the physical page:
[   32.800179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.800305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.800382] page_type: f5(slab)
[   32.800473] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.800563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.800865] page dumped because: kasan: bad access detected
[   32.801050] 
[   32.801123] Memory state around the buggy address:
[   32.801535]  fff00000c9a8b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.801694]  fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.801829] >fff00000c9a8b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.801871]                    ^
[   32.801919]  fff00000c9a8b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.802135]  fff00000c9a8b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.802181] ==================================================================
[   32.805233] ==================================================================
[   32.805638] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   32.805765] Read of size 1 at addr fff00000c9a8b678 by task kunit_try_catch/227
[   32.805839] 
[   32.805896] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.805993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.806021] Hardware name: linux,dummy-virt (DT)
[   32.806340] Call trace:
[   32.806384]  show_stack+0x20/0x38 (C)
[   32.806435]  dump_stack_lvl+0x8c/0xd0
[   32.806482]  print_report+0x118/0x5e8
[   32.806776]  kasan_report+0xdc/0x128
[   32.807143]  __asan_report_load1_noabort+0x20/0x30
[   32.807275]  ksize_uaf+0x544/0x5f8
[   32.807380]  kunit_try_run_case+0x170/0x3f0
[   32.808040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.808142]  kthread+0x328/0x630
[   32.808283]  ret_from_fork+0x10/0x20
[   32.808400] 
[   32.808458] Allocated by task 227:
[   32.808488]  kasan_save_stack+0x3c/0x68
[   32.808566]  kasan_save_track+0x20/0x40
[   32.808894]  kasan_save_alloc_info+0x40/0x58
[   32.809039]  __kasan_kmalloc+0xd4/0xd8
[   32.809128]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.809279]  ksize_uaf+0xb8/0x5f8
[   32.809377]  kunit_try_run_case+0x170/0x3f0
[   32.809635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.809793]  kthread+0x328/0x630
[   32.810053]  ret_from_fork+0x10/0x20
[   32.810154] 
[   32.810209] Freed by task 227:
[   32.810294]  kasan_save_stack+0x3c/0x68
[   32.810344]  kasan_save_track+0x20/0x40
[   32.810418]  kasan_save_free_info+0x4c/0x78
[   32.810457]  __kasan_slab_free+0x6c/0x98
[   32.810869]  kfree+0x214/0x3c8
[   32.810992]  ksize_uaf+0x11c/0x5f8
[   32.811126]  kunit_try_run_case+0x170/0x3f0
[   32.811261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.811360]  kthread+0x328/0x630
[   32.811602]  ret_from_fork+0x10/0x20
[   32.811795] 
[   32.811882] The buggy address belongs to the object at fff00000c9a8b600
[   32.811882]  which belongs to the cache kmalloc-128 of size 128
[   32.811957] The buggy address is located 120 bytes inside of
[   32.811957]  freed 128-byte region [fff00000c9a8b600, fff00000c9a8b680)
[   32.812190] 
[   32.812786] The buggy address belongs to the physical page:
[   32.812830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.812887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.812935] page_type: f5(slab)
[   32.812973] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.813026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.813067] page dumped because: kasan: bad access detected
[   32.813099] 
[   32.813118] Memory state around the buggy address:
[   32.813150]  fff00000c9a8b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.813196]  fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.813237] >fff00000c9a8b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.813275]                                                                 ^
[   32.813316]  fff00000c9a8b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.813357]  fff00000c9a8b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.813396] ==================================================================
[   32.781213] ==================================================================
[   32.781338] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   32.781446] Read of size 1 at addr fff00000c9a8b600 by task kunit_try_catch/227
[   32.781767] 
[   32.781814] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.781912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.781940] Hardware name: linux,dummy-virt (DT)
[   32.782096] Call trace:
[   32.782136]  show_stack+0x20/0x38 (C)
[   32.782190]  dump_stack_lvl+0x8c/0xd0
[   32.782235]  print_report+0x118/0x5e8
[   32.782413]  kasan_report+0xdc/0x128
[   32.782759]  __kasan_check_byte+0x54/0x70
[   32.782831]  ksize+0x30/0x88
[   32.782875]  ksize_uaf+0x168/0x5f8
[   32.783228]  kunit_try_run_case+0x170/0x3f0
[   32.783317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.783450]  kthread+0x328/0x630
[   32.783546]  ret_from_fork+0x10/0x20
[   32.783663] 
[   32.783714] Allocated by task 227:
[   32.783815]  kasan_save_stack+0x3c/0x68
[   32.783856]  kasan_save_track+0x20/0x40
[   32.783919]  kasan_save_alloc_info+0x40/0x58
[   32.783963]  __kasan_kmalloc+0xd4/0xd8
[   32.784386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.784528]  ksize_uaf+0xb8/0x5f8
[   32.784645]  kunit_try_run_case+0x170/0x3f0
[   32.784803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.784901]  kthread+0x328/0x630
[   32.784951]  ret_from_fork+0x10/0x20
[   32.784989] 
[   32.785264] Freed by task 227:
[   32.785420]  kasan_save_stack+0x3c/0x68
[   32.785561]  kasan_save_track+0x20/0x40
[   32.785626]  kasan_save_free_info+0x4c/0x78
[   32.785781]  __kasan_slab_free+0x6c/0x98
[   32.785881]  kfree+0x214/0x3c8
[   32.786155]  ksize_uaf+0x11c/0x5f8
[   32.786328]  kunit_try_run_case+0x170/0x3f0
[   32.786390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.786565]  kthread+0x328/0x630
[   32.786642]  ret_from_fork+0x10/0x20
[   32.786793] 
[   32.786873] The buggy address belongs to the object at fff00000c9a8b600
[   32.786873]  which belongs to the cache kmalloc-128 of size 128
[   32.787084] The buggy address is located 0 bytes inside of
[   32.787084]  freed 128-byte region [fff00000c9a8b600, fff00000c9a8b680)
[   32.787155] 
[   32.787178] The buggy address belongs to the physical page:
[   32.787459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.787531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.787659] page_type: f5(slab)
[   32.787725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.787849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.787938] page dumped because: kasan: bad access detected
[   32.788061] 
[   32.788094] Memory state around the buggy address:
[   32.788154]  fff00000c9a8b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.788370]  fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.788621] >fff00000c9a8b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.788720]                    ^
[   32.788820]  fff00000c9a8b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.788908]  fff00000c9a8b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.788989] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   32.745403] ==================================================================
[   32.745501] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   32.745575] Read of size 1 at addr fff00000c9a8b573 by task kunit_try_catch/225
[   32.745628] 
[   32.745666] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.745768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.745805] Hardware name: linux,dummy-virt (DT)
[   32.745840] Call trace:
[   32.745866]  show_stack+0x20/0x38 (C)
[   32.745918]  dump_stack_lvl+0x8c/0xd0
[   32.745965]  print_report+0x118/0x5e8
[   32.746008]  kasan_report+0xdc/0x128
[   32.746049]  __asan_report_load1_noabort+0x20/0x30
[   32.746097]  ksize_unpoisons_memory+0x628/0x740
[   32.746157]  kunit_try_run_case+0x170/0x3f0
[   32.746205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.746266]  kthread+0x328/0x630
[   32.746308]  ret_from_fork+0x10/0x20
[   32.746364] 
[   32.746383] Allocated by task 225:
[   32.746420]  kasan_save_stack+0x3c/0x68
[   32.746457]  kasan_save_track+0x20/0x40
[   32.746491]  kasan_save_alloc_info+0x40/0x58
[   32.746527]  __kasan_kmalloc+0xd4/0xd8
[   32.746570]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.746614]  ksize_unpoisons_memory+0xc0/0x740
[   32.746651]  kunit_try_run_case+0x170/0x3f0
[   32.746696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.746744]  kthread+0x328/0x630
[   32.746787]  ret_from_fork+0x10/0x20
[   32.746822] 
[   32.746840] The buggy address belongs to the object at fff00000c9a8b500
[   32.746840]  which belongs to the cache kmalloc-128 of size 128
[   32.747873] The buggy address is located 0 bytes to the right of
[   32.747873]  allocated 115-byte region [fff00000c9a8b500, fff00000c9a8b573)
[   32.747972] 
[   32.748003] The buggy address belongs to the physical page:
[   32.748069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.748647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.748763] page_type: f5(slab)
[   32.748933] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.749014] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.749234] page dumped because: kasan: bad access detected
[   32.749646] 
[   32.749885] Memory state around the buggy address:
[   32.749974]  fff00000c9a8b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.750298]  fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.750455] >fff00000c9a8b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.750547]                                                              ^
[   32.750709]  fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.750814]  fff00000c9a8b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.750937] ==================================================================
[   32.764089] ==================================================================
[   32.764143] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   32.764421] Read of size 1 at addr fff00000c9a8b57f by task kunit_try_catch/225
[   32.764696] 
[   32.764760] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.764851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.764879] Hardware name: linux,dummy-virt (DT)
[   32.764916] Call trace:
[   32.765114]  show_stack+0x20/0x38 (C)
[   32.765405]  dump_stack_lvl+0x8c/0xd0
[   32.765479]  print_report+0x118/0x5e8
[   32.765555]  kasan_report+0xdc/0x128
[   32.765599]  __asan_report_load1_noabort+0x20/0x30
[   32.765823]  ksize_unpoisons_memory+0x690/0x740
[   32.765878]  kunit_try_run_case+0x170/0x3f0
[   32.766021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.766257]  kthread+0x328/0x630
[   32.766333]  ret_from_fork+0x10/0x20
[   32.766399] 
[   32.766480] Allocated by task 225:
[   32.766509]  kasan_save_stack+0x3c/0x68
[   32.766549]  kasan_save_track+0x20/0x40
[   32.766583]  kasan_save_alloc_info+0x40/0x58
[   32.766636]  __kasan_kmalloc+0xd4/0xd8
[   32.766672]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.766940]  ksize_unpoisons_memory+0xc0/0x740
[   32.767280]  kunit_try_run_case+0x170/0x3f0
[   32.767338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.767421]  kthread+0x328/0x630
[   32.767457]  ret_from_fork+0x10/0x20
[   32.767494] 
[   32.767514] The buggy address belongs to the object at fff00000c9a8b500
[   32.767514]  which belongs to the cache kmalloc-128 of size 128
[   32.767575] The buggy address is located 12 bytes to the right of
[   32.767575]  allocated 115-byte region [fff00000c9a8b500, fff00000c9a8b573)
[   32.767916] 
[   32.768052] The buggy address belongs to the physical page:
[   32.768094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.768426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.768487] page_type: f5(slab)
[   32.768528] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.768579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.768621] page dumped because: kasan: bad access detected
[   32.769219] 
[   32.769247] Memory state around the buggy address:
[   32.769282]  fff00000c9a8b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.769329]  fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.769382] >fff00000c9a8b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.769419]                                                                 ^
[   32.769462]  fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.769505]  fff00000c9a8b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.769553] ==================================================================
[   32.754701] ==================================================================
[   32.754981] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   32.755132] Read of size 1 at addr fff00000c9a8b578 by task kunit_try_catch/225
[   32.755368] 
[   32.755429] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.755843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.755918] Hardware name: linux,dummy-virt (DT)
[   32.756037] Call trace:
[   32.756134]  show_stack+0x20/0x38 (C)
[   32.756227]  dump_stack_lvl+0x8c/0xd0
[   32.756383]  print_report+0x118/0x5e8
[   32.756480]  kasan_report+0xdc/0x128
[   32.756822]  __asan_report_load1_noabort+0x20/0x30
[   32.757010]  ksize_unpoisons_memory+0x618/0x740
[   32.757149]  kunit_try_run_case+0x170/0x3f0
[   32.757289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.757524]  kthread+0x328/0x630
[   32.757735]  ret_from_fork+0x10/0x20
[   32.757946] 
[   32.758003] Allocated by task 225:
[   32.758134]  kasan_save_stack+0x3c/0x68
[   32.758224]  kasan_save_track+0x20/0x40
[   32.758784]  kasan_save_alloc_info+0x40/0x58
[   32.758868]  __kasan_kmalloc+0xd4/0xd8
[   32.759021]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.759132]  ksize_unpoisons_memory+0xc0/0x740
[   32.759265]  kunit_try_run_case+0x170/0x3f0
[   32.759364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.759567]  kthread+0x328/0x630
[   32.759838]  ret_from_fork+0x10/0x20
[   32.759900] 
[   32.759976] The buggy address belongs to the object at fff00000c9a8b500
[   32.759976]  which belongs to the cache kmalloc-128 of size 128
[   32.760111] The buggy address is located 5 bytes to the right of
[   32.760111]  allocated 115-byte region [fff00000c9a8b500, fff00000c9a8b573)
[   32.760290] 
[   32.760315] The buggy address belongs to the physical page:
[   32.760519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.760938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.761109] page_type: f5(slab)
[   32.761192] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.761451] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.761699] page dumped because: kasan: bad access detected
[   32.761798] 
[   32.761934] Memory state around the buggy address:
[   32.762023]  fff00000c9a8b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.762074]  fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.762312] >fff00000c9a8b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.762560]                                                                 ^
[   32.762714]  fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.762861]  fff00000c9a8b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.762928] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   32.722788] ==================================================================
[   32.722883] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   32.723115] Free of addr fff00000c8683500 by task kunit_try_catch/223
[   32.723236] 
[   32.723399] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.723569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.723659] Hardware name: linux,dummy-virt (DT)
[   32.723716] Call trace:
[   32.723828]  show_stack+0x20/0x38 (C)
[   32.723882]  dump_stack_lvl+0x8c/0xd0
[   32.723929]  print_report+0x118/0x5e8
[   32.723981]  kasan_report_invalid_free+0xc0/0xe8
[   32.724513]  check_slab_allocation+0xd4/0x108
[   32.724610]  __kasan_slab_pre_free+0x2c/0x48
[   32.724783]  kfree+0xe8/0x3c8
[   32.724898]  kfree_sensitive+0x3c/0xb0
[   32.725112]  kmalloc_double_kzfree+0x168/0x308
[   32.725439]  kunit_try_run_case+0x170/0x3f0
[   32.725537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.725679]  kthread+0x328/0x630
[   32.725797]  ret_from_fork+0x10/0x20
[   32.726239] 
[   32.726284] Allocated by task 223:
[   32.726394]  kasan_save_stack+0x3c/0x68
[   32.726485]  kasan_save_track+0x20/0x40
[   32.726785]  kasan_save_alloc_info+0x40/0x58
[   32.727017]  __kasan_kmalloc+0xd4/0xd8
[   32.727196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.727266]  kmalloc_double_kzfree+0xb8/0x308
[   32.727419]  kunit_try_run_case+0x170/0x3f0
[   32.727495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.727687]  kthread+0x328/0x630
[   32.727736]  ret_from_fork+0x10/0x20
[   32.727787] 
[   32.727807] Freed by task 223:
[   32.728192]  kasan_save_stack+0x3c/0x68
[   32.728319]  kasan_save_track+0x20/0x40
[   32.728397]  kasan_save_free_info+0x4c/0x78
[   32.728532]  __kasan_slab_free+0x6c/0x98
[   32.728567]  kfree+0x214/0x3c8
[   32.728603]  kfree_sensitive+0x80/0xb0
[   32.728648]  kmalloc_double_kzfree+0x11c/0x308
[   32.728688]  kunit_try_run_case+0x170/0x3f0
[   32.728726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.728779]  kthread+0x328/0x630
[   32.728811]  ret_from_fork+0x10/0x20
[   32.728847] 
[   32.728918] The buggy address belongs to the object at fff00000c8683500
[   32.728918]  which belongs to the cache kmalloc-16 of size 16
[   32.729015] The buggy address is located 0 bytes inside of
[   32.729015]  16-byte region [fff00000c8683500, fff00000c8683510)
[   32.729077] 
[   32.729098] The buggy address belongs to the physical page:
[   32.729143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683
[   32.729208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.729259] page_type: f5(slab)
[   32.729298] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.729360] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.729402] page dumped because: kasan: bad access detected
[   32.729433] 
[   32.729463] Memory state around the buggy address:
[   32.729496]  fff00000c8683400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.729541]  fff00000c8683480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.729585] >fff00000c8683500: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.729634]                    ^
[   32.729668]  fff00000c8683580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.729711]  fff00000c8683600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.729762] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   32.713735] ==================================================================
[   32.713849] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   32.714081] Read of size 1 at addr fff00000c8683500 by task kunit_try_catch/223
[   32.714272] 
[   32.714432] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.714614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.714651] Hardware name: linux,dummy-virt (DT)
[   32.714685] Call trace:
[   32.714712]  show_stack+0x20/0x38 (C)
[   32.714774]  dump_stack_lvl+0x8c/0xd0
[   32.715069]  print_report+0x118/0x5e8
[   32.715265]  kasan_report+0xdc/0x128
[   32.715346]  __kasan_check_byte+0x54/0x70
[   32.715516]  kfree_sensitive+0x30/0xb0
[   32.715586]  kmalloc_double_kzfree+0x168/0x308
[   32.715784]  kunit_try_run_case+0x170/0x3f0
[   32.716016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.716135]  kthread+0x328/0x630
[   32.716194]  ret_from_fork+0x10/0x20
[   32.716307] 
[   32.716532] Allocated by task 223:
[   32.716696]  kasan_save_stack+0x3c/0x68
[   32.716848]  kasan_save_track+0x20/0x40
[   32.716890]  kasan_save_alloc_info+0x40/0x58
[   32.716938]  __kasan_kmalloc+0xd4/0xd8
[   32.716979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.717032]  kmalloc_double_kzfree+0xb8/0x308
[   32.717072]  kunit_try_run_case+0x170/0x3f0
[   32.717121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.717165]  kthread+0x328/0x630
[   32.717205]  ret_from_fork+0x10/0x20
[   32.717253] 
[   32.717281] Freed by task 223:
[   32.717317]  kasan_save_stack+0x3c/0x68
[   32.717353]  kasan_save_track+0x20/0x40
[   32.717395]  kasan_save_free_info+0x4c/0x78
[   32.717433]  __kasan_slab_free+0x6c/0x98
[   32.717471]  kfree+0x214/0x3c8
[   32.717509]  kfree_sensitive+0x80/0xb0
[   32.717547]  kmalloc_double_kzfree+0x11c/0x308
[   32.717588]  kunit_try_run_case+0x170/0x3f0
[   32.717625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.717668]  kthread+0x328/0x630
[   32.717700]  ret_from_fork+0x10/0x20
[   32.717736] 
[   32.718220] The buggy address belongs to the object at fff00000c8683500
[   32.718220]  which belongs to the cache kmalloc-16 of size 16
[   32.718690] The buggy address is located 0 bytes inside of
[   32.718690]  freed 16-byte region [fff00000c8683500, fff00000c8683510)
[   32.719010] 
[   32.719070] The buggy address belongs to the physical page:
[   32.719197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683
[   32.719257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.719464] page_type: f5(slab)
[   32.719684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.719793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.719938] page dumped because: kasan: bad access detected
[   32.720009] 
[   32.720125] Memory state around the buggy address:
[   32.720202]  fff00000c8683400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.720307]  fff00000c8683480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.720352] >fff00000c8683500: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.720794]                    ^
[   32.720908]  fff00000c8683580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.721027]  fff00000c8683600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.721107] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   32.678365] ==================================================================
[   32.678837] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   32.678919] Read of size 1 at addr fff00000c9a87e28 by task kunit_try_catch/219
[   32.679077] 
[   32.679164] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.679323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.679356] Hardware name: linux,dummy-virt (DT)
[   32.679410] Call trace:
[   32.679439]  show_stack+0x20/0x38 (C)
[   32.679790]  dump_stack_lvl+0x8c/0xd0
[   32.679975]  print_report+0x118/0x5e8
[   32.680065]  kasan_report+0xdc/0x128
[   32.680213]  __asan_report_load1_noabort+0x20/0x30
[   32.680293]  kmalloc_uaf2+0x3f4/0x468
[   32.680409]  kunit_try_run_case+0x170/0x3f0
[   32.680607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.680942]  kthread+0x328/0x630
[   32.681100]  ret_from_fork+0x10/0x20
[   32.681254] 
[   32.681314] Allocated by task 219:
[   32.681386]  kasan_save_stack+0x3c/0x68
[   32.681638]  kasan_save_track+0x20/0x40
[   32.681830]  kasan_save_alloc_info+0x40/0x58
[   32.681993]  __kasan_kmalloc+0xd4/0xd8
[   32.682071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.682218]  kmalloc_uaf2+0xc4/0x468
[   32.682374]  kunit_try_run_case+0x170/0x3f0
[   32.682416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.682495]  kthread+0x328/0x630
[   32.683021]  ret_from_fork+0x10/0x20
[   32.683104] 
[   32.683164] Freed by task 219:
[   32.683211]  kasan_save_stack+0x3c/0x68
[   32.683363]  kasan_save_track+0x20/0x40
[   32.683408]  kasan_save_free_info+0x4c/0x78
[   32.683446]  __kasan_slab_free+0x6c/0x98
[   32.683491]  kfree+0x214/0x3c8
[   32.683526]  kmalloc_uaf2+0x134/0x468
[   32.683693]  kunit_try_run_case+0x170/0x3f0
[   32.683760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.683973]  kthread+0x328/0x630
[   32.684031]  ret_from_fork+0x10/0x20
[   32.684067] 
[   32.684088] The buggy address belongs to the object at fff00000c9a87e00
[   32.684088]  which belongs to the cache kmalloc-64 of size 64
[   32.684150] The buggy address is located 40 bytes inside of
[   32.684150]  freed 64-byte region [fff00000c9a87e00, fff00000c9a87e40)
[   32.684213] 
[   32.684235] The buggy address belongs to the physical page:
[   32.684273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a87
[   32.684336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.684394] page_type: f5(slab)
[   32.684449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.684511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.684553] page dumped because: kasan: bad access detected
[   32.684585] 
[   32.684603] Memory state around the buggy address:
[   32.684649]  fff00000c9a87d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.684695]  fff00000c9a87d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.684796] >fff00000c9a87e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.685447]                                   ^
[   32.685517]  fff00000c9a87e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   32.685573]  fff00000c9a87f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.685629] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   32.659098] ==================================================================
[   32.659377] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   32.659513] Write of size 33 at addr fff00000c9a87c80 by task kunit_try_catch/217
[   32.659595] 
[   32.659822] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.660069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.660107] Hardware name: linux,dummy-virt (DT)
[   32.660472] Call trace:
[   32.660629]  show_stack+0x20/0x38 (C)
[   32.660727]  dump_stack_lvl+0x8c/0xd0
[   32.661137]  print_report+0x118/0x5e8
[   32.661242]  kasan_report+0xdc/0x128
[   32.661328]  kasan_check_range+0x100/0x1a8
[   32.661521]  __asan_memset+0x34/0x78
[   32.661801]  kmalloc_uaf_memset+0x170/0x310
[   32.661859]  kunit_try_run_case+0x170/0x3f0
[   32.662260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.662392]  kthread+0x328/0x630
[   32.662450]  ret_from_fork+0x10/0x20
[   32.662742] 
[   32.662927] Allocated by task 217:
[   32.663006]  kasan_save_stack+0x3c/0x68
[   32.663124]  kasan_save_track+0x20/0x40
[   32.663166]  kasan_save_alloc_info+0x40/0x58
[   32.663203]  __kasan_kmalloc+0xd4/0xd8
[   32.663409]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.663744]  kmalloc_uaf_memset+0xb8/0x310
[   32.663985]  kunit_try_run_case+0x170/0x3f0
[   32.664226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.664297]  kthread+0x328/0x630
[   32.664336]  ret_from_fork+0x10/0x20
[   32.664373] 
[   32.664392] Freed by task 217:
[   32.664419]  kasan_save_stack+0x3c/0x68
[   32.664455]  kasan_save_track+0x20/0x40
[   32.664511]  kasan_save_free_info+0x4c/0x78
[   32.664563]  __kasan_slab_free+0x6c/0x98
[   32.664599]  kfree+0x214/0x3c8
[   32.664642]  kmalloc_uaf_memset+0x11c/0x310
[   32.664683]  kunit_try_run_case+0x170/0x3f0
[   32.664727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.664788]  kthread+0x328/0x630
[   32.664821]  ret_from_fork+0x10/0x20
[   32.664855] 
[   32.664876] The buggy address belongs to the object at fff00000c9a87c80
[   32.664876]  which belongs to the cache kmalloc-64 of size 64
[   32.664948] The buggy address is located 0 bytes inside of
[   32.664948]  freed 64-byte region [fff00000c9a87c80, fff00000c9a87cc0)
[   32.665015] 
[   32.665039] The buggy address belongs to the physical page:
[   32.665077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a87
[   32.665133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.665205] page_type: f5(slab)
[   32.665249] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.665298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.665347] page dumped because: kasan: bad access detected
[   32.665387] 
[   32.665405] Memory state around the buggy address:
[   32.665448]  fff00000c9a87b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.665509]  fff00000c9a87c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.665561] >fff00000c9a87c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.665601]                    ^
[   32.665627]  fff00000c9a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.665670]  fff00000c9a87d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.665724] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   32.633761] ==================================================================
[   32.633845] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   32.634341] Read of size 1 at addr fff00000c86834e8 by task kunit_try_catch/215
[   32.634460] 
[   32.634503] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.634773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.634856] Hardware name: linux,dummy-virt (DT)
[   32.634891] Call trace:
[   32.635072]  show_stack+0x20/0x38 (C)
[   32.635159]  dump_stack_lvl+0x8c/0xd0
[   32.635324]  print_report+0x118/0x5e8
[   32.635424]  kasan_report+0xdc/0x128
[   32.635487]  __asan_report_load1_noabort+0x20/0x30
[   32.635703]  kmalloc_uaf+0x300/0x338
[   32.635965]  kunit_try_run_case+0x170/0x3f0
[   32.636475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.636569]  kthread+0x328/0x630
[   32.636786]  ret_from_fork+0x10/0x20
[   32.637043] 
[   32.637112] Allocated by task 215:
[   32.637241]  kasan_save_stack+0x3c/0x68
[   32.637334]  kasan_save_track+0x20/0x40
[   32.637404]  kasan_save_alloc_info+0x40/0x58
[   32.637538]  __kasan_kmalloc+0xd4/0xd8
[   32.637576]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.637805]  kmalloc_uaf+0xb8/0x338
[   32.638050]  kunit_try_run_case+0x170/0x3f0
[   32.638097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.638144]  kthread+0x328/0x630
[   32.638240]  ret_from_fork+0x10/0x20
[   32.638287] 
[   32.638315] Freed by task 215:
[   32.638344]  kasan_save_stack+0x3c/0x68
[   32.638381]  kasan_save_track+0x20/0x40
[   32.638424]  kasan_save_free_info+0x4c/0x78
[   32.638467]  __kasan_slab_free+0x6c/0x98
[   32.638504]  kfree+0x214/0x3c8
[   32.638544]  kmalloc_uaf+0x11c/0x338
[   32.638579]  kunit_try_run_case+0x170/0x3f0
[   32.638623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.638666]  kthread+0x328/0x630
[   32.638699]  ret_from_fork+0x10/0x20
[   32.638742] 
[   32.638961] The buggy address belongs to the object at fff00000c86834e0
[   32.638961]  which belongs to the cache kmalloc-16 of size 16
[   32.639233] The buggy address is located 8 bytes inside of
[   32.639233]  freed 16-byte region [fff00000c86834e0, fff00000c86834f0)
[   32.639343] 
[   32.639387] The buggy address belongs to the physical page:
[   32.639619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683
[   32.639839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.639946] page_type: f5(slab)
[   32.640087] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.640196] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.640240] page dumped because: kasan: bad access detected
[   32.640443] 
[   32.640684] Memory state around the buggy address:
[   32.640821]  fff00000c8683380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.640936]  fff00000c8683400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.641012] >fff00000c8683480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.641173]                                                           ^
[   32.641237]  fff00000c8683500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.641506]  fff00000c8683580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.641810] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   32.608528] ==================================================================
[   32.608998] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   32.609080] Read of size 64 at addr fff00000c9a87984 by task kunit_try_catch/213
[   32.609132] 
[   32.609205] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.609342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.609400] Hardware name: linux,dummy-virt (DT)
[   32.609438] Call trace:
[   32.609462]  show_stack+0x20/0x38 (C)
[   32.609845]  dump_stack_lvl+0x8c/0xd0
[   32.609977]  print_report+0x118/0x5e8
[   32.610063]  kasan_report+0xdc/0x128
[   32.610129]  kasan_check_range+0x100/0x1a8
[   32.610174]  __asan_memmove+0x3c/0x98
[   32.610321]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   32.610375]  kunit_try_run_case+0x170/0x3f0
[   32.610429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.610690]  kthread+0x328/0x630
[   32.610905]  ret_from_fork+0x10/0x20
[   32.611007] 
[   32.611201] Allocated by task 213:
[   32.611242]  kasan_save_stack+0x3c/0x68
[   32.611286]  kasan_save_track+0x20/0x40
[   32.611555]  kasan_save_alloc_info+0x40/0x58
[   32.611629]  __kasan_kmalloc+0xd4/0xd8
[   32.611702]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.611839]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   32.611935]  kunit_try_run_case+0x170/0x3f0
[   32.612090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.612362]  kthread+0x328/0x630
[   32.612517]  ret_from_fork+0x10/0x20
[   32.612647] 
[   32.612714] The buggy address belongs to the object at fff00000c9a87980
[   32.612714]  which belongs to the cache kmalloc-64 of size 64
[   32.612906] The buggy address is located 4 bytes inside of
[   32.612906]  allocated 64-byte region [fff00000c9a87980, fff00000c9a879c0)
[   32.613011] 
[   32.613130] The buggy address belongs to the physical page:
[   32.613300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a87
[   32.613586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.613814] page_type: f5(slab)
[   32.613933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.614094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.614186] page dumped because: kasan: bad access detected
[   32.614564] 
[   32.614609] Memory state around the buggy address:
[   32.614667]  fff00000c9a87880: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.614738]  fff00000c9a87900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.615609] >fff00000c9a87980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.615688]                                            ^
[   32.615737]  fff00000c9a87a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.615886]  fff00000c9a87a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.615985] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   32.589493] ==================================================================
[   32.589635] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   32.589722] Read of size 18446744073709551614 at addr fff00000c9a87784 by task kunit_try_catch/211
[   32.589978] 
[   32.590035] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.590494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.590540] Hardware name: linux,dummy-virt (DT)
[   32.590573] Call trace:
[   32.590616]  show_stack+0x20/0x38 (C)
[   32.590679]  dump_stack_lvl+0x8c/0xd0
[   32.590777]  print_report+0x118/0x5e8
[   32.590842]  kasan_report+0xdc/0x128
[   32.590886]  kasan_check_range+0x100/0x1a8
[   32.591113]  __asan_memmove+0x3c/0x98
[   32.591167]  kmalloc_memmove_negative_size+0x154/0x2e0
[   32.591501]  kunit_try_run_case+0x170/0x3f0
[   32.591571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.591802]  kthread+0x328/0x630
[   32.591881]  ret_from_fork+0x10/0x20
[   32.592026] 
[   32.592103] Allocated by task 211:
[   32.592137]  kasan_save_stack+0x3c/0x68
[   32.592445]  kasan_save_track+0x20/0x40
[   32.592530]  kasan_save_alloc_info+0x40/0x58
[   32.592690]  __kasan_kmalloc+0xd4/0xd8
[   32.592811]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.593115]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   32.593238]  kunit_try_run_case+0x170/0x3f0
[   32.593322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.593580]  kthread+0x328/0x630
[   32.593829]  ret_from_fork+0x10/0x20
[   32.593894] 
[   32.593943] The buggy address belongs to the object at fff00000c9a87780
[   32.593943]  which belongs to the cache kmalloc-64 of size 64
[   32.594494] The buggy address is located 4 bytes inside of
[   32.594494]  64-byte region [fff00000c9a87780, fff00000c9a877c0)
[   32.594587] 
[   32.594638] The buggy address belongs to the physical page:
[   32.594725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a87
[   32.594821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.595088] page_type: f5(slab)
[   32.595269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.595408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.595610] page dumped because: kasan: bad access detected
[   32.595685] 
[   32.595704] Memory state around the buggy address:
[   32.595755]  fff00000c9a87680: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   32.595960]  fff00000c9a87700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.596191] >fff00000c9a87780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.596347]                    ^
[   32.596391]  fff00000c9a87800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.596454]  fff00000c9a87880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.596572] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   32.572307] ==================================================================
[   32.572385] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   32.572448] Write of size 16 at addr fff00000c9a8b469 by task kunit_try_catch/209
[   32.572501] 
[   32.572682] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.572909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.572948] Hardware name: linux,dummy-virt (DT)
[   32.572982] Call trace:
[   32.573007]  show_stack+0x20/0x38 (C)
[   32.573058]  dump_stack_lvl+0x8c/0xd0
[   32.573104]  print_report+0x118/0x5e8
[   32.573406]  kasan_report+0xdc/0x128
[   32.573554]  kasan_check_range+0x100/0x1a8
[   32.573630]  __asan_memset+0x34/0x78
[   32.573674]  kmalloc_oob_memset_16+0x150/0x2f8
[   32.573728]  kunit_try_run_case+0x170/0x3f0
[   32.574071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.574231]  kthread+0x328/0x630
[   32.574307]  ret_from_fork+0x10/0x20
[   32.574359] 
[   32.574471] Allocated by task 209:
[   32.574508]  kasan_save_stack+0x3c/0x68
[   32.574551]  kasan_save_track+0x20/0x40
[   32.574602]  kasan_save_alloc_info+0x40/0x58
[   32.574643]  __kasan_kmalloc+0xd4/0xd8
[   32.574679]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.574720]  kmalloc_oob_memset_16+0xb0/0x2f8
[   32.575095]  kunit_try_run_case+0x170/0x3f0
[   32.576036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.576116]  kthread+0x328/0x630
[   32.576182]  ret_from_fork+0x10/0x20
[   32.576323] 
[   32.576347] The buggy address belongs to the object at fff00000c9a8b400
[   32.576347]  which belongs to the cache kmalloc-128 of size 128
[   32.576452] The buggy address is located 105 bytes inside of
[   32.576452]  allocated 120-byte region [fff00000c9a8b400, fff00000c9a8b478)
[   32.576565] 
[   32.576819] The buggy address belongs to the physical page:
[   32.577030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.577112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.577670] page_type: f5(slab)
[   32.577901] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.577999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.578097] page dumped because: kasan: bad access detected
[   32.578240] 
[   32.578289] Memory state around the buggy address:
[   32.578343]  fff00000c9a8b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.578581]  fff00000c9a8b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.578962] >fff00000c9a8b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.579150]                                                                 ^
[   32.579312]  fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.579395]  fff00000c9a8b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.579478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   32.554957] ==================================================================
[   32.555237] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   32.555375] Write of size 8 at addr fff00000c9a8b371 by task kunit_try_catch/207
[   32.555825] 
[   32.555898] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.556042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.556114] Hardware name: linux,dummy-virt (DT)
[   32.556195] Call trace:
[   32.556354]  show_stack+0x20/0x38 (C)
[   32.556545]  dump_stack_lvl+0x8c/0xd0
[   32.556668]  print_report+0x118/0x5e8
[   32.556739]  kasan_report+0xdc/0x128
[   32.556867]  kasan_check_range+0x100/0x1a8
[   32.556954]  __asan_memset+0x34/0x78
[   32.557074]  kmalloc_oob_memset_8+0x150/0x2f8
[   32.557161]  kunit_try_run_case+0x170/0x3f0
[   32.557595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.557673]  kthread+0x328/0x630
[   32.557836]  ret_from_fork+0x10/0x20
[   32.557919] 
[   32.557946] Allocated by task 207:
[   32.558027]  kasan_save_stack+0x3c/0x68
[   32.558084]  kasan_save_track+0x20/0x40
[   32.558125]  kasan_save_alloc_info+0x40/0x58
[   32.558173]  __kasan_kmalloc+0xd4/0xd8
[   32.558216]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.558262]  kmalloc_oob_memset_8+0xb0/0x2f8
[   32.558326]  kunit_try_run_case+0x170/0x3f0
[   32.558363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.558404]  kthread+0x328/0x630
[   32.558436]  ret_from_fork+0x10/0x20
[   32.558472] 
[   32.558497] The buggy address belongs to the object at fff00000c9a8b300
[   32.558497]  which belongs to the cache kmalloc-128 of size 128
[   32.558576] The buggy address is located 113 bytes inside of
[   32.558576]  allocated 120-byte region [fff00000c9a8b300, fff00000c9a8b378)
[   32.558637] 
[   32.558660] The buggy address belongs to the physical page:
[   32.558697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.558762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.558812] page_type: f5(slab)
[   32.558868] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.558926] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.558975] page dumped because: kasan: bad access detected
[   32.559665] 
[   32.559721] Memory state around the buggy address:
[   32.559811]  fff00000c9a8b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.559934]  fff00000c9a8b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.560021] >fff00000c9a8b300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.560082]                                                                 ^
[   32.560191]  fff00000c9a8b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.560413]  fff00000c9a8b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.560476] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   32.538694] ==================================================================
[   32.538843] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   32.538908] Write of size 4 at addr fff00000c9a8b275 by task kunit_try_catch/205
[   32.538968] 
[   32.539055] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.539160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.539195] Hardware name: linux,dummy-virt (DT)
[   32.539227] Call trace:
[   32.539422]  show_stack+0x20/0x38 (C)
[   32.539482]  dump_stack_lvl+0x8c/0xd0
[   32.539614]  print_report+0x118/0x5e8
[   32.539736]  kasan_report+0xdc/0x128
[   32.540050]  kasan_check_range+0x100/0x1a8
[   32.540166]  __asan_memset+0x34/0x78
[   32.540257]  kmalloc_oob_memset_4+0x150/0x300
[   32.540353]  kunit_try_run_case+0x170/0x3f0
[   32.540454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.540711]  kthread+0x328/0x630
[   32.540805]  ret_from_fork+0x10/0x20
[   32.540943] 
[   32.540963] Allocated by task 205:
[   32.541178]  kasan_save_stack+0x3c/0x68
[   32.541245]  kasan_save_track+0x20/0x40
[   32.541369]  kasan_save_alloc_info+0x40/0x58
[   32.541458]  __kasan_kmalloc+0xd4/0xd8
[   32.541512]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.541701]  kmalloc_oob_memset_4+0xb0/0x300
[   32.541802]  kunit_try_run_case+0x170/0x3f0
[   32.541891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.542003]  kthread+0x328/0x630
[   32.542056]  ret_from_fork+0x10/0x20
[   32.542092] 
[   32.542151] The buggy address belongs to the object at fff00000c9a8b200
[   32.542151]  which belongs to the cache kmalloc-128 of size 128
[   32.542431] The buggy address is located 117 bytes inside of
[   32.542431]  allocated 120-byte region [fff00000c9a8b200, fff00000c9a8b278)
[   32.542555] 
[   32.542618] The buggy address belongs to the physical page:
[   32.542697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.542858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.543158] page_type: f5(slab)
[   32.543366] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.543443] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.543528] page dumped because: kasan: bad access detected
[   32.543568] 
[   32.543587] Memory state around the buggy address:
[   32.543630]  fff00000c9a8b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.543683]  fff00000c9a8b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.543860] >fff00000c9a8b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.544001]                                                                 ^
[   32.544186]  fff00000c9a8b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.544294]  fff00000c9a8b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.544333] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   32.284776] ==================================================================
[   32.284847] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   32.284911] Read of size 1 at addr fff00000c9a80000 by task kunit_try_catch/185
[   32.284963] 
[   32.285005] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.285105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.285132] Hardware name: linux,dummy-virt (DT)
[   32.285165] Call trace:
[   32.285189]  show_stack+0x20/0x38 (C)
[   32.285239]  dump_stack_lvl+0x8c/0xd0
[   32.285285]  print_report+0x118/0x5e8
[   32.285327]  kasan_report+0xdc/0x128
[   32.285369]  __asan_report_load1_noabort+0x20/0x30
[   32.285430]  page_alloc_uaf+0x328/0x350
[   32.285476]  kunit_try_run_case+0x170/0x3f0
[   32.285522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.285573]  kthread+0x328/0x630
[   32.285616]  ret_from_fork+0x10/0x20
[   32.285664] 
[   32.285685] The buggy address belongs to the physical page:
[   32.286155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a80
[   32.286249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.286304] page_type: f0(buddy)
[   32.286346] raw: 0bfffe0000000000 fff00000ff616218 fff00000ff616218 0000000000000000
[   32.286429] raw: 0000000000000000 0000000000000007 00000000f0000000 0000000000000000
[   32.286604] page dumped because: kasan: bad access detected
[   32.286649] 
[   32.286667] Memory state around the buggy address:
[   32.286704]  fff00000c9a7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.287352]  fff00000c9a7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.287499] >fff00000c9a80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.287539]                    ^
[   32.288080]  fff00000c9a80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.288725]  fff00000c9a80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.288800] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   32.525440] ==================================================================
[   32.525861] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   32.526016] Write of size 2 at addr fff00000c9a8b177 by task kunit_try_catch/203
[   32.526126] 
[   32.526185] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.526427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.526462] Hardware name: linux,dummy-virt (DT)
[   32.526558] Call trace:
[   32.526718]  show_stack+0x20/0x38 (C)
[   32.526805]  dump_stack_lvl+0x8c/0xd0
[   32.526854]  print_report+0x118/0x5e8
[   32.526897]  kasan_report+0xdc/0x128
[   32.527338]  kasan_check_range+0x100/0x1a8
[   32.527461]  __asan_memset+0x34/0x78
[   32.527618]  kmalloc_oob_memset_2+0x150/0x2f8
[   32.527673]  kunit_try_run_case+0x170/0x3f0
[   32.527721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.527791]  kthread+0x328/0x630
[   32.528068]  ret_from_fork+0x10/0x20
[   32.528276] 
[   32.528363] Allocated by task 203:
[   32.528412]  kasan_save_stack+0x3c/0x68
[   32.528473]  kasan_save_track+0x20/0x40
[   32.528660]  kasan_save_alloc_info+0x40/0x58
[   32.528806]  __kasan_kmalloc+0xd4/0xd8
[   32.528855]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.528895]  kmalloc_oob_memset_2+0xb0/0x2f8
[   32.528987]  kunit_try_run_case+0x170/0x3f0
[   32.529203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.529435]  kthread+0x328/0x630
[   32.529618]  ret_from_fork+0x10/0x20
[   32.529788] 
[   32.529858] The buggy address belongs to the object at fff00000c9a8b100
[   32.529858]  which belongs to the cache kmalloc-128 of size 128
[   32.529937] The buggy address is located 119 bytes inside of
[   32.529937]  allocated 120-byte region [fff00000c9a8b100, fff00000c9a8b178)
[   32.530202] 
[   32.530230] The buggy address belongs to the physical page:
[   32.530270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.530347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.530449] page_type: f5(slab)
[   32.530667] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.530767] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.530859] page dumped because: kasan: bad access detected
[   32.530890] 
[   32.530912] Memory state around the buggy address:
[   32.530952]  fff00000c9a8b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.531308]  fff00000c9a8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.531420] >fff00000c9a8b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.531576]                                                                 ^
[   32.531651]  fff00000c9a8b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.531718]  fff00000c9a8b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.531765] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   32.505164] ==================================================================
[   32.505251] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   32.505320] Write of size 128 at addr fff00000c9a8b000 by task kunit_try_catch/201
[   32.505371] 
[   32.505412] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.505499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.506666] Hardware name: linux,dummy-virt (DT)
[   32.506729] Call trace:
[   32.506763]  show_stack+0x20/0x38 (C)
[   32.506886]  dump_stack_lvl+0x8c/0xd0
[   32.507079]  print_report+0x118/0x5e8
[   32.507127]  kasan_report+0xdc/0x128
[   32.507238]  kasan_check_range+0x100/0x1a8
[   32.508003]  __asan_memset+0x34/0x78
[   32.508066]  kmalloc_oob_in_memset+0x144/0x2d0
[   32.508465]  kunit_try_run_case+0x170/0x3f0
[   32.508735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.508803]  kthread+0x328/0x630
[   32.508846]  ret_from_fork+0x10/0x20
[   32.508896] 
[   32.508915] Allocated by task 201:
[   32.508943]  kasan_save_stack+0x3c/0x68
[   32.509417]  kasan_save_track+0x20/0x40
[   32.509454]  kasan_save_alloc_info+0x40/0x58
[   32.509766]  __kasan_kmalloc+0xd4/0xd8
[   32.509957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.510298]  kmalloc_oob_in_memset+0xb0/0x2d0
[   32.510666]  kunit_try_run_case+0x170/0x3f0
[   32.510717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.511123]  kthread+0x328/0x630
[   32.511175]  ret_from_fork+0x10/0x20
[   32.511420] 
[   32.511620] The buggy address belongs to the object at fff00000c9a8b000
[   32.511620]  which belongs to the cache kmalloc-128 of size 128
[   32.511744] The buggy address is located 0 bytes inside of
[   32.511744]  allocated 120-byte region [fff00000c9a8b000, fff00000c9a8b078)
[   32.512364] 
[   32.512395] The buggy address belongs to the physical page:
[   32.512650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.512893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.513192] page_type: f5(slab)
[   32.513476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.513971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.514123] page dumped because: kasan: bad access detected
[   32.514414] 
[   32.514651] Memory state around the buggy address:
[   32.515156]  fff00000c9a8af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.515203]  fff00000c9a8af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.515251] >fff00000c9a8b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.515289]                                                                 ^
[   32.515921]  fff00000c9a8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.516250]  fff00000c9a8b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.516540] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   32.471140] ==================================================================
[   32.471242] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   32.471333] Read of size 16 at addr fff00000c86834c0 by task kunit_try_catch/199
[   32.471704] 
[   32.471856] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.471945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.471972] Hardware name: linux,dummy-virt (DT)
[   32.472004] Call trace:
[   32.472693]  show_stack+0x20/0x38 (C)
[   32.473260]  dump_stack_lvl+0x8c/0xd0
[   32.473429]  print_report+0x118/0x5e8
[   32.473476]  kasan_report+0xdc/0x128
[   32.473806]  __asan_report_load16_noabort+0x20/0x30
[   32.474007]  kmalloc_uaf_16+0x3bc/0x438
[   32.474662]  kunit_try_run_case+0x170/0x3f0
[   32.475041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.475176]  kthread+0x328/0x630
[   32.475463]  ret_from_fork+0x10/0x20
[   32.475604] 
[   32.475664] Allocated by task 199:
[   32.475843]  kasan_save_stack+0x3c/0x68
[   32.476106]  kasan_save_track+0x20/0x40
[   32.476346]  kasan_save_alloc_info+0x40/0x58
[   32.476582]  __kasan_kmalloc+0xd4/0xd8
[   32.476840]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.476888]  kmalloc_uaf_16+0x140/0x438
[   32.476924]  kunit_try_run_case+0x170/0x3f0
[   32.476960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.477001]  kthread+0x328/0x630
[   32.477033]  ret_from_fork+0x10/0x20
[   32.477067] 
[   32.478003] Freed by task 199:
[   32.478406]  kasan_save_stack+0x3c/0x68
[   32.478471]  kasan_save_track+0x20/0x40
[   32.478505]  kasan_save_free_info+0x4c/0x78
[   32.478541]  __kasan_slab_free+0x6c/0x98
[   32.478575]  kfree+0x214/0x3c8
[   32.479229]  kmalloc_uaf_16+0x190/0x438
[   32.479440]  kunit_try_run_case+0x170/0x3f0
[   32.479549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.479743]  kthread+0x328/0x630
[   32.479798]  ret_from_fork+0x10/0x20
[   32.480370] 
[   32.480494] The buggy address belongs to the object at fff00000c86834c0
[   32.480494]  which belongs to the cache kmalloc-16 of size 16
[   32.480555] The buggy address is located 0 bytes inside of
[   32.480555]  freed 16-byte region [fff00000c86834c0, fff00000c86834d0)
[   32.480617] 
[   32.481095] The buggy address belongs to the physical page:
[   32.481336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683
[   32.481482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.481595] page_type: f5(slab)
[   32.482303] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.482475] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.482627] page dumped because: kasan: bad access detected
[   32.483261] 
[   32.483484] Memory state around the buggy address:
[   32.483650]  fff00000c8683380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.484051]  fff00000c8683400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.484177] >fff00000c8683480: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   32.484250]                                            ^
[   32.484506]  fff00000c8683500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.484831]  fff00000c8683580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.484995] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   32.446791] ==================================================================
[   32.446862] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   32.446922] Write of size 16 at addr fff00000c8683460 by task kunit_try_catch/197
[   32.447387] 
[   32.447447] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.447696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.447744] Hardware name: linux,dummy-virt (DT)
[   32.447788] Call trace:
[   32.447812]  show_stack+0x20/0x38 (C)
[   32.447892]  dump_stack_lvl+0x8c/0xd0
[   32.447939]  print_report+0x118/0x5e8
[   32.447983]  kasan_report+0xdc/0x128
[   32.448648]  __asan_report_store16_noabort+0x20/0x30
[   32.448768]  kmalloc_oob_16+0x3a0/0x3f8
[   32.448896]  kunit_try_run_case+0x170/0x3f0
[   32.449182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.449264]  kthread+0x328/0x630
[   32.449415]  ret_from_fork+0x10/0x20
[   32.449480] 
[   32.449499] Allocated by task 197:
[   32.449675]  kasan_save_stack+0x3c/0x68
[   32.449789]  kasan_save_track+0x20/0x40
[   32.449837]  kasan_save_alloc_info+0x40/0x58
[   32.449878]  __kasan_kmalloc+0xd4/0xd8
[   32.449919]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.449959]  kmalloc_oob_16+0xb4/0x3f8
[   32.450033]  kunit_try_run_case+0x170/0x3f0
[   32.450091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.450137]  kthread+0x328/0x630
[   32.450180]  ret_from_fork+0x10/0x20
[   32.450236] 
[   32.450261] The buggy address belongs to the object at fff00000c8683460
[   32.450261]  which belongs to the cache kmalloc-16 of size 16
[   32.450342] The buggy address is located 0 bytes inside of
[   32.450342]  allocated 13-byte region [fff00000c8683460, fff00000c868346d)
[   32.450403] 
[   32.450432] The buggy address belongs to the physical page:
[   32.450471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683
[   32.450525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.450583] page_type: f5(slab)
[   32.450631] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.450688] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.450736] page dumped because: kasan: bad access detected
[   32.450785] 
[   32.450803] Memory state around the buggy address:
[   32.450855]  fff00000c8683300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.450909]  fff00000c8683380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.451189] >fff00000c8683400: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   32.451237]                                                           ^
[   32.451695]  fff00000c8683480: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.451754]  fff00000c8683500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.451977] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   32.425886] ==================================================================
[   32.425948] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   32.426080] Read of size 1 at addr fff00000c9260000 by task kunit_try_catch/195
[   32.426143] 
[   32.426180] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.426271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.426297] Hardware name: linux,dummy-virt (DT)
[   32.426370] Call trace:
[   32.426396]  show_stack+0x20/0x38 (C)
[   32.426483]  dump_stack_lvl+0x8c/0xd0
[   32.426869]  print_report+0x118/0x5e8
[   32.426931]  kasan_report+0xdc/0x128
[   32.427107]  __asan_report_load1_noabort+0x20/0x30
[   32.427307]  krealloc_uaf+0x4c8/0x520
[   32.427355]  kunit_try_run_case+0x170/0x3f0
[   32.427420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.427814]  kthread+0x328/0x630
[   32.427887]  ret_from_fork+0x10/0x20
[   32.428042] 
[   32.428102] Allocated by task 195:
[   32.428221]  kasan_save_stack+0x3c/0x68
[   32.428332]  kasan_save_track+0x20/0x40
[   32.428409]  kasan_save_alloc_info+0x40/0x58
[   32.428812]  __kasan_kmalloc+0xd4/0xd8
[   32.428905]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.428980]  krealloc_uaf+0xc8/0x520
[   32.429476]  kunit_try_run_case+0x170/0x3f0
[   32.429845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.429960]  kthread+0x328/0x630
[   32.430024]  ret_from_fork+0x10/0x20
[   32.430098] 
[   32.430158] Freed by task 195:
[   32.430324]  kasan_save_stack+0x3c/0x68
[   32.430609]  kasan_save_track+0x20/0x40
[   32.430697]  kasan_save_free_info+0x4c/0x78
[   32.431085]  __kasan_slab_free+0x6c/0x98
[   32.431385]  kfree+0x214/0x3c8
[   32.431674]  krealloc_uaf+0x12c/0x520
[   32.431877]  kunit_try_run_case+0x170/0x3f0
[   32.431955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.432255]  kthread+0x328/0x630
[   32.432327]  ret_from_fork+0x10/0x20
[   32.432492] 
[   32.432597] The buggy address belongs to the object at fff00000c9260000
[   32.432597]  which belongs to the cache kmalloc-256 of size 256
[   32.432782] The buggy address is located 0 bytes inside of
[   32.432782]  freed 256-byte region [fff00000c9260000, fff00000c9260100)
[   32.432888] 
[   32.432943] The buggy address belongs to the physical page:
[   32.433066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109260
[   32.433163] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.433228] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.433480] page_type: f5(slab)
[   32.433725] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.433876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.433946] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.434167] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.434384] head: 0bfffe0000000001 ffffc1ffc3249801 00000000ffffffff 00000000ffffffff
[   32.434842] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.435167] page dumped because: kasan: bad access detected
[   32.435306] 
[   32.435335] Memory state around the buggy address:
[   32.435370]  fff00000c925ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.435414]  fff00000c925ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.435812] >fff00000c9260000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.436098]                    ^
[   32.436428]  fff00000c9260080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.436481]  fff00000c9260100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.436862] ==================================================================
[   32.412980] ==================================================================
[   32.413357] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   32.413437] Read of size 1 at addr fff00000c9260000 by task kunit_try_catch/195
[   32.413488] 
[   32.413526] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.413613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.413639] Hardware name: linux,dummy-virt (DT)
[   32.413671] Call trace:
[   32.413706]  show_stack+0x20/0x38 (C)
[   32.413775]  dump_stack_lvl+0x8c/0xd0
[   32.413820]  print_report+0x118/0x5e8
[   32.413862]  kasan_report+0xdc/0x128
[   32.413903]  __kasan_check_byte+0x54/0x70
[   32.413947]  krealloc_noprof+0x44/0x360
[   32.413990]  krealloc_uaf+0x180/0x520
[   32.414038]  kunit_try_run_case+0x170/0x3f0
[   32.414084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.414139]  kthread+0x328/0x630
[   32.414181]  ret_from_fork+0x10/0x20
[   32.414244] 
[   32.414263] Allocated by task 195:
[   32.414351]  kasan_save_stack+0x3c/0x68
[   32.414392]  kasan_save_track+0x20/0x40
[   32.414435]  kasan_save_alloc_info+0x40/0x58
[   32.414473]  __kasan_kmalloc+0xd4/0xd8
[   32.414516]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.414557]  krealloc_uaf+0xc8/0x520
[   32.414601]  kunit_try_run_case+0x170/0x3f0
[   32.414637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.414688]  kthread+0x328/0x630
[   32.414721]  ret_from_fork+0x10/0x20
[   32.415326] 
[   32.415628] Freed by task 195:
[   32.415905]  kasan_save_stack+0x3c/0x68
[   32.416067]  kasan_save_track+0x20/0x40
[   32.416371]  kasan_save_free_info+0x4c/0x78
[   32.416471]  __kasan_slab_free+0x6c/0x98
[   32.416573]  kfree+0x214/0x3c8
[   32.416610]  krealloc_uaf+0x12c/0x520
[   32.416688]  kunit_try_run_case+0x170/0x3f0
[   32.416783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.417184]  kthread+0x328/0x630
[   32.417293]  ret_from_fork+0x10/0x20
[   32.417487] 
[   32.417556] The buggy address belongs to the object at fff00000c9260000
[   32.417556]  which belongs to the cache kmalloc-256 of size 256
[   32.418170] The buggy address is located 0 bytes inside of
[   32.418170]  freed 256-byte region [fff00000c9260000, fff00000c9260100)
[   32.418284] 
[   32.418332] The buggy address belongs to the physical page:
[   32.418437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109260
[   32.418543] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.418807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.419110] page_type: f5(slab)
[   32.419293] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.419390] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.419525] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.419584] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.419838] head: 0bfffe0000000001 ffffc1ffc3249801 00000000ffffffff 00000000ffffffff
[   32.420249] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.420330] page dumped because: kasan: bad access detected
[   32.420406] 
[   32.420476] Memory state around the buggy address:
[   32.420554]  fff00000c925ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.421008]  fff00000c925ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.421139] >fff00000c9260000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.421282]                    ^
[   32.421557]  fff00000c9260080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.421739]  fff00000c9260100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.422243] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   32.376631] ==================================================================
[   32.377078] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.377284] Write of size 1 at addr fff00000c99620d0 by task kunit_try_catch/193
[   32.377345] 
[   32.377381] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.377986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.378074] Hardware name: linux,dummy-virt (DT)
[   32.378115] Call trace:
[   32.378148]  show_stack+0x20/0x38 (C)
[   32.378218]  dump_stack_lvl+0x8c/0xd0
[   32.378552]  print_report+0x118/0x5e8
[   32.378623]  kasan_report+0xdc/0x128
[   32.378667]  __asan_report_store1_noabort+0x20/0x30
[   32.378716]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.378775]  krealloc_large_less_oob+0x20/0x38
[   32.378823]  kunit_try_run_case+0x170/0x3f0
[   32.378869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.379198]  kthread+0x328/0x630
[   32.379856]  ret_from_fork+0x10/0x20
[   32.380001] 
[   32.380125] The buggy address belongs to the physical page:
[   32.380197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.380607] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.380664] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.380941] page_type: f8(unknown)
[   32.381027] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.381216] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.381495] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.381650] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.381871] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.381923] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.381971] page dumped because: kasan: bad access detected
[   32.382002] 
[   32.382021] Memory state around the buggy address:
[   32.382064]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.382113]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.382154] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.382191]                                                  ^
[   32.382227]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.382270]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.382324] ==================================================================
[   32.316959] ==================================================================
[   32.317191] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.317466] Write of size 1 at addr fff00000c8575ec9 by task kunit_try_catch/189
[   32.317559] 
[   32.317681] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.317778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.317805] Hardware name: linux,dummy-virt (DT)
[   32.317838] Call trace:
[   32.317924]  show_stack+0x20/0x38 (C)
[   32.318001]  dump_stack_lvl+0x8c/0xd0
[   32.318047]  print_report+0x118/0x5e8
[   32.318151]  kasan_report+0xdc/0x128
[   32.318194]  __asan_report_store1_noabort+0x20/0x30
[   32.318262]  krealloc_less_oob_helper+0xa48/0xc50
[   32.318338]  krealloc_less_oob+0x20/0x38
[   32.318595]  kunit_try_run_case+0x170/0x3f0
[   32.318657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.318788]  kthread+0x328/0x630
[   32.318856]  ret_from_fork+0x10/0x20
[   32.318911] 
[   32.318940] Allocated by task 189:
[   32.318968]  kasan_save_stack+0x3c/0x68
[   32.319013]  kasan_save_track+0x20/0x40
[   32.319070]  kasan_save_alloc_info+0x40/0x58
[   32.319156]  __kasan_krealloc+0x118/0x178
[   32.319202]  krealloc_noprof+0x128/0x360
[   32.319259]  krealloc_less_oob_helper+0x168/0xc50
[   32.319349]  krealloc_less_oob+0x20/0x38
[   32.319440]  kunit_try_run_case+0x170/0x3f0
[   32.319476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.319517]  kthread+0x328/0x630
[   32.319548]  ret_from_fork+0x10/0x20
[   32.319582] 
[   32.319601] The buggy address belongs to the object at fff00000c8575e00
[   32.319601]  which belongs to the cache kmalloc-256 of size 256
[   32.319657] The buggy address is located 0 bytes to the right of
[   32.319657]  allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9)
[   32.319975] 
[   32.320146] The buggy address belongs to the physical page:
[   32.320239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.320380] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.320455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.320530] page_type: f5(slab)
[   32.320657] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.320786] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.320918] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.320965] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.321338] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.321440] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.321573] page dumped because: kasan: bad access detected
[   32.321640] 
[   32.321667] Memory state around the buggy address:
[   32.321776]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.321853]  fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.321946] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.322083]                                               ^
[   32.322142]  fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.322190]  fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.322398] ==================================================================
[   32.396741] ==================================================================
[   32.396971] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.397041] Write of size 1 at addr fff00000c99620eb by task kunit_try_catch/193
[   32.397142] 
[   32.397178] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.397281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.397315] Hardware name: linux,dummy-virt (DT)
[   32.397499] Call trace:
[   32.397533]  show_stack+0x20/0x38 (C)
[   32.397760]  dump_stack_lvl+0x8c/0xd0
[   32.397823]  print_report+0x118/0x5e8
[   32.398075]  kasan_report+0xdc/0x128
[   32.398280]  __asan_report_store1_noabort+0x20/0x30
[   32.398343]  krealloc_less_oob_helper+0xa58/0xc50
[   32.398510]  krealloc_large_less_oob+0x20/0x38
[   32.398607]  kunit_try_run_case+0x170/0x3f0
[   32.398663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.398714]  kthread+0x328/0x630
[   32.399041]  ret_from_fork+0x10/0x20
[   32.399236] 
[   32.399332] The buggy address belongs to the physical page:
[   32.399412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.399523] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.399706] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.399991] page_type: f8(unknown)
[   32.400059] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.400203] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.400309] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.400445] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.400559] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.400608] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.400819] page dumped because: kasan: bad access detected
[   32.401060] 
[   32.401103] Memory state around the buggy address:
[   32.401149]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.401986]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.402058] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.402149]                                                           ^
[   32.402211]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.402278]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.402453] ==================================================================
[   32.368095] ==================================================================
[   32.368474] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.368537] Write of size 1 at addr fff00000c99620c9 by task kunit_try_catch/193
[   32.368690] 
[   32.368776] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.369210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.369290] Hardware name: linux,dummy-virt (DT)
[   32.369325] Call trace:
[   32.369393]  show_stack+0x20/0x38 (C)
[   32.369446]  dump_stack_lvl+0x8c/0xd0
[   32.369503]  print_report+0x118/0x5e8
[   32.369736]  kasan_report+0xdc/0x128
[   32.369818]  __asan_report_store1_noabort+0x20/0x30
[   32.369868]  krealloc_less_oob_helper+0xa48/0xc50
[   32.369917]  krealloc_large_less_oob+0x20/0x38
[   32.370302]  kunit_try_run_case+0x170/0x3f0
[   32.370697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.370786]  kthread+0x328/0x630
[   32.370830]  ret_from_fork+0x10/0x20
[   32.371019] 
[   32.371070] The buggy address belongs to the physical page:
[   32.371379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.371699] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.372242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.372364] page_type: f8(unknown)
[   32.372440] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.372762] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.373003] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.373260] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.373356] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.373598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.373675] page dumped because: kasan: bad access detected
[   32.374044] 
[   32.374169] Memory state around the buggy address:
[   32.374226]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.374375]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.374421] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.374507]                                               ^
[   32.374723]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.374852]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.375048] ==================================================================
[   32.328497] ==================================================================
[   32.328700] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.328782] Write of size 1 at addr fff00000c8575eda by task kunit_try_catch/189
[   32.328832] 
[   32.328971] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.329056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.329083] Hardware name: linux,dummy-virt (DT)
[   32.329114] Call trace:
[   32.329137]  show_stack+0x20/0x38 (C)
[   32.329333]  dump_stack_lvl+0x8c/0xd0
[   32.329398]  print_report+0x118/0x5e8
[   32.329442]  kasan_report+0xdc/0x128
[   32.329502]  __asan_report_store1_noabort+0x20/0x30
[   32.329557]  krealloc_less_oob_helper+0xa80/0xc50
[   32.329622]  krealloc_less_oob+0x20/0x38
[   32.329679]  kunit_try_run_case+0x170/0x3f0
[   32.329733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.329824]  kthread+0x328/0x630
[   32.329882]  ret_from_fork+0x10/0x20
[   32.329949] 
[   32.329988] Allocated by task 189:
[   32.330035]  kasan_save_stack+0x3c/0x68
[   32.330137]  kasan_save_track+0x20/0x40
[   32.330174]  kasan_save_alloc_info+0x40/0x58
[   32.330241]  __kasan_krealloc+0x118/0x178
[   32.330293]  krealloc_noprof+0x128/0x360
[   32.330327]  krealloc_less_oob_helper+0x168/0xc50
[   32.330366]  krealloc_less_oob+0x20/0x38
[   32.330402]  kunit_try_run_case+0x170/0x3f0
[   32.330546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.330685]  kthread+0x328/0x630
[   32.330730]  ret_from_fork+0x10/0x20
[   32.330776] 
[   32.330795] The buggy address belongs to the object at fff00000c8575e00
[   32.330795]  which belongs to the cache kmalloc-256 of size 256
[   32.330937] The buggy address is located 17 bytes to the right of
[   32.330937]  allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9)
[   32.331131] 
[   32.331152] The buggy address belongs to the physical page:
[   32.331186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.331252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.331307] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.331357] page_type: f5(slab)
[   32.331579] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.331665] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.331784] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.331903] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.332001] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.332106] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.332158] page dumped because: kasan: bad access detected
[   32.332226] 
[   32.332244] Memory state around the buggy address:
[   32.332274]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.332369]  fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.332414] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.332572]                                                     ^
[   32.332610]  fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.332651]  fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.332688] ==================================================================
[   32.389870] ==================================================================
[   32.390119] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.390361] Write of size 1 at addr fff00000c99620ea by task kunit_try_catch/193
[   32.390423] 
[   32.390459] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.390543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.390570] Hardware name: linux,dummy-virt (DT)
[   32.390691] Call trace:
[   32.390718]  show_stack+0x20/0x38 (C)
[   32.390900]  dump_stack_lvl+0x8c/0xd0
[   32.391024]  print_report+0x118/0x5e8
[   32.391306]  kasan_report+0xdc/0x128
[   32.391577]  __asan_report_store1_noabort+0x20/0x30
[   32.391685]  krealloc_less_oob_helper+0xae4/0xc50
[   32.391832]  krealloc_large_less_oob+0x20/0x38
[   32.391895]  kunit_try_run_case+0x170/0x3f0
[   32.391941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.392442]  kthread+0x328/0x630
[   32.392520]  ret_from_fork+0x10/0x20
[   32.392718] 
[   32.392815] The buggy address belongs to the physical page:
[   32.392873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.393006] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.393237] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.393407] page_type: f8(unknown)
[   32.393468] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.393533] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.393592] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.393648] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.393705] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.393781] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.393827] page dumped because: kasan: bad access detected
[   32.393862] 
[   32.393880] Memory state around the buggy address:
[   32.393925]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.393968]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.394022] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.394061]                                                           ^
[   32.394098]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.394146]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.394183] ==================================================================
[   32.339155] ==================================================================
[   32.339203] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.339249] Write of size 1 at addr fff00000c8575eeb by task kunit_try_catch/189
[   32.339324] 
[   32.339352] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.339434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.339459] Hardware name: linux,dummy-virt (DT)
[   32.339625] Call trace:
[   32.339658]  show_stack+0x20/0x38 (C)
[   32.339706]  dump_stack_lvl+0x8c/0xd0
[   32.339762]  print_report+0x118/0x5e8
[   32.340036]  kasan_report+0xdc/0x128
[   32.340093]  __asan_report_store1_noabort+0x20/0x30
[   32.340141]  krealloc_less_oob_helper+0xa58/0xc50
[   32.340208]  krealloc_less_oob+0x20/0x38
[   32.340271]  kunit_try_run_case+0x170/0x3f0
[   32.340351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.340403]  kthread+0x328/0x630
[   32.340647]  ret_from_fork+0x10/0x20
[   32.340777] 
[   32.340816] Allocated by task 189:
[   32.340863]  kasan_save_stack+0x3c/0x68
[   32.340902]  kasan_save_track+0x20/0x40
[   32.340937]  kasan_save_alloc_info+0x40/0x58
[   32.340973]  __kasan_krealloc+0x118/0x178
[   32.341032]  krealloc_noprof+0x128/0x360
[   32.341067]  krealloc_less_oob_helper+0x168/0xc50
[   32.341107]  krealloc_less_oob+0x20/0x38
[   32.341143]  kunit_try_run_case+0x170/0x3f0
[   32.341178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.341385]  kthread+0x328/0x630
[   32.341439]  ret_from_fork+0x10/0x20
[   32.341474] 
[   32.341520] The buggy address belongs to the object at fff00000c8575e00
[   32.341520]  which belongs to the cache kmalloc-256 of size 256
[   32.341590] The buggy address is located 34 bytes to the right of
[   32.341590]  allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9)
[   32.341654] 
[   32.341692] The buggy address belongs to the physical page:
[   32.341726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.341904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.342043] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.342103] page_type: f5(slab)
[   32.342150] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.342198] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.342247] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.342296] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.342344] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.342391] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.342430] page dumped because: kasan: bad access detected
[   32.342460] 
[   32.342478] Memory state around the buggy address:
[   32.342507]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.342549]  fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.342659] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.342705]                                                           ^
[   32.342883]  fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.342924]  fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.342967] ==================================================================
[   32.333682] ==================================================================
[   32.333767] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.333831] Write of size 1 at addr fff00000c8575eea by task kunit_try_catch/189
[   32.333880] 
[   32.333915] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.334148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.334186] Hardware name: linux,dummy-virt (DT)
[   32.334229] Call trace:
[   32.334251]  show_stack+0x20/0x38 (C)
[   32.334299]  dump_stack_lvl+0x8c/0xd0
[   32.334343]  print_report+0x118/0x5e8
[   32.334386]  kasan_report+0xdc/0x128
[   32.334428]  __asan_report_store1_noabort+0x20/0x30
[   32.334475]  krealloc_less_oob_helper+0xae4/0xc50
[   32.334524]  krealloc_less_oob+0x20/0x38
[   32.334569]  kunit_try_run_case+0x170/0x3f0
[   32.334620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.334671]  kthread+0x328/0x630
[   32.334711]  ret_from_fork+0x10/0x20
[   32.334767] 
[   32.334785] Allocated by task 189:
[   32.334813]  kasan_save_stack+0x3c/0x68
[   32.334850]  kasan_save_track+0x20/0x40
[   32.335061]  kasan_save_alloc_info+0x40/0x58
[   32.335113]  __kasan_krealloc+0x118/0x178
[   32.335273]  krealloc_noprof+0x128/0x360
[   32.335429]  krealloc_less_oob_helper+0x168/0xc50
[   32.335500]  krealloc_less_oob+0x20/0x38
[   32.335596]  kunit_try_run_case+0x170/0x3f0
[   32.335682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.335735]  kthread+0x328/0x630
[   32.335806]  ret_from_fork+0x10/0x20
[   32.335884] 
[   32.335981] The buggy address belongs to the object at fff00000c8575e00
[   32.335981]  which belongs to the cache kmalloc-256 of size 256
[   32.336112] The buggy address is located 33 bytes to the right of
[   32.336112]  allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9)
[   32.336177] 
[   32.336233] The buggy address belongs to the physical page:
[   32.336269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.336319] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.336588] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.336729] page_type: f5(slab)
[   32.336806] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.336873] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.336921] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.337002] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.337242] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.337351] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.337459] page dumped because: kasan: bad access detected
[   32.337537] 
[   32.337588] Memory state around the buggy address:
[   32.337691]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.337786]  fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.337828] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.338138]                                                           ^
[   32.338285]  fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.338359]  fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.338408] ==================================================================
[   32.382458] ==================================================================
[   32.382508] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.382564] Write of size 1 at addr fff00000c99620da by task kunit_try_catch/193
[   32.382612] 
[   32.382653] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.382735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.383219] Hardware name: linux,dummy-virt (DT)
[   32.383270] Call trace:
[   32.383315]  show_stack+0x20/0x38 (C)
[   32.383571]  dump_stack_lvl+0x8c/0xd0
[   32.383624]  print_report+0x118/0x5e8
[   32.383856]  kasan_report+0xdc/0x128
[   32.383916]  __asan_report_store1_noabort+0x20/0x30
[   32.384285]  krealloc_less_oob_helper+0xa80/0xc50
[   32.384501]  krealloc_large_less_oob+0x20/0x38
[   32.384741]  kunit_try_run_case+0x170/0x3f0
[   32.384950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.385146]  kthread+0x328/0x630
[   32.385277]  ret_from_fork+0x10/0x20
[   32.385495] 
[   32.385564] The buggy address belongs to the physical page:
[   32.385616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.385987] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.386242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.386413] page_type: f8(unknown)
[   32.386488] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.386575] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.386775] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.386875] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.387155] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.387240] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.387405] page dumped because: kasan: bad access detected
[   32.387457] 
[   32.387475] Memory state around the buggy address:
[   32.387512]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.387555]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.388017] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.388206]                                                     ^
[   32.388536]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.388611]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.388739] ==================================================================
[   32.323622] ==================================================================
[   32.323681] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.323733] Write of size 1 at addr fff00000c8575ed0 by task kunit_try_catch/189
[   32.323799] 
[   32.323832] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.323923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.323950] Hardware name: linux,dummy-virt (DT)
[   32.323981] Call trace:
[   32.324012]  show_stack+0x20/0x38 (C)
[   32.324060]  dump_stack_lvl+0x8c/0xd0
[   32.324111]  print_report+0x118/0x5e8
[   32.324155]  kasan_report+0xdc/0x128
[   32.324206]  __asan_report_store1_noabort+0x20/0x30
[   32.324255]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.324303]  krealloc_less_oob+0x20/0x38
[   32.324349]  kunit_try_run_case+0x170/0x3f0
[   32.324394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.324444]  kthread+0x328/0x630
[   32.324485]  ret_from_fork+0x10/0x20
[   32.324532] 
[   32.324550] Allocated by task 189:
[   32.324583]  kasan_save_stack+0x3c/0x68
[   32.324620]  kasan_save_track+0x20/0x40
[   32.324659]  kasan_save_alloc_info+0x40/0x58
[   32.324695]  __kasan_krealloc+0x118/0x178
[   32.324731]  krealloc_noprof+0x128/0x360
[   32.324775]  krealloc_less_oob_helper+0x168/0xc50
[   32.324815]  krealloc_less_oob+0x20/0x38
[   32.324851]  kunit_try_run_case+0x170/0x3f0
[   32.324886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.324993]  kthread+0x328/0x630
[   32.325034]  ret_from_fork+0x10/0x20
[   32.325566] 
[   32.325600] The buggy address belongs to the object at fff00000c8575e00
[   32.325600]  which belongs to the cache kmalloc-256 of size 256
[   32.325659] The buggy address is located 7 bytes to the right of
[   32.325659]  allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9)
[   32.325928] 
[   32.325976] The buggy address belongs to the physical page:
[   32.326042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.326096] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.326165] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.326218] page_type: f5(slab)
[   32.326275] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.326482] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.326662] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.326737] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.326841] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.326908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.326948] page dumped because: kasan: bad access detected
[   32.326978] 
[   32.327041] Memory state around the buggy address:
[   32.327072]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.327114]  fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.327155] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.327193]                                                  ^
[   32.327227]  fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.327308]  fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.327472] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   32.297301] ==================================================================
[   32.297437] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   32.297553] Write of size 1 at addr fff00000c8575ceb by task kunit_try_catch/187
[   32.297605] 
[   32.297682] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.297783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.297828] Hardware name: linux,dummy-virt (DT)
[   32.297861] Call trace:
[   32.297981]  show_stack+0x20/0x38 (C)
[   32.298035]  dump_stack_lvl+0x8c/0xd0
[   32.298081]  print_report+0x118/0x5e8
[   32.298249]  kasan_report+0xdc/0x128
[   32.298367]  __asan_report_store1_noabort+0x20/0x30
[   32.298419]  krealloc_more_oob_helper+0x60c/0x678
[   32.298467]  krealloc_more_oob+0x20/0x38
[   32.298701]  kunit_try_run_case+0x170/0x3f0
[   32.298775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.298909]  kthread+0x328/0x630
[   32.298971]  ret_from_fork+0x10/0x20
[   32.299108] 
[   32.299147] Allocated by task 187:
[   32.299177]  kasan_save_stack+0x3c/0x68
[   32.299216]  kasan_save_track+0x20/0x40
[   32.299276]  kasan_save_alloc_info+0x40/0x58
[   32.299314]  __kasan_krealloc+0x118/0x178
[   32.299348]  krealloc_noprof+0x128/0x360
[   32.299412]  krealloc_more_oob_helper+0x168/0x678
[   32.299453]  krealloc_more_oob+0x20/0x38
[   32.299490]  kunit_try_run_case+0x170/0x3f0
[   32.299526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.299707]  kthread+0x328/0x630
[   32.299841]  ret_from_fork+0x10/0x20
[   32.299932] 
[   32.300030] The buggy address belongs to the object at fff00000c8575c00
[   32.300030]  which belongs to the cache kmalloc-256 of size 256
[   32.300135] The buggy address is located 0 bytes to the right of
[   32.300135]  allocated 235-byte region [fff00000c8575c00, fff00000c8575ceb)
[   32.300254] 
[   32.300333] The buggy address belongs to the physical page:
[   32.300372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.300657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.300807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.300909] page_type: f5(slab)
[   32.301004] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.301109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.301223] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.301272] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.301724] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.301836] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.301971] page dumped because: kasan: bad access detected
[   32.302012] 
[   32.302031] Memory state around the buggy address:
[   32.302184]  fff00000c8575b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.302398]  fff00000c8575c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.302532] >fff00000c8575c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.302683]                                                           ^
[   32.302768]  fff00000c8575d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.302850]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.302934] ==================================================================
[   32.304001] ==================================================================
[   32.304056] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   32.304254] Write of size 1 at addr fff00000c8575cf0 by task kunit_try_catch/187
[   32.304339] 
[   32.304373] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.304490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.304713] Hardware name: linux,dummy-virt (DT)
[   32.304802] Call trace:
[   32.304853]  show_stack+0x20/0x38 (C)
[   32.305216]  dump_stack_lvl+0x8c/0xd0
[   32.305286]  print_report+0x118/0x5e8
[   32.305371]  kasan_report+0xdc/0x128
[   32.305416]  __asan_report_store1_noabort+0x20/0x30
[   32.305488]  krealloc_more_oob_helper+0x5c0/0x678
[   32.305552]  krealloc_more_oob+0x20/0x38
[   32.305618]  kunit_try_run_case+0x170/0x3f0
[   32.305693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.305976]  kthread+0x328/0x630
[   32.306046]  ret_from_fork+0x10/0x20
[   32.306119] 
[   32.306189] Allocated by task 187:
[   32.306237]  kasan_save_stack+0x3c/0x68
[   32.306294]  kasan_save_track+0x20/0x40
[   32.306329]  kasan_save_alloc_info+0x40/0x58
[   32.306412]  __kasan_krealloc+0x118/0x178
[   32.306447]  krealloc_noprof+0x128/0x360
[   32.306481]  krealloc_more_oob_helper+0x168/0x678
[   32.306566]  krealloc_more_oob+0x20/0x38
[   32.306603]  kunit_try_run_case+0x170/0x3f0
[   32.306638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.306945]  kthread+0x328/0x630
[   32.307093]  ret_from_fork+0x10/0x20
[   32.307184] 
[   32.307292] The buggy address belongs to the object at fff00000c8575c00
[   32.307292]  which belongs to the cache kmalloc-256 of size 256
[   32.307406] The buggy address is located 5 bytes to the right of
[   32.307406]  allocated 235-byte region [fff00000c8575c00, fff00000c8575ceb)
[   32.307520] 
[   32.307569] The buggy address belongs to the physical page:
[   32.307664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.308066] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.308173] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.308282] page_type: f5(slab)
[   32.308366] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.308465] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.308588] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.308685] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.308762] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.308810] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.308990] page dumped because: kasan: bad access detected
[   32.309021] 
[   32.309039] Memory state around the buggy address:
[   32.309070]  fff00000c8575b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.309112]  fff00000c8575c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.309334] >fff00000c8575c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.309391]                                                              ^
[   32.309661]  fff00000c8575d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.309822]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.309947] ==================================================================
[   32.354702] ==================================================================
[   32.354779] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   32.354846] Write of size 1 at addr fff00000c99620f0 by task kunit_try_catch/191
[   32.354930] 
[   32.355038] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.355203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.355280] Hardware name: linux,dummy-virt (DT)
[   32.355331] Call trace:
[   32.355353]  show_stack+0x20/0x38 (C)
[   32.355401]  dump_stack_lvl+0x8c/0xd0
[   32.355462]  print_report+0x118/0x5e8
[   32.355722]  kasan_report+0xdc/0x128
[   32.355937]  __asan_report_store1_noabort+0x20/0x30
[   32.356065]  krealloc_more_oob_helper+0x5c0/0x678
[   32.356265]  krealloc_large_more_oob+0x20/0x38
[   32.356385]  kunit_try_run_case+0x170/0x3f0
[   32.356498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.356605]  kthread+0x328/0x630
[   32.356688]  ret_from_fork+0x10/0x20
[   32.356795] 
[   32.356827] The buggy address belongs to the physical page:
[   32.356882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.357254] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.357316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.357369] page_type: f8(unknown)
[   32.357416] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.357465] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.357512] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.357558] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.357605] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.358221] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.358306] page dumped because: kasan: bad access detected
[   32.358363] 
[   32.358410] Memory state around the buggy address:
[   32.358613]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.358878]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.359052] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   32.359123]                                                              ^
[   32.359165]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.359478]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.359692] ==================================================================
[   32.350317] ==================================================================
[   32.350403] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   32.350465] Write of size 1 at addr fff00000c99620eb by task kunit_try_catch/191
[   32.350515] 
[   32.350552] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.350636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.350663] Hardware name: linux,dummy-virt (DT)
[   32.350694] Call trace:
[   32.350717]  show_stack+0x20/0x38 (C)
[   32.350779]  dump_stack_lvl+0x8c/0xd0
[   32.350830]  print_report+0x118/0x5e8
[   32.350873]  kasan_report+0xdc/0x128
[   32.350914]  __asan_report_store1_noabort+0x20/0x30
[   32.351326]  krealloc_more_oob_helper+0x60c/0x678
[   32.351427]  krealloc_large_more_oob+0x20/0x38
[   32.351498]  kunit_try_run_case+0x170/0x3f0
[   32.351580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.351678]  kthread+0x328/0x630
[   32.351742]  ret_from_fork+0x10/0x20
[   32.351859] 
[   32.351882] The buggy address belongs to the physical page:
[   32.351957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.352020] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.352066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.352119] page_type: f8(unknown)
[   32.352192] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.352242] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.352290] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.352336] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.352537] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.352598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.352689] page dumped because: kasan: bad access detected
[   32.352757] 
[   32.352776] Memory state around the buggy address:
[   32.352835]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.352898]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.352984] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   32.353043]                                                           ^
[   32.353110]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.353196]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.353266] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   32.259409] ==================================================================
[   32.259873] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   32.260289] Free of addr fff00000c99a0001 by task kunit_try_catch/181
[   32.260386] 
[   32.260431] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.260525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.260553] Hardware name: linux,dummy-virt (DT)
[   32.260822] Call trace:
[   32.260966]  show_stack+0x20/0x38 (C)
[   32.261031]  dump_stack_lvl+0x8c/0xd0
[   32.261079]  print_report+0x118/0x5e8
[   32.261293]  kasan_report_invalid_free+0xc0/0xe8
[   32.261563]  __kasan_kfree_large+0x5c/0xa8
[   32.261818]  free_large_kmalloc+0x68/0x150
[   32.262081]  kfree+0x270/0x3c8
[   32.262150]  kmalloc_large_invalid_free+0x108/0x270
[   32.262200]  kunit_try_run_case+0x170/0x3f0
[   32.262588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.262732]  kthread+0x328/0x630
[   32.262795]  ret_from_fork+0x10/0x20
[   32.262922] 
[   32.263013] The buggy address belongs to the physical page:
[   32.263453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0
[   32.263542] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.263812] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.264040] page_type: f8(unknown)
[   32.264104] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.264286] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.264362] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.264489] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.264584] head: 0bfffe0000000002 ffffc1ffc3266801 00000000ffffffff 00000000ffffffff
[   32.264853] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.265216] page dumped because: kasan: bad access detected
[   32.265282] 
[   32.265397] Memory state around the buggy address:
[   32.265434]  fff00000c999ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.265788]  fff00000c999ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.266050] >fff00000c99a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.266226]                    ^
[   32.266333]  fff00000c99a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.266388]  fff00000c99a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.266772] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   32.238218] ==================================================================
[   32.238401] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   32.238761] Read of size 1 at addr fff00000c99a0000 by task kunit_try_catch/179
[   32.238832] 
[   32.238990] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.239118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.239211] Hardware name: linux,dummy-virt (DT)
[   32.239247] Call trace:
[   32.239272]  show_stack+0x20/0x38 (C)
[   32.239324]  dump_stack_lvl+0x8c/0xd0
[   32.239725]  print_report+0x118/0x5e8
[   32.239819]  kasan_report+0xdc/0x128
[   32.240133]  __asan_report_load1_noabort+0x20/0x30
[   32.240403]  kmalloc_large_uaf+0x2cc/0x2f8
[   32.240608]  kunit_try_run_case+0x170/0x3f0
[   32.240724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.240817]  kthread+0x328/0x630
[   32.240942]  ret_from_fork+0x10/0x20
[   32.241100] 
[   32.241125] The buggy address belongs to the physical page:
[   32.241178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0
[   32.241521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.241699] raw: 0bfffe0000000000 ffffc1ffc3166108 fff00000da450d00 0000000000000000
[   32.241833] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   32.241877] page dumped because: kasan: bad access detected
[   32.241907] 
[   32.241926] Memory state around the buggy address:
[   32.241991]  fff00000c999ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.242045]  fff00000c999ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.242087] >fff00000c99a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.242129]                    ^
[   32.242165]  fff00000c99a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.242207]  fff00000c99a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.242246] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   32.220845] ==================================================================
[   32.221548] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   32.221785] Write of size 1 at addr fff00000c99a200a by task kunit_try_catch/177
[   32.221838] 
[   32.222053] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.222169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.222435] Hardware name: linux,dummy-virt (DT)
[   32.222486] Call trace:
[   32.222560]  show_stack+0x20/0x38 (C)
[   32.222619]  dump_stack_lvl+0x8c/0xd0
[   32.222687]  print_report+0x118/0x5e8
[   32.222739]  kasan_report+0xdc/0x128
[   32.222795]  __asan_report_store1_noabort+0x20/0x30
[   32.222843]  kmalloc_large_oob_right+0x278/0x2b8
[   32.222896]  kunit_try_run_case+0x170/0x3f0
[   32.223128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.223531]  kthread+0x328/0x630
[   32.223587]  ret_from_fork+0x10/0x20
[   32.223902] 
[   32.223951] The buggy address belongs to the physical page:
[   32.223994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0
[   32.224050] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.224119] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.224192] page_type: f8(unknown)
[   32.224241] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.224297] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.224362] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.224420] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.224471] head: 0bfffe0000000002 ffffc1ffc3266801 00000000ffffffff 00000000ffffffff
[   32.224519] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.224568] page dumped because: kasan: bad access detected
[   32.224613] 
[   32.224632] Memory state around the buggy address:
[   32.224685]  fff00000c99a1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.224741]  fff00000c99a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.224805] >fff00000c99a2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.225233]                       ^
[   32.225653]  fff00000c99a2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.225712]  fff00000c99a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.225773] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   32.194126] ==================================================================
[   32.194658] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   32.194728] Write of size 1 at addr fff00000c6605f00 by task kunit_try_catch/175
[   32.194793] 
[   32.195089] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.195671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.195739] Hardware name: linux,dummy-virt (DT)
[   32.196129] Call trace:
[   32.196210]  show_stack+0x20/0x38 (C)
[   32.196284]  dump_stack_lvl+0x8c/0xd0
[   32.196411]  print_report+0x118/0x5e8
[   32.196508]  kasan_report+0xdc/0x128
[   32.196585]  __asan_report_store1_noabort+0x20/0x30
[   32.196736]  kmalloc_big_oob_right+0x2a4/0x2f0
[   32.197036]  kunit_try_run_case+0x170/0x3f0
[   32.197314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.197418]  kthread+0x328/0x630
[   32.197565]  ret_from_fork+0x10/0x20
[   32.197660] 
[   32.197679] Allocated by task 175:
[   32.197937]  kasan_save_stack+0x3c/0x68
[   32.198215]  kasan_save_track+0x20/0x40
[   32.198595]  kasan_save_alloc_info+0x40/0x58
[   32.198740]  __kasan_kmalloc+0xd4/0xd8
[   32.198894]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.199084]  kmalloc_big_oob_right+0xb8/0x2f0
[   32.199128]  kunit_try_run_case+0x170/0x3f0
[   32.199187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.199582]  kthread+0x328/0x630
[   32.199740]  ret_from_fork+0x10/0x20
[   32.199809] 
[   32.199903] The buggy address belongs to the object at fff00000c6604000
[   32.199903]  which belongs to the cache kmalloc-8k of size 8192
[   32.200000] The buggy address is located 0 bytes to the right of
[   32.200000]  allocated 7936-byte region [fff00000c6604000, fff00000c6605f00)
[   32.200098] 
[   32.200326] The buggy address belongs to the physical page:
[   32.200643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600
[   32.200826] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.200905] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.201236] page_type: f5(slab)
[   32.201503] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   32.201635] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   32.201698] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   32.201927] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   32.202261] head: 0bfffe0000000003 ffffc1ffc3198001 00000000ffffffff 00000000ffffffff
[   32.202355] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   32.202433] page dumped because: kasan: bad access detected
[   32.202534] 
[   32.202589] Memory state around the buggy address:
[   32.202625]  fff00000c6605e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.202771]  fff00000c6605e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.203017] >fff00000c6605f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.203275]                    ^
[   32.203389]  fff00000c6605f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.203512]  fff00000c6606000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.203552] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   32.176905] ==================================================================
[   32.176966] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   32.177021] Write of size 1 at addr fff00000c3f77f78 by task kunit_try_catch/173
[   32.177564] 
[   32.177626] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.178002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.178044] Hardware name: linux,dummy-virt (DT)
[   32.178250] Call trace:
[   32.178293]  show_stack+0x20/0x38 (C)
[   32.178384]  dump_stack_lvl+0x8c/0xd0
[   32.178616]  print_report+0x118/0x5e8
[   32.178773]  kasan_report+0xdc/0x128
[   32.178907]  __asan_report_store1_noabort+0x20/0x30
[   32.179226]  kmalloc_track_caller_oob_right+0x418/0x488
[   32.179280]  kunit_try_run_case+0x170/0x3f0
[   32.179620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.179914]  kthread+0x328/0x630
[   32.180034]  ret_from_fork+0x10/0x20
[   32.180152] 
[   32.180239] Allocated by task 173:
[   32.180297]  kasan_save_stack+0x3c/0x68
[   32.180356]  kasan_save_track+0x20/0x40
[   32.180464]  kasan_save_alloc_info+0x40/0x58
[   32.180561]  __kasan_kmalloc+0xd4/0xd8
[   32.180791]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   32.180875]  kmalloc_track_caller_oob_right+0x184/0x488
[   32.181080]  kunit_try_run_case+0x170/0x3f0
[   32.181133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.181177]  kthread+0x328/0x630
[   32.181209]  ret_from_fork+0x10/0x20
[   32.181253] 
[   32.181273] The buggy address belongs to the object at fff00000c3f77f00
[   32.181273]  which belongs to the cache kmalloc-128 of size 128
[   32.181355] The buggy address is located 0 bytes to the right of
[   32.181355]  allocated 120-byte region [fff00000c3f77f00, fff00000c3f77f78)
[   32.181428] 
[   32.181456] The buggy address belongs to the physical page:
[   32.181490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77
[   32.181540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.181597] page_type: f5(slab)
[   32.181651] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.181702] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.181740] page dumped because: kasan: bad access detected
[   32.182470] 
[   32.182526] Memory state around the buggy address:
[   32.182579]  fff00000c3f77e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.182866]  fff00000c3f77e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.183078] >fff00000c3f77f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.183248]                                                                 ^
[   32.183587]  fff00000c3f77f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.183798]  fff00000c3f78000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.183867] ==================================================================
[   32.165422] ==================================================================
[   32.165714] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   32.165821] Write of size 1 at addr fff00000c3f77e78 by task kunit_try_catch/173
[   32.166050] 
[   32.166102] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.166552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.166704] Hardware name: linux,dummy-virt (DT)
[   32.166775] Call trace:
[   32.166801]  show_stack+0x20/0x38 (C)
[   32.166935]  dump_stack_lvl+0x8c/0xd0
[   32.167042]  print_report+0x118/0x5e8
[   32.167117]  kasan_report+0xdc/0x128
[   32.167193]  __asan_report_store1_noabort+0x20/0x30
[   32.167582]  kmalloc_track_caller_oob_right+0x40c/0x488
[   32.167782]  kunit_try_run_case+0x170/0x3f0
[   32.167879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.168013]  kthread+0x328/0x630
[   32.168108]  ret_from_fork+0x10/0x20
[   32.168626] 
[   32.168765] Allocated by task 173:
[   32.168869]  kasan_save_stack+0x3c/0x68
[   32.168912]  kasan_save_track+0x20/0x40
[   32.169249]  kasan_save_alloc_info+0x40/0x58
[   32.169479]  __kasan_kmalloc+0xd4/0xd8
[   32.169541]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   32.169683]  kmalloc_track_caller_oob_right+0xa8/0x488
[   32.169971]  kunit_try_run_case+0x170/0x3f0
[   32.170273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.170360]  kthread+0x328/0x630
[   32.170429]  ret_from_fork+0x10/0x20
[   32.170528] 
[   32.170597] The buggy address belongs to the object at fff00000c3f77e00
[   32.170597]  which belongs to the cache kmalloc-128 of size 128
[   32.170675] The buggy address is located 0 bytes to the right of
[   32.170675]  allocated 120-byte region [fff00000c3f77e00, fff00000c3f77e78)
[   32.171030] 
[   32.171282] The buggy address belongs to the physical page:
[   32.171349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77
[   32.171467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.171574] page_type: f5(slab)
[   32.171710] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.171927] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.172083] page dumped because: kasan: bad access detected
[   32.172230] 
[   32.172290] Memory state around the buggy address:
[   32.172477]  fff00000c3f77d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.172562]  fff00000c3f77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.172619] >fff00000c3f77e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.172824]                                                                 ^
[   32.173106]  fff00000c3f77e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.173164]  fff00000c3f77f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.173254] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   32.144722] ==================================================================
[   32.144853] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   32.144918] Read of size 1 at addr fff00000c9879000 by task kunit_try_catch/171
[   32.145186] 
[   32.145290] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.145400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.145435] Hardware name: linux,dummy-virt (DT)
[   32.145619] Call trace:
[   32.145662]  show_stack+0x20/0x38 (C)
[   32.145866]  dump_stack_lvl+0x8c/0xd0
[   32.146183]  print_report+0x118/0x5e8
[   32.146357]  kasan_report+0xdc/0x128
[   32.146853]  __asan_report_load1_noabort+0x20/0x30
[   32.146955]  kmalloc_node_oob_right+0x2f4/0x330
[   32.147218]  kunit_try_run_case+0x170/0x3f0
[   32.147306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.147527]  kthread+0x328/0x630
[   32.147853]  ret_from_fork+0x10/0x20
[   32.148016] 
[   32.148075] Allocated by task 171:
[   32.148198]  kasan_save_stack+0x3c/0x68
[   32.148275]  kasan_save_track+0x20/0x40
[   32.148385]  kasan_save_alloc_info+0x40/0x58
[   32.148460]  __kasan_kmalloc+0xd4/0xd8
[   32.148500]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   32.148578]  kmalloc_node_oob_right+0xbc/0x330
[   32.148624]  kunit_try_run_case+0x170/0x3f0
[   32.148660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.148700]  kthread+0x328/0x630
[   32.148742]  ret_from_fork+0x10/0x20
[   32.148799] 
[   32.148829] The buggy address belongs to the object at fff00000c9878000
[   32.148829]  which belongs to the cache kmalloc-4k of size 4096
[   32.148896] The buggy address is located 0 bytes to the right of
[   32.148896]  allocated 4096-byte region [fff00000c9878000, fff00000c9879000)
[   32.148968] 
[   32.148989] The buggy address belongs to the physical page:
[   32.149175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109878
[   32.149296] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.149378] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.149460] page_type: f5(slab)
[   32.149502] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   32.149563] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   32.149633] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122
[   32.149697] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   32.149765] head: 0bfffe0000000003 ffffc1ffc3261e01 00000000ffffffff 00000000ffffffff
[   32.149813] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   32.150153] page dumped because: kasan: bad access detected
[   32.150563] 
[   32.150616] Memory state around the buggy address:
[   32.150934]  fff00000c9878f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.151292]  fff00000c9878f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.151366] >fff00000c9879000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.151405]                    ^
[   32.152028]  fff00000c9879080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.152119]  fff00000c9879100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.152187] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   32.130324] ==================================================================
[   32.130417] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   32.130477] Read of size 1 at addr fff00000c868343f by task kunit_try_catch/169
[   32.131372] 
[   32.131424] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.131512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.131539] Hardware name: linux,dummy-virt (DT)
[   32.131572] Call trace:
[   32.131596]  show_stack+0x20/0x38 (C)
[   32.131646]  dump_stack_lvl+0x8c/0xd0
[   32.131693]  print_report+0x118/0x5e8
[   32.131736]  kasan_report+0xdc/0x128
[   32.131789]  __asan_report_load1_noabort+0x20/0x30
[   32.131837]  kmalloc_oob_left+0x2ec/0x320
[   32.131884]  kunit_try_run_case+0x170/0x3f0
[   32.131930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.131981]  kthread+0x328/0x630
[   32.132023]  ret_from_fork+0x10/0x20
[   32.132071] 
[   32.132090] Allocated by task 110:
[   32.132121]  kasan_save_stack+0x3c/0x68
[   32.132158]  kasan_save_track+0x20/0x40
[   32.132191]  kasan_save_alloc_info+0x40/0x58
[   32.132227]  __kasan_kmalloc+0xd4/0xd8
[   32.132260]  __kmalloc_noprof+0x198/0x4c8
[   32.132298]  kunit_kmalloc_array+0x34/0x88
[   32.132333]  test_readerwriter+0x3b0/0x948
[   32.132373]  kunit_try_run_case+0x170/0x3f0
[   32.132409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.132450]  kthread+0x328/0x630
[   32.132481]  ret_from_fork+0x10/0x20
[   32.132515] 
[   32.132551] Freed by task 112:
[   32.132591]  kasan_save_stack+0x3c/0x68
[   32.132626]  kasan_save_track+0x20/0x40
[   32.132660]  kasan_save_free_info+0x4c/0x78
[   32.132696]  __kasan_slab_free+0x6c/0x98
[   32.132729]  kfree+0x214/0x3c8
[   32.132773]  kfree_action_wrapper+0x18/0x30
[   32.132810]  __kunit_action_free+0x58/0x80
[   32.132845]  kunit_remove_resource+0x14c/0x1f8
[   32.132882]  kunit_cleanup+0x6c/0x108
[   32.132915]  kunit_try_run_case_cleanup+0xa4/0xe0
[   32.132952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.132992]  kthread+0x328/0x630
[   32.133024]  ret_from_fork+0x10/0x20
[   32.133065] 
[   32.133087] The buggy address belongs to the object at fff00000c8683420
[   32.133087]  which belongs to the cache kmalloc-16 of size 16
[   32.133142] The buggy address is located 15 bytes to the right of
[   32.133142]  allocated 16-byte region [fff00000c8683420, fff00000c8683430)
[   32.133204] 
[   32.133225] The buggy address belongs to the physical page:
[   32.133265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683
[   32.133317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.133366] page_type: f5(slab)
[   32.133406] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.133454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.133493] page dumped because: kasan: bad access detected
[   32.133523] 
[   32.133541] Memory state around the buggy address:
[   32.133572]  fff00000c8683300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.133614]  fff00000c8683380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.133657] >fff00000c8683400: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   32.133694]                                         ^
[   32.133727]  fff00000c8683480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.134492]  fff00000c8683500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.134570] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   32.094826] ==================================================================
[   32.095144] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   32.096066] Write of size 1 at addr fff00000c3f77d73 by task kunit_try_catch/167
[   32.096384] 
[   32.098270] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.098475] Tainted: [N]=TEST
[   32.098522] Hardware name: linux,dummy-virt (DT)
[   32.098835] Call trace:
[   32.099460]  show_stack+0x20/0x38 (C)
[   32.099720]  dump_stack_lvl+0x8c/0xd0
[   32.099937]  print_report+0x118/0x5e8
[   32.099985]  kasan_report+0xdc/0x128
[   32.100029]  __asan_report_store1_noabort+0x20/0x30
[   32.100080]  kmalloc_oob_right+0x5a4/0x660
[   32.100126]  kunit_try_run_case+0x170/0x3f0
[   32.100368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.100534]  kthread+0x328/0x630
[   32.100648]  ret_from_fork+0x10/0x20
[   32.101662] 
[   32.101712] Allocated by task 167:
[   32.102164]  kasan_save_stack+0x3c/0x68
[   32.102570]  kasan_save_track+0x20/0x40
[   32.102669]  kasan_save_alloc_info+0x40/0x58
[   32.102790]  __kasan_kmalloc+0xd4/0xd8
[   32.102845]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.103198]  kmalloc_oob_right+0xb0/0x660
[   32.103443]  kunit_try_run_case+0x170/0x3f0
[   32.103670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.103814]  kthread+0x328/0x630
[   32.103904]  ret_from_fork+0x10/0x20
[   32.104017] 
[   32.104113] The buggy address belongs to the object at fff00000c3f77d00
[   32.104113]  which belongs to the cache kmalloc-128 of size 128
[   32.104246] The buggy address is located 0 bytes to the right of
[   32.104246]  allocated 115-byte region [fff00000c3f77d00, fff00000c3f77d73)
[   32.104333] 
[   32.104447] The buggy address belongs to the physical page:
[   32.105742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77
[   32.106173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.107320] page_type: f5(slab)
[   32.108529] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.108704] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.109296] page dumped because: kasan: bad access detected
[   32.109463] 
[   32.109493] Memory state around the buggy address:
[   32.109784]  fff00000c3f77c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.109865]  fff00000c3f77c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.109945] >fff00000c3f77d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.110024]                                                              ^
[   32.110127]  fff00000c3f77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.110187]  fff00000c3f77e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.110267] ==================================================================
[   32.112431] ==================================================================
[   32.112474] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   32.112532] Write of size 1 at addr fff00000c3f77d78 by task kunit_try_catch/167
[   32.112581] 
[   32.112618] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.112795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.112886] Hardware name: linux,dummy-virt (DT)
[   32.112958] Call trace:
[   32.113028]  show_stack+0x20/0x38 (C)
[   32.113112]  dump_stack_lvl+0x8c/0xd0
[   32.113189]  print_report+0x118/0x5e8
[   32.113235]  kasan_report+0xdc/0x128
[   32.113278]  __asan_report_store1_noabort+0x20/0x30
[   32.113326]  kmalloc_oob_right+0x538/0x660
[   32.113593]  kunit_try_run_case+0x170/0x3f0
[   32.113719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.113821]  kthread+0x328/0x630
[   32.113898]  ret_from_fork+0x10/0x20
[   32.113946] 
[   32.114215] Allocated by task 167:
[   32.114292]  kasan_save_stack+0x3c/0x68
[   32.114547]  kasan_save_track+0x20/0x40
[   32.114607]  kasan_save_alloc_info+0x40/0x58
[   32.114725]  __kasan_kmalloc+0xd4/0xd8
[   32.114820]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.114908]  kmalloc_oob_right+0xb0/0x660
[   32.114974]  kunit_try_run_case+0x170/0x3f0
[   32.115013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.115222]  kthread+0x328/0x630
[   32.115328]  ret_from_fork+0x10/0x20
[   32.115415] 
[   32.115498] The buggy address belongs to the object at fff00000c3f77d00
[   32.115498]  which belongs to the cache kmalloc-128 of size 128
[   32.115618] The buggy address is located 5 bytes to the right of
[   32.115618]  allocated 115-byte region [fff00000c3f77d00, fff00000c3f77d73)
[   32.115683] 
[   32.115703] The buggy address belongs to the physical page:
[   32.115767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77
[   32.115823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.116087] page_type: f5(slab)
[   32.116225] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.116324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.116464] page dumped because: kasan: bad access detected
[   32.116515] 
[   32.116533] Memory state around the buggy address:
[   32.116588]  fff00000c3f77c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.116900]  fff00000c3f77c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.117012] >fff00000c3f77d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.117136]                                                                 ^
[   32.117228]  fff00000c3f77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.117274]  fff00000c3f77e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.117459] ==================================================================
[   32.118536] ==================================================================
[   32.118586] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   32.118636] Read of size 1 at addr fff00000c3f77d80 by task kunit_try_catch/167
[   32.118683] 
[   32.118715] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.118932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.119008] Hardware name: linux,dummy-virt (DT)
[   32.119040] Call trace:
[   32.119063]  show_stack+0x20/0x38 (C)
[   32.119152]  dump_stack_lvl+0x8c/0xd0
[   32.119288]  print_report+0x118/0x5e8
[   32.119376]  kasan_report+0xdc/0x128
[   32.119517]  __asan_report_load1_noabort+0x20/0x30
[   32.119581]  kmalloc_oob_right+0x5d0/0x660
[   32.119628]  kunit_try_run_case+0x170/0x3f0
[   32.119673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.119744]  kthread+0x328/0x630
[   32.119797]  ret_from_fork+0x10/0x20
[   32.119844] 
[   32.119862] Allocated by task 167:
[   32.119890]  kasan_save_stack+0x3c/0x68
[   32.119926]  kasan_save_track+0x20/0x40
[   32.119960]  kasan_save_alloc_info+0x40/0x58
[   32.119996]  __kasan_kmalloc+0xd4/0xd8
[   32.120028]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.120068]  kmalloc_oob_right+0xb0/0x660
[   32.120104]  kunit_try_run_case+0x170/0x3f0
[   32.120139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.120180]  kthread+0x328/0x630
[   32.120211]  ret_from_fork+0x10/0x20
[   32.120245] 
[   32.120264] The buggy address belongs to the object at fff00000c3f77d00
[   32.120264]  which belongs to the cache kmalloc-128 of size 128
[   32.120319] The buggy address is located 13 bytes to the right of
[   32.120319]  allocated 115-byte region [fff00000c3f77d00, fff00000c3f77d73)
[   32.120385] 
[   32.120405] The buggy address belongs to the physical page:
[   32.120437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77
[   32.120487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.120534] page_type: f5(slab)
[   32.120570] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.120884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.120954] page dumped because: kasan: bad access detected
[   32.121027] 
[   32.121095] Memory state around the buggy address:
[   32.121206]  fff00000c3f77c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.121270]  fff00000c3f77d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.121311] >fff00000c3f77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.121348]                    ^
[   32.121374]  fff00000c3f77e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.121538]  fff00000c3f77e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.121604] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  109.493246] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/689
[  109.496018] Modules linked in:
[  109.496719] CPU: 1 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[  109.497910] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  109.498637] Hardware name: linux,dummy-virt (DT)
[  109.499335] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.500375] pc : intlog10+0x38/0x48
[  109.500571] lr : intlog10_test+0xe4/0x200
[  109.500781] sp : ffff800082207c10
[  109.500942] x29: ffff800082207c90 x28: 0000000000000000 x27: 0000000000000000
[  109.501295] x26: 1ffe0000195d2aa1 x25: 0000000000000000 x24: ffff800082207ce0
[  109.501633] x23: ffff800082207d00 x22: 0000000000000000 x21: 1ffff00010440f82
[  109.502370] x20: ffffa667ef051e60 x19: ffff800080087990 x18: 000000009d7fc3b2
[  109.503284] x17: 00000000fda7d2e1 x16: fff00000c99d4c3c x15: fff00000ff616b48
[  109.505399] x14: 0000000000018fff x13: 1ffe00001b4899dd x12: ffff74ccfe5eb189
[  109.506166] x11: 1ffff4ccfe5eb188 x10: ffff74ccfe5eb188 x9 : ffffa667ec65b7c4
[  109.506903] x8 : ffffa667f2f58c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.507685] x5 : ffff700010440f82 x4 : 1ffff00010010f3b x3 : 1ffff4ccfde0a3cc
[  109.508529] x2 : 1ffff4ccfde0a3cc x1 : 0000000000000003 x0 : 0000000000000000
[  109.509429] Call trace:
[  109.509708]  intlog10+0x38/0x48 (P)
[  109.510119]  kunit_try_run_case+0x170/0x3f0
[  109.510551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.511113]  kthread+0x328/0x630
[  109.511375]  ret_from_fork+0x10/0x20
[  109.511570] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  109.444984] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671
[  109.446636] Modules linked in:
[  109.447101] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[  109.448306] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  109.448967] Hardware name: linux,dummy-virt (DT)
[  109.449461] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.449922] pc : intlog2+0xd8/0xf8
[  109.450104] lr : intlog2_test+0xe4/0x200
[  109.450299] sp : ffff800082197c10
[  109.450458] x29: ffff800082197c90 x28: 0000000000000000 x27: 0000000000000000
[  109.450942] x26: 1ffe000018d55d61 x25: 0000000000000000 x24: ffff800082197ce0
[  109.451872] x23: ffff800082197d00 x22: 0000000000000000 x21: 1ffff00010432f82
[  109.452606] x20: ffffa667ef051d60 x19: ffff800080087990 x18: 000000000a57c5dc
[  109.453334] x17: 00000000ea82a36e x16: fff00000c99d4c3c x15: fff00000ff616b48
[  109.454093] x14: 0000000000018fff x13: 1ffe00001b4899dd x12: ffff74ccfe5eb189
[  109.454842] x11: 1ffff4ccfe5eb188 x10: ffff74ccfe5eb188 x9 : ffffa667ec65b9c4
[  109.455672] x8 : ffffa667f2f58c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  109.456338] x5 : ffff700010432f82 x4 : 1ffff00010010f3b x3 : 1ffff4ccfde0a3ac
[  109.456678] x2 : 1ffff4ccfde0a3ac x1 : 0000000000000003 x0 : 0000000000000000
[  109.457417] Call trace:
[  109.457690]  intlog2+0xd8/0xf8 (P)
[  109.458081]  kunit_try_run_case+0x170/0x3f0
[  109.458542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.458884]  kthread+0x328/0x630
[  109.459588]  ret_from_fork+0x10/0x20
[  109.460023] ---[ end trace 0000000000000000 ]---