Hay
Date
July 25, 2025, 3:13 a.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   35.617301] ==================================================================
[   35.617534] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   35.617622] Write of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317
[   35.617982] 
[   35.618043] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.618382] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.618486] Hardware name: linux,dummy-virt (DT)
[   35.618566] Call trace:
[   35.618615]  show_stack+0x20/0x38 (C)
[   35.618751]  dump_stack_lvl+0x8c/0xd0
[   35.618844]  print_report+0x118/0x5e8
[   35.618894]  kasan_report+0xdc/0x128
[   35.618997]  kasan_check_range+0x100/0x1a8
[   35.619098]  __kasan_check_write+0x20/0x30
[   35.619333]  copy_user_test_oob+0x234/0xec8
[   35.619576]  kunit_try_run_case+0x170/0x3f0
[   35.619761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.619860]  kthread+0x328/0x630
[   35.619945]  ret_from_fork+0x10/0x20
[   35.620042] 
[   35.620087] Allocated by task 317:
[   35.620134]  kasan_save_stack+0x3c/0x68
[   35.620186]  kasan_save_track+0x20/0x40
[   35.620224]  kasan_save_alloc_info+0x40/0x58
[   35.620265]  __kasan_kmalloc+0xd4/0xd8
[   35.620301]  __kmalloc_noprof+0x198/0x4c8
[   35.620343]  kunit_kmalloc_array+0x34/0x88
[   35.620383]  copy_user_test_oob+0xac/0xec8
[   35.620424]  kunit_try_run_case+0x170/0x3f0
[   35.620472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.620517]  kthread+0x328/0x630
[   35.620553]  ret_from_fork+0x10/0x20
[   35.620601] 
[   35.620624] The buggy address belongs to the object at fff00000c9a8b900
[   35.620624]  which belongs to the cache kmalloc-128 of size 128
[   35.621206] The buggy address is located 0 bytes inside of
[   35.621206]  allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978)
[   35.621666] 
[   35.621870] The buggy address belongs to the physical page:
[   35.621967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   35.622148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.622265] page_type: f5(slab)
[   35.622829] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.622900] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.623046] page dumped because: kasan: bad access detected
[   35.623114] 
[   35.623233] Memory state around the buggy address:
[   35.623350]  fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.623397]  fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.623448] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.623878]                                                                 ^
[   35.623973]  fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.624145]  fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.624208] ==================================================================
[   35.677243] ==================================================================
[   35.677307] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   35.677368] Read of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317
[   35.677436] 
[   35.677472] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.677564] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.677598] Hardware name: linux,dummy-virt (DT)
[   35.677802] Call trace:
[   35.677842]  show_stack+0x20/0x38 (C)
[   35.677897]  dump_stack_lvl+0x8c/0xd0
[   35.677950]  print_report+0x118/0x5e8
[   35.678000]  kasan_report+0xdc/0x128
[   35.678046]  kasan_check_range+0x100/0x1a8
[   35.678102]  __kasan_check_read+0x20/0x30
[   35.678150]  copy_user_test_oob+0x4a0/0xec8
[   35.678210]  kunit_try_run_case+0x170/0x3f0
[   35.678260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.678323]  kthread+0x328/0x630
[   35.678369]  ret_from_fork+0x10/0x20
[   35.678418] 
[   35.678440] Allocated by task 317:
[   35.678480]  kasan_save_stack+0x3c/0x68
[   35.678523]  kasan_save_track+0x20/0x40
[   35.678561]  kasan_save_alloc_info+0x40/0x58
[   35.678601]  __kasan_kmalloc+0xd4/0xd8
[   35.678926]  __kmalloc_noprof+0x198/0x4c8
[   35.679024]  kunit_kmalloc_array+0x34/0x88
[   35.679438]  copy_user_test_oob+0xac/0xec8
[   35.679918]  kunit_try_run_case+0x170/0x3f0
[   35.680003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.680086]  kthread+0x328/0x630
[   35.680164]  ret_from_fork+0x10/0x20
[   35.680612] 
[   35.681030] The buggy address belongs to the object at fff00000c9a8b900
[   35.681030]  which belongs to the cache kmalloc-128 of size 128
[   35.681323] The buggy address is located 0 bytes inside of
[   35.681323]  allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978)
[   35.681427] 
[   35.681585] The buggy address belongs to the physical page:
[   35.681800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   35.682253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.682967] page_type: f5(slab)
[   35.683093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.683155] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.683327] page dumped because: kasan: bad access detected
[   35.683497] 
[   35.683693] Memory state around the buggy address:
[   35.684147]  fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.684343]  fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.684408] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.684616]                                                                 ^
[   35.684826]  fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.684967]  fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.685082] ==================================================================
[   35.668193] ==================================================================
[   35.668397] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   35.668458] Write of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317
[   35.668776] 
[   35.668942] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.669308] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.669449] Hardware name: linux,dummy-virt (DT)
[   35.669517] Call trace:
[   35.669544]  show_stack+0x20/0x38 (C)
[   35.669597]  dump_stack_lvl+0x8c/0xd0
[   35.669700]  print_report+0x118/0x5e8
[   35.669748]  kasan_report+0xdc/0x128
[   35.669822]  kasan_check_range+0x100/0x1a8
[   35.670061]  __kasan_check_write+0x20/0x30
[   35.670396]  copy_user_test_oob+0x434/0xec8
[   35.670489]  kunit_try_run_case+0x170/0x3f0
[   35.670541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.670597]  kthread+0x328/0x630
[   35.670748]  ret_from_fork+0x10/0x20
[   35.670802] 
[   35.670842] Allocated by task 317:
[   35.670877]  kasan_save_stack+0x3c/0x68
[   35.670927]  kasan_save_track+0x20/0x40
[   35.671004]  kasan_save_alloc_info+0x40/0x58
[   35.671052]  __kasan_kmalloc+0xd4/0xd8
[   35.671091]  __kmalloc_noprof+0x198/0x4c8
[   35.671135]  kunit_kmalloc_array+0x34/0x88
[   35.671321]  copy_user_test_oob+0xac/0xec8
[   35.671635]  kunit_try_run_case+0x170/0x3f0
[   35.671729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.671916]  kthread+0x328/0x630
[   35.671967]  ret_from_fork+0x10/0x20
[   35.672170] 
[   35.672215] The buggy address belongs to the object at fff00000c9a8b900
[   35.672215]  which belongs to the cache kmalloc-128 of size 128
[   35.672719] The buggy address is located 0 bytes inside of
[   35.672719]  allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978)
[   35.673153] 
[   35.673257] The buggy address belongs to the physical page:
[   35.673337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   35.673424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.674003] page_type: f5(slab)
[   35.674249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.674418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.674462] page dumped because: kasan: bad access detected
[   35.674814] 
[   35.674950] Memory state around the buggy address:
[   35.675130]  fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.675366]  fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.675467] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.675614]                                                                 ^
[   35.675859]  fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.676151]  fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.676277] ==================================================================
[   35.630017] ==================================================================
[   35.630981] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   35.631114] Read of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317
[   35.631711] 
[   35.631810] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.631951] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.632270] Hardware name: linux,dummy-virt (DT)
[   35.632338] Call trace:
[   35.632427]  show_stack+0x20/0x38 (C)
[   35.632502]  dump_stack_lvl+0x8c/0xd0
[   35.632720]  print_report+0x118/0x5e8
[   35.632810]  kasan_report+0xdc/0x128
[   35.632857]  kasan_check_range+0x100/0x1a8
[   35.633278]  __kasan_check_read+0x20/0x30
[   35.633620]  copy_user_test_oob+0x728/0xec8
[   35.633712]  kunit_try_run_case+0x170/0x3f0
[   35.633849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.633918]  kthread+0x328/0x630
[   35.634246]  ret_from_fork+0x10/0x20
[   35.634360] 
[   35.634418] Allocated by task 317:
[   35.634450]  kasan_save_stack+0x3c/0x68
[   35.634692]  kasan_save_track+0x20/0x40
[   35.634777]  kasan_save_alloc_info+0x40/0x58
[   35.634959]  __kasan_kmalloc+0xd4/0xd8
[   35.635221]  __kmalloc_noprof+0x198/0x4c8
[   35.635376]  kunit_kmalloc_array+0x34/0x88
[   35.635494]  copy_user_test_oob+0xac/0xec8
[   35.635595]  kunit_try_run_case+0x170/0x3f0
[   35.635917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.636080]  kthread+0x328/0x630
[   35.636167]  ret_from_fork+0x10/0x20
[   35.636626] 
[   35.636796] The buggy address belongs to the object at fff00000c9a8b900
[   35.636796]  which belongs to the cache kmalloc-128 of size 128
[   35.636901] The buggy address is located 0 bytes inside of
[   35.636901]  allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978)
[   35.637304] 
[   35.637584] The buggy address belongs to the physical page:
[   35.638036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   35.638115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.638427] page_type: f5(slab)
[   35.638537] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.638841] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.638986] page dumped because: kasan: bad access detected
[   35.639024] 
[   35.639045] Memory state around the buggy address:
[   35.639095]  fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.639355]  fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.639674] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.639766]                                                                 ^
[   35.640176]  fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.640612]  fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.640742] ==================================================================
[   35.650656] ==================================================================
[   35.650987] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   35.651419] Write of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317
[   35.651490] 
[   35.651843] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.652309] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.652426] Hardware name: linux,dummy-virt (DT)
[   35.652471] Call trace:
[   35.652533]  show_stack+0x20/0x38 (C)
[   35.652656]  dump_stack_lvl+0x8c/0xd0
[   35.652723]  print_report+0x118/0x5e8
[   35.652769]  kasan_report+0xdc/0x128
[   35.652815]  kasan_check_range+0x100/0x1a8
[   35.652862]  __kasan_check_write+0x20/0x30
[   35.652911]  copy_user_test_oob+0x35c/0xec8
[   35.652961]  kunit_try_run_case+0x170/0x3f0
[   35.653025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.653085]  kthread+0x328/0x630
[   35.653138]  ret_from_fork+0x10/0x20
[   35.653214] 
[   35.653251] Allocated by task 317:
[   35.653283]  kasan_save_stack+0x3c/0x68
[   35.653324]  kasan_save_track+0x20/0x40
[   35.653372]  kasan_save_alloc_info+0x40/0x58
[   35.653413]  __kasan_kmalloc+0xd4/0xd8
[   35.653451]  __kmalloc_noprof+0x198/0x4c8
[   35.653494]  kunit_kmalloc_array+0x34/0x88
[   35.653533]  copy_user_test_oob+0xac/0xec8
[   35.653574]  kunit_try_run_case+0x170/0x3f0
[   35.653613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.653668]  kthread+0x328/0x630
[   35.653713]  ret_from_fork+0x10/0x20
[   35.653761] 
[   35.653783] The buggy address belongs to the object at fff00000c9a8b900
[   35.653783]  which belongs to the cache kmalloc-128 of size 128
[   35.653861] The buggy address is located 0 bytes inside of
[   35.653861]  allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978)
[   35.653946] 
[   35.653970] The buggy address belongs to the physical page:
[   35.654010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   35.654074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.654125] page_type: f5(slab)
[   35.654167] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.654231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.654282] page dumped because: kasan: bad access detected
[   35.654314] 
[   35.654344] Memory state around the buggy address:
[   35.654385]  fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.654453]  fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.654507] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.654562]                                                                 ^
[   35.654605]  fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.654661]  fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.655006] ==================================================================
[   35.656292] ==================================================================
[   35.656724] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   35.657032] Read of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317
[   35.657095] 
[   35.657129] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.657220] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.657254] Hardware name: linux,dummy-virt (DT)
[   35.657557] Call trace:
[   35.657666]  show_stack+0x20/0x38 (C)
[   35.657752]  dump_stack_lvl+0x8c/0xd0
[   35.657968]  print_report+0x118/0x5e8
[   35.658236]  kasan_report+0xdc/0x128
[   35.658306]  kasan_check_range+0x100/0x1a8
[   35.658392]  __kasan_check_read+0x20/0x30
[   35.658564]  copy_user_test_oob+0x3c8/0xec8
[   35.658670]  kunit_try_run_case+0x170/0x3f0
[   35.658925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.659088]  kthread+0x328/0x630
[   35.659141]  ret_from_fork+0x10/0x20
[   35.659206] 
[   35.659227] Allocated by task 317:
[   35.659267]  kasan_save_stack+0x3c/0x68
[   35.659878]  kasan_save_track+0x20/0x40
[   35.660180]  kasan_save_alloc_info+0x40/0x58
[   35.660442]  __kasan_kmalloc+0xd4/0xd8
[   35.660942]  __kmalloc_noprof+0x198/0x4c8
[   35.661027]  kunit_kmalloc_array+0x34/0x88
[   35.661350]  copy_user_test_oob+0xac/0xec8
[   35.661931]  kunit_try_run_case+0x170/0x3f0
[   35.662075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.662142]  kthread+0x328/0x630
[   35.662745]  ret_from_fork+0x10/0x20
[   35.662865] 
[   35.662939] The buggy address belongs to the object at fff00000c9a8b900
[   35.662939]  which belongs to the cache kmalloc-128 of size 128
[   35.663215] The buggy address is located 0 bytes inside of
[   35.663215]  allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978)
[   35.663377] 
[   35.663472] The buggy address belongs to the physical page:
[   35.663769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   35.664051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.664473] page_type: f5(slab)
[   35.664624] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.664851] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.665074] page dumped because: kasan: bad access detected
[   35.665151] 
[   35.665516] Memory state around the buggy address:
[   35.665714]  fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.665859]  fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.666027] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.666096]                                                                 ^
[   35.666521]  fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.666596]  fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.666688] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   34.857112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   35.136692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   34.792607] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[   67.725473] Internal error: Oops: 0000000096000005 [#1]  SMP
[   67.732233] Modules linked in:
[   67.733312] CPU: 0 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   67.734199] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.734413] Hardware name: linux,dummy-virt (DT)
[   67.734608] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   67.734894] pc : ext4_mb_release+0x394/0xaf8
[   67.735843] lr : ext4_mb_release+0x37c/0xaf8
[   67.736433] sp : ffff800080c07c50
[   67.736917] x29: ffff800080c07c60 x28: dfff800000000000 x27: 0000000000000000
[   67.737791] x26: fff00000c47cf000 x25: fff00000c993a740 x24: 1ffe0000193274e8
[   67.738617] x23: fffd8000193274e8 x22: fff00000c993a618 x21: 1ffe0000193274c3
[   67.739613] x20: 0000000000000000 x19: fff00000c993a400 x18: 00000000699a60d6
[   67.740495] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000655482fd
[   67.741225] x14: 0000000052f8892b x13: 1ffe000019331a64 x12: fffd8000193a1781
[   67.741577] x11: 1ffe0000193a1780 x10: fffd8000193a1780 x9 : ffff9501ecf989fc
[   67.742341] x8 : ffff800080c079f8 x7 : 0000000000000001 x6 : ffff800080c07b10
[   67.743134] x5 : 0000000000000001 x4 : 1ffe0000193ad001 x3 : dfff800000000000
[   67.744154] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   67.744636] Call trace:
[   67.744796]  ext4_mb_release+0x394/0xaf8 (P)
[   67.745019]  mbt_kunit_exit+0x9c/0x2c8
[   67.745208]  kunit_try_run_case_cleanup+0x9c/0xe0
[   67.745425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.745692]  kthread+0x328/0x630
[   67.746130]  ret_from_fork+0x10/0x20
[   67.746851] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   67.747901] ---[ end trace 0000000000000000 ]---
[   67.790752] Internal error: Oops: 0000000096000005 [#3]  SMP
[   67.794229] Modules linked in:
[   67.794488] CPU: 1 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   67.795081] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   67.795396] Hardware name: linux,dummy-virt (DT)
[   67.795727] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   67.796177] pc : ext4_mb_release+0x394/0xaf8
[   67.796465] lr : ext4_mb_release+0x37c/0xaf8
[   67.796749] sp : ffff800080c87c50
[   67.796991] x29: ffff800080c87c60 x28: dfff800000000000 x27: 0000000000000000
[   67.797437] x26: fff00000c622c000 x25: fff00000c1414740 x24: 1ffe0000182828e8
[   67.797942] x23: fffd8000182828e8 x22: fff00000c1414618 x21: 1ffe0000182828c3
[   67.798583] x20: 0000000000000000 x19: fff00000c1414400 x18: 1ffff2a03de74c2e
[   67.799030] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007
[   67.799513] x14: 0000000000000000 x13: 1ffe000019331a44 x12: fffd800019336201
[   67.799919] x11: 1ffe000019336200 x10: fffd800019336200 x9 : ffff9501ecf989fc
[   67.800366] x8 : ffff800080c879f8 x7 : 0000000000000001 x6 : ffff800080c87b10
[   67.801438] x5 : 0000000000000001 x4 : 1ffe000018b8a799 x3 : dfff800000000000
[   67.801938] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   67.802480] Call trace:
[   67.802728]  ext4_mb_release+0x394/0xaf8 (P)
[   67.803163]  mbt_kunit_exit+0x9c/0x2c8
[   67.803563]  kunit_try_run_case_cleanup+0x9c/0xe0
[   67.803920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.804271]  kthread+0x328/0x630
[   67.804496]  ret_from_fork+0x10/0x20
[   67.804815] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   67.805172] ---[ end trace 0000000000000000 ]---
[   68.245749] Internal error: Oops: 0000000096000005 [#18]  SMP
[   68.254126] Modules linked in:
[   68.255310] CPU: 1 UID: 0 PID: 414 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   68.256695] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   68.257503] Hardware name: linux,dummy-virt (DT)
[   68.258146] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   68.259019] pc : ext4_mb_release+0x394/0xaf8
[   68.259740] lr : ext4_mb_release+0x37c/0xaf8
[   68.260339] sp : ffff800080ca7c50
[   68.260843] x29: ffff800080ca7c60 x28: dfff800000000000 x27: 0000000000000000
[   68.261773] x26: fff00000c9cf0000 x25: fff00000c1280740 x24: 1ffe0000182500e8
[   68.262712] x23: fffd8000182500e8 x22: fff00000c1280618 x21: 1ffe0000182500c3
[   68.263801] x20: 0000000000000000 x19: fff00000c1280400 x18: 1ffff2a03de74c2e
[   68.264891] x17: 0000000000000000 x16: fff00000c5e02c3c x15: 0000000000000007
[   68.265769] x14: 0000000000000000 x13: 1ffe00001b4895dd x12: fffd80001942b481
[   68.266136] x11: 1ffe00001942b480 x10: fffd80001942b480 x9 : ffff9501ecf989fc
[   68.266483] x8 : ffff800080ca79f8 x7 : 0000000000000001 x6 : ffff800080ca7b10
[   68.267349] x5 : 0000000000000001 x4 : 1ffe000018374289 x3 : dfff800000000000
[   68.268039] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   68.268698] Call trace:
[   68.269000]  ext4_mb_release+0x394/0xaf8 (P)
[   68.269258]  mbt_kunit_exit+0x9c/0x2c8
[   68.269475]  kunit_try_run_case_cleanup+0x9c/0xe0
[   68.269725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.269983]  kthread+0x328/0x630
[   68.270206]  ret_from_fork+0x10/0x20
[   68.270482] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   68.270812] ---[ end trace 0000000000000000 ]---
[   68.119812] Internal error: Oops: 0000000096000005 [#14]  SMP
[   68.127867] Modules linked in:
[   68.128882] CPU: 0 UID: 0 PID: 406 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   68.130122] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   68.130696] Hardware name: linux,dummy-virt (DT)
[   68.131284] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   68.131939] pc : ext4_mb_release+0x394/0xaf8
[   68.132163] lr : ext4_mb_release+0x37c/0xaf8
[   68.132360] sp : ffff800080cd7c50
[   68.132519] x29: ffff800080cd7c60 x28: dfff800000000000 x27: 0000000000000000
[   68.132954] x26: fff00000c9d2a000 x25: fff00000c1404740 x24: 1ffe0000182808e8
[   68.133357] x23: fffd8000182808e8 x22: fff00000c1404618 x21: 1ffe0000182808c3
[   68.133760] x20: 0000000000000000 x19: fff00000c1404400 x18: 1ffff2a03de74c2e
[   68.134193] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000000000007
[   68.134619] x14: 0000000000000000 x13: 1ffe000019331a64 x12: fffd8000190ea881
[   68.135188] x11: 1ffe0000190ea880 x10: fffd8000190ea880 x9 : ffff9501ecf989fc
[   68.135616] x8 : ffff800080cd79f8 x7 : 0000000000000001 x6 : ffff800080cd7b10
[   68.136040] x5 : 0000000000000001 x4 : 1ffe000018edf001 x3 : dfff800000000000
[   68.136459] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   68.136905] Call trace:
[   68.137062]  ext4_mb_release+0x394/0xaf8 (P)
[   68.137344]  mbt_kunit_exit+0x9c/0x2c8
[   68.137571]  kunit_try_run_case_cleanup+0x9c/0xe0
[   68.137875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.138172]  kthread+0x328/0x630
[   68.138391]  ret_from_fork+0x10/0x20
[   68.138661] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   68.138965] ---[ end trace 0000000000000000 ]---
[   68.000289] Internal error: Oops: 0000000096000005 [#10]  SMP
[   68.004106] Modules linked in:
[   68.004329] CPU: 0 UID: 0 PID: 398 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   68.004882] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   68.006875] Hardware name: linux,dummy-virt (DT)
[   68.007167] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   68.007542] pc : ext4_mb_release+0x394/0xaf8
[   68.007844] lr : ext4_mb_release+0x37c/0xaf8
[   68.008088] sp : ffff800080ca7c50
[   68.008258] x29: ffff800080ca7c60 x28: dfff800000000000 x27: 0000000000000000
[   68.009699] x26: fff00000c9f97000 x25: fff00000cc696740 x24: 1ffe0000198d2ce8
[   68.010696] x23: fffd8000198d2ce8 x22: fff00000cc696618 x21: 1ffe0000198d2cc3
[   68.011685] x20: 0000000000000000 x19: fff00000cc696400 x18: 00000000959198f5
[   68.013139] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000d31c17a0
[   68.014046] x14: 0000000059369a95 x13: 1ffe000019331a64 x12: fffd800019344661
[   68.014887] x11: 1ffe000019344660 x10: fffd800019344660 x9 : ffff9501ecf989fc
[   68.015414] x8 : ffff800080ca79f8 x7 : 0000000000000001 x6 : ffff800080ca7b10
[   68.015878] x5 : 0000000000000001 x4 : 1ffe0000193ec001 x3 : dfff800000000000
[   68.016303] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   68.016725] Call trace:
[   68.016900]  ext4_mb_release+0x394/0xaf8 (P)
[   68.017181]  mbt_kunit_exit+0x9c/0x2c8
[   68.017404]  kunit_try_run_case_cleanup+0x9c/0xe0
[   68.017697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.017993]  kthread+0x328/0x630
[   68.018216]  ret_from_fork+0x10/0x20
[   68.018457] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   68.018795] ---[ end trace 0000000000000000 ]---
[   67.944106] Internal error: Oops: 0000000096000005 [#8]  SMP
[   67.947340] Modules linked in:
[   67.947604] CPU: 0 UID: 0 PID: 394 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   67.948956] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   67.949217] Hardware name: linux,dummy-virt (DT)
[   67.949596] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   67.950251] pc : ext4_mb_release+0x394/0xaf8
[   67.951126] lr : ext4_mb_release+0x37c/0xaf8
[   67.951389] sp : ffff800080cb7c50
[   67.951804] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000
[   67.952370] x26: fff00000c9f94000 x25: fff00000c996e740 x24: 1ffe00001932dce8
[   67.952923] x23: fffd80001932dce8 x22: fff00000c996e618 x21: 1ffe00001932dcc3
[   67.953466] x20: 0000000000000000 x19: fff00000c996e400 x18: 00000000b0dc6342
[   67.954030] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000023288729
[   67.954712] x14: 00000000f1f1f1f1 x13: 1ffe000019331a64 x12: fffd8000191f0e01
[   67.955509] x11: 1ffe0000191f0e00 x10: fffd8000191f0e00 x9 : ffff9501ecf989fc
[   67.956098] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10
[   67.956453] x5 : 0000000000000001 x4 : 1ffe0000193ec799 x3 : dfff800000000000
[   67.956825] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   67.957422] Call trace:
[   67.957604]  ext4_mb_release+0x394/0xaf8 (P)
[   67.958097]  mbt_kunit_exit+0x9c/0x2c8
[   67.958419]  kunit_try_run_case_cleanup+0x9c/0xe0
[   67.958814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.959239]  kthread+0x328/0x630
[   67.959458]  ret_from_fork+0x10/0x20
[   67.959955] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   67.960401] ---[ end trace 0000000000000000 ]---
[   68.085664] Internal error: Oops: 0000000096000005 [#13]  SMP
[   68.095016] Modules linked in:
[   68.095759] CPU: 0 UID: 0 PID: 404 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   68.097315] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   68.097818] Hardware name: linux,dummy-virt (DT)
[   68.098040] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   68.098319] pc : ext4_mb_release+0x394/0xaf8
[   68.098545] lr : ext4_mb_release+0x37c/0xaf8
[   68.098926] sp : ffff800080cb7c50
[   68.099323] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000
[   68.100391] x26: fff00000c9d75000 x25: fff00000c1282740 x24: 1ffe0000182504e8
[   68.101211] x23: fffd8000182504e8 x22: fff00000c1282618 x21: 1ffe0000182504c3
[   68.101982] x20: 0000000000000000 x19: fff00000c1282400 x18: fff00000c9ad5800
[   68.102756] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000000000000
[   68.103657] x14: 0000000000000000 x13: 1ffe000019331a64 x12: fffd8000193533a1
[   68.104552] x11: 1ffe0000193533a0 x10: fffd8000193533a0 x9 : ffff9501ecf989fc
[   68.105475] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10
[   68.106214] x5 : 0000000000000001 x4 : 1ffe000018edf511 x3 : dfff800000000000
[   68.106550] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   68.106893] Call trace:
[   68.107183]  ext4_mb_release+0x394/0xaf8 (P)
[   68.107892]  mbt_kunit_exit+0x9c/0x2c8
[   68.108312]  kunit_try_run_case_cleanup+0x9c/0xe0
[   68.108802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.109347]  kthread+0x328/0x630
[   68.109709]  ret_from_fork+0x10/0x20
[   68.110114] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   68.110702] ---[ end trace 0000000000000000 ]---
[   68.057965] Internal error: Oops: 0000000096000005 [#12]  SMP
[   68.062174] Modules linked in:
[   68.062448] CPU: 0 UID: 0 PID: 402 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   68.064714] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   68.065192] Hardware name: linux,dummy-virt (DT)
[   68.065610] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   68.066158] pc : ext4_mb_release+0x394/0xaf8
[   68.066567] lr : ext4_mb_release+0x37c/0xaf8
[   68.067033] sp : ffff800080b77c50
[   68.067289] x29: ffff800080b77c60 x28: dfff800000000000 x27: 0000000000000000
[   68.068053] x26: fff00000c9d72000 x25: fff00000c1284740 x24: 1ffe0000182508e8
[   68.068676] x23: fffd8000182508e8 x22: fff00000c1284618 x21: 1ffe0000182508c3
[   68.069421] x20: 0000000000000000 x19: fff00000c1284400 x18: 00000000ed2360c8
[   68.069806] x17: 0000000000000001 x16: fff00000da44ada8 x15: 000000008f62b9f5
[   68.070247] x14: 00000000f1f1f1f1 x13: 1ffe000019331a64 x12: fffd80001942b381
[   68.070652] x11: 1ffe00001942b380 x10: fffd80001942b380 x9 : ffff9501ecf989fc
[   68.071050] x8 : ffff800080b779f8 x7 : 0000000000000001 x6 : ffff800080b77b10
[   68.071675] x5 : 0000000000000001 x4 : 1ffe000018edf799 x3 : dfff800000000000
[   68.072091] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   68.072519] Call trace:
[   68.072691]  ext4_mb_release+0x394/0xaf8 (P)
[   68.072979]  mbt_kunit_exit+0x9c/0x2c8
[   68.073188]  kunit_try_run_case_cleanup+0x9c/0xe0
[   68.073486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.073776]  kthread+0x328/0x630
[   68.074005]  ret_from_fork+0x10/0x20
[   68.074263] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   68.074559] ---[ end trace 0000000000000000 ]---
[   67.971005] Internal error: Oops: 0000000096000005 [#9]  SMP
[   67.975432] Modules linked in:
[   67.976109] CPU: 1 UID: 0 PID: 396 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   67.976708] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   67.977194] Hardware name: linux,dummy-virt (DT)
[   67.977536] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   67.978721] pc : ext4_mb_release+0x394/0xaf8
[   67.979131] lr : ext4_mb_release+0x37c/0xaf8
[   67.979714] sp : ffff800080b77c50
[   67.980053] x29: ffff800080b77c60 x28: dfff800000000000 x27: 0000000000000000
[   67.980720] x26: fff00000c117c000 x25: fff00000c10c4740 x24: 1ffe0000182188e8
[   67.981281] x23: fffd8000182188e8 x22: fff00000c10c4618 x21: 1ffe0000182188c3
[   67.981704] x20: 0000000000000000 x19: fff00000c10c4400 x18: 1ffff2a03de74c2e
[   67.982131] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007
[   67.982532] x14: 00000000f1f1f1f1 x13: 1ffe000019331a44 x12: fffd800019336381
[   67.982962] x11: 1ffe000019336380 x10: fffd800019336380 x9 : ffff9501ecf989fc
[   67.983856] x8 : ffff800080b779f8 x7 : 0000000000000001 x6 : ffff800080b77b10
[   67.984279] x5 : 0000000000000001 x4 : 1ffe000018c92ca9 x3 : dfff800000000000
[   67.984719] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   67.985138] Call trace:
[   67.985298]  ext4_mb_release+0x394/0xaf8 (P)
[   67.985551]  mbt_kunit_exit+0x9c/0x2c8
[   67.985815]  kunit_try_run_case_cleanup+0x9c/0xe0
[   67.986069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.986366]  kthread+0x328/0x630
[   67.986559]  ret_from_fork+0x10/0x20
[   67.986805] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   67.987420] ---[ end trace 0000000000000000 ]---
[   67.817212] Internal error: Oops: 0000000096000005 [#4]  SMP
[   67.821604] Modules linked in:
[   67.822194] CPU: 0 UID: 0 PID: 386 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   67.822800] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   67.823111] Hardware name: linux,dummy-virt (DT)
[   67.823383] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   67.824923] pc : ext4_mb_release+0x394/0xaf8
[   67.825172] lr : ext4_mb_release+0x37c/0xaf8
[   67.825434] sp : ffff800080c97c50
[   67.825631] x29: ffff800080c97c60 x28: dfff800000000000 x27: 0000000000000000
[   67.826085] x26: fff00000c0ccd000 x25: fff00000c997a740 x24: 1ffe00001932f4e8
[   67.826499] x23: fffd80001932f4e8 x22: fff00000c997a618 x21: 1ffe00001932f4c3
[   67.826929] x20: 0000000000000000 x19: fff00000c997a400 x18: 00000000c97a9800
[   67.827781] x17: 0000000000000000 x16: fff00000da44ada8 x15: fff00000ff616b48
[   67.828212] x14: 0000000000018fff x13: 1ffe000019331a64 x12: fffd800019344761
[   67.828622] x11: 1ffe000019344760 x10: fffd800019344760 x9 : ffff9501ecf989fc
[   67.829051] x8 : ffff800080c979f8 x7 : 0000000000000001 x6 : ffff800080c97b10
[   67.829457] x5 : 0000000000000001 x4 : 1ffe0000193ad289 x3 : dfff800000000000
[   67.829877] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   67.830275] Call trace:
[   67.830444]  ext4_mb_release+0x394/0xaf8 (P)
[   67.830708]  mbt_kunit_exit+0x9c/0x2c8
[   67.830938]  kunit_try_run_case_cleanup+0x9c/0xe0
[   67.831216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.831482]  kthread+0x328/0x630
[   67.831835]  ret_from_fork+0x10/0x20
[   67.832121] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   67.832399] ---[ end trace 0000000000000000 ]---
[  111.517917] Internal error: Oops: 0000000096000005 [#21]  SMP
[  111.523681] Modules linked in:
[  111.524203] CPU: 0 UID: 0 PID: 420 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[  111.525444] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  111.526007] Hardware name: linux,dummy-virt (DT)
[  111.526234] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  111.526510] pc : ext4_mb_release+0x394/0xaf8
[  111.527153] lr : ext4_mb_release+0x37c/0xaf8
[  111.527783] sp : ffff800080c97c50
[  111.528231] x29: ffff800080c97c60 x28: dfff800000000000 x27: 0000000000000000
[  111.528994] x26: fff00000c9cf6000 x25: fff00000cd290740 x24: 1ffe000019a520e8
[  111.529338] x23: fffd800019a520e8 x22: fff00000cd290618 x21: 1ffe000019a520c3
[  111.529933] x20: 0000000000000000 x19: fff00000cd290400 x18: 000000007350aeae
[  111.530789] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000042d56b35
[  111.531758] x14: 00000000f1f1f1f1 x13: 1ffe000019331a64 x12: fffd80001942b601
[  111.532765] x11: 1ffe00001942b600 x10: fffd80001942b600 x9 : ffff9501ecf989fc
[  111.533520] x8 : ffff800080c979f8 x7 : 0000000000000001 x6 : ffff800080c97b10
[  111.534263] x5 : 0000000000000001 x4 : 1ffe000018c8b799 x3 : dfff800000000000
[  111.534750] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[  111.535259] Call trace:
[  111.535411]  ext4_mb_release+0x394/0xaf8 (P)
[  111.535631]  mbt_kunit_exit+0x9c/0x2c8
[  111.535835]  kunit_try_run_case_cleanup+0x9c/0xe0
[  111.536048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  111.536281]  kthread+0x328/0x630
[  111.536458]  ret_from_fork+0x10/0x20
[  111.536677] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[  111.536962] ---[ end trace 0000000000000000 ]---
[  111.882914] Internal error: Oops: 0000000096000005 [#22]  SMP
[  111.888546] Modules linked in:
[  111.889462] CPU: 0 UID: 0 PID: 564 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[  111.890543] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  111.890793] Hardware name: linux,dummy-virt (DT)
[  111.891002] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  111.891865] pc : kunit_test_null_dereference+0x70/0x170
[  111.892698] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  111.893183] sp : ffff800082037d30
[  111.893353] x29: ffff800082037d90 x28: 0000000000000000 x27: 0000000000000000
[  111.893717] x26: 1ffe0000193249c1 x25: 0000000000000000 x24: 0000000000000004
[  111.894055] x23: fff00000c9924e0c x22: ffff9501ea847698 x21: fff00000c1b36b88
[  111.894388] x20: 1ffff00010406fa6 x19: ffff800080087990 x18: 0000000025fa58f7
[  111.894886] x17: 0000000000000001 x16: fff00000c5e0303c x15: 00000000bddfc96b
[  111.896045] x14: 00000000f1f1f1f1 x13: 1ffe00001b48d9dd x12: fffd800018f6111c
[  111.896744] x11: 1ffe000018f6111b x10: fffd800018f6111b x9 : ffff9501ea83ee20
[  111.897096] x8 : ffff800082037c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  111.897429] x5 : ffff700010406fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  111.897775] x2 : dfff800000000000 x1 : fff00000c7b08000 x0 : ffff800080087990
[  111.898110] Call trace:
[  111.898250]  kunit_test_null_dereference+0x70/0x170 (P)
[  111.898492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  111.898742]  kthread+0x328/0x630
[  111.899579]  ret_from_fork+0x10/0x20
[  111.899865] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  111.900369] ---[ end trace 0000000000000000 ]---
[   68.179753] Internal error: Oops: 0000000096000005 [#16]  SMP
[   68.188508] Modules linked in:
[   68.189890] CPU: 1 UID: 0 PID: 410 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   68.191715] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   68.192748] Hardware name: linux,dummy-virt (DT)
[   68.193585] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   68.194942] pc : ext4_mb_release+0x394/0xaf8
[   68.195357] lr : ext4_mb_release+0x37c/0xaf8
[   68.195568] sp : ffff800080ca7c50
[   68.195741] x29: ffff800080ca7c60 x28: dfff800000000000 x27: 0000000000000000
[   68.196094] x26: fff00000c9c98000 x25: fff00000c11e0740 x24: 1ffe00001823c0e8
[   68.196438] x23: fffd80001823c0e8 x22: fff00000c11e0618 x21: 1ffe00001823c0c3
[   68.197150] x20: 0000000000000000 x19: fff00000c11e0400 x18: 1ffff2a03de74c2e
[   68.198219] x17: 0000000000000001 x16: fff00000c5e02c3c x15: 0000000000000007
[   68.199397] x14: 00000000f1f1f1f1 x13: 1ffe00001b4895dd x12: fffd800018849ae1
[   68.200269] x11: 1ffe000018849ae0 x10: fffd800018849ae0 x9 : ffff9501ecf989fc
[   68.201190] x8 : ffff800080ca79f8 x7 : 0000000000000001 x6 : ffff800080ca7b10
[   68.201966] x5 : 0000000000000001 x4 : 1ffe000018374511 x3 : dfff800000000000
[   68.202835] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   68.203872] Call trace:
[   68.204213]  ext4_mb_release+0x394/0xaf8 (P)
[   68.204564]  mbt_kunit_exit+0x9c/0x2c8
[   68.204986]  kunit_try_run_case_cleanup+0x9c/0xe0
[   68.205206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.205446]  kthread+0x328/0x630
[   68.205621]  ret_from_fork+0x10/0x20
[   68.205859] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   68.206220] ---[ end trace 0000000000000000 ]---
[   67.868811] Internal error: Oops: 0000000096000005 [#6]  SMP
[   67.876226] Modules linked in:
[   67.877170] CPU: 0 UID: 0 PID: 390 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   67.878414] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   67.879237] Hardware name: linux,dummy-virt (DT)
[   67.880106] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   67.880908] pc : ext4_mb_release+0x394/0xaf8
[   67.881509] lr : ext4_mb_release+0x37c/0xaf8
[   67.881733] sp : ffff800080b77c50
[   67.881890] x29: ffff800080b77c60 x28: dfff800000000000 x27: 0000000000000000
[   67.882233] x26: fff00000c9f91000 x25: fff00000c9978740 x24: 1ffe00001932f0e8
[   67.882566] x23: fffd80001932f0e8 x22: fff00000c9978618 x21: 1ffe00001932f0c3
[   67.883889] x20: 0000000000000000 x19: fff00000c9978400 x18: 00000000c96f8d84
[   67.884939] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000f2b866bd
[   67.885983] x14: 000000003cef1262 x13: 1ffe000019331a64 x12: fffd80001942b201
[   67.887006] x11: 1ffe00001942b200 x10: fffd80001942b200 x9 : ffff9501ecf989fc
[   67.888059] x8 : ffff800080b779f8 x7 : 0000000000000001 x6 : ffff800080b77b10
[   67.889062] x5 : 0000000000000001 x4 : 1ffe0000193adca9 x3 : dfff800000000000
[   67.890093] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   67.891104] Call trace:
[   67.891524]  ext4_mb_release+0x394/0xaf8 (P)
[   67.892006]  mbt_kunit_exit+0x9c/0x2c8
[   67.892619]  kunit_try_run_case_cleanup+0x9c/0xe0
[   67.893067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.893321]  kthread+0x328/0x630
[   67.893497]  ret_from_fork+0x10/0x20
[   67.893719] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   67.893959] ---[ end trace 0000000000000000 ]---
[   67.840132] Internal error: Oops: 0000000096000005 [#5]  SMP
[   67.843505] Modules linked in:
[   67.843810] CPU: 1 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   67.845835] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   67.846397] Hardware name: linux,dummy-virt (DT)
[   67.846769] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   67.847411] pc : ext4_mb_release+0x394/0xaf8
[   67.847984] lr : ext4_mb_release+0x37c/0xaf8
[   67.848468] sp : ffff800080b77c50
[   67.848911] x29: ffff800080b77c60 x28: dfff800000000000 x27: 0000000000000000
[   67.849483] x26: fff00000c622f000 x25: fff00000c1416740 x24: 1ffe000018282ce8
[   67.849842] x23: fffd800018282ce8 x22: fff00000c1416618 x21: 1ffe000018282cc3
[   67.850184] x20: 0000000000000000 x19: fff00000c1416400 x18: 1ffff2a03de74c2e
[   67.850527] x17: 0000000000000000 x16: fff00000c5e02c3c x15: 0000000000000007
[   67.851405] x14: 00000000f1f1f1f1 x13: 1ffe00001b4895dd x12: fffd8000190ea9c1
[   67.852348] x11: 1ffe0000190ea9c0 x10: fffd8000190ea9c0 x9 : ffff9501ecf989fc
[   67.853170] x8 : ffff800080b779f8 x7 : 0000000000000001 x6 : ffff800080b77b10
[   67.853919] x5 : 0000000000000001 x4 : 1ffe0000193ad799 x3 : dfff800000000000
[   67.854657] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   67.855388] Call trace:
[   67.855716]  ext4_mb_release+0x394/0xaf8 (P)
[   67.856289]  mbt_kunit_exit+0x9c/0x2c8
[   67.856791]  kunit_try_run_case_cleanup+0x9c/0xe0
[   67.857409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.857973]  kthread+0x328/0x630
[   67.858368]  ret_from_fork+0x10/0x20
[   67.858812] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   67.859451] ---[ end trace 0000000000000000 ]---
[   68.029241] Internal error: Oops: 0000000096000005 [#11]  SMP
[   68.033414] Modules linked in:
[   68.033689] CPU: 1 UID: 0 PID: 400 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   68.034199] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   68.034476] Hardware name: linux,dummy-virt (DT)
[   68.036776] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   68.037134] pc : ext4_mb_release+0x394/0xaf8
[   68.037394] lr : ext4_mb_release+0x37c/0xaf8
[   68.037633] sp : ffff800080cb7c50
[   68.037818] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000
[   68.038247] x26: fff00000c117f000 x25: fff00000cd22e740 x24: 1ffe000019a45ce8
[   68.039766] x23: fffd800019a45ce8 x22: fff00000cd22e618 x21: 1ffe000019a45cc3
[   68.040143] x20: 0000000000000000 x19: fff00000cd22e400 x18: 1ffff2a03de74c2e
[   68.040479] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007
[   68.040870] x14: 00000000f1f1f1f1 x13: 1ffe000019331a44 x12: fffd8000190ea801
[   68.041877] x11: 1ffe0000190ea800 x10: fffd8000190ea800 x9 : ffff9501ecf989fc
[   68.042511] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10
[   68.042877] x5 : 0000000000000001 x4 : 1ffe000018c92511 x3 : dfff800000000000
[   68.044178] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   68.045050] Call trace:
[   68.045417]  ext4_mb_release+0x394/0xaf8 (P)
[   68.046027]  mbt_kunit_exit+0x9c/0x2c8
[   68.046490]  kunit_try_run_case_cleanup+0x9c/0xe0
[   68.047079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.047453]  kthread+0x328/0x630
[   68.047865]  ret_from_fork+0x10/0x20
[   68.048296] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   68.048629] ---[ end trace 0000000000000000 ]---
[   67.909782] Internal error: Oops: 0000000096000005 [#7]  SMP
[   67.915738] Modules linked in:
[   67.917237] CPU: 1 UID: 0 PID: 392 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   67.918478] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   67.919356] Hardware name: linux,dummy-virt (DT)
[   67.920114] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   67.921018] pc : ext4_mb_release+0x394/0xaf8
[   67.921461] lr : ext4_mb_release+0x37c/0xaf8
[   67.921689] sp : ffff800080ca7c50
[   67.921848] x29: ffff800080ca7c60 x28: dfff800000000000 x27: 0000000000000000
[   67.922200] x26: fff00000c1179000 x25: fff00000c10c6740 x24: 1ffe000018218ce8
[   67.922542] x23: fffd800018218ce8 x22: fff00000c10c6618 x21: 1ffe000018218cc3
[   67.923908] x20: 0000000000000000 x19: fff00000c10c6400 x18: 1ffff2a03de74c2e
[   67.925044] x17: 0000000000000001 x16: fff00000da46cda8 x15: fff00000ff616b48
[   67.926041] x14: 0000000000018fff x13: 1ffe000019331a44 x12: fffd800019363a21
[   67.927052] x11: 1ffe000019363a20 x10: fffd800019363a20 x9 : ffff9501ecf989fc
[   67.928217] x8 : ffff800080ca79f8 x7 : 0000000000000001 x6 : ffff800080ca7b10
[   67.929341] x5 : 0000000000000001 x4 : 1ffe000018b93799 x3 : dfff800000000000
[   67.930399] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   67.931536] Call trace:
[   67.932049]  ext4_mb_release+0x394/0xaf8 (P)
[   67.932762]  mbt_kunit_exit+0x9c/0x2c8
[   67.933263]  kunit_try_run_case_cleanup+0x9c/0xe0
[   67.933494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.933738]  kthread+0x328/0x630
[   67.933914]  ret_from_fork+0x10/0x20
[   67.934113] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   67.934352] ---[ end trace 0000000000000000 ]---
[   68.216387] Internal error: Oops: 0000000096000005 [#17]  SMP
[   68.225098] Modules linked in:
[   68.225884] CPU: 1 UID: 0 PID: 412 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   68.227579] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   68.228383] Hardware name: linux,dummy-virt (DT)
[   68.228900] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   68.229252] pc : ext4_mb_release+0x394/0xaf8
[   68.229478] lr : ext4_mb_release+0x37c/0xaf8
[   68.229756] sp : ffff800080c97c50
[   68.229971] x29: ffff800080c97c60 x28: dfff800000000000 x27: 0000000000000000
[   68.230489] x26: fff00000c9c9b000 x25: fff00000cd264740 x24: 1ffe000019a4c8e8
[   68.230946] x23: fffd800019a4c8e8 x22: fff00000cd264618 x21: 1ffe000019a4c8c3
[   68.231499] x20: 0000000000000000 x19: fff00000cd264400 x18: 0000000085e88bda
[   68.232067] x17: 0000000000000001 x16: fff00000da46cda8 x15: 00000000cefbb19d
[   68.232501] x14: 00000000f1f1f1f1 x13: 1ffe000019331a44 x12: fffd8000190ea901
[   68.232953] x11: 1ffe0000190ea900 x10: fffd8000190ea900 x9 : ffff9501ecf989fc
[   68.233414] x8 : ffff800080c979f8 x7 : 0000000000000001 x6 : ffff800080c97b10
[   68.233850] x5 : 0000000000000001 x4 : 1ffe0000193a2511 x3 : dfff800000000000
[   68.234283] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   68.234751] Call trace:
[   68.234936]  ext4_mb_release+0x394/0xaf8 (P)
[   68.235367]  mbt_kunit_exit+0x9c/0x2c8
[   68.235670]  kunit_try_run_case_cleanup+0x9c/0xe0
[   68.235965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.236284]  kthread+0x328/0x630
[   68.236509]  ret_from_fork+0x10/0x20
[   68.236769] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   68.237094] ---[ end trace 0000000000000000 ]---
[  111.491486] Internal error: Oops: 0000000096000005 [#20]  SMP
[  111.497170] Modules linked in:
[  111.498059] CPU: 1 UID: 0 PID: 418 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[  111.499549] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  111.500329] Hardware name: linux,dummy-virt (DT)
[  111.500555] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  111.500851] pc : ext4_mb_release+0x394/0xaf8
[  111.501079] lr : ext4_mb_release+0x37c/0xaf8
[  111.501274] sp : ffff800080cf7c50
[  111.501431] x29: ffff800080cf7c60 x28: dfff800000000000 x27: 0000000000000000
[  111.501794] x26: fff00000c9cf3000 x25: fff00000c1394740 x24: 1ffe0000182728e8
[  111.502213] x23: fffd8000182728e8 x22: fff00000c1394618 x21: 1ffe0000182728c3
[  111.502562] x20: 0000000000000000 x19: fff00000c1394400 x18: 00000000e36e3a21
[  111.504030] x17: 0000000000000001 x16: fff00000da46cda8 x15: 00000000c224dec4
[  111.504590] x14: 0000000015e72202 x13: 1ffe000019331a44 x12: fffd8000191f0c41
[  111.505015] x11: 1ffe0000191f0c40 x10: fffd8000191f0c40 x9 : ffff9501ecf989fc
[  111.505393] x8 : ffff800080cf79f8 x7 : 0000000000000001 x6 : ffff800080cf7b10
[  111.505881] x5 : 0000000000000001 x4 : 1ffe0000193a2ca9 x3 : dfff800000000000
[  111.506224] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[  111.506562] Call trace:
[  111.506717]  ext4_mb_release+0x394/0xaf8 (P)
[  111.507260]  mbt_kunit_exit+0x9c/0x2c8
[  111.507494]  kunit_try_run_case_cleanup+0x9c/0xe0
[  111.507756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  111.508513]  kthread+0x328/0x630
[  111.508932]  ret_from_fork+0x10/0x20
[  111.509353] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[  111.509953] ---[ end trace 0000000000000000 ]---
[   89.857835] Internal error: Oops: 0000000096000005 [#19]  SMP
[   89.865267] Modules linked in:
[   89.865992] CPU: 1 UID: 0 PID: 416 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   89.866444] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   89.867089] Hardware name: linux,dummy-virt (DT)
[   89.867585] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   89.868279] pc : ext4_mb_release+0x394/0xaf8
[   89.868825] lr : ext4_mb_release+0x37c/0xaf8
[   89.869196] sp : ffff800080c97c50
[   89.869477] x29: ffff800080c97c60 x28: dfff800000000000 x27: 0000000000000000
[   89.870165] x26: fff00000c9c9e000 x25: fff00000c11dc740 x24: 1ffe00001823b8e8
[   89.870574] x23: fffd80001823b8e8 x22: fff00000c11dc618 x21: 1ffe00001823b8c3
[   89.871101] x20: 0000000000000000 x19: fff00000c11dc400 x18: 000000007cc65ab4
[   89.871657] x17: 00000000e50b0055 x16: fff00000c5e02c3c x15: 0000000002a95e2d
[   89.872052] x14: 00000000d6983160 x13: 1ffe00001b4895dd x12: fffd80001884c7c1
[   89.872468] x11: 1ffe00001884c7c0 x10: fffd80001884c7c0 x9 : ffff9501ecf989fc
[   89.872866] x8 : ffff800080c979f8 x7 : 0000000000000001 x6 : ffff800080c97b10
[   89.873276] x5 : 0000000000000001 x4 : 1ffe000018c8ba21 x3 : dfff800000000000
[   89.873695] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   89.874213] Call trace:
[   89.874375]  ext4_mb_release+0x394/0xaf8 (P)
[   89.874610]  mbt_kunit_exit+0x9c/0x2c8
[   89.874871]  kunit_try_run_case_cleanup+0x9c/0xe0
[   89.875131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   89.875451]  kthread+0x328/0x630
[   89.875700]  ret_from_fork+0x10/0x20
[   89.875953] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   89.876282] ---[ end trace 0000000000000000 ]---
[   67.758519] Internal error: Oops: 0000000096000005 [#2]  SMP
[   67.764682] Modules linked in:
[   67.765818] CPU: 1 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   67.767154] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   67.768509] Hardware name: linux,dummy-virt (DT)
[   67.769247] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   67.770176] pc : ext4_mb_release+0x394/0xaf8
[   67.770936] lr : ext4_mb_release+0x37c/0xaf8
[   67.771697] sp : ffff800080c97c50
[   67.772306] x29: ffff800080c97c60 x28: dfff800000000000 x27: 0000000000000000
[   67.773160] x26: fff00000c0b08000 x25: fff00000c9938740 x24: 1ffe0000193270e8
[   67.773523] x23: fffd8000193270e8 x22: fff00000c9938618 x21: 1ffe0000193270c3
[   67.773993] x20: 0000000000000000 x19: fff00000c9938400 x18: 000000001d7f2c1f
[   67.774501] x17: 0000000000000001 x16: fff00000da46cda8 x15: 00000000d3ba8880
[   67.775009] x14: 00000000f1f1f1f1 x13: 1ffe000019331a44 x12: fffd8000191f0e41
[   67.775539] x11: 1ffe0000191f0e40 x10: fffd8000191f0e40 x9 : ffff9501ecf989fc
[   67.775977] x8 : ffff800080c979f8 x7 : 0000000000000001 x6 : ffff800080c97b10
[   67.776472] x5 : 0000000000000001 x4 : 1ffe000018b8aca9 x3 : dfff800000000000
[   67.776967] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   67.777439] Call trace:
[   67.777659]  ext4_mb_release+0x394/0xaf8 (P)
[   67.777923]  mbt_kunit_exit+0x9c/0x2c8
[   67.778154]  kunit_try_run_case_cleanup+0x9c/0xe0
[   67.778433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.778744]  kthread+0x328/0x630
[   67.779008]  ret_from_fork+0x10/0x20
[   67.779347] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   67.779688] ---[ end trace 0000000000000000 ]---
[   68.152533] Internal error: Oops: 0000000096000005 [#15]  SMP
[   68.157498] Modules linked in:
[   68.158420] CPU: 1 UID: 0 PID: 408 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   68.159343] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   68.159751] Hardware name: linux,dummy-virt (DT)
[   68.160186] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   68.160722] pc : ext4_mb_release+0x394/0xaf8
[   68.160962] lr : ext4_mb_release+0x37c/0xaf8
[   68.161224] sp : ffff800080cb7c50
[   68.161413] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000
[   68.161878] x26: fff00000c9d2d000 x25: fff00000c11e6740 x24: 1ffe00001823cce8
[   68.162292] x23: fffd80001823cce8 x22: fff00000c11e6618 x21: 1ffe00001823ccc3
[   68.162722] x20: 0000000000000000 x19: fff00000c11e6400 x18: 000000005ba8505f
[   68.163304] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000068ab6941
[   68.163760] x14: 00000000f1f1f1f1 x13: 1ffe000019331a44 x12: fffd800019336581
[   68.164206] x11: 1ffe000019336580 x10: fffd800019336580 x9 : ffff9501ecf989fc
[   68.164619] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10
[   68.165027] x5 : 0000000000000001 x4 : 1ffe0000193a2001 x3 : dfff800000000000
[   68.165986] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014
[   68.166729] Call trace:
[   68.167498]  ext4_mb_release+0x394/0xaf8 (P)
[   68.167993]  mbt_kunit_exit+0x9c/0x2c8
[   68.168400]  kunit_try_run_case_cleanup+0x9c/0xe0
[   68.168889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.169439]  kthread+0x328/0x630
[   68.169681]  ret_from_fork+0x10/0x20
[   68.169891] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) 
[   68.170137] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   67.552360] ==================================================================
[   67.552465] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   67.552465] 
[   67.552561] Use-after-free read at 0x00000000808e9a85 (in kfence-#205):
[   67.552614]  test_krealloc+0x51c/0x830
[   67.552678]  kunit_try_run_case+0x170/0x3f0
[   67.552724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.552769]  kthread+0x328/0x630
[   67.552810]  ret_from_fork+0x10/0x20
[   67.552851] 
[   67.552876] kfence-#205: 0x00000000808e9a85-0x0000000099274d74, size=32, cache=kmalloc-32
[   67.552876] 
[   67.552932] allocated by task 369 on cpu 0 at 67.551488s (0.001440s ago):
[   67.553004]  test_alloc+0x29c/0x628
[   67.553042]  test_krealloc+0xc0/0x830
[   67.553077]  kunit_try_run_case+0x170/0x3f0
[   67.553118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.553161]  kthread+0x328/0x630
[   67.553196]  ret_from_fork+0x10/0x20
[   67.553234] 
[   67.553258] freed by task 369 on cpu 0 at 67.551777s (0.001477s ago):
[   67.553319]  krealloc_noprof+0x148/0x360
[   67.553360]  test_krealloc+0x1dc/0x830
[   67.553396]  kunit_try_run_case+0x170/0x3f0
[   67.553435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.553475]  kthread+0x328/0x630
[   67.553512]  ret_from_fork+0x10/0x20
[   67.553549] 
[   67.553597] CPU: 0 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   67.553691] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.553723] Hardware name: linux,dummy-virt (DT)
[   67.553759] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   67.454947] ==================================================================
[   67.455067] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   67.455067] 
[   67.455173] Use-after-free read at 0x000000001451cd49 (in kfence-#204):
[   67.455231]  test_memcache_typesafe_by_rcu+0x280/0x560
[   67.455278]  kunit_try_run_case+0x170/0x3f0
[   67.455328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.455373]  kthread+0x328/0x630
[   67.455412]  ret_from_fork+0x10/0x20
[   67.455453] 
[   67.455477] kfence-#204: 0x000000001451cd49-0x0000000047bece6b, size=32, cache=test
[   67.455477] 
[   67.455529] allocated by task 367 on cpu 1 at 67.443368s (0.012157s ago):
[   67.455603]  test_alloc+0x230/0x628
[   67.455657]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   67.455698]  kunit_try_run_case+0x170/0x3f0
[   67.455737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.455780]  kthread+0x328/0x630
[   67.455815]  ret_from_fork+0x10/0x20
[   67.455854] 
[   67.455879] freed by task 367 on cpu 1 at 67.443492s (0.012383s ago):
[   67.455933]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   67.455974]  kunit_try_run_case+0x170/0x3f0
[   67.456011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.456054]  kthread+0x328/0x630
[   67.456091]  ret_from_fork+0x10/0x20
[   67.456130] 
[   67.456178] CPU: 1 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   67.456264] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.456296] Hardware name: linux,dummy-virt (DT)
[   67.456333] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   35.566075] ==================================================================
[   35.566147] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   35.566219] Read of size 8 at addr fff00000c9a8b878 by task kunit_try_catch/313
[   35.566273] 
[   35.566565] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.566801] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.566837] Hardware name: linux,dummy-virt (DT)
[   35.567044] Call trace:
[   35.567105]  show_stack+0x20/0x38 (C)
[   35.567579]  dump_stack_lvl+0x8c/0xd0
[   35.567700]  print_report+0x118/0x5e8
[   35.567777]  kasan_report+0xdc/0x128
[   35.568410]  __asan_report_load8_noabort+0x20/0x30
[   35.569308]  copy_to_kernel_nofault+0x204/0x250
[   35.569446]  copy_to_kernel_nofault_oob+0x158/0x418
[   35.569577]  kunit_try_run_case+0x170/0x3f0
[   35.569634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.569902]  kthread+0x328/0x630
[   35.570377]  ret_from_fork+0x10/0x20
[   35.570515] 
[   35.570586] Allocated by task 313:
[   35.570757]  kasan_save_stack+0x3c/0x68
[   35.570879]  kasan_save_track+0x20/0x40
[   35.570957]  kasan_save_alloc_info+0x40/0x58
[   35.571022]  __kasan_kmalloc+0xd4/0xd8
[   35.571116]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.571206]  copy_to_kernel_nofault_oob+0xc8/0x418
[   35.571319]  kunit_try_run_case+0x170/0x3f0
[   35.571360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.571412]  kthread+0x328/0x630
[   35.571449]  ret_from_fork+0x10/0x20
[   35.571802] 
[   35.571929] The buggy address belongs to the object at fff00000c9a8b800
[   35.571929]  which belongs to the cache kmalloc-128 of size 128
[   35.572044] The buggy address is located 0 bytes to the right of
[   35.572044]  allocated 120-byte region [fff00000c9a8b800, fff00000c9a8b878)
[   35.572238] 
[   35.572614] The buggy address belongs to the physical page:
[   35.572783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   35.572883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.573089] page_type: f5(slab)
[   35.573503] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.573602] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.573983] page dumped because: kasan: bad access detected
[   35.574032] 
[   35.574055] Memory state around the buggy address:
[   35.574113]  fff00000c9a8b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.574172]  fff00000c9a8b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.574221] >fff00000c9a8b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.574261]                                                                 ^
[   35.574304]  fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.574358]  fff00000c9a8b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.574419] ==================================================================
[   35.575830] ==================================================================
[   35.576051] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   35.576218] Write of size 8 at addr fff00000c9a8b878 by task kunit_try_catch/313
[   35.576410] 
[   35.576477] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.576581] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.576943] Hardware name: linux,dummy-virt (DT)
[   35.576997] Call trace:
[   35.577024]  show_stack+0x20/0x38 (C)
[   35.577078]  dump_stack_lvl+0x8c/0xd0
[   35.577435]  print_report+0x118/0x5e8
[   35.577574]  kasan_report+0xdc/0x128
[   35.577627]  kasan_check_range+0x100/0x1a8
[   35.577691]  __kasan_check_write+0x20/0x30
[   35.577995]  copy_to_kernel_nofault+0x8c/0x250
[   35.578083]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   35.578137]  kunit_try_run_case+0x170/0x3f0
[   35.578221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.578307]  kthread+0x328/0x630
[   35.578353]  ret_from_fork+0x10/0x20
[   35.578562] 
[   35.578588] Allocated by task 313:
[   35.578774]  kasan_save_stack+0x3c/0x68
[   35.578833]  kasan_save_track+0x20/0x40
[   35.579138]  kasan_save_alloc_info+0x40/0x58
[   35.579296]  __kasan_kmalloc+0xd4/0xd8
[   35.579380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.579424]  copy_to_kernel_nofault_oob+0xc8/0x418
[   35.579474]  kunit_try_run_case+0x170/0x3f0
[   35.579513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.579855]  kthread+0x328/0x630
[   35.580088]  ret_from_fork+0x10/0x20
[   35.580145] 
[   35.580206] The buggy address belongs to the object at fff00000c9a8b800
[   35.580206]  which belongs to the cache kmalloc-128 of size 128
[   35.580505] The buggy address is located 0 bytes to the right of
[   35.580505]  allocated 120-byte region [fff00000c9a8b800, fff00000c9a8b878)
[   35.580721] 
[   35.580770] The buggy address belongs to the physical page:
[   35.580916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   35.581207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.581259] page_type: f5(slab)
[   35.581573] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.581698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.581784] page dumped because: kasan: bad access detected
[   35.581840] 
[   35.582170] Memory state around the buggy address:
[   35.582284]  fff00000c9a8b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.582367]  fff00000c9a8b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.582433] >fff00000c9a8b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.582482]                                                                 ^
[   35.582534]  fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.582591]  fff00000c9a8b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.582676] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   44.473261] ==================================================================
[   44.473417] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   44.473417] 
[   44.473523] Invalid read at 0x00000000b4cc2dc4:
[   44.473590]  test_invalid_access+0xdc/0x1f0
[   44.473657]  kunit_try_run_case+0x170/0x3f0
[   44.473710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.473783]  kthread+0x328/0x630
[   44.473936]  ret_from_fork+0x10/0x20
[   44.474003] 
[   44.474066] CPU: 0 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   44.474502] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   44.474693] Hardware name: linux,dummy-virt (DT)
[   44.475029] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   44.247695] ==================================================================
[   44.247802] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   44.247802] 
[   44.247865] Corrupted memory at 0x00000000707e18ca [ ! . . . . . . . . . . . . . . . ] (in kfence-#200):
[   44.248176]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   44.248224]  kunit_try_run_case+0x170/0x3f0
[   44.248267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.248310]  kthread+0x328/0x630
[   44.248350]  ret_from_fork+0x10/0x20
[   44.248391] 
[   44.248417] kfence-#200: 0x00000000f659e042-0x0000000006d26912, size=73, cache=kmalloc-96
[   44.248417] 
[   44.248472] allocated by task 357 on cpu 1 at 44.247424s (0.001044s ago):
[   44.248536]  test_alloc+0x29c/0x628
[   44.248574]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   44.248615]  kunit_try_run_case+0x170/0x3f0
[   44.248672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.248715]  kthread+0x328/0x630
[   44.248752]  ret_from_fork+0x10/0x20
[   44.248792] 
[   44.248816] freed by task 357 on cpu 1 at 44.247577s (0.001235s ago):
[   44.248878]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   44.248919]  kunit_try_run_case+0x170/0x3f0
[   44.248958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.249002]  kthread+0x328/0x630
[   44.249037]  ret_from_fork+0x10/0x20
[   44.249076] 
[   44.249122] CPU: 1 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   44.249208] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   44.249239] Hardware name: linux,dummy-virt (DT)
[   44.249271] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   44.143710] ==================================================================
[   44.143816] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   44.143816] 
[   44.143917] Out-of-bounds read at 0x0000000067aeaa41 (105B right of kfence-#199):
[   44.143978]  test_kmalloc_aligned_oob_read+0x238/0x468
[   44.144025]  kunit_try_run_case+0x170/0x3f0
[   44.144068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.144113]  kthread+0x328/0x630
[   44.144153]  ret_from_fork+0x10/0x20
[   44.144195] 
[   44.144219] kfence-#199: 0x0000000050a4bc7d-0x00000000cd3e3944, size=73, cache=kmalloc-96
[   44.144219] 
[   44.144272] allocated by task 355 on cpu 1 at 44.143435s (0.000833s ago):
[   44.144347]  test_alloc+0x29c/0x628
[   44.144384]  test_kmalloc_aligned_oob_read+0x100/0x468
[   44.144426]  kunit_try_run_case+0x170/0x3f0
[   44.144469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.144514]  kthread+0x328/0x630
[   44.144549]  ret_from_fork+0x10/0x20
[   44.144588] 
[   44.144652] CPU: 1 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   44.144744] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   44.144775] Hardware name: linux,dummy-virt (DT)
[   44.144811] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   37.903721] ==================================================================
[   37.903817] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   37.903817] 
[   37.903876] Corrupted memory at 0x00000000343c3ed7 [ ! ] (in kfence-#139):
[   37.904006]  test_corruption+0x284/0x378
[   37.904050]  kunit_try_run_case+0x170/0x3f0
[   37.904091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.904136]  kthread+0x328/0x630
[   37.904174]  ret_from_fork+0x10/0x20
[   37.904215] 
[   37.904238] kfence-#139: 0x0000000007aec171-0x00000000dddfc131, size=32, cache=kmalloc-32
[   37.904238] 
[   37.904291] allocated by task 343 on cpu 1 at 37.903422s (0.000865s ago):
[   37.904356]  test_alloc+0x29c/0x628
[   37.904394]  test_corruption+0x198/0x378
[   37.904433]  kunit_try_run_case+0x170/0x3f0
[   37.904472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.904514]  kthread+0x328/0x630
[   37.904550]  ret_from_fork+0x10/0x20
[   37.904589] 
[   37.904612] freed by task 343 on cpu 1 at 37.903531s (0.001077s ago):
[   37.904688]  test_corruption+0x284/0x378
[   37.904727]  kunit_try_run_case+0x170/0x3f0
[   37.904765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.904809]  kthread+0x328/0x630
[   37.904843]  ret_from_fork+0x10/0x20
[   37.904882] 
[   37.904925] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   37.905010] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   37.905042] Hardware name: linux,dummy-virt (DT)
[   37.905075] ==================================================================
[   38.111548] ==================================================================
[   38.111637] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   38.111637] 
[   38.111714] Corrupted memory at 0x00000000f6055e62 [ ! ] (in kfence-#141):
[   38.111837]  test_corruption+0x1d8/0x378
[   38.111881]  kunit_try_run_case+0x170/0x3f0
[   38.111924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.111968]  kthread+0x328/0x630
[   38.112008]  ret_from_fork+0x10/0x20
[   38.112046] 
[   38.112072] kfence-#141: 0x000000000ffde778-0x00000000506e5d33, size=32, cache=test
[   38.112072] 
[   38.112126] allocated by task 345 on cpu 1 at 38.111396s (0.000726s ago):
[   38.112188]  test_alloc+0x230/0x628
[   38.112226]  test_corruption+0x198/0x378
[   38.112264]  kunit_try_run_case+0x170/0x3f0
[   38.112302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.112346]  kthread+0x328/0x630
[   38.112382]  ret_from_fork+0x10/0x20
[   38.112420] 
[   38.112443] freed by task 345 on cpu 1 at 38.111458s (0.000981s ago):
[   38.112504]  test_corruption+0x1d8/0x378
[   38.112542]  kunit_try_run_case+0x170/0x3f0
[   38.112581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.112622]  kthread+0x328/0x630
[   38.112672]  ret_from_fork+0x10/0x20
[   38.112709] 
[   38.112755] CPU: 1 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   38.112838] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   38.112868] Hardware name: linux,dummy-virt (DT)
[   38.112901] ==================================================================
[   37.799971] ==================================================================
[   37.800084] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   37.800084] 
[   37.800149] Corrupted memory at 0x000000004c512947 [ ! . . . . . . . . . . . . . . . ] (in kfence-#138):
[   37.800569]  test_corruption+0x278/0x378
[   37.800614]  kunit_try_run_case+0x170/0x3f0
[   37.800680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.800726]  kthread+0x328/0x630
[   37.800766]  ret_from_fork+0x10/0x20
[   37.800807] 
[   37.800831] kfence-#138: 0x000000008b114885-0x0000000078c09164, size=32, cache=kmalloc-32
[   37.800831] 
[   37.800886] allocated by task 343 on cpu 1 at 37.799688s (0.001195s ago):
[   37.800948]  test_alloc+0x29c/0x628
[   37.800985]  test_corruption+0xdc/0x378
[   37.801024]  kunit_try_run_case+0x170/0x3f0
[   37.801061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.801104]  kthread+0x328/0x630
[   37.801139]  ret_from_fork+0x10/0x20
[   37.801178] 
[   37.801201] freed by task 343 on cpu 1 at 37.799795s (0.001402s ago):
[   37.801262]  test_corruption+0x278/0x378
[   37.801299]  kunit_try_run_case+0x170/0x3f0
[   37.801338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.801379]  kthread+0x328/0x630
[   37.801415]  ret_from_fork+0x10/0x20
[   37.801453] 
[   37.801500] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   37.801584] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   37.801616] Hardware name: linux,dummy-virt (DT)
[   37.801660] ==================================================================
[   38.007532] ==================================================================
[   38.007631] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   38.007631] 
[   38.007707] Corrupted memory at 0x0000000048178b9f [ ! . . . . . . . . . . . . . . . ] (in kfence-#140):
[   38.008025]  test_corruption+0x120/0x378
[   38.008069]  kunit_try_run_case+0x170/0x3f0
[   38.008112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.008154]  kthread+0x328/0x630
[   38.008193]  ret_from_fork+0x10/0x20
[   38.008232] 
[   38.008255] kfence-#140: 0x00000000a6091d5a-0x00000000eeca93e1, size=32, cache=test
[   38.008255] 
[   38.008310] allocated by task 345 on cpu 1 at 38.007384s (0.000922s ago):
[   38.008371]  test_alloc+0x230/0x628
[   38.008407]  test_corruption+0xdc/0x378
[   38.008445]  kunit_try_run_case+0x170/0x3f0
[   38.008484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.008528]  kthread+0x328/0x630
[   38.008565]  ret_from_fork+0x10/0x20
[   38.008603] 
[   38.008627] freed by task 345 on cpu 1 at 38.007444s (0.001180s ago):
[   38.008708]  test_corruption+0x120/0x378
[   38.008746]  kunit_try_run_case+0x170/0x3f0
[   38.008786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.008828]  kthread+0x328/0x630
[   38.008863]  ret_from_fork+0x10/0x20
[   38.008900] 
[   38.008945] CPU: 1 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   38.009026] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   38.009057] Hardware name: linux,dummy-virt (DT)
[   38.009090] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   37.591509] ==================================================================
[   37.591617] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   37.591617] 
[   37.591697] Invalid free of 0x000000005ffed9fb (in kfence-#136):
[   37.591761]  test_invalid_addr_free+0xec/0x238
[   37.591815]  kunit_try_run_case+0x170/0x3f0
[   37.591862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.591908]  kthread+0x328/0x630
[   37.591950]  ret_from_fork+0x10/0x20
[   37.591992] 
[   37.592017] kfence-#136: 0x000000002c6c6c07-0x00000000a5e1da47, size=32, cache=test
[   37.592017] 
[   37.592076] allocated by task 341 on cpu 0 at 37.591367s (0.000705s ago):
[   37.592145]  test_alloc+0x230/0x628
[   37.592184]  test_invalid_addr_free+0xd4/0x238
[   37.592226]  kunit_try_run_case+0x170/0x3f0
[   37.592267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.592313]  kthread+0x328/0x630
[   37.592351]  ret_from_fork+0x10/0x20
[   37.592392] 
[   37.592440] CPU: 0 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   37.592533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   37.592568] Hardware name: linux,dummy-virt (DT)
[   37.592606] ==================================================================
[   37.487536] ==================================================================
[   37.487636] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   37.487636] 
[   37.487712] Invalid free of 0x000000008d765188 (in kfence-#135):
[   37.487767]  test_invalid_addr_free+0x1ac/0x238
[   37.487812]  kunit_try_run_case+0x170/0x3f0
[   37.487857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.487901]  kthread+0x328/0x630
[   37.487942]  ret_from_fork+0x10/0x20
[   37.487981] 
[   37.488005] kfence-#135: 0x00000000a18a89e4-0x000000005d24ecdf, size=32, cache=kmalloc-32
[   37.488005] 
[   37.488060] allocated by task 339 on cpu 1 at 37.487392s (0.000663s ago):
[   37.488122]  test_alloc+0x29c/0x628
[   37.488162]  test_invalid_addr_free+0xd4/0x238
[   37.488200]  kunit_try_run_case+0x170/0x3f0
[   37.488239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.488281]  kthread+0x328/0x630
[   37.488316]  ret_from_fork+0x10/0x20
[   37.488356] 
[   37.488403] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   37.488487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   37.488517] Hardware name: linux,dummy-virt (DT)
[   37.488552] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   37.386246] ==================================================================
[   37.386336] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   37.386336] 
[   37.386464] Invalid free of 0x00000000bbdee733 (in kfence-#134):
[   37.386794]  test_double_free+0x100/0x238
[   37.387070]  kunit_try_run_case+0x170/0x3f0
[   37.387149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.387204]  kthread+0x328/0x630
[   37.387446]  ret_from_fork+0x10/0x20
[   37.387688] 
[   37.387724] kfence-#134: 0x00000000bbdee733-0x00000000df632a77, size=32, cache=test
[   37.387724] 
[   37.388214] allocated by task 337 on cpu 0 at 37.385888s (0.002316s ago):
[   37.388404]  test_alloc+0x230/0x628
[   37.388759]  test_double_free+0xd4/0x238
[   37.388988]  kunit_try_run_case+0x170/0x3f0
[   37.389053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.389384]  kthread+0x328/0x630
[   37.389534]  ret_from_fork+0x10/0x20
[   37.389590] 
[   37.389802] freed by task 337 on cpu 0 at 37.385990s (0.003806s ago):
[   37.390138]  test_double_free+0xf0/0x238
[   37.390387]  kunit_try_run_case+0x170/0x3f0
[   37.390524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.390745]  kthread+0x328/0x630
[   37.390997]  ret_from_fork+0x10/0x20
[   37.391136] 
[   37.391219] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   37.391725] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   37.391834] Hardware name: linux,dummy-virt (DT)
[   37.391985] ==================================================================
[   37.280000] ==================================================================
[   37.280464] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   37.280464] 
[   37.280564] Invalid free of 0x000000006cbf34a7 (in kfence-#133):
[   37.280662]  test_double_free+0x1bc/0x238
[   37.281031]  kunit_try_run_case+0x170/0x3f0
[   37.281113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.281431]  kthread+0x328/0x630
[   37.281776]  ret_from_fork+0x10/0x20
[   37.281848] 
[   37.281874] kfence-#133: 0x000000006cbf34a7-0x00000000ea42c04b, size=32, cache=kmalloc-32
[   37.281874] 
[   37.281986] allocated by task 335 on cpu 0 at 37.279749s (0.002187s ago):
[   37.282100]  test_alloc+0x29c/0x628
[   37.282274]  test_double_free+0xd4/0x238
[   37.282320]  kunit_try_run_case+0x170/0x3f0
[   37.282362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.282558]  kthread+0x328/0x630
[   37.282881]  ret_from_fork+0x10/0x20
[   37.283392] 
[   37.283521] freed by task 335 on cpu 0 at 37.279822s (0.003692s ago):
[   37.283602]  test_double_free+0x1ac/0x238
[   37.283661]  kunit_try_run_case+0x170/0x3f0
[   37.284054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.284148]  kthread+0x328/0x630
[   37.284188]  ret_from_fork+0x10/0x20
[   37.284684] 
[   37.284833] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   37.285270] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   37.285346] Hardware name: linux,dummy-virt (DT)
[   37.285618] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   31.931011] ==================================================================
[   31.931129] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   31.931190] Read of size 1 at addr fff00000c85ecd7f by task kunit_try_catch/170
[   31.931701] 
[   31.931737] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   31.931991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.932090] Hardware name: linux,dummy-virt (DT)
[   31.932123] Call trace:
[   31.932145]  show_stack+0x20/0x38 (C)
[   31.932199]  dump_stack_lvl+0x8c/0xd0
[   31.932244]  print_report+0x118/0x5e8
[   31.932288]  kasan_report+0xdc/0x128
[   31.932378]  __asan_report_load1_noabort+0x20/0x30
[   31.932428]  kmalloc_oob_left+0x2ec/0x320
[   31.932474]  kunit_try_run_case+0x170/0x3f0
[   31.932817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.932928]  kthread+0x328/0x630
[   31.933331]  ret_from_fork+0x10/0x20
[   31.933466] 
[   31.933579] Allocated by task 104:
[   31.933611]  kasan_save_stack+0x3c/0x68
[   31.934009]  kasan_save_track+0x20/0x40
[   31.934198]  kasan_save_alloc_info+0x40/0x58
[   31.934245]  __kasan_kmalloc+0xd4/0xd8
[   31.934585]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   31.934873]  kvasprintf+0xe0/0x180
[   31.935031]  kasprintf+0xd0/0x110
[   31.935064]  miscdev_test_can_open+0xac/0x2c8
[   31.935493]  miscdev_test_collision_reverse+0x3b8/0x650
[   31.935548]  kunit_try_run_case+0x170/0x3f0
[   31.935587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.935800]  kthread+0x328/0x630
[   31.936273]  ret_from_fork+0x10/0x20
[   31.936359] 
[   31.936595] Freed by task 3361656128:
[   31.937449] ------------[ cut here ]------------
[   31.938139] pool index -1 out of bounds (219) for stack id fff00000
[   31.942816] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#1: kunit_try_catch/170
[   32.010018] Modules linked in:
[   32.011514] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.012929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.013611] Hardware name: linux,dummy-virt (DT)
[   32.014432] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   32.015580] pc : depot_fetch_stack+0x68/0x88
[   32.016338] lr : depot_fetch_stack+0x68/0x88
[   32.016573] sp : ffff800080b57a50
[   32.016776] x29: ffff800080b57a50 x28: ffff800080087b08 x27: 1ffff00010010f61
[   32.017325] x26: 1ffff00010010f60 x25: ffff800080087b00 x24: ffff9501e9f78254
[   32.018026] x23: ffffc1ffc3217b00 x22: ffff9501eeab1208 x21: ffff9501eeab4568
[   32.019282] x20: fff00000c85ecd7f x19: ffff800080b57b60 x18: 00000000511e29a0
[   32.020368] x17: 000000005ff4b93d x16: 00000000f1f1f1f1 x15: 0000000000000007
[   32.021323] x14: 0000000000000000 x13: 0000000000000007 x12: ffff70001016aea7
[   32.022346] x11: 1ffff0001016aea6 x10: ffff70001016aea6 x9 : ffff9501e98f123c
[   32.023493] x8 : ffff800080b57537 x7 : 0000000000000001 x6 : ffff70001016aea6
[   32.024483] x5 : ffff800080b57530 x4 : 1ffe000019357a21 x3 : dfff800000000000
[   32.025493] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9abd100
[   32.026522] Call trace:
[   32.027024]  depot_fetch_stack+0x68/0x88 (P)
[   32.027742]  stack_depot_print+0x24/0x60
[   32.028302]  print_report+0x5e4/0x5e8
[   32.028510]  kasan_report+0xdc/0x128
[   32.028716]  __asan_report_load1_noabort+0x20/0x30
[   32.028940]  kmalloc_oob_left+0x2ec/0x320
[   32.029136]  kunit_try_run_case+0x170/0x3f0
[   32.029336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.029577]  kthread+0x328/0x630
[   32.029940]  ret_from_fork+0x10/0x20
[   32.030395] ---[ end trace 0000000000000000 ]---
[   32.031574] ------------[ cut here ]------------
[   32.031627] corrupt handle or use after stack_depot_put()
[   32.031739] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#1: kunit_try_catch/170
[   32.033520] Modules linked in:
[   32.033889] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.034911] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.035604] Hardware name: linux,dummy-virt (DT)
[   32.036104] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   32.036783] pc : stack_depot_print+0x54/0x60
[   32.037227] lr : stack_depot_print+0x54/0x60
[   32.037430] sp : ffff800080b57a60
[   32.037589] x29: ffff800080b57a60 x28: ffff800080087b08 x27: 1ffff00010010f61
[   32.037948] x26: 1ffff00010010f60 x25: ffff800080087b00 x24: ffff9501e9f78254
[   32.038290] x23: ffffc1ffc3217b00 x22: ffff9501eeab1208 x21: ffff9501eeab4568
[   32.038628] x20: fff00000c85ecd7f x19: ffff800080b57b60 x18: 00000000511e29a0
[   32.039518] x17: 000000005ff4b93d x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   32.040063] x14: ffff70001016af2c x13: 1ffe000019357a21 x12: ffff72a03e117255
[   32.040406] x11: 1ffff2a03e117254 x10: ffff72a03e117254 x9 : ffff9501e98f123c
[   32.040764] x8 : ffff9501f08b92a3 x7 : 0000000000000001 x6 : ffff72a03e117254
[   32.041203] x5 : ffff9501f08b92a0 x4 : 1ffe000019357a21 x3 : dfff800000000000
[   32.041603] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9abd100
[   32.042011] Call trace:
[   32.042180]  stack_depot_print+0x54/0x60 (P)
[   32.042420]  print_report+0x5e4/0x5e8
[   32.042666]  kasan_report+0xdc/0x128
[   32.042903]  __asan_report_load1_noabort+0x20/0x30
[   32.043157]  kmalloc_oob_left+0x2ec/0x320
[   32.043411]  kunit_try_run_case+0x170/0x3f0
[   32.043678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.043968]  kthread+0x328/0x630
[   32.044186]  ret_from_fork+0x10/0x20
[   32.044423] ---[ end trace 0000000000000000 ]---
[   32.044693] 
[   32.044723] The buggy address belongs to the object at fff00000c85ecd60
[   32.044723]  which belongs to the cache kmalloc-16 of size 16
[   32.044780] The buggy address is located 15 bytes to the right of
[   32.044780]  allocated 16-byte region [fff00000c85ecd60, fff00000c85ecd70)
[   32.044841] 
[   32.044864] The buggy address belongs to the physical page:
[   32.044903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec
[   32.044956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.045005] page_type: f5(slab)
[   32.045045] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.045093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.045131] page dumped because: kasan: bad access detected
[   32.045161] 
[   32.045178] Memory state around the buggy address:
[   32.045212]  fff00000c85ecc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.045255]  fff00000c85ecc80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.045296] >fff00000c85ecd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.045332]                                                                 ^
[   32.045372]  fff00000c85ecd80: 00 07 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.045411]  fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.045449] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   31.894545] ==================================================================
[   31.894898] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   31.895855] Write of size 1 at addr fff00000c9726173 by task kunit_try_catch/168
[   31.895965] 
[   31.896797] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   31.896948] Tainted: [N]=TEST
[   31.896980] Hardware name: linux,dummy-virt (DT)
[   31.897207] Call trace:
[   31.897398]  show_stack+0x20/0x38 (C)
[   31.897532]  dump_stack_lvl+0x8c/0xd0
[   31.897584]  print_report+0x118/0x5e8
[   31.897628]  kasan_report+0xdc/0x128
[   31.897684]  __asan_report_store1_noabort+0x20/0x30
[   31.897732]  kmalloc_oob_right+0x5a4/0x660
[   31.897778]  kunit_try_run_case+0x170/0x3f0
[   31.897828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.897879]  kthread+0x328/0x630
[   31.897922]  ret_from_fork+0x10/0x20
[   31.898086] 
[   31.898124] Allocated by task 168:
[   31.898240]  kasan_save_stack+0x3c/0x68
[   31.898305]  kasan_save_track+0x20/0x40
[   31.898341]  kasan_save_alloc_info+0x40/0x58
[   31.898377]  __kasan_kmalloc+0xd4/0xd8
[   31.898410]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.898451]  kmalloc_oob_right+0xb0/0x660
[   31.898487]  kunit_try_run_case+0x170/0x3f0
[   31.898524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.898566]  kthread+0x328/0x630
[   31.898598]  ret_from_fork+0x10/0x20
[   31.898664] 
[   31.898726] The buggy address belongs to the object at fff00000c9726100
[   31.898726]  which belongs to the cache kmalloc-128 of size 128
[   31.898819] The buggy address is located 0 bytes to the right of
[   31.898819]  allocated 115-byte region [fff00000c9726100, fff00000c9726173)
[   31.898885] 
[   31.899093] The buggy address belongs to the physical page:
[   31.899478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   31.899752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.904175] page_type: f5(slab)
[   31.904511] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.904571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.904690] page dumped because: kasan: bad access detected
[   31.904733] 
[   31.904758] Memory state around the buggy address:
[   31.904986]  fff00000c9726000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.905051]  fff00000c9726080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.905105] >fff00000c9726100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.905157]                                                              ^
[   31.905236]  fff00000c9726180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.905278]  fff00000c9726200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.905338] ==================================================================
[   31.905906] ==================================================================
[   31.906006] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   31.906058] Write of size 1 at addr fff00000c9726178 by task kunit_try_catch/168
[   31.906105] 
[   31.906171] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   31.906253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.906320] Hardware name: linux,dummy-virt (DT)
[   31.906378] Call trace:
[   31.906475]  show_stack+0x20/0x38 (C)
[   31.906613]  dump_stack_lvl+0x8c/0xd0
[   31.906674]  print_report+0x118/0x5e8
[   31.906718]  kasan_report+0xdc/0x128
[   31.906760]  _
[   31.906760]  __asan_report_store1_noabort+0x20/0x30
[   31.906808]  kmalloc_oob_right+0x538/0x660
[   31.906855]  kunit_try_run_case+0x170/0x3f0
[   31.906900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.906950]  kthread+0x328/0x630
[   31.906991]  ret_from_fork+0x10/0x20
[   31.907037] 
[   31.907055] Allocated by task 168:
[   31.907083]  kasan_save_stack+0x3c/0x68
[   31.907120]  kasan_save_track+0x20/0x40
[   31.907153]  kasan_save_alloc_info+0x40/0x58
[   31.907190]  __kasan_kmalloc+0xd4/0xd8
[   31.907223]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.907262]  kmalloc_oob_right+0xb0/0x660
[   31.907298]  kunit_try_run_case+0x170/0x3f0
[   31.907392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.907812]  kthread+0x328/0x630
[   31.907846]  ret_from_fork+0x10/0x20
[   31.908206] 
[   31.908245] The buggy address belongs to the object at fff00000c9726100
[   31.908245]  which belongs to the cache kmalloc-128 of size 128
[   31.909015] The buggy address is located 5 bytes to the right of
[   31.909015]  allocated 115-byte region [fff00000c9726100, fff00000c9726173)
[   31.909664] 
[   31.909691] The buggy address belongs to the physical page:
[   31.909725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   31.909780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.909825] page_type: f5(slab)
[   31.909861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.910482] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.910527] page dumped because: kasan: bad access detected
[   31.911238] 
[   31.911273] Memory state around the buggy address:
[   31.911308]  fff00000c9726000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.911352]  fff00000c9726080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.911393] >fff00000c9726100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.911429]                                                                 ^
[   31.911949]  fff00000c9726180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.912092]  fff00000c9726200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.912160] ==================================================================
[   31.912774] ==================================================================
[   31.912822] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   31.912873] Read of size 1 at addr fff00000c9726180 by task kunit_try_catch/168
[   31.912920] 
[   31.912964] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   31.913047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.913072] Hardware name: linux,dummy-virt (DT)
[   31.913240] Call trace:
[   31.913275]  show_stack+0x20/0x38 (C)
[   31.913338]  dump_stack_lvl+0x8c/0xd0
[   31.913476]  print_report+0x118/0x5e8
[   31.913519]  kasan_report+0xdc/0x128
[   31.913561]  __asan_report_load1_noabort+0x20/0x30
[   31.913678]  kmalloc_oob_right+0x5d0/0x660
[   31.913725]  kunit_try_run_case+0x170/0x3f0
[   31.913770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.913928]  kthread+0x328/0x630
[   31.914016]  ret_from_fork+0x10/0x20
[   31.914154] 
[   31.914207] Allocated by task 168:
[   31.914234]  kasan_save_stack+0x3c/0x68
[   31.914311]  kasan_save_track+0x20/0x40
[   31.914345]  kasan_save_alloc_info+0x40/0x58
[   31.914381]  __kasan_kmalloc+0xd4/0xd8
[   31.914414]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.914545]  kmalloc_oob_right+0xb0/0x660
[   31.914588]  kunit_try_run_case+0x170/0x3f0
[   31.914673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.914764]  kthread+0x328/0x630
[   31.914795]  ret_from_fork+0x10/0x20
[   31.914830] 
[   31.914849] The buggy address belongs to the object at fff00000c9726100
[   31.914849]  which belongs to the cache kmalloc-128 of size 128
[   31.914903] The buggy address is located 13 bytes to the right of
[   31.914903]  allocated 115-byte region [fff00000c9726100, fff00000c9726173)
[   31.914965] 
[   31.914993] The buggy address belongs to the physical page:
[   31.915024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   31.915137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.915203] page_type: f5(slab)
[   31.915249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.915397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.915516] page dumped because: kasan: bad access detected
[   31.915606] 
[   31.915660] Memory state around the buggy address:
[   31.915758]  fff00000c9726080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.915801]  fff00000c9726100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.915842] >fff00000c9726180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.915930]                    ^
[   31.915959]  fff00000c9726200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.916011]  fff00000c9726280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.916047] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   36.969861] ==================================================================
[   36.970020] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   36.970020] 
[   36.970129] Use-after-free read at 0x000000002149d620 (in kfence-#130):
[   36.970420]  test_use_after_free_read+0x114/0x248
[   36.970487]  kunit_try_run_case+0x170/0x3f0
[   36.970724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.970818]  kthread+0x328/0x630
[   36.970865]  ret_from_fork+0x10/0x20
[   36.970997] 
[   36.971055] kfence-#130: 0x000000002149d620-0x0000000020883beb, size=32, cache=test
[   36.971055] 
[   36.971185] allocated by task 329 on cpu 0 at 36.969069s (0.002099s ago):
[   36.971381]  test_alloc+0x230/0x628
[   36.971538]  test_use_after_free_read+0xd0/0x248
[   36.971895]  kunit_try_run_case+0x170/0x3f0
[   36.971981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.972029]  kthread+0x328/0x630
[   36.972100]  ret_from_fork+0x10/0x20
[   36.972164] 
[   36.972199] freed by task 329 on cpu 0 at 36.969663s (0.002532s ago):
[   36.972627]  test_use_after_free_read+0xf0/0x248
[   36.972729]  kunit_try_run_case+0x170/0x3f0
[   36.972775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.972950]  kthread+0x328/0x630
[   36.973163]  ret_from_fork+0x10/0x20
[   36.973455] 
[   36.973636] CPU: 0 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   36.974130] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.974197] Hardware name: linux,dummy-virt (DT)
[   36.974258] ==================================================================
[   36.865249] ==================================================================
[   36.865376] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   36.865376] 
[   36.865490] Use-after-free read at 0x0000000015bad9b4 (in kfence-#129):
[   36.865548]  test_use_after_free_read+0x114/0x248
[   36.865594]  kunit_try_run_case+0x170/0x3f0
[   36.865652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.865700]  kthread+0x328/0x630
[   36.865740]  ret_from_fork+0x10/0x20
[   36.865783] 
[   36.865818] kfence-#129: 0x0000000015bad9b4-0x000000002ebecb11, size=32, cache=kmalloc-32
[   36.865818] 
[   36.865877] allocated by task 327 on cpu 0 at 36.864412s (0.001460s ago):
[   36.865952]  test_alloc+0x29c/0x628
[   36.865998]  test_use_after_free_read+0xd0/0x248
[   36.866040]  kunit_try_run_case+0x170/0x3f0
[   36.866087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.866134]  kthread+0x328/0x630
[   36.866172]  ret_from_fork+0x10/0x20
[   36.866212] 
[   36.866245] freed by task 327 on cpu 0 at 36.864922s (0.001310s ago):
[   36.866313]  test_use_after_free_read+0x1c0/0x248
[   36.866355]  kunit_try_run_case+0x170/0x3f0
[   36.866395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.866439]  kthread+0x328/0x630
[   36.866476]  ret_from_fork+0x10/0x20
[   36.866517] 
[   36.866575] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   36.866679] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.866712] Hardware name: linux,dummy-virt (DT)
[   36.866749] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   36.552781] ==================================================================
[   36.552882] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   36.552882] 
[   36.552977] Out-of-bounds write at 0x00000000625a8668 (1B left of kfence-#126):
[   36.553039]  test_out_of_bounds_write+0x100/0x240
[   36.553097]  kunit_try_run_case+0x170/0x3f0
[   36.553142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.553188]  kthread+0x328/0x630
[   36.553226]  ret_from_fork+0x10/0x20
[   36.553268] 
[   36.553292] kfence-#126: 0x00000000332878e5-0x00000000cd886ff5, size=32, cache=kmalloc-32
[   36.553292] 
[   36.553350] allocated by task 323 on cpu 0 at 36.552334s (0.001013s ago):
[   36.553426]  test_alloc+0x29c/0x628
[   36.553466]  test_out_of_bounds_write+0xc8/0x240
[   36.553507]  kunit_try_run_case+0x170/0x3f0
[   36.553556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.553602]  kthread+0x328/0x630
[   36.553658]  ret_from_fork+0x10/0x20
[   36.553701] 
[   36.553757] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   36.553851] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.553895] Hardware name: linux,dummy-virt (DT)
[   36.553931] ==================================================================
[   36.759848] ==================================================================
[   36.760072] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   36.760072] 
[   36.760242] Out-of-bounds write at 0x00000000bfaf1df0 (1B left of kfence-#128):
[   36.760308]  test_out_of_bounds_write+0x100/0x240
[   36.760356]  kunit_try_run_case+0x170/0x3f0
[   36.760586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.760680]  kthread+0x328/0x630
[   36.760798]  ret_from_fork+0x10/0x20
[   36.760842] 
[   36.760868] kfence-#128: 0x000000008bc07da7-0x0000000013f1d3ad, size=32, cache=test
[   36.760868] 
[   36.760971] allocated by task 325 on cpu 0 at 36.759758s (0.001164s ago):
[   36.761047]  test_alloc+0x230/0x628
[   36.761087]  test_out_of_bounds_write+0xc8/0x240
[   36.761145]  kunit_try_run_case+0x170/0x3f0
[   36.761389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.761452]  kthread+0x328/0x630
[   36.761491]  ret_from_fork+0x10/0x20
[   36.761531] 
[   36.761578] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   36.761710] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.761759] Hardware name: linux,dummy-virt (DT)
[   36.761795] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   36.345543] ==================================================================
[   36.345651] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   36.345651] 
[   36.346155] Out-of-bounds read at 0x00000000b6456cb5 (32B right of kfence-#124):
[   36.346397]  test_out_of_bounds_read+0x1c8/0x3e0
[   36.346470]  kunit_try_run_case+0x170/0x3f0
[   36.346669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.346838]  kthread+0x328/0x630
[   36.346895]  ret_from_fork+0x10/0x20
[   36.346946] 
[   36.347209] kfence-#124: 0x0000000091f4eb72-0x000000006f5f8b51, size=32, cache=test
[   36.347209] 
[   36.347393] allocated by task 321 on cpu 0 at 36.345332s (0.002056s ago):
[   36.347475]  test_alloc+0x230/0x628
[   36.347928]  test_out_of_bounds_read+0x198/0x3e0
[   36.348518]  kunit_try_run_case+0x170/0x3f0
[   36.348793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.348908]  kthread+0x328/0x630
[   36.349012]  ret_from_fork+0x10/0x20
[   36.349086] 
[   36.349366] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   36.349687] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.349899] Hardware name: linux,dummy-virt (DT)
[   36.350061] ==================================================================
[   35.929341] ==================================================================
[   35.929429] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   35.929429] 
[   35.929839] Out-of-bounds read at 0x0000000085d1644f (32B right of kfence-#120):
[   35.929931]  test_out_of_bounds_read+0x1c8/0x3e0
[   35.929981]  kunit_try_run_case+0x170/0x3f0
[   35.930027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.930072]  kthread+0x328/0x630
[   35.930108]  ret_from_fork+0x10/0x20
[   35.930150] 
[   35.930176] kfence-#120: 0x000000003616e1f3-0x000000002d90d518, size=32, cache=kmalloc-32
[   35.930176] 
[   35.930231] allocated by task 319 on cpu 0 at 35.929070s (0.001157s ago):
[   35.930330]  test_alloc+0x29c/0x628
[   35.930370]  test_out_of_bounds_read+0x198/0x3e0
[   35.930411]  kunit_try_run_case+0x170/0x3f0
[   35.930460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.930506]  kthread+0x328/0x630
[   35.930546]  ret_from_fork+0x10/0x20
[   35.930587] 
[   35.930634] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.930741] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.930777] Hardware name: linux,dummy-virt (DT)
[   35.930820] ==================================================================
[   35.826142] ==================================================================
[   35.826271] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   35.826271] 
[   35.830655] Out-of-bounds read at 0x000000007973d443 (1B left of kfence-#119):
[   35.830820]  test_out_of_bounds_read+0x114/0x3e0
[   35.830886]  kunit_try_run_case+0x170/0x3f0
[   35.830933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.830978]  kthread+0x328/0x630
[   35.831019]  ret_from_fork+0x10/0x20
[   35.831059] 
[   35.831085] kfence-#119: 0x0000000085335c55-0x000000009bbf585f, size=32, cache=kmalloc-32
[   35.831085] 
[   35.831144] allocated by task 319 on cpu 0 at 35.825690s (0.005451s ago):
[   35.831223]  test_alloc+0x29c/0x628
[   35.831262]  test_out_of_bounds_read+0xdc/0x3e0
[   35.831303]  kunit_try_run_case+0x170/0x3f0
[   35.831344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.831388]  kthread+0x328/0x630
[   35.831425]  ret_from_fork+0x10/0x20
[   35.831482] 
[   35.831532] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.831626] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.831695] Hardware name: linux,dummy-virt (DT)
[   35.831732] ==================================================================
[   36.241489] ==================================================================
[   36.241589] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   36.241589] 
[   36.241689] Out-of-bounds read at 0x00000000969fc7fe (1B left of kfence-#123):
[   36.241753]  test_out_of_bounds_read+0x114/0x3e0
[   36.242381]  kunit_try_run_case+0x170/0x3f0
[   36.242521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.242582]  kthread+0x328/0x630
[   36.242806]  ret_from_fork+0x10/0x20
[   36.242867] 
[   36.242894] kfence-#123: 0x0000000044e64a4c-0x00000000d8921c92, size=32, cache=test
[   36.242894] 
[   36.243482] allocated by task 321 on cpu 0 at 36.241156s (0.002303s ago):
[   36.244061]  test_alloc+0x230/0x628
[   36.244374]  test_out_of_bounds_read+0xdc/0x3e0
[   36.244777]  kunit_try_run_case+0x170/0x3f0
[   36.245220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.245281]  kthread+0x328/0x630
[   36.245740]  ret_from_fork+0x10/0x20
[   36.245806] 
[   36.245857] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   36.246354] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   36.246446] Hardware name: linux,dummy-virt (DT)
[   36.246485] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-krealloc_noprof
[   32.349684] ==================================================================
[   32.350086] BUG: KFENCE: invalid free in krealloc_noprof+0x148/0x360
[   32.350086] 
[   32.350176] Invalid free of 0x00000000fc6b217a (in kfence-#96):
[   32.350220]  krealloc_noprof+0x148/0x360
[   32.350335]  krealloc_uaf+0x180/0x520
[   32.350378]  kunit_try_run_case+0x170/0x3f0
[   32.350416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.351282]  kthread+0x328/0x630
[   32.351338]  ret_from_fork+0x10/0x20
[   32.351375] 
[   32.351393] kfence-#96: 0x00000000fc6b217a-0x000000007ad0ddf6, size=201, cache=kmalloc-256
[   32.351393] 
[   32.351447] allocated by task 196 on cpu 1 at 32.337151s (0.014293s ago):
[   32.351507]  krealloc_uaf+0xc8/0x520
[   32.351544]  kunit_try_run_case+0x170/0x3f0
[   32.351579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.351620]  kthread+0x328/0x630
[   32.351664]  ret_from_fork+0x10/0x20
[   32.351698] 
[   32.351716] freed by task 196 on cpu 1 at 32.337250s (0.014463s ago):
[   32.351776]  krealloc_uaf+0x12c/0x520
[   32.351811]  kunit_try_run_case+0x170/0x3f0
[   32.351847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.351887]  kthread+0x328/0x630
[   32.351917]  ret_from_fork+0x10/0x20
[   32.351951] 
[   32.351981] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.352338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.352403] Hardware name: linux,dummy-virt (DT)
[   32.352467] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-__memcpy
[   32.338692] ==================================================================
[   32.338780] BUG: KFENCE: use-after-free read in __memcpy+0xc/0x30
[   32.338780] 
[   32.339324] Use-after-free read at 0x00000000fc6b217a (in kfence-#96):
[   32.340463]  __memcpy+0xc/0x30
[   32.340545]  krealloc_uaf+0x180/0x520
[   32.340594]  kunit_try_run_case+0x170/0x3f0
[   32.340943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.341041]  kthread+0x328/0x630
[   32.341129]  ret_from_fork+0x10/0x20
[   32.341281] 
[   32.341958] kfence-#96: 0x00000000fc6b217a-0x000000007ad0ddf6, size=201, cache=kmalloc-256
[   32.341958] 
[   32.342214] allocated by task 196 on cpu 1 at 32.337151s (0.004965s ago):
[   32.342699]  krealloc_uaf+0xc8/0x520
[   32.342761]  kunit_try_run_case+0x170/0x3f0
[   32.342798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.342861]  kthread+0x328/0x630
[   32.342893]  ret_from_fork+0x10/0x20
[   32.343780] 
[   32.344734] freed by task 196 on cpu 1 at 32.337250s (0.006958s ago):
[   32.345130]  krealloc_uaf+0x12c/0x520
[   32.345411]  kunit_try_run_case+0x170/0x3f0
[   32.345624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.345779]  kthread+0x328/0x630
[   32.345829]  ret_from_fork+0x10/0x20
[   32.345978] 
[   32.346450] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.346627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.346748] Hardware name: linux,dummy-virt (DT)
[   32.346949] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   35.688926] ==================================================================
[   35.688986] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   35.689493] Write of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317
[   35.689699] 
[   35.689745] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.690192] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.690246] Hardware name: linux,dummy-virt (DT)
[   35.690283] Call trace:
[   35.690309]  show_stack+0x20/0x38 (C)
[   35.690575]  dump_stack_lvl+0x8c/0xd0
[   35.690675]  print_report+0x118/0x5e8
[   35.691004]  kasan_report+0xdc/0x128
[   35.691446]  kasan_check_range+0x100/0x1a8
[   35.691546]  __kasan_check_write+0x20/0x30
[   35.691682]  strncpy_from_user+0x3c/0x2a0
[   35.691787]  copy_user_test_oob+0x5c0/0xec8
[   35.691915]  kunit_try_run_case+0x170/0x3f0
[   35.691967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.692043]  kthread+0x328/0x630
[   35.692089]  ret_from_fork+0x10/0x20
[   35.692752] 
[   35.692959] Allocated by task 317:
[   35.693186]  kasan_save_stack+0x3c/0x68
[   35.693256]  kasan_save_track+0x20/0x40
[   35.693437]  kasan_save_alloc_info+0x40/0x58
[   35.693652]  __kasan_kmalloc+0xd4/0xd8
[   35.693947]  __kmalloc_noprof+0x198/0x4c8
[   35.694060]  kunit_kmalloc_array+0x34/0x88
[   35.694105]  copy_user_test_oob+0xac/0xec8
[   35.694947]  kunit_try_run_case+0x170/0x3f0
[   35.695017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.695064]  kthread+0x328/0x630
[   35.695101]  ret_from_fork+0x10/0x20
[   35.695140] 
[   35.695687] The buggy address belongs to the object at fff00000c9a8b900
[   35.695687]  which belongs to the cache kmalloc-128 of size 128
[   35.695890] The buggy address is located 0 bytes inside of
[   35.695890]  allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978)
[   35.696191] 
[   35.696454] The buggy address belongs to the physical page:
[   35.696784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   35.697177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.697245] page_type: f5(slab)
[   35.697738] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.698162] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.698305] page dumped because: kasan: bad access detected
[   35.698393] 
[   35.698598] Memory state around the buggy address:
[   35.698844]  fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.698915]  fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.698966] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.699594]                                                                 ^
[   35.699775]  fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.699904]  fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.700014] ==================================================================
[   35.701515] ==================================================================
[   35.701572] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   35.702042] Write of size 1 at addr fff00000c9a8b978 by task kunit_try_catch/317
[   35.702173] 
[   35.702218] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.702828] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.702932] Hardware name: linux,dummy-virt (DT)
[   35.703028] Call trace:
[   35.703057]  show_stack+0x20/0x38 (C)
[   35.703117]  dump_stack_lvl+0x8c/0xd0
[   35.703167]  print_report+0x118/0x5e8
[   35.703226]  kasan_report+0xdc/0x128
[   35.703719]  __asan_report_store1_noabort+0x20/0x30
[   35.704067]  strncpy_from_user+0x270/0x2a0
[   35.704192]  copy_user_test_oob+0x5c0/0xec8
[   35.704269]  kunit_try_run_case+0x170/0x3f0
[   35.704409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.704898]  kthread+0x328/0x630
[   35.705262]  ret_from_fork+0x10/0x20
[   35.705659] 
[   35.705892] Allocated by task 317:
[   35.706135]  kasan_save_stack+0x3c/0x68
[   35.706249]  kasan_save_track+0x20/0x40
[   35.706298]  kasan_save_alloc_info+0x40/0x58
[   35.706478]  __kasan_kmalloc+0xd4/0xd8
[   35.706724]  __kmalloc_noprof+0x198/0x4c8
[   35.707130]  kunit_kmalloc_array+0x34/0x88
[   35.707535]  copy_user_test_oob+0xac/0xec8
[   35.707624]  kunit_try_run_case+0x170/0x3f0
[   35.707825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.707921]  kthread+0x328/0x630
[   35.708188]  ret_from_fork+0x10/0x20
[   35.708243] 
[   35.708268] The buggy address belongs to the object at fff00000c9a8b900
[   35.708268]  which belongs to the cache kmalloc-128 of size 128
[   35.708360] The buggy address is located 0 bytes to the right of
[   35.708360]  allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978)
[   35.708434] 
[   35.708463] The buggy address belongs to the physical page:
[   35.708518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   35.708574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.708627] page_type: f5(slab)
[   35.708690] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.708753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.708808] page dumped because: kasan: bad access detected
[   35.708841] 
[   35.708863] Memory state around the buggy address:
[   35.708898]  fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.708952]  fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.708997] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.709054]                                                                 ^
[   35.709109]  fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.709154]  fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.709202] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   35.504984] ==================================================================
[   35.505111] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   35.505333] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/301
[   35.505555] 
[   35.505628] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.505784] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.505829] Hardware name: linux,dummy-virt (DT)
[   35.505868] Call trace:
[   35.505915]  show_stack+0x20/0x38 (C)
[   35.506133]  dump_stack_lvl+0x8c/0xd0
[   35.506187]  print_report+0x310/0x5e8
[   35.506234]  kasan_report+0xdc/0x128
[   35.506280]  __asan_report_load1_noabort+0x20/0x30
[   35.506675]  vmalloc_oob+0x578/0x5d0
[   35.506756]  kunit_try_run_case+0x170/0x3f0
[   35.506962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.507151]  kthread+0x328/0x630
[   35.507495]  ret_from_fork+0x10/0x20
[   35.507704] 
[   35.507745] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0
[   35.508047] The buggy address belongs to the physical page:
[   35.508112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9d
[   35.508210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.508876] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.508964] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.509029] page dumped because: kasan: bad access detected
[   35.509225] 
[   35.509316] Memory state around the buggy address:
[   35.509549]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.509636]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.510018] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   35.510119]                                                              ^
[   35.510217]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.510350]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.510480] ==================================================================
[   35.512624] ==================================================================
[   35.512710] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   35.512776] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/301
[   35.513147] 
[   35.513281] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.513398] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.513460] Hardware name: linux,dummy-virt (DT)
[   35.513495] Call trace:
[   35.513536]  show_stack+0x20/0x38 (C)
[   35.513788]  dump_stack_lvl+0x8c/0xd0
[   35.514163]  print_report+0x310/0x5e8
[   35.514376]  kasan_report+0xdc/0x128
[   35.514523]  __asan_report_load1_noabort+0x20/0x30
[   35.514598]  vmalloc_oob+0x51c/0x5d0
[   35.514727]  kunit_try_run_case+0x170/0x3f0
[   35.514782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.514837]  kthread+0x328/0x630
[   35.515022]  ret_from_fork+0x10/0x20
[   35.515325] 
[   35.515392] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0
[   35.515728] The buggy address belongs to the physical page:
[   35.515854] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9d
[   35.516310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.516418] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.516474] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.516518] page dumped because: kasan: bad access detected
[   35.516571] 
[   35.516601] Memory state around the buggy address:
[   35.516651]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.516712]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.516759] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   35.516808]                                                                 ^
[   35.516868]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.516922]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.516962] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   35.161971] ==================================================================
[   35.162024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.162489] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.162786] 
[   35.162823] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.162994] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.163085] Hardware name: linux,dummy-virt (DT)
[   35.163435] Call trace:
[   35.163497]  show_stack+0x20/0x38 (C)
[   35.163625]  dump_stack_lvl+0x8c/0xd0
[   35.163743]  print_report+0x118/0x5e8
[   35.163849]  kasan_report+0xdc/0x128
[   35.164231]  __asan_report_load4_noabort+0x20/0x30
[   35.164318]  kasan_atomics_helper+0x3dd8/0x4858
[   35.164631]  kasan_atomics+0x198/0x2e0
[   35.164756]  kunit_try_run_case+0x170/0x3f0
[   35.164871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.165032]  kthread+0x328/0x630
[   35.165268]  ret_from_fork+0x10/0x20
[   35.165502] 
[   35.165555] Allocated by task 297:
[   35.165605]  kasan_save_stack+0x3c/0x68
[   35.166010]  kasan_save_track+0x20/0x40
[   35.166250]  kasan_save_alloc_info+0x40/0x58
[   35.166406]  __kasan_kmalloc+0xd4/0xd8
[   35.166714]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.166842]  kasan_atomics+0xb8/0x2e0
[   35.167020]  kunit_try_run_case+0x170/0x3f0
[   35.167159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.167274]  kthread+0x328/0x630
[   35.167531]  ret_from_fork+0x10/0x20
[   35.167775] 
[   35.167820] The buggy address belongs to the object at fff00000c9a5e780
[   35.167820]  which belongs to the cache kmalloc-64 of size 64
[   35.167910] The buggy address is located 0 bytes to the right of
[   35.167910]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.167979] 
[   35.168016] The buggy address belongs to the physical page:
[   35.168193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.168261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.168313] page_type: f5(slab)
[   35.168652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.168784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.169286] page dumped because: kasan: bad access detected
[   35.169403] 
[   35.169424] Memory state around the buggy address:
[   35.169461]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.169515]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.169989] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.170282]                                      ^
[   35.170378]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.170540]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.170589] ==================================================================
[   35.052836] ==================================================================
[   35.052902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.052959] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.053137] 
[   35.053298] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.053694] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.053893] Hardware name: linux,dummy-virt (DT)
[   35.054061] Call trace:
[   35.054091]  show_stack+0x20/0x38 (C)
[   35.054147]  dump_stack_lvl+0x8c/0xd0
[   35.054477]  print_report+0x118/0x5e8
[   35.054551]  kasan_report+0xdc/0x128
[   35.055004]  __asan_report_load4_noabort+0x20/0x30
[   35.055241]  kasan_atomics_helper+0x42d8/0x4858
[   35.055442]  kasan_atomics+0x198/0x2e0
[   35.055565]  kunit_try_run_case+0x170/0x3f0
[   35.055658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.055726]  kthread+0x328/0x630
[   35.055769]  ret_from_fork+0x10/0x20
[   35.055820] 
[   35.055845] Allocated by task 297:
[   35.055888]  kasan_save_stack+0x3c/0x68
[   35.055931]  kasan_save_track+0x20/0x40
[   35.055967]  kasan_save_alloc_info+0x40/0x58
[   35.056008]  __kasan_kmalloc+0xd4/0xd8
[   35.056045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.056089]  kasan_atomics+0xb8/0x2e0
[   35.056126]  kunit_try_run_case+0x170/0x3f0
[   35.056177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.056222]  kthread+0x328/0x630
[   35.056255]  ret_from_fork+0x10/0x20
[   35.056300] 
[   35.056324] The buggy address belongs to the object at fff00000c9a5e780
[   35.056324]  which belongs to the cache kmalloc-64 of size 64
[   35.056383] The buggy address is located 0 bytes to the right of
[   35.056383]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.057505] page dumped because: kasan: bad access detected
[   35.057671] 
[   35.057870] Memory state around the buggy address:
[   35.058090]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.059104]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.061600] 
[   35.062438] Hardware name: linux,dummy-virt (DT)
[   35.063850]  kasan_atomics+0x198/0x2e0
[   35.066600] 
[   35.066658] The buggy address belongs to the object at fff00000c9a5e780
[   35.066658]  which belongs to the cache kmalloc-64 of size 64
[   35.067036] The buggy address is located 0 bytes to the right of
[   35.067036]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.067314] 
[   35.067532] The buggy address belongs to the physical page:
[   35.067727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.067870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.068008] page_type: f5(slab)
[   35.068083] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.068170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.068259] page dumped because: kasan: bad access detected
[   35.068406] 
[   35.068442] Memory state around the buggy address:
[   35.068670]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.068735]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.068805] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.068846]                                      ^
[   35.068895]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.068942]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.068982] ==================================================================
[   35.381588] ==================================================================
[   35.381769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   35.381855] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.381908] 
[   35.382227] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.382344] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.382379] Hardware name: linux,dummy-virt (DT)
[   35.382872] Call trace:
[   35.383219]  show_stack+0x20/0x38 (C)
[   35.383288]  dump_stack_lvl+0x8c/0xd0
[   35.383374]  print_report+0x118/0x5e8
[   35.383458]  kasan_report+0xdc/0x128
[   35.383540]  kasan_check_range+0x100/0x1a8
[   35.383628]  __kasan_check_write+0x20/0x30
[   35.384013]  kasan_atomics_helper+0x147c/0x4858
[   35.384538]  kasan_atomics+0x198/0x2e0
[   35.384649]  kunit_try_run_case+0x170/0x3f0
[   35.384734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.384909]  kthread+0x328/0x630
[   35.384984]  ret_from_fork+0x10/0x20
[   35.385063] 
[   35.385107] Allocated by task 297:
[   35.385164]  kasan_save_stack+0x3c/0x68
[   35.385208]  kasan_save_track+0x20/0x40
[   35.385254]  kasan_save_alloc_info+0x40/0x58
[   35.385295]  __kasan_kmalloc+0xd4/0xd8
[   35.385332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.385376]  kasan_atomics+0xb8/0x2e0
[   35.385437]  kunit_try_run_case+0x170/0x3f0
[   35.385478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.385523]  kthread+0x328/0x630
[   35.385559]  ret_from_fork+0x10/0x20
[   35.385597] 
[   35.385628] The buggy address belongs to the object at fff00000c9a5e780
[   35.385628]  which belongs to the cache kmalloc-64 of size 64
[   35.385702] The buggy address is located 0 bytes to the right of
[   35.385702]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.385777] 
[   35.385800] The buggy address belongs to the physical page:
[   35.385845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.385903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.385952] page_type: f5(slab)
[   35.385993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.386043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.386085] page dumped because: kasan: bad access detected
[   35.386118] 
[   35.386141] Memory state around the buggy address:
[   35.386175]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.386235]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.386281] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.386330]                                      ^
[   35.386387]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.386435]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.386475] ==================================================================
[   35.287024] ==================================================================
[   35.287142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   35.287229] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.287290] 
[   35.287557] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.287997] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.288433] Hardware name: linux,dummy-virt (DT)
[   35.288908] Call trace:
[   35.288965]  show_stack+0x20/0x38 (C)
[   35.289144]  dump_stack_lvl+0x8c/0xd0
[   35.289742]  print_report+0x118/0x5e8
[   35.289950]  kasan_report+0xdc/0x128
[   35.290004]  kasan_check_range+0x100/0x1a8
[   35.290052]  __kasan_check_write+0x20/0x30
[   35.290692]  kasan_atomics_helper+0x10c0/0x4858
[   35.290784]  kasan_atomics+0x198/0x2e0
[   35.290925]  kunit_try_run_case+0x170/0x3f0
[   35.291031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.291181]  kthread+0x328/0x630
[   35.291229]  ret_from_fork+0x10/0x20
[   35.291280] 
[   35.291312] Allocated by task 297:
[   35.291668]  kasan_save_stack+0x3c/0x68
[   35.291938]  kasan_save_track+0x20/0x40
[   35.292189]  kasan_save_alloc_info+0x40/0x58
[   35.292281]  __kasan_kmalloc+0xd4/0xd8
[   35.292353]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.292683]  kasan_atomics+0xb8/0x2e0
[   35.292770]  kunit_try_run_case+0x170/0x3f0
[   35.292813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.293175]  kthread+0x328/0x630
[   35.293605]  ret_from_fork+0x10/0x20
[   35.293744] 
[   35.293791] The buggy address belongs to the object at fff00000c9a5e780
[   35.293791]  which belongs to the cache kmalloc-64 of size 64
[   35.294055] The buggy address is located 0 bytes to the right of
[   35.294055]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.294254] 
[   35.294292] The buggy address belongs to the physical page:
[   35.294560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.294801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.294932] page_type: f5(slab)
[   35.295446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.295573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.295704] page dumped because: kasan: bad access detected
[   35.295780] 
[   35.295905] Memory state around the buggy address:
[   35.295942]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.295988]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.296033] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.296502]                                      ^
[   35.296572]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.297073]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.297217] ==================================================================
[   35.239848] ==================================================================
[   35.240290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   35.241249] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.241322] 
[   35.241396] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.241499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.241533] Hardware name: linux,dummy-virt (DT)
[   35.241575] Call trace:
[   35.241614]  show_stack+0x20/0x38 (C)
[   35.241789]  dump_stack_lvl+0x8c/0xd0
[   35.242038]  print_report+0x118/0x5e8
[   35.242111]  kasan_report+0xdc/0x128
[   35.242201]  kasan_check_range+0x100/0x1a8
[   35.242278]  __kasan_check_write+0x20/0x30
[   35.242328]  kasan_atomics_helper+0xeb8/0x4858
[   35.242695]  kasan_atomics+0x198/0x2e0
[   35.242926]  kunit_try_run_case+0x170/0x3f0
[   35.243307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.243443]  kthread+0x328/0x630
[   35.243493]  ret_from_fork+0x10/0x20
[   35.243565] 
[   35.243589] Allocated by task 297:
[   35.243623]  kasan_save_stack+0x3c/0x68
[   35.243986]  kasan_save_track+0x20/0x40
[   35.244218]  kasan_save_alloc_info+0x40/0x58
[   35.244352]  __kasan_kmalloc+0xd4/0xd8
[   35.244922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.245129]  kasan_atomics+0xb8/0x2e0
[   35.245354]  kunit_try_run_case+0x170/0x3f0
[   35.245409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.245837]  kthread+0x328/0x630
[   35.246061]  ret_from_fork+0x10/0x20
[   35.246340] 
[   35.246578] The buggy address belongs to the object at fff00000c9a5e780
[   35.246578]  which belongs to the cache kmalloc-64 of size 64
[   35.246903] The buggy address is located 0 bytes to the right of
[   35.246903]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.247074] 
[   35.247294] The buggy address belongs to the physical page:
[   35.247364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.247442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.247504] page_type: f5(slab)
[   35.247552] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.247603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.247658] page dumped because: kasan: bad access detected
[   35.247701] 
[   35.247725] Memory state around the buggy address:
[   35.247768]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.247839]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.247886] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.247927]                                      ^
[   35.247962]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.248016]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.248065] ==================================================================
[   35.229295] ==================================================================
[   35.229378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   35.229437] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.229707] 
[   35.229994] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.230099] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.230134] Hardware name: linux,dummy-virt (DT)
[   35.230353] Call trace:
[   35.230805]  show_stack+0x20/0x38 (C)
[   35.230988]  dump_stack_lvl+0x8c/0xd0
[   35.231276]  print_report+0x118/0x5e8
[   35.231358]  kasan_report+0xdc/0x128
[   35.231599]  __asan_report_store8_noabort+0x20/0x30
[   35.231913]  kasan_atomics_helper+0x3e5c/0x4858
[   35.232329]  kasan_atomics+0x198/0x2e0
[   35.232605]  kunit_try_run_case+0x170/0x3f0
[   35.232809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.233190]  kthread+0x328/0x630
[   35.233305]  ret_from_fork+0x10/0x20
[   35.233715] 
[   35.233748] Allocated by task 297:
[   35.233798]  kasan_save_stack+0x3c/0x68
[   35.234215]  kasan_save_track+0x20/0x40
[   35.234279]  kasan_save_alloc_info+0x40/0x58
[   35.234322]  __kasan_kmalloc+0xd4/0xd8
[   35.234360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.234407]  kasan_atomics+0xb8/0x2e0
[   35.234999]  kunit_try_run_case+0x170/0x3f0
[   35.235082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.235247]  kthread+0x328/0x630
[   35.235632]  ret_from_fork+0x10/0x20
[   35.235839] 
[   35.235921] The buggy address belongs to the object at fff00000c9a5e780
[   35.235921]  which belongs to the cache kmalloc-64 of size 64
[   35.236048] The buggy address is located 0 bytes to the right of
[   35.236048]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.236505] 
[   35.236560] The buggy address belongs to the physical page:
[   35.236928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.237329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.237764] page_type: f5(slab)
[   35.237903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.237966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.238025] page dumped because: kasan: bad access detected
[   35.238069] 
[   35.238092] Memory state around the buggy address:
[   35.238136]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.238200]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.238265] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.238307]                                      ^
[   35.238343]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.238387]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.238437] ==================================================================
[   35.361401] ==================================================================
[   35.361485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   35.361624] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.361694] 
[   35.361737] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.362164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.362222] Hardware name: linux,dummy-virt (DT)
[   35.362269] Call trace:
[   35.362295]  show_stack+0x20/0x38 (C)
[   35.363232]  dump_stack_lvl+0x8c/0xd0
[   35.363327]  print_report+0x118/0x5e8
[   35.363404]  kasan_report+0xdc/0x128
[   35.363480]  __asan_report_load8_noabort+0x20/0x30
[   35.363797]  kasan_atomics_helper+0x3f04/0x4858
[   35.364234]  kasan_atomics+0x198/0x2e0
[   35.364346]  kunit_try_run_case+0x170/0x3f0
[   35.365039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.365627]  kthread+0x328/0x630
[   35.366276]  ret_from_fork+0x10/0x20
[   35.366976] 
[   35.367049] Allocated by task 297:
[   35.367123]  kasan_save_stack+0x3c/0x68
[   35.367172]  kasan_save_track+0x20/0x40
[   35.367211]  kasan_save_alloc_info+0x40/0x58
[   35.367251]  __kasan_kmalloc+0xd4/0xd8
[   35.367674]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.368107]  kasan_atomics+0xb8/0x2e0
[   35.368172]  kunit_try_run_case+0x170/0x3f0
[   35.368215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.368569]  kthread+0x328/0x630
[   35.368799]  ret_from_fork+0x10/0x20
[   35.368946] 
[   35.369066] The buggy address belongs to the object at fff00000c9a5e780
[   35.369066]  which belongs to the cache kmalloc-64 of size 64
[   35.369134] The buggy address is located 0 bytes to the right of
[   35.369134]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.369199] 
[   35.369251] The buggy address belongs to the physical page:
[   35.369290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.369358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.369426] page_type: f5(slab)
[   35.369480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.369539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.369580] page dumped because: kasan: bad access detected
[   35.369614] 
[   35.369667] Memory state around the buggy address:
[   35.369710]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.369777]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.369831] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.369879]                                      ^
[   35.369930]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.369984]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.370033] ==================================================================
[   35.426281] ==================================================================
[   35.426806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   35.426887] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.426940] 
[   35.427059] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.427278] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.427333] Hardware name: linux,dummy-virt (DT)
[   35.427384] Call trace:
[   35.427440]  show_stack+0x20/0x38 (C)
[   35.427753]  dump_stack_lvl+0x8c/0xd0
[   35.428360]  print_report+0x118/0x5e8
[   35.428446]  kasan_report+0xdc/0x128
[   35.428655]  kasan_check_range+0x100/0x1a8
[   35.428987]  __kasan_check_write+0x20/0x30
[   35.429219]  kasan_atomics_helper+0x1644/0x4858
[   35.429282]  kasan_atomics+0x198/0x2e0
[   35.429358]  kunit_try_run_case+0x170/0x3f0
[   35.429409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.429480]  kthread+0x328/0x630
[   35.429534]  ret_from_fork+0x10/0x20
[   35.429584] 
[   35.429609] Allocated by task 297:
[   35.430077]  kasan_save_stack+0x3c/0x68
[   35.430150]  kasan_save_track+0x20/0x40
[   35.430672]  kasan_save_alloc_info+0x40/0x58
[   35.430979]  __kasan_kmalloc+0xd4/0xd8
[   35.431177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.431530]  kasan_atomics+0xb8/0x2e0
[   35.431693]  kunit_try_run_case+0x170/0x3f0
[   35.431822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.431872]  kthread+0x328/0x630
[   35.431909]  ret_from_fork+0x10/0x20
[   35.431955] 
[   35.431979] The buggy address belongs to the object at fff00000c9a5e780
[   35.431979]  which belongs to the cache kmalloc-64 of size 64
[   35.432625] The buggy address is located 0 bytes to the right of
[   35.432625]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.432745] 
[   35.432799] The buggy address belongs to the physical page:
[   35.433097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.433495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.433720] page_type: f5(slab)
[   35.433845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.434078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.434415] page dumped because: kasan: bad access detected
[   35.434494] 
[   35.434564] Memory state around the buggy address:
[   35.434912]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.435102]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.435150] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.435526]                                      ^
[   35.435619]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.435725]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.435785] ==================================================================
[   35.417405] ==================================================================
[   35.417691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   35.417824] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.417913] 
[   35.417950] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.418037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.418071] Hardware name: linux,dummy-virt (DT)
[   35.418104] Call trace:
[   35.418130]  show_stack+0x20/0x38 (C)
[   35.418182]  dump_stack_lvl+0x8c/0xd0
[   35.418231]  print_report+0x118/0x5e8
[   35.418279]  kasan_report+0xdc/0x128
[   35.418324]  __asan_report_load8_noabort+0x20/0x30
[   35.418374]  kasan_atomics_helper+0x3db0/0x4858
[   35.418535]  kasan_atomics+0x198/0x2e0
[   35.418595]  kunit_try_run_case+0x170/0x3f0
[   35.418659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.418714]  kthread+0x328/0x630
[   35.418779]  ret_from_fork+0x10/0x20
[   35.418842] 
[   35.418876] Allocated by task 297:
[   35.418909]  kasan_save_stack+0x3c/0x68
[   35.419886]  kasan_save_track+0x20/0x40
[   35.419974]  kasan_save_alloc_info+0x40/0x58
[   35.420570]  __kasan_kmalloc+0xd4/0xd8
[   35.420792]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.421219]  kasan_atomics+0xb8/0x2e0
[   35.421327]  kunit_try_run_case+0x170/0x3f0
[   35.421431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.421523]  kthread+0x328/0x630
[   35.421869]  ret_from_fork+0x10/0x20
[   35.422200] 
[   35.422400] The buggy address belongs to the object at fff00000c9a5e780
[   35.422400]  which belongs to the cache kmalloc-64 of size 64
[   35.422469] The buggy address is located 0 bytes to the right of
[   35.422469]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.422786] 
[   35.423119] The buggy address belongs to the physical page:
[   35.423204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.423324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.423470] page_type: f5(slab)
[   35.423605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.423735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.424090] page dumped because: kasan: bad access detected
[   35.424160] 
[   35.424208] Memory state around the buggy address:
[   35.424339]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.424426]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.424479] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.424519]                                      ^
[   35.424715]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.424783]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.424942] ==================================================================
[   34.903792] ==================================================================
[   34.903861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   34.903917] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   34.904342] 
[   34.904394] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.905922]  kasan_atomics+0x198/0x2e0
[   34.906925]  kasan_save_track+0x20/0x40
[   34.909004] The buggy address is located 0 bytes to the right of
[   34.909004]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   34.909634] 
[   34.909759]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.912867] ==================================================================
[   35.248996] ==================================================================
[   35.249050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   35.249608] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.249705] 
[   35.249888] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.250242] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.250333] Hardware name: linux,dummy-virt (DT)
[   35.250371] Call trace:
[   35.250397]  show_stack+0x20/0x38 (C)
[   35.250470]  dump_stack_lvl+0x8c/0xd0
[   35.250631]  print_report+0x118/0x5e8
[   35.250799]  kasan_report+0xdc/0x128
[   35.250852]  kasan_check_range+0x100/0x1a8
[   35.251024]  __kasan_check_write+0x20/0x30
[   35.251323]  kasan_atomics_helper+0xf20/0x4858
[   35.251452]  kasan_atomics+0x198/0x2e0
[   35.251542]  kunit_try_run_case+0x170/0x3f0
[   35.251917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.252312]  kthread+0x328/0x630
[   35.252525]  ret_from_fork+0x10/0x20
[   35.252776] 
[   35.252827] Allocated by task 297:
[   35.252864]  kasan_save_stack+0x3c/0x68
[   35.253332]  kasan_save_track+0x20/0x40
[   35.253537]  kasan_save_alloc_info+0x40/0x58
[   35.253979]  __kasan_kmalloc+0xd4/0xd8
[   35.254150]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.254319]  kasan_atomics+0xb8/0x2e0
[   35.254517]  kunit_try_run_case+0x170/0x3f0
[   35.254665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.254925]  kthread+0x328/0x630
[   35.254991]  ret_from_fork+0x10/0x20
[   35.255170] 
[   35.255487] The buggy address belongs to the object at fff00000c9a5e780
[   35.255487]  which belongs to the cache kmalloc-64 of size 64
[   35.255589] The buggy address is located 0 bytes to the right of
[   35.255589]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.255666] 
[   35.255689] The buggy address belongs to the physical page:
[   35.255887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.256376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.256471] page_type: f5(slab)
[   35.256527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.256622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.256705] page dumped because: kasan: bad access detected
[   35.256741] 
[   35.256787] Memory state around the buggy address:
[   35.256824]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.256870]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.256914] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.256964]                                      ^
[   35.257000]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.257044]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.257085] ==================================================================
[   35.407891] ==================================================================
[   35.407958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   35.408092] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.408317] 
[   35.408493] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.408775] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.408986] Hardware name: linux,dummy-virt (DT)
[   35.409062] Call trace:
[   35.409119]  show_stack+0x20/0x38 (C)
[   35.409494]  dump_stack_lvl+0x8c/0xd0
[   35.409570]  print_report+0x118/0x5e8
[   35.409700]  kasan_report+0xdc/0x128
[   35.409754]  kasan_check_range+0x100/0x1a8
[   35.409804]  __kasan_check_write+0x20/0x30
[   35.410377]  kasan_atomics_helper+0x15b4/0x4858
[   35.410466]  kasan_atomics+0x198/0x2e0
[   35.410517]  kunit_try_run_case+0x170/0x3f0
[   35.410603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.410683]  kthread+0x328/0x630
[   35.410741]  ret_from_fork+0x10/0x20
[   35.410793] 
[   35.410822] Allocated by task 297:
[   35.410865]  kasan_save_stack+0x3c/0x68
[   35.410908]  kasan_save_track+0x20/0x40
[   35.411313]  kasan_save_alloc_info+0x40/0x58
[   35.411392]  __kasan_kmalloc+0xd4/0xd8
[   35.411455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.411653]  kasan_atomics+0xb8/0x2e0
[   35.411876]  kunit_try_run_case+0x170/0x3f0
[   35.412112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.412247]  kthread+0x328/0x630
[   35.412470]  ret_from_fork+0x10/0x20
[   35.412519] 
[   35.412727] The buggy address belongs to the object at fff00000c9a5e780
[   35.412727]  which belongs to the cache kmalloc-64 of size 64
[   35.412926] The buggy address is located 0 bytes to the right of
[   35.412926]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.413029] 
[   35.413502] The buggy address belongs to the physical page:
[   35.413705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.414146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.414264] page_type: f5(slab)
[   35.414311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.414717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.414779] page dumped because: kasan: bad access detected
[   35.415155] 
[   35.415265] Memory state around the buggy address:
[   35.415345]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.415490]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.415537] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.415600]                                      ^
[   35.415637]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.416031]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.416118] ==================================================================
[   35.108888] ==================================================================
[   35.109118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   35.109301] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.109404] 
[   35.109446] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.109546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.109580] Hardware name: linux,dummy-virt (DT)
[   35.110256]  kasan_report+0xdc/0x128
[   35.112931]  kasan_atomics+0xb8/0x2e0
[   35.114541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.115307] 
[   35.115375]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.119564] ==================================================================
[   35.258686] ==================================================================
[   35.258869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   35.258979] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.259414] 
[   35.259623] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.259779] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.260232] Hardware name: linux,dummy-virt (DT)
[   35.260364] Call trace:
[   35.260514]  show_stack+0x20/0x38 (C)
[   35.260572]  dump_stack_lvl+0x8c/0xd0
[   35.260915]  print_report+0x118/0x5e8
[   35.261280]  kasan_report+0xdc/0x128
[   35.261425]  kasan_check_range+0x100/0x1a8
[   35.261499]  __kasan_check_write+0x20/0x30
[   35.262237]  kasan_atomics_helper+0xf88/0x4858
[   35.262351]  kasan_atomics+0x198/0x2e0
[   35.262528]  kunit_try_run_case+0x170/0x3f0
[   35.263043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.263453]  kthread+0x328/0x630
[   35.263549]  ret_from_fork+0x10/0x20
[   35.263605] 
[   35.263631] Allocated by task 297:
[   35.263679]  kasan_save_stack+0x3c/0x68
[   35.263960]  kasan_save_track+0x20/0x40
[   35.264274]  kasan_save_alloc_info+0x40/0x58
[   35.264422]  __kasan_kmalloc+0xd4/0xd8
[   35.264502]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.264551]  kasan_atomics+0xb8/0x2e0
[   35.264938]  kunit_try_run_case+0x170/0x3f0
[   35.265097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.265189]  kthread+0x328/0x630
[   35.265228]  ret_from_fork+0x10/0x20
[   35.265293] 
[   35.265318] The buggy address belongs to the object at fff00000c9a5e780
[   35.265318]  which belongs to the cache kmalloc-64 of size 64
[   35.265378] The buggy address is located 0 bytes to the right of
[   35.265378]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.265451] 
[   35.265483] The buggy address belongs to the physical page:
[   35.265520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.265578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.265658] page_type: f5(slab)
[   35.265700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.265760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.265803] page dumped because: kasan: bad access detected
[   35.265847] 
[   35.265876] Memory state around the buggy address:
[   35.265930]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.265989]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.266044] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.266085]                                      ^
[   35.266120]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.266164]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.266205] ==================================================================
[   35.477980] ==================================================================
[   35.478519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   35.478600] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.478664] 
[   35.478929] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.479270] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.479352] Hardware name: linux,dummy-virt (DT)
[   35.479704] Call trace:
[   35.479912]  show_stack+0x20/0x38 (C)
[   35.480052]  dump_stack_lvl+0x8c/0xd0
[   35.480281]  print_report+0x118/0x5e8
[   35.480557]  kasan_report+0xdc/0x128
[   35.480651]  kasan_check_range+0x100/0x1a8
[   35.481149]  __kasan_check_write+0x20/0x30
[   35.481253]  kasan_atomics_helper+0x17ec/0x4858
[   35.481309]  kasan_atomics+0x198/0x2e0
[   35.481358]  kunit_try_run_case+0x170/0x3f0
[   35.482069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.482159]  kthread+0x328/0x630
[   35.482371]  ret_from_fork+0x10/0x20
[   35.482616] 
[   35.482687] Allocated by task 297:
[   35.482939]  kasan_save_stack+0x3c/0x68
[   35.483045]  kasan_save_track+0x20/0x40
[   35.483319]  kasan_save_alloc_info+0x40/0x58
[   35.483567]  __kasan_kmalloc+0xd4/0xd8
[   35.483749]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.483878]  kasan_atomics+0xb8/0x2e0
[   35.484481]  kunit_try_run_case+0x170/0x3f0
[   35.484736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.484827]  kthread+0x328/0x630
[   35.485168]  ret_from_fork+0x10/0x20
[   35.485352] 
[   35.485492] The buggy address belongs to the object at fff00000c9a5e780
[   35.485492]  which belongs to the cache kmalloc-64 of size 64
[   35.485735] The buggy address is located 0 bytes to the right of
[   35.485735]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.485810] 
[   35.485833] The buggy address belongs to the physical page:
[   35.485869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.485926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.485977] page_type: f5(slab)
[   35.486017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.486068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.486111] page dumped because: kasan: bad access detected
[   35.486229] 
[   35.486253] Memory state around the buggy address:
[   35.486290]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.486345]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.486396] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.486436]                                      ^
[   35.486480]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.486534]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.486583] ==================================================================
[   35.091907] ==================================================================
[   35.092143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.092275] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.092363] 
[   35.092684] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.092795] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.092831] Hardware name: linux,dummy-virt (DT)
[   35.092895] Call trace:
[   35.092927]  show_stack+0x20/0x38 (C)
[   35.092985]  dump_stack_lvl+0x8c/0xd0
[   35.093037]  print_report+0x118/0x5e8
[   35.093099]  kasan_report+0xdc/0x128
[   35.093147]  kasan_check_range+0x100/0x1a8
[   35.093195]  __kasan_check_write+0x20/0x30
[   35.093242]  kasan_atomics_helper+0xa6c/0x4858
[   35.093291]  kasan_atomics+0x198/0x2e0
[   35.093340]  kunit_try_run_case+0x170/0x3f0
[   35.093388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.093439]  kthread+0x328/0x630
[   35.093485]  ret_from_fork+0x10/0x20
[   35.093542] 
[   35.093566] Allocated by task 297:
[   35.093599]  kasan_save_stack+0x3c/0x68
[   35.093658]  kasan_save_track+0x20/0x40
[   35.093698]  kasan_save_alloc_info+0x40/0x58
[   35.093748]  __kasan_kmalloc+0xd4/0xd8
[   35.093785]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.093828]  kasan_atomics+0xb8/0x2e0
[   35.093869]  kunit_try_run_case+0x170/0x3f0
[   35.093908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.093953]  kthread+0x328/0x630
[   35.093997]  ret_from_fork+0x10/0x20
[   35.094046] 
[   35.094068] The buggy address belongs to the object at fff00000c9a5e780
[   35.094068]  which belongs to the cache kmalloc-64 of size 64
[   35.094136] The buggy address is located 0 bytes to the right of
[   35.094136]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.094210] 
[   35.094233] The buggy address belongs to the physical page:
[   35.094281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.094348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.094409] page_type: f5(slab)
[   35.094451] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.094505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.094556] page dumped because: kasan: bad access detected
[   35.094590] 
[   35.094612] Memory state around the buggy address:
[   35.095164]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.096037]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.096134] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.096280]                                      ^
[   35.096606]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.096910]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.097310] ==================================================================
[   35.454438] ==================================================================
[   35.454491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   35.454545] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.454596] 
[   35.454628] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.454742] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.454774] Hardware name: linux,dummy-virt (DT)
[   35.454807] Call trace:
[   35.454831]  show_stack+0x20/0x38 (C)
[   35.454881]  dump_stack_lvl+0x8c/0xd0
[   35.454931]  print_report+0x118/0x5e8
[   35.454992]  kasan_report+0xdc/0x128
[   35.455039]  __asan_report_load8_noabort+0x20/0x30
[   35.455090]  kasan_atomics_helper+0x3e10/0x4858
[   35.455729]  kasan_atomics+0x198/0x2e0
[   35.455807]  kunit_try_run_case+0x170/0x3f0
[   35.455888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.456398]  kthread+0x328/0x630
[   35.456478]  ret_from_fork+0x10/0x20
[   35.457037] 
[   35.457220] Allocated by task 297:
[   35.457278]  kasan_save_stack+0x3c/0x68
[   35.457357]  kasan_save_track+0x20/0x40
[   35.457689]  kasan_save_alloc_info+0x40/0x58
[   35.457754]  __kasan_kmalloc+0xd4/0xd8
[   35.458085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.458487]  kasan_atomics+0xb8/0x2e0
[   35.458560]  kunit_try_run_case+0x170/0x3f0
[   35.458635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.458692]  kthread+0x328/0x630
[   35.458902]  ret_from_fork+0x10/0x20
[   35.459087] 
[   35.459278] The buggy address belongs to the object at fff00000c9a5e780
[   35.459278]  which belongs to the cache kmalloc-64 of size 64
[   35.459714] The buggy address is located 0 bytes to the right of
[   35.459714]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.459965] 
[   35.460003] The buggy address belongs to the physical page:
[   35.460056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.460413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.460660] page_type: f5(slab)
[   35.460729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.460880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.460970] page dumped because: kasan: bad access detected
[   35.461045] 
[   35.461436] Memory state around the buggy address:
[   35.461614]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.461707]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.461761] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.462053]                                      ^
[   35.462197]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.462267]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.462563] ==================================================================
[   35.388330] ==================================================================
[   35.388700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   35.388770] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.388822] 
[   35.389228] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.389352] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.389450] Hardware name: linux,dummy-virt (DT)
[   35.389517] Call trace:
[   35.389555]  show_stack+0x20/0x38 (C)
[   35.389762]  dump_stack_lvl+0x8c/0xd0
[   35.389851]  print_report+0x118/0x5e8
[   35.389905]  kasan_report+0xdc/0x128
[   35.390299]  kasan_check_range+0x100/0x1a8
[   35.390436]  __kasan_check_write+0x20/0x30
[   35.390774]  kasan_atomics_helper+0x14e4/0x4858
[   35.390861]  kasan_atomics+0x198/0x2e0
[   35.390946]  kunit_try_run_case+0x170/0x3f0
[   35.391038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.391348]  kthread+0x328/0x630
[   35.391513]  ret_from_fork+0x10/0x20
[   35.391568] 
[   35.391606] Allocated by task 297:
[   35.391655]  kasan_save_stack+0x3c/0x68
[   35.391947]  kasan_save_track+0x20/0x40
[   35.392385]  kasan_save_alloc_info+0x40/0x58
[   35.392460]  __kasan_kmalloc+0xd4/0xd8
[   35.392521]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.392586]  kasan_atomics+0xb8/0x2e0
[   35.392939]  kunit_try_run_case+0x170/0x3f0
[   35.393289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.393370]  kthread+0x328/0x630
[   35.393485]  ret_from_fork+0x10/0x20
[   35.393525] 
[   35.394138] The buggy address belongs to the object at fff00000c9a5e780
[   35.394138]  which belongs to the cache kmalloc-64 of size 64
[   35.394512] The buggy address is located 0 bytes to the right of
[   35.394512]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.394685] 
[   35.394732] The buggy address belongs to the physical page:
[   35.394778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.394923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.395021] page_type: f5(slab)
[   35.395314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.395551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.395637] page dumped because: kasan: bad access detected
[   35.395745] 
[   35.395768] Memory state around the buggy address:
[   35.395804]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.395872]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.395918] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.396076]                                      ^
[   35.396277]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.396732]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.396803] ==================================================================
[   35.436976] ==================================================================
[   35.437113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   35.437173] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.437231] 
[   35.437266] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.437355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.437388] Hardware name: linux,dummy-virt (DT)
[   35.437420] Call trace:
[   35.437445]  show_stack+0x20/0x38 (C)
[   35.437495]  dump_stack_lvl+0x8c/0xd0
[   35.437545]  print_report+0x118/0x5e8
[   35.437591]  kasan_report+0xdc/0x128
[   35.437637]  __asan_report_load8_noabort+0x20/0x30
[   35.437766]  kasan_atomics_helper+0x3df4/0x4858
[   35.437829]  kasan_atomics+0x198/0x2e0
[   35.437878]  kunit_try_run_case+0x170/0x3f0
[   35.437927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.437982]  kthread+0x328/0x630
[   35.438027]  ret_from_fork+0x10/0x20
[   35.438074] 
[   35.438095] Allocated by task 297:
[   35.438126]  kasan_save_stack+0x3c/0x68
[   35.438166]  kasan_save_track+0x20/0x40
[   35.438203]  kasan_save_alloc_info+0x40/0x58
[   35.438242]  __kasan_kmalloc+0xd4/0xd8
[   35.438287]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.438329]  kasan_atomics+0xb8/0x2e0
[   35.438368]  kunit_try_run_case+0x170/0x3f0
[   35.438416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.438462]  kthread+0x328/0x630
[   35.438495]  ret_from_fork+0x10/0x20
[   35.438533] 
[   35.438553] The buggy address belongs to the object at fff00000c9a5e780
[   35.438553]  which belongs to the cache kmalloc-64 of size 64
[   35.438619] The buggy address is located 0 bytes to the right of
[   35.438619]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.439814] 
[   35.439944] The buggy address belongs to the physical page:
[   35.440050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.440350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.440715] page_type: f5(slab)
[   35.441155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.441292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.441451] page dumped because: kasan: bad access detected
[   35.441526] 
[   35.441571] Memory state around the buggy address:
[   35.442041]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.442185]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.442662] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.443045]                                      ^
[   35.443117]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.443223]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.443305] ==================================================================
[   34.942887] ==================================================================
[   34.942952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   34.943264] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   34.944658]  dump_stack_lvl+0x8c/0xd0
[   34.945588]  kasan_atomics_helper+0x414/0x4858
[   34.947223]  kasan_save_stack+0x3c/0x68
[   34.947946]  kasan_atomics+0xb8/0x2e0
[   34.948486] 
[   34.948765] The buggy address belongs to the object at fff00000c9a5e780
[   34.948765]  which belongs to the cache kmalloc-64 of size 64
[   34.950818] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.954493] ==================================================================
[   35.463423] ==================================================================
[   35.463477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   35.463533] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.463584] 
[   35.463617] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.463721] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.463753] Hardware name: linux,dummy-virt (DT)
[   35.463785] Call trace:
[   35.463809]  show_stack+0x20/0x38 (C)
[   35.463859]  dump_stack_lvl+0x8c/0xd0
[   35.463909]  print_report+0x118/0x5e8
[   35.464137]  kasan_report+0xdc/0x128
[   35.464201]  kasan_check_range+0x100/0x1a8
[   35.464249]  __kasan_check_write+0x20/0x30
[   35.464298]  kasan_atomics_helper+0x175c/0x4858
[   35.464350]  kasan_atomics+0x198/0x2e0
[   35.464398]  kunit_try_run_case+0x170/0x3f0
[   35.464447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.464501]  kthread+0x328/0x630
[   35.464544]  ret_from_fork+0x10/0x20
[   35.464602] 
[   35.464624] Allocated by task 297:
[   35.465412]  kasan_save_stack+0x3c/0x68
[   35.465634]  kasan_save_track+0x20/0x40
[   35.465704]  kasan_save_alloc_info+0x40/0x58
[   35.465943]  __kasan_kmalloc+0xd4/0xd8
[   35.466005]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.466059]  kasan_atomics+0xb8/0x2e0
[   35.466437]  kunit_try_run_case+0x170/0x3f0
[   35.466881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.467157]  kthread+0x328/0x630
[   35.467200]  ret_from_fork+0x10/0x20
[   35.467262] 
[   35.467460] The buggy address belongs to the object at fff00000c9a5e780
[   35.467460]  which belongs to the cache kmalloc-64 of size 64
[   35.467610] The buggy address is located 0 bytes to the right of
[   35.467610]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.468422] 
[   35.468472] The buggy address belongs to the physical page:
[   35.468549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.468934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.469151] page_type: f5(slab)
[   35.469489] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.469606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.469811] page dumped because: kasan: bad access detected
[   35.469913] 
[   35.470010] Memory state around the buggy address:
[   35.470087]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.470146]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.470197] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.470587]                                      ^
[   35.470669]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.470881]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.470928] ==================================================================
[   35.098304] ==================================================================
[   35.098591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   35.098844] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.098904] 
[   35.098980] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.099467] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.099593] Hardware name: linux,dummy-virt (DT)
[   35.099722] Call trace:
[   35.099770]  show_stack+0x20/0x38 (C)
[   35.099827]  dump_stack_lvl+0x8c/0xd0
[   35.099879]  print_report+0x118/0x5e8
[   35.100281]  kasan_report+0xdc/0x128
[   35.100429]  kasan_check_range+0x100/0x1a8
[   35.100533]  __kasan_check_write+0x20/0x30
[   35.100989]  kasan_atomics_helper+0xad4/0x4858
[   35.102073] 
[   35.102170] Allocated by task 297:
[   35.102707]  __kasan_kmalloc+0xd4/0xd8
[   35.104585] 
[   35.105261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.106050] page dumped because: kasan: bad access detected
[   35.106177] 
[   35.106300] Memory state around the buggy address:
[   35.106485]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.106551]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.106663] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.106739]                                      ^
[   35.106815]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.107217]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.107328] ==================================================================
[   35.353823] ==================================================================
[   35.353886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   35.354253] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.354335] 
[   35.354535] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.354701] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.354758] Hardware name: linux,dummy-virt (DT)
[   35.354793] Call trace:
[   35.354820]  show_stack+0x20/0x38 (C)
[   35.354932]  dump_stack_lvl+0x8c/0xd0
[   35.355172]  print_report+0x118/0x5e8
[   35.355248]  kasan_report+0xdc/0x128
[   35.355362]  kasan_check_range+0x100/0x1a8
[   35.355412]  __kasan_check_write+0x20/0x30
[   35.355460]  kasan_atomics_helper+0x1384/0x4858
[   35.355551]  kasan_atomics+0x198/0x2e0
[   35.355600]  kunit_try_run_case+0x170/0x3f0
[   35.355670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.355725]  kthread+0x328/0x630
[   35.355770]  ret_from_fork+0x10/0x20
[   35.355828] 
[   35.355852] Allocated by task 297:
[   35.355894]  kasan_save_stack+0x3c/0x68
[   35.355938]  kasan_save_track+0x20/0x40
[   35.355976]  kasan_save_alloc_info+0x40/0x58
[   35.356026]  __kasan_kmalloc+0xd4/0xd8
[   35.356063]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.356106]  kasan_atomics+0xb8/0x2e0
[   35.356146]  kunit_try_run_case+0x170/0x3f0
[   35.356205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.356250]  kthread+0x328/0x630
[   35.356291]  ret_from_fork+0x10/0x20
[   35.356329] 
[   35.356357] The buggy address belongs to the object at fff00000c9a5e780
[   35.356357]  which belongs to the cache kmalloc-64 of size 64
[   35.356415] The buggy address is located 0 bytes to the right of
[   35.356415]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.356487] 
[   35.356511] The buggy address belongs to the physical page:
[   35.356563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.356627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.357237] page_type: f5(slab)
[   35.358031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.358102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.358218] page dumped because: kasan: bad access detected
[   35.358255] 
[   35.358278] Memory state around the buggy address:
[   35.358861]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.359189]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.359364] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.359442]                                      ^
[   35.359774]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.359866]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.359963] ==================================================================
[   35.204950] ==================================================================
[   35.205098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   35.205182] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.205519] 
[   35.205713] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.206338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.206449] Hardware name: linux,dummy-virt (DT)
[   35.206495] Call trace:
[   35.206522]  show_stack+0x20/0x38 (C)
[   35.206770]  dump_stack_lvl+0x8c/0xd0
[   35.206827]  print_report+0x118/0x5e8
[   35.206874]  kasan_report+0xdc/0x128
[   35.206921]  __asan_report_load8_noabort+0x20/0x30
[   35.207387]  kasan_atomics_helper+0x3f58/0x4858
[   35.207720]  kasan_atomics+0x198/0x2e0
[   35.208023]  kunit_try_run_case+0x170/0x3f0
[   35.208226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.208506]  kthread+0x328/0x630
[   35.208843]  ret_from_fork+0x10/0x20
[   35.209239] 
[   35.209308] Allocated by task 297:
[   35.209370]  kasan_save_stack+0x3c/0x68
[   35.209950]  kasan_save_track+0x20/0x40
[   35.210004]  kasan_save_alloc_info+0x40/0x58
[   35.210071]  __kasan_kmalloc+0xd4/0xd8
[   35.210192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.210583]  kasan_atomics+0xb8/0x2e0
[   35.210853]  kunit_try_run_case+0x170/0x3f0
[   35.211004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.211056]  kthread+0x328/0x630
[   35.211091]  ret_from_fork+0x10/0x20
[   35.211128] 
[   35.211401] The buggy address belongs to the object at fff00000c9a5e780
[   35.211401]  which belongs to the cache kmalloc-64 of size 64
[   35.211677] The buggy address is located 0 bytes to the right of
[   35.211677]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.211751] 
[   35.211825] The buggy address belongs to the physical page:
[   35.211888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.211979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.212038] page_type: f5(slab)
[   35.212084] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.212136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.212188] page dumped because: kasan: bad access detected
[   35.212219] 
[   35.212251] Memory state around the buggy address:
[   35.212287]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.212333]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.212379] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.212428]                                      ^
[   35.212463]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.212508]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.212557] ==================================================================
[   35.443997] ==================================================================
[   35.444100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   35.444168] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.444540] 
[   35.444608] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.444770] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.444804] Hardware name: linux,dummy-virt (DT)
[   35.444864] Call trace:
[   35.444990]  show_stack+0x20/0x38 (C)
[   35.445048]  dump_stack_lvl+0x8c/0xd0
[   35.445683]  print_report+0x118/0x5e8
[   35.445761]  kasan_report+0xdc/0x128
[   35.445809]  kasan_check_range+0x100/0x1a8
[   35.446028]  __kasan_check_write+0x20/0x30
[   35.446169]  kasan_atomics_helper+0x16d0/0x4858
[   35.446476]  kasan_atomics+0x198/0x2e0
[   35.446653]  kunit_try_run_case+0x170/0x3f0
[   35.446740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.446977]  kthread+0x328/0x630
[   35.447456]  ret_from_fork+0x10/0x20
[   35.447547] 
[   35.447573] Allocated by task 297:
[   35.447607]  kasan_save_stack+0x3c/0x68
[   35.447661]  kasan_save_track+0x20/0x40
[   35.447701]  kasan_save_alloc_info+0x40/0x58
[   35.447742]  __kasan_kmalloc+0xd4/0xd8
[   35.448092]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.448434]  kasan_atomics+0xb8/0x2e0
[   35.448620]  kunit_try_run_case+0x170/0x3f0
[   35.448828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.449007]  kthread+0x328/0x630
[   35.449066]  ret_from_fork+0x10/0x20
[   35.449621] 
[   35.449663] The buggy address belongs to the object at fff00000c9a5e780
[   35.449663]  which belongs to the cache kmalloc-64 of size 64
[   35.449993] The buggy address is located 0 bytes to the right of
[   35.449993]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.450382] 
[   35.450491] The buggy address belongs to the physical page:
[   35.450715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.450920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.451243] page_type: f5(slab)
[   35.451532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.451621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.451688] page dumped because: kasan: bad access detected
[   35.451950] 
[   35.452185] Memory state around the buggy address:
[   35.452264]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.452361]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.452816] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.453298]                                      ^
[   35.453462]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.453634]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.453744] ==================================================================
[   35.268448] ==================================================================
[   35.269003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   35.269262] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.269887] 
[   35.269941] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.270035] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.270068] Hardware name: linux,dummy-virt (DT)
[   35.270409] Call trace:
[   35.270454]  show_stack+0x20/0x38 (C)
[   35.270714]  dump_stack_lvl+0x8c/0xd0
[   35.270775]  print_report+0x118/0x5e8
[   35.270822]  kasan_report+0xdc/0x128
[   35.271238]  kasan_check_range+0x100/0x1a8
[   35.271449]  __kasan_check_write+0x20/0x30
[   35.271673]  kasan_atomics_helper+0xff0/0x4858
[   35.271734]  kasan_atomics+0x198/0x2e0
[   35.271813]  kunit_try_run_case+0x170/0x3f0
[   35.272129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.272614]  kthread+0x328/0x630
[   35.272756]  ret_from_fork+0x10/0x20
[   35.272809] 
[   35.273476] Allocated by task 297:
[   35.273582]  kasan_save_stack+0x3c/0x68
[   35.273951]  kasan_save_track+0x20/0x40
[   35.274026]  kasan_save_alloc_info+0x40/0x58
[   35.274201]  __kasan_kmalloc+0xd4/0xd8
[   35.274377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.274777]  kasan_atomics+0xb8/0x2e0
[   35.275156]  kunit_try_run_case+0x170/0x3f0
[   35.275264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.275380]  kthread+0x328/0x630
[   35.275758]  ret_from_fork+0x10/0x20
[   35.275853] 
[   35.275877] The buggy address belongs to the object at fff00000c9a5e780
[   35.275877]  which belongs to the cache kmalloc-64 of size 64
[   35.275938] The buggy address is located 0 bytes to the right of
[   35.275938]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.276303] 
[   35.276344] The buggy address belongs to the physical page:
[   35.276657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.277055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.277500] page_type: f5(slab)
[   35.277613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.277771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.277855] page dumped because: kasan: bad access detected
[   35.277928] 
[   35.277996] Memory state around the buggy address:
[   35.278041]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.278418]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.278492] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.278813]                                      ^
[   35.278906]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.279102]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.279172] ==================================================================
[   35.194298] ==================================================================
[   35.194359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.194577] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.194635] 
[   35.195008] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.195193] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.195594] Hardware name: linux,dummy-virt (DT)
[   35.195661] Call trace:
[   35.195688]  show_stack+0x20/0x38 (C)
[   35.195744]  dump_stack_lvl+0x8c/0xd0
[   35.195795]  print_report+0x118/0x5e8
[   35.195989]  kasan_report+0xdc/0x128
[   35.196354]  kasan_check_range+0x100/0x1a8
[   35.196499]  __kasan_check_read+0x20/0x30
[   35.196770]  kasan_atomics_helper+0xdd4/0x4858
[   35.196837]  kasan_atomics+0x198/0x2e0
[   35.196889]  kunit_try_run_case+0x170/0x3f0
[   35.197069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.197138]  kthread+0x328/0x630
[   35.197181]  ret_from_fork+0x10/0x20
[   35.197231] 
[   35.197283] Allocated by task 297:
[   35.197333]  kasan_save_stack+0x3c/0x68
[   35.197375]  kasan_save_track+0x20/0x40
[   35.197413]  kasan_save_alloc_info+0x40/0x58
[   35.197454]  __kasan_kmalloc+0xd4/0xd8
[   35.197497]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.197542]  kasan_atomics+0xb8/0x2e0
[   35.197582]  kunit_try_run_case+0x170/0x3f0
[   35.197626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.198552]  kthread+0x328/0x630
[   35.199088]  ret_from_fork+0x10/0x20
[   35.199162] 
[   35.199285] The buggy address belongs to the object at fff00000c9a5e780
[   35.199285]  which belongs to the cache kmalloc-64 of size 64
[   35.199357] The buggy address is located 0 bytes to the right of
[   35.199357]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.199429] 
[   35.199452] The buggy address belongs to the physical page:
[   35.199489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.199548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.199940] page_type: f5(slab)
[   35.200283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.200418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.200564] page dumped because: kasan: bad access detected
[   35.200599] 
[   35.200779] Memory state around the buggy address:
[   35.201285]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.201430]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.201562] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.201788]                                      ^
[   35.201830]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.201892]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.202160] ==================================================================
[   35.340727] ==================================================================
[   35.340783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   35.341008] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.341075] 
[   35.341309] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.341633] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.341696] Hardware name: linux,dummy-virt (DT)
[   35.341817] Call trace:
[   35.341879]  show_stack+0x20/0x38 (C)
[   35.341963]  dump_stack_lvl+0x8c/0xd0
[   35.342014]  print_report+0x118/0x5e8
[   35.342342]  kasan_report+0xdc/0x128
[   35.342708]  kasan_check_range+0x100/0x1a8
[   35.342815]  __kasan_check_write+0x20/0x30
[   35.343184]  kasan_atomics_helper+0x12d8/0x4858
[   35.343265]  kasan_atomics+0x198/0x2e0
[   35.343810]  kunit_try_run_case+0x170/0x3f0
[   35.343890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.343947]  kthread+0x328/0x630
[   35.343991]  ret_from_fork+0x10/0x20
[   35.344046] 
[   35.344505] Allocated by task 297:
[   35.344856]  kasan_save_stack+0x3c/0x68
[   35.344915]  kasan_save_track+0x20/0x40
[   35.345116]  kasan_save_alloc_info+0x40/0x58
[   35.345628]  __kasan_kmalloc+0xd4/0xd8
[   35.345705]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.346088]  kasan_atomics+0xb8/0x2e0
[   35.346480]  kunit_try_run_case+0x170/0x3f0
[   35.346547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.346622]  kthread+0x328/0x630
[   35.346765]  ret_from_fork+0x10/0x20
[   35.346809] 
[   35.347008] The buggy address belongs to the object at fff00000c9a5e780
[   35.347008]  which belongs to the cache kmalloc-64 of size 64
[   35.347265] The buggy address is located 0 bytes to the right of
[   35.347265]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.347513] 
[   35.348021] The buggy address belongs to the physical page:
[   35.348179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.348328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.348612] page_type: f5(slab)
[   35.348863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.348937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.349119] page dumped because: kasan: bad access detected
[   35.349160] 
[   35.349220] Memory state around the buggy address:
[   35.349268]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.349315]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.349371] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.349411]                                      ^
[   35.349447]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.349490]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.349540] ==================================================================
[   35.217020] ==================================================================
[   35.217100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   35.217177] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.217237] 
[   35.217273] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.217699] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.217883] Hardware name: linux,dummy-virt (DT)
[   35.218169] Call trace:
[   35.218345]  show_stack+0x20/0x38 (C)
[   35.218413]  dump_stack_lvl+0x8c/0xd0
[   35.218695]  print_report+0x118/0x5e8
[   35.219072]  kasan_report+0xdc/0x128
[   35.219144]  kasan_check_range+0x100/0x1a8
[   35.219390]  __kasan_check_write+0x20/0x30
[   35.219498]  kasan_atomics_helper+0xe44/0x4858
[   35.219786]  kasan_atomics+0x198/0x2e0
[   35.220279]  kunit_try_run_case+0x170/0x3f0
[   35.220377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.220436]  kthread+0x328/0x630
[   35.220957]  ret_from_fork+0x10/0x20
[   35.221173] 
[   35.221225] Allocated by task 297:
[   35.221262]  kasan_save_stack+0x3c/0x68
[   35.221583]  kasan_save_track+0x20/0x40
[   35.221673]  kasan_save_alloc_info+0x40/0x58
[   35.222068]  __kasan_kmalloc+0xd4/0xd8
[   35.222182]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.222446]  kasan_atomics+0xb8/0x2e0
[   35.222612]  kunit_try_run_case+0x170/0x3f0
[   35.222860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.223658]  kthread+0x328/0x630
[   35.223867]  ret_from_fork+0x10/0x20
[   35.224030] 
[   35.224492] The buggy address belongs to the object at fff00000c9a5e780
[   35.224492]  which belongs to the cache kmalloc-64 of size 64
[   35.224569] The buggy address is located 0 bytes to the right of
[   35.224569]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.224635] 
[   35.224676] The buggy address belongs to the physical page:
[   35.225204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.225895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.226182] page_type: f5(slab)
[   35.226401] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.226536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.226774] page dumped because: kasan: bad access detected
[   35.227245] 
[   35.227490] Memory state around the buggy address:
[   35.227691]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.227803]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.227949] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.227991]                                      ^
[   35.228028]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.228073]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.228131] ==================================================================
[   35.471515] ==================================================================
[   35.471568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   35.471622] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.471686] 
[   35.471717] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.471805] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.472028] Hardware name: linux,dummy-virt (DT)
[   35.472109] Call trace:
[   35.472136]  show_stack+0x20/0x38 (C)
[   35.472594]  dump_stack_lvl+0x8c/0xd0
[   35.472703]  print_report+0x118/0x5e8
[   35.472851]  kasan_report+0xdc/0x128
[   35.472949]  __asan_report_load8_noabort+0x20/0x30
[   35.473011]  kasan_atomics_helper+0x3e20/0x4858
[   35.473064]  kasan_atomics+0x198/0x2e0
[   35.473303]  kunit_try_run_case+0x170/0x3f0
[   35.473371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.473696]  kthread+0x328/0x630
[   35.473767]  ret_from_fork+0x10/0x20
[   35.473936] 
[   35.473966] Allocated by task 297:
[   35.474000]  kasan_save_stack+0x3c/0x68
[   35.474042]  kasan_save_track+0x20/0x40
[   35.474288]  kasan_save_alloc_info+0x40/0x58
[   35.474598]  __kasan_kmalloc+0xd4/0xd8
[   35.474839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.474912]  kasan_atomics+0xb8/0x2e0
[   35.474972]  kunit_try_run_case+0x170/0x3f0
[   35.475338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.475419]  kthread+0x328/0x630
[   35.475717]  ret_from_fork+0x10/0x20
[   35.475768] 
[   35.476046] The buggy address belongs to the object at fff00000c9a5e780
[   35.476046]  which belongs to the cache kmalloc-64 of size 64
[   35.476375] The buggy address is located 0 bytes to the right of
[   35.476375]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.476558] 
[   35.476615] The buggy address belongs to the physical page:
[   35.476751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.476846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.476910] page_type: f5(slab)
[   35.476951] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.477068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.477110] page dumped because: kasan: bad access detected
[   35.477142] 
[   35.477184] Memory state around the buggy address:
[   35.477228]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.477277]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.477323] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.477364]                                      ^
[   35.477400]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.477455]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.477506] ==================================================================
[   35.299539] ==================================================================
[   35.299634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   35.300016] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.300086] 
[   35.300121] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.300361] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.300637] Hardware name: linux,dummy-virt (DT)
[   35.300702] Call trace:
[   35.300728]  show_stack+0x20/0x38 (C)
[   35.300821]  dump_stack_lvl+0x8c/0xd0
[   35.300875]  print_report+0x118/0x5e8
[   35.300922]  kasan_report+0xdc/0x128
[   35.300967]  kasan_check_range+0x100/0x1a8
[   35.301014]  __kasan_check_write+0x20/0x30
[   35.301063]  kasan_atomics_helper+0x1128/0x4858
[   35.301123]  kasan_atomics+0x198/0x2e0
[   35.301179]  kunit_try_run_case+0x170/0x3f0
[   35.301236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.301291]  kthread+0x328/0x630
[   35.301335]  ret_from_fork+0x10/0x20
[   35.301381] 
[   35.301403] Allocated by task 297:
[   35.301436]  kasan_save_stack+0x3c/0x68
[   35.301478]  kasan_save_track+0x20/0x40
[   35.301515]  kasan_save_alloc_info+0x40/0x58
[   35.301555]  __kasan_kmalloc+0xd4/0xd8
[   35.301602]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.301658]  kasan_atomics+0xb8/0x2e0
[   35.301745]  kunit_try_run_case+0x170/0x3f0
[   35.301790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.302055]  kthread+0x328/0x630
[   35.302651]  ret_from_fork+0x10/0x20
[   35.302922] 
[   35.302993] The buggy address belongs to the object at fff00000c9a5e780
[   35.302993]  which belongs to the cache kmalloc-64 of size 64
[   35.303496] The buggy address is located 0 bytes to the right of
[   35.303496]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.304124] 
[   35.304226] The buggy address belongs to the physical page:
[   35.304983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.305115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.305182] page_type: f5(slab)
[   35.305224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.305956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.306058] page dumped because: kasan: bad access detected
[   35.306323] 
[   35.306872] Memory state around the buggy address:
[   35.306932]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.307102]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.307206] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.307331]                                      ^
[   35.307408]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.307577]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.307816] ==================================================================
[   35.180627] ==================================================================
[   35.180717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.181143] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.181330] 
[   35.181451] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.182004] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.182195] Hardware name: linux,dummy-virt (DT)
[   35.182293] Call trace:
[   35.182319]  show_stack+0x20/0x38 (C)
[   35.182901]  dump_stack_lvl+0x8c/0xd0
[   35.183307]  print_report+0x118/0x5e8
[   35.183436]  kasan_report+0xdc/0x128
[   35.183486]  __asan_report_load4_noabort+0x20/0x30
[   35.183536]  kasan_atomics_helper+0x3e04/0x4858
[   35.183589]  kasan_atomics+0x198/0x2e0
[   35.184175]  kunit_try_run_case+0x170/0x3f0
[   35.184383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.184597]  kthread+0x328/0x630
[   35.184868]  ret_from_fork+0x10/0x20
[   35.185108] 
[   35.185158] Allocated by task 297:
[   35.185434]  kasan_save_stack+0x3c/0x68
[   35.185730]  kasan_save_track+0x20/0x40
[   35.185967]  kasan_save_alloc_info+0x40/0x58
[   35.186404]  __kasan_kmalloc+0xd4/0xd8
[   35.186466]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.186925]  kasan_atomics+0xb8/0x2e0
[   35.187291]  kunit_try_run_case+0x170/0x3f0
[   35.187368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.187415]  kthread+0x328/0x630
[   35.187726]  ret_from_fork+0x10/0x20
[   35.188128] 
[   35.188179] The buggy address belongs to the object at fff00000c9a5e780
[   35.188179]  which belongs to the cache kmalloc-64 of size 64
[   35.188382] The buggy address is located 0 bytes to the right of
[   35.188382]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.188502] 
[   35.188714] The buggy address belongs to the physical page:
[   35.189032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.189152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.189344] page_type: f5(slab)
[   35.189388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.189771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.190357] page dumped because: kasan: bad access detected
[   35.190419] 
[   35.190588] Memory state around the buggy address:
[   35.190961]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.191070]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.191205] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.191292]                                      ^
[   35.191330]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.191657]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.191742] ==================================================================
[   35.309091] ==================================================================
[   35.309406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   35.309636] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.309830] 
[   35.310021] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.310138] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.310172] Hardware name: linux,dummy-virt (DT)
[   35.310207] Call trace:
[   35.310231]  show_stack+0x20/0x38 (C)
[   35.310526]  dump_stack_lvl+0x8c/0xd0
[   35.311260]  print_report+0x118/0x5e8
[   35.311442]  kasan_report+0xdc/0x128
[   35.311523]  kasan_check_range+0x100/0x1a8
[   35.311973]  __kasan_check_write+0x20/0x30
[   35.312450]  kasan_atomics_helper+0x1190/0x4858
[   35.312677]  kasan_atomics+0x198/0x2e0
[   35.312786]  kunit_try_run_case+0x170/0x3f0
[   35.313207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.313421]  kthread+0x328/0x630
[   35.313715]  ret_from_fork+0x10/0x20
[   35.313871] 
[   35.314180] Allocated by task 297:
[   35.314227]  kasan_save_stack+0x3c/0x68
[   35.314777]  kasan_save_track+0x20/0x40
[   35.315237]  kasan_save_alloc_info+0x40/0x58
[   35.315346]  __kasan_kmalloc+0xd4/0xd8
[   35.315849]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.315919]  kasan_atomics+0xb8/0x2e0
[   35.315975]  kunit_try_run_case+0x170/0x3f0
[   35.316025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.316774]  kthread+0x328/0x630
[   35.316922]  ret_from_fork+0x10/0x20
[   35.316964] 
[   35.317020] The buggy address belongs to the object at fff00000c9a5e780
[   35.317020]  which belongs to the cache kmalloc-64 of size 64
[   35.317088] The buggy address is located 0 bytes to the right of
[   35.317088]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.317349] 
[   35.317402] The buggy address belongs to the physical page:
[   35.317834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.317941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.317993] page_type: f5(slab)
[   35.318032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.318094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.318152] page dumped because: kasan: bad access detected
[   35.318196] 
[   35.318224] Memory state around the buggy address:
[   35.318261]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.318316]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.318362] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.318403]                                      ^
[   35.318440]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.318484]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.318523] ==================================================================
[   35.330301] ==================================================================
[   35.330739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   35.330851] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.331229] 
[   35.331273] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.331598] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.331884] Hardware name: linux,dummy-virt (DT)
[   35.332172] Call trace:
[   35.332674]  show_stack+0x20/0x38 (C)
[   35.332749]  dump_stack_lvl+0x8c/0xd0
[   35.332800]  print_report+0x118/0x5e8
[   35.333174]  kasan_report+0xdc/0x128
[   35.333258]  kasan_check_range+0x100/0x1a8
[   35.333598]  __kasan_check_write+0x20/0x30
[   35.333683]  kasan_atomics_helper+0x126c/0x4858
[   35.334050]  kasan_atomics+0x198/0x2e0
[   35.334608]  kunit_try_run_case+0x170/0x3f0
[   35.334694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.334824]  kthread+0x328/0x630
[   35.334870]  ret_from_fork+0x10/0x20
[   35.334930] 
[   35.334980] Allocated by task 297:
[   35.335382]  kasan_save_stack+0x3c/0x68
[   35.335470]  kasan_save_track+0x20/0x40
[   35.335673]  kasan_save_alloc_info+0x40/0x58
[   35.335891]  __kasan_kmalloc+0xd4/0xd8
[   35.335974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.336273]  kasan_atomics+0xb8/0x2e0
[   35.336327]  kunit_try_run_case+0x170/0x3f0
[   35.336783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.336860]  kthread+0x328/0x630
[   35.337216]  ret_from_fork+0x10/0x20
[   35.337949] 
[   35.338087] The buggy address belongs to the object at fff00000c9a5e780
[   35.338087]  which belongs to the cache kmalloc-64 of size 64
[   35.338298] The buggy address is located 0 bytes to the right of
[   35.338298]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.338487] 
[   35.338561] The buggy address belongs to the physical page:
[   35.338601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.338689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.338752] page_type: f5(slab)
[   35.338814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.338877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.338919] page dumped because: kasan: bad access detected
[   35.338952] 
[   35.338983] Memory state around the buggy address:
[   35.339030]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.339083]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.339151] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.339200]                                      ^
[   35.339241]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.339286]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.339349] ==================================================================
[   35.398250] ==================================================================
[   35.398392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   35.398453] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.398506] 
[   35.398690] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.398790] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.398824] Hardware name: linux,dummy-virt (DT)
[   35.399006] Call trace:
[   35.399353]  show_stack+0x20/0x38 (C)
[   35.399835]  dump_stack_lvl+0x8c/0xd0
[   35.400125]  print_report+0x118/0x5e8
[   35.400241]  kasan_report+0xdc/0x128
[   35.400365]  kasan_check_range+0x100/0x1a8
[   35.400415]  __kasan_check_write+0x20/0x30
[   35.400464]  kasan_atomics_helper+0x154c/0x4858
[   35.400800]  kasan_atomics+0x198/0x2e0
[   35.401039]  kunit_try_run_case+0x170/0x3f0
[   35.401370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.401475]  kthread+0x328/0x630
[   35.401522]  ret_from_fork+0x10/0x20
[   35.402098] 
[   35.402297] Allocated by task 297:
[   35.402356]  kasan_save_stack+0x3c/0x68
[   35.402411]  kasan_save_track+0x20/0x40
[   35.402459]  kasan_save_alloc_info+0x40/0x58
[   35.402800]  __kasan_kmalloc+0xd4/0xd8
[   35.403127]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.403213]  kasan_atomics+0xb8/0x2e0
[   35.403322]  kunit_try_run_case+0x170/0x3f0
[   35.403388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.403441]  kthread+0x328/0x630
[   35.403477]  ret_from_fork+0x10/0x20
[   35.403515] 
[   35.403870] The buggy address belongs to the object at fff00000c9a5e780
[   35.403870]  which belongs to the cache kmalloc-64 of size 64
[   35.404169] The buggy address is located 0 bytes to the right of
[   35.404169]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.404467] 
[   35.404605] The buggy address belongs to the physical page:
[   35.404660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.405000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.405129] page_type: f5(slab)
[   35.405219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.405653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.405768] page dumped because: kasan: bad access detected
[   35.405857] 
[   35.406028] Memory state around the buggy address:
[   35.406072]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.406126]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.406171] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.406210]                                      ^
[   35.406272]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.406316]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.406362] ==================================================================
[   35.280502] ==================================================================
[   35.280593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   35.280698] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.280922] 
[   35.280987] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.281090] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.281124] Hardware name: linux,dummy-virt (DT)
[   35.281443] Call trace:
[   35.281606]  show_stack+0x20/0x38 (C)
[   35.281689]  dump_stack_lvl+0x8c/0xd0
[   35.281742]  print_report+0x118/0x5e8
[   35.281922]  kasan_report+0xdc/0x128
[   35.281986]  kasan_check_range+0x100/0x1a8
[   35.282034]  __kasan_check_write+0x20/0x30
[   35.282389]  kasan_atomics_helper+0x1058/0x4858
[   35.282468]  kasan_atomics+0x198/0x2e0
[   35.282658]  kunit_try_run_case+0x170/0x3f0
[   35.282799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.282861]  kthread+0x328/0x630
[   35.282906]  ret_from_fork+0x10/0x20
[   35.282962] 
[   35.283337] Allocated by task 297:
[   35.283565]  kasan_save_stack+0x3c/0x68
[   35.283617]  kasan_save_track+0x20/0x40
[   35.283956]  kasan_save_alloc_info+0x40/0x58
[   35.284181]  __kasan_kmalloc+0xd4/0xd8
[   35.284239]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.284292]  kasan_atomics+0xb8/0x2e0
[   35.284333]  kunit_try_run_case+0x170/0x3f0
[   35.284386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.284432]  kthread+0x328/0x630
[   35.284469]  ret_from_fork+0x10/0x20
[   35.284509] 
[   35.284540] The buggy address belongs to the object at fff00000c9a5e780
[   35.284540]  which belongs to the cache kmalloc-64 of size 64
[   35.284601] The buggy address is located 0 bytes to the right of
[   35.284601]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.284679] 
[   35.284702] The buggy address belongs to the physical page:
[   35.284740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.284795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.284854] page_type: f5(slab)
[   35.284894] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.284955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.285003] page dumped because: kasan: bad access detected
[   35.285046] 
[   35.285067] Memory state around the buggy address:
[   35.285112]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.285157]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.285202] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.285256]                                      ^
[   35.285293]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.285352]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.285401] ==================================================================
[   35.370984] ==================================================================
[   35.371326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   35.371801] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.371937] 
[   35.372002] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.372754] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.373043] Hardware name: linux,dummy-virt (DT)
[   35.373118] Call trace:
[   35.373208]  show_stack+0x20/0x38 (C)
[   35.373334]  dump_stack_lvl+0x8c/0xd0
[   35.373385]  print_report+0x118/0x5e8
[   35.373432]  kasan_report+0xdc/0x128
[   35.373782]  kasan_check_range+0x100/0x1a8
[   35.374005]  __kasan_check_write+0x20/0x30
[   35.374198]  kasan_atomics_helper+0x1414/0x4858
[   35.374290]  kasan_atomics+0x198/0x2e0
[   35.374698]  kunit_try_run_case+0x170/0x3f0
[   35.374799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.375151]  kthread+0x328/0x630
[   35.375233]  ret_from_fork+0x10/0x20
[   35.375434] 
[   35.375474] Allocated by task 297:
[   35.375738]  kasan_save_stack+0x3c/0x68
[   35.376018]  kasan_save_track+0x20/0x40
[   35.376069]  kasan_save_alloc_info+0x40/0x58
[   35.376378]  __kasan_kmalloc+0xd4/0xd8
[   35.376734]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.376901]  kasan_atomics+0xb8/0x2e0
[   35.377011]  kunit_try_run_case+0x170/0x3f0
[   35.377062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.377389]  kthread+0x328/0x630
[   35.377479]  ret_from_fork+0x10/0x20
[   35.377676] 
[   35.377731] The buggy address belongs to the object at fff00000c9a5e780
[   35.377731]  which belongs to the cache kmalloc-64 of size 64
[   35.377951] The buggy address is located 0 bytes to the right of
[   35.377951]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.378120] 
[   35.378147] The buggy address belongs to the physical page:
[   35.378213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.378570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.378673] page_type: f5(slab)
[   35.379072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.379144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.379329] page dumped because: kasan: bad access detected
[   35.379377] 
[   35.379544] Memory state around the buggy address:
[   35.379600]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.379737]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.379816] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.380063]                                      ^
[   35.380129]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.380199]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.380254] ==================================================================
[   35.080329] ==================================================================
[   35.080389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   35.081271] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.081357] 
[   35.081406] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.081502] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.081625] Hardware name: linux,dummy-virt (DT)
[   35.081678] Call trace:
[   35.082012]  show_stack+0x20/0x38 (C)
[   35.082161]  dump_stack_lvl+0x8c/0xd0
[   35.082442]  print_report+0x118/0x5e8
[   35.082619]  kasan_report+0xdc/0x128
[   35.082701]  kasan_check_range+0x100/0x1a8
[   35.083047]  __kasan_check_write+0x20/0x30
[   35.083379]  kasan_atomics_helper+0xa04/0x4858
[   35.083468]  kasan_atomics+0x198/0x2e0
[   35.083540]  kunit_try_run_case+0x170/0x3f0
[   35.083616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.083696]  kthread+0x328/0x630
[   35.083857]  ret_from_fork+0x10/0x20
[   35.083993] 
[   35.084051] Allocated by task 297:
[   35.084181]  kasan_save_stack+0x3c/0x68
[   35.084314]  kasan_save_track+0x20/0x40
[   35.084411]  kasan_save_alloc_info+0x40/0x58
[   35.085111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.087091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.087282] page_type: f5(slab)
[   35.087328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.087394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.087797] page dumped because: kasan: bad access detected
[   35.087899] 
[   35.087957] Memory state around the buggy address:
[   35.087997]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.088472]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.088559] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.089062]                                      ^
[   35.089120]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.089337]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.089612] ==================================================================
[   35.070637] ==================================================================
[   35.070715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.070779] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.071188] 
[   35.071304] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.071407] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.071616] Hardware name: linux,dummy-virt (DT)
[   35.071860] Call trace:
[   35.071913]  show_stack+0x20/0x38 (C)
[   35.072017]  dump_stack_lvl+0x8c/0xd0
[   35.072214]  print_report+0x118/0x5e8
[   35.072348]  kasan_report+0xdc/0x128
[   35.072444]  kasan_check_range+0x100/0x1a8
[   35.072683]  __kasan_check_write+0x20/0x30
[   35.072927]  kasan_atomics_helper+0x99c/0x4858
[   35.073050]  kasan_atomics+0x198/0x2e0
[   35.073188]  kunit_try_run_case+0x170/0x3f0
[   35.073311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.073556]  kthread+0x328/0x630
[   35.073679]  ret_from_fork+0x10/0x20
[   35.073985] 
[   35.074041] Allocated by task 297:
[   35.074418]  kasan_save_stack+0x3c/0x68
[   35.074498]  kasan_save_track+0x20/0x40
[   35.074871]  kasan_save_alloc_info+0x40/0x58
[   35.074944]  __kasan_kmalloc+0xd4/0xd8
[   35.075122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.075208]  kasan_atomics+0xb8/0x2e0
[   35.075351]  kunit_try_run_case+0x170/0x3f0
[   35.075397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.075575]  kthread+0x328/0x630
[   35.075634]  ret_from_fork+0x10/0x20
[   35.075688] 
[   35.075711] The buggy address belongs to the object at fff00000c9a5e780
[   35.075711]  which belongs to the cache kmalloc-64 of size 64
[   35.075788] The buggy address is located 0 bytes to the right of
[   35.075788]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.075868] 
[   35.075896] The buggy address belongs to the physical page:
[   35.075942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.076000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.076050] page_type: f5(slab)
[   35.076106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.076159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.076211] page dumped because: kasan: bad access detected
[   35.076256] 
[   35.076278] Memory state around the buggy address:
[   35.076314]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.076361]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.076407] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.076463]                                      ^
[   35.076507]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.076552]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.076603] ==================================================================
[   35.319860] ==================================================================
[   35.320083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   35.320309] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.320372] 
[   35.320408] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.320717] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.320958] Hardware name: linux,dummy-virt (DT)
[   35.321221] Call trace:
[   35.321265]  show_stack+0x20/0x38 (C)
[   35.321424]  dump_stack_lvl+0x8c/0xd0
[   35.321649]  print_report+0x118/0x5e8
[   35.321730]  kasan_report+0xdc/0x128
[   35.321778]  kasan_check_range+0x100/0x1a8
[   35.322119]  __kasan_check_write+0x20/0x30
[   35.322206]  kasan_atomics_helper+0x11f8/0x4858
[   35.322260]  kasan_atomics+0x198/0x2e0
[   35.322561]  kunit_try_run_case+0x170/0x3f0
[   35.322944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.323032]  kthread+0x328/0x630
[   35.323400]  ret_from_fork+0x10/0x20
[   35.323517] 
[   35.323606] Allocated by task 297:
[   35.323653]  kasan_save_stack+0x3c/0x68
[   35.324036]  kasan_save_track+0x20/0x40
[   35.324111]  kasan_save_alloc_info+0x40/0x58
[   35.324436]  __kasan_kmalloc+0xd4/0xd8
[   35.324576]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.324693]  kasan_atomics+0xb8/0x2e0
[   35.325502]  kunit_try_run_case+0x170/0x3f0
[   35.325677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.326049]  kthread+0x328/0x630
[   35.326405]  ret_from_fork+0x10/0x20
[   35.326482] 
[   35.326551] The buggy address belongs to the object at fff00000c9a5e780
[   35.326551]  which belongs to the cache kmalloc-64 of size 64
[   35.326806] The buggy address is located 0 bytes to the right of
[   35.326806]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.327039] 
[   35.327141] The buggy address belongs to the physical page:
[   35.327491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.327612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.327679] page_type: f5(slab)
[   35.327731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.327794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.327846] page dumped because: kasan: bad access detected
[   35.327889] 
[   35.327919] Memory state around the buggy address:
[   35.327967]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.328039]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.328093] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.328134]                                      ^
[   35.328170]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.328676]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.328849] ==================================================================
[   34.924968] ==================================================================
[   34.925287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   34.925958] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.926621]  print_report+0x118/0x5e8
[   34.927730]  kasan_atomics+0x198/0x2e0
[   34.928343] 
[   34.928483]  kasan_save_alloc_info+0x40/0x58
[   34.928737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.929076] The buggy address belongs to the physical page:
[   34.929434] 
[   34.929652]                                      ^
[   34.931802] ==================================================================
[   35.172434] ==================================================================
[   35.172704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.172914] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.172974] 
[   35.173308] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.173559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.173605] Hardware name: linux,dummy-virt (DT)
[   35.173679] Call trace:
[   35.173838]  show_stack+0x20/0x38 (C)
[   35.174128]  dump_stack_lvl+0x8c/0xd0
[   35.174280]  print_report+0x118/0x5e8
[   35.174339]  kasan_report+0xdc/0x128
[   35.174424]  kasan_check_range+0x100/0x1a8
[   35.174630]  __kasan_check_write+0x20/0x30
[   35.174985]  kasan_atomics_helper+0xd3c/0x4858
[   35.175171]  kasan_atomics+0x198/0x2e0
[   35.175309]  kunit_try_run_case+0x170/0x3f0
[   35.175370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.175428]  kthread+0x328/0x630
[   35.175479]  ret_from_fork+0x10/0x20
[   35.175529] 
[   35.175550] Allocated by task 297:
[   35.175584]  kasan_save_stack+0x3c/0x68
[   35.175964]  kasan_save_track+0x20/0x40
[   35.176285]  kasan_save_alloc_info+0x40/0x58
[   35.176439]  __kasan_kmalloc+0xd4/0xd8
[   35.176484]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.176553]  kasan_atomics+0xb8/0x2e0
[   35.176592]  kunit_try_run_case+0x170/0x3f0
[   35.176631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.176696]  kthread+0x328/0x630
[   35.176741]  ret_from_fork+0x10/0x20
[   35.176778] 
[   35.176809] The buggy address belongs to the object at fff00000c9a5e780
[   35.176809]  which belongs to the cache kmalloc-64 of size 64
[   35.176871] The buggy address is located 0 bytes to the right of
[   35.176871]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.176947] 
[   35.176979] The buggy address belongs to the physical page:
[   35.177016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.177072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.177122] page_type: f5(slab)
[   35.177164] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.177216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.177268] page dumped because: kasan: bad access detected
[   35.177311] 
[   35.177347] Memory state around the buggy address:
[   35.177391]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.177438]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.177491] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.177540]                                      ^
[   35.177576]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.177619]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.177678] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   34.798630] ==================================================================
[   34.800106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   34.800163] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.801033] Call trace:
[   34.801668]  kasan_report+0xdc/0x128
[   34.802522]  kunit_try_run_case+0x170/0x3f0
[   34.803164] 
[   34.803395] Allocated by task 293:
[   34.803612]  kasan_save_track+0x20/0x40
[   34.804270]  kunit_try_run_case+0x170/0x3f0
[   34.805494] 
[   34.805671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.806438]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.809063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   34.809188] 
[   34.809904] Call trace:
[   34.810867]  __asan_report_load8_noabort+0x20/0x30
[   34.813228] 
[   34.813843]  kasan_save_alloc_info+0x40/0x58
[   34.815900]  ret_from_fork+0x10/0x20
[   34.817116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.821294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   34.821427] 
[   34.822159] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.822731]  dump_stack_lvl+0x8c/0xd0
[   34.823283]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   34.824656] 
[   34.825185]  kasan_save_track+0x20/0x40
[   34.826286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.827239] The buggy address is located 8 bytes inside of
[   34.827239]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.829214] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.849545]     ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   34.856982] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   34.668570] ==================================================================
[   34.668769] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   34.668849] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.668902] 
[   34.669038] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.669128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.669226] Hardware name: linux,dummy-virt (DT)
[   34.669260] Call trace:
[   34.669301]  show_stack+0x20/0x38 (C)
[   34.669577]  dump_stack_lvl+0x8c/0xd0
[   34.669664]  print_report+0x118/0x5e8
[   34.669731]  kasan_report+0xdc/0x128
[   34.669806]  kasan_check_range+0x100/0x1a8
[   34.669894]  __kasan_check_write+0x20/0x30
[   34.669959]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   34.670012]  kasan_bitops_generic+0x110/0x1c8
[   34.670081]  kunit_try_run_case+0x170/0x3f0
[   34.670131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.670424]  kthread+0x328/0x630
[   34.670522]  ret_from_fork+0x10/0x20
[   34.670600] 
[   34.670673] Allocated by task 293:
[   34.670707]  kasan_save_stack+0x3c/0x68
[   34.670786]  kasan_save_track+0x20/0x40
[   34.670898]  kasan_save_alloc_info+0x40/0x58
[   34.670950]  __kasan_kmalloc+0xd4/0xd8
[   34.671014]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.671070]  kasan_bitops_generic+0xa0/0x1c8
[   34.671178]  kunit_try_run_case+0x170/0x3f0
[   34.671320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.671370]  kthread+0x328/0x630
[   34.671404]  ret_from_fork+0x10/0x20
[   34.671442] 
[   34.671465] The buggy address belongs to the object at fff00000c91b2880
[   34.671465]  which belongs to the cache kmalloc-16 of size 16
[   34.671576] The buggy address is located 8 bytes inside of
[   34.671576]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.671805] 
[   34.671859] The buggy address belongs to the physical page:
[   34.671920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.672016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.672137] page_type: f5(slab)
[   34.672193] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.672274] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.672365] page dumped because: kasan: bad access detected
[   34.672428] 
[   34.672489] Memory state around the buggy address:
[   34.672631]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.672708]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.673073] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.673239]                       ^
[   34.673320]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.673430]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.673570] ==================================================================
[   34.674568] ==================================================================
[   34.674742] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   34.674827] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.675020] 
[   34.675250] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.675360] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.675486] Hardware name: linux,dummy-virt (DT)
[   34.675566] Call trace:
[   34.675626]  show_stack+0x20/0x38 (C)
[   34.675753]  dump_stack_lvl+0x8c/0xd0
[   34.675804]  print_report+0x118/0x5e8
[   34.675851]  kasan_report+0xdc/0x128
[   34.675895]  __asan_report_load8_noabort+0x20/0x30
[   34.676285]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   34.676409]  kasan_bitops_generic+0x110/0x1c8
[   34.676516]  kunit_try_run_case+0x170/0x3f0
[   34.676685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.676845]  kthread+0x328/0x630
[   34.676941]  ret_from_fork+0x10/0x20
[   34.677076] 
[   34.677120] Allocated by task 293:
[   34.677154]  kasan_save_stack+0x3c/0x68
[   34.677262]  kasan_save_track+0x20/0x40
[   34.677715]  kasan_save_alloc_info+0x40/0x58
[   34.677804]  __kasan_kmalloc+0xd4/0xd8
[   34.677974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.678031]  kasan_bitops_generic+0xa0/0x1c8
[   34.678119]  kunit_try_run_case+0x170/0x3f0
[   34.678216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.678277]  kthread+0x328/0x630
[   34.678311]  ret_from_fork+0x10/0x20
[   34.678380] 
[   34.678592] The buggy address belongs to the object at fff00000c91b2880
[   34.678592]  which belongs to the cache kmalloc-16 of size 16
[   34.679252] The buggy address is located 8 bytes inside of
[   34.679252]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.679372] 
[   34.679398] The buggy address belongs to the physical page:
[   34.679446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.679513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.679826] page_type: f5(slab)
[   34.680054] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.680192] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.680334] page dumped because: kasan: bad access detected
[   34.680419] 
[   34.680459] Memory state around the buggy address:
[   34.680502]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.680777]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.680956] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.681070]                       ^
[   34.681168]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.681313]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.681376] ==================================================================
[   34.665015] ==================================================================
[   34.665246] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   34.665311] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.665364] 
[   34.665398] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.665589] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.665664] Hardware name: linux,dummy-virt (DT)
[   34.665700] Call trace:
[   34.665745]  show_stack+0x20/0x38 (C)
[   34.665798]  dump_stack_lvl+0x8c/0xd0
[   34.665864]  print_report+0x118/0x5e8
[   34.665990]  kasan_report+0xdc/0x128
[   34.666036]  __asan_report_load8_noabort+0x20/0x30
[   34.666088]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   34.666141]  kasan_bitops_generic+0x110/0x1c8
[   34.666202]  kunit_try_run_case+0x170/0x3f0
[   34.666251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.666312]  kthread+0x328/0x630
[   34.666358]  ret_from_fork+0x10/0x20
[   34.666409] 
[   34.666437] Allocated by task 293:
[   34.666480]  kasan_save_stack+0x3c/0x68
[   34.666523]  kasan_save_track+0x20/0x40
[   34.666560]  kasan_save_alloc_info+0x40/0x58
[   34.666600]  __kasan_kmalloc+0xd4/0xd8
[   34.666654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.666713]  kasan_bitops_generic+0xa0/0x1c8
[   34.666756]  kunit_try_run_case+0x170/0x3f0
[   34.666796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.666849]  kthread+0x328/0x630
[   34.666886]  ret_from_fork+0x10/0x20
[   34.666938] 
[   34.666961] The buggy address belongs to the object at fff00000c91b2880
[   34.666961]  which belongs to the cache kmalloc-16 of size 16
[   34.667020] The buggy address is located 8 bytes inside of
[   34.667020]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.667084] 
[   34.667105] The buggy address belongs to the physical page:
[   34.667142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.667198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.667253] page_type: f5(slab)
[   34.667301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.667352] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.667393] page dumped because: kasan: bad access detected
[   34.667436] 
[   34.667456] Memory state around the buggy address:
[   34.667489]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.667536]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.667581] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.667628]                       ^
[   34.667668]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.667714]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.667755] ==================================================================
[   34.656715] ==================================================================
[   34.656817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   34.657038] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.657103] 
[   34.657157] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.657294] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.657335] Hardware name: linux,dummy-virt (DT)
[   34.657370] Call trace:
[   34.657412]  show_stack+0x20/0x38 (C)
[   34.657591]  dump_stack_lvl+0x8c/0xd0
[   34.657811]  print_report+0x118/0x5e8
[   34.657895]  kasan_report+0xdc/0x128
[   34.657970]  kasan_check_range+0x100/0x1a8
[   34.658033]  __kasan_check_write+0x20/0x30
[   34.658099]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   34.658172]  kasan_bitops_generic+0x110/0x1c8
[   34.658224]  kunit_try_run_case+0x170/0x3f0
[   34.658274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.658328]  kthread+0x328/0x630
[   34.658555]  ret_from_fork+0x10/0x20
[   34.658622] 
[   34.658688] Allocated by task 293:
[   34.658765]  kasan_save_stack+0x3c/0x68
[   34.658830]  kasan_save_track+0x20/0x40
[   34.658869]  kasan_save_alloc_info+0x40/0x58
[   34.658909]  __kasan_kmalloc+0xd4/0xd8
[   34.659050]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.659210]  kasan_bitops_generic+0xa0/0x1c8
[   34.659380]  kunit_try_run_case+0x170/0x3f0
[   34.659613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.659771]  kthread+0x328/0x630
[   34.659811]  ret_from_fork+0x10/0x20
[   34.659850] 
[   34.659933] The buggy address belongs to the object at fff00000c91b2880
[   34.659933]  which belongs to the cache kmalloc-16 of size 16
[   34.660041] The buggy address is located 8 bytes inside of
[   34.660041]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.660130] 
[   34.660153] The buggy address belongs to the physical page:
[   34.660239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.660620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.660791] page_type: f5(slab)
[   34.660866] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.660963] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.661016] page dumped because: kasan: bad access detected
[   34.661049] 
[   34.661107] Memory state around the buggy address:
[   34.661404]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.661514]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.661619] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.661673]                       ^
[   34.661733]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.661890]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.662029] ==================================================================
[   34.690803] ==================================================================
[   34.690864] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   34.691176] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.691470] 
[   34.691510] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.691762] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.691939] Hardware name: linux,dummy-virt (DT)
[   34.692026] Call trace:
[   34.692116]  show_stack+0x20/0x38 (C)
[   34.692728]  dump_stack_lvl+0x8c/0xd0
[   34.692940]  print_report+0x118/0x5e8
[   34.693115]  kasan_report+0xdc/0x128
[   34.693602]  kasan_check_range+0x100/0x1a8
[   34.693949]  __kasan_check_write+0x20/0x30
[   34.694062]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   34.694231]  kasan_bitops_generic+0x110/0x1c8
[   34.694808]  kunit_try_run_case+0x170/0x3f0
[   34.695140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.695205]  kthread+0x328/0x630
[   34.695417]  ret_from_fork+0x10/0x20
[   34.695677] 
[   34.695885] Allocated by task 293:
[   34.696112]  kasan_save_stack+0x3c/0x68
[   34.696206]  kasan_save_track+0x20/0x40
[   34.696286]  kasan_save_alloc_info+0x40/0x58
[   34.696465]  __kasan_kmalloc+0xd4/0xd8
[   34.696576]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.696692]  kasan_bitops_generic+0xa0/0x1c8
[   34.696780]  kunit_try_run_case+0x170/0x3f0
[   34.696915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.697006]  kthread+0x328/0x630
[   34.697041]  ret_from_fork+0x10/0x20
[   34.697300] 
[   34.697469] The buggy address belongs to the object at fff00000c91b2880
[   34.697469]  which belongs to the cache kmalloc-16 of size 16
[   34.697600] The buggy address is located 8 bytes inside of
[   34.697600]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.697724] 
[   34.698141] The buggy address belongs to the physical page:
[   34.698448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.698573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.699013] page_type: f5(slab)
[   34.699144] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.699249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.699388] page dumped because: kasan: bad access detected
[   34.699510] 
[   34.699662] Memory state around the buggy address:
[   34.699916]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.700104]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.700195] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.700286]                       ^
[   34.700365]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.700519]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.700615] ==================================================================
[   34.702323] ==================================================================
[   34.702486] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   34.702562] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.702615] 
[   34.702661] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.702762] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.702804] Hardware name: linux,dummy-virt (DT)
[   34.702837] Call trace:
[   34.702860]  show_stack+0x20/0x38 (C)
[   34.702911]  dump_stack_lvl+0x8c/0xd0
[   34.703549]  print_report+0x118/0x5e8
[   34.703628]  kasan_report+0xdc/0x128
[   34.703862]  __asan_report_load8_noabort+0x20/0x30
[   34.704190]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   34.704327]  kasan_bitops_generic+0x110/0x1c8
[   34.704717]  kunit_try_run_case+0x170/0x3f0
[   34.704860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.704951]  kthread+0x328/0x630
[   34.705333]  ret_from_fork+0x10/0x20
[   34.705516] 
[   34.705542] Allocated by task 293:
[   34.705602]  kasan_save_stack+0x3c/0x68
[   34.705981]  kasan_save_track+0x20/0x40
[   34.706182]  kasan_save_alloc_info+0x40/0x58
[   34.706300]  __kasan_kmalloc+0xd4/0xd8
[   34.706405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.706456]  kasan_bitops_generic+0xa0/0x1c8
[   34.706737]  kunit_try_run_case+0x170/0x3f0
[   34.706991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.707242]  kthread+0x328/0x630
[   34.707348]  ret_from_fork+0x10/0x20
[   34.707390] 
[   34.707411] The buggy address belongs to the object at fff00000c91b2880
[   34.707411]  which belongs to the cache kmalloc-16 of size 16
[   34.709769] page dumped because: kasan: bad access detected
[   34.711164]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.713305] 
[   34.713814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.714106] Hardware name: linux,dummy-virt (DT)
[   34.714352] Call trace:
[   34.714388]  show_stack+0x20/0x38 (C)
[   34.714870]  kasan_check_range+0x100/0x1a8
[   34.715881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.718689]  kunit_try_run_case+0x170/0x3f0
[   34.718910] 
[   34.719538] 
[   34.720706] page dumped because: kasan: bad access detected
[   34.724421] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.724767] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.724941] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.725063]  show_stack+0x20/0x38 (C)
[   34.725825]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   34.726661] 
[   34.726858] Allocated by task 293:
[   34.727314]  kasan_save_alloc_info+0x40/0x58
[   34.727991]  kunit_try_run_case+0x170/0x3f0
[   34.728529]  kthread+0x328/0x630
[   34.728955] The buggy address is located 8 bytes inside of
[   34.728955]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.730331] 
[   34.730444]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.731050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   34.731157] 
[   34.731198] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.731338] Hardware name: linux,dummy-virt (DT)
[   34.732490]  kunit_try_run_case+0x170/0x3f0
[   34.733432]  ret_from_fork+0x10/0x20
[   34.734856]  __kasan_kmalloc+0xd4/0xd8
[   34.736898] The buggy address is located 8 bytes inside of
[   34.736898]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.738144] page dumped because: kasan: bad access detected
[   34.738807] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.741614] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   34.742027] 
[   34.742062] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.742785] Call trace:
[   34.743425]  kasan_report+0xdc/0x128
[   34.743859]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   34.745699] 
[   34.746202]  kasan_save_track+0x20/0x40
[   34.746899]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.747391]  kthread+0x328/0x630
[   34.747891] The buggy address is located 8 bytes inside of
[   34.747891]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.749914]                       ^
[   34.752401] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.752630] 
[   34.752706] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.753225] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.753284] Hardware name: linux,dummy-virt (DT)
[   34.753320] Call trace:
[   34.753408]  dump_stack_lvl+0x8c/0xd0
[   34.753601]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   34.753825]  kthread+0x328/0x630
[   34.754375]  kasan_save_track+0x20/0x40
[   34.754492]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.754689]  kthread+0x328/0x630
[   34.754785] The buggy address belongs to the object at fff00000c91b2880
[   34.754785]  which belongs to the cache kmalloc-16 of size 16
[   34.756105] page_type: f5(slab)
[   34.756324] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.757179]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.760652] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   34.761306] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.762149]  kasan_check_range+0x100/0x1a8
[   34.762577]  kasan_bitops_generic+0x11c/0x1c8
[   34.764061]  kthread+0x328/0x630
[   34.764464] 
[   34.764802]  kasan_save_track+0x20/0x40
[   34.765883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.766750] The buggy address is located 8 bytes inside of
[   34.766750]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.768062] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.770293] ==================================================================
[   34.684028] ==================================================================
[   34.684092] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   34.684150] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.684232] 
[   34.684269] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.684368] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.684401] Hardware name: linux,dummy-virt (DT)
[   34.684446] Call trace:
[   34.684471]  show_stack+0x20/0x38 (C)
[   34.684528]  dump_stack_lvl+0x8c/0xd0
[   34.684577]  print_report+0x118/0x5e8
[   34.684624]  kasan_report+0xdc/0x128
[   34.684685]  kasan_check_range+0x100/0x1a8
[   34.684733]  __kasan_check_write+0x20/0x30
[   34.684782]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   34.684845]  kasan_bitops_generic+0x110/0x1c8
[   34.684897]  kunit_try_run_case+0x170/0x3f0
[   34.684953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.685029]  kthread+0x328/0x630
[   34.685073]  ret_from_fork+0x10/0x20
[   34.685120] 
[   34.685143] Allocated by task 293:
[   34.685183]  kasan_save_stack+0x3c/0x68
[   34.685225]  kasan_save_track+0x20/0x40
[   34.685263]  kasan_save_alloc_info+0x40/0x58
[   34.685302]  __kasan_kmalloc+0xd4/0xd8
[   34.685337]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.685380]  kasan_bitops_generic+0xa0/0x1c8
[   34.685422]  kunit_try_run_case+0x170/0x3f0
[   34.685462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.685506]  kthread+0x328/0x630
[   34.685550]  ret_from_fork+0x10/0x20
[   34.685589] 
[   34.685610] The buggy address belongs to the object at fff00000c91b2880
[   34.685610]  which belongs to the cache kmalloc-16 of size 16
[   34.686460] The buggy address is located 8 bytes inside of
[   34.686460]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.686541] 
[   34.686567] The buggy address belongs to the physical page:
[   34.686631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.686884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.687152] page_type: f5(slab)
[   34.687261] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.687532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.687765] page dumped because: kasan: bad access detected
[   34.687868] 
[   34.687960] Memory state around the buggy address:
[   34.688033]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.688401]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.688586] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.688832]                       ^
[   34.689147]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.689427]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.689511] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   34.644884] ==================================================================
[   34.644942] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   34.645044] Read of size 1 at addr fff00000c9a94390 by task kunit_try_catch/291
[   34.645230] 
[   34.645703] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.645807] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.645842] Hardware name: linux,dummy-virt (DT)
[   34.645875] Call trace:
[   34.645899]  show_stack+0x20/0x38 (C)
[   34.646037]  dump_stack_lvl+0x8c/0xd0
[   34.646091]  print_report+0x118/0x5e8
[   34.646403]  kasan_report+0xdc/0x128
[   34.646534]  __asan_report_load1_noabort+0x20/0x30
[   34.646589]  strnlen+0x80/0x88
[   34.646634]  kasan_strings+0x478/0xb00
[   34.646739]  kunit_try_run_case+0x170/0x3f0
[   34.646815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.646882]  kthread+0x328/0x630
[   34.646939]  ret_from_fork+0x10/0x20
[   34.647002] 
[   34.647024] Allocated by task 291:
[   34.647069]  kasan_save_stack+0x3c/0x68
[   34.647109]  kasan_save_track+0x20/0x40
[   34.647145]  kasan_save_alloc_info+0x40/0x58
[   34.647186]  __kasan_kmalloc+0xd4/0xd8
[   34.647469]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.647571]  kasan_strings+0xc8/0xb00
[   34.647650]  kunit_try_run_case+0x170/0x3f0
[   34.647775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.648250]  kthread+0x328/0x630
[   34.648321]  ret_from_fork+0x10/0x20
[   34.648361] 
[   34.648383] Freed by task 291:
[   34.648414]  kasan_save_stack+0x3c/0x68
[   34.648452]  kasan_save_track+0x20/0x40
[   34.648489]  kasan_save_free_info+0x4c/0x78
[   34.648530]  __kasan_slab_free+0x7c/0xa8
[   34.648576]  kfree+0x214/0x3c8
[   34.648614]  kasan_strings+0x24c/0xb00
[   34.648669]  kunit_try_run_case+0x170/0x3f0
[   34.648709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.648974]  kthread+0x328/0x630
[   34.649044]  ret_from_fork+0x10/0x20
[   34.649093] 
[   34.649161] The buggy address belongs to the object at fff00000c9a94380
[   34.649161]  which belongs to the cache kmalloc-32 of size 32
[   34.649242] The buggy address is located 16 bytes inside of
[   34.649242]  freed 32-byte region [fff00000c9a94380, fff00000c9a943a0)
[   34.649305] 
[   34.649327] The buggy address belongs to the physical page:
[   34.649365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94
[   34.649561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.649616] page_type: f5(slab)
[   34.649667] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.649720] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.649967] page dumped because: kasan: bad access detected
[   34.650055] 
[   34.650167] Memory state around the buggy address:
[   34.650244]  fff00000c9a94280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.650381]  fff00000c9a94300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.650495] >fff00000c9a94380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.650605]                          ^
[   34.650705]  fff00000c9a94400: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.650784]  fff00000c9a94480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.650902] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   34.637505] ==================================================================
[   34.637554] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   34.637900] Read of size 1 at addr fff00000c9a94390 by task kunit_try_catch/291
[   34.637997] 
[   34.638032] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.638147] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.638180] Hardware name: linux,dummy-virt (DT)
[   34.638213] Call trace:
[   34.638274]  show_stack+0x20/0x38 (C)
[   34.638325]  dump_stack_lvl+0x8c/0xd0
[   34.638374]  print_report+0x118/0x5e8
[   34.638631]  kasan_report+0xdc/0x128
[   34.638694]  __asan_report_load1_noabort+0x20/0x30
[   34.638789]  strlen+0xa8/0xb0
[   34.638876]  kasan_strings+0x418/0xb00
[   34.638977]  kunit_try_run_case+0x170/0x3f0
[   34.639099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.639218]  kthread+0x328/0x630
[   34.639310]  ret_from_fork+0x10/0x20
[   34.639422] 
[   34.639443] Allocated by task 291:
[   34.639474]  kasan_save_stack+0x3c/0x68
[   34.639836]  kasan_save_track+0x20/0x40
[   34.639964]  kasan_save_alloc_info+0x40/0x58
[   34.640080]  __kasan_kmalloc+0xd4/0xd8
[   34.640207]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.640305]  kasan_strings+0xc8/0xb00
[   34.640412]  kunit_try_run_case+0x170/0x3f0
[   34.640509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.640688]  kthread+0x328/0x630
[   34.640800]  ret_from_fork+0x10/0x20
[   34.640839] 
[   34.641149] Freed by task 291:
[   34.641286]  kasan_save_stack+0x3c/0x68
[   34.641365]  kasan_save_track+0x20/0x40
[   34.641431]  kasan_save_free_info+0x4c/0x78
[   34.641471]  __kasan_slab_free+0x7c/0xa8
[   34.641728]  kfree+0x214/0x3c8
[   34.641814]  kasan_strings+0x24c/0xb00
[   34.641921]  kunit_try_run_case+0x170/0x3f0
[   34.642078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.642225]  kthread+0x328/0x630
[   34.642319]  ret_from_fork+0x10/0x20
[   34.642453] 
[   34.642558] The buggy address belongs to the object at fff00000c9a94380
[   34.642558]  which belongs to the cache kmalloc-32 of size 32
[   34.642786] The buggy address is located 16 bytes inside of
[   34.642786]  freed 32-byte region [fff00000c9a94380, fff00000c9a943a0)
[   34.642954] 
[   34.643080] The buggy address belongs to the physical page:
[   34.643187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94
[   34.643316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.643443] page_type: f5(slab)
[   34.643569] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.643651] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.643738] page dumped because: kasan: bad access detected
[   34.643782] 
[   34.643802] Memory state around the buggy address:
[   34.643836]  fff00000c9a94280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.643880]  fff00000c9a94300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.643932] >fff00000c9a94380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.643974]                          ^
[   34.644007]  fff00000c9a94400: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.644054]  fff00000c9a94480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.644105] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   34.632765] ==================================================================
[   34.632834] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   34.632889] Read of size 1 at addr fff00000c9a94390 by task kunit_try_catch/291
[   34.632970] 
[   34.633027] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.633117] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.633149] Hardware name: linux,dummy-virt (DT)
[   34.633182] Call trace:
[   34.633357]  show_stack+0x20/0x38 (C)
[   34.633431]  dump_stack_lvl+0x8c/0xd0
[   34.633487]  print_report+0x118/0x5e8
[   34.633545]  kasan_report+0xdc/0x128
[   34.633597]  __asan_report_load1_noabort+0x20/0x30
[   34.633657]  kasan_strings+0x95c/0xb00
[   34.633714]  kunit_try_run_case+0x170/0x3f0
[   34.633782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.633866]  kthread+0x328/0x630
[   34.633948]  ret_from_fork+0x10/0x20
[   34.633999] 
[   34.634040] Allocated by task 291:
[   34.634087]  kasan_save_stack+0x3c/0x68
[   34.634130]  kasan_save_track+0x20/0x40
[   34.634166]  kasan_save_alloc_info+0x40/0x58
[   34.634243]  __kasan_kmalloc+0xd4/0xd8
[   34.634279]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.634323]  kasan_strings+0xc8/0xb00
[   34.634360]  kunit_try_run_case+0x170/0x3f0
[   34.634618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.634692]  kthread+0x328/0x630
[   34.634727]  ret_from_fork+0x10/0x20
[   34.634794] 
[   34.634822] Freed by task 291:
[   34.634853]  kasan_save_stack+0x3c/0x68
[   34.634940]  kasan_save_track+0x20/0x40
[   34.635020]  kasan_save_free_info+0x4c/0x78
[   34.635117]  __kasan_slab_free+0x7c/0xa8
[   34.635259]  kfree+0x214/0x3c8
[   34.635424]  kasan_strings+0x24c/0xb00
[   34.635531]  kunit_try_run_case+0x170/0x3f0
[   34.635589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.635905]  kthread+0x328/0x630
[   34.635986]  ret_from_fork+0x10/0x20
[   34.636163] 
[   34.636234] The buggy address belongs to the object at fff00000c9a94380
[   34.636234]  which belongs to the cache kmalloc-32 of size 32
[   34.636356] The buggy address is located 16 bytes inside of
[   34.636356]  freed 32-byte region [fff00000c9a94380, fff00000c9a943a0)
[   34.636454] 
[   34.636526] The buggy address belongs to the physical page:
[   34.636593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94
[   34.636658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.636712] page_type: f5(slab)
[   34.636763] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.636816] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.636868] page dumped because: kasan: bad access detected
[   34.636911] 
[   34.636940] Memory state around the buggy address:
[   34.636975]  fff00000c9a94280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.637036]  fff00000c9a94300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.637084] >fff00000c9a94380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.637124]                          ^
[   34.637157]  fff00000c9a94400: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.637213]  fff00000c9a94480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.637254] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   34.626393] ==================================================================
[   34.626464] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   34.626622] Read of size 1 at addr fff00000c9a94390 by task kunit_try_catch/291
[   34.626872] 
[   34.627010] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.627252] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.627283] Hardware name: linux,dummy-virt (DT)
[   34.627317] Call trace:
[   34.627401]  show_stack+0x20/0x38 (C)
[   34.627505]  dump_stack_lvl+0x8c/0xd0
[   34.627552]  print_report+0x118/0x5e8
[   34.627692]  kasan_report+0xdc/0x128
[   34.627744]  __asan_report_load1_noabort+0x20/0x30
[   34.627796]  strcmp+0xc0/0xc8
[   34.627857]  kasan_strings+0x340/0xb00
[   34.628063]  kunit_try_run_case+0x170/0x3f0
[   34.628114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.628202]  kthread+0x328/0x630
[   34.628265]  ret_from_fork+0x10/0x20
[   34.628420] 
[   34.628472] Allocated by task 291:
[   34.628508]  kasan_save_stack+0x3c/0x68
[   34.628662]  kasan_save_track+0x20/0x40
[   34.628758]  kasan_save_alloc_info+0x40/0x58
[   34.628816]  __kasan_kmalloc+0xd4/0xd8
[   34.628853]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.628916]  kasan_strings+0xc8/0xb00
[   34.629101]  kunit_try_run_case+0x170/0x3f0
[   34.629142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.629205]  kthread+0x328/0x630
[   34.629347]  ret_from_fork+0x10/0x20
[   34.629394] 
[   34.629501] Freed by task 291:
[   34.629530]  kasan_save_stack+0x3c/0x68
[   34.629606]  kasan_save_track+0x20/0x40
[   34.629884]  kasan_save_free_info+0x4c/0x78
[   34.630118]  __kasan_slab_free+0x7c/0xa8
[   34.630172]  kfree+0x214/0x3c8
[   34.630425]  kasan_strings+0x24c/0xb00
[   34.630467]  kunit_try_run_case+0x170/0x3f0
[   34.630506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.630551]  kthread+0x328/0x630
[   34.630586]  ret_from_fork+0x10/0x20
[   34.630625] 
[   34.630676] The buggy address belongs to the object at fff00000c9a94380
[   34.630676]  which belongs to the cache kmalloc-32 of size 32
[   34.630763] The buggy address is located 16 bytes inside of
[   34.630763]  freed 32-byte region [fff00000c9a94380, fff00000c9a943a0)
[   34.630846] 
[   34.630871] The buggy address belongs to the physical page:
[   34.630942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94
[   34.631061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.631114] page_type: f5(slab)
[   34.631438] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.631552] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.631605] page dumped because: kasan: bad access detected
[   34.631667] 
[   34.631698] Memory state around the buggy address:
[   34.631750]  fff00000c9a94280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.631806]  fff00000c9a94300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.631852] >fff00000c9a94380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.631892]                          ^
[   34.631923]  fff00000c9a94400: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.631969]  fff00000c9a94480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.632025] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   34.603234] ==================================================================
[   34.603400] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   34.603465] Read of size 1 at addr fff00000c9a941d8 by task kunit_try_catch/289
[   34.603722] 
[   34.603804] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.603976] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.604103] Hardware name: linux,dummy-virt (DT)
[   34.604137] Call trace:
[   34.604263]  show_stack+0x20/0x38 (C)
[   34.604328]  dump_stack_lvl+0x8c/0xd0
[   34.604423]  print_report+0x118/0x5e8
[   34.604617]  kasan_report+0xdc/0x128
[   34.604678]  __asan_report_load1_noabort+0x20/0x30
[   34.604737]  memcmp+0x198/0x1d8
[   34.604825]  kasan_memcmp+0x16c/0x300
[   34.605075]  kunit_try_run_case+0x170/0x3f0
[   34.605189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.605244]  kthread+0x328/0x630
[   34.605288]  ret_from_fork+0x10/0x20
[   34.605339] 
[   34.605359] Allocated by task 289:
[   34.605390]  kasan_save_stack+0x3c/0x68
[   34.605483]  kasan_save_track+0x20/0x40
[   34.605633]  kasan_save_alloc_info+0x40/0x58
[   34.605682]  __kasan_kmalloc+0xd4/0xd8
[   34.605717]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.605762]  kasan_memcmp+0xbc/0x300
[   34.605800]  kunit_try_run_case+0x170/0x3f0
[   34.605837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.605881]  kthread+0x328/0x630
[   34.605914]  ret_from_fork+0x10/0x20
[   34.606409] 
[   34.606741] The buggy address belongs to the object at fff00000c9a941c0
[   34.606741]  which belongs to the cache kmalloc-32 of size 32
[   34.606891] The buggy address is located 0 bytes to the right of
[   34.606891]  allocated 24-byte region [fff00000c9a941c0, fff00000c9a941d8)
[   34.607122] 
[   34.607147] The buggy address belongs to the physical page:
[   34.607184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94
[   34.607241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.607425] page_type: f5(slab)
[   34.607470] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.607588] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.607730] page dumped because: kasan: bad access detected
[   34.607898] 
[   34.607959] Memory state around the buggy address:
[   34.608012]  fff00000c9a94080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.608059]  fff00000c9a94100: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   34.608114] >fff00000c9a94180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.608243]                                                     ^
[   34.608283]  fff00000c9a94200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.608327]  fff00000c9a94280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.608367] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   34.584220] ==================================================================
[   34.584289] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   34.584390] Read of size 1 at addr ffff800080bc7b4a by task kunit_try_catch/285
[   34.584444] 
[   34.584477] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.584569] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.584602] Hardware name: linux,dummy-virt (DT)
[   34.584635] Call trace:
[   34.584680]  show_stack+0x20/0x38 (C)
[   34.584730]  dump_stack_lvl+0x8c/0xd0
[   34.584790]  print_report+0x310/0x5e8
[   34.584837]  kasan_report+0xdc/0x128
[   34.584892]  __asan_report_load1_noabort+0x20/0x30
[   34.584943]  kasan_alloca_oob_right+0x2dc/0x340
[   34.584993]  kunit_try_run_case+0x170/0x3f0
[   34.585045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.585097]  kthread+0x328/0x630
[   34.585140]  ret_from_fork+0x10/0x20
[   34.585196] 
[   34.585220] The buggy address belongs to stack of task kunit_try_catch/285
[   34.585275] 
[   34.585297] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080bc0000 allocated at kernel_clone+0x150/0x7b0
[   34.585408] The buggy address belongs to the physical page:
[   34.585445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a7e
[   34.585507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.585570] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.585622] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.586444] page dumped because: kasan: bad access detected
[   34.586499] 
[   34.586565] Memory state around the buggy address:
[   34.586603]  ffff800080bc7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.586699]  ffff800080bc7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.586845] >ffff800080bc7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   34.586951]                                               ^
[   34.587179]  ffff800080bc7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   34.587258]  ffff800080bc7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   34.587400] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   34.572720] ==================================================================
[   34.572814] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   34.572914] Read of size 1 at addr ffff800080bc7b5f by task kunit_try_catch/283
[   34.572968] 
[   34.573003] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.573093] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.573132] Hardware name: linux,dummy-virt (DT)
[   34.573176] Call trace:
[   34.573202]  show_stack+0x20/0x38 (C)
[   34.573382]  dump_stack_lvl+0x8c/0xd0
[   34.573436]  print_report+0x310/0x5e8
[   34.573736]  kasan_report+0xdc/0x128
[   34.573790]  __asan_report_load1_noabort+0x20/0x30
[   34.573985]  kasan_alloca_oob_left+0x2b8/0x310
[   34.574102]  kunit_try_run_case+0x170/0x3f0
[   34.574155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.574244]  kthread+0x328/0x630
[   34.574310]  ret_from_fork+0x10/0x20
[   34.574363] 
[   34.574398] The buggy address belongs to stack of task kunit_try_catch/283
[   34.574476] 
[   34.574546] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080bc0000 allocated at kernel_clone+0x150/0x7b0
[   34.574662] The buggy address belongs to the physical page:
[   34.574764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a7e
[   34.574822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.574916] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.575101] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.575145] page dumped because: kasan: bad access detected
[   34.575179] 
[   34.575222] Memory state around the buggy address:
[   34.575256]  ffff800080bc7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.575302]  ffff800080bc7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.575554] >ffff800080bc7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   34.575664]                                                     ^
[   34.575758]  ffff800080bc7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   34.575842]  ffff800080bc7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   34.575952] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   34.560074] ==================================================================
[   34.560684] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   34.561121] Read of size 1 at addr ffff800080bc7c2a by task kunit_try_catch/281
[   34.561516] 
[   34.561561] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.561822] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.561859] Hardware name: linux,dummy-virt (DT)
[   34.561892] Call trace:
[   34.561921]  show_stack+0x20/0x38 (C)
[   34.561974]  dump_stack_lvl+0x8c/0xd0
[   34.562025]  print_report+0x310/0x5e8
[   34.562070]  kasan_report+0xdc/0x128
[   34.562115]  __asan_report_load1_noabort+0x20/0x30
[   34.562166]  kasan_stack_oob+0x238/0x270
[   34.562789]  kunit_try_run_case+0x170/0x3f0
[   34.563067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.563124]  kthread+0x328/0x630
[   34.563168]  ret_from_fork+0x10/0x20
[   34.563221] 
[   34.563295] The buggy address belongs to stack of task kunit_try_catch/281
[   34.563414]  and is located at offset 138 in frame:
[   34.563452]  kasan_stack_oob+0x0/0x270
[   34.563581] 
[   34.563615] This frame has 4 objects:
[   34.564273]  [48, 49) '__assertion'
[   34.564426]  [64, 72) 'array'
[   34.564462]  [96, 112) '__assertion'
[   34.564637]  [128, 138) 'stack_array'
[   34.564734] 
[   34.564761] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080bc0000 allocated at kernel_clone+0x150/0x7b0
[   34.564919] The buggy address belongs to the physical page:
[   34.564982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a7e
[   34.565277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.565380] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.565480] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.565543] page dumped because: kasan: bad access detected
[   34.565577] 
[   34.565604] Memory state around the buggy address:
[   34.565816]  ffff800080bc7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.566095]  ffff800080bc7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   34.566263] >ffff800080bc7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   34.566343]                                   ^
[   34.566443]  ffff800080bc7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   34.566527]  ffff800080bc7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   34.566578] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   34.540957] ==================================================================
[   34.541022] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   34.541079] Read of size 1 at addr ffff9501f119f68d by task kunit_try_catch/277
[   34.541129] 
[   34.541165] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.541251] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.541281] Hardware name: linux,dummy-virt (DT)
[   34.541312] Call trace:
[   34.541336]  show_stack+0x20/0x38 (C)
[   34.541382]  dump_stack_lvl+0x8c/0xd0
[   34.541429]  print_report+0x310/0x5e8
[   34.541473]  kasan_report+0xdc/0x128
[   34.541516]  __asan_report_load1_noabort+0x20/0x30
[   34.541570]  kasan_global_oob_right+0x230/0x270
[   34.541621]  kunit_try_run_case+0x170/0x3f0
[   34.542271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.542332]  kthread+0x328/0x630
[   34.542386]  ret_from_fork+0x10/0x20
[   34.542603] 
[   34.542685] The buggy address belongs to the variable:
[   34.542720]  global_array+0xd/0x40
[   34.542773] 
[   34.542824] The buggy address belongs to a 0-page vmalloc region starting at 0xffff9501ef300000 allocated at paging_init+0x66c/0x7d0
[   34.543170] The buggy address belongs to the physical page:
[   34.543211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d9f
[   34.543301] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   34.543372] raw: 03fffe0000002000 ffffc1ffc01f67c8 ffffc1ffc01f67c8 0000000000000000
[   34.543443] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.543486] page dumped because: kasan: bad access detected
[   34.543523] 
[   34.543543] Memory state around the buggy address:
[   34.543578]  ffff9501f119f580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.543624]  ffff9501f119f600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   34.543682] >ffff9501f119f680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   34.543722]                       ^
[   34.543753]  ffff9501f119f700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   34.543796]  ffff9501f119f780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.543847] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   34.522055] ==================================================================
[   34.522125] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.522285] Free of addr fff00000c9a8b401 by task kunit_try_catch/273
[   34.522335] 
[   34.522597] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.522924] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.523068] Hardware name: linux,dummy-virt (DT)
[   34.523129] Call trace:
[   34.523241]  show_stack+0x20/0x38 (C)
[   34.523312]  dump_stack_lvl+0x8c/0xd0
[   34.523369]  print_report+0x118/0x5e8
[   34.523777]  kasan_report_invalid_free+0xc0/0xe8
[   34.524006]  check_slab_allocation+0xfc/0x108
[   34.524156]  __kasan_mempool_poison_object+0x78/0x150
[   34.524244]  mempool_free+0x3f4/0x5f0
[   34.524412]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.524523]  mempool_kmalloc_invalid_free+0xc0/0x118
[   34.524788]  kunit_try_run_case+0x170/0x3f0
[   34.524908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.524985]  kthread+0x328/0x630
[   34.525029]  ret_from_fork+0x10/0x20
[   34.525078] 
[   34.525100] Allocated by task 273:
[   34.525129]  kasan_save_stack+0x3c/0x68
[   34.525169]  kasan_save_track+0x20/0x40
[   34.525205]  kasan_save_alloc_info+0x40/0x58
[   34.525243]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.525287]  remove_element+0x130/0x1f8
[   34.525324]  mempool_alloc_preallocated+0x58/0xc0
[   34.525364]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   34.525409]  mempool_kmalloc_invalid_free+0xc0/0x118
[   34.525452]  kunit_try_run_case+0x170/0x3f0
[   34.525491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.525534]  kthread+0x328/0x630
[   34.525567]  ret_from_fork+0x10/0x20
[   34.525603] 
[   34.525624] The buggy address belongs to the object at fff00000c9a8b400
[   34.525624]  which belongs to the cache kmalloc-128 of size 128
[   34.525818] The buggy address is located 1 bytes inside of
[   34.525818]  128-byte region [fff00000c9a8b400, fff00000c9a8b480)
[   34.526170] 
[   34.526192] The buggy address belongs to the physical page:
[   34.526232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   34.526287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.526338] page_type: f5(slab)
[   34.526381] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.526469] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.526552] page dumped because: kasan: bad access detected
[   34.526582] 
[   34.526602] Memory state around the buggy address:
[   34.526684]  fff00000c9a8b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.526769]  fff00000c9a8b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.526813] >fff00000c9a8b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.526895]                    ^
[   34.526982]  fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.527166]  fff00000c9a8b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.527224] ==================================================================
[   34.532179] ==================================================================
[   34.532551] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.532657] Free of addr fff00000c9bf0001 by task kunit_try_catch/275
[   34.532739] 
[   34.532773] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.532861] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.532929] Hardware name: linux,dummy-virt (DT)
[   34.532988] Call trace:
[   34.533057]  show_stack+0x20/0x38 (C)
[   34.533113]  dump_stack_lvl+0x8c/0xd0
[   34.533162]  print_report+0x118/0x5e8
[   34.533233]  kasan_report_invalid_free+0xc0/0xe8
[   34.533511]  __kasan_mempool_poison_object+0xfc/0x150
[   34.533598]  mempool_free+0x3f4/0x5f0
[   34.533676]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.533753]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   34.533806]  kunit_try_run_case+0x170/0x3f0
[   34.533852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.533989]  kthread+0x328/0x630
[   34.534067]  ret_from_fork+0x10/0x20
[   34.534123] 
[   34.534144] The buggy address belongs to the physical page:
[   34.534180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf0
[   34.534247] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.534296] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.534352] page_type: f8(unknown)
[   34.534426] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.534748] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.535262] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.535313] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.535449] head: 0bfffe0000000002 ffffc1ffc326fc01 00000000ffffffff 00000000ffffffff
[   34.535499] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.535539] page dumped because: kasan: bad access detected
[   34.535570] 
[   34.535590] Memory state around the buggy address:
[   34.535623]  fff00000c9beff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.535680]  fff00000c9beff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.535724] >fff00000c9bf0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.535762]                    ^
[   34.535791]  fff00000c9bf0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.535833]  fff00000c9bf0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.535871] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   34.478774] ==================================================================
[   34.479304] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.479783] Free of addr fff00000c9b8c000 by task kunit_try_catch/271
[   34.480326] 
[   34.480609] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.481836] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.482281] Hardware name: linux,dummy-virt (DT)
[   34.482500] Call trace:
[   34.482611]  show_stack+0x20/0x38 (C)
[   34.483013]  dump_stack_lvl+0x8c/0xd0
[   34.483212]  print_report+0x118/0x5e8
[   34.483562]  kasan_report_invalid_free+0xc0/0xe8
[   34.483855]  __kasan_mempool_poison_pages+0xe0/0xe8
[   34.484235]  mempool_free+0x3ac/0x5f0
[   34.484590]  mempool_double_free_helper+0x150/0x2e8
[   34.484653]  mempool_page_alloc_double_free+0xbc/0x118
[   34.484712]  kunit_try_run_case+0x170/0x3f0
[   34.484761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.486259]  kthread+0x328/0x630
[   34.486863]  ret_from_fork+0x10/0x20
[   34.487284] 
[   34.487313] The buggy address belongs to the physical page:
[   34.487351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c
[   34.488130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.488422] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.488517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.488705] page dumped because: kasan: bad access detected
[   34.489205] 
[   34.489315] Memory state around the buggy address:
[   34.489355]  fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.489402]  fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.489960] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.490341]                    ^
[   34.490779]  fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.491285]  fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.491558] ==================================================================
[   34.454098] ==================================================================
[   34.454164] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.454224] Free of addr fff00000c9b8c000 by task kunit_try_catch/269
[   34.454784] 
[   34.454984] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.455178] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.455234] Hardware name: linux,dummy-virt (DT)
[   34.455345] Call trace:
[   34.455410]  show_stack+0x20/0x38 (C)
[   34.455519]  dump_stack_lvl+0x8c/0xd0
[   34.455590]  print_report+0x118/0x5e8
[   34.455635]  kasan_report_invalid_free+0xc0/0xe8
[   34.455691]  __kasan_mempool_poison_object+0x14c/0x150
[   34.455741]  mempool_free+0x3f4/0x5f0
[   34.455956]  mempool_double_free_helper+0x150/0x2e8
[   34.456108]  mempool_kmalloc_large_double_free+0xc0/0x118
[   34.456210]  kunit_try_run_case+0x170/0x3f0
[   34.456277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.456428]  kthread+0x328/0x630
[   34.456471]  ret_from_fork+0x10/0x20
[   34.456841] 
[   34.456950] The buggy address belongs to the physical page:
[   34.457023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c
[   34.457081] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.457129] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.457232] page_type: f8(unknown)
[   34.457273] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.457401] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.457548] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.457596] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.457654] head: 0bfffe0000000002 ffffc1ffc326e301 00000000ffffffff 00000000ffffffff
[   34.457704] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.457770] page dumped because: kasan: bad access detected
[   34.457903] 
[   34.457921] Memory state around the buggy address:
[   34.458008]  fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.458173]  fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.458217] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.458255]                    ^
[   34.458284]  fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.458370]  fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.458409] ==================================================================
[   34.438055] ==================================================================
[   34.438126] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.438191] Free of addr fff00000c9a8b000 by task kunit_try_catch/267
[   34.438234] 
[   34.438273] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.438365] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.438393] Hardware name: linux,dummy-virt (DT)
[   34.438425] Call trace:
[   34.438449]  show_stack+0x20/0x38 (C)
[   34.438677]  dump_stack_lvl+0x8c/0xd0
[   34.438756]  print_report+0x118/0x5e8
[   34.439033]  kasan_report_invalid_free+0xc0/0xe8
[   34.439500]  check_slab_allocation+0xd4/0x108
[   34.439552]  __kasan_mempool_poison_object+0x78/0x150
[   34.439651]  mempool_free+0x3f4/0x5f0
[   34.439703]  mempool_double_free_helper+0x150/0x2e8
[   34.439914]  mempool_kmalloc_double_free+0xc0/0x118
[   34.440027]  kunit_try_run_case+0x170/0x3f0
[   34.440226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.440317]  kthread+0x328/0x630
[   34.440359]  ret_from_fork+0x10/0x20
[   34.440419] 
[   34.440439] Allocated by task 267:
[   34.440558]  kasan_save_stack+0x3c/0x68
[   34.440610]  kasan_save_track+0x20/0x40
[   34.440658]  kasan_save_alloc_info+0x40/0x58
[   34.440699]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.440848]  remove_element+0x130/0x1f8
[   34.440986]  mempool_alloc_preallocated+0x58/0xc0
[   34.441110]  mempool_double_free_helper+0x94/0x2e8
[   34.441169]  mempool_kmalloc_double_free+0xc0/0x118
[   34.441490]  kunit_try_run_case+0x170/0x3f0
[   34.441756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.441809]  kthread+0x328/0x630
[   34.441892]  ret_from_fork+0x10/0x20
[   34.441930] 
[   34.442002] Freed by task 267:
[   34.442084]  kasan_save_stack+0x3c/0x68
[   34.442121]  kasan_save_track+0x20/0x40
[   34.442183]  kasan_save_free_info+0x4c/0x78
[   34.442219]  __kasan_mempool_poison_object+0xc0/0x150
[   34.442305]  mempool_free+0x3f4/0x5f0
[   34.442488]  mempool_double_free_helper+0x100/0x2e8
[   34.442532]  mempool_kmalloc_double_free+0xc0/0x118
[   34.442573]  kunit_try_run_case+0x170/0x3f0
[   34.442610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.442691]  kthread+0x328/0x630
[   34.442724]  ret_from_fork+0x10/0x20
[   34.442839] 
[   34.442859] The buggy address belongs to the object at fff00000c9a8b000
[   34.442859]  which belongs to the cache kmalloc-128 of size 128
[   34.443027] The buggy address is located 0 bytes inside of
[   34.443027]  128-byte region [fff00000c9a8b000, fff00000c9a8b080)
[   34.443087] 
[   34.443110] The buggy address belongs to the physical page:
[   34.443147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   34.443474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.443549] page_type: f5(slab)
[   34.443593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.443654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.443733] page dumped because: kasan: bad access detected
[   34.443769] 
[   34.443943] Memory state around the buggy address:
[   34.444036]  fff00000c9a8af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.444080]  fff00000c9a8af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.444123] >fff00000c9a8b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.444163]                    ^
[   34.444409]  fff00000c9a8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.444456]  fff00000c9a8b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.444542] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   34.421176] ==================================================================
[   34.421633] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   34.421946] Read of size 1 at addr fff00000c9b8c000 by task kunit_try_catch/265
[   34.422048] 
[   34.422097] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.422274] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.422312] Hardware name: linux,dummy-virt (DT)
[   34.422363] Call trace:
[   34.422459]  show_stack+0x20/0x38 (C)
[   34.422652]  dump_stack_lvl+0x8c/0xd0
[   34.422710]  print_report+0x118/0x5e8
[   34.422829]  kasan_report+0xdc/0x128
[   34.422999]  __asan_report_load1_noabort+0x20/0x30
[   34.423050]  mempool_uaf_helper+0x314/0x340
[   34.423510]  mempool_page_alloc_uaf+0xc0/0x118
[   34.423718]  kunit_try_run_case+0x170/0x3f0
[   34.423810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.423884]  kthread+0x328/0x630
[   34.423985]  ret_from_fork+0x10/0x20
[   34.424229] 
[   34.424291] The buggy address belongs to the physical page:
[   34.424332] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c
[   34.424570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.424656] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.424950] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.425104] page dumped because: kasan: bad access detected
[   34.425145] 
[   34.425163] Memory state around the buggy address:
[   34.425201]  fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.425276]  fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.425373] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.425438]                    ^
[   34.425545]  fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.425630]  fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.425884] ==================================================================
[   34.355922] ==================================================================
[   34.355989] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   34.356052] Read of size 1 at addr fff00000c9b8c000 by task kunit_try_catch/261
[   34.356103] 
[   34.356139] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.356229] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.356259] Hardware name: linux,dummy-virt (DT)
[   34.356291] Call trace:
[   34.356576]  show_stack+0x20/0x38 (C)
[   34.356922]  dump_stack_lvl+0x8c/0xd0
[   34.357492]  print_report+0x118/0x5e8
[   34.357662]  kasan_report+0xdc/0x128
[   34.357968]  __asan_report_load1_noabort+0x20/0x30
[   34.358022]  mempool_uaf_helper+0x314/0x340
[   34.358069]  mempool_kmalloc_large_uaf+0xc4/0x120
[   34.358562]  kunit_try_run_case+0x170/0x3f0
[   34.358842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.358970]  kthread+0x328/0x630
[   34.359013]  ret_from_fork+0x10/0x20
[   34.359062] 
[   34.359086] The buggy address belongs to the physical page:
[   34.359271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c
[   34.359516] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.359565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.360114] page_type: f8(unknown)
[   34.360239] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.360290] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.360341] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.360399] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.360448] head: 0bfffe0000000002 ffffc1ffc326e301 00000000ffffffff 00000000ffffffff
[   34.360863] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.360910] page dumped because: kasan: bad access detected
[   34.360943] 
[   34.360961] Memory state around the buggy address:
[   34.361348]  fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.361436]  fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.361486] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.361628]                    ^
[   34.361873]  fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.361918]  fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.361956] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   34.337692] ==================================================================
[   34.338000] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   34.338171] Read of size 1 at addr fff00000c8636c00 by task kunit_try_catch/259
[   34.338306] 
[   34.338385] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.338486] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.338632] Hardware name: linux,dummy-virt (DT)
[   34.338684] Call trace:
[   34.338710]  show_stack+0x20/0x38 (C)
[   34.338762]  dump_stack_lvl+0x8c/0xd0
[   34.338810]  print_report+0x118/0x5e8
[   34.338854]  kasan_report+0xdc/0x128
[   34.338897]  __asan_report_load1_noabort+0x20/0x30
[   34.338954]  mempool_uaf_helper+0x314/0x340
[   34.339310]  mempool_kmalloc_uaf+0xc4/0x120
[   34.339557]  kunit_try_run_case+0x170/0x3f0
[   34.339609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.339679]  kthread+0x328/0x630
[   34.339723]  ret_from_fork+0x10/0x20
[   34.339771] 
[   34.339791] Allocated by task 259:
[   34.339821]  kasan_save_stack+0x3c/0x68
[   34.339924]  kasan_save_track+0x20/0x40
[   34.339973]  kasan_save_alloc_info+0x40/0x58
[   34.340011]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.340053]  remove_element+0x130/0x1f8
[   34.340091]  mempool_alloc_preallocated+0x58/0xc0
[   34.340130]  mempool_uaf_helper+0xa4/0x340
[   34.340168]  mempool_kmalloc_uaf+0xc4/0x120
[   34.340205]  kunit_try_run_case+0x170/0x3f0
[   34.340240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.340284]  kthread+0x328/0x630
[   34.340341]  ret_from_fork+0x10/0x20
[   34.340377] 
[   34.340397] Freed by task 259:
[   34.340429]  kasan_save_stack+0x3c/0x68
[   34.340500]  kasan_save_track+0x20/0x40
[   34.340590]  kasan_save_free_info+0x4c/0x78
[   34.340628]  __kasan_mempool_poison_object+0xc0/0x150
[   34.340684]  mempool_free+0x3f4/0x5f0
[   34.340720]  mempool_uaf_helper+0x104/0x340
[   34.340766]  mempool_kmalloc_uaf+0xc4/0x120
[   34.340805]  kunit_try_run_case+0x170/0x3f0
[   34.340840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.340934]  kthread+0x328/0x630
[   34.340980]  ret_from_fork+0x10/0x20
[   34.341017] 
[   34.341036] The buggy address belongs to the object at fff00000c8636c00
[   34.341036]  which belongs to the cache kmalloc-128 of size 128
[   34.341097] The buggy address is located 0 bytes inside of
[   34.341097]  freed 128-byte region [fff00000c8636c00, fff00000c8636c80)
[   34.341342] 
[   34.341364] The buggy address belongs to the physical page:
[   34.341475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108636
[   34.341549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.341630] page_type: f5(slab)
[   34.341682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.341731] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.341781] page dumped because: kasan: bad access detected
[   34.341836] 
[   34.341854] Memory state around the buggy address:
[   34.342089]  fff00000c8636b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.342137]  fff00000c8636b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.342301] >fff00000c8636c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.342375]                    ^
[   34.342403]  fff00000c8636c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.342447]  fff00000c8636d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.342536] ==================================================================
[   34.374378] ==================================================================
[   34.374893] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   34.375058] Read of size 1 at addr fff00000c9a8d240 by task kunit_try_catch/263
[   34.375108] 
[   34.375144] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.375232] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.375263] Hardware name: linux,dummy-virt (DT)
[   34.375938] Call trace:
[   34.375973]  show_stack+0x20/0x38 (C)
[   34.376025]  dump_stack_lvl+0x8c/0xd0
[   34.376075]  print_report+0x118/0x5e8
[   34.376118]  kasan_report+0xdc/0x128
[   34.376172]  __asan_report_load1_noabort+0x20/0x30
[   34.376220]  mempool_uaf_helper+0x314/0x340
[   34.376614]  mempool_slab_uaf+0xc0/0x118
[   34.376706]  kunit_try_run_case+0x170/0x3f0
[   34.376756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.376825]  kthread+0x328/0x630
[   34.376868]  ret_from_fork+0x10/0x20
[   34.376917] 
[   34.376936] Allocated by task 263:
[   34.376965]  kasan_save_stack+0x3c/0x68
[   34.377198]  kasan_save_track+0x20/0x40
[   34.377299]  kasan_save_alloc_info+0x40/0x58
[   34.377343]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.377384]  remove_element+0x16c/0x1f8
[   34.377603]  mempool_alloc_preallocated+0x58/0xc0
[   34.377831]  mempool_uaf_helper+0xa4/0x340
[   34.377877]  mempool_slab_uaf+0xc0/0x118
[   34.378272]  kunit_try_run_case+0x170/0x3f0
[   34.378506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.378563]  kthread+0x328/0x630
[   34.378599]  ret_from_fork+0x10/0x20
[   34.378635] 
[   34.378667] Freed by task 263:
[   34.378705]  kasan_save_stack+0x3c/0x68
[   34.378748]  kasan_save_track+0x20/0x40
[   34.378797]  kasan_save_free_info+0x4c/0x78
[   34.378967]  __kasan_mempool_poison_object+0xc0/0x150
[   34.379009]  mempool_free+0x3f4/0x5f0
[   34.379046]  mempool_uaf_helper+0x104/0x340
[   34.379388]  mempool_slab_uaf+0xc0/0x118
[   34.379568]  kunit_try_run_case+0x170/0x3f0
[   34.379629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.379684]  kthread+0x328/0x630
[   34.379716]  ret_from_fork+0x10/0x20
[   34.379751] 
[   34.379775] The buggy address belongs to the object at fff00000c9a8d240
[   34.379775]  which belongs to the cache test_cache of size 123
[   34.379939] The buggy address is located 0 bytes inside of
[   34.379939]  freed 123-byte region [fff00000c9a8d240, fff00000c9a8d2bb)
[   34.380248] 
[   34.380311] The buggy address belongs to the physical page:
[   34.380345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8d
[   34.380418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.380489] page_type: f5(slab)
[   34.380530] raw: 0bfffe0000000000 fff00000c45178c0 dead000000000122 0000000000000000
[   34.380580] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.380662] page dumped because: kasan: bad access detected
[   34.381002] 
[   34.381025] Memory state around the buggy address:
[   34.381149]  fff00000c9a8d100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.381261]  fff00000c9a8d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.381385] >fff00000c9a8d200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   34.381423]                                            ^
[   34.381519]  fff00000c9a8d280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.381621]  fff00000c9a8d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.381950] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   34.252320] ==================================================================
[   34.252397] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.252476] Read of size 1 at addr fff00000c8636873 by task kunit_try_catch/253
[   34.252527] 
[   34.252569] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.252681] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.252713] Hardware name: linux,dummy-virt (DT)
[   34.252746] Call trace:
[   34.252774]  show_stack+0x20/0x38 (C)
[   34.252826]  dump_stack_lvl+0x8c/0xd0
[   34.252876]  print_report+0x118/0x5e8
[   34.252921]  kasan_report+0xdc/0x128
[   34.252964]  __asan_report_load1_noabort+0x20/0x30
[   34.253013]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.253065]  mempool_kmalloc_oob_right+0xc4/0x120
[   34.253113]  kunit_try_run_case+0x170/0x3f0
[   34.253162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.253215]  kthread+0x328/0x630
[   34.253258]  ret_from_fork+0x10/0x20
[   34.253309] 
[   34.253329] Allocated by task 253:
[   34.253359]  kasan_save_stack+0x3c/0x68
[   34.253398]  kasan_save_track+0x20/0x40
[   34.253434]  kasan_save_alloc_info+0x40/0x58
[   34.253470]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.253515]  remove_element+0x130/0x1f8
[   34.253553]  mempool_alloc_preallocated+0x58/0xc0
[   34.253594]  mempool_oob_right_helper+0x98/0x2f0
[   34.253634]  mempool_kmalloc_oob_right+0xc4/0x120
[   34.253684]  kunit_try_run_case+0x170/0x3f0
[   34.253721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.253764]  kthread+0x328/0x630
[   34.253795]  ret_from_fork+0x10/0x20
[   34.253831] 
[   34.253851] The buggy address belongs to the object at fff00000c8636800
[   34.253851]  which belongs to the cache kmalloc-128 of size 128
[   34.253909] The buggy address is located 0 bytes to the right of
[   34.253909]  allocated 115-byte region [fff00000c8636800, fff00000c8636873)
[   34.253973] 
[   34.253996] The buggy address belongs to the physical page:
[   34.254034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108636
[   34.254093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.254146] page_type: f5(slab)
[   34.254189] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.254239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.254280] page dumped because: kasan: bad access detected
[   34.254311] 
[   34.254331] Memory state around the buggy address:
[   34.254366]  fff00000c8636700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.254410]  fff00000c8636780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.254456] >fff00000c8636800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.254495]                                                              ^
[   34.254536]  fff00000c8636880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.254578]  fff00000c8636900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.254618] ==================================================================
[   34.269082] ==================================================================
[   34.269147] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.269208] Read of size 1 at addr fff00000c99fe001 by task kunit_try_catch/255
[   34.269257] 
[   34.269291] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.269383] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.269413] Hardware name: linux,dummy-virt (DT)
[   34.269443] Call trace:
[   34.269468]  show_stack+0x20/0x38 (C)
[   34.269514]  dump_stack_lvl+0x8c/0xd0
[   34.269987]  print_report+0x118/0x5e8
[   34.270058]  kasan_report+0xdc/0x128
[   34.270101]  __asan_report_load1_noabort+0x20/0x30
[   34.270659]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.270791]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   34.270849]  kunit_try_run_case+0x170/0x3f0
[   34.270899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.271341]  kthread+0x328/0x630
[   34.271401]  ret_from_fork+0x10/0x20
[   34.272073] 
[   34.272127] The buggy address belongs to the physical page:
[   34.272560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099fc
[   34.273070] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.273525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.274084] page_type: f8(unknown)
[   34.274193] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.274244] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.274787] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.274911] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.274960] head: 0bfffe0000000002 ffffc1ffc3267f01 00000000ffffffff 00000000ffffffff
[   34.275531] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.275580] page dumped because: kasan: bad access detected
[   34.275613] 
[   34.275632] Memory state around the buggy address:
[   34.276010]  fff00000c99fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.276828]  fff00000c99fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.277185] >fff00000c99fe000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.277467]                    ^
[   34.277503]  fff00000c99fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.277950]  fff00000c99fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.278006] ==================================================================
[   34.297527] ==================================================================
[   34.297938] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.298022] Read of size 1 at addr fff00000c9a902bb by task kunit_try_catch/257
[   34.298073] 
[   34.298108] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.298202] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.298232] Hardware name: linux,dummy-virt (DT)
[   34.298265] Call trace:
[   34.298289]  show_stack+0x20/0x38 (C)
[   34.299693]  dump_stack_lvl+0x8c/0xd0
[   34.299771]  print_report+0x118/0x5e8
[   34.300055]  kasan_report+0xdc/0x128
[   34.300116]  __asan_report_load1_noabort+0x20/0x30
[   34.300223]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.300274]  mempool_slab_oob_right+0xc0/0x118
[   34.300323]  kunit_try_run_case+0x170/0x3f0
[   34.300373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.300608]  kthread+0x328/0x630
[   34.300677]  ret_from_fork+0x10/0x20
[   34.300724] 
[   34.300746] Allocated by task 257:
[   34.300831]  kasan_save_stack+0x3c/0x68
[   34.300938]  kasan_save_track+0x20/0x40
[   34.301017]  kasan_save_alloc_info+0x40/0x58
[   34.301095]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.301175]  remove_element+0x16c/0x1f8
[   34.301229]  mempool_alloc_preallocated+0x58/0xc0
[   34.301317]  mempool_oob_right_helper+0x98/0x2f0
[   34.301357]  mempool_slab_oob_right+0xc0/0x118
[   34.301397]  kunit_try_run_case+0x170/0x3f0
[   34.301434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.301696]  kthread+0x328/0x630
[   34.301736]  ret_from_fork+0x10/0x20
[   34.301921] 
[   34.301946] The buggy address belongs to the object at fff00000c9a90240
[   34.301946]  which belongs to the cache test_cache of size 123
[   34.302226] The buggy address is located 0 bytes to the right of
[   34.302226]  allocated 123-byte region [fff00000c9a90240, fff00000c9a902bb)
[   34.302356] 
[   34.302375] The buggy address belongs to the physical page:
[   34.302409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a90
[   34.302465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.302515] page_type: f5(slab)
[   34.302565] raw: 0bfffe0000000000 fff00000c4517780 dead000000000122 0000000000000000
[   34.302614] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.303055] page dumped because: kasan: bad access detected
[   34.303131] 
[   34.303169] Memory state around the buggy address:
[   34.303295]  fff00000c9a90180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.303349]  fff00000c9a90200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   34.303397] >fff00000c9a90280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   34.303459]                                         ^
[   34.303495]  fff00000c9a90300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.303536]  fff00000c9a90380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.303574] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   33.690148] ==================================================================
[   33.690226] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   33.690301] Read of size 1 at addr fff00000c45173c0 by task kunit_try_catch/247
[   33.690351] 
[   33.690392] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   33.690484] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.690516] Hardware name: linux,dummy-virt (DT)
[   33.690551] Call trace:
[   33.690578]  show_stack+0x20/0x38 (C)
[   33.690630]  dump_stack_lvl+0x8c/0xd0
[   33.690696]  print_report+0x118/0x5e8
[   33.690740]  kasan_report+0xdc/0x128
[   33.690784]  __kasan_check_byte+0x54/0x70
[   33.690828]  kmem_cache_destroy+0x34/0x218
[   33.690878]  kmem_cache_double_destroy+0x174/0x300
[   33.690928]  kunit_try_run_case+0x170/0x3f0
[   33.690993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.691045]  kthread+0x328/0x630
[   33.691088]  ret_from_fork+0x10/0x20
[   33.691150] 
[   33.691170] Allocated by task 247:
[   33.691200]  kasan_save_stack+0x3c/0x68
[   33.691241]  kasan_save_track+0x20/0x40
[   33.691277]  kasan_save_alloc_info+0x40/0x58
[   33.691314]  __kasan_slab_alloc+0xa8/0xb0
[   33.691350]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.691391]  __kmem_cache_create_args+0x178/0x280
[   33.691432]  kmem_cache_double_destroy+0xc0/0x300
[   33.691473]  kunit_try_run_case+0x170/0x3f0
[   33.691510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.691553]  kthread+0x328/0x630
[   33.691585]  ret_from_fork+0x10/0x20
[   33.691621] 
[   33.691653] Freed by task 247:
[   33.691680]  kasan_save_stack+0x3c/0x68
[   33.691716]  kasan_save_track+0x20/0x40
[   33.691749]  kasan_save_free_info+0x4c/0x78
[   33.691791]  __kasan_slab_free+0x7c/0xa8
[   33.691825]  kmem_cache_free+0x260/0x468
[   33.691864]  slab_kmem_cache_release+0x38/0x50
[   33.691902]  kmem_cache_release+0x1c/0x30
[   33.691940]  kobject_put+0x17c/0x420
[   33.691978]  sysfs_slab_release+0x1c/0x30
[   33.692014]  kmem_cache_destroy+0x118/0x218
[   33.692053]  kmem_cache_double_destroy+0x128/0x300
[   33.692092]  kunit_try_run_case+0x170/0x3f0
[   33.692129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.692172]  kthread+0x328/0x630
[   33.692203]  ret_from_fork+0x10/0x20
[   33.692239] 
[   33.692261] The buggy address belongs to the object at fff00000c45173c0
[   33.692261]  which belongs to the cache kmem_cache of size 208
[   33.692317] The buggy address is located 0 bytes inside of
[   33.692317]  freed 208-byte region [fff00000c45173c0, fff00000c4517490)
[   33.692377] 
[   33.692400] The buggy address belongs to the physical page:
[   33.692443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104517
[   33.692502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.692553] page_type: f5(slab)
[   33.692595] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   33.692659] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   33.692705] page dumped because: kasan: bad access detected
[   33.692737] 
[   33.692757] Memory state around the buggy address:
[   33.692793]  fff00000c4517280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.692837]  fff00000c4517300: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[   33.692881] >fff00000c4517380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   33.692921]                                            ^
[   33.692955]  fff00000c4517400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.692998]  fff00000c4517480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.693037] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   33.631318] ==================================================================
[   33.631411] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   33.631493] Read of size 1 at addr fff00000c9adc000 by task kunit_try_catch/245
[   33.631546] 
[   33.631588] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   33.631704] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.631736] Hardware name: linux,dummy-virt (DT)
[   33.631769] Call trace:
[   33.631797]  show_stack+0x20/0x38 (C)
[   33.631849]  dump_stack_lvl+0x8c/0xd0
[   33.631901]  print_report+0x118/0x5e8
[   33.631947]  kasan_report+0xdc/0x128
[   33.631992]  __asan_report_load1_noabort+0x20/0x30
[   33.632041]  kmem_cache_rcu_uaf+0x388/0x468
[   33.632088]  kunit_try_run_case+0x170/0x3f0
[   33.632138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.632191]  kthread+0x328/0x630
[   33.632236]  ret_from_fork+0x10/0x20
[   33.632284] 
[   33.632303] Allocated by task 245:
[   33.632334]  kasan_save_stack+0x3c/0x68
[   33.632375]  kasan_save_track+0x20/0x40
[   33.632409]  kasan_save_alloc_info+0x40/0x58
[   33.632447]  __kasan_slab_alloc+0xa8/0xb0
[   33.632481]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.632523]  kmem_cache_rcu_uaf+0x12c/0x468
[   33.632562]  kunit_try_run_case+0x170/0x3f0
[   33.632599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.632652]  kthread+0x328/0x630
[   33.632689]  ret_from_fork+0x10/0x20
[   33.632725] 
[   33.632745] Freed by task 0:
[   33.632772]  kasan_save_stack+0x3c/0x68
[   33.632807]  kasan_save_track+0x20/0x40
[   33.632842]  kasan_save_free_info+0x4c/0x78
[   33.632879]  __kasan_slab_free+0x7c/0xa8
[   33.632914]  slab_free_after_rcu_debug+0xd4/0x2f8
[   33.632954]  rcu_core+0x9f4/0x1e58
[   33.632993]  rcu_core_si+0x18/0x30
[   33.633027]  handle_softirqs+0x374/0xb28
[   33.633065]  __do_softirq+0x1c/0x28
[   33.633100] 
[   33.633118] Last potentially related work creation:
[   33.633146]  kasan_save_stack+0x3c/0x68
[   33.633182]  kasan_record_aux_stack+0xb4/0xc8
[   33.633221]  kmem_cache_free+0x120/0x468
[   33.633259]  kmem_cache_rcu_uaf+0x16c/0x468
[   33.633301]  kunit_try_run_case+0x170/0x3f0
[   33.633339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.633381]  kthread+0x328/0x630
[   33.633412]  ret_from_fork+0x10/0x20
[   33.633448] 
[   33.633469] The buggy address belongs to the object at fff00000c9adc000
[   33.633469]  which belongs to the cache test_cache of size 200
[   33.633525] The buggy address is located 0 bytes inside of
[   33.633525]  freed 200-byte region [fff00000c9adc000, fff00000c9adc0c8)
[   33.633584] 
[   33.633607] The buggy address belongs to the physical page:
[   33.633657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adc
[   33.633713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.633765] page_type: f5(slab)
[   33.633805] raw: 0bfffe0000000000 fff00000c56bcb40 dead000000000122 0000000000000000
[   33.633856] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.633896] page dumped because: kasan: bad access detected
[   33.633928] 
[   33.633945] Memory state around the buggy address:
[   33.633980]  fff00000c9adbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.634024]  fff00000c9adbf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.634068] >fff00000c9adc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.634107]                    ^
[   33.634135]  fff00000c9adc080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.634177]  fff00000c9adc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.634216] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   33.382448] ==================================================================
[   33.382522] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   33.382597] Free of addr fff00000c9ade001 by task kunit_try_catch/243
[   33.386688] 
[   33.386755] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   33.386851] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.386882] Hardware name: linux,dummy-virt (DT)
[   33.386915] Call trace:
[   33.387071]  show_stack+0x20/0x38 (C)
[   33.387251]  dump_stack_lvl+0x8c/0xd0
[   33.387338]  print_report+0x118/0x5e8
[   33.387394]  kasan_report_invalid_free+0xc0/0xe8
[   33.387470]  check_slab_allocation+0xfc/0x108
[   33.387525]  __kasan_slab_pre_free+0x2c/0x48
[   33.387571]  kmem_cache_free+0xf0/0x468
[   33.387741]  kmem_cache_invalid_free+0x184/0x3c8
[   33.387827]  kunit_try_run_case+0x170/0x3f0
[   33.389702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.389759]  kthread+0x328/0x630
[   33.389804]  ret_from_fork+0x10/0x20
[   33.389854] 
[   33.389873] Allocated by task 243:
[   33.389906]  kasan_save_stack+0x3c/0x68
[   33.389946]  kasan_save_track+0x20/0x40
[   33.389983]  kasan_save_alloc_info+0x40/0x58
[   33.390022]  __kasan_slab_alloc+0xa8/0xb0
[   33.390055]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.390096]  kmem_cache_invalid_free+0x12c/0x3c8
[   33.390134]  kunit_try_run_case+0x170/0x3f0
[   33.390171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.390212]  kthread+0x328/0x630
[   33.390245]  ret_from_fork+0x10/0x20
[   33.390278] 
[   33.390298] The buggy address belongs to the object at fff00000c9ade000
[   33.390298]  which belongs to the cache test_cache of size 200
[   33.390355] The buggy address is located 1 bytes inside of
[   33.390355]  200-byte region [fff00000c9ade000, fff00000c9ade0c8)
[   33.390414] 
[   33.390435] The buggy address belongs to the physical page:
[   33.390474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ade
[   33.390529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.390580] page_type: f5(slab)
[   33.390621] raw: 0bfffe0000000000 fff00000c56bca00 dead000000000122 0000000000000000
[   33.390680] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.390741] page dumped because: kasan: bad access detected
[   33.390773] 
[   33.390813] Memory state around the buggy address:
[   33.390849]  fff00000c9addf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.390923]  fff00000c9addf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.391233] >fff00000c9ade000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.391347]                    ^
[   33.391385]  fff00000c9ade080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.391430]  fff00000c9ade100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.391499] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   33.266105] ==================================================================
[   33.266182] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   33.266604] Free of addr fff00000c9adf000 by task kunit_try_catch/241
[   33.266660] 
[   33.266986] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   33.267529] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.267719] Hardware name: linux,dummy-virt (DT)
[   33.268094] Call trace:
[   33.268212]  show_stack+0x20/0x38 (C)
[   33.268274]  dump_stack_lvl+0x8c/0xd0
[   33.268434]  print_report+0x118/0x5e8
[   33.268635]  kasan_report_invalid_free+0xc0/0xe8
[   33.268747]  check_slab_allocation+0xd4/0x108
[   33.268993]  __kasan_slab_pre_free+0x2c/0x48
[   33.269202]  kmem_cache_free+0xf0/0x468
[   33.269331]  kmem_cache_double_free+0x190/0x3c8
[   33.269695]  kunit_try_run_case+0x170/0x3f0
[   33.270052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.270355]  kthread+0x328/0x630
[   33.270653]  ret_from_fork+0x10/0x20
[   33.270717] 
[   33.270738] Allocated by task 241:
[   33.270768]  kasan_save_stack+0x3c/0x68
[   33.270809]  kasan_save_track+0x20/0x40
[   33.270843]  kasan_save_alloc_info+0x40/0x58
[   33.270881]  __kasan_slab_alloc+0xa8/0xb0
[   33.271056]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.271116]  kmem_cache_double_free+0x12c/0x3c8
[   33.271420]  kunit_try_run_case+0x170/0x3f0
[   33.271460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.271575]  kthread+0x328/0x630
[   33.271717]  ret_from_fork+0x10/0x20
[   33.271756] 
[   33.271866] Freed by task 241:
[   33.272047]  kasan_save_stack+0x3c/0x68
[   33.272390]  kasan_save_track+0x20/0x40
[   33.272696]  kasan_save_free_info+0x4c/0x78
[   33.272737]  __kasan_slab_free+0x7c/0xa8
[   33.272773]  kmem_cache_free+0x260/0x468
[   33.272809]  kmem_cache_double_free+0x140/0x3c8
[   33.272849]  kunit_try_run_case+0x170/0x3f0
[   33.272886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.273388]  kthread+0x328/0x630
[   33.273433]  ret_from_fork+0x10/0x20
[   33.273471] 
[   33.273491] The buggy address belongs to the object at fff00000c9adf000
[   33.273491]  which belongs to the cache test_cache of size 200
[   33.273945] The buggy address is located 0 bytes inside of
[   33.273945]  200-byte region [fff00000c9adf000, fff00000c9adf0c8)
[   33.274259] 
[   33.274287] The buggy address belongs to the physical page:
[   33.274330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   33.274811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.274874] page_type: f5(slab)
[   33.275287] raw: 0bfffe0000000000 fff00000c56bc8c0 dead000000000122 0000000000000000
[   33.275373] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.275945] page dumped because: kasan: bad access detected
[   33.276016] 
[   33.276112] Memory state around the buggy address:
[   33.276172]  fff00000c9adef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.276383]  fff00000c9adef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.276432] >fff00000c9adf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.276470]                    ^
[   33.276500]  fff00000c9adf080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.276552]  fff00000c9adf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.276846] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   32.961666] ==================================================================
[   32.961729] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   32.961793] Read of size 1 at addr fff00000c9ae10c8 by task kunit_try_catch/239
[   32.962909] 
[   32.962985] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.963198] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.963231] Hardware name: linux,dummy-virt (DT)
[   32.963663] Call trace:
[   32.963698]  show_stack+0x20/0x38 (C)
[   32.963906]  dump_stack_lvl+0x8c/0xd0
[   32.964037]  print_report+0x118/0x5e8
[   32.964162]  kasan_report+0xdc/0x128
[   32.964293]  __asan_report_load1_noabort+0x20/0x30
[   32.964357]  kmem_cache_oob+0x344/0x430
[   32.964427]  kunit_try_run_case+0x170/0x3f0
[   32.964819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.964952]  kthread+0x328/0x630
[   32.965136]  ret_from_fork+0x10/0x20
[   32.965244] 
[   32.965599] Allocated by task 239:
[   32.965708]  kasan_save_stack+0x3c/0x68
[   32.966068]  kasan_save_track+0x20/0x40
[   32.966227]  kasan_save_alloc_info+0x40/0x58
[   32.966334]  __kasan_slab_alloc+0xa8/0xb0
[   32.966514]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.966788]  kmem_cache_oob+0x12c/0x430
[   32.967010]  kunit_try_run_case+0x170/0x3f0
[   32.967171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.967290]  kthread+0x328/0x630
[   32.967542]  ret_from_fork+0x10/0x20
[   32.967826] 
[   32.967895] The buggy address belongs to the object at fff00000c9ae1000
[   32.967895]  which belongs to the cache test_cache of size 200
[   32.968021] The buggy address is located 0 bytes to the right of
[   32.968021]  allocated 200-byte region [fff00000c9ae1000, fff00000c9ae10c8)
[   32.968148] 
[   32.968303] The buggy address belongs to the physical page:
[   32.968559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae1
[   32.968743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.969106] page_type: f5(slab)
[   32.969260] raw: 0bfffe0000000000 fff00000c56bc780 dead000000000122 0000000000000000
[   32.969584] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   32.969778] page dumped because: kasan: bad access detected
[   32.970056] 
[   32.970135] Memory state around the buggy address:
[   32.970455]  fff00000c9ae0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.970716]  fff00000c9ae1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.970796] >fff00000c9ae1080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.970930]                                               ^
[   32.971126]  fff00000c9ae1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.971343]  fff00000c9ae1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.971427] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   32.915256] ==================================================================
[   32.915328] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   32.916242] Read of size 8 at addr fff00000c9b21780 by task kunit_try_catch/232
[   32.916410] 
[   32.916445] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.916536] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.916564] Hardware name: linux,dummy-virt (DT)
[   32.916594] Call trace:
[   32.916618]  show_stack+0x20/0x38 (C)
[   32.916681]  dump_stack_lvl+0x8c/0xd0
[   32.916726]  print_report+0x118/0x5e8
[   32.916771]  kasan_report+0xdc/0x128
[   32.916813]  __asan_report_load8_noabort+0x20/0x30
[   32.916861]  workqueue_uaf+0x480/0x4a8
[   32.916907]  kunit_try_run_case+0x170/0x3f0
[   32.916954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.917005]  kthread+0x328/0x630
[   32.917047]  ret_from_fork+0x10/0x20
[   32.917094] 
[   32.917113] Allocated by task 232:
[   32.917142]  kasan_save_stack+0x3c/0x68
[   32.917192]  kasan_save_track+0x20/0x40
[   32.917229]  kasan_save_alloc_info+0x40/0x58
[   32.917268]  __kasan_kmalloc+0xd4/0xd8
[   32.917624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.917874]  workqueue_uaf+0x13c/0x4a8
[   32.917921]  kunit_try_run_case+0x170/0x3f0
[   32.918052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.918103]  kthread+0x328/0x630
[   32.918259]  ret_from_fork+0x10/0x20
[   32.918318] 
[   32.918344] Freed by task 47:
[   32.918471]  kasan_save_stack+0x3c/0x68
[   32.918508]  kasan_save_track+0x20/0x40
[   32.918583]  kasan_save_free_info+0x4c/0x78
[   32.918622]  __kasan_slab_free+0x7c/0xa8
[   32.918665]  kfree+0x214/0x3c8
[   32.918705]  workqueue_uaf_work+0x18/0x30
[   32.918879]  process_one_work+0x530/0xf88
[   32.918932]  worker_thread+0x618/0xf38
[   32.919451]  kthread+0x328/0x630
[   32.919687]  ret_from_fork+0x10/0x20
[   32.919728] 
[   32.920309] Last potentially related work creation:
[   32.920345]  kasan_save_stack+0x3c/0x68
[   32.920996]  kasan_record_aux_stack+0xb4/0xc8
[   32.921227]  __queue_work+0x65c/0xfe0
[   32.921270]  queue_work_on+0xbc/0xf8
[   32.921513]  workqueue_uaf+0x210/0x4a8
[   32.921625]  kunit_try_run_case+0x170/0x3f0
[   32.922252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.922438]  kthread+0x328/0x630
[   32.922712]  ret_from_fork+0x10/0x20
[   32.923019] 
[   32.923158] The buggy address belongs to the object at fff00000c9b21780
[   32.923158]  which belongs to the cache kmalloc-32 of size 32
[   32.923658] The buggy address is located 0 bytes inside of
[   32.923658]  freed 32-byte region [fff00000c9b21780, fff00000c9b217a0)
[   32.923761] 
[   32.924147] The buggy address belongs to the physical page:
[   32.924684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b21
[   32.925248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.925464] page_type: f5(slab)
[   32.926059] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.926461] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.926507] page dumped because: kasan: bad access detected
[   32.926540] 
[   32.926558] Memory state around the buggy address:
[   32.927669]  fff00000c9b21680: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.928654]  fff00000c9b21700: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   32.928825] >fff00000c9b21780: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.928986]                    ^
[   32.929135]  fff00000c9b21800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.929348]  fff00000c9b21880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.929438] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   32.887476] ==================================================================
[   32.887612] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   32.887703] Read of size 4 at addr fff00000c9b21540 by task swapper/1/0
[   32.887766] 
[   32.887808] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.887901] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.887940] Hardware name: linux,dummy-virt (DT)
[   32.887971] Call trace:
[   32.887996]  show_stack+0x20/0x38 (C)
[   32.888046]  dump_stack_lvl+0x8c/0xd0
[   32.888094]  print_report+0x118/0x5e8
[   32.888137]  kasan_report+0xdc/0x128
[   32.888180]  __asan_report_load4_noabort+0x20/0x30
[   32.888227]  rcu_uaf_reclaim+0x64/0x70
[   32.888272]  rcu_core+0x9f4/0x1e58
[   32.888317]  rcu_core_si+0x18/0x30
[   32.888361]  handle_softirqs+0x374/0xb28
[   32.888407]  __do_softirq+0x1c/0x28
[   32.888449]  ____do_softirq+0x18/0x30
[   32.888502]  call_on_irq_stack+0x30/0x48
[   32.888547]  do_softirq_own_stack+0x24/0x38
[   32.888593]  __irq_exit_rcu+0x1fc/0x318
[   32.888678]  irq_exit_rcu+0x1c/0x80
[   32.888918]  el1_interrupt+0x38/0x58
[   32.889424]  el1h_64_irq_handler+0x18/0x28
[   32.889690]  el1h_64_irq+0x6c/0x70
[   32.889860]  arch_local_irq_enable+0x4/0x8 (P)
[   32.889920]  do_idle+0x384/0x4e8
[   32.890110]  cpu_startup_entry+0x64/0x80
[   32.890222]  secondary_start_kernel+0x28c/0x340
[   32.890277]  __secondary_switched+0xc0/0xc8
[   32.890331] 
[   32.890466] Allocated by task 230:
[   32.890507]  kasan_save_stack+0x3c/0x68
[   32.890551]  kasan_save_track+0x20/0x40
[   32.890587]  kasan_save_alloc_info+0x40/0x58
[   32.890624]  __kasan_kmalloc+0xd4/0xd8
[   32.890681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.890724]  rcu_uaf+0xb0/0x2d8
[   32.890758]  kunit_try_run_case+0x170/0x3f0
[   32.891209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.891269]  kthread+0x328/0x630
[   32.891305]  ret_from_fork+0x10/0x20
[   32.891341] 
[   32.891361] Freed by task 0:
[   32.891591]  kasan_save_stack+0x3c/0x68
[   32.891766]  kasan_save_track+0x20/0x40
[   32.891807]  kasan_save_free_info+0x4c/0x78
[   32.891892]  __kasan_slab_free+0x7c/0xa8
[   32.891932]  kfree+0x214/0x3c8
[   32.891968]  rcu_uaf_reclaim+0x28/0x70
[   32.892012]  rcu_core+0x9f4/0x1e58
[   32.892049]  rcu_core_si+0x18/0x30
[   32.892085]  handle_softirqs+0x374/0xb28
[   32.892271]  __do_softirq+0x1c/0x28
[   32.892446] 
[   32.892479] Last potentially related work creation:
[   32.892515]  kasan_save_stack+0x3c/0x68
[   32.892555]  kasan_record_aux_stack+0xb4/0xc8
[   32.892965]  __call_rcu_common.constprop.0+0x74/0x8c8
[   32.893070]  call_rcu+0x18/0x30
[   32.893114]  rcu_uaf+0x14c/0x2d8
[   32.893149]  kunit_try_run_case+0x170/0x3f0
[   32.893312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.893456]  kthread+0x328/0x630
[   32.893491]  ret_from_fork+0x10/0x20
[   32.893633] 
[   32.893718] The buggy address belongs to the object at fff00000c9b21540
[   32.893718]  which belongs to the cache kmalloc-32 of size 32
[   32.893838] The buggy address is located 0 bytes inside of
[   32.893838]  freed 32-byte region [fff00000c9b21540, fff00000c9b21560)
[   32.893901] 
[   32.893923] The buggy address belongs to the physical page:
[   32.893962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b21
[   32.894068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.894191] page_type: f5(slab)
[   32.894297] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.894382] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.894454] page dumped because: kasan: bad access detected
[   32.894485] 
[   32.894503] Memory state around the buggy address:
[   32.894634]  fff00000c9b21400: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.895319]  fff00000c9b21480: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   32.895370] >fff00000c9b21500: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.895470]                                            ^
[   32.895509]  fff00000c9b21580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.895861]  fff00000c9b21600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.895929] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   32.655909] ==================================================================
[   32.656189] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   32.656261] Read of size 1 at addr fff00000c9726a00 by task kunit_try_catch/228
[   32.656312] 
[   32.656626] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.657009] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.657061] Hardware name: linux,dummy-virt (DT)
[   32.657204] Call trace:
[   32.657236]  show_stack+0x20/0x38 (C)
[   32.657289]  dump_stack_lvl+0x8c/0xd0
[   32.657334]  print_report+0x118/0x5e8
[   32.657627]  kasan_report+0xdc/0x128
[   32.657690]  __asan_report_load1_noabort+0x20/0x30
[   32.657935]  ksize_uaf+0x598/0x5f8
[   32.658041]  kunit_try_run_case+0x170/0x3f0
[   32.658115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.658166]  kthread+0x328/0x630
[   32.658420]  ret_from_fork+0x10/0x20
[   32.658505] 
[   32.658692] Allocated by task 228:
[   32.658742]  kasan_save_stack+0x3c/0x68
[   32.658787]  kasan_save_track+0x20/0x40
[   32.658834]  kasan_save_alloc_info+0x40/0x58
[   32.658912]  __kasan_kmalloc+0xd4/0xd8
[   32.658959]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.659143]  ksize_uaf+0xb8/0x5f8
[   32.659364]  kunit_try_run_case+0x170/0x3f0
[   32.659460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.659600]  kthread+0x328/0x630
[   32.659679]  ret_from_fork+0x10/0x20
[   32.659826] 
[   32.659877] Freed by task 228:
[   32.659905]  kasan_save_stack+0x3c/0x68
[   32.659949]  kasan_save_track+0x20/0x40
[   32.659985]  kasan_save_free_info+0x4c/0x78
[   32.660384]  __kasan_slab_free+0x7c/0xa8
[   32.660500]  kfree+0x214/0x3c8
[   32.660571]  ksize_uaf+0x11c/0x5f8
[   32.660724]  kunit_try_run_case+0x170/0x3f0
[   32.660819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.661189]  kthread+0x328/0x630
[   32.661277]  ret_from_fork+0x10/0x20
[   32.661466] 
[   32.661569] The buggy address belongs to the object at fff00000c9726a00
[   32.661569]  which belongs to the cache kmalloc-128 of size 128
[   32.661742] The buggy address is located 0 bytes inside of
[   32.661742]  freed 128-byte region [fff00000c9726a00, fff00000c9726a80)
[   32.661812] 
[   32.661844] The buggy address belongs to the physical page:
[   32.661909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.661968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.662024] page_type: f5(slab)
[   32.662072] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.662130] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.662169] page dumped because: kasan: bad access detected
[   32.662200] 
[   32.662222] Memory state around the buggy address:
[   32.662265]  fff00000c9726900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.662309]  fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.662353] >fff00000c9726a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.662402]                    ^
[   32.662429]  fff00000c9726a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.662471]  fff00000c9726b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.662509] ==================================================================
[   32.664140] ==================================================================
[   32.664243] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   32.664372] Read of size 1 at addr fff00000c9726a78 by task kunit_try_catch/228
[   32.664424] 
[   32.664455] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.664976] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.665021] Hardware name: linux,dummy-virt (DT)
[   32.665070] Call trace:
[   32.665095]  show_stack+0x20/0x38 (C)
[   32.665232]  dump_stack_lvl+0x8c/0xd0
[   32.665284]  print_report+0x118/0x5e8
[   32.665328]  kasan_report+0xdc/0x128
[   32.665371]  __asan_report_load1_noabort+0x20/0x30
[   32.665567]  ksize_uaf+0x544/0x5f8
[   32.665612]  kunit_try_run_case+0x170/0x3f0
[   32.665673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.665726]  kthread+0x328/0x630
[   32.665965]  ret_from_fork+0x10/0x20
[   32.666112] 
[   32.666150] Allocated by task 228:
[   32.666253]  kasan_save_stack+0x3c/0x68
[   32.666297]  kasan_save_track+0x20/0x40
[   32.666331]  kasan_save_alloc_info+0x40/0x58
[   32.666368]  __kasan_kmalloc+0xd4/0xd8
[   32.666403]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.666735]  ksize_uaf+0xb8/0x5f8
[   32.666817]  kunit_try_run_case+0x170/0x3f0
[   32.667012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.667059]  kthread+0x328/0x630
[   32.667105]  ret_from_fork+0x10/0x20
[   32.667152] 
[   32.667172] Freed by task 228:
[   32.667201]  kasan_save_stack+0x3c/0x68
[   32.667236]  kasan_save_track+0x20/0x40
[   32.667272]  kasan_save_free_info+0x4c/0x78
[   32.667884]  __kasan_slab_free+0x7c/0xa8
[   32.667958]  kfree+0x214/0x3c8
[   32.668131]  ksize_uaf+0x11c/0x5f8
[   32.668215]  kunit_try_run_case+0x170/0x3f0
[   32.668709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.668856]  kthread+0x328/0x630
[   32.668934]  ret_from_fork+0x10/0x20
[   32.669171] 
[   32.669319] The buggy address belongs to the object at fff00000c9726a00
[   32.669319]  which belongs to the cache kmalloc-128 of size 128
[   32.669534] The buggy address is located 120 bytes inside of
[   32.669534]  freed 128-byte region [fff00000c9726a00, fff00000c9726a80)
[   32.669722] 
[   32.669801] The buggy address belongs to the physical page:
[   32.669956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.670050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.670324] page_type: f5(slab)
[   32.670521] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.670654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.670748] page dumped because: kasan: bad access detected
[   32.670946] 
[   32.671040] Memory state around the buggy address:
[   32.671192]  fff00000c9726900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.671264]  fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.671400] >fff00000c9726a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.671496]                                                                 ^
[   32.671567]  fff00000c9726a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.671608]  fff00000c9726b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.671845] ==================================================================
[   32.643149] ==================================================================
[   32.643271] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   32.643444] Read of size 1 at addr fff00000c9726a00 by task kunit_try_catch/228
[   32.643707] 
[   32.643877] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.644094] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.644311] Hardware name: linux,dummy-virt (DT)
[   32.644468] Call trace:
[   32.644536]  show_stack+0x20/0x38 (C)
[   32.644618]  dump_stack_lvl+0x8c/0xd0
[   32.645062]  print_report+0x118/0x5e8
[   32.645195]  kasan_report+0xdc/0x128
[   32.645294]  __kasan_check_byte+0x54/0x70
[   32.645425]  ksize+0x30/0x88
[   32.645502]  ksize_uaf+0x168/0x5f8
[   32.645587]  kunit_try_run_case+0x170/0x3f0
[   32.646111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.646456]  kthread+0x328/0x630
[   32.646532]  ret_from_fork+0x10/0x20
[   32.646581] 
[   32.646601] Allocated by task 228:
[   32.646650]  kasan_save_stack+0x3c/0x68
[   32.646698]  kasan_save_track+0x20/0x40
[   32.646735]  kasan_save_alloc_info+0x40/0x58
[   32.646772]  __kasan_kmalloc+0xd4/0xd8
[   32.646808]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.646857]  ksize_uaf+0xb8/0x5f8
[   32.646891]  kunit_try_run_case+0x170/0x3f0
[   32.646937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.647016]  kthread+0x328/0x630
[   32.647100]  ret_from_fork+0x10/0x20
[   32.647169] 
[   32.647230] Freed by task 228:
[   32.647282]  kasan_save_stack+0x3c/0x68
[   32.647338]  kasan_save_track+0x20/0x40
[   32.647405]  kasan_save_free_info+0x4c/0x78
[   32.647471]  __kasan_slab_free+0x7c/0xa8
[   32.647678]  kfree+0x214/0x3c8
[   32.647940]  ksize_uaf+0x11c/0x5f8
[   32.648265]  kunit_try_run_case+0x170/0x3f0
[   32.648330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.648628]  kthread+0x328/0x630
[   32.648939]  ret_from_fork+0x10/0x20
[   32.649017] 
[   32.649061] The buggy address belongs to the object at fff00000c9726a00
[   32.649061]  which belongs to the cache kmalloc-128 of size 128
[   32.649147] The buggy address is located 0 bytes inside of
[   32.649147]  freed 128-byte region [fff00000c9726a00, fff00000c9726a80)
[   32.649284] 
[   32.649364] The buggy address belongs to the physical page:
[   32.649514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.649588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.649925] page_type: f5(slab)
[   32.650118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.650176] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.650432] page dumped because: kasan: bad access detected
[   32.650582] 
[   32.650648] Memory state around the buggy address:
[   32.650791]  fff00000c9726900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.651019]  fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.651405] >fff00000c9726a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.651632]                    ^
[   32.651856]  fff00000c9726a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.651971]  fff00000c9726b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.652117] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   32.606008] ==================================================================
[   32.606096] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   32.606192] Read of size 1 at addr fff00000c9726973 by task kunit_try_catch/226
[   32.606265] 
[   32.606297] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.606445] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.606489] Hardware name: linux,dummy-virt (DT)
[   32.606520] Call trace:
[   32.606543]  show_stack+0x20/0x38 (C)
[   32.606593]  dump_stack_lvl+0x8c/0xd0
[   32.606659]  print_report+0x118/0x5e8
[   32.606705]  kasan_report+0xdc/0x128
[   32.606755]  __asan_report_load1_noabort+0x20/0x30
[   32.606804]  ksize_unpoisons_memory+0x628/0x740
[   32.606860]  kunit_try_run_case+0x170/0x3f0
[   32.606906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.607494]  kthread+0x328/0x630
[   32.607559]  ret_from_fork+0x10/0x20
[   32.607609] 
[   32.607831] Allocated by task 226:
[   32.607987]  kasan_save_stack+0x3c/0x68
[   32.608208]  kasan_save_track+0x20/0x40
[   32.608295]  kasan_save_alloc_info+0x40/0x58
[   32.608469]  __kasan_kmalloc+0xd4/0xd8
[   32.608621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.608718]  ksize_unpoisons_memory+0xc0/0x740
[   32.608766]  kunit_try_run_case+0x170/0x3f0
[   32.609107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.609367]  kthread+0x328/0x630
[   32.609617]  ret_from_fork+0x10/0x20
[   32.609770] 
[   32.610082] The buggy address belongs to the object at fff00000c9726900
[   32.610082]  which belongs to the cache kmalloc-128 of size 128
[   32.610183] The buggy address is located 0 bytes to the right of
[   32.610183]  allocated 115-byte region [fff00000c9726900, fff00000c9726973)
[   32.610486] 
[   32.610633] The buggy address belongs to the physical page:
[   32.610896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.611019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.611161] page_type: f5(slab)
[   32.611230] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.611279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.611663] page dumped because: kasan: bad access detected
[   32.611796] 
[   32.611857] Memory state around the buggy address:
[   32.611957]  fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.612090]  fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.612168] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.612302]                                                              ^
[   32.612345]  fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.612439]  fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.612527] ==================================================================
[   32.618122] ==================================================================
[   32.618457] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   32.618527] Read of size 1 at addr fff00000c9726978 by task kunit_try_catch/226
[   32.618585] 
[   32.618891] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.619216] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.619511] Hardware name: linux,dummy-virt (DT)
[   32.619847] Call trace:
[   32.620114]  show_stack+0x20/0x38 (C)
[   32.620343]  dump_stack_lvl+0x8c/0xd0
[   32.620465]  print_report+0x118/0x5e8
[   32.620592]  kasan_report+0xdc/0x128
[   32.620770]  __asan_report_load1_noabort+0x20/0x30
[   32.620908]  ksize_unpoisons_memory+0x618/0x740
[   32.621047]  kunit_try_run_case+0x170/0x3f0
[   32.621123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.621196]  kthread+0x328/0x630
[   32.621479]  ret_from_fork+0x10/0x20
[   32.621850] 
[   32.621876] Allocated by task 226:
[   32.621915]  kasan_save_stack+0x3c/0x68
[   32.622161]  kasan_save_track+0x20/0x40
[   32.622324]  kasan_save_alloc_info+0x40/0x58
[   32.622417]  __kasan_kmalloc+0xd4/0xd8
[   32.622453]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.622497]  ksize_unpoisons_memory+0xc0/0x740
[   32.622539]  kunit_try_run_case+0x170/0x3f0
[   32.622583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.622633]  kthread+0x328/0x630
[   32.622678]  ret_from_fork+0x10/0x20
[   32.622715] 
[   32.622742] The buggy address belongs to the object at fff00000c9726900
[   32.622742]  which belongs to the cache kmalloc-128 of size 128
[   32.622812] The buggy address is located 5 bytes to the right of
[   32.622812]  allocated 115-byte region [fff00000c9726900, fff00000c9726973)
[   32.622875] 
[   32.622905] The buggy address belongs to the physical page:
[   32.623568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.623631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.623691] page_type: f5(slab)
[   32.623731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.623971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.624195] page dumped because: kasan: bad access detected
[   32.624632] 
[   32.624719] Memory state around the buggy address:
[   32.624806]  fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.624871]  fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.625358] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.625484]                                                                 ^
[   32.625634]  fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.625881]  fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.625986] ==================================================================
[   32.628291] ==================================================================
[   32.628544] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   32.628652] Read of size 1 at addr fff00000c972697f by task kunit_try_catch/226
[   32.629060] 
[   32.629112] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.629202] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.629289] Hardware name: linux,dummy-virt (DT)
[   32.629324] Call trace:
[   32.629345]  show_stack+0x20/0x38 (C)
[   32.629424]  dump_stack_lvl+0x8c/0xd0
[   32.629651]  print_report+0x118/0x5e8
[   32.629704]  kasan_report+0xdc/0x128
[   32.629869]  __asan_report_load1_noabort+0x20/0x30
[   32.629930]  ksize_unpoisons_memory+0x690/0x740
[   32.630110]  kunit_try_run_case+0x170/0x3f0
[   32.630174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.630237]  kthread+0x328/0x630
[   32.630414]  ret_from_fork+0x10/0x20
[   32.630659] 
[   32.630775] Allocated by task 226:
[   32.630841]  kasan_save_stack+0x3c/0x68
[   32.630904]  kasan_save_track+0x20/0x40
[   32.631023]  kasan_save_alloc_info+0x40/0x58
[   32.631175]  __kasan_kmalloc+0xd4/0xd8
[   32.631215]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.631278]  ksize_unpoisons_memory+0xc0/0x740
[   32.631553]  kunit_try_run_case+0x170/0x3f0
[   32.631615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.631757]  kthread+0x328/0x630
[   32.631854]  ret_from_fork+0x10/0x20
[   32.631976] 
[   32.632040] The buggy address belongs to the object at fff00000c9726900
[   32.632040]  which belongs to the cache kmalloc-128 of size 128
[   32.632247] The buggy address is located 12 bytes to the right of
[   32.632247]  allocated 115-byte region [fff00000c9726900, fff00000c9726973)
[   32.632528] 
[   32.632555] The buggy address belongs to the physical page:
[   32.632589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.632675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.632724] page_type: f5(slab)
[   32.632768] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.632819] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.632880] page dumped because: kasan: bad access detected
[   32.632923] 
[   32.632950] Memory state around the buggy address:
[   32.632984]  fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.633037]  fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.633101] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.633137]                                                                 ^
[   32.633185]  fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.633227]  fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.633275] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   32.585786] ==================================================================
[   32.585858] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   32.585920] Free of addr fff00000c85ecee0 by task kunit_try_catch/224
[   32.585964] 
[   32.585997] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.586084] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.586133] Hardware name: linux,dummy-virt (DT)
[   32.586165] Call trace:
[   32.586188]  show_stack+0x20/0x38 (C)
[   32.586237]  dump_stack_lvl+0x8c/0xd0
[   32.586281]  print_report+0x118/0x5e8
[   32.586326]  kasan_report_invalid_free+0xc0/0xe8
[   32.586373]  check_slab_allocation+0xd4/0x108
[   32.586419]  __kasan_slab_pre_free+0x2c/0x48
[   32.586470]  kfree+0xe8/0x3c8
[   32.586513]  kfree_sensitive+0x3c/0xb0
[   32.586559]  kmalloc_double_kzfree+0x168/0x308
[   32.586607]  kunit_try_run_case+0x170/0x3f0
[   32.586665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.586717]  kthread+0x328/0x630
[   32.586758]  ret_from_fork+0x10/0x20
[   32.586806] 
[   32.586824] Allocated by task 224:
[   32.586851]  kasan_save_stack+0x3c/0x68
[   32.586889]  kasan_save_track+0x20/0x40
[   32.586923]  kasan_save_alloc_info+0x40/0x58
[   32.588311]  __kasan_kmalloc+0xd4/0xd8
[   32.588504]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.589001]  kmalloc_double_kzfree+0xb8/0x308
[   32.589100]  kunit_try_run_case+0x170/0x3f0
[   32.589276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.589671]  kthread+0x328/0x630
[   32.590176]  ret_from_fork+0x10/0x20
[   32.590295] 
[   32.590368] Freed by task 224:
[   32.590398]  kasan_save_stack+0x3c/0x68
[   32.590601]  kasan_save_track+0x20/0x40
[   32.590946]  kasan_save_free_info+0x4c/0x78
[   32.591068]  __kasan_slab_free+0x7c/0xa8
[   32.591305]  kfree+0x214/0x3c8
[   32.591449]  kfree_sensitive+0x80/0xb0
[   32.591567]  kmalloc_double_kzfree+0x11c/0x308
[   32.591711]  kunit_try_run_case+0x170/0x3f0
[   32.591870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.591955]  kthread+0x328/0x630
[   32.591996]  ret_from_fork+0x10/0x20
[   32.592159] 
[   32.592371] The buggy address belongs to the object at fff00000c85ecee0
[   32.592371]  which belongs to the cache kmalloc-16 of size 16
[   32.592590] The buggy address is located 0 bytes inside of
[   32.592590]  16-byte region [fff00000c85ecee0, fff00000c85ecef0)
[   32.592724] 
[   32.592746] The buggy address belongs to the physical page:
[   32.593118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec
[   32.593236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.593303] page_type: f5(slab)
[   32.593339] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.594072] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.594491] page dumped because: kasan: bad access detected
[   32.594650] 
[   32.594674] Memory state around the buggy address:
[   32.594760]  fff00000c85ecd80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.595255]  fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.595528] >fff00000c85ece80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.595615]                                                        ^
[   32.595724]  fff00000c85ecf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.595987]  fff00000c85ecf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.596151] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   32.574443] ==================================================================
[   32.574960] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   32.575125] Read of size 1 at addr fff00000c85ecee0 by task kunit_try_catch/224
[   32.575238] 
[   32.575372] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.575474] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.575820] Hardware name: linux,dummy-virt (DT)
[   32.575889] Call trace:
[   32.576006]  show_stack+0x20/0x38 (C)
[   32.576111]  dump_stack_lvl+0x8c/0xd0
[   32.576215]  print_report+0x118/0x5e8
[   32.576311]  kasan_report+0xdc/0x128
[   32.576404]  __kasan_check_byte+0x54/0x70
[   32.576724]  kfree_sensitive+0x30/0xb0
[   32.576802]  kmalloc_double_kzfree+0x168/0x308
[   32.577116]  kunit_try_run_case+0x170/0x3f0
[   32.577242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.577366]  kthread+0x328/0x630
[   32.577429]  ret_from_fork+0x10/0x20
[   32.577660] 
[   32.577736] Allocated by task 224:
[   32.577937]  kasan_save_stack+0x3c/0x68
[   32.578051]  kasan_save_track+0x20/0x40
[   32.578147]  kasan_save_alloc_info+0x40/0x58
[   32.578246]  __kasan_kmalloc+0xd4/0xd8
[   32.578358]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.578438]  kmalloc_double_kzfree+0xb8/0x308
[   32.578736]  kunit_try_run_case+0x170/0x3f0
[   32.578908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.578985]  kthread+0x328/0x630
[   32.579155]  ret_from_fork+0x10/0x20
[   32.579234] 
[   32.579429] Freed by task 224:
[   32.579723]  kasan_save_stack+0x3c/0x68
[   32.579844]  kasan_save_track+0x20/0x40
[   32.579924]  kasan_save_free_info+0x4c/0x78
[   32.580014]  __kasan_slab_free+0x7c/0xa8
[   32.580223]  kfree+0x214/0x3c8
[   32.580367]  kfree_sensitive+0x80/0xb0
[   32.580424]  kmalloc_double_kzfree+0x11c/0x308
[   32.580464]  kunit_try_run_case+0x170/0x3f0
[   32.580918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.581023]  kthread+0x328/0x630
[   32.581121]  ret_from_fork+0x10/0x20
[   32.581389] 
[   32.581662] The buggy address belongs to the object at fff00000c85ecee0
[   32.581662]  which belongs to the cache kmalloc-16 of size 16
[   32.581778] The buggy address is located 0 bytes inside of
[   32.581778]  freed 16-byte region [fff00000c85ecee0, fff00000c85ecef0)
[   32.581960] 
[   32.581986] The buggy address belongs to the physical page:
[   32.582349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec
[   32.582701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.582798] page_type: f5(slab)
[   32.583334] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.583482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.583662] page dumped because: kasan: bad access detected
[   32.583720] 
[   32.583794] Memory state around the buggy address:
[   32.583866]  fff00000c85ecd80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.584104]  fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.584318] >fff00000c85ece80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.584487]                                                        ^
[   32.584573]  fff00000c85ecf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.584722]  fff00000c85ecf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.584874] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   32.541122] ==================================================================
[   32.541513] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   32.541710] Read of size 1 at addr fff00000c9b220a8 by task kunit_try_catch/220
[   32.541769] 
[   32.541922] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.542192] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.542237] Hardware name: linux,dummy-virt (DT)
[   32.542306] Call trace:
[   32.542500]  show_stack+0x20/0x38 (C)
[   32.542663]  dump_stack_lvl+0x8c/0xd0
[   32.542725]  print_report+0x118/0x5e8
[   32.542997]  kasan_report+0xdc/0x128
[   32.543162]  __asan_report_load1_noabort+0x20/0x30
[   32.543218]  kmalloc_uaf2+0x3f4/0x468
[   32.543539]  kunit_try_run_case+0x170/0x3f0
[   32.543744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.543948]  kthread+0x328/0x630
[   32.544044]  ret_from_fork+0x10/0x20
[   32.544180] 
[   32.544200] Allocated by task 220:
[   32.544248]  kasan_save_stack+0x3c/0x68
[   32.544333]  kasan_save_track+0x20/0x40
[   32.544573]  kasan_save_alloc_info+0x40/0x58
[   32.544763]  __kasan_kmalloc+0xd4/0xd8
[   32.544905]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.545049]  kmalloc_uaf2+0xc4/0x468
[   32.545091]  kunit_try_run_case+0x170/0x3f0
[   32.545431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.545588]  kthread+0x328/0x630
[   32.545726]  ret_from_fork+0x10/0x20
[   32.545834] 
[   32.545963] Freed by task 220:
[   32.546101]  kasan_save_stack+0x3c/0x68
[   32.546452]  kasan_save_track+0x20/0x40
[   32.546552]  kasan_save_free_info+0x4c/0x78
[   32.546727]  __kasan_slab_free+0x7c/0xa8
[   32.546805]  kfree+0x214/0x3c8
[   32.546859]  kmalloc_uaf2+0x134/0x468
[   32.547253]  kunit_try_run_case+0x170/0x3f0
[   32.547406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.547556]  kthread+0x328/0x630
[   32.547761]  ret_from_fork+0x10/0x20
[   32.547806] 
[   32.547826] The buggy address belongs to the object at fff00000c9b22080
[   32.547826]  which belongs to the cache kmalloc-64 of size 64
[   32.548042] The buggy address is located 40 bytes inside of
[   32.548042]  freed 64-byte region [fff00000c9b22080, fff00000c9b220c0)
[   32.548304] 
[   32.548398] The buggy address belongs to the physical page:
[   32.548518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b22
[   32.548677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.548743] page_type: f5(slab)
[   32.549094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.549310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.549404] page dumped because: kasan: bad access detected
[   32.549586] 
[   32.549632] Memory state around the buggy address:
[   32.549951]  fff00000c9b21f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.550114]  fff00000c9b22000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.550549] >fff00000c9b22080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.550877]                                   ^
[   32.551546]  fff00000c9b22100: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   32.552130]  fff00000c9b22180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.552201] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   32.521626] ==================================================================
[   32.521703] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   32.521765] Write of size 33 at addr fff00000c9b0bf00 by task kunit_try_catch/218
[   32.521816] 
[   32.521848] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.521935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.521965] Hardware name: linux,dummy-virt (DT)
[   32.522287] Call trace:
[   32.522329]  show_stack+0x20/0x38 (C)
[   32.522384]  dump_stack_lvl+0x8c/0xd0
[   32.522462]  print_report+0x118/0x5e8
[   32.522507]  kasan_report+0xdc/0x128
[   32.522561]  kasan_check_range+0x100/0x1a8
[   32.522613]  __asan_memset+0x34/0x78
[   32.523742]  kmalloc_uaf_memset+0x170/0x310
[   32.524068]  kunit_try_run_case+0x170/0x3f0
[   32.524214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.524336]  kthread+0x328/0x630
[   32.524739]  ret_from_fork+0x10/0x20
[   32.525090] 
[   32.525170] Allocated by task 218:
[   32.525233]  kasan_save_stack+0x3c/0x68
[   32.525342]  kasan_save_track+0x20/0x40
[   32.525711]  kasan_save_alloc_info+0x40/0x58
[   32.526049]  __kasan_kmalloc+0xd4/0xd8
[   32.526208]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.526434]  kmalloc_uaf_memset+0xb8/0x310
[   32.526725]  kunit_try_run_case+0x170/0x3f0
[   32.526957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.527197]  kthread+0x328/0x630
[   32.527373]  ret_from_fork+0x10/0x20
[   32.527467] 
[   32.527494] Freed by task 218:
[   32.527521]  kasan_save_stack+0x3c/0x68
[   32.527558]  kasan_save_track+0x20/0x40
[   32.528132]  kasan_save_free_info+0x4c/0x78
[   32.528382]  __kasan_slab_free+0x7c/0xa8
[   32.528535]  kfree+0x214/0x3c8
[   32.528669]  kmalloc_uaf_memset+0x11c/0x310
[   32.528712]  kunit_try_run_case+0x170/0x3f0
[   32.528806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.529010]  kthread+0x328/0x630
[   32.529241]  ret_from_fork+0x10/0x20
[   32.529356] 
[   32.529378] The buggy address belongs to the object at fff00000c9b0bf00
[   32.529378]  which belongs to the cache kmalloc-64 of size 64
[   32.530140] The buggy address is located 0 bytes inside of
[   32.530140]  freed 64-byte region [fff00000c9b0bf00, fff00000c9b0bf40)
[   32.530224] 
[   32.530306] The buggy address belongs to the physical page:
[   32.530457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b0b
[   32.530959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.531090] page_type: f5(slab)
[   32.531310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.531541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.531909] page dumped because: kasan: bad access detected
[   32.532018] 
[   32.532094] Memory state around the buggy address:
[   32.532396]  fff00000c9b0be00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.532501]  fff00000c9b0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.532549] >fff00000c9b0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.532659]                    ^
[   32.532722]  fff00000c9b0bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.532774]  fff00000c9b0c000: 00 00 00 fc fc fc fc fc 00 00 00 02 fc fc fc fc
[   32.532816] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   32.500466] ==================================================================
[   32.500527] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   32.500582] Read of size 1 at addr fff00000c85ecec8 by task kunit_try_catch/216
[   32.500632] 
[   32.500685] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.500774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.500806] Hardware name: linux,dummy-virt (DT)
[   32.500847] Call trace:
[   32.500870]  show_stack+0x20/0x38 (C)
[   32.500916]  dump_stack_lvl+0x8c/0xd0
[   32.500962]  print_report+0x118/0x5e8
[   32.501023]  kasan_report+0xdc/0x128
[   32.501067]  __asan_report_load1_noabort+0x20/0x30
[   32.501124]  kmalloc_uaf+0x300/0x338
[   32.501169]  kunit_try_run_case+0x170/0x3f0
[   32.501216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.501275]  kthread+0x328/0x630
[   32.501316]  ret_from_fork+0x10/0x20
[   32.501363] 
[   32.501382] Allocated by task 216:
[   32.501409]  kasan_save_stack+0x3c/0x68
[   32.501457]  kasan_save_track+0x20/0x40
[   32.501500]  kasan_save_alloc_info+0x40/0x58
[   32.501544]  __kasan_kmalloc+0xd4/0xd8
[   32.501579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.501620]  kmalloc_uaf+0xb8/0x338
[   32.501690]  kunit_try_run_case+0x170/0x3f0
[   32.501730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.501773]  kthread+0x328/0x630
[   32.502073]  ret_from_fork+0x10/0x20
[   32.502133] 
[   32.502801] Freed by task 216:
[   32.502853]  kasan_save_stack+0x3c/0x68
[   32.502905]  kasan_save_track+0x20/0x40
[   32.502961]  kasan_save_free_info+0x4c/0x78
[   32.503204]  __kasan_slab_free+0x7c/0xa8
[   32.503535]  kfree+0x214/0x3c8
[   32.503661]  kmalloc_uaf+0x11c/0x338
[   32.503700]  kunit_try_run_case+0x170/0x3f0
[   32.503738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.504081]  kthread+0x328/0x630
[   32.504214]  ret_from_fork+0x10/0x20
[   32.504296] 
[   32.504347] The buggy address belongs to the object at fff00000c85ecec0
[   32.504347]  which belongs to the cache kmalloc-16 of size 16
[   32.504504] The buggy address is located 8 bytes inside of
[   32.504504]  freed 16-byte region [fff00000c85ecec0, fff00000c85eced0)
[   32.504743] 
[   32.504767] The buggy address belongs to the physical page:
[   32.504802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec
[   32.504882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.505302] page_type: f5(slab)
[   32.505359] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.505492] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.505725] page dumped because: kasan: bad access detected
[   32.505944] 
[   32.506263] Memory state around the buggy address:
[   32.506725]  fff00000c85ecd80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.506866]  fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.507091] >fff00000c85ece80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   32.507184]                                               ^
[   32.507372]  fff00000c85ecf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.507422]  fff00000c85ecf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.507523] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   32.481307] ==================================================================
[   32.481370] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   32.481426] Read of size 64 at addr fff00000c9b0bc04 by task kunit_try_catch/214
[   32.481509] 
[   32.481554] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.481652] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.482709] Hardware name: linux,dummy-virt (DT)
[   32.482760] Call trace:
[   32.482909]  show_stack+0x20/0x38 (C)
[   32.482965]  dump_stack_lvl+0x8c/0xd0
[   32.483272]  print_report+0x118/0x5e8
[   32.483328]  kasan_report+0xdc/0x128
[   32.483632]  kasan_check_range+0x100/0x1a8
[   32.483852]  __asan_memmove+0x3c/0x98
[   32.484208]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   32.484309]  kunit_try_run_case+0x170/0x3f0
[   32.484461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.484519]  kthread+0x328/0x630
[   32.484740]  ret_from_fork+0x10/0x20
[   32.485011] 
[   32.485056] Allocated by task 214:
[   32.485109]  kasan_save_stack+0x3c/0x68
[   32.485212]  kasan_save_track+0x20/0x40
[   32.485431]  kasan_save_alloc_info+0x40/0x58
[   32.485936]  __kasan_kmalloc+0xd4/0xd8
[   32.486037]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.486390]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   32.486727]  kunit_try_run_case+0x170/0x3f0
[   32.486792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.487219]  kthread+0x328/0x630
[   32.487317]  ret_from_fork+0x10/0x20
[   32.487367] 
[   32.487520] The buggy address belongs to the object at fff00000c9b0bc00
[   32.487520]  which belongs to the cache kmalloc-64 of size 64
[   32.487752] The buggy address is located 4 bytes inside of
[   32.487752]  allocated 64-byte region [fff00000c9b0bc00, fff00000c9b0bc40)
[   32.487927] 
[   32.487952] The buggy address belongs to the physical page:
[   32.488191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b0b
[   32.488774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.488892] page_type: f5(slab)
[   32.489042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.489303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.489504] page dumped because: kasan: bad access detected
[   32.489550] 
[   32.489569] Memory state around the buggy address:
[   32.489830]  fff00000c9b0bb00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.490071]  fff00000c9b0bb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.490167] >fff00000c9b0bc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.490242]                                            ^
[   32.490449]  fff00000c9b0bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.490714]  fff00000c9b0bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.490961] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   32.464400] ==================================================================
[   32.464476] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   32.464537] Read of size 18446744073709551614 at addr fff00000c9b0ba04 by task kunit_try_catch/212
[   32.464619] 
[   32.464690] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.464782] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.464824] Hardware name: linux,dummy-virt (DT)
[   32.464855] Call trace:
[   32.464878]  show_stack+0x20/0x38 (C)
[   32.464936]  dump_stack_lvl+0x8c/0xd0
[   32.464982]  print_report+0x118/0x5e8
[   32.465036]  kasan_report+0xdc/0x128
[   32.465079]  kasan_check_range+0x100/0x1a8
[   32.465124]  __asan_memmove+0x3c/0x98
[   32.465172]  kmalloc_memmove_negative_size+0x154/0x2e0
[   32.465232]  kunit_try_run_case+0x170/0x3f0
[   32.465279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.465339]  kthread+0x328/0x630
[   32.465383]  ret_from_fork+0x10/0x20
[   32.465437] 
[   32.465457] Allocated by task 212:
[   32.465494]  kasan_save_stack+0x3c/0x68
[   32.465544]  kasan_save_track+0x20/0x40
[   32.465584]  kasan_save_alloc_info+0x40/0x58
[   32.465623]  __kasan_kmalloc+0xd4/0xd8
[   32.466046]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.466581]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   32.466674]  kunit_try_run_case+0x170/0x3f0
[   32.466763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.466809]  kthread+0x328/0x630
[   32.466899]  ret_from_fork+0x10/0x20
[   32.466988] 
[   32.467020] The buggy address belongs to the object at fff00000c9b0ba00
[   32.467020]  which belongs to the cache kmalloc-64 of size 64
[   32.467266] The buggy address is located 4 bytes inside of
[   32.467266]  64-byte region [fff00000c9b0ba00, fff00000c9b0ba40)
[   32.467546] 
[   32.467602] The buggy address belongs to the physical page:
[   32.467767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b0b
[   32.467874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.468074] page_type: f5(slab)
[   32.468149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.468671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.468753] page dumped because: kasan: bad access detected
[   32.468816] 
[   32.469079] Memory state around the buggy address:
[   32.469131]  fff00000c9b0b900: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   32.469383]  fff00000c9b0b980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.469590] >fff00000c9b0ba00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.470127]                    ^
[   32.470224]  fff00000c9b0ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.470409]  fff00000c9b0bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.470483] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   32.441684] ==================================================================
[   32.441752] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   32.441891] Write of size 16 at addr fff00000c9726869 by task kunit_try_catch/210
[   32.441939] 
[   32.442213] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.442446] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.442490] Hardware name: linux,dummy-virt (DT)
[   32.442520] Call trace:
[   32.442542]  show_stack+0x20/0x38 (C)
[   32.442786]  dump_stack_lvl+0x8c/0xd0
[   32.442972]  print_report+0x118/0x5e8
[   32.443069]  kasan_report+0xdc/0x128
[   32.443146]  kasan_check_range+0x100/0x1a8
[   32.443193]  __asan_memset+0x34/0x78
[   32.443236]  kmalloc_oob_memset_16+0x150/0x2f8
[   32.443282]  kunit_try_run_case+0x170/0x3f0
[   32.443327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.443383]  kthread+0x328/0x630
[   32.443686]  ret_from_fork+0x10/0x20
[   32.444087] 
[   32.444153] Allocated by task 210:
[   32.444223]  kasan_save_stack+0x3c/0x68
[   32.444314]  kasan_save_track+0x20/0x40
[   32.444545]  kasan_save_alloc_info+0x40/0x58
[   32.444704]  __kasan_kmalloc+0xd4/0xd8
[   32.444896]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.445060]  kmalloc_oob_memset_16+0xb0/0x2f8
[   32.445194]  kunit_try_run_case+0x170/0x3f0
[   32.445619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.445860]  kthread+0x328/0x630
[   32.445975]  ret_from_fork+0x10/0x20
[   32.446215] 
[   32.446281] The buggy address belongs to the object at fff00000c9726800
[   32.446281]  which belongs to the cache kmalloc-128 of size 128
[   32.446573] The buggy address is located 105 bytes inside of
[   32.446573]  allocated 120-byte region [fff00000c9726800, fff00000c9726878)
[   32.446776] 
[   32.446846] The buggy address belongs to the physical page:
[   32.447074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.447399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.447456] page_type: f5(slab)
[   32.447497] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.447555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.447595] page dumped because: kasan: bad access detected
[   32.447627] 
[   32.447656] Memory state around the buggy address:
[   32.447689]  fff00000c9726700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.448100]  fff00000c9726780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.448226] >fff00000c9726800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.448268]                                                                 ^
[   32.448458]  fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.448655]  fff00000c9726900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.448765] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   32.422465] ==================================================================
[   32.422989] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   32.423197] Write of size 8 at addr fff00000c9726771 by task kunit_try_catch/208
[   32.423428] 
[   32.423553] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.423729] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.423864] Hardware name: linux,dummy-virt (DT)
[   32.423923] Call trace:
[   32.424153]  show_stack+0x20/0x38 (C)
[   32.424334]  dump_stack_lvl+0x8c/0xd0
[   32.424523]  print_report+0x118/0x5e8
[   32.424798]  kasan_report+0xdc/0x128
[   32.424878]  kasan_check_range+0x100/0x1a8
[   32.425086]  __asan_memset+0x34/0x78
[   32.425221]  kmalloc_oob_memset_8+0x150/0x2f8
[   32.425460]  kunit_try_run_case+0x170/0x3f0
[   32.425716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.425804]  kthread+0x328/0x630
[   32.426016]  ret_from_fork+0x10/0x20
[   32.426177] 
[   32.426257] Allocated by task 208:
[   32.426294]  kasan_save_stack+0x3c/0x68
[   32.426352]  kasan_save_track+0x20/0x40
[   32.426660]  kasan_save_alloc_info+0x40/0x58
[   32.426881]  __kasan_kmalloc+0xd4/0xd8
[   32.426951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.427066]  kmalloc_oob_memset_8+0xb0/0x2f8
[   32.427209]  kunit_try_run_case+0x170/0x3f0
[   32.427358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.427403]  kthread+0x328/0x630
[   32.427445]  ret_from_fork+0x10/0x20
[   32.427481] 
[   32.427552] The buggy address belongs to the object at fff00000c9726700
[   32.427552]  which belongs to the cache kmalloc-128 of size 128
[   32.427796] The buggy address is located 113 bytes inside of
[   32.427796]  allocated 120-byte region [fff00000c9726700, fff00000c9726778)
[   32.428057] 
[   32.428200] The buggy address belongs to the physical page:
[   32.428311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.428474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.428578] page_type: f5(slab)
[   32.428960] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.429092] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.429250] page dumped because: kasan: bad access detected
[   32.429362] 
[   32.429432] Memory state around the buggy address:
[   32.429772]  fff00000c9726600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.429992]  fff00000c9726680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.430079] >fff00000c9726700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.430160]                                                                 ^
[   32.430569]  fff00000c9726780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.430742]  fff00000c9726800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.430946] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   32.404292] ==================================================================
[   32.404399] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   32.404486] Write of size 4 at addr fff00000c9726675 by task kunit_try_catch/206
[   32.404538] 
[   32.404607] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.404774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.404844] Hardware name: linux,dummy-virt (DT)
[   32.404876] Call trace:
[   32.404898]  show_stack+0x20/0x38 (C)
[   32.405122]  dump_stack_lvl+0x8c/0xd0
[   32.405344]  print_report+0x118/0x5e8
[   32.405459]  kasan_report+0xdc/0x128
[   32.405520]  kasan_check_range+0x100/0x1a8
[   32.405671]  __asan_memset+0x34/0x78
[   32.405920]  kmalloc_oob_memset_4+0x150/0x300
[   32.406081]  kunit_try_run_case+0x170/0x3f0
[   32.406372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.406450]  kthread+0x328/0x630
[   32.406492]  ret_from_fork+0x10/0x20
[   32.406538] 
[   32.406938] Allocated by task 206:
[   32.407178]  kasan_save_stack+0x3c/0x68
[   32.407334]  kasan_save_track+0x20/0x40
[   32.407370]  kasan_save_alloc_info+0x40/0x58
[   32.407408]  __kasan_kmalloc+0xd4/0xd8
[   32.407698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.407909]  kmalloc_oob_memset_4+0xb0/0x300
[   32.407994]  kunit_try_run_case+0x170/0x3f0
[   32.408243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.408599]  kthread+0x328/0x630
[   32.408784]  ret_from_fork+0x10/0x20
[   32.408891] 
[   32.408995] The buggy address belongs to the object at fff00000c9726600
[   32.408995]  which belongs to the cache kmalloc-128 of size 128
[   32.409053] The buggy address is located 117 bytes inside of
[   32.409053]  allocated 120-byte region [fff00000c9726600, fff00000c9726678)
[   32.409177] 
[   32.409245] The buggy address belongs to the physical page:
[   32.409472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.409532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.409725] page_type: f5(slab)
[   32.409776] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.409824] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.409862] page dumped because: kasan: bad access detected
[   32.409894] 
[   32.409923] Memory state around the buggy address:
[   32.409979]  fff00000c9726500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.410022]  fff00000c9726580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.410063] >fff00000c9726600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.410099]                                                                 ^
[   32.410154]  fff00000c9726680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.410195]  fff00000c9726700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.410241] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   32.392500] ==================================================================
[   32.392726] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   32.392788] Write of size 2 at addr fff00000c9726577 by task kunit_try_catch/204
[   32.392861] 
[   32.392908] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.392994] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.393023] Hardware name: linux,dummy-virt (DT)
[   32.393080] Call trace:
[   32.393126]  show_stack+0x20/0x38 (C)
[   32.393213]  dump_stack_lvl+0x8c/0xd0
[   32.393278]  print_report+0x118/0x5e8
[   32.393321]  kasan_report+0xdc/0x128
[   32.393362]  kasan_check_range+0x100/0x1a8
[   32.393411]  __asan_memset+0x34/0x78
[   32.393471]  kmalloc_oob_memset_2+0x150/0x2f8
[   32.393518]  kunit_try_run_case+0x170/0x3f0
[   32.393581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.393632]  kthread+0x328/0x630
[   32.393831]  ret_from_fork+0x10/0x20
[   32.393950] 
[   32.394127] Allocated by task 204:
[   32.394182]  kasan_save_stack+0x3c/0x68
[   32.394260]  kasan_save_track+0x20/0x40
[   32.394297]  kasan_save_alloc_info+0x40/0x58
[   32.394360]  __kasan_kmalloc+0xd4/0xd8
[   32.394431]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.394488]  kmalloc_oob_memset_2+0xb0/0x2f8
[   32.394544]  kunit_try_run_case+0x170/0x3f0
[   32.394596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.394649]  kthread+0x328/0x630
[   32.394842]  ret_from_fork+0x10/0x20
[   32.395003] 
[   32.395047] The buggy address belongs to the object at fff00000c9726500
[   32.395047]  which belongs to the cache kmalloc-128 of size 128
[   32.395185] The buggy address is located 119 bytes inside of
[   32.395185]  allocated 120-byte region [fff00000c9726500, fff00000c9726578)
[   32.395338] 
[   32.395359] The buggy address belongs to the physical page:
[   32.395430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.395607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.395771] page_type: f5(slab)
[   32.395873] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.395941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.395979] page dumped because: kasan: bad access detected
[   32.396008] 
[   32.396026] Memory state around the buggy address:
[   32.396093]  fff00000c9726400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.396234]  fff00000c9726480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.396279] >fff00000c9726500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.396419]                                                                 ^
[   32.396526]  fff00000c9726580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.396742]  fff00000c9726600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.396845] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   32.382463] ==================================================================
[   32.382520] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   32.382571] Write of size 128 at addr fff00000c9726400 by task kunit_try_catch/202
[   32.382633] 
[   32.382679] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.382765] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.382794] Hardware name: linux,dummy-virt (DT)
[   32.382833] Call trace:
[   32.382856]  show_stack+0x20/0x38 (C)
[   32.382901]  dump_stack_lvl+0x8c/0xd0
[   32.382946]  print_report+0x118/0x5e8
[   32.382988]  kasan_report+0xdc/0x128
[   32.383030]  kasan_check_range+0x100/0x1a8
[   32.383109]  __asan_memset+0x34/0x78
[   32.383153]  kmalloc_oob_in_memset+0x144/0x2d0
[   32.383535]  kunit_try_run_case+0x170/0x3f0
[   32.383718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.383813]  kthread+0x328/0x630
[   32.383910]  ret_from_fork+0x10/0x20
[   32.384051] 
[   32.384089] Allocated by task 202:
[   32.384117]  kasan_save_stack+0x3c/0x68
[   32.384155]  kasan_save_track+0x20/0x40
[   32.384190]  kasan_save_alloc_info+0x40/0x58
[   32.384364]  __kasan_kmalloc+0xd4/0xd8
[   32.384470]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.384579]  kmalloc_oob_in_memset+0xb0/0x2d0
[   32.384733]  kunit_try_run_case+0x170/0x3f0
[   32.384800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.384864]  kthread+0x328/0x630
[   32.384941]  ret_from_fork+0x10/0x20
[   32.384977] 
[   32.384997] The buggy address belongs to the object at fff00000c9726400
[   32.384997]  which belongs to the cache kmalloc-128 of size 128
[   32.385108] The buggy address is located 0 bytes inside of
[   32.385108]  allocated 120-byte region [fff00000c9726400, fff00000c9726478)
[   32.385240] 
[   32.385298] The buggy address belongs to the physical page:
[   32.385446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.385588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.385634] page_type: f5(slab)
[   32.385711] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.385771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.385808] page dumped because: kasan: bad access detected
[   32.385837] 
[   32.385890] Memory state around the buggy address:
[   32.386087]  fff00000c9726300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.386194]  fff00000c9726380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.386309] >fff00000c9726400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.386406]                                                                 ^
[   32.386446]  fff00000c9726480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.386506]  fff00000c9726500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.386637] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   32.372375] ==================================================================
[   32.372438] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   32.372656] Read of size 16 at addr fff00000c85ecea0 by task kunit_try_catch/200
[   32.372779] 
[   32.372837] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.372945] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.372981] Hardware name: linux,dummy-virt (DT)
[   32.373010] Call trace:
[   32.373031]  show_stack+0x20/0x38 (C)
[   32.373338]  dump_stack_lvl+0x8c/0xd0
[   32.373412]  print_report+0x118/0x5e8
[   32.373457]  kasan_report+0xdc/0x128
[   32.373499]  __asan_report_load16_noabort+0x20/0x30
[   32.373697]  kmalloc_uaf_16+0x3bc/0x438
[   32.373812]  kunit_try_run_case+0x170/0x3f0
[   32.373908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.373996]  kthread+0x328/0x630
[   32.374080]  ret_from_fork+0x10/0x20
[   32.374129] 
[   32.374179] Allocated by task 200:
[   32.374227]  kasan_save_stack+0x3c/0x68
[   32.374283]  kasan_save_track+0x20/0x40
[   32.374318]  kasan_save_alloc_info+0x40/0x58
[   32.374370]  __kasan_kmalloc+0xd4/0xd8
[   32.374404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.374472]  kmalloc_uaf_16+0x140/0x438
[   32.374790]  kunit_try_run_case+0x170/0x3f0
[   32.374864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.374915]  kthread+0x328/0x630
[   32.374960]  ret_from_fork+0x10/0x20
[   32.375030] 
[   32.375062] Freed by task 200:
[   32.375090]  kasan_save_stack+0x3c/0x68
[   32.375125]  kasan_save_track+0x20/0x40
[   32.375160]  kasan_save_free_info+0x4c/0x78
[   32.375195]  __kasan_slab_free+0x7c/0xa8
[   32.375229]  kfree+0x214/0x3c8
[   32.375321]  kmalloc_uaf_16+0x190/0x438
[   32.375469]  kunit_try_run_case+0x170/0x3f0
[   32.375572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.375713]  kthread+0x328/0x630
[   32.375817]  ret_from_fork+0x10/0x20
[   32.375887] 
[   32.375962] The buggy address belongs to the object at fff00000c85ecea0
[   32.375962]  which belongs to the cache kmalloc-16 of size 16
[   32.376138] The buggy address is located 0 bytes inside of
[   32.376138]  freed 16-byte region [fff00000c85ecea0, fff00000c85eceb0)
[   32.376689] 
[   32.376750] The buggy address belongs to the physical page:
[   32.376835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec
[   32.376952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.377049] page_type: f5(slab)
[   32.377141] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.377203] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.377241] page dumped because: kasan: bad access detected
[   32.377270] 
[   32.377288] Memory state around the buggy address:
[   32.377319]  fff00000c85ecd80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.377363]  fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.377403] >fff00000c85ece80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   32.377456]                                ^
[   32.377488]  fff00000c85ecf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.377530]  fff00000c85ecf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.377566] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   32.360141] ==================================================================
[   32.360423] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   32.360486] Write of size 16 at addr fff00000c85ecd60 by task kunit_try_catch/198
[   32.360565] 
[   32.360614] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.360744] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.360774] Hardware name: linux,dummy-virt (DT)
[   32.360804] Call trace:
[   32.360852]  show_stack+0x20/0x38 (C)
[   32.360902]  dump_stack_lvl+0x8c/0xd0
[   32.360948]  print_report+0x118/0x5e8
[   32.361147]  kasan_report+0xdc/0x128
[   32.361201]  __asan_report_store16_noabort+0x20/0x30
[   32.361268]  kmalloc_oob_16+0x3a0/0x3f8
[   32.361323]  kunit_try_run_case+0x170/0x3f0
[   32.361397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.361449]  kthread+0x328/0x630
[   32.361490]  ret_from_fork+0x10/0x20
[   32.361537] 
[   32.361555] Allocated by task 198:
[   32.361742]  kasan_save_stack+0x3c/0x68
[   32.361803]  kasan_save_track+0x20/0x40
[   32.361874]  kasan_save_alloc_info+0x40/0x58
[   32.361952]  __kasan_kmalloc+0xd4/0xd8
[   32.361985]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.362043]  kmalloc_oob_16+0xb4/0x3f8
[   32.362079]  kunit_try_run_case+0x170/0x3f0
[   32.362124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.362181]  kthread+0x328/0x630
[   32.362229]  ret_from_fork+0x10/0x20
[   32.362264] 
[   32.362301] The buggy address belongs to the object at fff00000c85ecd60
[   32.362301]  which belongs to the cache kmalloc-16 of size 16
[   32.362372] The buggy address is located 0 bytes inside of
[   32.362372]  allocated 13-byte region [fff00000c85ecd60, fff00000c85ecd6d)
[   32.362657] 
[   32.362817] The buggy address belongs to the physical page:
[   32.362874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec
[   32.362928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.363030] page_type: f5(slab)
[   32.363071] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.363120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.363258] page dumped because: kasan: bad access detected
[   32.363362] 
[   32.363468] Memory state around the buggy address:
[   32.363565]  fff00000c85ecc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.363681]  fff00000c85ecc80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.363778] >fff00000c85ecd00: fa fb fc fc fa fb fc fc 00 00 fc fc 00 05 fc fc
[   32.363826]                                                           ^
[   32.363863]  fff00000c85ecd80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.364047]  fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.364179] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   32.255845] ==================================================================
[   32.255898] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.256043] Write of size 1 at addr fff00000c8754eeb by task kunit_try_catch/190
[   32.256112] 
[   32.256170] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.256298] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.256327] Hardware name: linux,dummy-virt (DT)
[   32.256357] Call trace:
[   32.256685]  show_stack+0x20/0x38 (C)
[   32.256807]  dump_stack_lvl+0x8c/0xd0
[   32.256860]  print_report+0x118/0x5e8
[   32.256948]  kasan_report+0xdc/0x128
[   32.256993]  __asan_report_store1_noabort+0x20/0x30
[   32.257070]  krealloc_less_oob_helper+0xa58/0xc50
[   32.257167]  krealloc_less_oob+0x20/0x38
[   32.257214]  kunit_try_run_case+0x170/0x3f0
[   32.257260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.257616]  kthread+0x328/0x630
[   32.257688]  ret_from_fork+0x10/0x20
[   32.257734] 
[   32.257826] Allocated by task 190:
[   32.257886]  kasan_save_stack+0x3c/0x68
[   32.257932]  kasan_save_track+0x20/0x40
[   32.257967]  kasan_save_alloc_info+0x40/0x58
[   32.258011]  __kasan_krealloc+0x118/0x178
[   32.258205]  krealloc_noprof+0x128/0x360
[   32.258388]  krealloc_less_oob_helper+0x168/0xc50
[   32.258443]  krealloc_less_oob+0x20/0x38
[   32.258973]  kunit_try_run_case+0x170/0x3f0
[   32.259046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.259460]  kthread+0x328/0x630
[   32.259533]  ret_from_fork+0x10/0x20
[   32.259570] 
[   32.259614] The buggy address belongs to the object at fff00000c8754e00
[   32.259614]  which belongs to the cache kmalloc-256 of size 256
[   32.259900] The buggy address is located 34 bytes to the right of
[   32.259900]  allocated 201-byte region [fff00000c8754e00, fff00000c8754ec9)
[   32.260243] 
[   32.260295] The buggy address belongs to the physical page:
[   32.260614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754
[   32.260868] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.260967] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.261033] page_type: f5(slab)
[   32.261069] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.261126] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.261172] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.261227] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.261274] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff
[   32.261320] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.261358] page dumped because: kasan: bad access detected
[   32.261397] 
[   32.261415] Memory state around the buggy address:
[   32.261454]  fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.261498]  fff00000c8754e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.261540] >fff00000c8754e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.261590]                                                           ^
[   32.261628]  fff00000c8754f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.261690]  fff00000c8754f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.261726] ==================================================================
[   32.244783] ==================================================================
[   32.245169] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.245236] Write of size 1 at addr fff00000c8754eea by task kunit_try_catch/190
[   32.245649] 
[   32.245721] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.245811] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.245974] Hardware name: linux,dummy-virt (DT)
[   32.246108] Call trace:
[   32.246155]  show_stack+0x20/0x38 (C)
[   32.246208]  dump_stack_lvl+0x8c/0xd0
[   32.246398]  print_report+0x118/0x5e8
[   32.246612]  kasan_report+0xdc/0x128
[   32.246683]  __asan_report_store1_noabort+0x20/0x30
[   32.246795]  krealloc_less_oob_helper+0xae4/0xc50
[   32.246849]  krealloc_less_oob+0x20/0x38
[   32.246895]  kunit_try_run_case+0x170/0x3f0
[   32.247002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.247102]  kthread+0x328/0x630
[   32.247302]  ret_from_fork+0x10/0x20
[   32.247361] 
[   32.247380] Allocated by task 190:
[   32.247633]  kasan_save_stack+0x3c/0x68
[   32.247849]  kasan_save_track+0x20/0x40
[   32.247969]  kasan_save_alloc_info+0x40/0x58
[   32.248137]  __kasan_krealloc+0x118/0x178
[   32.248483]  krealloc_noprof+0x128/0x360
[   32.248560]  krealloc_less_oob_helper+0x168/0xc50
[   32.248702]  krealloc_less_oob+0x20/0x38
[   32.248845]  kunit_try_run_case+0x170/0x3f0
[   32.248976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.249137]  kthread+0x328/0x630
[   32.249205]  ret_from_fork+0x10/0x20
[   32.249371] 
[   32.249435] The buggy address belongs to the object at fff00000c8754e00
[   32.249435]  which belongs to the cache kmalloc-256 of size 256
[   32.249761] The buggy address is located 33 bytes to the right of
[   32.249761]  allocated 201-byte region [fff00000c8754e00, fff00000c8754ec9)
[   32.249948] 
[   32.250024] The buggy address belongs to the physical page:
[   32.250131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754
[   32.250194] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.250406] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.250509] page_type: f5(slab)
[   32.250712] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.250867] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.250947] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.251002] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.251049] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff
[   32.251219] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.251271] page dumped because: kasan: bad access detected
[   32.251301] 
[   32.251585] Memory state around the buggy address:
[   32.251809]  fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.251905]  fff00000c8754e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.251950] >fff00000c8754e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.252145]                                                           ^
[   32.252291]  fff00000c8754f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.252531]  fff00000c8754f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.252600] ==================================================================
[   32.300865] ==================================================================
[   32.301019] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.301135] Write of size 1 at addr fff00000c9b260d0 by task kunit_try_catch/194
[   32.301187] 
[   32.301216] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.301381] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.301427] Hardware name: linux,dummy-virt (DT)
[   32.301457] Call trace:
[   32.301495]  show_stack+0x20/0x38 (C)
[   32.301724]  dump_stack_lvl+0x8c/0xd0
[   32.301838]  print_report+0x118/0x5e8
[   32.302183]  kasan_report+0xdc/0x128
[   32.302455]  __asan_report_store1_noabort+0x20/0x30
[   32.302557]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.302673]  krealloc_large_less_oob+0x20/0x38
[   32.302727]  kunit_try_run_case+0x170/0x3f0
[   32.302772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.302861]  kthread+0x328/0x630
[   32.303115]  ret_from_fork+0x10/0x20
[   32.303186] 
[   32.303349] The buggy address belongs to the physical page:
[   32.303407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   32.303459] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.303570] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.303735] page_type: f8(unknown)
[   32.303828] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.304255] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.304358] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.304438] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.304611] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   32.305006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.305234] page dumped because: kasan: bad access detected
[   32.305594] 
[   32.305985] Memory state around the buggy address:
[   32.306042]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.306152]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.306226] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.306323]                                                  ^
[   32.306389]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.306454]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.306545] ==================================================================
[   32.308119] ==================================================================
[   32.308186] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.308239] Write of size 1 at addr fff00000c9b260da by task kunit_try_catch/194
[   32.308375] 
[   32.308446] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.308581] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.308611] Hardware name: linux,dummy-virt (DT)
[   32.308702] Call trace:
[   32.309027]  show_stack+0x20/0x38 (C)
[   32.309105]  dump_stack_lvl+0x8c/0xd0
[   32.309310]  print_report+0x118/0x5e8
[   32.309508]  kasan_report+0xdc/0x128
[   32.309607]  __asan_report_store1_noabort+0x20/0x30
[   32.309712]  krealloc_less_oob_helper+0xa80/0xc50
[   32.309850]  krealloc_large_less_oob+0x20/0x38
[   32.309905]  kunit_try_run_case+0x170/0x3f0
[   32.309958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.310266]  kthread+0x328/0x630
[   32.310403]  ret_from_fork+0x10/0x20
[   32.310497] 
[   32.310696] The buggy address belongs to the physical page:
[   32.310759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   32.311095] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.311171] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.311284] page_type: f8(unknown)
[   32.311394] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.311524] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.311630] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.311751] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.311800] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   32.311873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.312098] page dumped because: kasan: bad access detected
[   32.312273] 
[   32.312626] Memory state around the buggy address:
[   32.312725]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.313072]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.313130] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.313184]                                                     ^
[   32.313484]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.314357]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.314431] ==================================================================
[   32.218940] ==================================================================
[   32.219000] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.219056] Write of size 1 at addr fff00000c8754ec9 by task kunit_try_catch/190
[   32.219104] 
[   32.219136] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.219231] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.219261] Hardware name: linux,dummy-virt (DT)
[   32.219301] Call trace:
[   32.219323]  show_stack+0x20/0x38 (C)
[   32.219371]  dump_stack_lvl+0x8c/0xd0
[   32.219416]  print_report+0x118/0x5e8
[   32.219459]  kasan_report+0xdc/0x128
[   32.219506]  __asan_report_store1_noabort+0x20/0x30
[   32.219562]  krealloc_less_oob_helper+0xa48/0xc50
[   32.219616]  krealloc_less_oob+0x20/0x38
[   32.220487]  kunit_try_run_case+0x170/0x3f0
[   32.220626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.220774]  kthread+0x328/0x630
[   32.220831]  ret_from_fork+0x10/0x20
[   32.221140] 
[   32.221202] Allocated by task 190:
[   32.221306]  kasan_save_stack+0x3c/0x68
[   32.221490]  kasan_save_track+0x20/0x40
[   32.221675]  kasan_save_alloc_info+0x40/0x58
[   32.221774]  __kasan_krealloc+0x118/0x178
[   32.222235]  krealloc_noprof+0x128/0x360
[   32.222349]  krealloc_less_oob_helper+0x168/0xc50
[   32.222417]  krealloc_less_oob+0x20/0x38
[   32.222590]  kunit_try_run_case+0x170/0x3f0
[   32.222793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.223159]  kthread+0x328/0x630
[   32.223302]  ret_from_fork+0x10/0x20
[   32.223411] 
[   32.223514] The buggy address belongs to the object at fff00000c8754e00
[   32.223514]  which belongs to the cache kmalloc-256 of size 256
[   32.223676] The buggy address is located 0 bytes to the right of
[   32.223676]  allocated 201-byte region [fff00000c8754e00, fff00000c8754ec9)
[   32.223821] 
[   32.223909] The buggy address belongs to the physical page:
[   32.223943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754
[   32.223999] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.224044] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.224401] page_type: f5(slab)
[   32.224568] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.224762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.224968] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.225048] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.225100] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff
[   32.225494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.225625] page dumped because: kasan: bad access detected
[   32.225724] 
[   32.225869] Memory state around the buggy address:
[   32.225977]  fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.226046]  fff00000c8754e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.226298] >fff00000c8754e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.226469]                                               ^
[   32.226535]  fff00000c8754f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.226730]  fff00000c8754f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.226979] ==================================================================
[   32.293375] ==================================================================
[   32.293564] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.293657] Write of size 1 at addr fff00000c9b260c9 by task kunit_try_catch/194
[   32.293820] 
[   32.293859] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.293945] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.294247] Hardware name: linux,dummy-virt (DT)
[   32.294423] Call trace:
[   32.294602]  show_stack+0x20/0x38 (C)
[   32.294763]  dump_stack_lvl+0x8c/0xd0
[   32.294816]  print_report+0x118/0x5e8
[   32.294860]  kasan_report+0xdc/0x128
[   32.295218]  __asan_report_store1_noabort+0x20/0x30
[   32.295351]  krealloc_less_oob_helper+0xa48/0xc50
[   32.295574]  krealloc_large_less_oob+0x20/0x38
[   32.295651]  kunit_try_run_case+0x170/0x3f0
[   32.295874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.295987]  kthread+0x328/0x630
[   32.296102]  ret_from_fork+0x10/0x20
[   32.296205] 
[   32.296226] The buggy address belongs to the physical page:
[   32.296538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   32.296621] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.296766] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.296873] page_type: f8(unknown)
[   32.297162] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.297316] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.297441] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.297506] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.297725] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   32.297983] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.298204] page dumped because: kasan: bad access detected
[   32.298417] 
[   32.298462] Memory state around the buggy address:
[   32.298654]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.298724]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.299189] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.299360]                                               ^
[   32.299446]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.299490]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.299923] ==================================================================
[   32.228611] ==================================================================
[   32.228725] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.228777] Write of size 1 at addr fff00000c8754ed0 by task kunit_try_catch/190
[   32.229065] 
[   32.229112] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.229342] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.229439] Hardware name: linux,dummy-virt (DT)
[   32.229555] Call trace:
[   32.229603]  show_stack+0x20/0x38 (C)
[   32.229667]  dump_stack_lvl+0x8c/0xd0
[   32.229945]  print_report+0x118/0x5e8
[   32.230014]  kasan_report+0xdc/0x128
[   32.230061]  __asan_report_store1_noabort+0x20/0x30
[   32.230222]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.230306]  krealloc_less_oob+0x20/0x38
[   32.230354]  kunit_try_run_case+0x170/0x3f0
[   32.230475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.230527]  kthread+0x328/0x630
[   32.230921]  ret_from_fork+0x10/0x20
[   32.231011] 
[   32.231174] Allocated by task 190:
[   32.231210]  kasan_save_stack+0x3c/0x68
[   32.231393]  kasan_save_track+0x20/0x40
[   32.231469]  kasan_save_alloc_info+0x40/0x58
[   32.231608]  __kasan_krealloc+0x118/0x178
[   32.231718]  krealloc_noprof+0x128/0x360
[   32.231867]  krealloc_less_oob_helper+0x168/0xc50
[   32.232101]  krealloc_less_oob+0x20/0x38
[   32.232165]  kunit_try_run_case+0x170/0x3f0
[   32.232235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.232468]  kthread+0x328/0x630
[   32.232806]  ret_from_fork+0x10/0x20
[   32.232897] 
[   32.232972] The buggy address belongs to the object at fff00000c8754e00
[   32.232972]  which belongs to the cache kmalloc-256 of size 256
[   32.233086] The buggy address is located 7 bytes to the right of
[   32.233086]  allocated 201-byte region [fff00000c8754e00, fff00000c8754ec9)
[   32.233448] 
[   32.233579] The buggy address belongs to the physical page:
[   32.233728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754
[   32.233814] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.234022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.234098] page_type: f5(slab)
[   32.234368] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.234667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.235158] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.235516] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.235572] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff
[   32.235619] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.235668] page dumped because: kasan: bad access detected
[   32.235698] 
[   32.235716] Memory state around the buggy address:
[   32.235748]  fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.235791]  fff00000c8754e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.235833] >fff00000c8754e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.236088]                                                  ^
[   32.236939]  fff00000c8754f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.237131]  fff00000c8754f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.237314] ==================================================================
[   32.238732] ==================================================================
[   32.238827] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.238938] Write of size 1 at addr fff00000c8754eda by task kunit_try_catch/190
[   32.239033] 
[   32.239130] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.239326] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.239356] Hardware name: linux,dummy-virt (DT)
[   32.239387] Call trace:
[   32.239408]  show_stack+0x20/0x38 (C)
[   32.239456]  dump_stack_lvl+0x8c/0xd0
[   32.239502]  print_report+0x118/0x5e8
[   32.239545]  kasan_report+0xdc/0x128
[   32.239896]  __asan_report_store1_noabort+0x20/0x30
[   32.239968]  krealloc_less_oob_helper+0xa80/0xc50
[   32.240018]  krealloc_less_oob+0x20/0x38
[   32.240091]  kunit_try_run_case+0x170/0x3f0
[   32.240160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.240221]  kthread+0x328/0x630
[   32.240273]  ret_from_fork+0x10/0x20
[   32.240333] 
[   32.240359] Allocated by task 190:
[   32.240395]  kasan_save_stack+0x3c/0x68
[   32.240433]  kasan_save_track+0x20/0x40
[   32.240483]  kasan_save_alloc_info+0x40/0x58
[   32.240519]  __kasan_krealloc+0x118/0x178
[   32.240553]  krealloc_noprof+0x128/0x360
[   32.240591]  krealloc_less_oob_helper+0x168/0xc50
[   32.240630]  krealloc_less_oob+0x20/0x38
[   32.240679]  kunit_try_run_case+0x170/0x3f0
[   32.240721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.240768]  kthread+0x328/0x630
[   32.240799]  ret_from_fork+0x10/0x20
[   32.240833] 
[   32.240852] The buggy address belongs to the object at fff00000c8754e00
[   32.240852]  which belongs to the cache kmalloc-256 of size 256
[   32.240906] The buggy address is located 17 bytes to the right of
[   32.240906]  allocated 201-byte region [fff00000c8754e00, fff00000c8754ec9)
[   32.240968] 
[   32.240987] The buggy address belongs to the physical page:
[   32.241019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754
[   32.241088] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.241133] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.241183] page_type: f5(slab)
[   32.241231] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.241287] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.241334] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.241380] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.241426] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff
[   32.241471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.241509] page dumped because: kasan: bad access detected
[   32.241537] 
[   32.241554] Memory state around the buggy address:
[   32.241585]  fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.241626]  fff00000c8754e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.242426] >fff00000c8754e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.242538]                                                     ^
[   32.242968]  fff00000c8754f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.243408]  fff00000c8754f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.243454] ==================================================================
[   32.315908] ==================================================================
[   32.316032] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.316086] Write of size 1 at addr fff00000c9b260ea by task kunit_try_catch/194
[   32.316171] 
[   32.316277] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.316398] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.316478] Hardware name: linux,dummy-virt (DT)
[   32.316516] Call trace:
[   32.316537]  show_stack+0x20/0x38 (C)
[   32.316584]  dump_stack_lvl+0x8c/0xd0
[   32.316669]  print_report+0x118/0x5e8
[   32.316727]  kasan_report+0xdc/0x128
[   32.316777]  __asan_report_store1_noabort+0x20/0x30
[   32.316834]  krealloc_less_oob_helper+0xae4/0xc50
[   32.316882]  krealloc_large_less_oob+0x20/0x38
[   32.316938]  kunit_try_run_case+0x170/0x3f0
[   32.316983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.317032]  kthread+0x328/0x630
[   32.317073]  ret_from_fork+0x10/0x20
[   32.317117] 
[   32.317137] The buggy address belongs to the physical page:
[   32.317168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   32.317217] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.317260] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.317309] page_type: f8(unknown)
[   32.317345] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.317401] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.317449] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.317494] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.317540] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   32.317586] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.317625] page dumped because: kasan: bad access detected
[   32.317979] 
[   32.318311] Memory state around the buggy address:
[   32.318695]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.318776]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.318820] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.318856]                                                           ^
[   32.319347]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.319594]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.319727] ==================================================================
[   32.320426] ==================================================================
[   32.320483] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.320678] Write of size 1 at addr fff00000c9b260eb by task kunit_try_catch/194
[   32.320741] 
[   32.320811] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.321232] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.321424] Hardware name: linux,dummy-virt (DT)
[   32.321477] Call trace:
[   32.321516]  show_stack+0x20/0x38 (C)
[   32.321574]  dump_stack_lvl+0x8c/0xd0
[   32.321620]  print_report+0x118/0x5e8
[   32.322081]  kasan_report+0xdc/0x128
[   32.322161]  __asan_report_store1_noabort+0x20/0x30
[   32.322437]  krealloc_less_oob_helper+0xa58/0xc50
[   32.322717]  krealloc_large_less_oob+0x20/0x38
[   32.322791]  kunit_try_run_case+0x170/0x3f0
[   32.322967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.323090]  kthread+0x328/0x630
[   32.323285]  ret_from_fork+0x10/0x20
[   32.323496] 
[   32.323551] The buggy address belongs to the physical page:
[   32.323914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   32.324135] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.324349] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.324526] page_type: f8(unknown)
[   32.324673] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.324884] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.325016] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.325169] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.325295] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   32.325491] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.325697] page dumped because: kasan: bad access detected
[   32.325737] 
[   32.325755] Memory state around the buggy address:
[   32.326096]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.326318]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.326392] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.326666]                                                           ^
[   32.326815]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.327121]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.327240] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   32.273726] ==================================================================
[   32.273878] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   32.273940] Write of size 1 at addr fff00000c9b260eb by task kunit_try_catch/192
[   32.274129] 
[   32.274164] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.274381] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.274576] Hardware name: linux,dummy-virt (DT)
[   32.274620] Call trace:
[   32.274701]  show_stack+0x20/0x38 (C)
[   32.274752]  dump_stack_lvl+0x8c/0xd0
[   32.274799]  print_report+0x118/0x5e8
[   32.274881]  kasan_report+0xdc/0x128
[   32.275039]  __asan_report_store1_noabort+0x20/0x30
[   32.275361]  krealloc_more_oob_helper+0x60c/0x678
[   32.275512]  krealloc_large_more_oob+0x20/0x38
[   32.275703]  kunit_try_run_case+0x170/0x3f0
[   32.275785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.275889]  kthread+0x328/0x630
[   32.275934]  ret_from_fork+0x10/0x20
[   32.276422] 
[   32.276552] The buggy address belongs to the physical page:
[   32.276717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   32.276855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.276930] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.277170] page_type: f8(unknown)
[   32.277345] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.277463] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.277673] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.277780] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.277937] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   32.278023] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.278338] page dumped because: kasan: bad access detected
[   32.278537] 
[   32.278629] Memory state around the buggy address:
[   32.278766]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.278875]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.279039] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   32.279079]                                                           ^
[   32.279140]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.279196]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.279370] ==================================================================
[   32.201519] ==================================================================
[   32.201604] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   32.201734] Write of size 1 at addr fff00000c8754cf0 by task kunit_try_catch/188
[   32.201784] 
[   32.201815] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.201899] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.201935] Hardware name: linux,dummy-virt (DT)
[   32.201965] Call trace:
[   32.201986]  show_stack+0x20/0x38 (C)
[   32.202032]  dump_stack_lvl+0x8c/0xd0
[   32.202078]  print_report+0x118/0x5e8
[   32.202121]  kasan_report+0xdc/0x128
[   32.202171]  __asan_report_store1_noabort+0x20/0x30
[   32.202224]  krealloc_more_oob_helper+0x5c0/0x678
[   32.202273]  krealloc_more_oob+0x20/0x38
[   32.202318]  kunit_try_run_case+0x170/0x3f0
[   32.202362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.202412]  kthread+0x328/0x630
[   32.202461]  ret_from_fork+0x10/0x20
[   32.202506] 
[   32.202525] Allocated by task 188:
[   32.202558]  kasan_save_stack+0x3c/0x68
[   32.202605]  kasan_save_track+0x20/0x40
[   32.202649]  kasan_save_alloc_info+0x40/0x58
[   32.202685]  __kasan_krealloc+0x118/0x178
[   32.202719]  krealloc_noprof+0x128/0x360
[   32.202757]  krealloc_more_oob_helper+0x168/0x678
[   32.202796]  krealloc_more_oob+0x20/0x38
[   32.202832]  kunit_try_run_case+0x170/0x3f0
[   32.202878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.202919]  kthread+0x328/0x630
[   32.203525]  ret_from_fork+0x10/0x20
[   32.203586] 
[   32.203607] The buggy address belongs to the object at fff00000c8754c00
[   32.203607]  which belongs to the cache kmalloc-256 of size 256
[   32.204098] The buggy address is located 5 bytes to the right of
[   32.204098]  allocated 235-byte region [fff00000c8754c00, fff00000c8754ceb)
[   32.204271] 
[   32.204357] The buggy address belongs to the physical page:
[   32.204447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754
[   32.204548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.204778] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.205083] page_type: f5(slab)
[   32.205153] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.205246] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.206010] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.206463] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.206740] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff
[   32.207127] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.207174] page dumped because: kasan: bad access detected
[   32.207429] 
[   32.207637] Memory state around the buggy address:
[   32.207738]  fff00000c8754b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.207785]  fff00000c8754c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.207879] >fff00000c8754c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.208019]                                                              ^
[   32.208390]  fff00000c8754d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.208492]  fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.208721] ==================================================================
[   32.280671] ==================================================================
[   32.280769] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   32.280825] Write of size 1 at addr fff00000c9b260f0 by task kunit_try_catch/192
[   32.280882] 
[   32.280911] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.281315] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.281359] Hardware name: linux,dummy-virt (DT)
[   32.281705] Call trace:
[   32.281933]  show_stack+0x20/0x38 (C)
[   32.282151]  dump_stack_lvl+0x8c/0xd0
[   32.282212]  print_report+0x118/0x5e8
[   32.282257]  kasan_report+0xdc/0x128
[   32.282334]  __asan_report_store1_noabort+0x20/0x30
[   32.282387]  krealloc_more_oob_helper+0x5c0/0x678
[   32.282436]  krealloc_large_more_oob+0x20/0x38
[   32.282527]  kunit_try_run_case+0x170/0x3f0
[   32.282583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.282634]  kthread+0x328/0x630
[   32.282685]  ret_from_fork+0x10/0x20
[   32.282730] 
[   32.282749] The buggy address belongs to the physical page:
[   32.282780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   32.282838] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.282881] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.282929] page_type: f8(unknown)
[   32.283109] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.283156] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.283593] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.283767] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.283853] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   32.284035] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.284085] page dumped because: kasan: bad access detected
[   32.284114] 
[   32.284379] Memory state around the buggy address:
[   32.284534]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.284587]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.284840] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   32.284931]                                                              ^
[   32.285099]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.285166]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.285252] ==================================================================
[   32.189566] ==================================================================
[   32.189626] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   32.189697] Write of size 1 at addr fff00000c8754ceb by task kunit_try_catch/188
[   32.190165] 
[   32.190297] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.190439] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.190786] Hardware name: linux,dummy-virt (DT)
[   32.190945] Call trace:
[   32.191027]  show_stack+0x20/0x38 (C)
[   32.191138]  dump_stack_lvl+0x8c/0xd0
[   32.191246]  print_report+0x118/0x5e8
[   32.191397]  kasan_report+0xdc/0x128
[   32.191461]  __asan_report_store1_noabort+0x20/0x30
[   32.191542]  krealloc_more_oob_helper+0x60c/0x678
[   32.191593]  krealloc_more_oob+0x20/0x38
[   32.191649]  kunit_try_run_case+0x170/0x3f0
[   32.192052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.192320]  kthread+0x328/0x630
[   32.192456]  ret_from_fork+0x10/0x20
[   32.192741] 
[   32.192893] Allocated by task 188:
[   32.192965]  kasan_save_stack+0x3c/0x68
[   32.193297]  kasan_save_track+0x20/0x40
[   32.193408]  kasan_save_alloc_info+0x40/0x58
[   32.193527]  __kasan_krealloc+0x118/0x178
[   32.193736]  krealloc_noprof+0x128/0x360
[   32.194014]  krealloc_more_oob_helper+0x168/0x678
[   32.194264]  krealloc_more_oob+0x20/0x38
[   32.194340]  kunit_try_run_case+0x170/0x3f0
[   32.194473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.194534]  kthread+0x328/0x630
[   32.194574]  ret_from_fork+0x10/0x20
[   32.194609] 
[   32.194629] The buggy address belongs to the object at fff00000c8754c00
[   32.194629]  which belongs to the cache kmalloc-256 of size 256
[   32.194698] The buggy address is located 0 bytes to the right of
[   32.194698]  allocated 235-byte region [fff00000c8754c00, fff00000c8754ceb)
[   32.194769] 
[   32.194798] The buggy address belongs to the physical page:
[   32.194835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754
[   32.194886] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.194936] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.195160] page_type: f5(slab)
[   32.195498] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.195781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.195960] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.196064] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.196224] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff
[   32.196334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.196606] page dumped because: kasan: bad access detected
[   32.196746] 
[   32.196908] Memory state around the buggy address:
[   32.197032]  fff00000c8754b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.197194]  fff00000c8754c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.197461] >fff00000c8754c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.197555]                                                           ^
[   32.197744]  fff00000c8754d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.197930]  fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.198089] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   32.169325] ==================================================================
[   32.169390] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   32.169452] Read of size 1 at addr fff00000c9b40000 by task kunit_try_catch/186
[   32.169501] 
[   32.169536] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.169657] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.169723] Hardware name: linux,dummy-virt (DT)
[   32.169756] Call trace:
[   32.169788]  show_stack+0x20/0x38 (C)
[   32.170117]  dump_stack_lvl+0x8c/0xd0
[   32.170412]  print_report+0x118/0x5e8
[   32.170705]  kasan_report+0xdc/0x128
[   32.171012]  __asan_report_load1_noabort+0x20/0x30
[   32.171091]  page_alloc_uaf+0x328/0x350
[   32.171395]  kunit_try_run_case+0x170/0x3f0
[   32.171969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.172430]  kthread+0x328/0x630
[   32.172499]  ret_from_fork+0x10/0x20
[   32.173635] 
[   32.173743] The buggy address belongs to the physical page:
[   32.173863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b40
[   32.173942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.174025] page_type: f0(buddy)
[   32.174386] raw: 0bfffe0000000000 fff00000ff6161b0 fff00000ff6161b0 0000000000000000
[   32.174543] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   32.174851] page dumped because: kasan: bad access detected
[   32.175274] 
[   32.175402] Memory state around the buggy address:
[   32.175449]  fff00000c9b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.175772]  fff00000c9b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.175926] >fff00000c9b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.176041]                    ^
[   32.176285]  fff00000c9b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.176695]  fff00000c9b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.176740] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   32.144264] ==================================================================
[   32.144353] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   32.144628] Free of addr fff00000c99a0001 by task kunit_try_catch/182
[   32.145114] 
[   32.145451] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.145637] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.145702] Hardware name: linux,dummy-virt (DT)
[   32.145794] Call trace:
[   32.145843]  show_stack+0x20/0x38 (C)
[   32.145895]  dump_stack_lvl+0x8c/0xd0
[   32.146070]  print_report+0x118/0x5e8
[   32.146161]  kasan_report_invalid_free+0xc0/0xe8
[   32.146226]  __kasan_kfree_large+0x5c/0xa8
[   32.146272]  free_large_kmalloc+0x68/0x150
[   32.146473]  kfree+0x270/0x3c8
[   32.146695]  kmalloc_large_invalid_free+0x108/0x270
[   32.146761]  kunit_try_run_case+0x170/0x3f0
[   32.146868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.147158]  kthread+0x328/0x630
[   32.147371]  ret_from_fork+0x10/0x20
[   32.147753] 
[   32.147961] The buggy address belongs to the physical page:
[   32.148098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0
[   32.148803] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.149001] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.149319] page_type: f8(unknown)
[   32.149611] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.149712] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.149819] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.150025] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.150132] head: 0bfffe0000000002 ffffc1ffc3266801 00000000ffffffff 00000000ffffffff
[   32.150300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.150348] page dumped because: kasan: bad access detected
[   32.150394] 
[   32.150412] Memory state around the buggy address:
[   32.150445]  fff00000c999ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.150497]  fff00000c999ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.150552] >fff00000c99a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.150588]                    ^
[   32.150626]  fff00000c99a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.150694]  fff00000c99a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.150745] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   32.126462] ==================================================================
[   32.126589] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   32.126660] Read of size 1 at addr fff00000c99a0000 by task kunit_try_catch/180
[   32.126903] 
[   32.126951] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.127039] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.127097] Hardware name: linux,dummy-virt (DT)
[   32.127376] Call trace:
[   32.127577]  show_stack+0x20/0x38 (C)
[   32.127801]  dump_stack_lvl+0x8c/0xd0
[   32.128044]  print_report+0x118/0x5e8
[   32.128118]  kasan_report+0xdc/0x128
[   32.128275]  __asan_report_load1_noabort+0x20/0x30
[   32.128357]  kmalloc_large_uaf+0x2cc/0x2f8
[   32.128505]  kunit_try_run_case+0x170/0x3f0
[   32.128565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.128793]  kthread+0x328/0x630
[   32.129032]  ret_from_fork+0x10/0x20
[   32.129115] 
[   32.129274] The buggy address belongs to the physical page:
[   32.129416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0
[   32.129855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.130126] raw: 0bfffe0000000000 fff00000da470d00 fff00000da470d00 0000000000000000
[   32.130322] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   32.130363] page dumped because: kasan: bad access detected
[   32.130772] 
[   32.131007] Memory state around the buggy address:
[   32.131116]  fff00000c999ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.131300]  fff00000c999ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.131344] >fff00000c99a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.131402]                    ^
[   32.131650]  fff00000c99a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.131876]  fff00000c99a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.132030] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   32.110106] ==================================================================
[   32.110174] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   32.110228] Write of size 1 at addr fff00000c99a200a by task kunit_try_catch/178
[   32.110276] 
[   32.110308] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.110394] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.110423] Hardware name: linux,dummy-virt (DT)
[   32.110452] Call trace:
[   32.110474]  show_stack+0x20/0x38 (C)
[   32.110520]  dump_stack_lvl+0x8c/0xd0
[   32.110864]  print_report+0x118/0x5e8
[   32.111706]  kasan_report+0xdc/0x128
[   32.111803]  __asan_report_store1_noabort+0x20/0x30
[   32.112368]  kmalloc_large_oob_right+0x278/0x2b8
[   32.112456]  kunit_try_run_case+0x170/0x3f0
[   32.112868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.112974]  kthread+0x328/0x630
[   32.113128]  ret_from_fork+0x10/0x20
[   32.113249] 
[   32.113592] The buggy address belongs to the physical page:
[   32.113882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0
[   32.114056] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.114126] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.114590] page_type: f8(unknown)
[   32.114688] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.114748] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.115014] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.115191] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.115280] head: 0bfffe0000000002 ffffc1ffc3266801 00000000ffffffff 00000000ffffffff
[   32.115328] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.115374] page dumped because: kasan: bad access detected
[   32.115404] 
[   32.115580] Memory state around the buggy address:
[   32.115775]  fff00000c99a1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.115964]  fff00000c99a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.116202] >fff00000c99a2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.116624]                       ^
[   32.116721]  fff00000c99a2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.116974]  fff00000c99a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.117020] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   32.093346] ==================================================================
[   32.093409] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   32.093466] Write of size 1 at addr fff00000c6465f00 by task kunit_try_catch/176
[   32.093515] 
[   32.093546] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.093631] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.094153] Hardware name: linux,dummy-virt (DT)
[   32.094196] Call trace:
[   32.094219]  show_stack+0x20/0x38 (C)
[   32.094290]  dump_stack_lvl+0x8c/0xd0
[   32.094787]  print_report+0x118/0x5e8
[   32.094831]  kasan_report+0xdc/0x128
[   32.094873]  __asan_report_store1_noabort+0x20/0x30
[   32.094920]  kmalloc_big_oob_right+0x2a4/0x2f0
[   32.095168]  kunit_try_run_case+0x170/0x3f0
[   32.095216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.095275]  kthread+0x328/0x630
[   32.095387]  ret_from_fork+0x10/0x20
[   32.095495] 
[   32.095668] Allocated by task 176:
[   32.095830]  kasan_save_stack+0x3c/0x68
[   32.096072]  kasan_save_track+0x20/0x40
[   32.096213]  kasan_save_alloc_info+0x40/0x58
[   32.096250]  __kasan_kmalloc+0xd4/0xd8
[   32.096283]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.096692]  kmalloc_big_oob_right+0xb8/0x2f0
[   32.096734]  kunit_try_run_case+0x170/0x3f0
[   32.097098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.097713]  kthread+0x328/0x630
[   32.097996]  ret_from_fork+0x10/0x20
[   32.098039] 
[   32.098271] The buggy address belongs to the object at fff00000c6464000
[   32.098271]  which belongs to the cache kmalloc-8k of size 8192
[   32.098584] The buggy address is located 0 bytes to the right of
[   32.098584]  allocated 7936-byte region [fff00000c6464000, fff00000c6465f00)
[   32.098911] 
[   32.099027] The buggy address belongs to the physical page:
[   32.099165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460
[   32.099239] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.099449] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.099606] page_type: f5(slab)
[   32.099699] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   32.099774] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   32.099830] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   32.099877] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   32.099923] head: 0bfffe0000000003 ffffc1ffc3191801 00000000ffffffff 00000000ffffffff
[   32.100301] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   32.100357] page dumped because: kasan: bad access detected
[   32.100389] 
[   32.100407] Memory state around the buggy address:
[   32.100440]  fff00000c6465e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.100483]  fff00000c6465e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.100523] >fff00000c6465f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.100559]                    ^
[   32.100586]  fff00000c6465f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.100626]  fff00000c6466000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.100678] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   32.064271] ==================================================================
[   32.064330] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   32.064384] Write of size 1 at addr fff00000c9726278 by task kunit_try_catch/174
[   32.064433] 
[   32.064465] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.064550] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.064579] Hardware name: linux,dummy-virt (DT)
[   32.064608] Call trace:
[   32.064630]  show_stack+0x20/0x38 (C)
[   32.064695]  dump_stack_lvl+0x8c/0xd0
[   32.065213]  print_report+0x118/0x5e8
[   32.067514]  kasan_report+0xdc/0x128
[   32.067673]  __asan_report_store1_noabort+0x20/0x30
[   32.067751]  kmalloc_track_caller_oob_right+0x40c/0x488
[   32.067805]  kunit_try_run_case+0x170/0x3f0
[   32.068334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.068691]  kthread+0x328/0x630
[   32.068738]  ret_from_fork+0x10/0x20
[   32.069170] 
[   32.069531] Allocated by task 174:
[   32.069748]  kasan_save_stack+0x3c/0x68
[   32.069793]  kasan_save_track+0x20/0x40
[   32.070223]  kasan_save_alloc_info+0x40/0x58
[   32.070265]  __kasan_kmalloc+0xd4/0xd8
[   32.070732]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   32.070792]  kmalloc_track_caller_oob_right+0xa8/0x488
[   32.071117]  kunit_try_run_case+0x170/0x3f0
[   32.071162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.071203]  kthread+0x328/0x630
[   32.071508]  ret_from_fork+0x10/0x20
[   32.071550] 
[   32.071569] The buggy address belongs to the object at fff00000c9726200
[   32.071569]  which belongs to the cache kmalloc-128 of size 128
[   32.071689] The buggy address is located 0 bytes to the right of
[   32.071689]  allocated 120-byte region [fff00000c9726200, fff00000c9726278)
[   32.071754] 
[   32.071774] The buggy address belongs to the physical page:
[   32.071992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.072328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.072507] page_type: f5(slab)
[   32.072605] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.072845] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.073065] page dumped because: kasan: bad access detected
[   32.073123] 
[   32.073141] Memory state around the buggy address:
[   32.073174]  fff00000c9726100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.073217]  fff00000c9726180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.073258] >fff00000c9726200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.073294]                                                                 ^
[   32.073334]  fff00000c9726280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.074042]  fff00000c9726300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.074084] ==================================================================
[   32.076334] ==================================================================
[   32.076858] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   32.076928] Write of size 1 at addr fff00000c9726378 by task kunit_try_catch/174
[   32.076985] 
[   32.077359] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.077463] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.077685] Hardware name: linux,dummy-virt (DT)
[   32.077848] Call trace:
[   32.078050]  show_stack+0x20/0x38 (C)
[   32.078125]  dump_stack_lvl+0x8c/0xd0
[   32.078171]  print_report+0x118/0x5e8
[   32.078215]  kasan_report+0xdc/0x128
[   32.078257]  __asan_report_store1_noabort+0x20/0x30
[   32.078305]  kmalloc_track_caller_oob_right+0x418/0x488
[   32.078355]  kunit_try_run_case+0x170/0x3f0
[   32.078401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.078452]  kthread+0x328/0x630
[   32.078492]  ret_from_fork+0x10/0x20
[   32.078540] 
[   32.078558] Allocated by task 174:
[   32.078585]  kasan_save_stack+0x3c/0x68
[   32.078622]  kasan_save_track+0x20/0x40
[   32.078668]  kasan_save_alloc_info+0x40/0x58
[   32.078704]  __kasan_kmalloc+0xd4/0xd8
[   32.078736]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   32.078781]  kmalloc_track_caller_oob_right+0x184/0x488
[   32.078823]  kunit_try_run_case+0x170/0x3f0
[   32.078859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.078899]  kthread+0x328/0x630
[   32.078937]  ret_from_fork+0x10/0x20
[   32.078972] 
[   32.078991] The buggy address belongs to the object at fff00000c9726300
[   32.078991]  which belongs to the cache kmalloc-128 of size 128
[   32.079045] The buggy address is located 0 bytes to the right of
[   32.079045]  allocated 120-byte region [fff00000c9726300, fff00000c9726378)
[   32.079105] 
[   32.079124] The buggy address belongs to the physical page:
[   32.079156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.079203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.079247] page_type: f5(slab)
[   32.079283] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.079331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.079369] page dumped because: kasan: bad access detected
[   32.079400] 
[   32.079420] Memory state around the buggy address:
[   32.079451]  fff00000c9726200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.079493]  fff00000c9726280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.079534] >fff00000c9726300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.079569]                                                                 ^
[   32.079607]  fff00000c9726380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.079812]  fff00000c9726400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.079863] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   32.051663] ==================================================================
[   32.052063] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   32.052135] Read of size 1 at addr fff00000c9af1000 by task kunit_try_catch/172
[   32.052293] 
[   32.052329] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.052421] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.052539] Hardware name: linux,dummy-virt (DT)
[   32.052609] Call trace:
[   32.052690]  show_stack+0x20/0x38 (C)
[   32.052817]  dump_stack_lvl+0x8c/0xd0
[   32.052867]  print_report+0x118/0x5e8
[   32.052920]  kasan_report+0xdc/0x128
[   32.053023]  __asan_report_load1_noabort+0x20/0x30
[   32.053337]  kmalloc_node_oob_right+0x2f4/0x330
[   32.053397]  kunit_try_run_case+0x170/0x3f0
[   32.053444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.053495]  kthread+0x328/0x630
[   32.053535]  ret_from_fork+0x10/0x20
[   32.053582] 
[   32.053601] Allocated by task 172:
[   32.053661]  kasan_save_stack+0x3c/0x68
[   32.053702]  kasan_save_track+0x20/0x40
[   32.053780]  kasan_save_alloc_info+0x40/0x58
[   32.053818]  __kasan_kmalloc+0xd4/0xd8
[   32.053851]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   32.053892]  kmalloc_node_oob_right+0xbc/0x330
[   32.053936]  kunit_try_run_case+0x170/0x3f0
[   32.054112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.054217]  kthread+0x328/0x630
[   32.054279]  ret_from_fork+0x10/0x20
[   32.054422] 
[   32.054440] The buggy address belongs to the object at fff00000c9af0000
[   32.054440]  which belongs to the cache kmalloc-4k of size 4096
[   32.054495] The buggy address is located 0 bytes to the right of
[   32.054495]  allocated 4096-byte region [fff00000c9af0000, fff00000c9af1000)
[   32.054555] 
[   32.054574] The buggy address belongs to the physical page:
[   32.055166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   32.055288] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.055345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.055407] page_type: f5(slab)
[   32.055445] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   32.055492] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   32.055544] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   32.055590] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   32.055636] head: 0bfffe0000000003 ffffc1ffc326bc01 00000000ffffffff 00000000ffffffff
[   32.055989] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   32.056034] page dumped because: kasan: bad access detected
[   32.056063] 
[   32.056082] Memory state around the buggy address:
[   32.056114]  fff00000c9af0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.056156]  fff00000c9af0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.056197] >fff00000c9af1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.056233]                    ^
[   32.056260]  fff00000c9af1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.056300]  fff00000c9af1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.056335] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  112.872657] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/690
[  112.876079] Modules linked in:
[  112.878854] CPU: 0 UID: 0 PID: 690 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[  112.880568] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  112.881090] Hardware name: linux,dummy-virt (DT)
[  112.881292] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  112.881560] pc : intlog10+0x38/0x48
[  112.882004] lr : intlog10_test+0xe4/0x200
[  112.882433] sp : ffff8000823f7c10
[  112.882808] x29: ffff8000823f7c90 x28: 0000000000000000 x27: 0000000000000000
[  112.883696] x26: 1ffe000018398081 x25: 0000000000000000 x24: ffff8000823f7ce0
[  112.884576] x23: ffff8000823f7d00 x22: 0000000000000000 x21: 1ffff0001047ef82
[  112.885097] x20: ffff9501ed262020 x19: ffff800080087990 x18: 0000000095a87931
[  112.885600] x17: 00000000f852d050 x16: fff00000c5e0303c x15: fff00000ff616b48
[  112.886402] x14: 0000000000018fff x13: 1ffe00001b48d9dd x12: ffff72a03e22d389
[  112.887151] x11: 1ffff2a03e22d388 x10: ffff72a03e22d388 x9 : ffff9501ea85ac0c
[  112.887940] x8 : ffff9501f1169c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  112.888764] x5 : ffff70001047ef82 x4 : 1ffff00010010f3b x3 : 1ffff2a03da4c404
[  112.889481] x2 : 1ffff2a03da4c404 x1 : 0000000000000003 x0 : 0000000000000000
[  112.889841] Call trace:
[  112.890405]  intlog10+0x38/0x48 (P)
[  112.890831]  kunit_try_run_case+0x170/0x3f0
[  112.891366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.892007]  kthread+0x328/0x630
[  112.892392]  ret_from_fork+0x10/0x20
[  112.892790] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  112.821254] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/672
[  112.823366] Modules linked in:
[  112.823729] CPU: 0 UID: 0 PID: 672 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[  112.825185] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  112.825881] Hardware name: linux,dummy-virt (DT)
[  112.826467] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  112.827287] pc : intlog2+0xd8/0xf8
[  112.827877] lr : intlog2_test+0xe4/0x200
[  112.828378] sp : ffff800082307c10
[  112.828742] x29: ffff800082307c90 x28: 0000000000000000 x27: 0000000000000000
[  112.829629] x26: 1ffe000018f37461 x25: 0000000000000000 x24: ffff800082307ce0
[  112.830571] x23: ffff800082307d00 x22: 0000000000000000 x21: 1ffff00010460f82
[  112.831473] x20: ffff9501ed261f20 x19: ffff800080087990 x18: 00000000a79f54b9
[  112.832361] x17: 0000000012bb99d2 x16: fff00000c5e0303c x15: 00000000c5b604d8
[  112.833242] x14: 00000000f1f1f1f1 x13: 1ffe00001b48d9dd x12: ffff72a03e22d389
[  112.833597] x11: 1ffff2a03e22d388 x10: ffff72a03e22d388 x9 : ffff9501ea85ae0c
[  112.833955] x8 : ffff9501f1169c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  112.834296] x5 : ffff700010460f82 x4 : 1ffff00010010f3b x3 : 1ffff2a03da4c3e4
[  112.834635] x2 : 1ffff2a03da4c3e4 x1 : 0000000000000003 x0 : 0000000000000000
[  112.835458] Call trace:
[  112.835780]  intlog2+0xd8/0xf8 (P)
[  112.836268]  kunit_try_run_case+0x170/0x3f0
[  112.836856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.837506]  kthread+0x328/0x630
[  112.837975]  ret_from_fork+0x10/0x20
[  112.838486] ---[ end trace 0000000000000000 ]---