Hay
Date
May 15, 2025, 10:38 a.m.
Failure - log-parser-test - kfence-bug-kfence-memory-corruption-in-test_corruption KNOWN ISSUE - log-parser-test/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
[   71.156299] ==================================================================
[   71.156417] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   71.156417] 
[   71.156545] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#138):
[   71.156705]  test_corruption+0x284/0x378
[   71.160252]  kunit_try_run_case+0x170/0x3f0
[   71.164419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.169888]  kthread+0x328/0x630
[   71.173099]  ret_from_fork+0x10/0x20
[   71.176658] 
[   71.178137] kfence-#138: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   71.178137] 
[   71.187771] allocated by task 356 on cpu 6 at 71.156241s (0.031528s ago):
[   71.194553]  test_alloc+0x29c/0x628
[   71.198012]  test_corruption+0x198/0x378
[   71.201918]  kunit_try_run_case+0x170/0x3f0
[   71.206085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.211553]  kthread+0x328/0x630
[   71.214765]  ret_from_fork+0x10/0x20
[   71.218324] 
[   71.219805] freed by task 356 on cpu 6 at 71.156256s (0.063545s ago):
[   71.226238]  test_corruption+0x284/0x378
[   71.230129]  kunit_try_run_case+0x170/0x3f0
[   71.234296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.239765]  kthread+0x328/0x630
[   71.242977]  ret_from_fork+0x10/0x20
[   71.246536] 
[   71.248021] CPU: 6 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   71.259130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.263290] Hardware name: WinLink E850-96 board (DT)
[   71.268326] ==================================================================
[   71.376295] ==================================================================
[   71.376416] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   71.376416] 
[   71.376547] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#140):
[   71.378950]  test_corruption+0x120/0x378
[   71.382856]  kunit_try_run_case+0x170/0x3f0
[   71.387023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.392492]  kthread+0x328/0x630
[   71.395704]  ret_from_fork+0x10/0x20
[   71.399264] 
[   71.400742] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   71.400742] 
[   71.409856] allocated by task 358 on cpu 6 at 71.376236s (0.033617s ago):
[   71.416640]  test_alloc+0x230/0x628
[   71.420096]  test_corruption+0xdc/0x378
[   71.423915]  kunit_try_run_case+0x170/0x3f0
[   71.428082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.433551]  kthread+0x328/0x630
[   71.436762]  ret_from_fork+0x10/0x20
[   71.440321] 
[   71.441801] freed by task 358 on cpu 6 at 71.376250s (0.065546s ago):
[   71.448237]  test_corruption+0x120/0x378
[   71.452127]  kunit_try_run_case+0x170/0x3f0
[   71.456294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.461762]  kthread+0x328/0x630
[   71.464974]  ret_from_fork+0x10/0x20
[   71.468535] 
[   71.470020] CPU: 6 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   71.481127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.485287] Hardware name: WinLink E850-96 board (DT)
[   71.490324] ==================================================================
[   70.932318] ==================================================================
[   70.932449] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   70.932449] 
[   70.932583] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#136):
[   70.934983]  test_corruption+0x278/0x378
[   70.938888]  kunit_try_run_case+0x170/0x3f0
[   70.943054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.948523]  kthread+0x328/0x630
[   70.951735]  ret_from_fork+0x10/0x20
[   70.955295] 
[   70.956773] kfence-#136: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   70.956773] 
[   70.966407] allocated by task 356 on cpu 6 at 70.932253s (0.034152s ago):
[   70.973192]  test_alloc+0x29c/0x628
[   70.976648]  test_corruption+0xdc/0x378
[   70.980468]  kunit_try_run_case+0x170/0x3f0
[   70.984634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.990102]  kthread+0x328/0x630
[   70.993314]  ret_from_fork+0x10/0x20
[   70.996873] 
[   70.998354] freed by task 356 on cpu 6 at 70.932268s (0.066082s ago):
[   71.004789]  test_corruption+0x278/0x378
[   71.008678]  kunit_try_run_case+0x170/0x3f0
[   71.012845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.018314]  kthread+0x328/0x630
[   71.021526]  ret_from_fork+0x10/0x20
[   71.025086] 
[   71.026571] CPU: 6 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   71.037680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.041839] Hardware name: WinLink E850-96 board (DT)
[   71.046875] ==================================================================
[   71.600301] ==================================================================
[   71.600417] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   71.600417] 
[   71.600544] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#142):
[   71.600701]  test_corruption+0x1d8/0x378
[   71.604253]  kunit_try_run_case+0x170/0x3f0
[   71.608420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.613888]  kthread+0x328/0x630
[   71.617100]  ret_from_fork+0x10/0x20
[   71.620661] 
[   71.622138] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   71.622138] 
[   71.631252] allocated by task 358 on cpu 6 at 71.600242s (0.031007s ago):
[   71.638033]  test_alloc+0x230/0x628
[   71.641492]  test_corruption+0x198/0x378
[   71.645398]  kunit_try_run_case+0x170/0x3f0
[   71.649565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.655034]  kthread+0x328/0x630
[   71.658245]  ret_from_fork+0x10/0x20
[   71.661804] 
[   71.663284] freed by task 358 on cpu 6 at 71.600256s (0.063024s ago):
[   71.669719]  test_corruption+0x1d8/0x378
[   71.673610]  kunit_try_run_case+0x170/0x3f0
[   71.677776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.683245]  kthread+0x328/0x630
[   71.686457]  ret_from_fork+0x10/0x20
[   71.690017] 
[   71.691502] CPU: 6 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   71.702611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.706770] Hardware name: WinLink E850-96 board (DT)
[   71.711807] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-double-free-in-kmem_cache_double_free KNOWN ISSUE - log-parser-test/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
[   33.711297] ==================================================================
[   33.711476] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   33.711602] Free of addr ffff000801ee6000 by task kunit_try_catch/254
[   33.713008] 
[   33.714496] CPU: 6 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   33.714555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.714572] Hardware name: WinLink E850-96 board (DT)
[   33.714594] Call trace:
[   33.714606]  show_stack+0x20/0x38 (C)
[   33.714644]  dump_stack_lvl+0x8c/0xd0
[   33.714677]  print_report+0x118/0x608
[   33.714713]  kasan_report_invalid_free+0xc0/0xe8
[   33.714746]  check_slab_allocation+0xd4/0x108
[   33.714783]  __kasan_slab_pre_free+0x2c/0x48
[   33.714813]  kmem_cache_free+0xf0/0x470
[   33.714846]  kmem_cache_double_free+0x190/0x3c8
[   33.714875]  kunit_try_run_case+0x170/0x3f0
[   33.714910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.714946]  kthread+0x328/0x630
[   33.714980]  ret_from_fork+0x10/0x20
[   33.715015] 
[   33.787572] Allocated by task 254:
[   33.790960]  kasan_save_stack+0x3c/0x68
[   33.794776]  kasan_save_track+0x20/0x40
[   33.798597]  kasan_save_alloc_info+0x40/0x58
[   33.802849]  __kasan_slab_alloc+0xa8/0xb0
[   33.806842]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   33.811443]  kmem_cache_double_free+0x12c/0x3c8
[   33.815957]  kunit_try_run_case+0x170/0x3f0
[   33.820123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.825592]  kthread+0x328/0x630
[   33.828803]  ret_from_fork+0x10/0x20
[   33.832362] 
[   33.833839] Freed by task 254:
[   33.836877]  kasan_save_stack+0x3c/0x68
[   33.840696]  kasan_save_track+0x20/0x40
[   33.844515]  kasan_save_free_info+0x4c/0x78
[   33.848681]  __kasan_slab_free+0x6c/0x98
[   33.852589]  kmem_cache_free+0x260/0x470
[   33.856494]  kmem_cache_double_free+0x140/0x3c8
[   33.861008]  kunit_try_run_case+0x170/0x3f0
[   33.865175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.870643]  kthread+0x328/0x630
[   33.873855]  ret_from_fork+0x10/0x20
[   33.877414] 
[   33.878891] The buggy address belongs to the object at ffff000801ee6000
[   33.878891]  which belongs to the cache test_cache of size 200
[   33.891304] The buggy address is located 0 bytes inside of
[   33.891304]  200-byte region [ffff000801ee6000, ffff000801ee60c8)
[   33.902847] 
[   33.904327] The buggy address belongs to the physical page:
[   33.909883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ee6
[   33.917868] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.925507] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.932449] page_type: f5(slab)
[   33.935587] raw: 0bfffe0000000040 ffff000801ee4000 dead000000000122 0000000000000000
[   33.943305] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.951032] head: 0bfffe0000000040 ffff000801ee4000 dead000000000122 0000000000000000
[   33.958843] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.966656] head: 0bfffe0000000001 fffffdffe007b981 00000000ffffffff 00000000ffffffff
[   33.974467] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.982273] page dumped because: kasan: bad access detected
[   33.987828] 
[   33.989304] Memory state around the buggy address:
[   33.994086]  ffff000801ee5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.001287]  ffff000801ee5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.008494] >ffff000801ee6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.015693]                    ^
[   34.018908]  ffff000801ee6080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   34.026113]  ffff000801ee6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.033316] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
[   26.186501] ==================================================================
[   26.193607] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   26.200198] Read of size 1 at addr ffff0008034c8a00 by task kunit_try_catch/209
[   26.207489] 
[   26.208971] CPU: 7 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   26.209020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.209035] Hardware name: WinLink E850-96 board (DT)
[   26.209054] Call trace:
[   26.209068]  show_stack+0x20/0x38 (C)
[   26.209099]  dump_stack_lvl+0x8c/0xd0
[   26.209130]  print_report+0x118/0x608
[   26.209163]  kasan_report+0xdc/0x128
[   26.209192]  __asan_report_load1_noabort+0x20/0x30
[   26.209225]  krealloc_uaf+0x4c8/0x520
[   26.209251]  kunit_try_run_case+0x170/0x3f0
[   26.209280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.209312]  kthread+0x328/0x630
[   26.209344]  ret_from_fork+0x10/0x20
[   26.209374] 
[   26.272505] Allocated by task 209:
[   26.275892]  kasan_save_stack+0x3c/0x68
[   26.279710]  kasan_save_track+0x20/0x40
[   26.283529]  kasan_save_alloc_info+0x40/0x58
[   26.287783]  __kasan_kmalloc+0xd4/0xd8
[   26.291515]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.296029]  krealloc_uaf+0xc8/0x520
[   26.299588]  kunit_try_run_case+0x170/0x3f0
[   26.303754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.309223]  kthread+0x328/0x630
[   26.312435]  ret_from_fork+0x10/0x20
[   26.315994] 
[   26.317470] Freed by task 209:
[   26.320509]  kasan_save_stack+0x3c/0x68
[   26.324327]  kasan_save_track+0x20/0x40
[   26.328147]  kasan_save_free_info+0x4c/0x78
[   26.332313]  __kasan_slab_free+0x6c/0x98
[   26.336220]  kfree+0x214/0x3c8
[   26.339258]  krealloc_uaf+0x12c/0x520
[   26.342903]  kunit_try_run_case+0x170/0x3f0
[   26.347070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.352539]  kthread+0x328/0x630
[   26.355750]  ret_from_fork+0x10/0x20
[   26.359310] 
[   26.360787] The buggy address belongs to the object at ffff0008034c8a00
[   26.360787]  which belongs to the cache kmalloc-256 of size 256
[   26.373287] The buggy address is located 0 bytes inside of
[   26.373287]  freed 256-byte region [ffff0008034c8a00, ffff0008034c8b00)
[   26.385351] 
[   26.386828] The buggy address belongs to the physical page:
[   26.392385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834c8
[   26.400368] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.408008] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.414951] page_type: f5(slab)
[   26.418084] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.425808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.433534] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.441346] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.449159] head: 0bfffe0000000002 fffffdffe00d3201 00000000ffffffff 00000000ffffffff
[   26.456971] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.464778] page dumped because: kasan: bad access detected
[   26.470332] 
[   26.471807] Memory state around the buggy address:
[   26.476586]  ffff0008034c8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.483790]  ffff0008034c8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.490995] >ffff0008034c8a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.498196]                    ^
[   26.501412]  ffff0008034c8a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.508616]  ffff0008034c8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.515818] ==================================================================
[   25.844008] ==================================================================
[   25.853942] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   25.860534] Read of size 1 at addr ffff0008034c8a00 by task kunit_try_catch/209
[   25.867825] 
[   25.869310] CPU: 7 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   25.869366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.869384] Hardware name: WinLink E850-96 board (DT)
[   25.869405] Call trace:
[   25.869419]  show_stack+0x20/0x38 (C)
[   25.869454]  dump_stack_lvl+0x8c/0xd0
[   25.869486]  print_report+0x118/0x608
[   25.869518]  kasan_report+0xdc/0x128
[   25.869547]  __kasan_check_byte+0x54/0x70
[   25.869578]  krealloc_noprof+0x44/0x360
[   25.869612]  krealloc_uaf+0x180/0x520
[   25.869639]  kunit_try_run_case+0x170/0x3f0
[   25.869671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.869703]  kthread+0x328/0x630
[   25.869737]  ret_from_fork+0x10/0x20
[   25.869771] 
[   25.935878] Allocated by task 209:
[   25.939267]  kasan_save_stack+0x3c/0x68
[   25.943083]  kasan_save_track+0x20/0x40
[   25.946904]  kasan_save_alloc_info+0x40/0x58
[   25.951156]  __kasan_kmalloc+0xd4/0xd8
[   25.954888]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.959402]  krealloc_uaf+0xc8/0x520
[   25.962961]  kunit_try_run_case+0x170/0x3f0
[   25.967128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.972597]  kthread+0x328/0x630
[   25.975808]  ret_from_fork+0x10/0x20
[   25.979367] 
[   25.980844] Freed by task 209:
[   25.983884]  kasan_save_stack+0x3c/0x68
[   25.987701]  kasan_save_track+0x20/0x40
[   25.991520]  kasan_save_free_info+0x4c/0x78
[   25.995686]  __kasan_slab_free+0x6c/0x98
[   25.999593]  kfree+0x214/0x3c8
[   26.002631]  krealloc_uaf+0x12c/0x520
[   26.006276]  kunit_try_run_case+0x170/0x3f0
[   26.010443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.015912]  kthread+0x328/0x630
[   26.019124]  ret_from_fork+0x10/0x20
[   26.022682] 
[   26.024161] The buggy address belongs to the object at ffff0008034c8a00
[   26.024161]  which belongs to the cache kmalloc-256 of size 256
[   26.036662] The buggy address is located 0 bytes inside of
[   26.036662]  freed 256-byte region [ffff0008034c8a00, ffff0008034c8b00)
[   26.048725] 
[   26.050203] The buggy address belongs to the physical page:
[   26.055759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834c8
[   26.063744] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.071382] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.078326] page_type: f5(slab)
[   26.081463] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.089181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.096908] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.104719] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.112532] head: 0bfffe0000000002 fffffdffe00d3201 00000000ffffffff 00000000ffffffff
[   26.120344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.128149] page dumped because: kasan: bad access detected
[   26.133705] 
[   26.135180] Memory state around the buggy address:
[   26.139962]  ffff0008034c8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.147164]  ffff0008034c8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.154371] >ffff0008034c8a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.161570]                    ^
[   26.164784]  ffff0008034c8a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.171990]  ffff0008034c8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.179192] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-invalid-read-in-test_invalid_access KNOWN ISSUE - log-parser-test/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
[   75.817964] ==================================================================
[   75.818151] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   75.818151] 
[   75.818304] Invalid read at 0x(____ptrval____):
[   75.819420]  test_invalid_access+0xdc/0x1f0
[   75.823663]  kunit_try_run_case+0x170/0x3f0
[   75.827789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.833252]  kthread+0x328/0x630
[   75.836465]  ret_from_fork+0x10/0x20
[   75.839993] 
[   75.841506] CPU: 0 UID: 0 PID: 376 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   75.852616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.856774] Hardware name: WinLink E850-96 board (DT)
[   75.861812] ==================================================================
Failure - log-parser-test - internal-error-oops-oops-smp KNOWN ISSUE - log-parser-test/internal-error-oops-oops-smp: Failure
[  162.104747] Internal error: Oops: 0000000096000005 [#1]  SMP
[  162.110317] Modules linked in:
[  162.113361] CPU: 1 UID: 0 PID: 577 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[  162.124469] Tainted: [B]=BAD_PAGE, [N]=TEST
[  162.128627] Hardware name: WinLink E850-96 board (DT)
[  162.133664] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  162.140605] pc : kunit_test_null_dereference+0x70/0x170
[  162.145813] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.151629] sp : ffff80008a4f7d30
[  162.154927] x29: ffff80008a4f7d90 x28: 0000000000000000 x27: 0000000000000000
[  162.162045] x26: 1fffe0010007eba1 x25: 0000000000000000 x24: 0000000000000004
[  162.169163] x23: ffff0008003f5d0c x22: ffff80008120e460 x21: ffff0008069ced88
[  162.176281] x20: 1ffff0001149efa6 x19: ffff800087d07990 x18: ffff800087d07b00
[  162.183399] x17: 0000000000000001 x16: ffff00085af42ce8 x15: ffff8000811fec90
[  162.190517] x14: ffff8000808dfd0c x13: 1fffe0010b5e8581 x12: ffff600100c50dc4
[  162.197636] x11: 1fffe00100c50dc3 x10: ffff600100c50dc3 x9 : ffff8000812058c8
[  162.204753] x8 : ffff80008a4f7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  162.211871] x5 : ffff70001149efa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  162.218989] x2 : dfff800000000000 x1 : ffff000806286540 x0 : ffff800087d07990
[  162.226110] Call trace:
[  162.228542]  kunit_test_null_dereference+0x70/0x170 (P)
[  162.233749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.239214]  kthread+0x328/0x630
[  162.242426]  ret_from_fork+0x10/0x20
[  162.246000] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  162.252067] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test - panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block KNOWN ISSUE - log-parser-test/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block: Failure
[  250.890304] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[  250.898545] SMP: stopping secondary CPUs
[  250.902469] Kernel Offset: disabled
[  250.905919] CPU features: 0x0800,00000000,02004ca0,0400721b
[  250.911475] Memory Limit: none
[  250.914546] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-test - kfence-bug-kfence-use-after-free-read-in-test_krealloc KNOWN ISSUE - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
[   99.352323] ==================================================================
[   99.352455] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   99.352455] 
[   99.352596] Use-after-free read at 0x(____ptrval____) (in kfence-#186):
[   99.352704]  test_krealloc+0x51c/0x830
[   99.355855]  kunit_try_run_case+0x170/0x3f0
[   99.360022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.365491]  kthread+0x328/0x630
[   99.368702]  ret_from_fork+0x10/0x20
[   99.372261] 
[   99.373741] kfence-#186: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   99.373741] 
[   99.383374] allocated by task 382 on cpu 0 at 99.352232s (0.031140s ago):
[   99.390161]  test_alloc+0x29c/0x628
[   99.393615]  test_krealloc+0xc0/0x830
[   99.397261]  kunit_try_run_case+0x170/0x3f0
[   99.401428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.406896]  kthread+0x328/0x630
[   99.410108]  ret_from_fork+0x10/0x20
[   99.413668] 
[   99.415145] freed by task 382 on cpu 0 at 99.352262s (0.062880s ago):
[   99.421586]  krealloc_noprof+0x148/0x360
[   99.425472]  test_krealloc+0x1dc/0x830
[   99.429205]  kunit_try_run_case+0x170/0x3f0
[   99.433372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.438842]  kthread+0x328/0x630
[   99.442052]  ret_from_fork+0x10/0x20
[   99.445612] 
[   99.447097] CPU: 0 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   99.458205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   99.462366] Hardware name: WinLink E850-96 board (DT)
[   99.467403] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu KNOWN ISSUE - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
[   99.127957] ==================================================================
[   99.128101] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   99.128101] 
[   99.128259] Use-after-free read at 0x(____ptrval____) (in kfence-#184):
[   99.129156]  test_memcache_typesafe_by_rcu+0x280/0x560
[   99.134277]  kunit_try_run_case+0x170/0x3f0
[   99.138443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.143912]  kthread+0x328/0x630
[   99.147124]  ret_from_fork+0x10/0x20
[   99.150683] 
[   99.152162] kfence-#184: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   99.152162] 
[   99.161275] allocated by task 380 on cpu 1 at 99.092283s (0.068991s ago):
[   99.168061]  test_alloc+0x230/0x628
[   99.171516]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   99.176639]  kunit_try_run_case+0x170/0x3f0
[   99.180804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.186272]  kthread+0x328/0x630
[   99.189484]  ret_from_fork+0x10/0x20
[   99.193043] 
[   99.194521] freed by task 380 on cpu 1 at 99.092298s (0.102221s ago):
[   99.200957]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   99.206064]  kunit_try_run_case+0x170/0x3f0
[   99.210230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.215699]  kthread+0x328/0x630
[   99.218911]  ret_from_fork+0x10/0x20
[   99.222472] 
[   99.223956] CPU: 1 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   99.235064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   99.239224] Hardware name: WinLink E850-96 board (DT)
[   99.244261] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-double-free-in-mempool_double_free_helper KNOWN ISSUE - log-parser-test/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
[   38.259468] ==================================================================
[   38.270208] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   38.277325] Free of addr ffff0008034a0000 by task kunit_try_catch/284
[   38.283746] 
[   38.285232] CPU: 6 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   38.285292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.285310] Hardware name: WinLink E850-96 board (DT)
[   38.285334] Call trace:
[   38.285349]  show_stack+0x20/0x38 (C)
[   38.285385]  dump_stack_lvl+0x8c/0xd0
[   38.285418]  print_report+0x118/0x608
[   38.285455]  kasan_report_invalid_free+0xc0/0xe8
[   38.285490]  __kasan_mempool_poison_pages+0xe0/0xe8
[   38.285523]  mempool_free+0x24c/0x328
[   38.285561]  mempool_double_free_helper+0x150/0x2e8
[   38.285594]  mempool_page_alloc_double_free+0xbc/0x118
[   38.285627]  kunit_try_run_case+0x170/0x3f0
[   38.285661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.285696]  kthread+0x328/0x630
[   38.285731]  ret_from_fork+0x10/0x20
[   38.285767] 
[   38.359876] The buggy address belongs to the physical page:
[   38.365431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834a0
[   38.373416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.379938] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.387656] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.395375] page dumped because: kasan: bad access detected
[   38.400930] 
[   38.402406] Memory state around the buggy address:
[   38.407188]  ffff00080349ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.414389]  ffff00080349ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.421595] >ffff0008034a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.428795]                    ^
[   38.432010]  ffff0008034a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.439215]  ffff0008034a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.446417] ==================================================================
[   38.021360] ==================================================================
[   38.031154] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   38.038265] Free of addr ffff0008067b4000 by task kunit_try_catch/282
[   38.044687] 
[   38.046174] CPU: 7 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   38.046228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.046244] Hardware name: WinLink E850-96 board (DT)
[   38.046264] Call trace:
[   38.046276]  show_stack+0x20/0x38 (C)
[   38.046311]  dump_stack_lvl+0x8c/0xd0
[   38.046346]  print_report+0x118/0x608
[   38.046380]  kasan_report_invalid_free+0xc0/0xe8
[   38.046414]  __kasan_mempool_poison_object+0x14c/0x150
[   38.046448]  mempool_free+0x28c/0x328
[   38.046488]  mempool_double_free_helper+0x150/0x2e8
[   38.046521]  mempool_kmalloc_large_double_free+0xc0/0x118
[   38.046553]  kunit_try_run_case+0x170/0x3f0
[   38.046585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.046620]  kthread+0x328/0x630
[   38.046655]  ret_from_fork+0x10/0x20
[   38.046687] 
[   38.121337] The buggy address belongs to the physical page:
[   38.126893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867b4
[   38.134877] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.142519] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.149460] page_type: f8(unknown)
[   38.152857] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.160576] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.168302] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.176113] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.183927] head: 0bfffe0000000002 fffffdffe019ed01 00000000ffffffff 00000000ffffffff
[   38.191739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.199544] page dumped because: kasan: bad access detected
[   38.205100] 
[   38.206575] Memory state around the buggy address:
[   38.211357]  ffff0008067b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.218562]  ffff0008067b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.225763] >ffff0008067b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.232964]                    ^
[   38.236180]  ffff0008067b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.243384]  ffff0008067b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.250587] ==================================================================
[   37.646161] ==================================================================
[   37.655895] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   37.663012] Free of addr ffff000801edec00 by task kunit_try_catch/280
[   37.669432] 
[   37.670919] CPU: 6 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   37.670981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.670998] Hardware name: WinLink E850-96 board (DT)
[   37.671021] Call trace:
[   37.671035]  show_stack+0x20/0x38 (C)
[   37.671072]  dump_stack_lvl+0x8c/0xd0
[   37.671108]  print_report+0x118/0x608
[   37.671143]  kasan_report_invalid_free+0xc0/0xe8
[   37.671180]  check_slab_allocation+0xd4/0x108
[   37.671212]  __kasan_mempool_poison_object+0x78/0x150
[   37.671250]  mempool_free+0x28c/0x328
[   37.671287]  mempool_double_free_helper+0x150/0x2e8
[   37.671317]  mempool_kmalloc_double_free+0xc0/0x118
[   37.671349]  kunit_try_run_case+0x170/0x3f0
[   37.671382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.671417]  kthread+0x328/0x630
[   37.671452]  ret_from_fork+0x10/0x20
[   37.671489] 
[   37.749813] Allocated by task 280:
[   37.753200]  kasan_save_stack+0x3c/0x68
[   37.757017]  kasan_save_track+0x20/0x40
[   37.760836]  kasan_save_alloc_info+0x40/0x58
[   37.765089]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.770384]  remove_element+0x130/0x1f8
[   37.774204]  mempool_alloc_preallocated+0x58/0xc0
[   37.778891]  mempool_double_free_helper+0x94/0x2e8
[   37.783665]  mempool_kmalloc_double_free+0xc0/0x118
[   37.788527]  kunit_try_run_case+0x170/0x3f0
[   37.792693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.798161]  kthread+0x328/0x630
[   37.801373]  ret_from_fork+0x10/0x20
[   37.804932] 
[   37.806410] Freed by task 280:
[   37.809449]  kasan_save_stack+0x3c/0x68
[   37.813266]  kasan_save_track+0x20/0x40
[   37.817085]  kasan_save_free_info+0x4c/0x78
[   37.821252]  __kasan_mempool_poison_object+0xc0/0x150
[   37.826286]  mempool_free+0x28c/0x328
[   37.829932]  mempool_double_free_helper+0x100/0x2e8
[   37.834793]  mempool_kmalloc_double_free+0xc0/0x118
[   37.839654]  kunit_try_run_case+0x170/0x3f0
[   37.843822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.849289]  kthread+0x328/0x630
[   37.852501]  ret_from_fork+0x10/0x20
[   37.856060] 
[   37.857538] The buggy address belongs to the object at ffff000801edec00
[   37.857538]  which belongs to the cache kmalloc-128 of size 128
[   37.870039] The buggy address is located 0 bytes inside of
[   37.870039]  128-byte region [ffff000801edec00, ffff000801edec80)
[   37.881580] 
[   37.883061] The buggy address belongs to the physical page:
[   37.888616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede
[   37.896599] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.904240] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.911183] page_type: f5(slab)
[   37.914319] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.922038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.929765] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.937576] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.945389] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff
[   37.953201] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.961006] page dumped because: kasan: bad access detected
[   37.966562] 
[   37.968037] Memory state around the buggy address:
[   37.972819]  ffff000801edeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.980022]  ffff000801edeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.987225] >ffff000801edec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.994426]                    ^
[   37.997641]  ffff000801edec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.004847]  ffff000801eded00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.012049] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-test/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
[   36.901109] ==================================================================
[   36.910338] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   36.917014] Read of size 1 at addr ffff0008026a0000 by task kunit_try_catch/274
[   36.924305] 
[   36.925791] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   36.925854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.925872] Hardware name: WinLink E850-96 board (DT)
[   36.925893] Call trace:
[   36.925905]  show_stack+0x20/0x38 (C)
[   36.925942]  dump_stack_lvl+0x8c/0xd0
[   36.925974]  print_report+0x118/0x608
[   36.926006]  kasan_report+0xdc/0x128
[   36.926040]  __asan_report_load1_noabort+0x20/0x30
[   36.926077]  mempool_uaf_helper+0x314/0x340
[   36.926105]  mempool_kmalloc_large_uaf+0xc4/0x120
[   36.926135]  kunit_try_run_case+0x170/0x3f0
[   36.926167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.926203]  kthread+0x328/0x630
[   36.926237]  ret_from_fork+0x10/0x20
[   36.926273] 
[   36.994531] The buggy address belongs to the physical page:
[   37.000087] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8826a0
[   37.008071] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.015710] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.022654] page_type: f8(unknown)
[   37.026052] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.033770] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.041496] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.049307] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.057121] head: 0bfffe0000000002 fffffdffe009a801 00000000ffffffff 00000000ffffffff
[   37.064933] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   37.072739] page dumped because: kasan: bad access detected
[   37.078294] 
[   37.079769] Memory state around the buggy address:
[   37.084550]  ffff00080269ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.091753]  ffff00080269ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.098959] >ffff0008026a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.106158]                    ^
[   37.109374]  ffff0008026a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.116578]  ffff0008026a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.123781] ==================================================================
[   37.462727] ==================================================================
[   37.466748] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   37.473428] Read of size 1 at addr ffff0008067b4000 by task kunit_try_catch/278
[   37.480720] 
[   37.482206] CPU: 7 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   37.482270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.482287] Hardware name: WinLink E850-96 board (DT)
[   37.482309] Call trace:
[   37.482323]  show_stack+0x20/0x38 (C)
[   37.482363]  dump_stack_lvl+0x8c/0xd0
[   37.482396]  print_report+0x118/0x608
[   37.482431]  kasan_report+0xdc/0x128
[   37.482462]  __asan_report_load1_noabort+0x20/0x30
[   37.482503]  mempool_uaf_helper+0x314/0x340
[   37.482530]  mempool_page_alloc_uaf+0xc0/0x118
[   37.482561]  kunit_try_run_case+0x170/0x3f0
[   37.482595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.482632]  kthread+0x328/0x630
[   37.482666]  ret_from_fork+0x10/0x20
[   37.482700] 
[   37.550686] The buggy address belongs to the physical page:
[   37.556242] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867b4
[   37.564227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.570748] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.578466] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.586187] page dumped because: kasan: bad access detected
[   37.591741] 
[   37.593216] Memory state around the buggy address:
[   37.598001]  ffff0008067b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.605200]  ffff0008067b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.612406] >ffff0008067b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.619605]                    ^
[   37.622821]  ffff0008067b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.630025]  ffff0008067b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.637228] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write KNOWN ISSUE - log-parser-test/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
[   75.464327] ==================================================================
[   75.464451] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   75.464451] 
[   75.464596] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#179):
[   75.468288]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   75.473496]  kunit_try_run_case+0x170/0x3f0
[   75.477663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.483131]  kthread+0x328/0x630
[   75.486343]  ret_from_fork+0x10/0x20
[   75.489903] 
[   75.491380] kfence-#179: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   75.491380] 
[   75.501017] allocated by task 370 on cpu 7 at 75.464262s (0.036753s ago):
[   75.507799]  test_alloc+0x29c/0x628
[   75.511256]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   75.516378]  kunit_try_run_case+0x170/0x3f0
[   75.520544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.526013]  kthread+0x328/0x630
[   75.529224]  ret_from_fork+0x10/0x20
[   75.532784] 
[   75.534262] freed by task 370 on cpu 7 at 75.464277s (0.069982s ago):
[   75.540697]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   75.545891]  kunit_try_run_case+0x170/0x3f0
[   75.550058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.555526]  kthread+0x328/0x630
[   75.558738]  ret_from_fork+0x10/0x20
[   75.562300] 
[   75.563783] CPU: 7 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   75.574892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.579052] Hardware name: WinLink E850-96 board (DT)
[   75.584088] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read KNOWN ISSUE - log-parser-test/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
[   75.152275] ==================================================================
[   75.152415] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   75.152415] 
[   75.152575] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#176):
[   75.154249]  test_kmalloc_aligned_oob_read+0x238/0x468
[   75.159371]  kunit_try_run_case+0x170/0x3f0
[   75.163537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.169006]  kthread+0x328/0x630
[   75.172218]  ret_from_fork+0x10/0x20
[   75.175777] 
[   75.177256] kfence-#176: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   75.177256] 
[   75.186891] allocated by task 368 on cpu 1 at 75.152237s (0.034651s ago):
[   75.193675]  test_alloc+0x29c/0x628
[   75.197131]  test_kmalloc_aligned_oob_read+0x100/0x468
[   75.202254]  kunit_try_run_case+0x170/0x3f0
[   75.206419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.211887]  kthread+0x328/0x630
[   75.215099]  ret_from_fork+0x10/0x20
[   75.218659] 
[   75.220145] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   75.231252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.235412] Hardware name: WinLink E850-96 board (DT)
[   75.240449] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free KNOWN ISSUE - log-parser-test/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
[   70.512305] ==================================================================
[   70.512430] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   70.512430] 
[   70.512567] Invalid free of 0x(____ptrval____) (in kfence-#132):
[   70.512670]  test_invalid_addr_free+0x1ac/0x238
[   70.516178]  kunit_try_run_case+0x170/0x3f0
[   70.520345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.525813]  kthread+0x328/0x630
[   70.529025]  ret_from_fork+0x10/0x20
[   70.532585] 
[   70.534064] kfence-#132: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   70.534064] 
[   70.543697] allocated by task 352 on cpu 6 at 70.512253s (0.031442s ago):
[   70.550479]  test_alloc+0x29c/0x628
[   70.553938]  test_invalid_addr_free+0xd4/0x238
[   70.558365]  kunit_try_run_case+0x170/0x3f0
[   70.562531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.568000]  kthread+0x328/0x630
[   70.571212]  ret_from_fork+0x10/0x20
[   70.574773] 
[   70.576258] CPU: 6 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   70.587367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.591526] Hardware name: WinLink E850-96 board (DT)
[   70.596562] ==================================================================
[   70.720298] ==================================================================
[   70.720420] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   70.720420] 
[   70.720550] Invalid free of 0x(____ptrval____) (in kfence-#134):
[   70.720652]  test_invalid_addr_free+0xec/0x238
[   70.723996]  kunit_try_run_case+0x170/0x3f0
[   70.728162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.733631]  kthread+0x328/0x630
[   70.736843]  ret_from_fork+0x10/0x20
[   70.740403] 
[   70.741881] kfence-#134: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   70.741881] 
[   70.750995] allocated by task 354 on cpu 7 at 70.720249s (0.030744s ago):
[   70.757776]  test_alloc+0x230/0x628
[   70.761234]  test_invalid_addr_free+0xd4/0x238
[   70.765662]  kunit_try_run_case+0x170/0x3f0
[   70.769828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.775298]  kthread+0x328/0x630
[   70.778509]  ret_from_fork+0x10/0x20
[   70.782069] 
[   70.783556] CPU: 7 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   70.794664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.798822] Hardware name: WinLink E850-96 board (DT)
[   70.803859] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-invalid-free-in-test_double_free KNOWN ISSUE - log-parser-test/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
[   70.072334] ==================================================================
[   70.072459] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   70.072459] 
[   70.072587] Invalid free of 0x(____ptrval____) (in kfence-#128):
[   70.072687]  test_double_free+0x1bc/0x238
[   70.075165]  kunit_try_run_case+0x170/0x3f0
[   70.079332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.084801]  kthread+0x328/0x630
[   70.088012]  ret_from_fork+0x10/0x20
[   70.091573] 
[   70.093051] kfence-#128: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   70.093051] 
[   70.102685] allocated by task 348 on cpu 6 at 70.072258s (0.030424s ago):
[   70.109468]  test_alloc+0x29c/0x628
[   70.112925]  test_double_free+0xd4/0x238
[   70.116833]  kunit_try_run_case+0x170/0x3f0
[   70.120998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.126467]  kthread+0x328/0x630
[   70.129678]  ret_from_fork+0x10/0x20
[   70.133237] 
[   70.134716] freed by task 348 on cpu 6 at 70.072274s (0.062440s ago):
[   70.141151]  test_double_free+0x1ac/0x238
[   70.145130]  kunit_try_run_case+0x170/0x3f0
[   70.149296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.154765]  kthread+0x328/0x630
[   70.157977]  ret_from_fork+0x10/0x20
[   70.161537] 
[   70.163023] CPU: 6 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   70.174131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.178290] Hardware name: WinLink E850-96 board (DT)
[   70.183327] ==================================================================
[   70.292338] ==================================================================
[   70.292473] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   70.292473] 
[   70.292597] Invalid free of 0x(____ptrval____) (in kfence-#130):
[   70.292703]  test_double_free+0x100/0x238
[   70.295180]  kunit_try_run_case+0x170/0x3f0
[   70.299346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.304815]  kthread+0x328/0x630
[   70.308027]  ret_from_fork+0x10/0x20
[   70.311586] 
[   70.313064] kfence-#130: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   70.313064] 
[   70.322179] allocated by task 350 on cpu 0 at 70.292262s (0.029915s ago):
[   70.328960]  test_alloc+0x230/0x628
[   70.332419]  test_double_free+0xd4/0x238
[   70.336325]  kunit_try_run_case+0x170/0x3f0
[   70.340492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.345961]  kthread+0x328/0x630
[   70.349172]  ret_from_fork+0x10/0x20
[   70.352731] 
[   70.354211] freed by task 350 on cpu 0 at 70.292278s (0.061929s ago):
[   70.360646]  test_double_free+0xf0/0x238
[   70.364537]  kunit_try_run_case+0x170/0x3f0
[   70.368703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.374172]  kthread+0x328/0x630
[   70.377384]  ret_from_fork+0x10/0x20
[   70.380946] 
[   70.382429] CPU: 0 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   70.393538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.397697] Hardware name: WinLink E850-96 board (DT)
[   70.402733] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read KNOWN ISSUE - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
[   69.640293] ==================================================================
[   69.640429] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   69.640429] 
[   69.640585] Use-after-free read at 0x(____ptrval____) (in kfence-#124):
[   69.641052]  test_use_after_free_read+0x114/0x248
[   69.645740]  kunit_try_run_case+0x170/0x3f0
[   69.649907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.655375]  kthread+0x328/0x630
[   69.658587]  ret_from_fork+0x10/0x20
[   69.662146] 
[   69.663625] kfence-#124: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   69.663625] 
[   69.672739] allocated by task 342 on cpu 3 at 69.640234s (0.032502s ago):
[   69.679524]  test_alloc+0x230/0x628
[   69.682979]  test_use_after_free_read+0xd0/0x248
[   69.687580]  kunit_try_run_case+0x170/0x3f0
[   69.691747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.697215]  kthread+0x328/0x630
[   69.700426]  ret_from_fork+0x10/0x20
[   69.703985] 
[   69.705464] freed by task 342 on cpu 3 at 69.640251s (0.065210s ago):
[   69.711903]  test_use_after_free_read+0xf0/0x248
[   69.716485]  kunit_try_run_case+0x170/0x3f0
[   69.720652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.726120]  kthread+0x328/0x630
[   69.729332]  ret_from_fork+0x10/0x20
[   69.732893] 
[   69.734378] CPU: 3 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   69.745486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.749645] Hardware name: WinLink E850-96 board (DT)
[   69.754683] ==================================================================
[   69.416308] ==================================================================
[   69.416435] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   69.416435] 
[   69.416589] Use-after-free read at 0x(____ptrval____) (in kfence-#122):
[   69.417058]  test_use_after_free_read+0x114/0x248
[   69.421745]  kunit_try_run_case+0x170/0x3f0
[   69.425911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.431380]  kthread+0x328/0x630
[   69.434592]  ret_from_fork+0x10/0x20
[   69.438151] 
[   69.439630] kfence-#122: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   69.439630] 
[   69.449265] allocated by task 340 on cpu 6 at 69.416253s (0.033010s ago):
[   69.456050]  test_alloc+0x29c/0x628
[   69.459504]  test_use_after_free_read+0xd0/0x248
[   69.464106]  kunit_try_run_case+0x170/0x3f0
[   69.468272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.473740]  kthread+0x328/0x630
[   69.476952]  ret_from_fork+0x10/0x20
[   69.480513] 
[   69.481989] freed by task 340 on cpu 6 at 69.416268s (0.065719s ago):
[   69.488428]  test_use_after_free_read+0x1c0/0x248
[   69.493098]  kunit_try_run_case+0x170/0x3f0
[   69.497265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.502733]  kthread+0x328/0x630
[   69.505945]  ret_from_fork+0x10/0x20
[   69.509505] 
[   69.510991] CPU: 6 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   69.522099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.526258] Hardware name: WinLink E850-96 board (DT)
[   69.531294] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
[   37.133333] ==================================================================
[   37.142710] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   37.149823] Read of size 1 at addr ffff0008065c6240 by task kunit_try_catch/276
[   37.157113] 
[   37.158597] CPU: 5 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   37.158654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.158673] Hardware name: WinLink E850-96 board (DT)
[   37.158693] Call trace:
[   37.158705]  show_stack+0x20/0x38 (C)
[   37.158743]  dump_stack_lvl+0x8c/0xd0
[   37.158777]  print_report+0x118/0x608
[   37.158813]  kasan_report+0xdc/0x128
[   37.158844]  __asan_report_load1_noabort+0x20/0x30
[   37.158881]  mempool_uaf_helper+0x314/0x340
[   37.158907]  mempool_slab_uaf+0xc0/0x118
[   37.158940]  kunit_try_run_case+0x170/0x3f0
[   37.158974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.159008]  kthread+0x328/0x630
[   37.159044]  ret_from_fork+0x10/0x20
[   37.159081] 
[   37.226558] Allocated by task 276:
[   37.229944]  kasan_save_stack+0x3c/0x68
[   37.233761]  kasan_save_track+0x20/0x40
[   37.237580]  kasan_save_alloc_info+0x40/0x58
[   37.241833]  __kasan_mempool_unpoison_object+0xbc/0x180
[   37.247041]  remove_element+0x16c/0x1f8
[   37.250861]  mempool_alloc_preallocated+0x58/0xc0
[   37.255548]  mempool_uaf_helper+0xa4/0x340
[   37.259628]  mempool_slab_uaf+0xc0/0x118
[   37.263534]  kunit_try_run_case+0x170/0x3f0
[   37.267700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.273169]  kthread+0x328/0x630
[   37.276381]  ret_from_fork+0x10/0x20
[   37.279940] 
[   37.281417] Freed by task 276:
[   37.284454]  kasan_save_stack+0x3c/0x68
[   37.288274]  kasan_save_track+0x20/0x40
[   37.292092]  kasan_save_free_info+0x4c/0x78
[   37.296260]  __kasan_mempool_poison_object+0xc0/0x150
[   37.301294]  mempool_free+0x28c/0x328
[   37.304940]  mempool_uaf_helper+0x104/0x340
[   37.309107]  mempool_slab_uaf+0xc0/0x118
[   37.313012]  kunit_try_run_case+0x170/0x3f0
[   37.317179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.322648]  kthread+0x328/0x630
[   37.325860]  ret_from_fork+0x10/0x20
[   37.329419] 
[   37.330896] The buggy address belongs to the object at ffff0008065c6240
[   37.330896]  which belongs to the cache test_cache of size 123
[   37.343309] The buggy address is located 0 bytes inside of
[   37.343309]  freed 123-byte region [ffff0008065c6240, ffff0008065c62bb)
[   37.355373] 
[   37.356853] The buggy address belongs to the physical page:
[   37.362408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865c6
[   37.370393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.376903] page_type: f5(slab)
[   37.380039] raw: 0bfffe0000000000 ffff000801eae000 dead000000000122 0000000000000000
[   37.387758] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   37.395477] page dumped because: kasan: bad access detected
[   37.401032] 
[   37.402507] Memory state around the buggy address:
[   37.407288]  ffff0008065c6100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.414491]  ffff0008065c6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.421695] >ffff0008065c6200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   37.428896]                                            ^
[   37.434195]  ffff0008065c6280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.441400]  ffff0008065c6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.448602] ==================================================================
[   36.546600] ==================================================================
[   36.547839] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   36.554954] Read of size 1 at addr ffff000801f1c700 by task kunit_try_catch/272
[   36.562245] 
[   36.563731] CPU: 7 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   36.563794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.563812] Hardware name: WinLink E850-96 board (DT)
[   36.563834] Call trace:
[   36.563850]  show_stack+0x20/0x38 (C)
[   36.563886]  dump_stack_lvl+0x8c/0xd0
[   36.563920]  print_report+0x118/0x608
[   36.563953]  kasan_report+0xdc/0x128
[   36.563982]  __asan_report_load1_noabort+0x20/0x30
[   36.564021]  mempool_uaf_helper+0x314/0x340
[   36.564049]  mempool_kmalloc_uaf+0xc4/0x120
[   36.564077]  kunit_try_run_case+0x170/0x3f0
[   36.564109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.564141]  kthread+0x328/0x630
[   36.564175]  ret_from_fork+0x10/0x20
[   36.564208] 
[   36.631949] Allocated by task 272:
[   36.635336]  kasan_save_stack+0x3c/0x68
[   36.639151]  kasan_save_track+0x20/0x40
[   36.642971]  kasan_save_alloc_info+0x40/0x58
[   36.647224]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.652519]  remove_element+0x130/0x1f8
[   36.656339]  mempool_alloc_preallocated+0x58/0xc0
[   36.661026]  mempool_uaf_helper+0xa4/0x340
[   36.665106]  mempool_kmalloc_uaf+0xc4/0x120
[   36.669274]  kunit_try_run_case+0x170/0x3f0
[   36.673439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.678909]  kthread+0x328/0x630
[   36.682119]  ret_from_fork+0x10/0x20
[   36.685679] 
[   36.687155] Freed by task 272:
[   36.690194]  kasan_save_stack+0x3c/0x68
[   36.694012]  kasan_save_track+0x20/0x40
[   36.697831]  kasan_save_free_info+0x4c/0x78
[   36.701998]  __kasan_mempool_poison_object+0xc0/0x150
[   36.707032]  mempool_free+0x28c/0x328
[   36.710678]  mempool_uaf_helper+0x104/0x340
[   36.714845]  mempool_kmalloc_uaf+0xc4/0x120
[   36.719011]  kunit_try_run_case+0x170/0x3f0
[   36.723179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.728646]  kthread+0x328/0x630
[   36.731858]  ret_from_fork+0x10/0x20
[   36.735417] 
[   36.736895] The buggy address belongs to the object at ffff000801f1c700
[   36.736895]  which belongs to the cache kmalloc-128 of size 128
[   36.749397] The buggy address is located 0 bytes inside of
[   36.749397]  freed 128-byte region [ffff000801f1c700, ffff000801f1c780)
[   36.761459] 
[   36.762938] The buggy address belongs to the physical page:
[   36.768494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c
[   36.776477] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.784116] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.791060] page_type: f5(slab)
[   36.794198] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.801916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.809642] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.817454] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.825267] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff
[   36.833079] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.840884] page dumped because: kasan: bad access detected
[   36.846440] 
[   36.847915] Memory state around the buggy address:
[   36.852699]  ffff000801f1c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.859898]  ffff000801f1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.867104] >ffff000801f1c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.874304]                    ^
[   36.877519]  ffff000801f1c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.884726]  ffff000801f1c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.891927] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
[   35.722626] ==================================================================
[   35.722794] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.722921] Read of size 1 at addr ffff000801adc773 by task kunit_try_catch/266
[   35.729360] 
[   35.730844] CPU: 3 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   35.730902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.730918] Hardware name: WinLink E850-96 board (DT)
[   35.730940] Call trace:
[   35.730960]  show_stack+0x20/0x38 (C)
[   35.730996]  dump_stack_lvl+0x8c/0xd0
[   35.731029]  print_report+0x118/0x608
[   35.731062]  kasan_report+0xdc/0x128
[   35.731093]  __asan_report_load1_noabort+0x20/0x30
[   35.731131]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.731161]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.731192]  kunit_try_run_case+0x170/0x3f0
[   35.731226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.731261]  kthread+0x328/0x630
[   35.731296]  ret_from_fork+0x10/0x20
[   35.731330] 
[   35.800103] Allocated by task 266:
[   35.803490]  kasan_save_stack+0x3c/0x68
[   35.807306]  kasan_save_track+0x20/0x40
[   35.811126]  kasan_save_alloc_info+0x40/0x58
[   35.815379]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.820674]  remove_element+0x130/0x1f8
[   35.824493]  mempool_alloc_preallocated+0x58/0xc0
[   35.829182]  mempool_oob_right_helper+0x98/0x2f0
[   35.833781]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.838469]  kunit_try_run_case+0x170/0x3f0
[   35.842635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.848103]  kthread+0x328/0x630
[   35.851316]  ret_from_fork+0x10/0x20
[   35.854875] 
[   35.856352] The buggy address belongs to the object at ffff000801adc700
[   35.856352]  which belongs to the cache kmalloc-128 of size 128
[   35.868853] The buggy address is located 0 bytes to the right of
[   35.868853]  allocated 115-byte region [ffff000801adc700, ffff000801adc773)
[   35.881784] 
[   35.883263] The buggy address belongs to the physical page:
[   35.888819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881adc
[   35.896804] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.904443] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.911386] page_type: f5(slab)
[   35.914524] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.922241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.929968] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.937779] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.945592] head: 0bfffe0000000001 fffffdffe006b701 00000000ffffffff 00000000ffffffff
[   35.953404] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.961212] page dumped because: kasan: bad access detected
[   35.966765] 
[   35.968241] Memory state around the buggy address:
[   35.973023]  ffff000801adc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.980223]  ffff000801adc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.987430] >ffff000801adc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.994630]                                                              ^
[   36.001491]  ffff000801adc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.008697]  ffff000801adc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.015900] ==================================================================
[   36.024956] ==================================================================
[   36.034827] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   36.042375] Read of size 1 at addr ffff0008067b2001 by task kunit_try_catch/268
[   36.049665] 
[   36.051152] CPU: 7 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   36.051209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.051225] Hardware name: WinLink E850-96 board (DT)
[   36.051246] Call trace:
[   36.051258]  show_stack+0x20/0x38 (C)
[   36.051294]  dump_stack_lvl+0x8c/0xd0
[   36.051324]  print_report+0x118/0x608
[   36.051361]  kasan_report+0xdc/0x128
[   36.051391]  __asan_report_load1_noabort+0x20/0x30
[   36.051430]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.051463]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   36.051498]  kunit_try_run_case+0x170/0x3f0
[   36.051531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.051564]  kthread+0x328/0x630
[   36.051599]  ret_from_fork+0x10/0x20
[   36.051634] 
[   36.120932] The buggy address belongs to the physical page:
[   36.126490] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867b0
[   36.134474] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.142114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.149056] page_type: f8(unknown)
[   36.152453] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.160172] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.167898] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.175710] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.183523] head: 0bfffe0000000002 fffffdffe019ec01 00000000ffffffff 00000000ffffffff
[   36.191335] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.199140] page dumped because: kasan: bad access detected
[   36.204696] 
[   36.206172] Memory state around the buggy address:
[   36.210952]  ffff0008067b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.218154]  ffff0008067b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.225361] >ffff0008067b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.232560]                    ^
[   36.235776]  ffff0008067b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.242981]  ffff0008067b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.250183] ==================================================================
[   36.259805] ==================================================================
[   36.269633] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   36.277180] Read of size 1 at addr ffff0008068622bb by task kunit_try_catch/270
[   36.284471] 
[   36.285957] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   36.286016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.286032] Hardware name: WinLink E850-96 board (DT)
[   36.286053] Call trace:
[   36.286067]  show_stack+0x20/0x38 (C)
[   36.286105]  dump_stack_lvl+0x8c/0xd0
[   36.286136]  print_report+0x118/0x608
[   36.286170]  kasan_report+0xdc/0x128
[   36.286200]  __asan_report_load1_noabort+0x20/0x30
[   36.286237]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.286271]  mempool_slab_oob_right+0xc0/0x118
[   36.286305]  kunit_try_run_case+0x170/0x3f0
[   36.286340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.286374]  kthread+0x328/0x630
[   36.286407]  ret_from_fork+0x10/0x20
[   36.286444] 
[   36.354957] Allocated by task 270:
[   36.358342]  kasan_save_stack+0x3c/0x68
[   36.362160]  kasan_save_track+0x20/0x40
[   36.365978]  kasan_save_alloc_info+0x40/0x58
[   36.370232]  __kasan_mempool_unpoison_object+0xbc/0x180
[   36.375440]  remove_element+0x16c/0x1f8
[   36.379259]  mempool_alloc_preallocated+0x58/0xc0
[   36.383948]  mempool_oob_right_helper+0x98/0x2f0
[   36.388548]  mempool_slab_oob_right+0xc0/0x118
[   36.392975]  kunit_try_run_case+0x170/0x3f0
[   36.397141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.402610]  kthread+0x328/0x630
[   36.405822]  ret_from_fork+0x10/0x20
[   36.409380] 
[   36.410858] The buggy address belongs to the object at ffff000806862240
[   36.410858]  which belongs to the cache test_cache of size 123
[   36.423273] The buggy address is located 0 bytes to the right of
[   36.423273]  allocated 123-byte region [ffff000806862240, ffff0008068622bb)
[   36.436203] 
[   36.437683] The buggy address belongs to the physical page:
[   36.443237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886862
[   36.451223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.457731] page_type: f5(slab)
[   36.460870] raw: 0bfffe0000000000 ffff000802403400 dead000000000122 0000000000000000
[   36.468588] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   36.476306] page dumped because: kasan: bad access detected
[   36.481862] 
[   36.483338] Memory state around the buggy address:
[   36.488118]  ffff000806862180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.495322]  ffff000806862200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   36.502527] >ffff000806862280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   36.509726]                                         ^
[   36.514765]  ffff000806862300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.521969]  ffff000806862380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.529172] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
[   34.835274] ==================================================================
[   34.835453] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   34.835584] Read of size 1 at addr ffff00080241c000 by task kunit_try_catch/260
[   34.839151] 
[   34.840638] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   34.840699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.840715] Hardware name: WinLink E850-96 board (DT)
[   34.840737] Call trace:
[   34.840749]  show_stack+0x20/0x38 (C)
[   34.840789]  dump_stack_lvl+0x8c/0xd0
[   34.840822]  print_report+0x118/0x608
[   34.840855]  kasan_report+0xdc/0x128
[   34.840885]  __kasan_check_byte+0x54/0x70
[   34.840918]  kmem_cache_destroy+0x34/0x218
[   34.840952]  kmem_cache_double_destroy+0x174/0x300
[   34.840981]  kunit_try_run_case+0x170/0x3f0
[   34.841014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.841048]  kthread+0x328/0x630
[   34.841085]  ret_from_fork+0x10/0x20
[   34.841120] 
[   34.908596] Allocated by task 260:
[   34.911983]  kasan_save_stack+0x3c/0x68
[   34.915799]  kasan_save_track+0x20/0x40
[   34.919619]  kasan_save_alloc_info+0x40/0x58
[   34.923872]  __kasan_slab_alloc+0xa8/0xb0
[   34.927866]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   34.932466]  __kmem_cache_create_args+0x178/0x280
[   34.937153]  kmem_cache_double_destroy+0xc0/0x300
[   34.941841]  kunit_try_run_case+0x170/0x3f0
[   34.946007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.951476]  kthread+0x328/0x630
[   34.954687]  ret_from_fork+0x10/0x20
[   34.958247] 
[   34.959724] Freed by task 260:
[   34.962764]  kasan_save_stack+0x3c/0x68
[   34.966580]  kasan_save_track+0x20/0x40
[   34.970399]  kasan_save_free_info+0x4c/0x78
[   34.974566]  __kasan_slab_free+0x6c/0x98
[   34.978472]  kmem_cache_free+0x260/0x470
[   34.982378]  slab_kmem_cache_release+0x38/0x50
[   34.986805]  kmem_cache_release+0x1c/0x30
[   34.990798]  kobject_put+0x17c/0x430
[   34.994359]  sysfs_slab_release+0x1c/0x30
[   34.998350]  kmem_cache_destroy+0x118/0x218
[   35.002517]  kmem_cache_double_destroy+0x128/0x300
[   35.007291]  kunit_try_run_case+0x170/0x3f0
[   35.011457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.016926]  kthread+0x328/0x630
[   35.020137]  ret_from_fork+0x10/0x20
[   35.023697] 
[   35.025175] The buggy address belongs to the object at ffff00080241c000
[   35.025175]  which belongs to the cache kmem_cache of size 208
[   35.037589] The buggy address is located 0 bytes inside of
[   35.037589]  freed 208-byte region [ffff00080241c000, ffff00080241c0d0)
[   35.049651] 
[   35.051131] The buggy address belongs to the physical page:
[   35.056686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88241c
[   35.064670] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.072311] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.079254] page_type: f5(slab)
[   35.082391] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   35.090109] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.097836] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   35.105647] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.113461] head: 0bfffe0000000001 fffffdffe0090701 00000000ffffffff 00000000ffffffff
[   35.121271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.129079] page dumped because: kasan: bad access detected
[   35.134633] 
[   35.136107] Memory state around the buggy address:
[   35.140891]  ffff00080241bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.148091]  ffff00080241bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.155298] >ffff00080241c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.162497]                    ^
[   35.165712]  ffff00080241c080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   35.172917]  ffff00080241c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.180120] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
[   34.440184] ==================================================================
[   34.440370] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   34.440496] Read of size 1 at addr ffff000801f20000 by task kunit_try_catch/258
[   34.443892] 
[   34.445379] CPU: 7 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   34.445436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.445453] Hardware name: WinLink E850-96 board (DT)
[   34.445473] Call trace:
[   34.445485]  show_stack+0x20/0x38 (C)
[   34.445522]  dump_stack_lvl+0x8c/0xd0
[   34.445554]  print_report+0x118/0x608
[   34.445587]  kasan_report+0xdc/0x128
[   34.445618]  __asan_report_load1_noabort+0x20/0x30
[   34.445656]  kmem_cache_rcu_uaf+0x388/0x468
[   34.445685]  kunit_try_run_case+0x170/0x3f0
[   34.445717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.445753]  kthread+0x328/0x630
[   34.445789]  ret_from_fork+0x10/0x20
[   34.445822] 
[   34.509430] Allocated by task 258:
[   34.512817]  kasan_save_stack+0x3c/0x68
[   34.516633]  kasan_save_track+0x20/0x40
[   34.520454]  kasan_save_alloc_info+0x40/0x58
[   34.524705]  __kasan_slab_alloc+0xa8/0xb0
[   34.528701]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   34.533299]  kmem_cache_rcu_uaf+0x12c/0x468
[   34.537466]  kunit_try_run_case+0x170/0x3f0
[   34.541632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.547101]  kthread+0x328/0x630
[   34.550313]  ret_from_fork+0x10/0x20
[   34.553872] 
[   34.555349] Freed by task 0:
[   34.558214]  kasan_save_stack+0x3c/0x68
[   34.562031]  kasan_save_track+0x20/0x40
[   34.565851]  kasan_save_free_info+0x4c/0x78
[   34.570017]  __kasan_slab_free+0x6c/0x98
[   34.573923]  slab_free_after_rcu_debug+0xd4/0x2f8
[   34.578611]  rcu_core+0x9f4/0x1e20
[   34.581996]  rcu_core_si+0x18/0x30
[   34.585382]  handle_softirqs+0x374/0xb28
[   34.589288]  __do_softirq+0x1c/0x28
[   34.592762] 
[   34.594237] Last potentially related work creation:
[   34.599098]  kasan_save_stack+0x3c/0x68
[   34.602916]  kasan_record_aux_stack+0xb4/0xc8
[   34.607257]  kmem_cache_free+0x120/0x470
[   34.611163]  kmem_cache_rcu_uaf+0x16c/0x468
[   34.615329]  kunit_try_run_case+0x170/0x3f0
[   34.619496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.624966]  kthread+0x328/0x630
[   34.628176]  ret_from_fork+0x10/0x20
[   34.631737] 
[   34.633210] The buggy address belongs to the object at ffff000801f20000
[   34.633210]  which belongs to the cache test_cache of size 200
[   34.645627] The buggy address is located 0 bytes inside of
[   34.645627]  freed 200-byte region [ffff000801f20000, ffff000801f200c8)
[   34.657690] 
[   34.659169] The buggy address belongs to the physical page:
[   34.664725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f20
[   34.672708] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.680349] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.687292] page_type: f5(slab)
[   34.690429] raw: 0bfffe0000000040 ffff000801f1e000 dead000000000122 0000000000000000
[   34.698147] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.705873] head: 0bfffe0000000040 ffff000801f1e000 dead000000000122 0000000000000000
[   34.713685] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.721498] head: 0bfffe0000000001 fffffdffe007c801 00000000ffffffff 00000000ffffffff
[   34.729310] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.737115] page dumped because: kasan: bad access detected
[   34.742671] 
[   34.744146] Memory state around the buggy address:
[   34.748928]  ffff000801f1ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.756129]  ffff000801f1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.763336] >ffff000801f20000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.770535]                    ^
[   34.773751]  ffff000801f20080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   34.780956]  ffff000801f20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.788159] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write KNOWN ISSUE - log-parser-test/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
[   68.584280] ==================================================================
[   68.584406] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   68.584406] 
[   68.584562] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#114):
[   68.585724]  test_out_of_bounds_write+0x100/0x240
[   68.590411]  kunit_try_run_case+0x170/0x3f0
[   68.594578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.600047]  kthread+0x328/0x630
[   68.603258]  ret_from_fork+0x10/0x20
[   68.606819] 
[   68.608297] kfence-#114: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   68.608297] 
[   68.617932] allocated by task 336 on cpu 6 at 68.584247s (0.033682s ago):
[   68.624717]  test_alloc+0x29c/0x628
[   68.628171]  test_out_of_bounds_write+0xc8/0x240
[   68.632772]  kunit_try_run_case+0x170/0x3f0
[   68.636938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.642407]  kthread+0x328/0x630
[   68.645619]  ret_from_fork+0x10/0x20
[   68.649180] 
[   68.650665] CPU: 6 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   68.661773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.665932] Hardware name: WinLink E850-96 board (DT)
[   68.670969] ==================================================================
[   69.208266] ==================================================================
[   69.208394] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   69.208394] 
[   69.208550] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#120):
[   69.209713]  test_out_of_bounds_write+0x100/0x240
[   69.214399]  kunit_try_run_case+0x170/0x3f0
[   69.218565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.224034]  kthread+0x328/0x630
[   69.227246]  ret_from_fork+0x10/0x20
[   69.230806] 
[   69.232284] kfence-#120: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   69.232284] 
[   69.241398] allocated by task 338 on cpu 7 at 69.208235s (0.033161s ago):
[   69.248184]  test_alloc+0x230/0x628
[   69.251637]  test_out_of_bounds_write+0xc8/0x240
[   69.256240]  kunit_try_run_case+0x170/0x3f0
[   69.260405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.265873]  kthread+0x328/0x630
[   69.269085]  ret_from_fork+0x10/0x20
[   69.272646] 
[   69.274131] CPU: 7 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   69.285240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.289399] Hardware name: WinLink E850-96 board (DT)
[   69.294436] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read KNOWN ISSUE - log-parser-test/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
[   68.368261] ==================================================================
[   68.373790] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   68.373790] 
[   68.382816] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#112):
[   68.390194]  test_out_of_bounds_read+0x1c8/0x3e0
[   68.394795]  kunit_try_run_case+0x170/0x3f0
[   68.398961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.404430]  kthread+0x328/0x630
[   68.407641]  ret_from_fork+0x10/0x20
[   68.411200] 
[   68.412678] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.412678] 
[   68.421791] allocated by task 334 on cpu 7 at 68.368233s (0.053556s ago):
[   68.428579]  test_alloc+0x230/0x628
[   68.432034]  test_out_of_bounds_read+0x198/0x3e0
[   68.436634]  kunit_try_run_case+0x170/0x3f0
[   68.440801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.446270]  kthread+0x328/0x630
[   68.449481]  ret_from_fork+0x10/0x20
[   68.453042] 
[   68.454524] CPU: 7 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   68.465633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.469795] Hardware name: WinLink E850-96 board (DT)
[   68.474831] ==================================================================
[   68.264272] ==================================================================
[   68.264398] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   68.264398] 
[   68.264551] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#111):
[   68.265458]  test_out_of_bounds_read+0x114/0x3e0
[   68.270057]  kunit_try_run_case+0x170/0x3f0
[   68.274223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.279692]  kthread+0x328/0x630
[   68.282904]  ret_from_fork+0x10/0x20
[   68.286464] 
[   68.287942] kfence-#111: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.287942] 
[   68.297056] allocated by task 334 on cpu 7 at 68.264236s (0.032818s ago):
[   68.303841]  test_alloc+0x230/0x628
[   68.307296]  test_out_of_bounds_read+0xdc/0x3e0
[   68.311810]  kunit_try_run_case+0x170/0x3f0
[   68.315978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.321445]  kthread+0x328/0x630
[   68.324657]  ret_from_fork+0x10/0x20
[   68.328217] 
[   68.329702] CPU: 7 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   68.340809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.344970] Hardware name: WinLink E850-96 board (DT)
[   68.350006] ==================================================================
[   67.840266] ==================================================================
[   67.845530] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   67.845530] 
[   67.854557] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#107):
[   67.861935]  test_out_of_bounds_read+0x1c8/0x3e0
[   67.866536]  kunit_try_run_case+0x170/0x3f0
[   67.870702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.876170]  kthread+0x328/0x630
[   67.879382]  ret_from_fork+0x10/0x20
[   67.882941] 
[   67.884418] kfence-#107: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.884418] 
[   67.894053] allocated by task 332 on cpu 6 at 67.840239s (0.053812s ago):
[   67.900839]  test_alloc+0x29c/0x628
[   67.904297]  test_out_of_bounds_read+0x198/0x3e0
[   67.908896]  kunit_try_run_case+0x170/0x3f0
[   67.913063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.918531]  kthread+0x328/0x630
[   67.921743]  ret_from_fork+0x10/0x20
[   67.925302] 
[   67.926786] CPU: 6 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   67.937895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.942055] Hardware name: WinLink E850-96 board (DT)
[   67.947091] ==================================================================
[   67.736275] ==================================================================
[   67.736399] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   67.736399] 
[   67.736557] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#106):
[   67.737458]  test_out_of_bounds_read+0x114/0x3e0
[   67.742058]  kunit_try_run_case+0x170/0x3f0
[   67.746224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.751693]  kthread+0x328/0x630
[   67.754905]  ret_from_fork+0x10/0x20
[   67.758464] 
[   67.759943] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.759943] 
[   67.769578] allocated by task 332 on cpu 6 at 67.736243s (0.033332s ago):
[   67.776363]  test_alloc+0x29c/0x628
[   67.779818]  test_out_of_bounds_read+0xdc/0x3e0
[   67.784332]  kunit_try_run_case+0x170/0x3f0
[   67.788498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.793967]  kthread+0x328/0x630
[   67.797178]  ret_from_fork+0x10/0x20
[   67.800739] 
[   67.802224] CPU: 6 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   67.813331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.817492] Hardware name: WinLink E850-96 board (DT)
[   67.822529] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right KNOWN ISSUE - log-parser-test/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right: Failure
[   20.739634] ==================================================================
[   20.762432] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   20.762432] 
[   20.771980] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#38):
[   20.781356]  kmalloc_track_caller_oob_right+0x224/0x488
[   20.786563]  kunit_try_run_case+0x170/0x3f0
[   20.790730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.796198]  kthread+0x328/0x630
[   20.799410]  ret_from_fork+0x10/0x20
[   20.802970] 
[   20.804449] kfence-#38: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   20.804449] 
[   20.814170] allocated by task 187 on cpu 5 at 20.739296s (0.074872s ago):
[   20.820955]  kmalloc_track_caller_oob_right+0x184/0x488
[   20.826146]  kunit_try_run_case+0x170/0x3f0
[   20.830312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.835781]  kthread+0x328/0x630
[   20.838993]  ret_from_fork+0x10/0x20
[   20.842552] 
[   20.844033] freed by task 187 on cpu 5 at 20.739599s (0.104430s ago):
[   20.850466]  kmalloc_track_caller_oob_right+0x224/0x488
[   20.855659]  kunit_try_run_case+0x170/0x3f0
[   20.859826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.865295]  kthread+0x328/0x630
[   20.868506]  ret_from_fork+0x10/0x20
[   20.872067] 
[   20.873550] CPU: 5 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.884660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.888820] Hardware name: WinLink E850-96 board (DT)
[   20.893856] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
[   66.613638] ==================================================================
[   66.620736] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   66.627592] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   66.635142] 
[   66.636627] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   66.636683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.636699] Hardware name: WinLink E850-96 board (DT)
[   66.636719] Call trace:
[   66.636733]  show_stack+0x20/0x38 (C)
[   66.636768]  dump_stack_lvl+0x8c/0xd0
[   66.636798]  print_report+0x118/0x608
[   66.636835]  kasan_report+0xdc/0x128
[   66.636866]  kasan_check_range+0x100/0x1a8
[   66.636900]  __kasan_check_write+0x20/0x30
[   66.636936]  strncpy_from_user+0x3c/0x2a0
[   66.636974]  copy_user_test_oob+0x5c0/0xec8
[   66.637006]  kunit_try_run_case+0x170/0x3f0
[   66.637039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.637074]  kthread+0x328/0x630
[   66.637108]  ret_from_fork+0x10/0x20
[   66.637140] 
[   66.708059] Allocated by task 330:
[   66.711445]  kasan_save_stack+0x3c/0x68
[   66.715262]  kasan_save_track+0x20/0x40
[   66.719083]  kasan_save_alloc_info+0x40/0x58
[   66.723335]  __kasan_kmalloc+0xd4/0xd8
[   66.727068]  __kmalloc_noprof+0x190/0x4d0
[   66.731061]  kunit_kmalloc_array+0x34/0x88
[   66.735141]  copy_user_test_oob+0xac/0xec8
[   66.739220]  kunit_try_run_case+0x170/0x3f0
[   66.743387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.748856]  kthread+0x328/0x630
[   66.752068]  ret_from_fork+0x10/0x20
[   66.755627] 
[   66.757104] The buggy address belongs to the object at ffff000803cf7000
[   66.757104]  which belongs to the cache kmalloc-128 of size 128
[   66.769604] The buggy address is located 0 bytes inside of
[   66.769604]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   66.782015] 
[   66.783491] The buggy address belongs to the physical page:
[   66.789052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   66.797036] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.804673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.811616] page_type: f5(slab)
[   66.814751] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.822472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.830199] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.838010] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.845823] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   66.853635] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.861441] page dumped because: kasan: bad access detected
[   66.866996] 
[   66.868472] Memory state around the buggy address:
[   66.873254]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.880455]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.887659] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.894860]                                                                 ^
[   66.901982]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.909187]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.916388] ==================================================================
[   66.923850] ==================================================================
[   66.930804] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   66.937742] Write of size 1 at addr ffff000803cf7078 by task kunit_try_catch/330
[   66.945120] 
[   66.946604] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   66.946661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.946678] Hardware name: WinLink E850-96 board (DT)
[   66.946697] Call trace:
[   66.946711]  show_stack+0x20/0x38 (C)
[   66.946745]  dump_stack_lvl+0x8c/0xd0
[   66.946778]  print_report+0x118/0x608
[   66.946811]  kasan_report+0xdc/0x128
[   66.946844]  __asan_report_store1_noabort+0x20/0x30
[   66.946884]  strncpy_from_user+0x270/0x2a0
[   66.946917]  copy_user_test_oob+0x5c0/0xec8
[   66.946949]  kunit_try_run_case+0x170/0x3f0
[   66.946980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.947017]  kthread+0x328/0x630
[   66.947051]  ret_from_fork+0x10/0x20
[   66.947085] 
[   67.014824] Allocated by task 330:
[   67.018211]  kasan_save_stack+0x3c/0x68
[   67.022029]  kasan_save_track+0x20/0x40
[   67.025849]  kasan_save_alloc_info+0x40/0x58
[   67.030101]  __kasan_kmalloc+0xd4/0xd8
[   67.033834]  __kmalloc_noprof+0x190/0x4d0
[   67.037827]  kunit_kmalloc_array+0x34/0x88
[   67.041907]  copy_user_test_oob+0xac/0xec8
[   67.045987]  kunit_try_run_case+0x170/0x3f0
[   67.050153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.055622]  kthread+0x328/0x630
[   67.058834]  ret_from_fork+0x10/0x20
[   67.062393] 
[   67.063870] The buggy address belongs to the object at ffff000803cf7000
[   67.063870]  which belongs to the cache kmalloc-128 of size 128
[   67.076371] The buggy address is located 0 bytes to the right of
[   67.076371]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   67.089302] 
[   67.090778] The buggy address belongs to the physical page:
[   67.096336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   67.104321] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   67.111960] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   67.118902] page_type: f5(slab)
[   67.122038] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   67.129760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.137486] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   67.145297] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.153110] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   67.160922] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   67.168728] page dumped because: kasan: bad access detected
[   67.174283] 
[   67.175759] Memory state around the buggy address:
[   67.180540]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.187742]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.194946] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   67.202148]                                                                 ^
[   67.209269]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.216474]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.223675] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
[   66.001325] ==================================================================
[   66.008420] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   66.015447] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   66.022998] 
[   66.024483] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   66.024541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.024558] Hardware name: WinLink E850-96 board (DT)
[   66.024580] Call trace:
[   66.024596]  show_stack+0x20/0x38 (C)
[   66.024634]  dump_stack_lvl+0x8c/0xd0
[   66.024667]  print_report+0x118/0x608
[   66.024702]  kasan_report+0xdc/0x128
[   66.024733]  kasan_check_range+0x100/0x1a8
[   66.024767]  __kasan_check_write+0x20/0x30
[   66.024801]  copy_user_test_oob+0x434/0xec8
[   66.024832]  kunit_try_run_case+0x170/0x3f0
[   66.024864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.024902]  kthread+0x328/0x630
[   66.024937]  ret_from_fork+0x10/0x20
[   66.024973] 
[   66.091922] Allocated by task 330:
[   66.095309]  kasan_save_stack+0x3c/0x68
[   66.099126]  kasan_save_track+0x20/0x40
[   66.102946]  kasan_save_alloc_info+0x40/0x58
[   66.107199]  __kasan_kmalloc+0xd4/0xd8
[   66.110931]  __kmalloc_noprof+0x190/0x4d0
[   66.114924]  kunit_kmalloc_array+0x34/0x88
[   66.119004]  copy_user_test_oob+0xac/0xec8
[   66.123084]  kunit_try_run_case+0x170/0x3f0
[   66.127250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.132719]  kthread+0x328/0x630
[   66.135932]  ret_from_fork+0x10/0x20
[   66.139490] 
[   66.140967] The buggy address belongs to the object at ffff000803cf7000
[   66.140967]  which belongs to the cache kmalloc-128 of size 128
[   66.153469] The buggy address is located 0 bytes inside of
[   66.153469]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   66.165878] 
[   66.167356] The buggy address belongs to the physical page:
[   66.172913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   66.180897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.188536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.195480] page_type: f5(slab)
[   66.198618] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.206336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.214062] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.221873] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.229687] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   66.237498] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.245304] page dumped because: kasan: bad access detected
[   66.250860] 
[   66.252335] Memory state around the buggy address:
[   66.257117]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.264318]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.271524] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.278724]                                                                 ^
[   66.285845]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.293050]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.300253] ==================================================================
[   66.307584] ==================================================================
[   66.314666] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   66.321692] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   66.329157] 
[   66.330641] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   66.330696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.330710] Hardware name: WinLink E850-96 board (DT)
[   66.330731] Call trace:
[   66.330746]  show_stack+0x20/0x38 (C)
[   66.330779]  dump_stack_lvl+0x8c/0xd0
[   66.330809]  print_report+0x118/0x608
[   66.330840]  kasan_report+0xdc/0x128
[   66.330870]  kasan_check_range+0x100/0x1a8
[   66.330904]  __kasan_check_read+0x20/0x30
[   66.330935]  copy_user_test_oob+0x4a0/0xec8
[   66.330966]  kunit_try_run_case+0x170/0x3f0
[   66.330998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.331035]  kthread+0x328/0x630
[   66.331071]  ret_from_fork+0x10/0x20
[   66.331102] 
[   66.397993] Allocated by task 330:
[   66.401380]  kasan_save_stack+0x3c/0x68
[   66.405198]  kasan_save_track+0x20/0x40
[   66.409019]  kasan_save_alloc_info+0x40/0x58
[   66.413271]  __kasan_kmalloc+0xd4/0xd8
[   66.417003]  __kmalloc_noprof+0x190/0x4d0
[   66.420996]  kunit_kmalloc_array+0x34/0x88
[   66.425076]  copy_user_test_oob+0xac/0xec8
[   66.429156]  kunit_try_run_case+0x170/0x3f0
[   66.433322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.438791]  kthread+0x328/0x630
[   66.442004]  ret_from_fork+0x10/0x20
[   66.445561] 
[   66.447037] The buggy address belongs to the object at ffff000803cf7000
[   66.447037]  which belongs to the cache kmalloc-128 of size 128
[   66.459540] The buggy address is located 0 bytes inside of
[   66.459540]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   66.471950] 
[   66.473426] The buggy address belongs to the physical page:
[   66.478987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   66.486969] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.494608] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.501550] page_type: f5(slab)
[   66.504687] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.512408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.520134] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.527945] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.535758] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   66.543570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.551376] page dumped because: kasan: bad access detected
[   66.556931] 
[   66.558408] Memory state around the buggy address:
[   66.563187]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.570390]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.577595] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.584795]                                                                 ^
[   66.591917]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.599122]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.606325] ==================================================================
[   65.083291] ==================================================================
[   65.090030] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   65.097058] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   65.104524] 
[   65.106009] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   65.106066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.106087] Hardware name: WinLink E850-96 board (DT)
[   65.106107] Call trace:
[   65.106122]  show_stack+0x20/0x38 (C)
[   65.106158]  dump_stack_lvl+0x8c/0xd0
[   65.106192]  print_report+0x118/0x608
[   65.106228]  kasan_report+0xdc/0x128
[   65.106258]  kasan_check_range+0x100/0x1a8
[   65.106295]  __kasan_check_read+0x20/0x30
[   65.106331]  copy_user_test_oob+0x728/0xec8
[   65.106363]  kunit_try_run_case+0x170/0x3f0
[   65.106399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.106437]  kthread+0x328/0x630
[   65.106472]  ret_from_fork+0x10/0x20
[   65.106508] 
[   65.173359] Allocated by task 330:
[   65.176746]  kasan_save_stack+0x3c/0x68
[   65.180563]  kasan_save_track+0x20/0x40
[   65.184384]  kasan_save_alloc_info+0x40/0x58
[   65.188636]  __kasan_kmalloc+0xd4/0xd8
[   65.192368]  __kmalloc_noprof+0x190/0x4d0
[   65.196361]  kunit_kmalloc_array+0x34/0x88
[   65.200441]  copy_user_test_oob+0xac/0xec8
[   65.204521]  kunit_try_run_case+0x170/0x3f0
[   65.208688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.214157]  kthread+0x328/0x630
[   65.217370]  ret_from_fork+0x10/0x20
[   65.220927] 
[   65.222405] The buggy address belongs to the object at ffff000803cf7000
[   65.222405]  which belongs to the cache kmalloc-128 of size 128
[   65.234905] The buggy address is located 0 bytes inside of
[   65.234905]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   65.247316] 
[   65.248795] The buggy address belongs to the physical page:
[   65.254351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   65.262334] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.269975] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.276916] page_type: f5(slab)
[   65.280054] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.287773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.295499] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.303311] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.311124] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   65.318936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.326742] page dumped because: kasan: bad access detected
[   65.332297] 
[   65.333772] Memory state around the buggy address:
[   65.338555]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.345757]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.352962] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.360161]                                                                 ^
[   65.367283]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.374487]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.381689] ==================================================================
[   65.389222] ==================================================================
[   65.396104] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   65.403131] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   65.410683] 
[   65.412165] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   65.412223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.412240] Hardware name: WinLink E850-96 board (DT)
[   65.412258] Call trace:
[   65.412273]  show_stack+0x20/0x38 (C)
[   65.412311]  dump_stack_lvl+0x8c/0xd0
[   65.412345]  print_report+0x118/0x608
[   65.412379]  kasan_report+0xdc/0x128
[   65.412411]  kasan_check_range+0x100/0x1a8
[   65.412446]  __kasan_check_write+0x20/0x30
[   65.412480]  copy_user_test_oob+0x35c/0xec8
[   65.412511]  kunit_try_run_case+0x170/0x3f0
[   65.412545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.412583]  kthread+0x328/0x630
[   65.412618]  ret_from_fork+0x10/0x20
[   65.412657] 
[   65.479606] Allocated by task 330:
[   65.482993]  kasan_save_stack+0x3c/0x68
[   65.486810]  kasan_save_track+0x20/0x40
[   65.490630]  kasan_save_alloc_info+0x40/0x58
[   65.494882]  __kasan_kmalloc+0xd4/0xd8
[   65.498614]  __kmalloc_noprof+0x190/0x4d0
[   65.502607]  kunit_kmalloc_array+0x34/0x88
[   65.506687]  copy_user_test_oob+0xac/0xec8
[   65.510767]  kunit_try_run_case+0x170/0x3f0
[   65.514933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.520402]  kthread+0x328/0x630
[   65.523615]  ret_from_fork+0x10/0x20
[   65.527172] 
[   65.528650] The buggy address belongs to the object at ffff000803cf7000
[   65.528650]  which belongs to the cache kmalloc-128 of size 128
[   65.541151] The buggy address is located 0 bytes inside of
[   65.541151]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   65.553561] 
[   65.555040] The buggy address belongs to the physical page:
[   65.560596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   65.568581] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.576220] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.583163] page_type: f5(slab)
[   65.586298] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.594019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.601745] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.609556] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.617369] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   65.625181] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.632987] page dumped because: kasan: bad access detected
[   65.638542] 
[   65.640018] Memory state around the buggy address:
[   65.644800]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.652001]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.659207] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.666407]                                                                 ^
[   65.673528]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.680733]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.687934] ==================================================================
[   64.771337] ==================================================================
[   64.783789] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   64.790812] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   64.798366] 
[   64.799852] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   64.799914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.799933] Hardware name: WinLink E850-96 board (DT)
[   64.799957] Call trace:
[   64.799971]  show_stack+0x20/0x38 (C)
[   64.800006]  dump_stack_lvl+0x8c/0xd0
[   64.800041]  print_report+0x118/0x608
[   64.800077]  kasan_report+0xdc/0x128
[   64.800111]  kasan_check_range+0x100/0x1a8
[   64.800147]  __kasan_check_write+0x20/0x30
[   64.800181]  copy_user_test_oob+0x234/0xec8
[   64.800212]  kunit_try_run_case+0x170/0x3f0
[   64.800246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.800281]  kthread+0x328/0x630
[   64.800317]  ret_from_fork+0x10/0x20
[   64.800353] 
[   64.867289] Allocated by task 330:
[   64.870677]  kasan_save_stack+0x3c/0x68
[   64.874492]  kasan_save_track+0x20/0x40
[   64.878312]  kasan_save_alloc_info+0x40/0x58
[   64.882564]  __kasan_kmalloc+0xd4/0xd8
[   64.886297]  __kmalloc_noprof+0x190/0x4d0
[   64.890290]  kunit_kmalloc_array+0x34/0x88
[   64.894369]  copy_user_test_oob+0xac/0xec8
[   64.898449]  kunit_try_run_case+0x170/0x3f0
[   64.902616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.908085]  kthread+0x328/0x630
[   64.911298]  ret_from_fork+0x10/0x20
[   64.914855] 
[   64.916333] The buggy address belongs to the object at ffff000803cf7000
[   64.916333]  which belongs to the cache kmalloc-128 of size 128
[   64.928833] The buggy address is located 0 bytes inside of
[   64.928833]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   64.941244] 
[   64.942724] The buggy address belongs to the physical page:
[   64.948279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   64.956263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.963902] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.970846] page_type: f5(slab)
[   64.973984] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.981701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.989430] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.997239] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.005052] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   65.012864] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.020670] page dumped because: kasan: bad access detected
[   65.026225] 
[   65.027701] Memory state around the buggy address:
[   65.032483]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.039684]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.046890] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.054089]                                                                 ^
[   65.061211]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.068416]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.075618] ==================================================================
[   65.695262] ==================================================================
[   65.702347] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   65.709375] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   65.716840] 
[   65.718325] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   65.718376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.718394] Hardware name: WinLink E850-96 board (DT)
[   65.718417] Call trace:
[   65.718431]  show_stack+0x20/0x38 (C)
[   65.718463]  dump_stack_lvl+0x8c/0xd0
[   65.718494]  print_report+0x118/0x608
[   65.718526]  kasan_report+0xdc/0x128
[   65.718558]  kasan_check_range+0x100/0x1a8
[   65.718594]  __kasan_check_read+0x20/0x30
[   65.718628]  copy_user_test_oob+0x3c8/0xec8
[   65.718660]  kunit_try_run_case+0x170/0x3f0
[   65.718690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.718727]  kthread+0x328/0x630
[   65.718759]  ret_from_fork+0x10/0x20
[   65.718794] 
[   65.785675] Allocated by task 330:
[   65.789063]  kasan_save_stack+0x3c/0x68
[   65.792881]  kasan_save_track+0x20/0x40
[   65.796701]  kasan_save_alloc_info+0x40/0x58
[   65.800953]  __kasan_kmalloc+0xd4/0xd8
[   65.804686]  __kmalloc_noprof+0x190/0x4d0
[   65.808679]  kunit_kmalloc_array+0x34/0x88
[   65.812758]  copy_user_test_oob+0xac/0xec8
[   65.816839]  kunit_try_run_case+0x170/0x3f0
[   65.821005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.826474]  kthread+0x328/0x630
[   65.829687]  ret_from_fork+0x10/0x20
[   65.833245] 
[   65.834720] The buggy address belongs to the object at ffff000803cf7000
[   65.834720]  which belongs to the cache kmalloc-128 of size 128
[   65.847224] The buggy address is located 0 bytes inside of
[   65.847224]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   65.859633] 
[   65.861112] The buggy address belongs to the physical page:
[   65.866668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   65.874652] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.882292] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.889234] page_type: f5(slab)
[   65.892369] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.900090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.907817] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.915628] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.923441] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   65.931253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.939058] page dumped because: kasan: bad access detected
[   65.944614] 
[   65.946090] Memory state around the buggy address:
[   65.950872]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.958072]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.965279] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.972478]                                                                 ^
[   65.979600]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.986805]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.994006] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
[   64.143983] ==================================================================
[   64.158190] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   64.165563] Read of size 8 at addr ffff000801adc978 by task kunit_try_catch/326
[   64.172854] 
[   64.174339] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   64.174398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.174416] Hardware name: WinLink E850-96 board (DT)
[   64.174438] Call trace:
[   64.174453]  show_stack+0x20/0x38 (C)
[   64.174491]  dump_stack_lvl+0x8c/0xd0
[   64.174524]  print_report+0x118/0x608
[   64.174556]  kasan_report+0xdc/0x128
[   64.174588]  __asan_report_load8_noabort+0x20/0x30
[   64.174627]  copy_to_kernel_nofault+0x204/0x250
[   64.174662]  copy_to_kernel_nofault_oob+0x158/0x418
[   64.174696]  kunit_try_run_case+0x170/0x3f0
[   64.174728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.174767]  kthread+0x328/0x630
[   64.174805]  ret_from_fork+0x10/0x20
[   64.174841] 
[   64.243599] Allocated by task 326:
[   64.246988]  kasan_save_stack+0x3c/0x68
[   64.250803]  kasan_save_track+0x20/0x40
[   64.254622]  kasan_save_alloc_info+0x40/0x58
[   64.258876]  __kasan_kmalloc+0xd4/0xd8
[   64.262609]  __kmalloc_cache_noprof+0x15c/0x3c0
[   64.267122]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.271897]  kunit_try_run_case+0x170/0x3f0
[   64.276062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.281532]  kthread+0x328/0x630
[   64.284743]  ret_from_fork+0x10/0x20
[   64.288303] 
[   64.289780] The buggy address belongs to the object at ffff000801adc900
[   64.289780]  which belongs to the cache kmalloc-128 of size 128
[   64.302281] The buggy address is located 0 bytes to the right of
[   64.302281]  allocated 120-byte region [ffff000801adc900, ffff000801adc978)
[   64.315212] 
[   64.316691] The buggy address belongs to the physical page:
[   64.322247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881adc
[   64.330230] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.337870] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.344813] page_type: f5(slab)
[   64.347952] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.355669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.363395] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.371207] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.379020] head: 0bfffe0000000001 fffffdffe006b701 00000000ffffffff 00000000ffffffff
[   64.386832] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.394637] page dumped because: kasan: bad access detected
[   64.400193] 
[   64.401668] Memory state around the buggy address:
[   64.406452]  ffff000801adc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.413651]  ffff000801adc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.420857] >ffff000801adc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.428057]                                                                 ^
[   64.435179]  ffff000801adc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.442385]  ffff000801adca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.449586] ==================================================================
[   64.456927] ==================================================================
[   64.463998] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   64.471286] Write of size 8 at addr ffff000801adc978 by task kunit_try_catch/326
[   64.478664] 
[   64.480149] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   64.480209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.480227] Hardware name: WinLink E850-96 board (DT)
[   64.480247] Call trace:
[   64.480260]  show_stack+0x20/0x38 (C)
[   64.480296]  dump_stack_lvl+0x8c/0xd0
[   64.480330]  print_report+0x118/0x608
[   64.480367]  kasan_report+0xdc/0x128
[   64.480397]  kasan_check_range+0x100/0x1a8
[   64.480434]  __kasan_check_write+0x20/0x30
[   64.480468]  copy_to_kernel_nofault+0x8c/0x250
[   64.480502]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   64.480535]  kunit_try_run_case+0x170/0x3f0
[   64.480569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.480605]  kthread+0x328/0x630
[   64.480640]  ret_from_fork+0x10/0x20
[   64.480677] 
[   64.552709] Allocated by task 326:
[   64.556096]  kasan_save_stack+0x3c/0x68
[   64.559913]  kasan_save_track+0x20/0x40
[   64.563732]  kasan_save_alloc_info+0x40/0x58
[   64.567986]  __kasan_kmalloc+0xd4/0xd8
[   64.571720]  __kmalloc_cache_noprof+0x15c/0x3c0
[   64.576232]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.581006]  kunit_try_run_case+0x170/0x3f0
[   64.585173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.590642]  kthread+0x328/0x630
[   64.593853]  ret_from_fork+0x10/0x20
[   64.597412] 
[   64.598890] The buggy address belongs to the object at ffff000801adc900
[   64.598890]  which belongs to the cache kmalloc-128 of size 128
[   64.611390] The buggy address is located 0 bytes to the right of
[   64.611390]  allocated 120-byte region [ffff000801adc900, ffff000801adc978)
[   64.624321] 
[   64.625800] The buggy address belongs to the physical page:
[   64.631357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881adc
[   64.639340] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.646979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.653922] page_type: f5(slab)
[   64.657057] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.664779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.672506] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.680317] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.688129] head: 0bfffe0000000001 fffffdffe006b701 00000000ffffffff 00000000ffffffff
[   64.695942] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.703749] page dumped because: kasan: bad access detected
[   64.709303] 
[   64.710778] Memory state around the buggy address:
[   64.715558]  ffff000801adc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.722761]  ffff000801adc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.729968] >ffff000801adc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.737167]                                                                 ^
[   64.744289]  ffff000801adc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.751494]  ffff000801adca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.758695] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob KNOWN ISSUE - log-parser-test/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure
[   63.702306] ==================================================================
[   63.716700] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   63.723382] Read of size 1 at addr ffff800087c7d7f3 by task kunit_try_catch/314
[   63.730673] 
[   63.732157] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   63.732216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.732235] Hardware name: WinLink E850-96 board (DT)
[   63.732257] Call trace:
[   63.732275]  show_stack+0x20/0x38 (C)
[   63.732313]  dump_stack_lvl+0x8c/0xd0
[   63.732347]  print_report+0x310/0x608
[   63.732382]  kasan_report+0xdc/0x128
[   63.732416]  __asan_report_load1_noabort+0x20/0x30
[   63.732456]  vmalloc_oob+0x578/0x5d0
[   63.732484]  kunit_try_run_case+0x170/0x3f0
[   63.732519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.732557]  kthread+0x328/0x630
[   63.732592]  ret_from_fork+0x10/0x20
[   63.732627] 
[   63.795608] The buggy address belongs to the virtual mapping at
[   63.795608]  [ffff800087c7d000, ffff800087c7f000) created by:
[   63.795608]  vmalloc_oob+0x98/0x5d0
[   63.810705] 
[   63.812185] The buggy address belongs to the physical page:
[   63.817739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886979
[   63.825725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.832247] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.839965] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.847684] page dumped because: kasan: bad access detected
[   63.853239] 
[   63.854715] Memory state around the buggy address:
[   63.859496]  ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.866698]  ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.873904] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.881104]                                                              ^
[   63.887966]  ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.895170]  ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.902374] ==================================================================
[   63.909876] ==================================================================
[   63.916785] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   63.923464] Read of size 1 at addr ffff800087c7d7f8 by task kunit_try_catch/314
[   63.930756] 
[   63.932241] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   63.932298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.932313] Hardware name: WinLink E850-96 board (DT)
[   63.932334] Call trace:
[   63.932348]  show_stack+0x20/0x38 (C)
[   63.932388]  dump_stack_lvl+0x8c/0xd0
[   63.932423]  print_report+0x310/0x608
[   63.932456]  kasan_report+0xdc/0x128
[   63.932485]  __asan_report_load1_noabort+0x20/0x30
[   63.932522]  vmalloc_oob+0x51c/0x5d0
[   63.932549]  kunit_try_run_case+0x170/0x3f0
[   63.932583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.932620]  kthread+0x328/0x630
[   63.932654]  ret_from_fork+0x10/0x20
[   63.932689] 
[   63.995690] The buggy address belongs to the virtual mapping at
[   63.995690]  [ffff800087c7d000, ffff800087c7f000) created by:
[   63.995690]  vmalloc_oob+0x98/0x5d0
[   64.010789] 
[   64.012269] The buggy address belongs to the physical page:
[   64.017824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886979
[   64.025808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.032326] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   64.040048] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.047767] page dumped because: kasan: bad access detected
[   64.053323] 
[   64.054799] Memory state around the buggy address:
[   64.059578]  ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.066782]  ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.073988] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   64.081187]                                                                 ^
[   64.088310]  ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   64.095514]  ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   64.102716] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
[   56.031314] ==================================================================
[   56.038257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   56.045631] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   56.052923] 
[   56.054406] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   56.054457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.054471] Hardware name: WinLink E850-96 board (DT)
[   56.054490] Call trace:
[   56.054503]  show_stack+0x20/0x38 (C)
[   56.054536]  dump_stack_lvl+0x8c/0xd0
[   56.054567]  print_report+0x118/0x608
[   56.054599]  kasan_report+0xdc/0x128
[   56.054630]  __asan_report_load8_noabort+0x20/0x30
[   56.054666]  kasan_atomics_helper+0x3f58/0x4858
[   56.054699]  kasan_atomics+0x198/0x2e0
[   56.054729]  kunit_try_run_case+0x170/0x3f0
[   56.054762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.054798]  kthread+0x328/0x630
[   56.054830]  ret_from_fork+0x10/0x20
[   56.054863] 
[   56.122539] Allocated by task 310:
[   56.125928]  kasan_save_stack+0x3c/0x68
[   56.129744]  kasan_save_track+0x20/0x40
[   56.133564]  kasan_save_alloc_info+0x40/0x58
[   56.137817]  __kasan_kmalloc+0xd4/0xd8
[   56.141550]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.146063]  kasan_atomics+0xb8/0x2e0
[   56.149709]  kunit_try_run_case+0x170/0x3f0
[   56.153876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.159345]  kthread+0x328/0x630
[   56.162556]  ret_from_fork+0x10/0x20
[   56.166115] 
[   56.167592] The buggy address belongs to the object at ffff00080243ed00
[   56.167592]  which belongs to the cache kmalloc-64 of size 64
[   56.179919] The buggy address is located 0 bytes to the right of
[   56.179919]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   56.192764] 
[   56.194240] The buggy address belongs to the physical page:
[   56.199798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   56.207783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.214293] page_type: f5(slab)
[   56.217426] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.225149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.232868] page dumped because: kasan: bad access detected
[   56.238423] 
[   56.239899] Memory state around the buggy address:
[   56.244678]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.251882]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.259088] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.266287]                                      ^
[   56.271065]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.278272]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.285471] ==================================================================
[   60.261671] ==================================================================
[   60.268746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   60.276123] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   60.283502] 
[   60.284984] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   60.285033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.285048] Hardware name: WinLink E850-96 board (DT)
[   60.285067] Call trace:
[   60.285081]  show_stack+0x20/0x38 (C)
[   60.285114]  dump_stack_lvl+0x8c/0xd0
[   60.285146]  print_report+0x118/0x608
[   60.285179]  kasan_report+0xdc/0x128
[   60.285210]  kasan_check_range+0x100/0x1a8
[   60.285241]  __kasan_check_write+0x20/0x30
[   60.285276]  kasan_atomics_helper+0x1414/0x4858
[   60.285308]  kasan_atomics+0x198/0x2e0
[   60.285339]  kunit_try_run_case+0x170/0x3f0
[   60.285370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.285405]  kthread+0x328/0x630
[   60.285437]  ret_from_fork+0x10/0x20
[   60.285469] 
[   60.356503] Allocated by task 310:
[   60.359891]  kasan_save_stack+0x3c/0x68
[   60.363709]  kasan_save_track+0x20/0x40
[   60.367528]  kasan_save_alloc_info+0x40/0x58
[   60.371781]  __kasan_kmalloc+0xd4/0xd8
[   60.375514]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.380028]  kasan_atomics+0xb8/0x2e0
[   60.383673]  kunit_try_run_case+0x170/0x3f0
[   60.387840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.393309]  kthread+0x328/0x630
[   60.396520]  ret_from_fork+0x10/0x20
[   60.400080] 
[   60.401556] The buggy address belongs to the object at ffff00080243ed00
[   60.401556]  which belongs to the cache kmalloc-64 of size 64
[   60.413883] The buggy address is located 0 bytes to the right of
[   60.413883]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   60.426728] 
[   60.428204] The buggy address belongs to the physical page:
[   60.433763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   60.441748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.448257] page_type: f5(slab)
[   60.451389] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.459113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.466832] page dumped because: kasan: bad access detected
[   60.472387] 
[   60.473863] Memory state around the buggy address:
[   60.478644]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.485846]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.493052] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.500251]                                      ^
[   60.505029]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.512236]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.519435] ==================================================================
[   56.557759] ==================================================================
[   56.564810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   56.572186] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   56.579564] 
[   56.581046] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   56.581095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.581112] Hardware name: WinLink E850-96 board (DT)
[   56.581134] Call trace:
[   56.581149]  show_stack+0x20/0x38 (C)
[   56.581183]  dump_stack_lvl+0x8c/0xd0
[   56.581216]  print_report+0x118/0x608
[   56.581246]  kasan_report+0xdc/0x128
[   56.581278]  __asan_report_store8_noabort+0x20/0x30
[   56.581315]  kasan_atomics_helper+0x3e5c/0x4858
[   56.581348]  kasan_atomics+0x198/0x2e0
[   56.581377]  kunit_try_run_case+0x170/0x3f0
[   56.581407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.581443]  kthread+0x328/0x630
[   56.581473]  ret_from_fork+0x10/0x20
[   56.581508] 
[   56.649268] Allocated by task 310:
[   56.652656]  kasan_save_stack+0x3c/0x68
[   56.656473]  kasan_save_track+0x20/0x40
[   56.660292]  kasan_save_alloc_info+0x40/0x58
[   56.664545]  __kasan_kmalloc+0xd4/0xd8
[   56.668278]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.672792]  kasan_atomics+0xb8/0x2e0
[   56.676437]  kunit_try_run_case+0x170/0x3f0
[   56.680604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.686073]  kthread+0x328/0x630
[   56.689285]  ret_from_fork+0x10/0x20
[   56.692843] 
[   56.694321] The buggy address belongs to the object at ffff00080243ed00
[   56.694321]  which belongs to the cache kmalloc-64 of size 64
[   56.706647] The buggy address is located 0 bytes to the right of
[   56.706647]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   56.719492] 
[   56.720968] The buggy address belongs to the physical page:
[   56.726527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   56.734511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.741021] page_type: f5(slab)
[   56.744153] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.751877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.759596] page dumped because: kasan: bad access detected
[   56.765151] 
[   56.766627] Memory state around the buggy address:
[   56.771405]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.778610]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.785816] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.793015]                                      ^
[   56.797794]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.805000]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.812199] ==================================================================
[   49.692931] ==================================================================
[   49.699984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   49.707272] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   49.714650] 
[   49.716131] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   49.716180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.716196] Hardware name: WinLink E850-96 board (DT)
[   49.716216] Call trace:
[   49.716231]  show_stack+0x20/0x38 (C)
[   49.716263]  dump_stack_lvl+0x8c/0xd0
[   49.716295]  print_report+0x118/0x608
[   49.716326]  kasan_report+0xdc/0x128
[   49.716355]  kasan_check_range+0x100/0x1a8
[   49.716389]  __kasan_check_write+0x20/0x30
[   49.716425]  kasan_atomics_helper+0x54c/0x4858
[   49.716457]  kasan_atomics+0x198/0x2e0
[   49.716487]  kunit_try_run_case+0x170/0x3f0
[   49.716519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.716553]  kthread+0x328/0x630
[   49.716584]  ret_from_fork+0x10/0x20
[   49.716615] 
[   49.787565] Allocated by task 310:
[   49.790953]  kasan_save_stack+0x3c/0x68
[   49.794770]  kasan_save_track+0x20/0x40
[   49.798589]  kasan_save_alloc_info+0x40/0x58
[   49.802843]  __kasan_kmalloc+0xd4/0xd8
[   49.806575]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.811089]  kasan_atomics+0xb8/0x2e0
[   49.814735]  kunit_try_run_case+0x170/0x3f0
[   49.818901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.824370]  kthread+0x328/0x630
[   49.827582]  ret_from_fork+0x10/0x20
[   49.831141] 
[   49.832616] The buggy address belongs to the object at ffff00080243ed00
[   49.832616]  which belongs to the cache kmalloc-64 of size 64
[   49.844945] The buggy address is located 0 bytes to the right of
[   49.844945]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   49.857790] 
[   49.859266] The buggy address belongs to the physical page:
[   49.864825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   49.872809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.879317] page_type: f5(slab)
[   49.882450] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.890175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.897893] page dumped because: kasan: bad access detected
[   49.903448] 
[   49.904924] Memory state around the buggy address:
[   49.909703]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.916907]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.924112] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.931313]                                      ^
[   49.936091]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.943296]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.950496] ==================================================================
[   51.282498] ==================================================================
[   51.289542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   51.296831] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   51.304209] 
[   51.305692] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   51.305740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.305756] Hardware name: WinLink E850-96 board (DT)
[   51.305776] Call trace:
[   51.305789]  show_stack+0x20/0x38 (C)
[   51.305822]  dump_stack_lvl+0x8c/0xd0
[   51.305851]  print_report+0x118/0x608
[   51.305881]  kasan_report+0xdc/0x128
[   51.305911]  kasan_check_range+0x100/0x1a8
[   51.305944]  __kasan_check_write+0x20/0x30
[   51.305976]  kasan_atomics_helper+0x7cc/0x4858
[   51.306008]  kasan_atomics+0x198/0x2e0
[   51.306036]  kunit_try_run_case+0x170/0x3f0
[   51.306069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.306105]  kthread+0x328/0x630
[   51.306135]  ret_from_fork+0x10/0x20
[   51.306166] 
[   51.377124] Allocated by task 310:
[   51.380512]  kasan_save_stack+0x3c/0x68
[   51.384329]  kasan_save_track+0x20/0x40
[   51.388149]  kasan_save_alloc_info+0x40/0x58
[   51.392402]  __kasan_kmalloc+0xd4/0xd8
[   51.396135]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.400648]  kasan_atomics+0xb8/0x2e0
[   51.404294]  kunit_try_run_case+0x170/0x3f0
[   51.408461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.413930]  kthread+0x328/0x630
[   51.417141]  ret_from_fork+0x10/0x20
[   51.420700] 
[   51.422176] The buggy address belongs to the object at ffff00080243ed00
[   51.422176]  which belongs to the cache kmalloc-64 of size 64
[   51.434502] The buggy address is located 0 bytes to the right of
[   51.434502]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   51.447349] 
[   51.448825] The buggy address belongs to the physical page:
[   51.454384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   51.462368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.468878] page_type: f5(slab)
[   51.472009] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.479734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.487453] page dumped because: kasan: bad access detected
[   51.493008] 
[   51.494484] Memory state around the buggy address:
[   51.499263]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.506467]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.513671] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.520873]                                      ^
[   51.525651]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.532857]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.540056] ==================================================================
[   47.315147] ==================================================================
[   47.322240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   47.329530] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   47.336908] 
[   47.338390] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   47.338443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.338460] Hardware name: WinLink E850-96 board (DT)
[   47.338479] Call trace:
[   47.338495]  show_stack+0x20/0x38 (C)
[   47.338530]  dump_stack_lvl+0x8c/0xd0
[   47.338561]  print_report+0x118/0x608
[   47.338594]  kasan_report+0xdc/0x128
[   47.338627]  kasan_check_range+0x100/0x1a8
[   47.338658]  __kasan_check_write+0x20/0x30
[   47.338693]  kasan_atomics_helper+0x24c/0x4858
[   47.338725]  kasan_atomics+0x198/0x2e0
[   47.338754]  kunit_try_run_case+0x170/0x3f0
[   47.338789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.338824]  kthread+0x328/0x630
[   47.338856]  ret_from_fork+0x10/0x20
[   47.338887] 
[   47.409823] Allocated by task 310:
[   47.413210]  kasan_save_stack+0x3c/0x68
[   47.417028]  kasan_save_track+0x20/0x40
[   47.420847]  kasan_save_alloc_info+0x40/0x58
[   47.425101]  __kasan_kmalloc+0xd4/0xd8
[   47.428834]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.433347]  kasan_atomics+0xb8/0x2e0
[   47.436993]  kunit_try_run_case+0x170/0x3f0
[   47.441160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.446628]  kthread+0x328/0x630
[   47.449840]  ret_from_fork+0x10/0x20
[   47.453399] 
[   47.454876] The buggy address belongs to the object at ffff00080243ed00
[   47.454876]  which belongs to the cache kmalloc-64 of size 64
[   47.467203] The buggy address is located 0 bytes to the right of
[   47.467203]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   47.480048] 
[   47.481524] The buggy address belongs to the physical page:
[   47.487083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   47.495067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.501577] page_type: f5(slab)
[   47.504708] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.512432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.520151] page dumped because: kasan: bad access detected
[   47.525707] 
[   47.527182] Memory state around the buggy address:
[   47.531962]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.539165]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.546370] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.553571]                                      ^
[   47.558349]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.565555]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.572755] ==================================================================
[   48.371488] ==================================================================
[   48.378475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   48.385850] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   48.393229] 
[   48.394710] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   48.394763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.394777] Hardware name: WinLink E850-96 board (DT)
[   48.394796] Call trace:
[   48.394811]  show_stack+0x20/0x38 (C)
[   48.394842]  dump_stack_lvl+0x8c/0xd0
[   48.394875]  print_report+0x118/0x608
[   48.394905]  kasan_report+0xdc/0x128
[   48.394938]  __asan_report_store4_noabort+0x20/0x30
[   48.394978]  kasan_atomics_helper+0x3f94/0x4858
[   48.395009]  kasan_atomics+0x198/0x2e0
[   48.395037]  kunit_try_run_case+0x170/0x3f0
[   48.395067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.395101]  kthread+0x328/0x630
[   48.395133]  ret_from_fork+0x10/0x20
[   48.395166] 
[   48.462932] Allocated by task 310:
[   48.466320]  kasan_save_stack+0x3c/0x68
[   48.470137]  kasan_save_track+0x20/0x40
[   48.473957]  kasan_save_alloc_info+0x40/0x58
[   48.478210]  __kasan_kmalloc+0xd4/0xd8
[   48.481942]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.486456]  kasan_atomics+0xb8/0x2e0
[   48.490102]  kunit_try_run_case+0x170/0x3f0
[   48.494268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.499737]  kthread+0x328/0x630
[   48.502949]  ret_from_fork+0x10/0x20
[   48.506508] 
[   48.507985] The buggy address belongs to the object at ffff00080243ed00
[   48.507985]  which belongs to the cache kmalloc-64 of size 64
[   48.520310] The buggy address is located 0 bytes to the right of
[   48.520310]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   48.533157] 
[   48.534633] The buggy address belongs to the physical page:
[   48.540191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   48.548176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.554686] page_type: f5(slab)
[   48.557817] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.565542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.573261] page dumped because: kasan: bad access detected
[   48.578816] 
[   48.580291] Memory state around the buggy address:
[   48.585070]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.592274]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.599479] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.606680]                                      ^
[   48.611458]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.618664]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.625864] ==================================================================
[   51.017638] ==================================================================
[   51.024616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   51.031905] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   51.039283] 
[   51.040765] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   51.040817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.040833] Hardware name: WinLink E850-96 board (DT)
[   51.040854] Call trace:
[   51.040867]  show_stack+0x20/0x38 (C)
[   51.040902]  dump_stack_lvl+0x8c/0xd0
[   51.040933]  print_report+0x118/0x608
[   51.040966]  kasan_report+0xdc/0x128
[   51.040998]  kasan_check_range+0x100/0x1a8
[   51.041030]  __kasan_check_write+0x20/0x30
[   51.041066]  kasan_atomics_helper+0x760/0x4858
[   51.041096]  kasan_atomics+0x198/0x2e0
[   51.041126]  kunit_try_run_case+0x170/0x3f0
[   51.041157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.041192]  kthread+0x328/0x630
[   51.041226]  ret_from_fork+0x10/0x20
[   51.041256] 
[   51.112197] Allocated by task 310:
[   51.115585]  kasan_save_stack+0x3c/0x68
[   51.119403]  kasan_save_track+0x20/0x40
[   51.123222]  kasan_save_alloc_info+0x40/0x58
[   51.127476]  __kasan_kmalloc+0xd4/0xd8
[   51.131208]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.135722]  kasan_atomics+0xb8/0x2e0
[   51.139368]  kunit_try_run_case+0x170/0x3f0
[   51.143534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.149003]  kthread+0x328/0x630
[   51.152215]  ret_from_fork+0x10/0x20
[   51.155773] 
[   51.157251] The buggy address belongs to the object at ffff00080243ed00
[   51.157251]  which belongs to the cache kmalloc-64 of size 64
[   51.169578] The buggy address is located 0 bytes to the right of
[   51.169578]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   51.182423] 
[   51.183899] The buggy address belongs to the physical page:
[   51.189457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   51.197442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.203951] page_type: f5(slab)
[   51.207083] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.214807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.222526] page dumped because: kasan: bad access detected
[   51.228082] 
[   51.229557] Memory state around the buggy address:
[   51.234337]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.241540]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.248745] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.255946]                                      ^
[   51.260724]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.267930]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.275130] ==================================================================
[   50.222786] ==================================================================
[   50.229837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   50.237125] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   50.244503] 
[   50.245984] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   50.246035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.246052] Hardware name: WinLink E850-96 board (DT)
[   50.246072] Call trace:
[   50.246086]  show_stack+0x20/0x38 (C)
[   50.246116]  dump_stack_lvl+0x8c/0xd0
[   50.246147]  print_report+0x118/0x608
[   50.246177]  kasan_report+0xdc/0x128
[   50.246206]  kasan_check_range+0x100/0x1a8
[   50.246240]  __kasan_check_write+0x20/0x30
[   50.246274]  kasan_atomics_helper+0x61c/0x4858
[   50.246307]  kasan_atomics+0x198/0x2e0
[   50.246335]  kunit_try_run_case+0x170/0x3f0
[   50.246369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.246404]  kthread+0x328/0x630
[   50.246435]  ret_from_fork+0x10/0x20
[   50.246465] 
[   50.317418] Allocated by task 310:
[   50.320804]  kasan_save_stack+0x3c/0x68
[   50.324623]  kasan_save_track+0x20/0x40
[   50.328443]  kasan_save_alloc_info+0x40/0x58
[   50.332696]  __kasan_kmalloc+0xd4/0xd8
[   50.336429]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.340942]  kasan_atomics+0xb8/0x2e0
[   50.344588]  kunit_try_run_case+0x170/0x3f0
[   50.348755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.354223]  kthread+0x328/0x630
[   50.357435]  ret_from_fork+0x10/0x20
[   50.360994] 
[   50.362471] The buggy address belongs to the object at ffff00080243ed00
[   50.362471]  which belongs to the cache kmalloc-64 of size 64
[   50.374798] The buggy address is located 0 bytes to the right of
[   50.374798]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   50.387643] 
[   50.389119] The buggy address belongs to the physical page:
[   50.394678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   50.402662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.409172] page_type: f5(slab)
[   50.412303] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.420028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.427746] page dumped because: kasan: bad access detected
[   50.433302] 
[   50.434777] Memory state around the buggy address:
[   50.439555]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.446760]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.453965] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.461166]                                      ^
[   50.465944]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.473150]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.480350] ==================================================================
[   54.978375] ==================================================================
[   54.985322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   54.992695] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   54.999987] 
[   55.001470] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   55.001521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.001537] Hardware name: WinLink E850-96 board (DT)
[   55.001558] Call trace:
[   55.001573]  show_stack+0x20/0x38 (C)
[   55.001607]  dump_stack_lvl+0x8c/0xd0
[   55.001639]  print_report+0x118/0x608
[   55.001672]  kasan_report+0xdc/0x128
[   55.001703]  __asan_report_load4_noabort+0x20/0x30
[   55.001740]  kasan_atomics_helper+0x3dd8/0x4858
[   55.001773]  kasan_atomics+0x198/0x2e0
[   55.001803]  kunit_try_run_case+0x170/0x3f0
[   55.001836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.001872]  kthread+0x328/0x630
[   55.001903]  ret_from_fork+0x10/0x20
[   55.001935] 
[   55.069605] Allocated by task 310:
[   55.072991]  kasan_save_stack+0x3c/0x68
[   55.076808]  kasan_save_track+0x20/0x40
[   55.080628]  kasan_save_alloc_info+0x40/0x58
[   55.084882]  __kasan_kmalloc+0xd4/0xd8
[   55.088614]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.093128]  kasan_atomics+0xb8/0x2e0
[   55.096774]  kunit_try_run_case+0x170/0x3f0
[   55.100940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.106409]  kthread+0x328/0x630
[   55.109621]  ret_from_fork+0x10/0x20
[   55.113180] 
[   55.114655] The buggy address belongs to the object at ffff00080243ed00
[   55.114655]  which belongs to the cache kmalloc-64 of size 64
[   55.126983] The buggy address is located 0 bytes to the right of
[   55.126983]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   55.139828] 
[   55.141305] The buggy address belongs to the physical page:
[   55.146864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   55.154847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.161356] page_type: f5(slab)
[   55.164489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.172213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.179932] page dumped because: kasan: bad access detected
[   55.185487] 
[   55.186963] Memory state around the buggy address:
[   55.191745]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.198946]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.206151] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.213352]                                      ^
[   55.218130]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.225336]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.232536] ==================================================================
[   59.469895] ==================================================================
[   59.476922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   59.484295] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   59.491673] 
[   59.493155] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   59.493204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.493219] Hardware name: WinLink E850-96 board (DT)
[   59.493237] Call trace:
[   59.493252]  show_stack+0x20/0x38 (C)
[   59.493285]  dump_stack_lvl+0x8c/0xd0
[   59.493318]  print_report+0x118/0x608
[   59.493348]  kasan_report+0xdc/0x128
[   59.493379]  kasan_check_range+0x100/0x1a8
[   59.493412]  __kasan_check_write+0x20/0x30
[   59.493449]  kasan_atomics_helper+0x12d8/0x4858
[   59.493480]  kasan_atomics+0x198/0x2e0
[   59.493509]  kunit_try_run_case+0x170/0x3f0
[   59.493540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.493575]  kthread+0x328/0x630
[   59.493605]  ret_from_fork+0x10/0x20
[   59.493638] 
[   59.564675] Allocated by task 310:
[   59.568062]  kasan_save_stack+0x3c/0x68
[   59.571880]  kasan_save_track+0x20/0x40
[   59.575700]  kasan_save_alloc_info+0x40/0x58
[   59.579953]  __kasan_kmalloc+0xd4/0xd8
[   59.583686]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.588199]  kasan_atomics+0xb8/0x2e0
[   59.591845]  kunit_try_run_case+0x170/0x3f0
[   59.596012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.601480]  kthread+0x328/0x630
[   59.604692]  ret_from_fork+0x10/0x20
[   59.608251] 
[   59.609728] The buggy address belongs to the object at ffff00080243ed00
[   59.609728]  which belongs to the cache kmalloc-64 of size 64
[   59.622056] The buggy address is located 0 bytes to the right of
[   59.622056]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   59.634900] 
[   59.636376] The buggy address belongs to the physical page:
[   59.641935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   59.649920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.656427] page_type: f5(slab)
[   59.659562] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.667284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.675004] page dumped because: kasan: bad access detected
[   59.680559] 
[   59.682034] Memory state around the buggy address:
[   59.686814]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.694017]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.701222] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.708423]                                      ^
[   59.713201]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.720408]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.727607] ==================================================================
[   57.084535] ==================================================================
[   57.091539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   57.098827] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   57.106205] 
[   57.107688] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   57.107738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.107755] Hardware name: WinLink E850-96 board (DT)
[   57.107774] Call trace:
[   57.107789]  show_stack+0x20/0x38 (C)
[   57.107821]  dump_stack_lvl+0x8c/0xd0
[   57.107851]  print_report+0x118/0x608
[   57.107883]  kasan_report+0xdc/0x128
[   57.107915]  kasan_check_range+0x100/0x1a8
[   57.107949]  __kasan_check_write+0x20/0x30
[   57.107980]  kasan_atomics_helper+0xf20/0x4858
[   57.108012]  kasan_atomics+0x198/0x2e0
[   57.108040]  kunit_try_run_case+0x170/0x3f0
[   57.108074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.108112]  kthread+0x328/0x630
[   57.108143]  ret_from_fork+0x10/0x20
[   57.108174] 
[   57.179121] Allocated by task 310:
[   57.182508]  kasan_save_stack+0x3c/0x68
[   57.186326]  kasan_save_track+0x20/0x40
[   57.190145]  kasan_save_alloc_info+0x40/0x58
[   57.194399]  __kasan_kmalloc+0xd4/0xd8
[   57.198131]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.202645]  kasan_atomics+0xb8/0x2e0
[   57.206291]  kunit_try_run_case+0x170/0x3f0
[   57.210457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.215926]  kthread+0x328/0x630
[   57.219137]  ret_from_fork+0x10/0x20
[   57.222697] 
[   57.224172] The buggy address belongs to the object at ffff00080243ed00
[   57.224172]  which belongs to the cache kmalloc-64 of size 64
[   57.236500] The buggy address is located 0 bytes to the right of
[   57.236500]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   57.249346] 
[   57.250823] The buggy address belongs to the physical page:
[   57.256379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   57.264365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.270873] page_type: f5(slab)
[   57.274007] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.281730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.289449] page dumped because: kasan: bad access detected
[   57.295004] 
[   57.296480] Memory state around the buggy address:
[   57.301260]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.308463]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.315667] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.322869]                                      ^
[   57.327647]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.334853]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.342053] ==================================================================
[   53.660267] ==================================================================
[   53.667283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   53.674573] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   53.681951] 
[   53.683432] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   53.683482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.683500] Hardware name: WinLink E850-96 board (DT)
[   53.683519] Call trace:
[   53.683535]  show_stack+0x20/0x38 (C)
[   53.683568]  dump_stack_lvl+0x8c/0xd0
[   53.683599]  print_report+0x118/0x608
[   53.683632]  kasan_report+0xdc/0x128
[   53.683662]  kasan_check_range+0x100/0x1a8
[   53.683695]  __kasan_check_write+0x20/0x30
[   53.683730]  kasan_atomics_helper+0xb70/0x4858
[   53.683763]  kasan_atomics+0x198/0x2e0
[   53.683794]  kunit_try_run_case+0x170/0x3f0
[   53.683821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.683858]  kthread+0x328/0x630
[   53.683890]  ret_from_fork+0x10/0x20
[   53.683919] 
[   53.754866] Allocated by task 310:
[   53.758254]  kasan_save_stack+0x3c/0x68
[   53.762071]  kasan_save_track+0x20/0x40
[   53.765891]  kasan_save_alloc_info+0x40/0x58
[   53.770144]  __kasan_kmalloc+0xd4/0xd8
[   53.773877]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.778390]  kasan_atomics+0xb8/0x2e0
[   53.782037]  kunit_try_run_case+0x170/0x3f0
[   53.786203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.791672]  kthread+0x328/0x630
[   53.794883]  ret_from_fork+0x10/0x20
[   53.798443] 
[   53.799918] The buggy address belongs to the object at ffff00080243ed00
[   53.799918]  which belongs to the cache kmalloc-64 of size 64
[   53.812246] The buggy address is located 0 bytes to the right of
[   53.812246]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   53.825091] 
[   53.826567] The buggy address belongs to the physical page:
[   53.832125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   53.840109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.846619] page_type: f5(slab)
[   53.849752] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.857476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.865195] page dumped because: kasan: bad access detected
[   53.870750] 
[   53.872226] Memory state around the buggy address:
[   53.877006]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.884209]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.891414] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.898615]                                      ^
[   53.903393]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.910598]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.917798] ==================================================================
[   58.674540] ==================================================================
[   58.681617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   58.688994] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   58.696372] 
[   58.697855] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   58.697906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.697921] Hardware name: WinLink E850-96 board (DT)
[   58.697942] Call trace:
[   58.697954]  show_stack+0x20/0x38 (C)
[   58.697984]  dump_stack_lvl+0x8c/0xd0
[   58.698016]  print_report+0x118/0x608
[   58.698048]  kasan_report+0xdc/0x128
[   58.698077]  kasan_check_range+0x100/0x1a8
[   58.698111]  __kasan_check_write+0x20/0x30
[   58.698147]  kasan_atomics_helper+0x1190/0x4858
[   58.698178]  kasan_atomics+0x198/0x2e0
[   58.698208]  kunit_try_run_case+0x170/0x3f0
[   58.698239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.698276]  kthread+0x328/0x630
[   58.698308]  ret_from_fork+0x10/0x20
[   58.698339] 
[   58.769374] Allocated by task 310:
[   58.772762]  kasan_save_stack+0x3c/0x68
[   58.776580]  kasan_save_track+0x20/0x40
[   58.780399]  kasan_save_alloc_info+0x40/0x58
[   58.784652]  __kasan_kmalloc+0xd4/0xd8
[   58.788385]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.792899]  kasan_atomics+0xb8/0x2e0
[   58.796545]  kunit_try_run_case+0x170/0x3f0
[   58.800711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.806179]  kthread+0x328/0x630
[   58.809391]  ret_from_fork+0x10/0x20
[   58.812951] 
[   58.814426] The buggy address belongs to the object at ffff00080243ed00
[   58.814426]  which belongs to the cache kmalloc-64 of size 64
[   58.826754] The buggy address is located 0 bytes to the right of
[   58.826754]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   58.839599] 
[   58.841075] The buggy address belongs to the physical page:
[   58.846634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   58.854619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.861127] page_type: f5(slab)
[   58.864260] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.871984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.879703] page dumped because: kasan: bad access detected
[   58.885258] 
[   58.886734] Memory state around the buggy address:
[   58.891512]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.898717]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.905921] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.913123]                                      ^
[   58.917901]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.925107]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.932307] ==================================================================
[   61.057073] ==================================================================
[   61.064048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   61.071424] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   61.078802] 
[   61.080284] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   61.080333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.080350] Hardware name: WinLink E850-96 board (DT)
[   61.080370] Call trace:
[   61.080385]  show_stack+0x20/0x38 (C)
[   61.080418]  dump_stack_lvl+0x8c/0xd0
[   61.080448]  print_report+0x118/0x608
[   61.080482]  kasan_report+0xdc/0x128
[   61.080514]  kasan_check_range+0x100/0x1a8
[   61.080546]  __kasan_check_write+0x20/0x30
[   61.080582]  kasan_atomics_helper+0x154c/0x4858
[   61.080614]  kasan_atomics+0x198/0x2e0
[   61.080643]  kunit_try_run_case+0x170/0x3f0
[   61.080674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.080710]  kthread+0x328/0x630
[   61.080743]  ret_from_fork+0x10/0x20
[   61.080775] 
[   61.151804] Allocated by task 310:
[   61.155191]  kasan_save_stack+0x3c/0x68
[   61.159009]  kasan_save_track+0x20/0x40
[   61.162829]  kasan_save_alloc_info+0x40/0x58
[   61.167082]  __kasan_kmalloc+0xd4/0xd8
[   61.170814]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.175328]  kasan_atomics+0xb8/0x2e0
[   61.178974]  kunit_try_run_case+0x170/0x3f0
[   61.183141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.188609]  kthread+0x328/0x630
[   61.191821]  ret_from_fork+0x10/0x20
[   61.195380] 
[   61.196857] The buggy address belongs to the object at ffff00080243ed00
[   61.196857]  which belongs to the cache kmalloc-64 of size 64
[   61.209182] The buggy address is located 0 bytes to the right of
[   61.209182]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   61.222029] 
[   61.223505] The buggy address belongs to the physical page:
[   61.229063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   61.237048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.243558] page_type: f5(slab)
[   61.246689] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.254413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.262132] page dumped because: kasan: bad access detected
[   61.267688] 
[   61.269163] Memory state around the buggy address:
[   61.273943]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.281147]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.288351] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.295552]                                      ^
[   61.300330]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.307536]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.314736] ==================================================================
[   57.879293] ==================================================================
[   57.886317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   57.893694] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   57.901072] 
[   57.902553] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   57.902601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.902619] Hardware name: WinLink E850-96 board (DT)
[   57.902638] Call trace:
[   57.902653]  show_stack+0x20/0x38 (C)
[   57.902687]  dump_stack_lvl+0x8c/0xd0
[   57.902719]  print_report+0x118/0x608
[   57.902750]  kasan_report+0xdc/0x128
[   57.902781]  kasan_check_range+0x100/0x1a8
[   57.902814]  __kasan_check_write+0x20/0x30
[   57.902848]  kasan_atomics_helper+0x1058/0x4858
[   57.902880]  kasan_atomics+0x198/0x2e0
[   57.902908]  kunit_try_run_case+0x170/0x3f0
[   57.902937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.902973]  kthread+0x328/0x630
[   57.903003]  ret_from_fork+0x10/0x20
[   57.903034] 
[   57.974074] Allocated by task 310:
[   57.977461]  kasan_save_stack+0x3c/0x68
[   57.981279]  kasan_save_track+0x20/0x40
[   57.985098]  kasan_save_alloc_info+0x40/0x58
[   57.989352]  __kasan_kmalloc+0xd4/0xd8
[   57.993085]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.997598]  kasan_atomics+0xb8/0x2e0
[   58.001244]  kunit_try_run_case+0x170/0x3f0
[   58.005410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.010879]  kthread+0x328/0x630
[   58.014091]  ret_from_fork+0x10/0x20
[   58.017650] 
[   58.019125] The buggy address belongs to the object at ffff00080243ed00
[   58.019125]  which belongs to the cache kmalloc-64 of size 64
[   58.031452] The buggy address is located 0 bytes to the right of
[   58.031452]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   58.044299] 
[   58.045775] The buggy address belongs to the physical page:
[   58.051334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   58.059317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.065827] page_type: f5(slab)
[   58.068959] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.076683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.084402] page dumped because: kasan: bad access detected
[   58.089958] 
[   58.091433] Memory state around the buggy address:
[   58.096212]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.103417]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.110621] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.117822]                                      ^
[   58.122600]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.129806]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.137006] ==================================================================
[   49.957962] ==================================================================
[   49.964914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   49.972198] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   49.979576] 
[   49.981059] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   49.981111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.981129] Hardware name: WinLink E850-96 board (DT)
[   49.981150] Call trace:
[   49.981165]  show_stack+0x20/0x38 (C)
[   49.981199]  dump_stack_lvl+0x8c/0xd0
[   49.981230]  print_report+0x118/0x608
[   49.981262]  kasan_report+0xdc/0x128
[   49.981295]  kasan_check_range+0x100/0x1a8
[   49.981328]  __kasan_check_write+0x20/0x30
[   49.981364]  kasan_atomics_helper+0x5b4/0x4858
[   49.981395]  kasan_atomics+0x198/0x2e0
[   49.981425]  kunit_try_run_case+0x170/0x3f0
[   49.981454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.981489]  kthread+0x328/0x630
[   49.981521]  ret_from_fork+0x10/0x20
[   49.981554] 
[   50.052492] Allocated by task 310:
[   50.055879]  kasan_save_stack+0x3c/0x68
[   50.059696]  kasan_save_track+0x20/0x40
[   50.063516]  kasan_save_alloc_info+0x40/0x58
[   50.067770]  __kasan_kmalloc+0xd4/0xd8
[   50.071502]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.076016]  kasan_atomics+0xb8/0x2e0
[   50.079662]  kunit_try_run_case+0x170/0x3f0
[   50.083828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.089296]  kthread+0x328/0x630
[   50.092509]  ret_from_fork+0x10/0x20
[   50.096068] 
[   50.097544] The buggy address belongs to the object at ffff00080243ed00
[   50.097544]  which belongs to the cache kmalloc-64 of size 64
[   50.109871] The buggy address is located 0 bytes to the right of
[   50.109871]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   50.122717] 
[   50.124192] The buggy address belongs to the physical page:
[   50.129752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   50.137736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.144245] page_type: f5(slab)
[   50.147377] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.155101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.162820] page dumped because: kasan: bad access detected
[   50.168375] 
[   50.169851] Memory state around the buggy address:
[   50.174633]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.181834]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.189039] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.196240]                                      ^
[   50.201018]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.208224]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.215423] ==================================================================
[   54.713339] ==================================================================
[   54.720392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   54.727682] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   54.735061] 
[   54.736543] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   54.736597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.736612] Hardware name: WinLink E850-96 board (DT)
[   54.736634] Call trace:
[   54.736647]  show_stack+0x20/0x38 (C)
[   54.736676]  dump_stack_lvl+0x8c/0xd0
[   54.736709]  print_report+0x118/0x608
[   54.736739]  kasan_report+0xdc/0x128
[   54.736770]  kasan_check_range+0x100/0x1a8
[   54.736803]  __kasan_check_write+0x20/0x30
[   54.736836]  kasan_atomics_helper+0xca0/0x4858
[   54.736869]  kasan_atomics+0x198/0x2e0
[   54.736898]  kunit_try_run_case+0x170/0x3f0
[   54.736928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.736962]  kthread+0x328/0x630
[   54.736993]  ret_from_fork+0x10/0x20
[   54.737025] 
[   54.807975] Allocated by task 310:
[   54.811363]  kasan_save_stack+0x3c/0x68
[   54.815181]  kasan_save_track+0x20/0x40
[   54.819000]  kasan_save_alloc_info+0x40/0x58
[   54.823253]  __kasan_kmalloc+0xd4/0xd8
[   54.826986]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.831500]  kasan_atomics+0xb8/0x2e0
[   54.835145]  kunit_try_run_case+0x170/0x3f0
[   54.839312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.844781]  kthread+0x328/0x630
[   54.847993]  ret_from_fork+0x10/0x20
[   54.851552] 
[   54.853029] The buggy address belongs to the object at ffff00080243ed00
[   54.853029]  which belongs to the cache kmalloc-64 of size 64
[   54.865355] The buggy address is located 0 bytes to the right of
[   54.865355]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   54.878201] 
[   54.879676] The buggy address belongs to the physical page:
[   54.885235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   54.893218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.899730] page_type: f5(slab)
[   54.902861] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.910585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.918304] page dumped because: kasan: bad access detected
[   54.923860] 
[   54.925335] Memory state around the buggy address:
[   54.930113]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.937318]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.944522] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.951724]                                      ^
[   54.956501]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.963708]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.970908] ==================================================================
[   48.898219] ==================================================================
[   48.905202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   48.912492] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   48.919870] 
[   48.921351] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   48.921398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.921415] Hardware name: WinLink E850-96 board (DT)
[   48.921433] Call trace:
[   48.921447]  show_stack+0x20/0x38 (C)
[   48.921482]  dump_stack_lvl+0x8c/0xd0
[   48.921513]  print_report+0x118/0x608
[   48.921545]  kasan_report+0xdc/0x128
[   48.921575]  kasan_check_range+0x100/0x1a8
[   48.921609]  __kasan_check_write+0x20/0x30
[   48.921643]  kasan_atomics_helper+0x414/0x4858
[   48.921673]  kasan_atomics+0x198/0x2e0
[   48.921702]  kunit_try_run_case+0x170/0x3f0
[   48.921732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.921765]  kthread+0x328/0x630
[   48.921798]  ret_from_fork+0x10/0x20
[   48.921829] 
[   48.992785] Allocated by task 310:
[   48.996173]  kasan_save_stack+0x3c/0x68
[   48.999990]  kasan_save_track+0x20/0x40
[   49.003810]  kasan_save_alloc_info+0x40/0x58
[   49.008063]  __kasan_kmalloc+0xd4/0xd8
[   49.011796]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.016309]  kasan_atomics+0xb8/0x2e0
[   49.019955]  kunit_try_run_case+0x170/0x3f0
[   49.024122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.029590]  kthread+0x328/0x630
[   49.032802]  ret_from_fork+0x10/0x20
[   49.036361] 
[   49.037838] The buggy address belongs to the object at ffff00080243ed00
[   49.037838]  which belongs to the cache kmalloc-64 of size 64
[   49.050165] The buggy address is located 0 bytes to the right of
[   49.050165]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   49.063010] 
[   49.064486] The buggy address belongs to the physical page:
[   49.070044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   49.078029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.084537] page_type: f5(slab)
[   49.087670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.095395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.103114] page dumped because: kasan: bad access detected
[   49.108669] 
[   49.110144] Memory state around the buggy address:
[   49.114923]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.122127]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.129332] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.136533]                                      ^
[   49.141311]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.148517]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.155717] ==================================================================
[   50.487739] ==================================================================
[   50.494761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   50.502051] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   50.509430] 
[   50.510911] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   50.510959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.510976] Hardware name: WinLink E850-96 board (DT)
[   50.510995] Call trace:
[   50.511006]  show_stack+0x20/0x38 (C)
[   50.511038]  dump_stack_lvl+0x8c/0xd0
[   50.511069]  print_report+0x118/0x608
[   50.511101]  kasan_report+0xdc/0x128
[   50.511131]  kasan_check_range+0x100/0x1a8
[   50.511164]  __kasan_check_write+0x20/0x30
[   50.511198]  kasan_atomics_helper+0x684/0x4858
[   50.511228]  kasan_atomics+0x198/0x2e0
[   50.511256]  kunit_try_run_case+0x170/0x3f0
[   50.511286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.511321]  kthread+0x328/0x630
[   50.511353]  ret_from_fork+0x10/0x20
[   50.511382] 
[   50.582345] Allocated by task 310:
[   50.585732]  kasan_save_stack+0x3c/0x68
[   50.589550]  kasan_save_track+0x20/0x40
[   50.593369]  kasan_save_alloc_info+0x40/0x58
[   50.597622]  __kasan_kmalloc+0xd4/0xd8
[   50.601355]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.605869]  kasan_atomics+0xb8/0x2e0
[   50.609515]  kunit_try_run_case+0x170/0x3f0
[   50.613681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.619150]  kthread+0x328/0x630
[   50.622362]  ret_from_fork+0x10/0x20
[   50.625921] 
[   50.627398] The buggy address belongs to the object at ffff00080243ed00
[   50.627398]  which belongs to the cache kmalloc-64 of size 64
[   50.639723] The buggy address is located 0 bytes to the right of
[   50.639723]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   50.652569] 
[   50.654045] The buggy address belongs to the physical page:
[   50.659604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   50.667588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.674098] page_type: f5(slab)
[   50.677230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.684954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.692673] page dumped because: kasan: bad access detected
[   50.698228] 
[   50.699704] Memory state around the buggy address:
[   50.704482]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.711687]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.718892] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.726092]                                      ^
[   50.730871]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.738077]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.745276] ==================================================================
[   55.766428] ==================================================================
[   55.773501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   55.780792] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   55.788083] 
[   55.789566] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   55.789615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.789631] Hardware name: WinLink E850-96 board (DT)
[   55.789650] Call trace:
[   55.789661]  show_stack+0x20/0x38 (C)
[   55.789694]  dump_stack_lvl+0x8c/0xd0
[   55.789724]  print_report+0x118/0x608
[   55.789755]  kasan_report+0xdc/0x128
[   55.789787]  kasan_check_range+0x100/0x1a8
[   55.789820]  __kasan_check_read+0x20/0x30
[   55.789855]  kasan_atomics_helper+0xdd4/0x4858
[   55.789886]  kasan_atomics+0x198/0x2e0
[   55.789916]  kunit_try_run_case+0x170/0x3f0
[   55.789946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.789981]  kthread+0x328/0x630
[   55.790015]  ret_from_fork+0x10/0x20
[   55.790048] 
[   55.860913] Allocated by task 310:
[   55.864299]  kasan_save_stack+0x3c/0x68
[   55.868116]  kasan_save_track+0x20/0x40
[   55.871936]  kasan_save_alloc_info+0x40/0x58
[   55.876189]  __kasan_kmalloc+0xd4/0xd8
[   55.879922]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.884435]  kasan_atomics+0xb8/0x2e0
[   55.888081]  kunit_try_run_case+0x170/0x3f0
[   55.892248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.897716]  kthread+0x328/0x630
[   55.900928]  ret_from_fork+0x10/0x20
[   55.904487] 
[   55.905964] The buggy address belongs to the object at ffff00080243ed00
[   55.905964]  which belongs to the cache kmalloc-64 of size 64
[   55.918293] The buggy address is located 0 bytes to the right of
[   55.918293]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   55.931136] 
[   55.932612] The buggy address belongs to the physical page:
[   55.938171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   55.946155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.952665] page_type: f5(slab)
[   55.955797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.963521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.971240] page dumped because: kasan: bad access detected
[   55.976795] 
[   55.978271] Memory state around the buggy address:
[   55.983050]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.990253]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.997458] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.004659]                                      ^
[   56.009437]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.016644]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.023843] ==================================================================
[   57.614338] ==================================================================
[   57.621391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   57.628681] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   57.636059] 
[   57.637540] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   57.637588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.637606] Hardware name: WinLink E850-96 board (DT)
[   57.637625] Call trace:
[   57.637642]  show_stack+0x20/0x38 (C)
[   57.637675]  dump_stack_lvl+0x8c/0xd0
[   57.637707]  print_report+0x118/0x608
[   57.637737]  kasan_report+0xdc/0x128
[   57.637769]  kasan_check_range+0x100/0x1a8
[   57.637803]  __kasan_check_write+0x20/0x30
[   57.637838]  kasan_atomics_helper+0xff0/0x4858
[   57.637870]  kasan_atomics+0x198/0x2e0
[   57.637898]  kunit_try_run_case+0x170/0x3f0
[   57.637930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.637967]  kthread+0x328/0x630
[   57.637998]  ret_from_fork+0x10/0x20
[   57.638030] 
[   57.708974] Allocated by task 310:
[   57.712361]  kasan_save_stack+0x3c/0x68
[   57.716179]  kasan_save_track+0x20/0x40
[   57.719998]  kasan_save_alloc_info+0x40/0x58
[   57.724251]  __kasan_kmalloc+0xd4/0xd8
[   57.727984]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.732498]  kasan_atomics+0xb8/0x2e0
[   57.736144]  kunit_try_run_case+0x170/0x3f0
[   57.740310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.745779]  kthread+0x328/0x630
[   57.748991]  ret_from_fork+0x10/0x20
[   57.752549] 
[   57.754027] The buggy address belongs to the object at ffff00080243ed00
[   57.754027]  which belongs to the cache kmalloc-64 of size 64
[   57.766352] The buggy address is located 0 bytes to the right of
[   57.766352]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   57.779199] 
[   57.780674] The buggy address belongs to the physical page:
[   57.786232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   57.794216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.800726] page_type: f5(slab)
[   57.803859] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.811584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.819302] page dumped because: kasan: bad access detected
[   57.824858] 
[   57.826333] Memory state around the buggy address:
[   57.831111]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.838316]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.845521] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.852722]                                      ^
[   57.857500]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.864706]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.871906] ==================================================================
[   47.050390] ==================================================================
[   47.057489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   47.064776] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   47.072068] 
[   47.073549] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   47.073606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.073622] Hardware name: WinLink E850-96 board (DT)
[   47.073641] Call trace:
[   47.073654]  show_stack+0x20/0x38 (C)
[   47.073689]  dump_stack_lvl+0x8c/0xd0
[   47.073724]  print_report+0x118/0x608
[   47.073755]  kasan_report+0xdc/0x128
[   47.073785]  kasan_check_range+0x100/0x1a8
[   47.073820]  __kasan_check_read+0x20/0x30
[   47.073854]  kasan_atomics_helper+0x1ec/0x4858
[   47.073886]  kasan_atomics+0x198/0x2e0
[   47.073917]  kunit_try_run_case+0x170/0x3f0
[   47.073950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.073985]  kthread+0x328/0x630
[   47.074018]  ret_from_fork+0x10/0x20
[   47.074051] 
[   47.144896] Allocated by task 310:
[   47.148284]  kasan_save_stack+0x3c/0x68
[   47.152101]  kasan_save_track+0x20/0x40
[   47.155921]  kasan_save_alloc_info+0x40/0x58
[   47.160174]  __kasan_kmalloc+0xd4/0xd8
[   47.163907]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.168421]  kasan_atomics+0xb8/0x2e0
[   47.172066]  kunit_try_run_case+0x170/0x3f0
[   47.176233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.181703]  kthread+0x328/0x630
[   47.184913]  ret_from_fork+0x10/0x20
[   47.188472] 
[   47.189951] The buggy address belongs to the object at ffff00080243ed00
[   47.189951]  which belongs to the cache kmalloc-64 of size 64
[   47.202276] The buggy address is located 0 bytes to the right of
[   47.202276]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   47.215121] 
[   47.216597] The buggy address belongs to the physical page:
[   47.222156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   47.230141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.236650] page_type: f5(slab)
[   47.239781] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.247506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.255225] page dumped because: kasan: bad access detected
[   47.260780] 
[   47.262256] Memory state around the buggy address:
[   47.267034]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.274239]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.281444] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.288644]                                      ^
[   47.293423]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.300629]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.307828] ==================================================================
[   56.819584] ==================================================================
[   56.826612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   56.833900] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   56.841278] 
[   56.842761] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   56.842812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.842828] Hardware name: WinLink E850-96 board (DT)
[   56.842848] Call trace:
[   56.842863]  show_stack+0x20/0x38 (C)
[   56.842894]  dump_stack_lvl+0x8c/0xd0
[   56.842925]  print_report+0x118/0x608
[   56.842957]  kasan_report+0xdc/0x128
[   56.842987]  kasan_check_range+0x100/0x1a8
[   56.843021]  __kasan_check_write+0x20/0x30
[   56.843056]  kasan_atomics_helper+0xeb8/0x4858
[   56.843089]  kasan_atomics+0x198/0x2e0
[   56.843118]  kunit_try_run_case+0x170/0x3f0
[   56.843150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.843184]  kthread+0x328/0x630
[   56.843216]  ret_from_fork+0x10/0x20
[   56.843250] 
[   56.914194] Allocated by task 310:
[   56.917582]  kasan_save_stack+0x3c/0x68
[   56.921400]  kasan_save_track+0x20/0x40
[   56.925218]  kasan_save_alloc_info+0x40/0x58
[   56.929472]  __kasan_kmalloc+0xd4/0xd8
[   56.933205]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.937718]  kasan_atomics+0xb8/0x2e0
[   56.941364]  kunit_try_run_case+0x170/0x3f0
[   56.945531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.950999]  kthread+0x328/0x630
[   56.954211]  ret_from_fork+0x10/0x20
[   56.957770] 
[   56.959247] The buggy address belongs to the object at ffff00080243ed00
[   56.959247]  which belongs to the cache kmalloc-64 of size 64
[   56.971575] The buggy address is located 0 bytes to the right of
[   56.971575]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   56.984419] 
[   56.985895] The buggy address belongs to the physical page:
[   56.991454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   56.999437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.005946] page_type: f5(slab)
[   57.009081] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.016803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.024523] page dumped because: kasan: bad access detected
[   57.030078] 
[   57.031553] Memory state around the buggy address:
[   57.036331]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.043536]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.050741] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.057942]                                      ^
[   57.062720]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.069926]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.077126] ==================================================================
[   48.106552] ==================================================================
[   48.113547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   48.120837] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   48.128215] 
[   48.129697] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   48.129749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.129765] Hardware name: WinLink E850-96 board (DT)
[   48.129786] Call trace:
[   48.129799]  show_stack+0x20/0x38 (C)
[   48.129834]  dump_stack_lvl+0x8c/0xd0
[   48.129865]  print_report+0x118/0x608
[   48.129899]  kasan_report+0xdc/0x128
[   48.129929]  kasan_check_range+0x100/0x1a8
[   48.129960]  __kasan_check_write+0x20/0x30
[   48.129995]  kasan_atomics_helper+0x32c/0x4858
[   48.130026]  kasan_atomics+0x198/0x2e0
[   48.130056]  kunit_try_run_case+0x170/0x3f0
[   48.130086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.130121]  kthread+0x328/0x630
[   48.130153]  ret_from_fork+0x10/0x20
[   48.130187] 
[   48.201131] Allocated by task 310:
[   48.204520]  kasan_save_stack+0x3c/0x68
[   48.208336]  kasan_save_track+0x20/0x40
[   48.212155]  kasan_save_alloc_info+0x40/0x58
[   48.216408]  __kasan_kmalloc+0xd4/0xd8
[   48.220141]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.224655]  kasan_atomics+0xb8/0x2e0
[   48.228300]  kunit_try_run_case+0x170/0x3f0
[   48.232467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.237936]  kthread+0x328/0x630
[   48.241147]  ret_from_fork+0x10/0x20
[   48.244706] 
[   48.246184] The buggy address belongs to the object at ffff00080243ed00
[   48.246184]  which belongs to the cache kmalloc-64 of size 64
[   48.258509] The buggy address is located 0 bytes to the right of
[   48.258509]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   48.271355] 
[   48.272831] The buggy address belongs to the physical page:
[   48.278389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   48.286373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.292884] page_type: f5(slab)
[   48.296019] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.303740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.311459] page dumped because: kasan: bad access detected
[   48.317014] 
[   48.318490] Memory state around the buggy address:
[   48.323270]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.330473]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.337677] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.344878]                                      ^
[   48.349657]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.356863]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.364062] ==================================================================
[   51.812349] ==================================================================
[   51.819394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   51.826771] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   51.834062] 
[   51.835542] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   51.835591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.835606] Hardware name: WinLink E850-96 board (DT)
[   51.835626] Call trace:
[   51.835641]  show_stack+0x20/0x38 (C)
[   51.835674]  dump_stack_lvl+0x8c/0xd0
[   51.835707]  print_report+0x118/0x608
[   51.835738]  kasan_report+0xdc/0x128
[   51.835768]  __asan_report_load4_noabort+0x20/0x30
[   51.835806]  kasan_atomics_helper+0x42d8/0x4858
[   51.835838]  kasan_atomics+0x198/0x2e0
[   51.835869]  kunit_try_run_case+0x170/0x3f0
[   51.835900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.835937]  kthread+0x328/0x630
[   51.835969]  ret_from_fork+0x10/0x20
[   51.836002] 
[   51.903679] Allocated by task 310:
[   51.907067]  kasan_save_stack+0x3c/0x68
[   51.910884]  kasan_save_track+0x20/0x40
[   51.914704]  kasan_save_alloc_info+0x40/0x58
[   51.918957]  __kasan_kmalloc+0xd4/0xd8
[   51.922690]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.927203]  kasan_atomics+0xb8/0x2e0
[   51.930849]  kunit_try_run_case+0x170/0x3f0
[   51.935016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.940484]  kthread+0x328/0x630
[   51.943696]  ret_from_fork+0x10/0x20
[   51.947255] 
[   51.948730] The buggy address belongs to the object at ffff00080243ed00
[   51.948730]  which belongs to the cache kmalloc-64 of size 64
[   51.961057] The buggy address is located 0 bytes to the right of
[   51.961057]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   51.973904] 
[   51.975380] The buggy address belongs to the physical page:
[   51.980939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   51.988923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.995431] page_type: f5(slab)
[   51.998564] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.006289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.014007] page dumped because: kasan: bad access detected
[   52.019563] 
[   52.021038] Memory state around the buggy address:
[   52.025816]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.033021]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.040226] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.047427]                                      ^
[   52.052205]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.059411]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.066611] ==================================================================
[   61.587194] ==================================================================
[   61.594248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   61.601624] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   61.608915] 
[   61.610397] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   61.610446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.610464] Hardware name: WinLink E850-96 board (DT)
[   61.610486] Call trace:
[   61.610499]  show_stack+0x20/0x38 (C)
[   61.610533]  dump_stack_lvl+0x8c/0xd0
[   61.610565]  print_report+0x118/0x608
[   61.610598]  kasan_report+0xdc/0x128
[   61.610629]  __asan_report_load8_noabort+0x20/0x30
[   61.610666]  kasan_atomics_helper+0x3db0/0x4858
[   61.610698]  kasan_atomics+0x198/0x2e0
[   61.610727]  kunit_try_run_case+0x170/0x3f0
[   61.610756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.610792]  kthread+0x328/0x630
[   61.610823]  ret_from_fork+0x10/0x20
[   61.610857] 
[   61.678532] Allocated by task 310:
[   61.681921]  kasan_save_stack+0x3c/0x68
[   61.685737]  kasan_save_track+0x20/0x40
[   61.689557]  kasan_save_alloc_info+0x40/0x58
[   61.693810]  __kasan_kmalloc+0xd4/0xd8
[   61.697543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.702057]  kasan_atomics+0xb8/0x2e0
[   61.705702]  kunit_try_run_case+0x170/0x3f0
[   61.709869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.715337]  kthread+0x328/0x630
[   61.718549]  ret_from_fork+0x10/0x20
[   61.722108] 
[   61.723583] The buggy address belongs to the object at ffff00080243ed00
[   61.723583]  which belongs to the cache kmalloc-64 of size 64
[   61.735912] The buggy address is located 0 bytes to the right of
[   61.735912]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   61.748757] 
[   61.750233] The buggy address belongs to the physical page:
[   61.755792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   61.763775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.770286] page_type: f5(slab)
[   61.773417] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.781142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.788861] page dumped because: kasan: bad access detected
[   61.794416] 
[   61.795892] Memory state around the buggy address:
[   61.800671]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.807874]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.815079] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.822280]                                      ^
[   61.827058]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.834264]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.841464] ==================================================================
[   63.429010] ==================================================================
[   63.436063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   63.443437] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   63.450815] 
[   63.452296] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   63.452343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.452361] Hardware name: WinLink E850-96 board (DT)
[   63.452382] Call trace:
[   63.452393]  show_stack+0x20/0x38 (C)
[   63.452426]  dump_stack_lvl+0x8c/0xd0
[   63.452457]  print_report+0x118/0x608
[   63.452488]  kasan_report+0xdc/0x128
[   63.452519]  kasan_check_range+0x100/0x1a8
[   63.452554]  __kasan_check_write+0x20/0x30
[   63.452589]  kasan_atomics_helper+0x17ec/0x4858
[   63.452622]  kasan_atomics+0x198/0x2e0
[   63.452651]  kunit_try_run_case+0x170/0x3f0
[   63.452681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.452718]  kthread+0x328/0x630
[   63.452750]  ret_from_fork+0x10/0x20
[   63.452782] 
[   63.523817] Allocated by task 310:
[   63.527204]  kasan_save_stack+0x3c/0x68
[   63.531022]  kasan_save_track+0x20/0x40
[   63.534842]  kasan_save_alloc_info+0x40/0x58
[   63.539095]  __kasan_kmalloc+0xd4/0xd8
[   63.542827]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.547341]  kasan_atomics+0xb8/0x2e0
[   63.550987]  kunit_try_run_case+0x170/0x3f0
[   63.555154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.560622]  kthread+0x328/0x630
[   63.563834]  ret_from_fork+0x10/0x20
[   63.567393] 
[   63.568870] The buggy address belongs to the object at ffff00080243ed00
[   63.568870]  which belongs to the cache kmalloc-64 of size 64
[   63.581197] The buggy address is located 0 bytes to the right of
[   63.581197]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   63.594042] 
[   63.595518] The buggy address belongs to the physical page:
[   63.601077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   63.609061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.615571] page_type: f5(slab)
[   63.618702] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.626426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.634145] page dumped because: kasan: bad access detected
[   63.639700] 
[   63.641176] Memory state around the buggy address:
[   63.645956]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.653159]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.660364] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.667565]                                      ^
[   63.672343]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.679549]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.686749] ==================================================================
[   52.074086] ==================================================================
[   52.081024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   52.088313] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   52.095690] 
[   52.097173] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   52.097224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.097240] Hardware name: WinLink E850-96 board (DT)
[   52.097262] Call trace:
[   52.097274]  show_stack+0x20/0x38 (C)
[   52.097308]  dump_stack_lvl+0x8c/0xd0
[   52.097340]  print_report+0x118/0x608
[   52.097371]  kasan_report+0xdc/0x128
[   52.097401]  kasan_check_range+0x100/0x1a8
[   52.097433]  __kasan_check_write+0x20/0x30
[   52.097468]  kasan_atomics_helper+0x934/0x4858
[   52.097500]  kasan_atomics+0x198/0x2e0
[   52.097529]  kunit_try_run_case+0x170/0x3f0
[   52.097560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.097594]  kthread+0x328/0x630
[   52.097628]  ret_from_fork+0x10/0x20
[   52.097659] 
[   52.168605] Allocated by task 310:
[   52.171995]  kasan_save_stack+0x3c/0x68
[   52.175811]  kasan_save_track+0x20/0x40
[   52.179630]  kasan_save_alloc_info+0x40/0x58
[   52.183883]  __kasan_kmalloc+0xd4/0xd8
[   52.187616]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.192130]  kasan_atomics+0xb8/0x2e0
[   52.195776]  kunit_try_run_case+0x170/0x3f0
[   52.199942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.205411]  kthread+0x328/0x630
[   52.208623]  ret_from_fork+0x10/0x20
[   52.212182] 
[   52.213658] The buggy address belongs to the object at ffff00080243ed00
[   52.213658]  which belongs to the cache kmalloc-64 of size 64
[   52.225984] The buggy address is located 0 bytes to the right of
[   52.225984]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   52.238830] 
[   52.240308] The buggy address belongs to the physical page:
[   52.245865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   52.253850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.260358] page_type: f5(slab)
[   52.263491] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.271215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.278934] page dumped because: kasan: bad access detected
[   52.284489] 
[   52.285965] Memory state around the buggy address:
[   52.290745]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.297948]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.305153] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.312354]                                      ^
[   52.317131]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.324338]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.331538] ==================================================================
[   46.788771] ==================================================================
[   46.795688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   46.803061] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   46.810440] 
[   46.811925] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   46.811980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.811997] Hardware name: WinLink E850-96 board (DT)
[   46.812019] Call trace:
[   46.812034]  show_stack+0x20/0x38 (C)
[   46.812072]  dump_stack_lvl+0x8c/0xd0
[   46.812104]  print_report+0x118/0x608
[   46.812137]  kasan_report+0xdc/0x128
[   46.812167]  __asan_report_store4_noabort+0x20/0x30
[   46.812204]  kasan_atomics_helper+0x3f7c/0x4858
[   46.812240]  kasan_atomics+0x198/0x2e0
[   46.812269]  kunit_try_run_case+0x170/0x3f0
[   46.812303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.812343]  kthread+0x328/0x630
[   46.812381]  ret_from_fork+0x10/0x20
[   46.812418] 
[   46.880143] Allocated by task 310:
[   46.883532]  kasan_save_stack+0x3c/0x68
[   46.887348]  kasan_save_track+0x20/0x40
[   46.891168]  kasan_save_alloc_info+0x40/0x58
[   46.895421]  __kasan_kmalloc+0xd4/0xd8
[   46.899154]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.903667]  kasan_atomics+0xb8/0x2e0
[   46.907313]  kunit_try_run_case+0x170/0x3f0
[   46.911480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.916948]  kthread+0x328/0x630
[   46.920160]  ret_from_fork+0x10/0x20
[   46.923719] 
[   46.925198] The buggy address belongs to the object at ffff00080243ed00
[   46.925198]  which belongs to the cache kmalloc-64 of size 64
[   46.937525] The buggy address is located 0 bytes to the right of
[   46.937525]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   46.950368] 
[   46.951846] The buggy address belongs to the physical page:
[   46.957403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   46.965387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.971897] page_type: f5(slab)
[   46.975032] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.982753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.990472] page dumped because: kasan: bad access detected
[   46.996027] 
[   46.997503] Memory state around the buggy address:
[   47.002281]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.009486]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.016692] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.023891]                                      ^
[   47.028669]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.035875]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.043077] ==================================================================
[   52.603827] ==================================================================
[   52.610877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   52.618166] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   52.625543] 
[   52.627024] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   52.627071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.627088] Hardware name: WinLink E850-96 board (DT)
[   52.627110] Call trace:
[   52.627123]  show_stack+0x20/0x38 (C)
[   52.627155]  dump_stack_lvl+0x8c/0xd0
[   52.627185]  print_report+0x118/0x608
[   52.627216]  kasan_report+0xdc/0x128
[   52.627246]  kasan_check_range+0x100/0x1a8
[   52.627278]  __kasan_check_write+0x20/0x30
[   52.627313]  kasan_atomics_helper+0xa04/0x4858
[   52.627347]  kasan_atomics+0x198/0x2e0
[   52.627375]  kunit_try_run_case+0x170/0x3f0
[   52.627406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.627440]  kthread+0x328/0x630
[   52.627470]  ret_from_fork+0x10/0x20
[   52.627502] 
[   52.698459] Allocated by task 310:
[   52.701846]  kasan_save_stack+0x3c/0x68
[   52.705664]  kasan_save_track+0x20/0x40
[   52.709483]  kasan_save_alloc_info+0x40/0x58
[   52.713737]  __kasan_kmalloc+0xd4/0xd8
[   52.717469]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.721983]  kasan_atomics+0xb8/0x2e0
[   52.725629]  kunit_try_run_case+0x170/0x3f0
[   52.729795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.735264]  kthread+0x328/0x630
[   52.738476]  ret_from_fork+0x10/0x20
[   52.742035] 
[   52.743512] The buggy address belongs to the object at ffff00080243ed00
[   52.743512]  which belongs to the cache kmalloc-64 of size 64
[   52.755838] The buggy address is located 0 bytes to the right of
[   52.755838]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   52.768684] 
[   52.770159] The buggy address belongs to the physical page:
[   52.775718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   52.783702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.790211] page_type: f5(slab)
[   52.793344] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.801068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.808787] page dumped because: kasan: bad access detected
[   52.814342] 
[   52.815818] Memory state around the buggy address:
[   52.820596]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.827801]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.835007] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.842207]                                      ^
[   52.846984]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.854191]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.861391] ==================================================================
[   53.398612] ==================================================================
[   53.405655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   53.413032] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   53.420323] 
[   53.421804] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   53.421854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.421871] Hardware name: WinLink E850-96 board (DT)
[   53.421890] Call trace:
[   53.421905]  show_stack+0x20/0x38 (C)
[   53.421939]  dump_stack_lvl+0x8c/0xd0
[   53.421971]  print_report+0x118/0x608
[   53.422004]  kasan_report+0xdc/0x128
[   53.422034]  __asan_report_load4_noabort+0x20/0x30
[   53.422071]  kasan_atomics_helper+0x3dcc/0x4858
[   53.422102]  kasan_atomics+0x198/0x2e0
[   53.422131]  kunit_try_run_case+0x170/0x3f0
[   53.422161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.422199]  kthread+0x328/0x630
[   53.422231]  ret_from_fork+0x10/0x20
[   53.422261] 
[   53.489940] Allocated by task 310:
[   53.493328]  kasan_save_stack+0x3c/0x68
[   53.497145]  kasan_save_track+0x20/0x40
[   53.500965]  kasan_save_alloc_info+0x40/0x58
[   53.505218]  __kasan_kmalloc+0xd4/0xd8
[   53.508950]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.513464]  kasan_atomics+0xb8/0x2e0
[   53.517110]  kunit_try_run_case+0x170/0x3f0
[   53.521277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.526745]  kthread+0x328/0x630
[   53.529957]  ret_from_fork+0x10/0x20
[   53.533516] 
[   53.534991] The buggy address belongs to the object at ffff00080243ed00
[   53.534991]  which belongs to the cache kmalloc-64 of size 64
[   53.547320] The buggy address is located 0 bytes to the right of
[   53.547320]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   53.560165] 
[   53.561641] The buggy address belongs to the physical page:
[   53.567199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   53.575182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.581692] page_type: f5(slab)
[   53.584825] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.592550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.600268] page dumped because: kasan: bad access detected
[   53.605824] 
[   53.607299] Memory state around the buggy address:
[   53.612078]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.619282]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.626487] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.633688]                                      ^
[   53.638466]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.645672]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.652872] ==================================================================
[   47.844821] ==================================================================
[   47.851919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   47.859295] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   47.866587] 
[   47.868067] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   47.868119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.868135] Hardware name: WinLink E850-96 board (DT)
[   47.868155] Call trace:
[   47.868167]  show_stack+0x20/0x38 (C)
[   47.868204]  dump_stack_lvl+0x8c/0xd0
[   47.868236]  print_report+0x118/0x608
[   47.868268]  kasan_report+0xdc/0x128
[   47.868299]  __asan_report_load4_noabort+0x20/0x30
[   47.868335]  kasan_atomics_helper+0x40fc/0x4858
[   47.868366]  kasan_atomics+0x198/0x2e0
[   47.868395]  kunit_try_run_case+0x170/0x3f0
[   47.868425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.868461]  kthread+0x328/0x630
[   47.868492]  ret_from_fork+0x10/0x20
[   47.868525] 
[   47.936205] Allocated by task 310:
[   47.939593]  kasan_save_stack+0x3c/0x68
[   47.943409]  kasan_save_track+0x20/0x40
[   47.947228]  kasan_save_alloc_info+0x40/0x58
[   47.951482]  __kasan_kmalloc+0xd4/0xd8
[   47.955214]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.959728]  kasan_atomics+0xb8/0x2e0
[   47.963374]  kunit_try_run_case+0x170/0x3f0
[   47.967541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.973011]  kthread+0x328/0x630
[   47.976221]  ret_from_fork+0x10/0x20
[   47.979780] 
[   47.981257] The buggy address belongs to the object at ffff00080243ed00
[   47.981257]  which belongs to the cache kmalloc-64 of size 64
[   47.993582] The buggy address is located 0 bytes to the right of
[   47.993582]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   48.006429] 
[   48.007904] The buggy address belongs to the physical page:
[   48.013462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   48.021447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.027958] page_type: f5(slab)
[   48.031089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.038813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.046532] page dumped because: kasan: bad access detected
[   48.052087] 
[   48.053563] Memory state around the buggy address:
[   48.058343]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.065546]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.072751] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.079952]                                      ^
[   48.084730]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.091936]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.099136] ==================================================================
[   49.163060] ==================================================================
[   49.170131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   49.177418] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   49.184796] 
[   49.186280] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   49.186328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.186343] Hardware name: WinLink E850-96 board (DT)
[   49.186365] Call trace:
[   49.186378]  show_stack+0x20/0x38 (C)
[   49.186411]  dump_stack_lvl+0x8c/0xd0
[   49.186441]  print_report+0x118/0x608
[   49.186470]  kasan_report+0xdc/0x128
[   49.186501]  kasan_check_range+0x100/0x1a8
[   49.186535]  __kasan_check_write+0x20/0x30
[   49.186568]  kasan_atomics_helper+0x47c/0x4858
[   49.186602]  kasan_atomics+0x198/0x2e0
[   49.186632]  kunit_try_run_case+0x170/0x3f0
[   49.186663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.186696]  kthread+0x328/0x630
[   49.186727]  ret_from_fork+0x10/0x20
[   49.186760] 
[   49.257712] Allocated by task 310:
[   49.261100]  kasan_save_stack+0x3c/0x68
[   49.264917]  kasan_save_track+0x20/0x40
[   49.268736]  kasan_save_alloc_info+0x40/0x58
[   49.272990]  __kasan_kmalloc+0xd4/0xd8
[   49.276722]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.281236]  kasan_atomics+0xb8/0x2e0
[   49.284882]  kunit_try_run_case+0x170/0x3f0
[   49.289048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.294517]  kthread+0x328/0x630
[   49.297729]  ret_from_fork+0x10/0x20
[   49.301288] 
[   49.302763] The buggy address belongs to the object at ffff00080243ed00
[   49.302763]  which belongs to the cache kmalloc-64 of size 64
[   49.315091] The buggy address is located 0 bytes to the right of
[   49.315091]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   49.327937] 
[   49.329412] The buggy address belongs to the physical page:
[   49.334972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   49.342956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.349464] page_type: f5(slab)
[   49.352597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.360321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.368040] page dumped because: kasan: bad access detected
[   49.373596] 
[   49.375071] Memory state around the buggy address:
[   49.379850]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.387054]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.394259] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.401460]                                      ^
[   49.406238]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.413444]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.420644] ==================================================================
[   54.451743] ==================================================================
[   54.458765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   54.466141] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   54.473432] 
[   54.474915] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   54.474967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.474982] Hardware name: WinLink E850-96 board (DT)
[   54.475004] Call trace:
[   54.475018]  show_stack+0x20/0x38 (C)
[   54.475049]  dump_stack_lvl+0x8c/0xd0
[   54.475081]  print_report+0x118/0x608
[   54.475110]  kasan_report+0xdc/0x128
[   54.475139]  __asan_report_load4_noabort+0x20/0x30
[   54.475176]  kasan_atomics_helper+0x3de4/0x4858
[   54.475208]  kasan_atomics+0x198/0x2e0
[   54.475237]  kunit_try_run_case+0x170/0x3f0
[   54.475268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.475303]  kthread+0x328/0x630
[   54.475335]  ret_from_fork+0x10/0x20
[   54.475366] 
[   54.543049] Allocated by task 310:
[   54.546437]  kasan_save_stack+0x3c/0x68
[   54.550254]  kasan_save_track+0x20/0x40
[   54.554074]  kasan_save_alloc_info+0x40/0x58
[   54.558327]  __kasan_kmalloc+0xd4/0xd8
[   54.562060]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.566573]  kasan_atomics+0xb8/0x2e0
[   54.570219]  kunit_try_run_case+0x170/0x3f0
[   54.574386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.579854]  kthread+0x328/0x630
[   54.583066]  ret_from_fork+0x10/0x20
[   54.586625] 
[   54.588101] The buggy address belongs to the object at ffff00080243ed00
[   54.588101]  which belongs to the cache kmalloc-64 of size 64
[   54.600429] The buggy address is located 0 bytes to the right of
[   54.600429]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   54.613274] 
[   54.614750] The buggy address belongs to the physical page:
[   54.620309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   54.628293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.634803] page_type: f5(slab)
[   54.637936] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.645659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.653377] page dumped because: kasan: bad access detected
[   54.658933] 
[   54.660408] Memory state around the buggy address:
[   54.665187]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.672391]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.679596] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.686797]                                      ^
[   54.691575]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.698781]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.705981] ==================================================================
[   62.640657] ==================================================================
[   62.647706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   62.655081] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   62.662372] 
[   62.663853] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   62.663902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.663918] Hardware name: WinLink E850-96 board (DT)
[   62.663939] Call trace:
[   62.663953]  show_stack+0x20/0x38 (C)
[   62.663986]  dump_stack_lvl+0x8c/0xd0
[   62.664017]  print_report+0x118/0x608
[   62.664048]  kasan_report+0xdc/0x128
[   62.664080]  __asan_report_load8_noabort+0x20/0x30
[   62.664116]  kasan_atomics_helper+0x3e10/0x4858
[   62.664148]  kasan_atomics+0x198/0x2e0
[   62.664177]  kunit_try_run_case+0x170/0x3f0
[   62.664211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.664245]  kthread+0x328/0x630
[   62.664276]  ret_from_fork+0x10/0x20
[   62.664307] 
[   62.731988] Allocated by task 310:
[   62.735376]  kasan_save_stack+0x3c/0x68
[   62.739194]  kasan_save_track+0x20/0x40
[   62.743013]  kasan_save_alloc_info+0x40/0x58
[   62.747267]  __kasan_kmalloc+0xd4/0xd8
[   62.750999]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.755513]  kasan_atomics+0xb8/0x2e0
[   62.759159]  kunit_try_run_case+0x170/0x3f0
[   62.763325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.768794]  kthread+0x328/0x630
[   62.772006]  ret_from_fork+0x10/0x20
[   62.775565] 
[   62.777042] The buggy address belongs to the object at ffff00080243ed00
[   62.777042]  which belongs to the cache kmalloc-64 of size 64
[   62.789368] The buggy address is located 0 bytes to the right of
[   62.789368]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   62.802213] 
[   62.803689] The buggy address belongs to the physical page:
[   62.809248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   62.817233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.823742] page_type: f5(slab)
[   62.826874] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.834598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.842317] page dumped because: kasan: bad access detected
[   62.847872] 
[   62.849348] Memory state around the buggy address:
[   62.854126]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.861331]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.868536] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.875737]                                      ^
[   62.880515]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.887721]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.894920] ==================================================================
[   63.167385] ==================================================================
[   63.174433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   63.181809] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   63.189100] 
[   63.190581] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   63.190630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.190647] Hardware name: WinLink E850-96 board (DT)
[   63.190663] Call trace:
[   63.190676]  show_stack+0x20/0x38 (C)
[   63.190710]  dump_stack_lvl+0x8c/0xd0
[   63.190742]  print_report+0x118/0x608
[   63.190774]  kasan_report+0xdc/0x128
[   63.190804]  __asan_report_load8_noabort+0x20/0x30
[   63.190839]  kasan_atomics_helper+0x3e20/0x4858
[   63.190871]  kasan_atomics+0x198/0x2e0
[   63.190902]  kunit_try_run_case+0x170/0x3f0
[   63.190933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.190968]  kthread+0x328/0x630
[   63.191003]  ret_from_fork+0x10/0x20
[   63.191034] 
[   63.258717] Allocated by task 310:
[   63.262104]  kasan_save_stack+0x3c/0x68
[   63.265922]  kasan_save_track+0x20/0x40
[   63.269742]  kasan_save_alloc_info+0x40/0x58
[   63.273995]  __kasan_kmalloc+0xd4/0xd8
[   63.277727]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.282241]  kasan_atomics+0xb8/0x2e0
[   63.285887]  kunit_try_run_case+0x170/0x3f0
[   63.290054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.295522]  kthread+0x328/0x630
[   63.298734]  ret_from_fork+0x10/0x20
[   63.302293] 
[   63.303770] The buggy address belongs to the object at ffff00080243ed00
[   63.303770]  which belongs to the cache kmalloc-64 of size 64
[   63.316095] The buggy address is located 0 bytes to the right of
[   63.316095]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   63.328942] 
[   63.330418] The buggy address belongs to the physical page:
[   63.335975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   63.343961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.350471] page_type: f5(slab)
[   63.353602] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.361326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.369045] page dumped because: kasan: bad access detected
[   63.374601] 
[   63.376076] Memory state around the buggy address:
[   63.380856]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.388059]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.395264] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.402465]                                      ^
[   63.407243]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.414449]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.421649] ==================================================================
[   47.580079] ==================================================================
[   47.587165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   47.594458] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   47.601748] 
[   47.603229] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   47.603282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.603298] Hardware name: WinLink E850-96 board (DT)
[   47.603317] Call trace:
[   47.603332]  show_stack+0x20/0x38 (C)
[   47.603365]  dump_stack_lvl+0x8c/0xd0
[   47.603398]  print_report+0x118/0x608
[   47.603431]  kasan_report+0xdc/0x128
[   47.603461]  kasan_check_range+0x100/0x1a8
[   47.603495]  __kasan_check_read+0x20/0x30
[   47.603530]  kasan_atomics_helper+0x2b0/0x4858
[   47.603562]  kasan_atomics+0x198/0x2e0
[   47.603591]  kunit_try_run_case+0x170/0x3f0
[   47.603624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.603660]  kthread+0x328/0x630
[   47.603691]  ret_from_fork+0x10/0x20
[   47.603724] 
[   47.674576] Allocated by task 310:
[   47.677963]  kasan_save_stack+0x3c/0x68
[   47.681781]  kasan_save_track+0x20/0x40
[   47.685600]  kasan_save_alloc_info+0x40/0x58
[   47.689854]  __kasan_kmalloc+0xd4/0xd8
[   47.693587]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.698100]  kasan_atomics+0xb8/0x2e0
[   47.701746]  kunit_try_run_case+0x170/0x3f0
[   47.705912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.711382]  kthread+0x328/0x630
[   47.714592]  ret_from_fork+0x10/0x20
[   47.718152] 
[   47.719629] The buggy address belongs to the object at ffff00080243ed00
[   47.719629]  which belongs to the cache kmalloc-64 of size 64
[   47.731954] The buggy address is located 0 bytes to the right of
[   47.731954]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   47.744801] 
[   47.746276] The buggy address belongs to the physical page:
[   47.751834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   47.759820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.766329] page_type: f5(slab)
[   47.769461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.777185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.784904] page dumped because: kasan: bad access detected
[   47.790459] 
[   47.791935] Memory state around the buggy address:
[   47.796716]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.803918]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.811123] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.818324]                                      ^
[   47.823102]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.830308]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.837508] ==================================================================
[   59.204777] ==================================================================
[   59.211820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   59.219195] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   59.226573] 
[   59.228054] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   59.228106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.228121] Hardware name: WinLink E850-96 board (DT)
[   59.228139] Call trace:
[   59.228154]  show_stack+0x20/0x38 (C)
[   59.228188]  dump_stack_lvl+0x8c/0xd0
[   59.228219]  print_report+0x118/0x608
[   59.228250]  kasan_report+0xdc/0x128
[   59.228281]  kasan_check_range+0x100/0x1a8
[   59.228312]  __kasan_check_write+0x20/0x30
[   59.228347]  kasan_atomics_helper+0x126c/0x4858
[   59.228377]  kasan_atomics+0x198/0x2e0
[   59.228407]  kunit_try_run_case+0x170/0x3f0
[   59.228439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.228475]  kthread+0x328/0x630
[   59.228505]  ret_from_fork+0x10/0x20
[   59.228538] 
[   59.299575] Allocated by task 310:
[   59.302962]  kasan_save_stack+0x3c/0x68
[   59.306780]  kasan_save_track+0x20/0x40
[   59.310599]  kasan_save_alloc_info+0x40/0x58
[   59.314853]  __kasan_kmalloc+0xd4/0xd8
[   59.318586]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.323099]  kasan_atomics+0xb8/0x2e0
[   59.326745]  kunit_try_run_case+0x170/0x3f0
[   59.330911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.336380]  kthread+0x328/0x630
[   59.339592]  ret_from_fork+0x10/0x20
[   59.343151] 
[   59.344628] The buggy address belongs to the object at ffff00080243ed00
[   59.344628]  which belongs to the cache kmalloc-64 of size 64
[   59.356954] The buggy address is located 0 bytes to the right of
[   59.356954]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   59.369800] 
[   59.371276] The buggy address belongs to the physical page:
[   59.376835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   59.384818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.391327] page_type: f5(slab)
[   59.394460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.402184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.409903] page dumped because: kasan: bad access detected
[   59.415459] 
[   59.416934] Memory state around the buggy address:
[   59.421714]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.428917]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.436122] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.443323]                                      ^
[   59.448101]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.455307]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.462507] ==================================================================
[   59.734972] ==================================================================
[   59.742018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   59.749395] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   59.756773] 
[   59.758255] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   59.758308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.758322] Hardware name: WinLink E850-96 board (DT)
[   59.758341] Call trace:
[   59.758355]  show_stack+0x20/0x38 (C)
[   59.758390]  dump_stack_lvl+0x8c/0xd0
[   59.758423]  print_report+0x118/0x608
[   59.758455]  kasan_report+0xdc/0x128
[   59.758485]  kasan_check_range+0x100/0x1a8
[   59.758519]  __kasan_check_write+0x20/0x30
[   59.758554]  kasan_atomics_helper+0x1384/0x4858
[   59.758586]  kasan_atomics+0x198/0x2e0
[   59.758615]  kunit_try_run_case+0x170/0x3f0
[   59.758646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.758682]  kthread+0x328/0x630
[   59.758715]  ret_from_fork+0x10/0x20
[   59.758748] 
[   59.829775] Allocated by task 310:
[   59.833163]  kasan_save_stack+0x3c/0x68
[   59.836980]  kasan_save_track+0x20/0x40
[   59.840800]  kasan_save_alloc_info+0x40/0x58
[   59.845053]  __kasan_kmalloc+0xd4/0xd8
[   59.848786]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.853300]  kasan_atomics+0xb8/0x2e0
[   59.856945]  kunit_try_run_case+0x170/0x3f0
[   59.861112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.866580]  kthread+0x328/0x630
[   59.869792]  ret_from_fork+0x10/0x20
[   59.873352] 
[   59.874827] The buggy address belongs to the object at ffff00080243ed00
[   59.874827]  which belongs to the cache kmalloc-64 of size 64
[   59.887156] The buggy address is located 0 bytes to the right of
[   59.887156]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   59.900000] 
[   59.901476] The buggy address belongs to the physical page:
[   59.907033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   59.915019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.921529] page_type: f5(slab)
[   59.924660] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.932385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.940104] page dumped because: kasan: bad access detected
[   59.945659] 
[   59.947135] Memory state around the buggy address:
[   59.951913]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.959118]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.966323] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.973523]                                      ^
[   59.978301]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.985507]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.992707] ==================================================================
[   55.504829] ==================================================================
[   55.511876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   55.519250] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   55.526542] 
[   55.528024] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   55.528071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.528087] Hardware name: WinLink E850-96 board (DT)
[   55.528109] Call trace:
[   55.528122]  show_stack+0x20/0x38 (C)
[   55.528154]  dump_stack_lvl+0x8c/0xd0
[   55.528187]  print_report+0x118/0x608
[   55.528218]  kasan_report+0xdc/0x128
[   55.528250]  __asan_report_load4_noabort+0x20/0x30
[   55.528286]  kasan_atomics_helper+0x3e04/0x4858
[   55.528319]  kasan_atomics+0x198/0x2e0
[   55.528349]  kunit_try_run_case+0x170/0x3f0
[   55.528378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.528415]  kthread+0x328/0x630
[   55.528449]  ret_from_fork+0x10/0x20
[   55.528484] 
[   55.596158] Allocated by task 310:
[   55.599547]  kasan_save_stack+0x3c/0x68
[   55.603364]  kasan_save_track+0x20/0x40
[   55.607183]  kasan_save_alloc_info+0x40/0x58
[   55.611436]  __kasan_kmalloc+0xd4/0xd8
[   55.615169]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.619683]  kasan_atomics+0xb8/0x2e0
[   55.623328]  kunit_try_run_case+0x170/0x3f0
[   55.627495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.632964]  kthread+0x328/0x630
[   55.636175]  ret_from_fork+0x10/0x20
[   55.639734] 
[   55.641210] The buggy address belongs to the object at ffff00080243ed00
[   55.641210]  which belongs to the cache kmalloc-64 of size 64
[   55.653537] The buggy address is located 0 bytes to the right of
[   55.653537]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   55.666383] 
[   55.667859] The buggy address belongs to the physical page:
[   55.673416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   55.681402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.687912] page_type: f5(slab)
[   55.691045] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.698768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.706487] page dumped because: kasan: bad access detected
[   55.712042] 
[   55.713518] Memory state around the buggy address:
[   55.718297]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.725501]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.732707] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.739906]                                      ^
[   55.744684]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.751889]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.759090] ==================================================================
[   49.428008] ==================================================================
[   49.435055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   49.442345] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   49.449723] 
[   49.451204] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   49.451256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.451272] Hardware name: WinLink E850-96 board (DT)
[   49.451292] Call trace:
[   49.451306]  show_stack+0x20/0x38 (C)
[   49.451337]  dump_stack_lvl+0x8c/0xd0
[   49.451368]  print_report+0x118/0x608
[   49.451398]  kasan_report+0xdc/0x128
[   49.451428]  kasan_check_range+0x100/0x1a8
[   49.451461]  __kasan_check_write+0x20/0x30
[   49.451496]  kasan_atomics_helper+0x4e4/0x4858
[   49.451526]  kasan_atomics+0x198/0x2e0
[   49.451556]  kunit_try_run_case+0x170/0x3f0
[   49.451586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.451620]  kthread+0x328/0x630
[   49.451655]  ret_from_fork+0x10/0x20
[   49.451686] 
[   49.522639] Allocated by task 310:
[   49.526026]  kasan_save_stack+0x3c/0x68
[   49.529844]  kasan_save_track+0x20/0x40
[   49.533663]  kasan_save_alloc_info+0x40/0x58
[   49.537916]  __kasan_kmalloc+0xd4/0xd8
[   49.541649]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.546163]  kasan_atomics+0xb8/0x2e0
[   49.549808]  kunit_try_run_case+0x170/0x3f0
[   49.553975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.559443]  kthread+0x328/0x630
[   49.562655]  ret_from_fork+0x10/0x20
[   49.566215] 
[   49.567691] The buggy address belongs to the object at ffff00080243ed00
[   49.567691]  which belongs to the cache kmalloc-64 of size 64
[   49.580016] The buggy address is located 0 bytes to the right of
[   49.580016]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   49.592863] 
[   49.594339] The buggy address belongs to the physical page:
[   49.599898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   49.607884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.614391] page_type: f5(slab)
[   49.617524] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.625248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.632967] page dumped because: kasan: bad access detected
[   49.638522] 
[   49.639998] Memory state around the buggy address:
[   49.644777]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.651981]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.659186] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.666387]                                      ^
[   49.671164]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.678369]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.685570] ==================================================================
[   56.292834] ==================================================================
[   56.299883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   56.307172] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   56.314550] 
[   56.316033] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   56.316085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.316099] Hardware name: WinLink E850-96 board (DT)
[   56.316118] Call trace:
[   56.316131]  show_stack+0x20/0x38 (C)
[   56.316165]  dump_stack_lvl+0x8c/0xd0
[   56.316198]  print_report+0x118/0x608
[   56.316229]  kasan_report+0xdc/0x128
[   56.316261]  kasan_check_range+0x100/0x1a8
[   56.316293]  __kasan_check_write+0x20/0x30
[   56.316330]  kasan_atomics_helper+0xe44/0x4858
[   56.316363]  kasan_atomics+0x198/0x2e0
[   56.316392]  kunit_try_run_case+0x170/0x3f0
[   56.316422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.316459]  kthread+0x328/0x630
[   56.316490]  ret_from_fork+0x10/0x20
[   56.316521] 
[   56.387466] Allocated by task 310:
[   56.390854]  kasan_save_stack+0x3c/0x68
[   56.394671]  kasan_save_track+0x20/0x40
[   56.398490]  kasan_save_alloc_info+0x40/0x58
[   56.402744]  __kasan_kmalloc+0xd4/0xd8
[   56.406476]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.410990]  kasan_atomics+0xb8/0x2e0
[   56.414636]  kunit_try_run_case+0x170/0x3f0
[   56.418802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.424271]  kthread+0x328/0x630
[   56.427483]  ret_from_fork+0x10/0x20
[   56.431042] 
[   56.432519] The buggy address belongs to the object at ffff00080243ed00
[   56.432519]  which belongs to the cache kmalloc-64 of size 64
[   56.444847] The buggy address is located 0 bytes to the right of
[   56.444847]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   56.457691] 
[   56.459166] The buggy address belongs to the physical page:
[   56.464725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   56.472709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.479219] page_type: f5(slab)
[   56.482351] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.490075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.497794] page dumped because: kasan: bad access detected
[   56.503350] 
[   56.504825] Memory state around the buggy address:
[   56.509604]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.516808]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.524013] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.531214]                                      ^
[   56.535992]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.543198]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.550398] ==================================================================
[   54.186763] ==================================================================
[   54.193838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   54.201127] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   54.208506] 
[   54.209988] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   54.210035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.210053] Hardware name: WinLink E850-96 board (DT)
[   54.210072] Call trace:
[   54.210086]  show_stack+0x20/0x38 (C)
[   54.210120]  dump_stack_lvl+0x8c/0xd0
[   54.210152]  print_report+0x118/0x608
[   54.210185]  kasan_report+0xdc/0x128
[   54.210215]  kasan_check_range+0x100/0x1a8
[   54.210249]  __kasan_check_write+0x20/0x30
[   54.210284]  kasan_atomics_helper+0xc08/0x4858
[   54.210315]  kasan_atomics+0x198/0x2e0
[   54.210346]  kunit_try_run_case+0x170/0x3f0
[   54.210378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.210412]  kthread+0x328/0x630
[   54.210444]  ret_from_fork+0x10/0x20
[   54.210473] 
[   54.281421] Allocated by task 310:
[   54.284810]  kasan_save_stack+0x3c/0x68
[   54.288626]  kasan_save_track+0x20/0x40
[   54.292446]  kasan_save_alloc_info+0x40/0x58
[   54.296699]  __kasan_kmalloc+0xd4/0xd8
[   54.300431]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.304945]  kasan_atomics+0xb8/0x2e0
[   54.308591]  kunit_try_run_case+0x170/0x3f0
[   54.312758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.318226]  kthread+0x328/0x630
[   54.321438]  ret_from_fork+0x10/0x20
[   54.324997] 
[   54.326474] The buggy address belongs to the object at ffff00080243ed00
[   54.326474]  which belongs to the cache kmalloc-64 of size 64
[   54.338801] The buggy address is located 0 bytes to the right of
[   54.338801]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   54.351646] 
[   54.353122] The buggy address belongs to the physical page:
[   54.358681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   54.366665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.373175] page_type: f5(slab)
[   54.376306] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.384031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.391750] page dumped because: kasan: bad access detected
[   54.397305] 
[   54.398780] Memory state around the buggy address:
[   54.403559]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.410763]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.417968] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.425169]                                      ^
[   54.429947]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.437153]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.444353] ==================================================================
[   60.000245] ==================================================================
[   60.007119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   60.014495] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   60.021786] 
[   60.023270] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   60.023322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.023338] Hardware name: WinLink E850-96 board (DT)
[   60.023358] Call trace:
[   60.023373]  show_stack+0x20/0x38 (C)
[   60.023406]  dump_stack_lvl+0x8c/0xd0
[   60.023439]  print_report+0x118/0x608
[   60.023472]  kasan_report+0xdc/0x128
[   60.023503]  __asan_report_load8_noabort+0x20/0x30
[   60.023542]  kasan_atomics_helper+0x3f04/0x4858
[   60.023573]  kasan_atomics+0x198/0x2e0
[   60.023603]  kunit_try_run_case+0x170/0x3f0
[   60.023637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.023675]  kthread+0x328/0x630
[   60.023706]  ret_from_fork+0x10/0x20
[   60.023741] 
[   60.091403] Allocated by task 310:
[   60.094791]  kasan_save_stack+0x3c/0x68
[   60.098609]  kasan_save_track+0x20/0x40
[   60.102428]  kasan_save_alloc_info+0x40/0x58
[   60.106681]  __kasan_kmalloc+0xd4/0xd8
[   60.110414]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.114927]  kasan_atomics+0xb8/0x2e0
[   60.118573]  kunit_try_run_case+0x170/0x3f0
[   60.122740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.128208]  kthread+0x328/0x630
[   60.131420]  ret_from_fork+0x10/0x20
[   60.134979] 
[   60.136456] The buggy address belongs to the object at ffff00080243ed00
[   60.136456]  which belongs to the cache kmalloc-64 of size 64
[   60.148784] The buggy address is located 0 bytes to the right of
[   60.148784]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   60.161628] 
[   60.163106] The buggy address belongs to the physical page:
[   60.168662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   60.176647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.183157] page_type: f5(slab)
[   60.186291] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.194013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.201732] page dumped because: kasan: bad access detected
[   60.207287] 
[   60.208762] Memory state around the buggy address:
[   60.213543]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.220746]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.227950] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.235152]                                      ^
[   60.239929]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.247135]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.254335] ==================================================================
[   53.133710] ==================================================================
[   53.140730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   53.148018] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   53.155397] 
[   53.156878] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   53.156928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.156948] Hardware name: WinLink E850-96 board (DT)
[   53.156969] Call trace:
[   53.156981]  show_stack+0x20/0x38 (C)
[   53.157014]  dump_stack_lvl+0x8c/0xd0
[   53.157047]  print_report+0x118/0x608
[   53.157078]  kasan_report+0xdc/0x128
[   53.157109]  kasan_check_range+0x100/0x1a8
[   53.157141]  __kasan_check_write+0x20/0x30
[   53.157176]  kasan_atomics_helper+0xad4/0x4858
[   53.157207]  kasan_atomics+0x198/0x2e0
[   53.157238]  kunit_try_run_case+0x170/0x3f0
[   53.157266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.157301]  kthread+0x328/0x630
[   53.157333]  ret_from_fork+0x10/0x20
[   53.157365] 
[   53.228312] Allocated by task 310:
[   53.231701]  kasan_save_stack+0x3c/0x68
[   53.235517]  kasan_save_track+0x20/0x40
[   53.239336]  kasan_save_alloc_info+0x40/0x58
[   53.243590]  __kasan_kmalloc+0xd4/0xd8
[   53.247322]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.251836]  kasan_atomics+0xb8/0x2e0
[   53.255482]  kunit_try_run_case+0x170/0x3f0
[   53.259649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.265117]  kthread+0x328/0x630
[   53.268329]  ret_from_fork+0x10/0x20
[   53.271888] 
[   53.273365] The buggy address belongs to the object at ffff00080243ed00
[   53.273365]  which belongs to the cache kmalloc-64 of size 64
[   53.285693] The buggy address is located 0 bytes to the right of
[   53.285693]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   53.298537] 
[   53.300012] The buggy address belongs to the physical page:
[   53.305572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   53.313554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.320064] page_type: f5(slab)
[   53.323199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.330922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.338640] page dumped because: kasan: bad access detected
[   53.344196] 
[   53.345671] Memory state around the buggy address:
[   53.350450]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.357654]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.364859] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.372060]                                      ^
[   53.376838]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.384044]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.391244] ==================================================================
[   61.848891] ==================================================================
[   61.855878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   61.863252] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   61.870631] 
[   61.872112] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   61.872162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.872175] Hardware name: WinLink E850-96 board (DT)
[   61.872196] Call trace:
[   61.872213]  show_stack+0x20/0x38 (C)
[   61.872246]  dump_stack_lvl+0x8c/0xd0
[   61.872275]  print_report+0x118/0x608
[   61.872307]  kasan_report+0xdc/0x128
[   61.872338]  kasan_check_range+0x100/0x1a8
[   61.872372]  __kasan_check_write+0x20/0x30
[   61.872407]  kasan_atomics_helper+0x1644/0x4858
[   61.872439]  kasan_atomics+0x198/0x2e0
[   61.872471]  kunit_try_run_case+0x170/0x3f0
[   61.872503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.872539]  kthread+0x328/0x630
[   61.872571]  ret_from_fork+0x10/0x20
[   61.872603] 
[   61.943632] Allocated by task 310:
[   61.947019]  kasan_save_stack+0x3c/0x68
[   61.950838]  kasan_save_track+0x20/0x40
[   61.954657]  kasan_save_alloc_info+0x40/0x58
[   61.958910]  __kasan_kmalloc+0xd4/0xd8
[   61.962643]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.967157]  kasan_atomics+0xb8/0x2e0
[   61.970802]  kunit_try_run_case+0x170/0x3f0
[   61.974969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.980438]  kthread+0x328/0x630
[   61.983649]  ret_from_fork+0x10/0x20
[   61.987208] 
[   61.988685] The buggy address belongs to the object at ffff00080243ed00
[   61.988685]  which belongs to the cache kmalloc-64 of size 64
[   62.001013] The buggy address is located 0 bytes to the right of
[   62.001013]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   62.013857] 
[   62.015334] The buggy address belongs to the physical page:
[   62.020892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   62.028875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.035386] page_type: f5(slab)
[   62.038517] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.046242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.053961] page dumped because: kasan: bad access detected
[   62.059516] 
[   62.060992] Memory state around the buggy address:
[   62.065772]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.072975]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.080180] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.087380]                                      ^
[   62.092158]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.099365]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.106564] ==================================================================
[   55.239904] ==================================================================
[   55.246948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   55.254236] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   55.261615] 
[   55.263098] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   55.263147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.263165] Hardware name: WinLink E850-96 board (DT)
[   55.263182] Call trace:
[   55.263197]  show_stack+0x20/0x38 (C)
[   55.263230]  dump_stack_lvl+0x8c/0xd0
[   55.263263]  print_report+0x118/0x608
[   55.263297]  kasan_report+0xdc/0x128
[   55.263327]  kasan_check_range+0x100/0x1a8
[   55.263361]  __kasan_check_write+0x20/0x30
[   55.263395]  kasan_atomics_helper+0xd3c/0x4858
[   55.263428]  kasan_atomics+0x198/0x2e0
[   55.263457]  kunit_try_run_case+0x170/0x3f0
[   55.263487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.263521]  kthread+0x328/0x630
[   55.263553]  ret_from_fork+0x10/0x20
[   55.263584] 
[   55.334531] Allocated by task 310:
[   55.337919]  kasan_save_stack+0x3c/0x68
[   55.341735]  kasan_save_track+0x20/0x40
[   55.345555]  kasan_save_alloc_info+0x40/0x58
[   55.349808]  __kasan_kmalloc+0xd4/0xd8
[   55.353540]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.358055]  kasan_atomics+0xb8/0x2e0
[   55.361700]  kunit_try_run_case+0x170/0x3f0
[   55.365867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.371335]  kthread+0x328/0x630
[   55.374547]  ret_from_fork+0x10/0x20
[   55.378106] 
[   55.379583] The buggy address belongs to the object at ffff00080243ed00
[   55.379583]  which belongs to the cache kmalloc-64 of size 64
[   55.391908] The buggy address is located 0 bytes to the right of
[   55.391908]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   55.404755] 
[   55.406231] The buggy address belongs to the physical page:
[   55.411790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   55.419774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.426284] page_type: f5(slab)
[   55.429415] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.437140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.444859] page dumped because: kasan: bad access detected
[   55.450414] 
[   55.451890] Memory state around the buggy address:
[   55.456670]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.463873]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.471077] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.478278]                                      ^
[   55.483056]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.490262]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.497462] ==================================================================
[   46.519832] ==================================================================
[   46.534061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   46.541435] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   46.548726] 
[   46.550212] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   46.550273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.550292] Hardware name: WinLink E850-96 board (DT)
[   46.550315] Call trace:
[   46.550330]  show_stack+0x20/0x38 (C)
[   46.550367]  dump_stack_lvl+0x8c/0xd0
[   46.550401]  print_report+0x118/0x608
[   46.550439]  kasan_report+0xdc/0x128
[   46.550469]  __asan_report_load4_noabort+0x20/0x30
[   46.550508]  kasan_atomics_helper+0x40a8/0x4858
[   46.550544]  kasan_atomics+0x198/0x2e0
[   46.550572]  kunit_try_run_case+0x170/0x3f0
[   46.550606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.550647]  kthread+0x328/0x630
[   46.550684]  ret_from_fork+0x10/0x20
[   46.550720] 
[   46.618343] Allocated by task 310:
[   46.621731]  kasan_save_stack+0x3c/0x68
[   46.625546]  kasan_save_track+0x20/0x40
[   46.629366]  kasan_save_alloc_info+0x40/0x58
[   46.633620]  __kasan_kmalloc+0xd4/0xd8
[   46.637352]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.641866]  kasan_atomics+0xb8/0x2e0
[   46.645512]  kunit_try_run_case+0x170/0x3f0
[   46.649678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.655147]  kthread+0x328/0x630
[   46.658358]  ret_from_fork+0x10/0x20
[   46.661918] 
[   46.663396] The buggy address belongs to the object at ffff00080243ed00
[   46.663396]  which belongs to the cache kmalloc-64 of size 64
[   46.675724] The buggy address is located 0 bytes to the right of
[   46.675724]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   46.688567] 
[   46.690046] The buggy address belongs to the physical page:
[   46.695601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   46.703586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.710096] page_type: f5(slab)
[   46.713234] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.720951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.728670] page dumped because: kasan: bad access detected
[   46.734225] 
[   46.735701] Memory state around the buggy address:
[   46.740482]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.747684]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.754890] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.762090]                                      ^
[   46.766868]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.774074]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.781275] ==================================================================
[   53.925211] ==================================================================
[   53.932211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   53.939586] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   53.946878] 
[   53.948360] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   53.948407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.948423] Hardware name: WinLink E850-96 board (DT)
[   53.948445] Call trace:
[   53.948458]  show_stack+0x20/0x38 (C)
[   53.948490]  dump_stack_lvl+0x8c/0xd0
[   53.948521]  print_report+0x118/0x608
[   53.948554]  kasan_report+0xdc/0x128
[   53.948588]  __asan_report_load4_noabort+0x20/0x30
[   53.948623]  kasan_atomics_helper+0x3dbc/0x4858
[   53.948654]  kasan_atomics+0x198/0x2e0
[   53.948683]  kunit_try_run_case+0x170/0x3f0
[   53.948714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.948749]  kthread+0x328/0x630
[   53.948785]  ret_from_fork+0x10/0x20
[   53.948815] 
[   54.016495] Allocated by task 310:
[   54.019884]  kasan_save_stack+0x3c/0x68
[   54.023699]  kasan_save_track+0x20/0x40
[   54.027519]  kasan_save_alloc_info+0x40/0x58
[   54.031773]  __kasan_kmalloc+0xd4/0xd8
[   54.035505]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.040019]  kasan_atomics+0xb8/0x2e0
[   54.043665]  kunit_try_run_case+0x170/0x3f0
[   54.047831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.053300]  kthread+0x328/0x630
[   54.056512]  ret_from_fork+0x10/0x20
[   54.060071] 
[   54.061546] The buggy address belongs to the object at ffff00080243ed00
[   54.061546]  which belongs to the cache kmalloc-64 of size 64
[   54.073874] The buggy address is located 0 bytes to the right of
[   54.073874]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   54.086719] 
[   54.088197] The buggy address belongs to the physical page:
[   54.093754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   54.101739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.108248] page_type: f5(slab)
[   54.111380] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.119104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.126823] page dumped because: kasan: bad access detected
[   54.132378] 
[   54.133854] Memory state around the buggy address:
[   54.138634]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.145837]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.153041] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.160243]                                      ^
[   54.165021]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.172227]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.179426] ==================================================================
[   50.752607] ==================================================================
[   50.759689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   50.766978] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   50.774356] 
[   50.775839] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   50.775892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.775909] Hardware name: WinLink E850-96 board (DT)
[   50.775929] Call trace:
[   50.775941]  show_stack+0x20/0x38 (C)
[   50.775974]  dump_stack_lvl+0x8c/0xd0
[   50.776004]  print_report+0x118/0x608
[   50.776033]  kasan_report+0xdc/0x128
[   50.776064]  kasan_check_range+0x100/0x1a8
[   50.776097]  __kasan_check_write+0x20/0x30
[   50.776132]  kasan_atomics_helper+0x6ec/0x4858
[   50.776164]  kasan_atomics+0x198/0x2e0
[   50.776193]  kunit_try_run_case+0x170/0x3f0
[   50.776223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.776257]  kthread+0x328/0x630
[   50.776288]  ret_from_fork+0x10/0x20
[   50.776318] 
[   50.847271] Allocated by task 310:
[   50.850659]  kasan_save_stack+0x3c/0x68
[   50.854476]  kasan_save_track+0x20/0x40
[   50.858296]  kasan_save_alloc_info+0x40/0x58
[   50.862549]  __kasan_kmalloc+0xd4/0xd8
[   50.866282]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.870795]  kasan_atomics+0xb8/0x2e0
[   50.874441]  kunit_try_run_case+0x170/0x3f0
[   50.878608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.884076]  kthread+0x328/0x630
[   50.887288]  ret_from_fork+0x10/0x20
[   50.890847] 
[   50.892324] The buggy address belongs to the object at ffff00080243ed00
[   50.892324]  which belongs to the cache kmalloc-64 of size 64
[   50.904650] The buggy address is located 0 bytes to the right of
[   50.904650]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   50.917496] 
[   50.918972] The buggy address belongs to the physical page:
[   50.924531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   50.932515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.939025] page_type: f5(slab)
[   50.942156] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.949881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.957600] page dumped because: kasan: bad access detected
[   50.963155] 
[   50.964631] Memory state around the buggy address:
[   50.969411]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.976614]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.983818] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.991019]                                      ^
[   50.995797]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.003003]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.010203] ==================================================================
[   52.338872] ==================================================================
[   52.345950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   52.353239] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   52.360617] 
[   52.362098] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   52.362149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.362165] Hardware name: WinLink E850-96 board (DT)
[   52.362186] Call trace:
[   52.362200]  show_stack+0x20/0x38 (C)
[   52.362235]  dump_stack_lvl+0x8c/0xd0
[   52.362267]  print_report+0x118/0x608
[   52.362299]  kasan_report+0xdc/0x128
[   52.362327]  kasan_check_range+0x100/0x1a8
[   52.362358]  __kasan_check_write+0x20/0x30
[   52.362393]  kasan_atomics_helper+0x99c/0x4858
[   52.362424]  kasan_atomics+0x198/0x2e0
[   52.362454]  kunit_try_run_case+0x170/0x3f0
[   52.362484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.362520]  kthread+0x328/0x630
[   52.362550]  ret_from_fork+0x10/0x20
[   52.362582] 
[   52.433532] Allocated by task 310:
[   52.436919]  kasan_save_stack+0x3c/0x68
[   52.440737]  kasan_save_track+0x20/0x40
[   52.444557]  kasan_save_alloc_info+0x40/0x58
[   52.448810]  __kasan_kmalloc+0xd4/0xd8
[   52.452542]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.457056]  kasan_atomics+0xb8/0x2e0
[   52.460702]  kunit_try_run_case+0x170/0x3f0
[   52.464869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.470337]  kthread+0x328/0x630
[   52.473549]  ret_from_fork+0x10/0x20
[   52.477108] 
[   52.478584] The buggy address belongs to the object at ffff00080243ed00
[   52.478584]  which belongs to the cache kmalloc-64 of size 64
[   52.490911] The buggy address is located 0 bytes to the right of
[   52.490911]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   52.503757] 
[   52.505233] The buggy address belongs to the physical page:
[   52.510792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   52.518775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.525284] page_type: f5(slab)
[   52.528417] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.536142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.543861] page dumped because: kasan: bad access detected
[   52.549416] 
[   52.550891] Memory state around the buggy address:
[   52.555670]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.562874]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.570079] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.577280]                                      ^
[   52.582058]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.589264]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.596464] ==================================================================
[   52.868841] ==================================================================
[   52.875802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   52.883092] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   52.890470] 
[   52.891953] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   52.892003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.892021] Hardware name: WinLink E850-96 board (DT)
[   52.892040] Call trace:
[   52.892055]  show_stack+0x20/0x38 (C)
[   52.892088]  dump_stack_lvl+0x8c/0xd0
[   52.892120]  print_report+0x118/0x608
[   52.892151]  kasan_report+0xdc/0x128
[   52.892180]  kasan_check_range+0x100/0x1a8
[   52.892212]  __kasan_check_write+0x20/0x30
[   52.892247]  kasan_atomics_helper+0xa6c/0x4858
[   52.892278]  kasan_atomics+0x198/0x2e0
[   52.892308]  kunit_try_run_case+0x170/0x3f0
[   52.892337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.892374]  kthread+0x328/0x630
[   52.892407]  ret_from_fork+0x10/0x20
[   52.892439] 
[   52.963385] Allocated by task 310:
[   52.966773]  kasan_save_stack+0x3c/0x68
[   52.970591]  kasan_save_track+0x20/0x40
[   52.974410]  kasan_save_alloc_info+0x40/0x58
[   52.978663]  __kasan_kmalloc+0xd4/0xd8
[   52.982395]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.986910]  kasan_atomics+0xb8/0x2e0
[   52.990555]  kunit_try_run_case+0x170/0x3f0
[   52.994722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.000190]  kthread+0x328/0x630
[   53.003402]  ret_from_fork+0x10/0x20
[   53.006961] 
[   53.008438] The buggy address belongs to the object at ffff00080243ed00
[   53.008438]  which belongs to the cache kmalloc-64 of size 64
[   53.020765] The buggy address is located 0 bytes to the right of
[   53.020765]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   53.033610] 
[   53.035087] The buggy address belongs to the physical page:
[   53.040645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   53.048628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.055138] page_type: f5(slab)
[   53.058272] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.065995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.073714] page dumped because: kasan: bad access detected
[   53.079269] 
[   53.080745] Memory state around the buggy address:
[   53.085524]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.092728]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.099932] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.107133]                                      ^
[   53.111911]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.119117]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.126317] ==================================================================
[   57.349409] ==================================================================
[   57.356464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   57.363754] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   57.371132] 
[   57.372614] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   57.372664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.372679] Hardware name: WinLink E850-96 board (DT)
[   57.372697] Call trace:
[   57.372712]  show_stack+0x20/0x38 (C)
[   57.372747]  dump_stack_lvl+0x8c/0xd0
[   57.372778]  print_report+0x118/0x608
[   57.372810]  kasan_report+0xdc/0x128
[   57.372840]  kasan_check_range+0x100/0x1a8
[   57.372873]  __kasan_check_write+0x20/0x30
[   57.372907]  kasan_atomics_helper+0xf88/0x4858
[   57.372937]  kasan_atomics+0x198/0x2e0
[   57.372966]  kunit_try_run_case+0x170/0x3f0
[   57.372999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.373033]  kthread+0x328/0x630
[   57.373066]  ret_from_fork+0x10/0x20
[   57.373097] 
[   57.444047] Allocated by task 310:
[   57.447435]  kasan_save_stack+0x3c/0x68
[   57.451252]  kasan_save_track+0x20/0x40
[   57.455072]  kasan_save_alloc_info+0x40/0x58
[   57.459325]  __kasan_kmalloc+0xd4/0xd8
[   57.463058]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.467571]  kasan_atomics+0xb8/0x2e0
[   57.471217]  kunit_try_run_case+0x170/0x3f0
[   57.475384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.480852]  kthread+0x328/0x630
[   57.484064]  ret_from_fork+0x10/0x20
[   57.487623] 
[   57.489098] The buggy address belongs to the object at ffff00080243ed00
[   57.489098]  which belongs to the cache kmalloc-64 of size 64
[   57.501428] The buggy address is located 0 bytes to the right of
[   57.501428]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   57.514272] 
[   57.515748] The buggy address belongs to the physical page:
[   57.521305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   57.529290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.535800] page_type: f5(slab)
[   57.538933] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.546657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.554376] page dumped because: kasan: bad access detected
[   57.559931] 
[   57.561406] Memory state around the buggy address:
[   57.566186]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.573390]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.580594] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.587795]                                      ^
[   57.592573]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.599779]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.606979] ==================================================================
[   62.375582] ==================================================================
[   62.382604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   62.389981] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   62.397359] 
[   62.398841] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   62.398892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.398906] Hardware name: WinLink E850-96 board (DT)
[   62.398927] Call trace:
[   62.398942]  show_stack+0x20/0x38 (C)
[   62.398974]  dump_stack_lvl+0x8c/0xd0
[   62.399006]  print_report+0x118/0x608
[   62.399035]  kasan_report+0xdc/0x128
[   62.399065]  kasan_check_range+0x100/0x1a8
[   62.399098]  __kasan_check_write+0x20/0x30
[   62.399131]  kasan_atomics_helper+0x16d0/0x4858
[   62.399162]  kasan_atomics+0x198/0x2e0
[   62.399191]  kunit_try_run_case+0x170/0x3f0
[   62.399222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.399258]  kthread+0x328/0x630
[   62.399290]  ret_from_fork+0x10/0x20
[   62.399323] 
[   62.470361] Allocated by task 310:
[   62.473748]  kasan_save_stack+0x3c/0x68
[   62.477566]  kasan_save_track+0x20/0x40
[   62.481385]  kasan_save_alloc_info+0x40/0x58
[   62.485638]  __kasan_kmalloc+0xd4/0xd8
[   62.489371]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.493885]  kasan_atomics+0xb8/0x2e0
[   62.497530]  kunit_try_run_case+0x170/0x3f0
[   62.501697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.507166]  kthread+0x328/0x630
[   62.510378]  ret_from_fork+0x10/0x20
[   62.513936] 
[   62.515414] The buggy address belongs to the object at ffff00080243ed00
[   62.515414]  which belongs to the cache kmalloc-64 of size 64
[   62.527740] The buggy address is located 0 bytes to the right of
[   62.527740]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   62.540586] 
[   62.542061] The buggy address belongs to the physical page:
[   62.547619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   62.555604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.562114] page_type: f5(slab)
[   62.565246] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.572970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.580689] page dumped because: kasan: bad access detected
[   62.586244] 
[   62.587720] Memory state around the buggy address:
[   62.592498]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.599703]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.606908] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.614109]                                      ^
[   62.618887]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.626093]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.633292] ==================================================================
[   60.791930] ==================================================================
[   60.798948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   60.806324] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   60.813702] 
[   60.815184] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   60.815232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.815248] Hardware name: WinLink E850-96 board (DT)
[   60.815267] Call trace:
[   60.815283]  show_stack+0x20/0x38 (C)
[   60.815317]  dump_stack_lvl+0x8c/0xd0
[   60.815352]  print_report+0x118/0x608
[   60.815385]  kasan_report+0xdc/0x128
[   60.815414]  kasan_check_range+0x100/0x1a8
[   60.815447]  __kasan_check_write+0x20/0x30
[   60.815480]  kasan_atomics_helper+0x14e4/0x4858
[   60.815513]  kasan_atomics+0x198/0x2e0
[   60.815541]  kunit_try_run_case+0x170/0x3f0
[   60.815571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.815605]  kthread+0x328/0x630
[   60.815637]  ret_from_fork+0x10/0x20
[   60.815668] 
[   60.886704] Allocated by task 310:
[   60.890091]  kasan_save_stack+0x3c/0x68
[   60.893909]  kasan_save_track+0x20/0x40
[   60.897729]  kasan_save_alloc_info+0x40/0x58
[   60.901982]  __kasan_kmalloc+0xd4/0xd8
[   60.905714]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.910228]  kasan_atomics+0xb8/0x2e0
[   60.913874]  kunit_try_run_case+0x170/0x3f0
[   60.918040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.923509]  kthread+0x328/0x630
[   60.926721]  ret_from_fork+0x10/0x20
[   60.930280] 
[   60.931757] The buggy address belongs to the object at ffff00080243ed00
[   60.931757]  which belongs to the cache kmalloc-64 of size 64
[   60.944082] The buggy address is located 0 bytes to the right of
[   60.944082]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   60.956929] 
[   60.958406] The buggy address belongs to the physical page:
[   60.963963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   60.971948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.978458] page_type: f5(slab)
[   60.981589] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.989314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.997032] page dumped because: kasan: bad access detected
[   61.002588] 
[   61.004063] Memory state around the buggy address:
[   61.008841]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.016046]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.023251] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.030452]                                      ^
[   61.035230]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.042436]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.049636] ==================================================================
[   62.902388] ==================================================================
[   62.909335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   62.916709] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   62.924087] 
[   62.925569] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   62.925618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.925635] Hardware name: WinLink E850-96 board (DT)
[   62.925654] Call trace:
[   62.925665]  show_stack+0x20/0x38 (C)
[   62.925699]  dump_stack_lvl+0x8c/0xd0
[   62.925732]  print_report+0x118/0x608
[   62.925764]  kasan_report+0xdc/0x128
[   62.925794]  kasan_check_range+0x100/0x1a8
[   62.925828]  __kasan_check_write+0x20/0x30
[   62.925864]  kasan_atomics_helper+0x175c/0x4858
[   62.925896]  kasan_atomics+0x198/0x2e0
[   62.925924]  kunit_try_run_case+0x170/0x3f0
[   62.925958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.925993]  kthread+0x328/0x630
[   62.926025]  ret_from_fork+0x10/0x20
[   62.926056] 
[   62.997089] Allocated by task 310:
[   63.000476]  kasan_save_stack+0x3c/0x68
[   63.004294]  kasan_save_track+0x20/0x40
[   63.008113]  kasan_save_alloc_info+0x40/0x58
[   63.012367]  __kasan_kmalloc+0xd4/0xd8
[   63.016099]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.020613]  kasan_atomics+0xb8/0x2e0
[   63.024259]  kunit_try_run_case+0x170/0x3f0
[   63.028425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.033894]  kthread+0x328/0x630
[   63.037106]  ret_from_fork+0x10/0x20
[   63.040665] 
[   63.042140] The buggy address belongs to the object at ffff00080243ed00
[   63.042140]  which belongs to the cache kmalloc-64 of size 64
[   63.054469] The buggy address is located 0 bytes to the right of
[   63.054469]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   63.067314] 
[   63.068790] The buggy address belongs to the physical page:
[   63.074349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   63.082334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.088843] page_type: f5(slab)
[   63.091976] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.099698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.107417] page dumped because: kasan: bad access detected
[   63.112973] 
[   63.114448] Memory state around the buggy address:
[   63.119229]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.126431]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.133636] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.140837]                                      ^
[   63.145615]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.152821]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.160021] ==================================================================
[   60.526766] ==================================================================
[   60.533848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   60.541224] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   60.548602] 
[   60.550083] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   60.550130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.550150] Hardware name: WinLink E850-96 board (DT)
[   60.550170] Call trace:
[   60.550185]  show_stack+0x20/0x38 (C)
[   60.550216]  dump_stack_lvl+0x8c/0xd0
[   60.550248]  print_report+0x118/0x608
[   60.550280]  kasan_report+0xdc/0x128
[   60.550311]  kasan_check_range+0x100/0x1a8
[   60.550343]  __kasan_check_write+0x20/0x30
[   60.550378]  kasan_atomics_helper+0x147c/0x4858
[   60.550411]  kasan_atomics+0x198/0x2e0
[   60.550440]  kunit_try_run_case+0x170/0x3f0
[   60.550473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.550509]  kthread+0x328/0x630
[   60.550541]  ret_from_fork+0x10/0x20
[   60.550572] 
[   60.621603] Allocated by task 310:
[   60.624991]  kasan_save_stack+0x3c/0x68
[   60.628809]  kasan_save_track+0x20/0x40
[   60.632628]  kasan_save_alloc_info+0x40/0x58
[   60.636881]  __kasan_kmalloc+0xd4/0xd8
[   60.640614]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.645128]  kasan_atomics+0xb8/0x2e0
[   60.648773]  kunit_try_run_case+0x170/0x3f0
[   60.652940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.658409]  kthread+0x328/0x630
[   60.661621]  ret_from_fork+0x10/0x20
[   60.665180] 
[   60.666657] The buggy address belongs to the object at ffff00080243ed00
[   60.666657]  which belongs to the cache kmalloc-64 of size 64
[   60.678985] The buggy address is located 0 bytes to the right of
[   60.678985]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   60.691829] 
[   60.693304] The buggy address belongs to the physical page:
[   60.698862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   60.706847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.713357] page_type: f5(slab)
[   60.716489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.724214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.731932] page dumped because: kasan: bad access detected
[   60.737487] 
[   60.738963] Memory state around the buggy address:
[   60.743741]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.750946]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.758151] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.765352]                                      ^
[   60.770130]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.777336]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.784536] ==================================================================
[   51.547447] ==================================================================
[   51.554469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   51.561758] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   51.569136] 
[   51.570616] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   51.570665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.570682] Hardware name: WinLink E850-96 board (DT)
[   51.570702] Call trace:
[   51.570716]  show_stack+0x20/0x38 (C)
[   51.570751]  dump_stack_lvl+0x8c/0xd0
[   51.570782]  print_report+0x118/0x608
[   51.570814]  kasan_report+0xdc/0x128
[   51.570843]  kasan_check_range+0x100/0x1a8
[   51.570878]  __kasan_check_write+0x20/0x30
[   51.570911]  kasan_atomics_helper+0x894/0x4858
[   51.570942]  kasan_atomics+0x198/0x2e0
[   51.570970]  kunit_try_run_case+0x170/0x3f0
[   51.571001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.571036]  kthread+0x328/0x630
[   51.571070]  ret_from_fork+0x10/0x20
[   51.571103] 
[   51.642051] Allocated by task 310:
[   51.645438]  kasan_save_stack+0x3c/0x68
[   51.649256]  kasan_save_track+0x20/0x40
[   51.653076]  kasan_save_alloc_info+0x40/0x58
[   51.657329]  __kasan_kmalloc+0xd4/0xd8
[   51.661061]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.665575]  kasan_atomics+0xb8/0x2e0
[   51.669221]  kunit_try_run_case+0x170/0x3f0
[   51.673387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.678856]  kthread+0x328/0x630
[   51.682068]  ret_from_fork+0x10/0x20
[   51.685627] 
[   51.687104] The buggy address belongs to the object at ffff00080243ed00
[   51.687104]  which belongs to the cache kmalloc-64 of size 64
[   51.699429] The buggy address is located 0 bytes to the right of
[   51.699429]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   51.712276] 
[   51.713752] The buggy address belongs to the physical page:
[   51.719311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   51.727295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.733803] page_type: f5(slab)
[   51.736936] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.744661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.752379] page dumped because: kasan: bad access detected
[   51.757935] 
[   51.759410] Memory state around the buggy address:
[   51.764189]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.771393]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.778598] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.785799]                                      ^
[   51.790577]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.797783]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.804983] ==================================================================
[   58.939740] ==================================================================
[   58.946719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   58.954095] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   58.961473] 
[   58.962954] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   58.963008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.963023] Hardware name: WinLink E850-96 board (DT)
[   58.963042] Call trace:
[   58.963057]  show_stack+0x20/0x38 (C)
[   58.963094]  dump_stack_lvl+0x8c/0xd0
[   58.963128]  print_report+0x118/0x608
[   58.963160]  kasan_report+0xdc/0x128
[   58.963190]  kasan_check_range+0x100/0x1a8
[   58.963224]  __kasan_check_write+0x20/0x30
[   58.963257]  kasan_atomics_helper+0x11f8/0x4858
[   58.963288]  kasan_atomics+0x198/0x2e0
[   58.963317]  kunit_try_run_case+0x170/0x3f0
[   58.963348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.963386]  kthread+0x328/0x630
[   58.963417]  ret_from_fork+0x10/0x20
[   58.963449] 
[   59.034475] Allocated by task 310:
[   59.037862]  kasan_save_stack+0x3c/0x68
[   59.041680]  kasan_save_track+0x20/0x40
[   59.045499]  kasan_save_alloc_info+0x40/0x58
[   59.049753]  __kasan_kmalloc+0xd4/0xd8
[   59.053485]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.057999]  kasan_atomics+0xb8/0x2e0
[   59.061645]  kunit_try_run_case+0x170/0x3f0
[   59.065811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.071280]  kthread+0x328/0x630
[   59.074492]  ret_from_fork+0x10/0x20
[   59.078051] 
[   59.079526] The buggy address belongs to the object at ffff00080243ed00
[   59.079526]  which belongs to the cache kmalloc-64 of size 64
[   59.091854] The buggy address is located 0 bytes to the right of
[   59.091854]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   59.104699] 
[   59.106175] The buggy address belongs to the physical page:
[   59.111735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   59.119718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.126227] page_type: f5(slab)
[   59.129362] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.137084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.144803] page dumped because: kasan: bad access detected
[   59.150358] 
[   59.151834] Memory state around the buggy address:
[   59.156615]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.163817]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.171021] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.178223]                                      ^
[   59.183001]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.190207]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.197408] ==================================================================
[   48.633261] ==================================================================
[   48.640275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   48.647565] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   48.654943] 
[   48.656423] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   48.656472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.656490] Hardware name: WinLink E850-96 board (DT)
[   48.656511] Call trace:
[   48.656525]  show_stack+0x20/0x38 (C)
[   48.656559]  dump_stack_lvl+0x8c/0xd0
[   48.656591]  print_report+0x118/0x608
[   48.656621]  kasan_report+0xdc/0x128
[   48.656653]  kasan_check_range+0x100/0x1a8
[   48.656685]  __kasan_check_write+0x20/0x30
[   48.656720]  kasan_atomics_helper+0x3ac/0x4858
[   48.656753]  kasan_atomics+0x198/0x2e0
[   48.656781]  kunit_try_run_case+0x170/0x3f0
[   48.656812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.656849]  kthread+0x328/0x630
[   48.656880]  ret_from_fork+0x10/0x20
[   48.656911] 
[   48.727859] Allocated by task 310:
[   48.731248]  kasan_save_stack+0x3c/0x68
[   48.735064]  kasan_save_track+0x20/0x40
[   48.738883]  kasan_save_alloc_info+0x40/0x58
[   48.743136]  __kasan_kmalloc+0xd4/0xd8
[   48.746869]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.751383]  kasan_atomics+0xb8/0x2e0
[   48.755029]  kunit_try_run_case+0x170/0x3f0
[   48.759195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.764664]  kthread+0x328/0x630
[   48.767875]  ret_from_fork+0x10/0x20
[   48.771435] 
[   48.772910] The buggy address belongs to the object at ffff00080243ed00
[   48.772910]  which belongs to the cache kmalloc-64 of size 64
[   48.785237] The buggy address is located 0 bytes to the right of
[   48.785237]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   48.798083] 
[   48.799559] The buggy address belongs to the physical page:
[   48.805117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   48.813101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.819612] page_type: f5(slab)
[   48.822744] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.830468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.838187] page dumped because: kasan: bad access detected
[   48.843742] 
[   48.845218] Memory state around the buggy address:
[   48.849996]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.857201]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.864406] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.871607]                                      ^
[   48.876385]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.883591]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.890791] ==================================================================
[   61.322126] ==================================================================
[   61.329147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   61.336524] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   61.343902] 
[   61.345383] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   61.345433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.345450] Hardware name: WinLink E850-96 board (DT)
[   61.345471] Call trace:
[   61.345485]  show_stack+0x20/0x38 (C)
[   61.345518]  dump_stack_lvl+0x8c/0xd0
[   61.345550]  print_report+0x118/0x608
[   61.345580]  kasan_report+0xdc/0x128
[   61.345611]  kasan_check_range+0x100/0x1a8
[   61.345645]  __kasan_check_write+0x20/0x30
[   61.345679]  kasan_atomics_helper+0x15b4/0x4858
[   61.345712]  kasan_atomics+0x198/0x2e0
[   61.345742]  kunit_try_run_case+0x170/0x3f0
[   61.345773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.345809]  kthread+0x328/0x630
[   61.345843]  ret_from_fork+0x10/0x20
[   61.345875] 
[   61.416904] Allocated by task 310:
[   61.420292]  kasan_save_stack+0x3c/0x68
[   61.424109]  kasan_save_track+0x20/0x40
[   61.427929]  kasan_save_alloc_info+0x40/0x58
[   61.432182]  __kasan_kmalloc+0xd4/0xd8
[   61.435915]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.440428]  kasan_atomics+0xb8/0x2e0
[   61.444074]  kunit_try_run_case+0x170/0x3f0
[   61.448241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.453709]  kthread+0x328/0x630
[   61.456921]  ret_from_fork+0x10/0x20
[   61.460480] 
[   61.461957] The buggy address belongs to the object at ffff00080243ed00
[   61.461957]  which belongs to the cache kmalloc-64 of size 64
[   61.474285] The buggy address is located 0 bytes to the right of
[   61.474285]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   61.487129] 
[   61.488605] The buggy address belongs to the physical page:
[   61.494164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   61.502148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.508658] page_type: f5(slab)
[   61.511789] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.519514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.527233] page dumped because: kasan: bad access detected
[   61.532788] 
[   61.534263] Memory state around the buggy address:
[   61.539043]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.546247]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.553451] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.560652]                                      ^
[   61.565430]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.572636]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.579836] ==================================================================
[   58.409492] ==================================================================
[   58.416517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   58.423894] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   58.431272] 
[   58.432755] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   58.432806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.432823] Hardware name: WinLink E850-96 board (DT)
[   58.432841] Call trace:
[   58.432853]  show_stack+0x20/0x38 (C)
[   58.432887]  dump_stack_lvl+0x8c/0xd0
[   58.432919]  print_report+0x118/0x608
[   58.432951]  kasan_report+0xdc/0x128
[   58.432981]  kasan_check_range+0x100/0x1a8
[   58.433018]  __kasan_check_write+0x20/0x30
[   58.433051]  kasan_atomics_helper+0x1128/0x4858
[   58.433084]  kasan_atomics+0x198/0x2e0
[   58.433112]  kunit_try_run_case+0x170/0x3f0
[   58.433143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.433178]  kthread+0x328/0x630
[   58.433210]  ret_from_fork+0x10/0x20
[   58.433241] 
[   58.504274] Allocated by task 310:
[   58.507662]  kasan_save_stack+0x3c/0x68
[   58.511480]  kasan_save_track+0x20/0x40
[   58.515299]  kasan_save_alloc_info+0x40/0x58
[   58.519552]  __kasan_kmalloc+0xd4/0xd8
[   58.523285]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.527798]  kasan_atomics+0xb8/0x2e0
[   58.531444]  kunit_try_run_case+0x170/0x3f0
[   58.535611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.541080]  kthread+0x328/0x630
[   58.544291]  ret_from_fork+0x10/0x20
[   58.547850] 
[   58.549326] The buggy address belongs to the object at ffff00080243ed00
[   58.549326]  which belongs to the cache kmalloc-64 of size 64
[   58.561654] The buggy address is located 0 bytes to the right of
[   58.561654]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   58.574499] 
[   58.575975] The buggy address belongs to the physical page:
[   58.581534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   58.589518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.596027] page_type: f5(slab)
[   58.599159] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.606884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.614603] page dumped because: kasan: bad access detected
[   58.620158] 
[   58.621634] Memory state around the buggy address:
[   58.626413]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.633617]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.640823] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.648023]                                      ^
[   58.652800]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.660007]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.667206] ==================================================================
[   58.144366] ==================================================================
[   58.151417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   58.158794] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   58.166172] 
[   58.167653] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   58.167703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.167718] Hardware name: WinLink E850-96 board (DT)
[   58.167739] Call trace:
[   58.167754]  show_stack+0x20/0x38 (C)
[   58.167786]  dump_stack_lvl+0x8c/0xd0
[   58.167817]  print_report+0x118/0x608
[   58.167849]  kasan_report+0xdc/0x128
[   58.167879]  kasan_check_range+0x100/0x1a8
[   58.167911]  __kasan_check_write+0x20/0x30
[   58.167943]  kasan_atomics_helper+0x10c0/0x4858
[   58.167975]  kasan_atomics+0x198/0x2e0
[   58.168004]  kunit_try_run_case+0x170/0x3f0
[   58.168035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.168071]  kthread+0x328/0x630
[   58.168102]  ret_from_fork+0x10/0x20
[   58.168133] 
[   58.239174] Allocated by task 310:
[   58.242562]  kasan_save_stack+0x3c/0x68
[   58.246379]  kasan_save_track+0x20/0x40
[   58.250199]  kasan_save_alloc_info+0x40/0x58
[   58.254452]  __kasan_kmalloc+0xd4/0xd8
[   58.258185]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.262698]  kasan_atomics+0xb8/0x2e0
[   58.266344]  kunit_try_run_case+0x170/0x3f0
[   58.270511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.275979]  kthread+0x328/0x630
[   58.279191]  ret_from_fork+0x10/0x20
[   58.282750] 
[   58.284225] The buggy address belongs to the object at ffff00080243ed00
[   58.284225]  which belongs to the cache kmalloc-64 of size 64
[   58.296553] The buggy address is located 0 bytes to the right of
[   58.296553]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   58.309399] 
[   58.310875] The buggy address belongs to the physical page:
[   58.316434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   58.324417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.330927] page_type: f5(slab)
[   58.334060] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.341784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.349503] page dumped because: kasan: bad access detected
[   58.355058] 
[   58.356533] Memory state around the buggy address:
[   58.361312]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.368516]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.375721] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.382922]                                      ^
[   58.387700]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.394907]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.402106] ==================================================================
[   62.113899] ==================================================================
[   62.120977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   62.128352] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   62.135644] 
[   62.137126] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   62.137177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.137191] Hardware name: WinLink E850-96 board (DT)
[   62.137209] Call trace:
[   62.137225]  show_stack+0x20/0x38 (C)
[   62.137256]  dump_stack_lvl+0x8c/0xd0
[   62.137287]  print_report+0x118/0x608
[   62.137319]  kasan_report+0xdc/0x128
[   62.137348]  __asan_report_load8_noabort+0x20/0x30
[   62.137383]  kasan_atomics_helper+0x3df4/0x4858
[   62.137417]  kasan_atomics+0x198/0x2e0
[   62.137447]  kunit_try_run_case+0x170/0x3f0
[   62.137478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.137512]  kthread+0x328/0x630
[   62.137543]  ret_from_fork+0x10/0x20
[   62.137574] 
[   62.205261] Allocated by task 310:
[   62.208647]  kasan_save_stack+0x3c/0x68
[   62.212466]  kasan_save_track+0x20/0x40
[   62.216285]  kasan_save_alloc_info+0x40/0x58
[   62.220538]  __kasan_kmalloc+0xd4/0xd8
[   62.224271]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.228785]  kasan_atomics+0xb8/0x2e0
[   62.232430]  kunit_try_run_case+0x170/0x3f0
[   62.236597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.242066]  kthread+0x328/0x630
[   62.245277]  ret_from_fork+0x10/0x20
[   62.248837] 
[   62.250313] The buggy address belongs to the object at ffff00080243ed00
[   62.250313]  which belongs to the cache kmalloc-64 of size 64
[   62.262640] The buggy address is located 0 bytes to the right of
[   62.262640]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   62.275485] 
[   62.276961] The buggy address belongs to the physical page:
[   62.282520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   62.290504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.297014] page_type: f5(slab)
[   62.300146] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.307870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.315589] page dumped because: kasan: bad access detected
[   62.321144] 
[   62.322620] Memory state around the buggy address:
[   62.327399]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.334603]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.341808] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.349009]                                      ^
[   62.353786]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.360993]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.368193] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
[   44.107415] ==================================================================
[   44.114475] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.123328] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   44.130706] 
[   44.132187] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   44.132236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.132252] Hardware name: WinLink E850-96 board (DT)
[   44.132268] Call trace:
[   44.132281]  show_stack+0x20/0x38 (C)
[   44.132313]  dump_stack_lvl+0x8c/0xd0
[   44.132343]  print_report+0x118/0x608
[   44.132373]  kasan_report+0xdc/0x128
[   44.132405]  kasan_check_range+0x100/0x1a8
[   44.132438]  __kasan_check_write+0x20/0x30
[   44.132473]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.132511]  kasan_bitops_generic+0x11c/0x1c8
[   44.132543]  kunit_try_run_case+0x170/0x3f0
[   44.132573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.132607]  kthread+0x328/0x630
[   44.132639]  ret_from_fork+0x10/0x20
[   44.132670] 
[   44.205791] Allocated by task 306:
[   44.209178]  kasan_save_stack+0x3c/0x68
[   44.212996]  kasan_save_track+0x20/0x40
[   44.216816]  kasan_save_alloc_info+0x40/0x58
[   44.221069]  __kasan_kmalloc+0xd4/0xd8
[   44.224802]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.229315]  kasan_bitops_generic+0xa0/0x1c8
[   44.233569]  kunit_try_run_case+0x170/0x3f0
[   44.237735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.243204]  kthread+0x328/0x630
[   44.246416]  ret_from_fork+0x10/0x20
[   44.249975] 
[   44.251450] The buggy address belongs to the object at ffff000800e200a0
[   44.251450]  which belongs to the cache kmalloc-16 of size 16
[   44.263780] The buggy address is located 8 bytes inside of
[   44.263780]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   44.276016] 
[   44.277492] The buggy address belongs to the physical page:
[   44.283047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   44.291033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.297545] page_type: f5(slab)
[   44.300677] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.308401] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.316120] page dumped because: kasan: bad access detected
[   44.321675] 
[   44.323150] Memory state around the buggy address:
[   44.327929]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.335133]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.342338] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.349539]                                   ^
[   44.354057]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.361261]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.368463] ==================================================================
[   45.708252] ==================================================================
[   45.715319] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.724259] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   45.731636] 
[   45.733118] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   45.733166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.733182] Hardware name: WinLink E850-96 board (DT)
[   45.733202] Call trace:
[   45.733216]  show_stack+0x20/0x38 (C)
[   45.733246]  dump_stack_lvl+0x8c/0xd0
[   45.733277]  print_report+0x118/0x608
[   45.733307]  kasan_report+0xdc/0x128
[   45.733338]  kasan_check_range+0x100/0x1a8
[   45.733371]  __kasan_check_write+0x20/0x30
[   45.733405]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.733440]  kasan_bitops_generic+0x11c/0x1c8
[   45.733472]  kunit_try_run_case+0x170/0x3f0
[   45.733504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.733538]  kthread+0x328/0x630
[   45.733572]  ret_from_fork+0x10/0x20
[   45.733602] 
[   45.806809] Allocated by task 306:
[   45.810196]  kasan_save_stack+0x3c/0x68
[   45.814014]  kasan_save_track+0x20/0x40
[   45.817833]  kasan_save_alloc_info+0x40/0x58
[   45.822087]  __kasan_kmalloc+0xd4/0xd8
[   45.825819]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.830333]  kasan_bitops_generic+0xa0/0x1c8
[   45.834586]  kunit_try_run_case+0x170/0x3f0
[   45.838753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.844222]  kthread+0x328/0x630
[   45.847433]  ret_from_fork+0x10/0x20
[   45.850992] 
[   45.852469] The buggy address belongs to the object at ffff000800e200a0
[   45.852469]  which belongs to the cache kmalloc-16 of size 16
[   45.864796] The buggy address is located 8 bytes inside of
[   45.864796]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   45.877034] 
[   45.878509] The buggy address belongs to the physical page:
[   45.884067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   45.892051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.898561] page_type: f5(slab)
[   45.901694] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.909418] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.917137] page dumped because: kasan: bad access detected
[   45.922693] 
[   45.924168] Memory state around the buggy address:
[   45.928949]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.936151]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.943356] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.950557]                                   ^
[   45.955074]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.962279]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.969480] ==================================================================
[   44.909481] ==================================================================
[   44.916546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.925486] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   44.932777] 
[   44.934257] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   44.934306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.934322] Hardware name: WinLink E850-96 board (DT)
[   44.934339] Call trace:
[   44.934352]  show_stack+0x20/0x38 (C)
[   44.934384]  dump_stack_lvl+0x8c/0xd0
[   44.934417]  print_report+0x118/0x608
[   44.934449]  kasan_report+0xdc/0x128
[   44.934477]  __asan_report_load8_noabort+0x20/0x30
[   44.934512]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.934545]  kasan_bitops_generic+0x11c/0x1c8
[   44.934575]  kunit_try_run_case+0x170/0x3f0
[   44.934605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.934638]  kthread+0x328/0x630
[   44.934670]  ret_from_fork+0x10/0x20
[   44.934701] 
[   45.004564] Allocated by task 306:
[   45.007950]  kasan_save_stack+0x3c/0x68
[   45.011769]  kasan_save_track+0x20/0x40
[   45.015588]  kasan_save_alloc_info+0x40/0x58
[   45.019841]  __kasan_kmalloc+0xd4/0xd8
[   45.023574]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.028088]  kasan_bitops_generic+0xa0/0x1c8
[   45.032341]  kunit_try_run_case+0x170/0x3f0
[   45.036508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.041977]  kthread+0x328/0x630
[   45.045189]  ret_from_fork+0x10/0x20
[   45.048748] 
[   45.050223] The buggy address belongs to the object at ffff000800e200a0
[   45.050223]  which belongs to the cache kmalloc-16 of size 16
[   45.062550] The buggy address is located 8 bytes inside of
[   45.062550]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   45.074789] 
[   45.076264] The buggy address belongs to the physical page:
[   45.081821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   45.089807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.096316] page_type: f5(slab)
[   45.099449] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.107173] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.114892] page dumped because: kasan: bad access detected
[   45.120448] 
[   45.121923] Memory state around the buggy address:
[   45.126701]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.133906]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.141111] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.148312]                                   ^
[   45.152829]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.160034]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.167235] ==================================================================
[   46.241952] ==================================================================
[   46.248991] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.257931] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   46.265222] 
[   46.266703] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   46.266751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.266766] Hardware name: WinLink E850-96 board (DT)
[   46.266784] Call trace:
[   46.266794]  show_stack+0x20/0x38 (C)
[   46.266826]  dump_stack_lvl+0x8c/0xd0
[   46.266856]  print_report+0x118/0x608
[   46.266889]  kasan_report+0xdc/0x128
[   46.266919]  __asan_report_load8_noabort+0x20/0x30
[   46.266955]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.266990]  kasan_bitops_generic+0x11c/0x1c8
[   46.267021]  kunit_try_run_case+0x170/0x3f0
[   46.267052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.267086]  kthread+0x328/0x630
[   46.267118]  ret_from_fork+0x10/0x20
[   46.267148] 
[   46.337009] Allocated by task 306:
[   46.340395]  kasan_save_stack+0x3c/0x68
[   46.344214]  kasan_save_track+0x20/0x40
[   46.348034]  kasan_save_alloc_info+0x40/0x58
[   46.352287]  __kasan_kmalloc+0xd4/0xd8
[   46.356019]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.360533]  kasan_bitops_generic+0xa0/0x1c8
[   46.364787]  kunit_try_run_case+0x170/0x3f0
[   46.368953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.374422]  kthread+0x328/0x630
[   46.377634]  ret_from_fork+0x10/0x20
[   46.381193] 
[   46.382668] The buggy address belongs to the object at ffff000800e200a0
[   46.382668]  which belongs to the cache kmalloc-16 of size 16
[   46.394995] The buggy address is located 8 bytes inside of
[   46.394995]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   46.407234] 
[   46.408710] The buggy address belongs to the physical page:
[   46.414267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   46.422251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.428761] page_type: f5(slab)
[   46.431894] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.439618] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.447338] page dumped because: kasan: bad access detected
[   46.452893] 
[   46.454368] Memory state around the buggy address:
[   46.459147]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.466352]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.473556] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.480757]                                   ^
[   46.485274]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.492480]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.499680] ==================================================================
[   44.375813] ==================================================================
[   44.382873] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.391813] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   44.399104] 
[   44.400584] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   44.400633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.400649] Hardware name: WinLink E850-96 board (DT)
[   44.400667] Call trace:
[   44.400679]  show_stack+0x20/0x38 (C)
[   44.400711]  dump_stack_lvl+0x8c/0xd0
[   44.400741]  print_report+0x118/0x608
[   44.400772]  kasan_report+0xdc/0x128
[   44.400804]  __asan_report_load8_noabort+0x20/0x30
[   44.400838]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.400877]  kasan_bitops_generic+0x11c/0x1c8
[   44.400908]  kunit_try_run_case+0x170/0x3f0
[   44.400936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.400970]  kthread+0x328/0x630
[   44.401000]  ret_from_fork+0x10/0x20
[   44.401031] 
[   44.470891] Allocated by task 306:
[   44.474277]  kasan_save_stack+0x3c/0x68
[   44.478096]  kasan_save_track+0x20/0x40
[   44.481916]  kasan_save_alloc_info+0x40/0x58
[   44.486169]  __kasan_kmalloc+0xd4/0xd8
[   44.489902]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.494416]  kasan_bitops_generic+0xa0/0x1c8
[   44.498669]  kunit_try_run_case+0x170/0x3f0
[   44.502835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.508304]  kthread+0x328/0x630
[   44.511516]  ret_from_fork+0x10/0x20
[   44.515075] 
[   44.516550] The buggy address belongs to the object at ffff000800e200a0
[   44.516550]  which belongs to the cache kmalloc-16 of size 16
[   44.528877] The buggy address is located 8 bytes inside of
[   44.528877]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   44.541116] 
[   44.542592] The buggy address belongs to the physical page:
[   44.548148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   44.556133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.562644] page_type: f5(slab)
[   44.565777] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.573501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.581220] page dumped because: kasan: bad access detected
[   44.586775] 
[   44.588250] Memory state around the buggy address:
[   44.593029]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.600234]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.607439] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.614639]                                   ^
[   44.619157]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.626362]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.633563] ==================================================================
[   45.174610] ==================================================================
[   45.181646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.190586] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   45.197964] 
[   45.199446] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   45.199496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.199513] Hardware name: WinLink E850-96 board (DT)
[   45.199532] Call trace:
[   45.199544]  show_stack+0x20/0x38 (C)
[   45.199577]  dump_stack_lvl+0x8c/0xd0
[   45.199609]  print_report+0x118/0x608
[   45.199639]  kasan_report+0xdc/0x128
[   45.199671]  kasan_check_range+0x100/0x1a8
[   45.199704]  __kasan_check_write+0x20/0x30
[   45.199737]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.199775]  kasan_bitops_generic+0x11c/0x1c8
[   45.199805]  kunit_try_run_case+0x170/0x3f0
[   45.199837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.199871]  kthread+0x328/0x630
[   45.199904]  ret_from_fork+0x10/0x20
[   45.199934] 
[   45.273136] Allocated by task 306:
[   45.276523]  kasan_save_stack+0x3c/0x68
[   45.280341]  kasan_save_track+0x20/0x40
[   45.284161]  kasan_save_alloc_info+0x40/0x58
[   45.288414]  __kasan_kmalloc+0xd4/0xd8
[   45.292147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.296660]  kasan_bitops_generic+0xa0/0x1c8
[   45.300914]  kunit_try_run_case+0x170/0x3f0
[   45.305081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.310549]  kthread+0x328/0x630
[   45.313761]  ret_from_fork+0x10/0x20
[   45.317320] 
[   45.318795] The buggy address belongs to the object at ffff000800e200a0
[   45.318795]  which belongs to the cache kmalloc-16 of size 16
[   45.331124] The buggy address is located 8 bytes inside of
[   45.331124]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   45.343361] 
[   45.344837] The buggy address belongs to the physical page:
[   45.350396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   45.358378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.364890] page_type: f5(slab)
[   45.368021] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.375746] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.383465] page dumped because: kasan: bad access detected
[   45.389020] 
[   45.390496] Memory state around the buggy address:
[   45.395276]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.402479]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.409683] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.416884]                                   ^
[   45.421402]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.428607]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.435808] ==================================================================
[   45.443129] ==================================================================
[   45.450219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.459158] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   45.466449] 
[   45.467929] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   45.467977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.467995] Hardware name: WinLink E850-96 board (DT)
[   45.468012] Call trace:
[   45.468026]  show_stack+0x20/0x38 (C)
[   45.468059]  dump_stack_lvl+0x8c/0xd0
[   45.468088]  print_report+0x118/0x608
[   45.468120]  kasan_report+0xdc/0x128
[   45.468151]  __asan_report_load8_noabort+0x20/0x30
[   45.468188]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.468224]  kasan_bitops_generic+0x11c/0x1c8
[   45.468254]  kunit_try_run_case+0x170/0x3f0
[   45.468284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.468318]  kthread+0x328/0x630
[   45.468349]  ret_from_fork+0x10/0x20
[   45.468379] 
[   45.538236] Allocated by task 306:
[   45.541622]  kasan_save_stack+0x3c/0x68
[   45.545441]  kasan_save_track+0x20/0x40
[   45.549261]  kasan_save_alloc_info+0x40/0x58
[   45.553514]  __kasan_kmalloc+0xd4/0xd8
[   45.557247]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.561761]  kasan_bitops_generic+0xa0/0x1c8
[   45.566014]  kunit_try_run_case+0x170/0x3f0
[   45.570181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.575649]  kthread+0x328/0x630
[   45.578861]  ret_from_fork+0x10/0x20
[   45.582420] 
[   45.583896] The buggy address belongs to the object at ffff000800e200a0
[   45.583896]  which belongs to the cache kmalloc-16 of size 16
[   45.596224] The buggy address is located 8 bytes inside of
[   45.596224]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   45.608461] 
[   45.609937] The buggy address belongs to the physical page:
[   45.615493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   45.623479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.629989] page_type: f5(slab)
[   45.633122] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.640846] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.648564] page dumped because: kasan: bad access detected
[   45.654120] 
[   45.655596] Memory state around the buggy address:
[   45.660375]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.667579]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.674783] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.681984]                                   ^
[   45.686502]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.693707]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.700908] ==================================================================
[   44.640940] ==================================================================
[   44.647975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.656913] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   44.664292] 
[   44.665772] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   44.665819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.665837] Hardware name: WinLink E850-96 board (DT)
[   44.665855] Call trace:
[   44.665866]  show_stack+0x20/0x38 (C)
[   44.665898]  dump_stack_lvl+0x8c/0xd0
[   44.665929]  print_report+0x118/0x608
[   44.665960]  kasan_report+0xdc/0x128
[   44.665990]  kasan_check_range+0x100/0x1a8
[   44.666022]  __kasan_check_write+0x20/0x30
[   44.666056]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.666091]  kasan_bitops_generic+0x11c/0x1c8
[   44.666124]  kunit_try_run_case+0x170/0x3f0
[   44.666156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.666190]  kthread+0x328/0x630
[   44.666223]  ret_from_fork+0x10/0x20
[   44.666252] 
[   44.739464] Allocated by task 306:
[   44.742849]  kasan_save_stack+0x3c/0x68
[   44.746669]  kasan_save_track+0x20/0x40
[   44.750488]  kasan_save_alloc_info+0x40/0x58
[   44.754742]  __kasan_kmalloc+0xd4/0xd8
[   44.758474]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.762988]  kasan_bitops_generic+0xa0/0x1c8
[   44.767241]  kunit_try_run_case+0x170/0x3f0
[   44.771408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.776877]  kthread+0x328/0x630
[   44.780088]  ret_from_fork+0x10/0x20
[   44.783647] 
[   44.785123] The buggy address belongs to the object at ffff000800e200a0
[   44.785123]  which belongs to the cache kmalloc-16 of size 16
[   44.797449] The buggy address is located 8 bytes inside of
[   44.797449]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   44.809689] 
[   44.811164] The buggy address belongs to the physical page:
[   44.816722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   44.824709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.831216] page_type: f5(slab)
[   44.834349] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.842073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.849792] page dumped because: kasan: bad access detected
[   44.855347] 
[   44.856823] Memory state around the buggy address:
[   44.861601]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.868806]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.876011] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.883212]                                   ^
[   44.887729]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.894934]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.902135] ==================================================================
[   45.976828] ==================================================================
[   45.983891] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   45.992831] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   46.000122] 
[   46.001603] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   46.001650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.001664] Hardware name: WinLink E850-96 board (DT)
[   46.001684] Call trace:
[   46.001697]  show_stack+0x20/0x38 (C)
[   46.001726]  dump_stack_lvl+0x8c/0xd0
[   46.001757]  print_report+0x118/0x608
[   46.001789]  kasan_report+0xdc/0x128
[   46.001819]  __asan_report_load8_noabort+0x20/0x30
[   46.001855]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   46.001894]  kasan_bitops_generic+0x11c/0x1c8
[   46.001925]  kunit_try_run_case+0x170/0x3f0
[   46.001955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.001988]  kthread+0x328/0x630
[   46.002019]  ret_from_fork+0x10/0x20
[   46.002049] 
[   46.071909] Allocated by task 306:
[   46.075294]  kasan_save_stack+0x3c/0x68
[   46.079114]  kasan_save_track+0x20/0x40
[   46.082934]  kasan_save_alloc_info+0x40/0x58
[   46.087187]  __kasan_kmalloc+0xd4/0xd8
[   46.090919]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.095433]  kasan_bitops_generic+0xa0/0x1c8
[   46.099686]  kunit_try_run_case+0x170/0x3f0
[   46.103853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.109322]  kthread+0x328/0x630
[   46.112533]  ret_from_fork+0x10/0x20
[   46.116093] 
[   46.117568] The buggy address belongs to the object at ffff000800e200a0
[   46.117568]  which belongs to the cache kmalloc-16 of size 16
[   46.129895] The buggy address is located 8 bytes inside of
[   46.129895]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   46.142134] 
[   46.143609] The buggy address belongs to the physical page:
[   46.149167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   46.157152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.163661] page_type: f5(slab)
[   46.166794] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.174518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.182237] page dumped because: kasan: bad access detected
[   46.187792] 
[   46.189268] Memory state around the buggy address:
[   46.194048]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.201251]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.208456] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.215657]                                   ^
[   46.220174]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.227379]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.234580] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure
[   43.046281] ==================================================================
[   43.053381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   43.061538] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   43.068829] 
[   43.070312] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   43.070365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.070382] Hardware name: WinLink E850-96 board (DT)
[   43.070404] Call trace:
[   43.070419]  show_stack+0x20/0x38 (C)
[   43.070451]  dump_stack_lvl+0x8c/0xd0
[   43.070482]  print_report+0x118/0x608
[   43.070514]  kasan_report+0xdc/0x128
[   43.070543]  __asan_report_load8_noabort+0x20/0x30
[   43.070582]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   43.070616]  kasan_bitops_generic+0x110/0x1c8
[   43.070646]  kunit_try_run_case+0x170/0x3f0
[   43.070679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.070714]  kthread+0x328/0x630
[   43.070745]  ret_from_fork+0x10/0x20
[   43.070777] 
[   43.139835] Allocated by task 306:
[   43.143223]  kasan_save_stack+0x3c/0x68
[   43.147040]  kasan_save_track+0x20/0x40
[   43.150859]  kasan_save_alloc_info+0x40/0x58
[   43.155113]  __kasan_kmalloc+0xd4/0xd8
[   43.158845]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.163359]  kasan_bitops_generic+0xa0/0x1c8
[   43.167613]  kunit_try_run_case+0x170/0x3f0
[   43.171779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.177248]  kthread+0x328/0x630
[   43.180459]  ret_from_fork+0x10/0x20
[   43.184018] 
[   43.185494] The buggy address belongs to the object at ffff000800e200a0
[   43.185494]  which belongs to the cache kmalloc-16 of size 16
[   43.197824] The buggy address is located 8 bytes inside of
[   43.197824]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   43.210060] 
[   43.211535] The buggy address belongs to the physical page:
[   43.217095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   43.225077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.231589] page_type: f5(slab)
[   43.234720] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.242445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.250163] page dumped because: kasan: bad access detected
[   43.255719] 
[   43.257194] Memory state around the buggy address:
[   43.261972]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.269177]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.276382] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.283583]                                   ^
[   43.288100]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.295305]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.302506] ==================================================================
[   41.448930] ==================================================================
[   41.458268] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.466424] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   41.473802] 
[   41.475288] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   41.475343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.475363] Hardware name: WinLink E850-96 board (DT)
[   41.475387] Call trace:
[   41.475402]  show_stack+0x20/0x38 (C)
[   41.475442]  dump_stack_lvl+0x8c/0xd0
[   41.475477]  print_report+0x118/0x608
[   41.475513]  kasan_report+0xdc/0x128
[   41.475546]  kasan_check_range+0x100/0x1a8
[   41.475584]  __kasan_check_write+0x20/0x30
[   41.475624]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.475657]  kasan_bitops_generic+0x110/0x1c8
[   41.475689]  kunit_try_run_case+0x170/0x3f0
[   41.475723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.475761]  kthread+0x328/0x630
[   41.475798]  ret_from_fork+0x10/0x20
[   41.475834] 
[   41.548193] Allocated by task 306:
[   41.551581]  kasan_save_stack+0x3c/0x68
[   41.555397]  kasan_save_track+0x20/0x40
[   41.559217]  kasan_save_alloc_info+0x40/0x58
[   41.563470]  __kasan_kmalloc+0xd4/0xd8
[   41.567204]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.571716]  kasan_bitops_generic+0xa0/0x1c8
[   41.575970]  kunit_try_run_case+0x170/0x3f0
[   41.580135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.585605]  kthread+0x328/0x630
[   41.588817]  ret_from_fork+0x10/0x20
[   41.592376] 
[   41.593853] The buggy address belongs to the object at ffff000800e200a0
[   41.593853]  which belongs to the cache kmalloc-16 of size 16
[   41.606180] The buggy address is located 8 bytes inside of
[   41.606180]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   41.618417] 
[   41.619897] The buggy address belongs to the physical page:
[   41.625452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   41.633437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.639946] page_type: f5(slab)
[   41.643084] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.650802] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.658523] page dumped because: kasan: bad access detected
[   41.664076] 
[   41.665551] Memory state around the buggy address:
[   41.670333]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.677535]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   41.684739] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.691940]                                   ^
[   41.696458]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.703662]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.710865] ==================================================================
[   41.981786] ==================================================================
[   41.988814] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   41.996971] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   42.004349] 
[   42.005832] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   42.005882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.005899] Hardware name: WinLink E850-96 board (DT)
[   42.005919] Call trace:
[   42.005936]  show_stack+0x20/0x38 (C)
[   42.005971]  dump_stack_lvl+0x8c/0xd0
[   42.006002]  print_report+0x118/0x608
[   42.006034]  kasan_report+0xdc/0x128
[   42.006066]  kasan_check_range+0x100/0x1a8
[   42.006100]  __kasan_check_write+0x20/0x30
[   42.006136]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   42.006170]  kasan_bitops_generic+0x110/0x1c8
[   42.006202]  kunit_try_run_case+0x170/0x3f0
[   42.006233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.006268]  kthread+0x328/0x630
[   42.006301]  ret_from_fork+0x10/0x20
[   42.006335] 
[   42.078740] Allocated by task 306:
[   42.082127]  kasan_save_stack+0x3c/0x68
[   42.085945]  kasan_save_track+0x20/0x40
[   42.089764]  kasan_save_alloc_info+0x40/0x58
[   42.094018]  __kasan_kmalloc+0xd4/0xd8
[   42.097750]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.102264]  kasan_bitops_generic+0xa0/0x1c8
[   42.106517]  kunit_try_run_case+0x170/0x3f0
[   42.110684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.116153]  kthread+0x328/0x630
[   42.119364]  ret_from_fork+0x10/0x20
[   42.122923] 
[   42.124400] The buggy address belongs to the object at ffff000800e200a0
[   42.124400]  which belongs to the cache kmalloc-16 of size 16
[   42.136728] The buggy address is located 8 bytes inside of
[   42.136728]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   42.148964] 
[   42.150442] The buggy address belongs to the physical page:
[   42.155999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   42.163985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.170493] page_type: f5(slab)
[   42.173625] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.181349] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.189070] page dumped because: kasan: bad access detected
[   42.194623] 
[   42.196098] Memory state around the buggy address:
[   42.200878]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.208082]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.215289] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.222488]                                   ^
[   42.227005]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.234210]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.241411] ==================================================================
[   43.843851] ==================================================================
[   43.850937] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.859095] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   43.866387] 
[   43.867868] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   43.867917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.867933] Hardware name: WinLink E850-96 board (DT)
[   43.867953] Call trace:
[   43.867964]  show_stack+0x20/0x38 (C)
[   43.867994]  dump_stack_lvl+0x8c/0xd0
[   43.868027]  print_report+0x118/0x608
[   43.868060]  kasan_report+0xdc/0x128
[   43.868090]  __asan_report_load8_noabort+0x20/0x30
[   43.868128]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.868163]  kasan_bitops_generic+0x110/0x1c8
[   43.868193]  kunit_try_run_case+0x170/0x3f0
[   43.868223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.868256]  kthread+0x328/0x630
[   43.868289]  ret_from_fork+0x10/0x20
[   43.868322] 
[   43.937392] Allocated by task 306:
[   43.940778]  kasan_save_stack+0x3c/0x68
[   43.944597]  kasan_save_track+0x20/0x40
[   43.948417]  kasan_save_alloc_info+0x40/0x58
[   43.952670]  __kasan_kmalloc+0xd4/0xd8
[   43.956403]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.960917]  kasan_bitops_generic+0xa0/0x1c8
[   43.965170]  kunit_try_run_case+0x170/0x3f0
[   43.969336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.974805]  kthread+0x328/0x630
[   43.978017]  ret_from_fork+0x10/0x20
[   43.981576] 
[   43.983051] The buggy address belongs to the object at ffff000800e200a0
[   43.983051]  which belongs to the cache kmalloc-16 of size 16
[   43.995380] The buggy address is located 8 bytes inside of
[   43.995380]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   44.007617] 
[   44.009093] The buggy address belongs to the physical page:
[   44.014651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   44.022635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.029144] page_type: f5(slab)
[   44.032278] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.040002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.047721] page dumped because: kasan: bad access detected
[   44.053276] 
[   44.054752] Memory state around the buggy address:
[   44.059530]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.066735]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.073939] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.081140]                                   ^
[   44.085658]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.092863]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.100064] ==================================================================
[   42.512257] ==================================================================
[   42.519363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.527518] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   42.534896] 
[   42.536380] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   42.536430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.536447] Hardware name: WinLink E850-96 board (DT)
[   42.536467] Call trace:
[   42.536482]  show_stack+0x20/0x38 (C)
[   42.536518]  dump_stack_lvl+0x8c/0xd0
[   42.536549]  print_report+0x118/0x608
[   42.536580]  kasan_report+0xdc/0x128
[   42.536610]  kasan_check_range+0x100/0x1a8
[   42.536644]  __kasan_check_write+0x20/0x30
[   42.536678]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.536711]  kasan_bitops_generic+0x110/0x1c8
[   42.536742]  kunit_try_run_case+0x170/0x3f0
[   42.536775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.536809]  kthread+0x328/0x630
[   42.536844]  ret_from_fork+0x10/0x20
[   42.536876] 
[   42.609287] Allocated by task 306:
[   42.612675]  kasan_save_stack+0x3c/0x68
[   42.616492]  kasan_save_track+0x20/0x40
[   42.620312]  kasan_save_alloc_info+0x40/0x58
[   42.624565]  __kasan_kmalloc+0xd4/0xd8
[   42.628298]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.632811]  kasan_bitops_generic+0xa0/0x1c8
[   42.637065]  kunit_try_run_case+0x170/0x3f0
[   42.641232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.646700]  kthread+0x328/0x630
[   42.649912]  ret_from_fork+0x10/0x20
[   42.653471] 
[   42.654948] The buggy address belongs to the object at ffff000800e200a0
[   42.654948]  which belongs to the cache kmalloc-16 of size 16
[   42.667276] The buggy address is located 8 bytes inside of
[   42.667276]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   42.679512] 
[   42.680988] The buggy address belongs to the physical page:
[   42.686546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   42.694531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.701041] page_type: f5(slab)
[   42.704176] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.711897] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.719617] page dumped because: kasan: bad access detected
[   42.725171] 
[   42.726646] Memory state around the buggy address:
[   42.731428]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.738630]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.745834] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.753035]                                   ^
[   42.757553]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.764758]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.771960] ==================================================================
[   42.248710] ==================================================================
[   42.255823] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.263980] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   42.271272] 
[   42.272754] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   42.272803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.272822] Hardware name: WinLink E850-96 board (DT)
[   42.272839] Call trace:
[   42.272853]  show_stack+0x20/0x38 (C)
[   42.272884]  dump_stack_lvl+0x8c/0xd0
[   42.272914]  print_report+0x118/0x608
[   42.272946]  kasan_report+0xdc/0x128
[   42.272978]  __asan_report_load8_noabort+0x20/0x30
[   42.273016]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.273049]  kasan_bitops_generic+0x110/0x1c8
[   42.273080]  kunit_try_run_case+0x170/0x3f0
[   42.273110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.273144]  kthread+0x328/0x630
[   42.273176]  ret_from_fork+0x10/0x20
[   42.273205] 
[   42.342277] Allocated by task 306:
[   42.345665]  kasan_save_stack+0x3c/0x68
[   42.349483]  kasan_save_track+0x20/0x40
[   42.353302]  kasan_save_alloc_info+0x40/0x58
[   42.357555]  __kasan_kmalloc+0xd4/0xd8
[   42.361288]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.365801]  kasan_bitops_generic+0xa0/0x1c8
[   42.370055]  kunit_try_run_case+0x170/0x3f0
[   42.374222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.379690]  kthread+0x328/0x630
[   42.382902]  ret_from_fork+0x10/0x20
[   42.386461] 
[   42.387937] The buggy address belongs to the object at ffff000800e200a0
[   42.387937]  which belongs to the cache kmalloc-16 of size 16
[   42.400265] The buggy address is located 8 bytes inside of
[   42.400265]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   42.412502] 
[   42.413978] The buggy address belongs to the physical page:
[   42.419537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   42.427521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.434031] page_type: f5(slab)
[   42.437163] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.444887] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.452607] page dumped because: kasan: bad access detected
[   42.458161] 
[   42.459637] Memory state around the buggy address:
[   42.464418]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.471620]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.478824] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.486025]                                   ^
[   42.490543]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.497748]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.504949] ==================================================================
[   42.779268] ==================================================================
[   42.786373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.794528] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   42.801906] 
[   42.803389] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   42.803440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.803456] Hardware name: WinLink E850-96 board (DT)
[   42.803477] Call trace:
[   42.803492]  show_stack+0x20/0x38 (C)
[   42.803525]  dump_stack_lvl+0x8c/0xd0
[   42.803559]  print_report+0x118/0x608
[   42.803589]  kasan_report+0xdc/0x128
[   42.803618]  kasan_check_range+0x100/0x1a8
[   42.803651]  __kasan_check_write+0x20/0x30
[   42.803684]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.803718]  kasan_bitops_generic+0x110/0x1c8
[   42.803748]  kunit_try_run_case+0x170/0x3f0
[   42.803780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.803815]  kthread+0x328/0x630
[   42.803845]  ret_from_fork+0x10/0x20
[   42.803876] 
[   42.876298] Allocated by task 306:
[   42.879685]  kasan_save_stack+0x3c/0x68
[   42.883502]  kasan_save_track+0x20/0x40
[   42.887321]  kasan_save_alloc_info+0x40/0x58
[   42.891575]  __kasan_kmalloc+0xd4/0xd8
[   42.895307]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.899821]  kasan_bitops_generic+0xa0/0x1c8
[   42.904075]  kunit_try_run_case+0x170/0x3f0
[   42.908241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.913710]  kthread+0x328/0x630
[   42.916922]  ret_from_fork+0x10/0x20
[   42.920480] 
[   42.921958] The buggy address belongs to the object at ffff000800e200a0
[   42.921958]  which belongs to the cache kmalloc-16 of size 16
[   42.934286] The buggy address is located 8 bytes inside of
[   42.934286]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   42.946522] 
[   42.947998] The buggy address belongs to the physical page:
[   42.953557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   42.961539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.968051] page_type: f5(slab)
[   42.971184] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.978907] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.986626] page dumped because: kasan: bad access detected
[   42.992181] 
[   42.993657] Memory state around the buggy address:
[   42.998436]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.005639]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.012844] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.020045]                                   ^
[   43.024563]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.031768]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.038969] ==================================================================
[   43.576898] ==================================================================
[   43.583927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.592085] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   43.599464] 
[   43.600945] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   43.600997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.601012] Hardware name: WinLink E850-96 board (DT)
[   43.601031] Call trace:
[   43.601044]  show_stack+0x20/0x38 (C)
[   43.601074]  dump_stack_lvl+0x8c/0xd0
[   43.601107]  print_report+0x118/0x608
[   43.601138]  kasan_report+0xdc/0x128
[   43.601170]  kasan_check_range+0x100/0x1a8
[   43.601204]  __kasan_check_write+0x20/0x30
[   43.601239]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.601273]  kasan_bitops_generic+0x110/0x1c8
[   43.601302]  kunit_try_run_case+0x170/0x3f0
[   43.601330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.601365]  kthread+0x328/0x630
[   43.601396]  ret_from_fork+0x10/0x20
[   43.601427] 
[   43.673854] Allocated by task 306:
[   43.677242]  kasan_save_stack+0x3c/0x68
[   43.681060]  kasan_save_track+0x20/0x40
[   43.684879]  kasan_save_alloc_info+0x40/0x58
[   43.689132]  __kasan_kmalloc+0xd4/0xd8
[   43.692865]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.697379]  kasan_bitops_generic+0xa0/0x1c8
[   43.701632]  kunit_try_run_case+0x170/0x3f0
[   43.705799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.711267]  kthread+0x328/0x630
[   43.714479]  ret_from_fork+0x10/0x20
[   43.718038] 
[   43.719515] The buggy address belongs to the object at ffff000800e200a0
[   43.719515]  which belongs to the cache kmalloc-16 of size 16
[   43.731842] The buggy address is located 8 bytes inside of
[   43.731842]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   43.744080] 
[   43.745555] The buggy address belongs to the physical page:
[   43.751114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   43.759097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.765608] page_type: f5(slab)
[   43.768740] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.776464] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.784183] page dumped because: kasan: bad access detected
[   43.789739] 
[   43.791214] Memory state around the buggy address:
[   43.795994]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.803197]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.810402] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.817603]                                   ^
[   43.822120]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.829325]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.836526] ==================================================================
[   43.309874] ==================================================================
[   43.316918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.325076] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   43.332454] 
[   43.333935] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   43.333985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.334002] Hardware name: WinLink E850-96 board (DT)
[   43.334017] Call trace:
[   43.334031]  show_stack+0x20/0x38 (C)
[   43.334063]  dump_stack_lvl+0x8c/0xd0
[   43.334092]  print_report+0x118/0x608
[   43.334123]  kasan_report+0xdc/0x128
[   43.334151]  kasan_check_range+0x100/0x1a8
[   43.334185]  __kasan_check_write+0x20/0x30
[   43.334220]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.334252]  kasan_bitops_generic+0x110/0x1c8
[   43.334283]  kunit_try_run_case+0x170/0x3f0
[   43.334311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.334346]  kthread+0x328/0x630
[   43.334379]  ret_from_fork+0x10/0x20
[   43.334409] 
[   43.406845] Allocated by task 306:
[   43.410232]  kasan_save_stack+0x3c/0x68
[   43.414050]  kasan_save_track+0x20/0x40
[   43.417869]  kasan_save_alloc_info+0x40/0x58
[   43.422122]  __kasan_kmalloc+0xd4/0xd8
[   43.425855]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.430369]  kasan_bitops_generic+0xa0/0x1c8
[   43.434622]  kunit_try_run_case+0x170/0x3f0
[   43.438789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.444258]  kthread+0x328/0x630
[   43.447469]  ret_from_fork+0x10/0x20
[   43.451028] 
[   43.452504] The buggy address belongs to the object at ffff000800e200a0
[   43.452504]  which belongs to the cache kmalloc-16 of size 16
[   43.464830] The buggy address is located 8 bytes inside of
[   43.464830]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   43.477070] 
[   43.478545] The buggy address belongs to the physical page:
[   43.484103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   43.492087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.498598] page_type: f5(slab)
[   43.501730] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.509454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.517173] page dumped because: kasan: bad access detected
[   43.522728] 
[   43.524204] Memory state around the buggy address:
[   43.528982]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.536187]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.543392] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.550593]                                   ^
[   43.555110]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.562315]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.569516] ==================================================================
[   41.718171] ==================================================================
[   41.725277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.733432] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   41.740724] 
[   41.742211] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   41.742264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.742280] Hardware name: WinLink E850-96 board (DT)
[   41.742300] Call trace:
[   41.742316]  show_stack+0x20/0x38 (C)
[   41.742348]  dump_stack_lvl+0x8c/0xd0
[   41.742380]  print_report+0x118/0x608
[   41.742414]  kasan_report+0xdc/0x128
[   41.742445]  __asan_report_load8_noabort+0x20/0x30
[   41.742483]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.742516]  kasan_bitops_generic+0x110/0x1c8
[   41.742548]  kunit_try_run_case+0x170/0x3f0
[   41.742580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.742613]  kthread+0x328/0x630
[   41.742644]  ret_from_fork+0x10/0x20
[   41.742677] 
[   41.811730] Allocated by task 306:
[   41.815117]  kasan_save_stack+0x3c/0x68
[   41.818935]  kasan_save_track+0x20/0x40
[   41.822754]  kasan_save_alloc_info+0x40/0x58
[   41.827008]  __kasan_kmalloc+0xd4/0xd8
[   41.830740]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.835254]  kasan_bitops_generic+0xa0/0x1c8
[   41.839507]  kunit_try_run_case+0x170/0x3f0
[   41.843674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.849143]  kthread+0x328/0x630
[   41.852354]  ret_from_fork+0x10/0x20
[   41.855914] 
[   41.857391] The buggy address belongs to the object at ffff000800e200a0
[   41.857391]  which belongs to the cache kmalloc-16 of size 16
[   41.869718] The buggy address is located 8 bytes inside of
[   41.869718]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   41.881955] 
[   41.883431] The buggy address belongs to the physical page:
[   41.888989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   41.896973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.903483] page_type: f5(slab)
[   41.906615] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.914339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.922058] page dumped because: kasan: bad access detected
[   41.927613] 
[   41.929089] Memory state around the buggy address:
[   41.933869]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.941072]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   41.948277] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.955478]                                   ^
[   41.959995]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.967200]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.974402] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-strnlen KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure
[   41.147017] ==================================================================
[   41.154102] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   41.160091] Read of size 1 at addr ffff0008065c9310 by task kunit_try_catch/304
[   41.167382] 
[   41.168865] CPU: 6 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   41.168914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.168930] Hardware name: WinLink E850-96 board (DT)
[   41.168951] Call trace:
[   41.168961]  show_stack+0x20/0x38 (C)
[   41.168996]  dump_stack_lvl+0x8c/0xd0
[   41.169029]  print_report+0x118/0x608
[   41.169064]  kasan_report+0xdc/0x128
[   41.169096]  __asan_report_load1_noabort+0x20/0x30
[   41.169131]  strnlen+0x80/0x88
[   41.169161]  kasan_strings+0x478/0xb00
[   41.169189]  kunit_try_run_case+0x170/0x3f0
[   41.169221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.169258]  kthread+0x328/0x630
[   41.169295]  ret_from_fork+0x10/0x20
[   41.169328] 
[   41.235523] Allocated by task 304:
[   41.238909]  kasan_save_stack+0x3c/0x68
[   41.242728]  kasan_save_track+0x20/0x40
[   41.246548]  kasan_save_alloc_info+0x40/0x58
[   41.250801]  __kasan_kmalloc+0xd4/0xd8
[   41.254534]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.259047]  kasan_strings+0xc8/0xb00
[   41.262693]  kunit_try_run_case+0x170/0x3f0
[   41.266860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.272328]  kthread+0x328/0x630
[   41.275540]  ret_from_fork+0x10/0x20
[   41.279099] 
[   41.280574] Freed by task 304:
[   41.283614]  kasan_save_stack+0x3c/0x68
[   41.287433]  kasan_save_track+0x20/0x40
[   41.291253]  kasan_save_free_info+0x4c/0x78
[   41.295418]  __kasan_slab_free+0x6c/0x98
[   41.299325]  kfree+0x214/0x3c8
[   41.302362]  kasan_strings+0x24c/0xb00
[   41.306095]  kunit_try_run_case+0x170/0x3f0
[   41.310262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.315730]  kthread+0x328/0x630
[   41.318942]  ret_from_fork+0x10/0x20
[   41.322501] 
[   41.323977] The buggy address belongs to the object at ffff0008065c9300
[   41.323977]  which belongs to the cache kmalloc-32 of size 32
[   41.336305] The buggy address is located 16 bytes inside of
[   41.336305]  freed 32-byte region [ffff0008065c9300, ffff0008065c9320)
[   41.348369] 
[   41.349845] The buggy address belongs to the physical page:
[   41.355403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865c9
[   41.363387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.369898] page_type: f5(slab)
[   41.373031] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   41.380754] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   41.388474] page dumped because: kasan: bad access detected
[   41.394028] 
[   41.395503] Memory state around the buggy address:
[   41.400283]  ffff0008065c9200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.407486]  ffff0008065c9280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   41.414691] >ffff0008065c9300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.421892]                          ^
[   41.425628]  ffff0008065c9380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   41.432833]  ffff0008065c9400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.440034] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-strlen KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure
[   40.846946] ==================================================================
[   40.853935] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   40.859835] Read of size 1 at addr ffff0008065c9310 by task kunit_try_catch/304
[   40.867126] 
[   40.868611] CPU: 6 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   40.868666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.868684] Hardware name: WinLink E850-96 board (DT)
[   40.868707] Call trace:
[   40.868722]  show_stack+0x20/0x38 (C)
[   40.868759]  dump_stack_lvl+0x8c/0xd0
[   40.868792]  print_report+0x118/0x608
[   40.868825]  kasan_report+0xdc/0x128
[   40.868856]  __asan_report_load1_noabort+0x20/0x30
[   40.868894]  strlen+0xa8/0xb0
[   40.868928]  kasan_strings+0x418/0xb00
[   40.868957]  kunit_try_run_case+0x170/0x3f0
[   40.868988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.869026]  kthread+0x328/0x630
[   40.869061]  ret_from_fork+0x10/0x20
[   40.869095] 
[   40.935180] Allocated by task 304:
[   40.938568]  kasan_save_stack+0x3c/0x68
[   40.942386]  kasan_save_track+0x20/0x40
[   40.946205]  kasan_save_alloc_info+0x40/0x58
[   40.950458]  __kasan_kmalloc+0xd4/0xd8
[   40.954191]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.958704]  kasan_strings+0xc8/0xb00
[   40.962350]  kunit_try_run_case+0x170/0x3f0
[   40.966517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.971986]  kthread+0x328/0x630
[   40.975197]  ret_from_fork+0x10/0x20
[   40.978757] 
[   40.980234] Freed by task 304:
[   40.983273]  kasan_save_stack+0x3c/0x68
[   40.987090]  kasan_save_track+0x20/0x40
[   40.990911]  kasan_save_free_info+0x4c/0x78
[   40.995076]  __kasan_slab_free+0x6c/0x98
[   40.998982]  kfree+0x214/0x3c8
[   41.002020]  kasan_strings+0x24c/0xb00
[   41.005753]  kunit_try_run_case+0x170/0x3f0
[   41.009919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.015388]  kthread+0x328/0x630
[   41.018599]  ret_from_fork+0x10/0x20
[   41.022159] 
[   41.023636] The buggy address belongs to the object at ffff0008065c9300
[   41.023636]  which belongs to the cache kmalloc-32 of size 32
[   41.035963] The buggy address is located 16 bytes inside of
[   41.035963]  freed 32-byte region [ffff0008065c9300, ffff0008065c9320)
[   41.048026] 
[   41.049504] The buggy address belongs to the physical page:
[   41.055061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865c9
[   41.063045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.069555] page_type: f5(slab)
[   41.072691] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   41.080411] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   41.088130] page dumped because: kasan: bad access detected
[   41.093685] 
[   41.095160] Memory state around the buggy address:
[   41.099944]  ffff0008065c9200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.107144]  ffff0008065c9280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   41.114348] >ffff0008065c9300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.121549]                          ^
[   41.125285]  ffff0008065c9380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   41.132491]  ffff0008065c9400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.139692] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kasan_strings KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure
[   40.548846] ==================================================================
[   40.555938] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   40.562617] Read of size 1 at addr ffff0008065c9310 by task kunit_try_catch/304
[   40.569909] 
[   40.571393] CPU: 6 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   40.571449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.571469] Hardware name: WinLink E850-96 board (DT)
[   40.571490] Call trace:
[   40.571504]  show_stack+0x20/0x38 (C)
[   40.571542]  dump_stack_lvl+0x8c/0xd0
[   40.571573]  print_report+0x118/0x608
[   40.571605]  kasan_report+0xdc/0x128
[   40.571635]  __asan_report_load1_noabort+0x20/0x30
[   40.571672]  kasan_strings+0x95c/0xb00
[   40.571700]  kunit_try_run_case+0x170/0x3f0
[   40.571732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.571768]  kthread+0x328/0x630
[   40.571803]  ret_from_fork+0x10/0x20
[   40.571838] 
[   40.635011] Allocated by task 304:
[   40.638399]  kasan_save_stack+0x3c/0x68
[   40.642217]  kasan_save_track+0x20/0x40
[   40.646036]  kasan_save_alloc_info+0x40/0x58
[   40.650289]  __kasan_kmalloc+0xd4/0xd8
[   40.654022]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.658536]  kasan_strings+0xc8/0xb00
[   40.662181]  kunit_try_run_case+0x170/0x3f0
[   40.666348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.671817]  kthread+0x328/0x630
[   40.675028]  ret_from_fork+0x10/0x20
[   40.678587] 
[   40.680063] Freed by task 304:
[   40.683103]  kasan_save_stack+0x3c/0x68
[   40.686920]  kasan_save_track+0x20/0x40
[   40.690740]  kasan_save_free_info+0x4c/0x78
[   40.694907]  __kasan_slab_free+0x6c/0x98
[   40.698813]  kfree+0x214/0x3c8
[   40.701851]  kasan_strings+0x24c/0xb00
[   40.705583]  kunit_try_run_case+0x170/0x3f0
[   40.709750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.715219]  kthread+0x328/0x630
[   40.718431]  ret_from_fork+0x10/0x20
[   40.721990] 
[   40.723465] The buggy address belongs to the object at ffff0008065c9300
[   40.723465]  which belongs to the cache kmalloc-32 of size 32
[   40.735793] The buggy address is located 16 bytes inside of
[   40.735793]  freed 32-byte region [ffff0008065c9300, ffff0008065c9320)
[   40.747857] 
[   40.749336] The buggy address belongs to the physical page:
[   40.754892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865c9
[   40.762874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.769385] page_type: f5(slab)
[   40.772521] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.780242] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.787962] page dumped because: kasan: bad access detected
[   40.793516] 
[   40.794992] Memory state around the buggy address:
[   40.799772]  ffff0008065c9200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.806975]  ffff0008065c9280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   40.814181] >ffff0008065c9300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.821380]                          ^
[   40.825117]  ffff0008065c9380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.832321]  ffff0008065c9400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.839525] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-strcmp KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure
[   40.232043] ==================================================================
[   40.255770] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   40.261668] Read of size 1 at addr ffff0008065c9310 by task kunit_try_catch/304
[   40.268959] 
[   40.270446] CPU: 6 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   40.270504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.270521] Hardware name: WinLink E850-96 board (DT)
[   40.270545] Call trace:
[   40.270559]  show_stack+0x20/0x38 (C)
[   40.270598]  dump_stack_lvl+0x8c/0xd0
[   40.270631]  print_report+0x118/0x608
[   40.270667]  kasan_report+0xdc/0x128
[   40.270698]  __asan_report_load1_noabort+0x20/0x30
[   40.270739]  strcmp+0xc0/0xc8
[   40.270776]  kasan_strings+0x340/0xb00
[   40.270807]  kunit_try_run_case+0x170/0x3f0
[   40.270841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.270877]  kthread+0x328/0x630
[   40.270916]  ret_from_fork+0x10/0x20
[   40.270953] 
[   40.337014] Allocated by task 304:
[   40.340402]  kasan_save_stack+0x3c/0x68
[   40.344218]  kasan_save_track+0x20/0x40
[   40.348037]  kasan_save_alloc_info+0x40/0x58
[   40.352290]  __kasan_kmalloc+0xd4/0xd8
[   40.356024]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.360537]  kasan_strings+0xc8/0xb00
[   40.364182]  kunit_try_run_case+0x170/0x3f0
[   40.368349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.373817]  kthread+0x328/0x630
[   40.377030]  ret_from_fork+0x10/0x20
[   40.380588] 
[   40.382065] Freed by task 304:
[   40.385105]  kasan_save_stack+0x3c/0x68
[   40.388921]  kasan_save_track+0x20/0x40
[   40.392742]  kasan_save_free_info+0x4c/0x78
[   40.396907]  __kasan_slab_free+0x6c/0x98
[   40.400814]  kfree+0x214/0x3c8
[   40.403852]  kasan_strings+0x24c/0xb00
[   40.407585]  kunit_try_run_case+0x170/0x3f0
[   40.411751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.417220]  kthread+0x328/0x630
[   40.420432]  ret_from_fork+0x10/0x20
[   40.423990] 
[   40.425468] The buggy address belongs to the object at ffff0008065c9300
[   40.425468]  which belongs to the cache kmalloc-32 of size 32
[   40.437794] The buggy address is located 16 bytes inside of
[   40.437794]  freed 32-byte region [ffff0008065c9300, ffff0008065c9320)
[   40.449858] 
[   40.451337] The buggy address belongs to the physical page:
[   40.456893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865c9
[   40.464879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.471387] page_type: f5(slab)
[   40.474525] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.482243] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.489961] page dumped because: kasan: bad access detected
[   40.495517] 
[   40.496993] Memory state around the buggy address:
[   40.501776]  ffff0008065c9200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.508976]  ffff0008065c9280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   40.516180] >ffff0008065c9300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.523381]                          ^
[   40.527118]  ffff0008065c9380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.534323]  ffff0008065c9400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.541525] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-memcmp KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
[   39.932496] ==================================================================
[   39.942666] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   39.948652] Read of size 1 at addr ffff00080691e118 by task kunit_try_catch/302
[   39.955944] 
[   39.957430] CPU: 5 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   39.957492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.957511] Hardware name: WinLink E850-96 board (DT)
[   39.957535] Call trace:
[   39.957553]  show_stack+0x20/0x38 (C)
[   39.957590]  dump_stack_lvl+0x8c/0xd0
[   39.957627]  print_report+0x118/0x608
[   39.957666]  kasan_report+0xdc/0x128
[   39.957699]  __asan_report_load1_noabort+0x20/0x30
[   39.957739]  memcmp+0x198/0x1d8
[   39.957774]  kasan_memcmp+0x16c/0x300
[   39.957804]  kunit_try_run_case+0x170/0x3f0
[   39.957837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.957875]  kthread+0x328/0x630
[   39.957913]  ret_from_fork+0x10/0x20
[   39.957949] 
[   40.024084] Allocated by task 302:
[   40.027472]  kasan_save_stack+0x3c/0x68
[   40.031288]  kasan_save_track+0x20/0x40
[   40.035108]  kasan_save_alloc_info+0x40/0x58
[   40.039361]  __kasan_kmalloc+0xd4/0xd8
[   40.043094]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.047607]  kasan_memcmp+0xbc/0x300
[   40.051166]  kunit_try_run_case+0x170/0x3f0
[   40.055333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.060801]  kthread+0x328/0x630
[   40.064013]  ret_from_fork+0x10/0x20
[   40.067572] 
[   40.069049] The buggy address belongs to the object at ffff00080691e100
[   40.069049]  which belongs to the cache kmalloc-32 of size 32
[   40.081377] The buggy address is located 0 bytes to the right of
[   40.081377]  allocated 24-byte region [ffff00080691e100, ffff00080691e118)
[   40.094221] 
[   40.095700] The buggy address belongs to the physical page:
[   40.101256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88691e
[   40.109240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.115750] page_type: f5(slab)
[   40.118888] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.126606] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.134326] page dumped because: kasan: bad access detected
[   40.139880] 
[   40.141356] Memory state around the buggy address:
[   40.146140]  ffff00080691e000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.153339]  ffff00080691e080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.160545] >ffff00080691e100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.167744]                             ^
[   40.171741]  ffff00080691e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.178947]  ffff00080691e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.186148] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right KNOWN ISSUE - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
[   39.698461] ==================================================================
[   39.708207] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   39.715757] Read of size 1 at addr ffff800089497b4a by task kunit_try_catch/298
[   39.723046] 
[   39.724532] CPU: 7 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   39.724591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.724609] Hardware name: WinLink E850-96 board (DT)
[   39.724630] Call trace:
[   39.724645]  show_stack+0x20/0x38 (C)
[   39.724684]  dump_stack_lvl+0x8c/0xd0
[   39.724718]  print_report+0x310/0x608
[   39.724754]  kasan_report+0xdc/0x128
[   39.724786]  __asan_report_load1_noabort+0x20/0x30
[   39.724824]  kasan_alloca_oob_right+0x2dc/0x340
[   39.724854]  kunit_try_run_case+0x170/0x3f0
[   39.724888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.724931]  kthread+0x328/0x630
[   39.724967]  ret_from_fork+0x10/0x20
[   39.725001] 
[   39.788935] The buggy address belongs to stack of task kunit_try_catch/298
[   39.795812] 
[   39.797268] The buggy address belongs to the virtual mapping at
[   39.797268]  [ffff800089490000, ffff800089499000) created by:
[   39.797268]  kernel_clone+0x150/0x7a8
[   39.812542] 
[   39.814022] The buggy address belongs to the physical page:
[   39.819577] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8869a2
[   39.827562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.834084] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.841801] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.849520] page dumped because: kasan: bad access detected
[   39.855075] 
[   39.856551] Memory state around the buggy address:
[   39.861332]  ffff800089497a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.868534]  ffff800089497a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.875741] >ffff800089497b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   39.882939]                                               ^
[   39.888499]  ffff800089497b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   39.895704]  ffff800089497c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.902907] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left KNOWN ISSUE - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
[   39.485499] ==================================================================
[   39.494580] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   39.502045] Read of size 1 at addr ffff800089477b5f by task kunit_try_catch/296
[   39.509335] 
[   39.510820] CPU: 6 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   39.510880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.510898] Hardware name: WinLink E850-96 board (DT)
[   39.510923] Call trace:
[   39.510938]  show_stack+0x20/0x38 (C)
[   39.510976]  dump_stack_lvl+0x8c/0xd0
[   39.511011]  print_report+0x310/0x608
[   39.511048]  kasan_report+0xdc/0x128
[   39.511080]  __asan_report_load1_noabort+0x20/0x30
[   39.511120]  kasan_alloca_oob_left+0x2b8/0x310
[   39.511153]  kunit_try_run_case+0x170/0x3f0
[   39.511188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.511227]  kthread+0x328/0x630
[   39.511264]  ret_from_fork+0x10/0x20
[   39.511300] 
[   39.575136] The buggy address belongs to stack of task kunit_try_catch/296
[   39.582013] 
[   39.583470] The buggy address belongs to the virtual mapping at
[   39.583470]  [ffff800089470000, ffff800089479000) created by:
[   39.583470]  kernel_clone+0x150/0x7a8
[   39.598742] 
[   39.600221] The buggy address belongs to the physical page:
[   39.605777] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88698d
[   39.613762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.620283] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.628002] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.635721] page dumped because: kasan: bad access detected
[   39.641276] 
[   39.642752] Memory state around the buggy address:
[   39.647535]  ffff800089477a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.654735]  ffff800089477a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.661939] >ffff800089477b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   39.669141]                                                     ^
[   39.675221]  ffff800089477b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   39.682425]  ffff800089477c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.689629] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob KNOWN ISSUE - log-parser-test/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
[   39.242398] ==================================================================
[   39.256824] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   39.263679] Read of size 1 at addr ffff800089457c2a by task kunit_try_catch/294
[   39.270969] 
[   39.272457] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   39.272522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.272541] Hardware name: WinLink E850-96 board (DT)
[   39.272565] Call trace:
[   39.272580]  show_stack+0x20/0x38 (C)
[   39.272620]  dump_stack_lvl+0x8c/0xd0
[   39.272657]  print_report+0x310/0x608
[   39.272691]  kasan_report+0xdc/0x128
[   39.272723]  __asan_report_load1_noabort+0x20/0x30
[   39.272762]  kasan_stack_oob+0x238/0x270
[   39.272799]  kunit_try_run_case+0x170/0x3f0
[   39.272831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.272868]  kthread+0x328/0x630
[   39.272903]  ret_from_fork+0x10/0x20
[   39.272939] 
[   39.336252] The buggy address belongs to stack of task kunit_try_catch/294
[   39.343105]  and is located at offset 138 in frame:
[   39.347965]  kasan_stack_oob+0x0/0x270
[   39.351703] 
[   39.353173] This frame has 4 objects:
[   39.356823]  [48, 49) '__assertion'
[   39.356846]  [64, 72) 'array'
[   39.360293]  [96, 112) '__assertion'
[   39.363246]  [128, 138) 'stack_array'
[   39.366801] 
[   39.371928] The buggy address belongs to the virtual mapping at
[   39.371928]  [ffff800089450000, ffff800089459000) created by:
[   39.371928]  kernel_clone+0x150/0x7a8
[   39.387200] 
[   39.388681] The buggy address belongs to the physical page:
[   39.394235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886979
[   39.402221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.408743] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.416460] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.424179] page dumped because: kasan: bad access detected
[   39.429734] 
[   39.431210] Memory state around the buggy address:
[   39.435992]  ffff800089457b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.443193]  ffff800089457b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   39.450399] >ffff800089457c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   39.457599]                                   ^
[   39.462116]  ffff800089457c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   39.469321]  ffff800089457d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.476524] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right KNOWN ISSUE - log-parser-test/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
[   39.022769] ==================================================================
[   39.033391] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   39.040941] Read of size 1 at addr ffff800087b405cd by task kunit_try_catch/290
[   39.048232] 
[   39.049717] CPU: 7 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   39.049779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.049799] Hardware name: WinLink E850-96 board (DT)
[   39.049824] Call trace:
[   39.049840]  show_stack+0x20/0x38 (C)
[   39.049879]  dump_stack_lvl+0x8c/0xd0
[   39.049913]  print_report+0x310/0x608
[   39.049946]  kasan_report+0xdc/0x128
[   39.049978]  __asan_report_load1_noabort+0x20/0x30
[   39.050016]  kasan_global_oob_right+0x230/0x270
[   39.050052]  kunit_try_run_case+0x170/0x3f0
[   39.050086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.050124]  kthread+0x328/0x630
[   39.050160]  ret_from_fork+0x10/0x20
[   39.050194] 
[   39.114116] The buggy address belongs to the variable:
[   39.119235]  global_array+0xd/0x40
[   39.122621] 
[   39.124111] The buggy address belongs to the virtual mapping at
[   39.124111]  [ffff800085cf0000, ffff800087c01000) created by:
[   39.124111]  paging_init+0x66c/0x7d0
[   39.139287] 
[   39.140767] The buggy address belongs to the physical page:
[   39.146323] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87b40
[   39.154220] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   39.161524] raw: 03fffe0000002000 fffffdffc01ed008 fffffdffc01ed008 0000000000000000
[   39.169242] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.176960] page dumped because: kasan: bad access detected
[   39.182516] 
[   39.183991] Memory state around the buggy address:
[   39.188775]  ffff800087b40480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.195974]  ffff800087b40500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.203181] >ffff800087b40580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   39.210380]                                               ^
[   39.215941]  ffff800087b40600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   39.223144]  ffff800087b40680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   39.230347] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper KNOWN ISSUE - log-parser-test/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
[   38.782600] ==================================================================
[   38.792597] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.800579] Free of addr ffff0008034a0001 by task kunit_try_catch/288
[   38.807002] 
[   38.808490] CPU: 6 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   38.808551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.808569] Hardware name: WinLink E850-96 board (DT)
[   38.808591] Call trace:
[   38.808608]  show_stack+0x20/0x38 (C)
[   38.808645]  dump_stack_lvl+0x8c/0xd0
[   38.808678]  print_report+0x118/0x608
[   38.808711]  kasan_report_invalid_free+0xc0/0xe8
[   38.808748]  __kasan_mempool_poison_object+0xfc/0x150
[   38.808787]  mempool_free+0x28c/0x328
[   38.808824]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.808860]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   38.808894]  kunit_try_run_case+0x170/0x3f0
[   38.808927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.808965]  kthread+0x328/0x630
[   38.809001]  ret_from_fork+0x10/0x20
[   38.809035] 
[   38.884433] The buggy address belongs to the physical page:
[   38.889989] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834a0
[   38.897973] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.905612] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.912556] page_type: f8(unknown)
[   38.915954] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.923672] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.931398] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.939210] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.947023] head: 0bfffe0000000002 fffffdffe00d2801 00000000ffffffff 00000000ffffffff
[   38.954835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.962641] page dumped because: kasan: bad access detected
[   38.968196] 
[   38.969672] Memory state around the buggy address:
[   38.974455]  ffff00080349ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.981654]  ffff00080349ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.988860] >ffff0008034a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.996060]                    ^
[   38.999276]  ffff0008034a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.006481]  ffff0008034a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.013683] ==================================================================
[   38.455485] ==================================================================
[   38.465779] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.473759] Free of addr ffff000801f1cb01 by task kunit_try_catch/286
[   38.480184] 
[   38.481670] CPU: 7 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   38.481727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.481744] Hardware name: WinLink E850-96 board (DT)
[   38.481767] Call trace:
[   38.481780]  show_stack+0x20/0x38 (C)
[   38.481820]  dump_stack_lvl+0x8c/0xd0
[   38.481855]  print_report+0x118/0x608
[   38.481888]  kasan_report_invalid_free+0xc0/0xe8
[   38.481922]  check_slab_allocation+0xfc/0x108
[   38.481953]  __kasan_mempool_poison_object+0x78/0x150
[   38.481989]  mempool_free+0x28c/0x328
[   38.482027]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.482060]  mempool_kmalloc_invalid_free+0xc0/0x118
[   38.482089]  kunit_try_run_case+0x170/0x3f0
[   38.482123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.482157]  kthread+0x328/0x630
[   38.482191]  ret_from_fork+0x10/0x20
[   38.482226] 
[   38.561433] Allocated by task 286:
[   38.564821]  kasan_save_stack+0x3c/0x68
[   38.568636]  kasan_save_track+0x20/0x40
[   38.572455]  kasan_save_alloc_info+0x40/0x58
[   38.576709]  __kasan_mempool_unpoison_object+0x11c/0x180
[   38.582004]  remove_element+0x130/0x1f8
[   38.585824]  mempool_alloc_preallocated+0x58/0xc0
[   38.590511]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   38.596067]  mempool_kmalloc_invalid_free+0xc0/0x118
[   38.601014]  kunit_try_run_case+0x170/0x3f0
[   38.605181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.610649]  kthread+0x328/0x630
[   38.613861]  ret_from_fork+0x10/0x20
[   38.617420] 
[   38.618897] The buggy address belongs to the object at ffff000801f1cb00
[   38.618897]  which belongs to the cache kmalloc-128 of size 128
[   38.631398] The buggy address is located 1 bytes inside of
[   38.631398]  128-byte region [ffff000801f1cb00, ffff000801f1cb80)
[   38.642941] 
[   38.644420] The buggy address belongs to the physical page:
[   38.649976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c
[   38.657959] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.665600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.672543] page_type: f5(slab)
[   38.675679] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   38.683398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.691124] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   38.698936] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.706749] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff
[   38.714561] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   38.722367] page dumped because: kasan: bad access detected
[   38.727922] 
[   38.729397] Memory state around the buggy address:
[   38.734179]  ffff000801f1ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.741381]  ffff000801f1ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.748587] >ffff000801f1cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.755786]                    ^
[   38.759002]  ffff000801f1cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.766208]  ffff000801f1cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.773409] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free KNOWN ISSUE - log-parser-test/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
[   34.050991] ==================================================================
[   34.051980] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   34.058923] Free of addr ffff00080241c001 by task kunit_try_catch/256
[   34.065346] 
[   34.066833] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   34.066893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.066911] Hardware name: WinLink E850-96 board (DT)
[   34.066934] Call trace:
[   34.066948]  show_stack+0x20/0x38 (C)
[   34.066988]  dump_stack_lvl+0x8c/0xd0
[   34.067020]  print_report+0x118/0x608
[   34.067054]  kasan_report_invalid_free+0xc0/0xe8
[   34.067088]  check_slab_allocation+0xfc/0x108
[   34.067123]  __kasan_slab_pre_free+0x2c/0x48
[   34.067154]  kmem_cache_free+0xf0/0x470
[   34.067185]  kmem_cache_invalid_free+0x184/0x3c8
[   34.067215]  kunit_try_run_case+0x170/0x3f0
[   34.067249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.067284]  kthread+0x328/0x630
[   34.067320]  ret_from_fork+0x10/0x20
[   34.067354] 
[   34.139999] Allocated by task 256:
[   34.143386]  kasan_save_stack+0x3c/0x68
[   34.147203]  kasan_save_track+0x20/0x40
[   34.151022]  kasan_save_alloc_info+0x40/0x58
[   34.155274]  __kasan_slab_alloc+0xa8/0xb0
[   34.159267]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   34.163868]  kmem_cache_invalid_free+0x12c/0x3c8
[   34.168468]  kunit_try_run_case+0x170/0x3f0
[   34.172635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.178104]  kthread+0x328/0x630
[   34.181315]  ret_from_fork+0x10/0x20
[   34.184874] 
[   34.186353] The buggy address belongs to the object at ffff00080241c000
[   34.186353]  which belongs to the cache test_cache of size 200
[   34.198765] The buggy address is located 1 bytes inside of
[   34.198765]  200-byte region [ffff00080241c000, ffff00080241c0c8)
[   34.210308] 
[   34.211787] The buggy address belongs to the physical page:
[   34.217343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88241c
[   34.225327] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.232966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.239910] page_type: f5(slab)
[   34.243048] raw: 0bfffe0000000040 ffff000802403180 dead000000000122 0000000000000000
[   34.250766] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.258492] head: 0bfffe0000000040 ffff000802403180 dead000000000122 0000000000000000
[   34.266303] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.274116] head: 0bfffe0000000001 fffffdffe0090701 00000000ffffffff 00000000ffffffff
[   34.281928] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.289734] page dumped because: kasan: bad access detected
[   34.295289] 
[   34.296765] Memory state around the buggy address:
[   34.301549]  ffff00080241bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.308748]  ffff00080241bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.315954] >ffff00080241c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.323154]                    ^
[   34.326369]  ffff00080241c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   34.333575]  ffff00080241c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.340778] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
[   33.375395] ==================================================================
[   33.384852] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   33.391533] Read of size 1 at addr ffff00080241a0c8 by task kunit_try_catch/252
[   33.398826] 
[   33.400311] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   33.400374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.400388] Hardware name: WinLink E850-96 board (DT)
[   33.400411] Call trace:
[   33.400426]  show_stack+0x20/0x38 (C)
[   33.400460]  dump_stack_lvl+0x8c/0xd0
[   33.400494]  print_report+0x118/0x608
[   33.400528]  kasan_report+0xdc/0x128
[   33.400560]  __asan_report_load1_noabort+0x20/0x30
[   33.400597]  kmem_cache_oob+0x344/0x430
[   33.400624]  kunit_try_run_case+0x170/0x3f0
[   33.400657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.400692]  kthread+0x328/0x630
[   33.400726]  ret_from_fork+0x10/0x20
[   33.400761] 
[   33.464016] Allocated by task 252:
[   33.467403]  kasan_save_stack+0x3c/0x68
[   33.471219]  kasan_save_track+0x20/0x40
[   33.475038]  kasan_save_alloc_info+0x40/0x58
[   33.479292]  __kasan_slab_alloc+0xa8/0xb0
[   33.483286]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   33.487885]  kmem_cache_oob+0x12c/0x430
[   33.491705]  kunit_try_run_case+0x170/0x3f0
[   33.495871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.501341]  kthread+0x328/0x630
[   33.504552]  ret_from_fork+0x10/0x20
[   33.508111] 
[   33.509589] The buggy address belongs to the object at ffff00080241a000
[   33.509589]  which belongs to the cache test_cache of size 200
[   33.522002] The buggy address is located 0 bytes to the right of
[   33.522002]  allocated 200-byte region [ffff00080241a000, ffff00080241a0c8)
[   33.534934] 
[   33.536413] The buggy address belongs to the physical page:
[   33.541969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88241a
[   33.549952] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.557593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.564536] page_type: f5(slab)
[   33.567673] raw: 0bfffe0000000040 ffff000802403040 dead000000000122 0000000000000000
[   33.575391] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.583118] head: 0bfffe0000000040 ffff000802403040 dead000000000122 0000000000000000
[   33.590929] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.598742] head: 0bfffe0000000001 fffffdffe0090681 00000000ffffffff 00000000ffffffff
[   33.606554] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.614359] page dumped because: kasan: bad access detected
[   33.619915] 
[   33.621390] Memory state around the buggy address:
[   33.626171]  ffff000802419f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.633373]  ffff00080241a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.640580] >ffff00080241a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.647779]                                               ^
[   33.653338]  ffff00080241a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.660543]  ffff00080241a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.667746] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
[   33.029418] ==================================================================
[   33.036595] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   33.043278] Read of size 8 at addr ffff000800e21a00 by task kunit_try_catch/245
[   33.050567] 
[   33.052053] CPU: 7 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   33.052113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.052127] Hardware name: WinLink E850-96 board (DT)
[   33.052144] Call trace:
[   33.052157]  show_stack+0x20/0x38 (C)
[   33.052193]  dump_stack_lvl+0x8c/0xd0
[   33.052224]  print_report+0x118/0x608
[   33.052256]  kasan_report+0xdc/0x128
[   33.052286]  __asan_report_load8_noabort+0x20/0x30
[   33.052324]  workqueue_uaf+0x480/0x4a8
[   33.052352]  kunit_try_run_case+0x170/0x3f0
[   33.052386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.052421]  kthread+0x328/0x630
[   33.052455]  ret_from_fork+0x10/0x20
[   33.052490] 
[   33.115669] Allocated by task 245:
[   33.119058]  kasan_save_stack+0x3c/0x68
[   33.122874]  kasan_save_track+0x20/0x40
[   33.126693]  kasan_save_alloc_info+0x40/0x58
[   33.130947]  __kasan_kmalloc+0xd4/0xd8
[   33.134679]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.139193]  workqueue_uaf+0x13c/0x4a8
[   33.142925]  kunit_try_run_case+0x170/0x3f0
[   33.147092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.152561]  kthread+0x328/0x630
[   33.155772]  ret_from_fork+0x10/0x20
[   33.159332] 
[   33.160808] Freed by task 84:
[   33.163760]  kasan_save_stack+0x3c/0x68
[   33.167578]  kasan_save_track+0x20/0x40
[   33.171397]  kasan_save_free_info+0x4c/0x78
[   33.175564]  __kasan_slab_free+0x6c/0x98
[   33.179470]  kfree+0x214/0x3c8
[   33.182508]  workqueue_uaf_work+0x18/0x30
[   33.186501]  process_one_work+0x530/0xf98
[   33.190494]  worker_thread+0x8ac/0xf28
[   33.194227]  kthread+0x328/0x630
[   33.197439]  ret_from_fork+0x10/0x20
[   33.200998] 
[   33.202475] Last potentially related work creation:
[   33.207336]  kasan_save_stack+0x3c/0x68
[   33.211154]  kasan_record_aux_stack+0xb4/0xc8
[   33.215494]  __queue_work+0x65c/0x1010
[   33.219226]  queue_work_on+0xbc/0xf8
[   33.222785]  workqueue_uaf+0x210/0x4a8
[   33.226518]  kunit_try_run_case+0x170/0x3f0
[   33.230684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.236153]  kthread+0x328/0x630
[   33.239365]  ret_from_fork+0x10/0x20
[   33.242924] 
[   33.244401] The buggy address belongs to the object at ffff000800e21a00
[   33.244401]  which belongs to the cache kmalloc-32 of size 32
[   33.256728] The buggy address is located 0 bytes inside of
[   33.256728]  freed 32-byte region [ffff000800e21a00, ffff000800e21a20)
[   33.268705] 
[   33.270184] The buggy address belongs to the physical page:
[   33.275740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e21
[   33.283725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.290234] page_type: f5(slab)
[   33.293372] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   33.301091] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.308810] page dumped because: kasan: bad access detected
[   33.314364] 
[   33.315839] Memory state around the buggy address:
[   33.320622]  ffff000800e21900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.327822]  ffff000800e21980: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc
[   33.335027] >ffff000800e21a00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.342228]                    ^
[   33.345444]  ffff000800e21a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.352649]  ffff000800e21b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.359851] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
[   32.660143] ==================================================================
[   32.660322] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   32.660441] Read of size 4 at addr ffff000803280c40 by task swapper/6/0
[   32.661511] 
[   32.662997] CPU: 6 UID: 0 PID: 0 Comm: swapper/6 Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   32.663054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.663072] Hardware name: WinLink E850-96 board (DT)
[   32.663093] Call trace:
[   32.663105]  show_stack+0x20/0x38 (C)
[   32.663142]  dump_stack_lvl+0x8c/0xd0
[   32.663174]  print_report+0x118/0x608
[   32.663210]  kasan_report+0xdc/0x128
[   32.663241]  __asan_report_load4_noabort+0x20/0x30
[   32.663279]  rcu_uaf_reclaim+0x64/0x70
[   32.663307]  rcu_core+0x9f4/0x1e20
[   32.663339]  rcu_core_si+0x18/0x30
[   32.663366]  handle_softirqs+0x374/0xb28
[   32.663396]  __do_softirq+0x1c/0x28
[   32.663426]  ____do_softirq+0x18/0x30
[   32.663457]  call_on_irq_stack+0x24/0x30
[   32.663489]  do_softirq_own_stack+0x24/0x38
[   32.663519]  __irq_exit_rcu+0x1fc/0x318
[   32.663547]  irq_exit_rcu+0x1c/0x80
[   32.663575]  el1_interrupt+0x38/0x58
[   32.663608]  el1h_64_irq_handler+0x18/0x28
[   32.663640]  el1h_64_irq+0x6c/0x70
[   32.663665]  arch_local_irq_enable+0x4/0x8 (P)
[   32.663701]  do_idle+0x384/0x4e8
[   32.663732]  cpu_startup_entry+0x64/0x80
[   32.663764]  secondary_start_kernel+0x288/0x340
[   32.663795]  __secondary_switched+0xc0/0xc8
[   32.663836] 
[   32.773921] Allocated by task 243:
[   32.777310]  kasan_save_stack+0x3c/0x68
[   32.781125]  kasan_save_track+0x20/0x40
[   32.784945]  kasan_save_alloc_info+0x40/0x58
[   32.789198]  __kasan_kmalloc+0xd4/0xd8
[   32.792932]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.797445]  rcu_uaf+0xb0/0x2d8
[   32.800570]  kunit_try_run_case+0x170/0x3f0
[   32.804736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.810205]  kthread+0x328/0x630
[   32.813417]  ret_from_fork+0x10/0x20
[   32.816976] 
[   32.818452] Freed by task 0:
[   32.821318]  kasan_save_stack+0x3c/0x68
[   32.825135]  kasan_save_track+0x20/0x40
[   32.828955]  kasan_save_free_info+0x4c/0x78
[   32.833121]  __kasan_slab_free+0x6c/0x98
[   32.837028]  kfree+0x214/0x3c8
[   32.840066]  rcu_uaf_reclaim+0x28/0x70
[   32.843798]  rcu_core+0x9f4/0x1e20
[   32.847183]  rcu_core_si+0x18/0x30
[   32.850570]  handle_softirqs+0x374/0xb28
[   32.854475]  __do_softirq+0x1c/0x28
[   32.857947] 
[   32.859424] Last potentially related work creation:
[   32.864285]  kasan_save_stack+0x3c/0x68
[   32.868103]  kasan_record_aux_stack+0xb4/0xc8
[   32.872444]  __call_rcu_common.constprop.0+0x70/0x8b0
[   32.877478]  call_rcu+0x18/0x30
[   32.880603]  rcu_uaf+0x14c/0x2d8
[   32.883815]  kunit_try_run_case+0x170/0x3f0
[   32.887982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.893450]  kthread+0x328/0x630
[   32.896662]  ret_from_fork+0x10/0x20
[   32.900221] 
[   32.901698] The buggy address belongs to the object at ffff000803280c40
[   32.901698]  which belongs to the cache kmalloc-32 of size 32
[   32.914026] The buggy address is located 0 bytes inside of
[   32.914026]  freed 32-byte region [ffff000803280c40, ffff000803280c60)
[   32.926002] 
[   32.927481] The buggy address belongs to the physical page:
[   32.933037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883280
[   32.941022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.947531] page_type: f5(slab)
[   32.950669] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   32.958386] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.966106] page dumped because: kasan: bad access detected
[   32.971661] 
[   32.973136] Memory state around the buggy address:
[   32.977919]  ffff000803280b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.985119]  ffff000803280b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.992327] >ffff000803280c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.999525]                                            ^
[   33.004824]  ffff000803280c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.012029]  ffff000803280d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.019231] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
[   32.277307] ==================================================================
[   32.284400] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   32.290731] Read of size 1 at addr ffff000801f1c478 by task kunit_try_catch/241
[   32.298022] 
[   32.299506] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   32.299560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.299575] Hardware name: WinLink E850-96 board (DT)
[   32.299593] Call trace:
[   32.299606]  show_stack+0x20/0x38 (C)
[   32.299639]  dump_stack_lvl+0x8c/0xd0
[   32.299670]  print_report+0x118/0x608
[   32.299703]  kasan_report+0xdc/0x128
[   32.299731]  __asan_report_load1_noabort+0x20/0x30
[   32.299764]  ksize_uaf+0x544/0x5f8
[   32.299791]  kunit_try_run_case+0x170/0x3f0
[   32.299820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.299857]  kthread+0x328/0x630
[   32.299888]  ret_from_fork+0x10/0x20
[   32.299919] 
[   32.362778] Allocated by task 241:
[   32.366167]  kasan_save_stack+0x3c/0x68
[   32.369983]  kasan_save_track+0x20/0x40
[   32.373803]  kasan_save_alloc_info+0x40/0x58
[   32.378056]  __kasan_kmalloc+0xd4/0xd8
[   32.381788]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.386302]  ksize_uaf+0xb8/0x5f8
[   32.389601]  kunit_try_run_case+0x170/0x3f0
[   32.393767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.399237]  kthread+0x328/0x630
[   32.402449]  ret_from_fork+0x10/0x20
[   32.406007] 
[   32.407482] Freed by task 241:
[   32.410521]  kasan_save_stack+0x3c/0x68
[   32.414340]  kasan_save_track+0x20/0x40
[   32.418159]  kasan_save_free_info+0x4c/0x78
[   32.422326]  __kasan_slab_free+0x6c/0x98
[   32.426232]  kfree+0x214/0x3c8
[   32.429270]  ksize_uaf+0x11c/0x5f8
[   32.432656]  kunit_try_run_case+0x170/0x3f0
[   32.436822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.442291]  kthread+0x328/0x630
[   32.445503]  ret_from_fork+0x10/0x20
[   32.449062] 
[   32.450537] The buggy address belongs to the object at ffff000801f1c400
[   32.450537]  which belongs to the cache kmalloc-128 of size 128
[   32.463039] The buggy address is located 120 bytes inside of
[   32.463039]  freed 128-byte region [ffff000801f1c400, ffff000801f1c480)
[   32.475277] 
[   32.476754] The buggy address belongs to the physical page:
[   32.482312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c
[   32.490296] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.497934] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.504878] page_type: f5(slab)
[   32.508011] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.515734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.523460] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.531272] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.539085] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff
[   32.546897] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.554704] page dumped because: kasan: bad access detected
[   32.560258] 
[   32.561733] Memory state around the buggy address:
[   32.566512]  ffff000801f1c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.573716]  ffff000801f1c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.580921] >ffff000801f1c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.588122]                                                                 ^
[   32.595244]  ffff000801f1c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.602449]  ffff000801f1c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.609650] ==================================================================
[   31.941783] ==================================================================
[   31.948815] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.955146] Read of size 1 at addr ffff000801f1c400 by task kunit_try_catch/241
[   31.962437] 
[   31.963922] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   31.963975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.963989] Hardware name: WinLink E850-96 board (DT)
[   31.964012] Call trace:
[   31.964027]  show_stack+0x20/0x38 (C)
[   31.964061]  dump_stack_lvl+0x8c/0xd0
[   31.964091]  print_report+0x118/0x608
[   31.964122]  kasan_report+0xdc/0x128
[   31.964151]  __asan_report_load1_noabort+0x20/0x30
[   31.964185]  ksize_uaf+0x598/0x5f8
[   31.964212]  kunit_try_run_case+0x170/0x3f0
[   31.964244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.964278]  kthread+0x328/0x630
[   31.964311]  ret_from_fork+0x10/0x20
[   31.964346] 
[   32.027193] Allocated by task 241:
[   32.030581]  kasan_save_stack+0x3c/0x68
[   32.034398]  kasan_save_track+0x20/0x40
[   32.038217]  kasan_save_alloc_info+0x40/0x58
[   32.042471]  __kasan_kmalloc+0xd4/0xd8
[   32.046203]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.050717]  ksize_uaf+0xb8/0x5f8
[   32.054016]  kunit_try_run_case+0x170/0x3f0
[   32.058182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.063651]  kthread+0x328/0x630
[   32.066862]  ret_from_fork+0x10/0x20
[   32.070422] 
[   32.071897] Freed by task 241:
[   32.074935]  kasan_save_stack+0x3c/0x68
[   32.078755]  kasan_save_track+0x20/0x40
[   32.082574]  kasan_save_free_info+0x4c/0x78
[   32.086741]  __kasan_slab_free+0x6c/0x98
[   32.090647]  kfree+0x214/0x3c8
[   32.093685]  ksize_uaf+0x11c/0x5f8
[   32.097071]  kunit_try_run_case+0x170/0x3f0
[   32.101237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.106706]  kthread+0x328/0x630
[   32.109917]  ret_from_fork+0x10/0x20
[   32.113477] 
[   32.114954] The buggy address belongs to the object at ffff000801f1c400
[   32.114954]  which belongs to the cache kmalloc-128 of size 128
[   32.127455] The buggy address is located 0 bytes inside of
[   32.127455]  freed 128-byte region [ffff000801f1c400, ffff000801f1c480)
[   32.139517] 
[   32.140996] The buggy address belongs to the physical page:
[   32.146552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c
[   32.154537] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.162175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.169118] page_type: f5(slab)
[   32.172254] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.179975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.187702] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.195513] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.203326] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff
[   32.211138] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.218944] page dumped because: kasan: bad access detected
[   32.224499] 
[   32.225974] Memory state around the buggy address:
[   32.230753]  ffff000801f1c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.237958]  ffff000801f1c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.245162] >ffff000801f1c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.252363]                    ^
[   32.255579]  ffff000801f1c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.262784]  ffff000801f1c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.269985] ==================================================================
[   31.601493] ==================================================================
[   31.611146] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.617479] Read of size 1 at addr ffff000801f1c400 by task kunit_try_catch/241
[   31.624770] 
[   31.626256] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   31.626316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.626334] Hardware name: WinLink E850-96 board (DT)
[   31.626355] Call trace:
[   31.626371]  show_stack+0x20/0x38 (C)
[   31.626409]  dump_stack_lvl+0x8c/0xd0
[   31.626442]  print_report+0x118/0x608
[   31.626475]  kasan_report+0xdc/0x128
[   31.626506]  __kasan_check_byte+0x54/0x70
[   31.626537]  ksize+0x30/0x88
[   31.626567]  ksize_uaf+0x168/0x5f8
[   31.626596]  kunit_try_run_case+0x170/0x3f0
[   31.626630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.626665]  kthread+0x328/0x630
[   31.626700]  ret_from_fork+0x10/0x20
[   31.626733] 
[   31.691611] Allocated by task 241:
[   31.694997]  kasan_save_stack+0x3c/0x68
[   31.698813]  kasan_save_track+0x20/0x40
[   31.702634]  kasan_save_alloc_info+0x40/0x58
[   31.706885]  __kasan_kmalloc+0xd4/0xd8
[   31.710618]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.715132]  ksize_uaf+0xb8/0x5f8
[   31.718430]  kunit_try_run_case+0x170/0x3f0
[   31.722597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.728067]  kthread+0x328/0x630
[   31.731277]  ret_from_fork+0x10/0x20
[   31.734836] 
[   31.736313] Freed by task 241:
[   31.739350]  kasan_save_stack+0x3c/0x68
[   31.743170]  kasan_save_track+0x20/0x40
[   31.746989]  kasan_save_free_info+0x4c/0x78
[   31.751156]  __kasan_slab_free+0x6c/0x98
[   31.755062]  kfree+0x214/0x3c8
[   31.758100]  ksize_uaf+0x11c/0x5f8
[   31.761485]  kunit_try_run_case+0x170/0x3f0
[   31.765652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.771120]  kthread+0x328/0x630
[   31.774332]  ret_from_fork+0x10/0x20
[   31.777891] 
[   31.779369] The buggy address belongs to the object at ffff000801f1c400
[   31.779369]  which belongs to the cache kmalloc-128 of size 128
[   31.791871] The buggy address is located 0 bytes inside of
[   31.791871]  freed 128-byte region [ffff000801f1c400, ffff000801f1c480)
[   31.803934] 
[   31.805412] The buggy address belongs to the physical page:
[   31.810967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c
[   31.818952] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.826591] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.833535] page_type: f5(slab)
[   31.836673] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.844390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.852116] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.859928] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.867741] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff
[   31.875553] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.883360] page dumped because: kasan: bad access detected
[   31.888914] 
[   31.890389] Memory state around the buggy address:
[   31.895174]  ffff000801f1c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.902373]  ffff000801f1c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.909579] >ffff000801f1c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.916778]                    ^
[   31.919993]  ffff000801f1c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.927198]  ffff000801f1c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.934401] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
[   31.299098] ==================================================================
[   31.306202] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.313577] Read of size 1 at addr ffff000801ede97f by task kunit_try_catch/239
[   31.320868] 
[   31.322350] CPU: 6 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   31.322402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.322418] Hardware name: WinLink E850-96 board (DT)
[   31.322439] Call trace:
[   31.322454]  show_stack+0x20/0x38 (C)
[   31.322489]  dump_stack_lvl+0x8c/0xd0
[   31.322519]  print_report+0x118/0x608
[   31.322550]  kasan_report+0xdc/0x128
[   31.322579]  __asan_report_load1_noabort+0x20/0x30
[   31.322612]  ksize_unpoisons_memory+0x690/0x740
[   31.322642]  kunit_try_run_case+0x170/0x3f0
[   31.322677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.322711]  kthread+0x328/0x630
[   31.322745]  ret_from_fork+0x10/0x20
[   31.322778] 
[   31.386751] Allocated by task 239:
[   31.390139]  kasan_save_stack+0x3c/0x68
[   31.393956]  kasan_save_track+0x20/0x40
[   31.397777]  kasan_save_alloc_info+0x40/0x58
[   31.402029]  __kasan_kmalloc+0xd4/0xd8
[   31.405763]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.410275]  ksize_unpoisons_memory+0xc0/0x740
[   31.414702]  kunit_try_run_case+0x170/0x3f0
[   31.418869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.424337]  kthread+0x328/0x630
[   31.427549]  ret_from_fork+0x10/0x20
[   31.431108] 
[   31.432586] The buggy address belongs to the object at ffff000801ede900
[   31.432586]  which belongs to the cache kmalloc-128 of size 128
[   31.445086] The buggy address is located 12 bytes to the right of
[   31.445086]  allocated 115-byte region [ffff000801ede900, ffff000801ede973)
[   31.458104] 
[   31.459582] The buggy address belongs to the physical page:
[   31.465140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede
[   31.473123] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.480760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.487706] page_type: f5(slab)
[   31.490842] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.498562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.506288] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.514100] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.521913] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff
[   31.529725] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.537532] page dumped because: kasan: bad access detected
[   31.543085] 
[   31.544561] Memory state around the buggy address:
[   31.549342]  ffff000801ede800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.556544]  ffff000801ede880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.563749] >ffff000801ede900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.570950]                                                                 ^
[   31.578072]  ffff000801ede980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.585278]  ffff000801edea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.592478] ==================================================================
[   30.998495] ==================================================================
[   31.005599] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   31.012973] Read of size 1 at addr ffff000801ede978 by task kunit_try_catch/239
[   31.020264] 
[   31.021748] CPU: 6 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   31.021799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.021817] Hardware name: WinLink E850-96 board (DT)
[   31.021835] Call trace:
[   31.021849]  show_stack+0x20/0x38 (C)
[   31.021887]  dump_stack_lvl+0x8c/0xd0
[   31.021919]  print_report+0x118/0x608
[   31.021950]  kasan_report+0xdc/0x128
[   31.021982]  __asan_report_load1_noabort+0x20/0x30
[   31.022018]  ksize_unpoisons_memory+0x618/0x740
[   31.022050]  kunit_try_run_case+0x170/0x3f0
[   31.022084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.022116]  kthread+0x328/0x630
[   31.022149]  ret_from_fork+0x10/0x20
[   31.022179] 
[   31.086148] Allocated by task 239:
[   31.089537]  kasan_save_stack+0x3c/0x68
[   31.093353]  kasan_save_track+0x20/0x40
[   31.097172]  kasan_save_alloc_info+0x40/0x58
[   31.101426]  __kasan_kmalloc+0xd4/0xd8
[   31.105158]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.109672]  ksize_unpoisons_memory+0xc0/0x740
[   31.114099]  kunit_try_run_case+0x170/0x3f0
[   31.118266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.123734]  kthread+0x328/0x630
[   31.126946]  ret_from_fork+0x10/0x20
[   31.130505] 
[   31.131982] The buggy address belongs to the object at ffff000801ede900
[   31.131982]  which belongs to the cache kmalloc-128 of size 128
[   31.144481] The buggy address is located 5 bytes to the right of
[   31.144481]  allocated 115-byte region [ffff000801ede900, ffff000801ede973)
[   31.157414] 
[   31.158892] The buggy address belongs to the physical page:
[   31.164450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede
[   31.172432] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.180072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.187017] page_type: f5(slab)
[   31.190151] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.197872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.205598] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.213410] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.221224] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff
[   31.229034] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.236842] page dumped because: kasan: bad access detected
[   31.242396] 
[   31.243871] Memory state around the buggy address:
[   31.248650]  ffff000801ede800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.255855]  ffff000801ede880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.263061] >ffff000801ede900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.270260]                                                                 ^
[   31.277382]  ffff000801ede980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.284588]  ffff000801edea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.291787] ==================================================================
[   30.695512] ==================================================================
[   30.705256] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.712631] Read of size 1 at addr ffff000801ede973 by task kunit_try_catch/239
[   30.719921] 
[   30.721406] CPU: 6 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   30.721465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.721483] Hardware name: WinLink E850-96 board (DT)
[   30.721504] Call trace:
[   30.721520]  show_stack+0x20/0x38 (C)
[   30.721559]  dump_stack_lvl+0x8c/0xd0
[   30.721594]  print_report+0x118/0x608
[   30.721627]  kasan_report+0xdc/0x128
[   30.721656]  __asan_report_load1_noabort+0x20/0x30
[   30.721693]  ksize_unpoisons_memory+0x628/0x740
[   30.721726]  kunit_try_run_case+0x170/0x3f0
[   30.721760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.721794]  kthread+0x328/0x630
[   30.721828]  ret_from_fork+0x10/0x20
[   30.721865] 
[   30.785805] Allocated by task 239:
[   30.789194]  kasan_save_stack+0x3c/0x68
[   30.793010]  kasan_save_track+0x20/0x40
[   30.796829]  kasan_save_alloc_info+0x40/0x58
[   30.801083]  __kasan_kmalloc+0xd4/0xd8
[   30.804817]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.809330]  ksize_unpoisons_memory+0xc0/0x740
[   30.813756]  kunit_try_run_case+0x170/0x3f0
[   30.817923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.823392]  kthread+0x328/0x630
[   30.826603]  ret_from_fork+0x10/0x20
[   30.830162] 
[   30.831641] The buggy address belongs to the object at ffff000801ede900
[   30.831641]  which belongs to the cache kmalloc-128 of size 128
[   30.844141] The buggy address is located 0 bytes to the right of
[   30.844141]  allocated 115-byte region [ffff000801ede900, ffff000801ede973)
[   30.857072] 
[   30.858551] The buggy address belongs to the physical page:
[   30.864106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede
[   30.872091] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.879731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.886675] page_type: f5(slab)
[   30.889810] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.897529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.905256] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.913067] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.920880] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff
[   30.928692] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.936497] page dumped because: kasan: bad access detected
[   30.942053] 
[   30.943528] Memory state around the buggy address:
[   30.948309]  ffff000801ede800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.955512]  ffff000801ede880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.962716] >ffff000801ede900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.969917]                                                              ^
[   30.976778]  ffff000801ede980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.983985]  ffff000801edea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.991186] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-double-free-in-kfree_sensitive KNOWN ISSUE - log-parser-test/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
[   30.381406] ==================================================================
[   30.388420] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   30.394405] Free of addr ffff000801dde600 by task kunit_try_catch/237
[   30.400828] 
[   30.402315] CPU: 3 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   30.402373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.402390] Hardware name: WinLink E850-96 board (DT)
[   30.402410] Call trace:
[   30.402423]  show_stack+0x20/0x38 (C)
[   30.402458]  dump_stack_lvl+0x8c/0xd0
[   30.402489]  print_report+0x118/0x608
[   30.402520]  kasan_report_invalid_free+0xc0/0xe8
[   30.402553]  check_slab_allocation+0xd4/0x108
[   30.402583]  __kasan_slab_pre_free+0x2c/0x48
[   30.402615]  kfree+0xe8/0x3c8
[   30.402642]  kfree_sensitive+0x3c/0xb0
[   30.402671]  kmalloc_double_kzfree+0x168/0x308
[   30.402704]  kunit_try_run_case+0x170/0x3f0
[   30.402737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.402772]  kthread+0x328/0x630
[   30.402803]  ret_from_fork+0x10/0x20
[   30.402836] 
[   30.478172] Allocated by task 237:
[   30.481558]  kasan_save_stack+0x3c/0x68
[   30.485376]  kasan_save_track+0x20/0x40
[   30.489195]  kasan_save_alloc_info+0x40/0x58
[   30.493449]  __kasan_kmalloc+0xd4/0xd8
[   30.497181]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.501695]  kmalloc_double_kzfree+0xb8/0x308
[   30.506035]  kunit_try_run_case+0x170/0x3f0
[   30.510202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.515671]  kthread+0x328/0x630
[   30.518882]  ret_from_fork+0x10/0x20
[   30.522441] 
[   30.523917] Freed by task 237:
[   30.526956]  kasan_save_stack+0x3c/0x68
[   30.530775]  kasan_save_track+0x20/0x40
[   30.534594]  kasan_save_free_info+0x4c/0x78
[   30.538760]  __kasan_slab_free+0x6c/0x98
[   30.542668]  kfree+0x214/0x3c8
[   30.545705]  kfree_sensitive+0x80/0xb0
[   30.549437]  kmalloc_double_kzfree+0x11c/0x308
[   30.553864]  kunit_try_run_case+0x170/0x3f0
[   30.558031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.563500]  kthread+0x328/0x630
[   30.566712]  ret_from_fork+0x10/0x20
[   30.570271] 
[   30.571748] The buggy address belongs to the object at ffff000801dde600
[   30.571748]  which belongs to the cache kmalloc-16 of size 16
[   30.584075] The buggy address is located 0 bytes inside of
[   30.584075]  16-byte region [ffff000801dde600, ffff000801dde610)
[   30.595530] 
[   30.597009] The buggy address belongs to the physical page:
[   30.602565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dde
[   30.610551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.617060] page_type: f5(slab)
[   30.620195] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   30.627915] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.635635] page dumped because: kasan: bad access detected
[   30.641189] 
[   30.642665] Memory state around the buggy address:
[   30.647446]  ffff000801dde500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.654648]  ffff000801dde580: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   30.661854] >ffff000801dde600: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.669054]                    ^
[   30.672269]  ffff000801dde680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.679474]  ffff000801dde700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.686677] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
[   30.068236] ==================================================================
[   30.081567] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.088942] Read of size 1 at addr ffff000801dde600 by task kunit_try_catch/237
[   30.096232] 
[   30.097721] CPU: 3 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   30.097780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.097799] Hardware name: WinLink E850-96 board (DT)
[   30.097821] Call trace:
[   30.097835]  show_stack+0x20/0x38 (C)
[   30.097871]  dump_stack_lvl+0x8c/0xd0
[   30.097903]  print_report+0x118/0x608
[   30.097937]  kasan_report+0xdc/0x128
[   30.097969]  __kasan_check_byte+0x54/0x70
[   30.098003]  kfree_sensitive+0x30/0xb0
[   30.098035]  kmalloc_double_kzfree+0x168/0x308
[   30.098064]  kunit_try_run_case+0x170/0x3f0
[   30.098098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.098135]  kthread+0x328/0x630
[   30.098173]  ret_from_fork+0x10/0x20
[   30.098207] 
[   30.164981] Allocated by task 237:
[   30.168370]  kasan_save_stack+0x3c/0x68
[   30.172186]  kasan_save_track+0x20/0x40
[   30.176005]  kasan_save_alloc_info+0x40/0x58
[   30.180259]  __kasan_kmalloc+0xd4/0xd8
[   30.183991]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.188505]  kmalloc_double_kzfree+0xb8/0x308
[   30.192846]  kunit_try_run_case+0x170/0x3f0
[   30.197012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.202481]  kthread+0x328/0x630
[   30.205692]  ret_from_fork+0x10/0x20
[   30.209251] 
[   30.210728] Freed by task 237:
[   30.213767]  kasan_save_stack+0x3c/0x68
[   30.217585]  kasan_save_track+0x20/0x40
[   30.221404]  kasan_save_free_info+0x4c/0x78
[   30.225571]  __kasan_slab_free+0x6c/0x98
[   30.229478]  kfree+0x214/0x3c8
[   30.232515]  kfree_sensitive+0x80/0xb0
[   30.236248]  kmalloc_double_kzfree+0x11c/0x308
[   30.240675]  kunit_try_run_case+0x170/0x3f0
[   30.244842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.250310]  kthread+0x328/0x630
[   30.253522]  ret_from_fork+0x10/0x20
[   30.257082] 
[   30.258558] The buggy address belongs to the object at ffff000801dde600
[   30.258558]  which belongs to the cache kmalloc-16 of size 16
[   30.270886] The buggy address is located 0 bytes inside of
[   30.270886]  freed 16-byte region [ffff000801dde600, ffff000801dde610)
[   30.282861] 
[   30.284341] The buggy address belongs to the physical page:
[   30.289897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dde
[   30.297883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.304391] page_type: f5(slab)
[   30.307527] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   30.315246] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.322965] page dumped because: kasan: bad access detected
[   30.328520] 
[   30.329996] Memory state around the buggy address:
[   30.334779]  ffff000801dde500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.341979]  ffff000801dde580: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   30.349185] >ffff000801dde600: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.356386]                    ^
[   30.359600]  ffff000801dde680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.366805]  ffff000801dde700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.374007] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2 KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
[   29.763217] ==================================================================
[   29.772546] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   29.779138] Read of size 1 at addr ffff000800de74a8 by task kunit_try_catch/233
[   29.786430] 
[   29.787915] CPU: 7 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   29.787974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.787992] Hardware name: WinLink E850-96 board (DT)
[   29.788013] Call trace:
[   29.788026]  show_stack+0x20/0x38 (C)
[   29.788063]  dump_stack_lvl+0x8c/0xd0
[   29.788099]  print_report+0x118/0x608
[   29.788132]  kasan_report+0xdc/0x128
[   29.788163]  __asan_report_load1_noabort+0x20/0x30
[   29.788199]  kmalloc_uaf2+0x3f4/0x468
[   29.788227]  kunit_try_run_case+0x170/0x3f0
[   29.788259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.788294]  kthread+0x328/0x630
[   29.788329]  ret_from_fork+0x10/0x20
[   29.788365] 
[   29.851444] Allocated by task 233:
[   29.854833]  kasan_save_stack+0x3c/0x68
[   29.858649]  kasan_save_track+0x20/0x40
[   29.862470]  kasan_save_alloc_info+0x40/0x58
[   29.866722]  __kasan_kmalloc+0xd4/0xd8
[   29.870454]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.874969]  kmalloc_uaf2+0xc4/0x468
[   29.878528]  kunit_try_run_case+0x170/0x3f0
[   29.882694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.888162]  kthread+0x328/0x630
[   29.891375]  ret_from_fork+0x10/0x20
[   29.894933] 
[   29.896410] Freed by task 233:
[   29.899447]  kasan_save_stack+0x3c/0x68
[   29.903267]  kasan_save_track+0x20/0x40
[   29.907086]  kasan_save_free_info+0x4c/0x78
[   29.911252]  __kasan_slab_free+0x6c/0x98
[   29.915160]  kfree+0x214/0x3c8
[   29.918197]  kmalloc_uaf2+0x134/0x468
[   29.921843]  kunit_try_run_case+0x170/0x3f0
[   29.926009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.931478]  kthread+0x328/0x630
[   29.934690]  ret_from_fork+0x10/0x20
[   29.938249] 
[   29.939726] The buggy address belongs to the object at ffff000800de7480
[   29.939726]  which belongs to the cache kmalloc-64 of size 64
[   29.952054] The buggy address is located 40 bytes inside of
[   29.952054]  freed 64-byte region [ffff000800de7480, ffff000800de74c0)
[   29.964116] 
[   29.965596] The buggy address belongs to the physical page:
[   29.971151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de7
[   29.979136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.985644] page_type: f5(slab)
[   29.988784] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.996501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.004221] page dumped because: kasan: bad access detected
[   30.009775] 
[   30.011251] Memory state around the buggy address:
[   30.016033]  ffff000800de7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.023234]  ffff000800de7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.030438] >ffff000800de7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.037640]                                   ^
[   30.042157]  ffff000800de7500: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   30.049362]  ffff000800de7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.056564] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure
[   29.457814] ==================================================================
[   29.466472] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   29.473591] Write of size 33 at addr ffff000804b57380 by task kunit_try_catch/231
[   29.481051] 
[   29.482539] CPU: 6 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   29.482595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.482614] Hardware name: WinLink E850-96 board (DT)
[   29.482634] Call trace:
[   29.482647]  show_stack+0x20/0x38 (C)
[   29.482687]  dump_stack_lvl+0x8c/0xd0
[   29.482719]  print_report+0x118/0x608
[   29.482752]  kasan_report+0xdc/0x128
[   29.482782]  kasan_check_range+0x100/0x1a8
[   29.482814]  __asan_memset+0x34/0x78
[   29.482849]  kmalloc_uaf_memset+0x170/0x310
[   29.482877]  kunit_try_run_case+0x170/0x3f0
[   29.482910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.482949]  kthread+0x328/0x630
[   29.482982]  ret_from_fork+0x10/0x20
[   29.483014] 
[   29.549454] Allocated by task 231:
[   29.552842]  kasan_save_stack+0x3c/0x68
[   29.556657]  kasan_save_track+0x20/0x40
[   29.560477]  kasan_save_alloc_info+0x40/0x58
[   29.564730]  __kasan_kmalloc+0xd4/0xd8
[   29.568463]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.572976]  kmalloc_uaf_memset+0xb8/0x310
[   29.577057]  kunit_try_run_case+0x170/0x3f0
[   29.581223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.586692]  kthread+0x328/0x630
[   29.589903]  ret_from_fork+0x10/0x20
[   29.593462] 
[   29.594939] Freed by task 231:
[   29.597979]  kasan_save_stack+0x3c/0x68
[   29.601796]  kasan_save_track+0x20/0x40
[   29.605615]  kasan_save_free_info+0x4c/0x78
[   29.609781]  __kasan_slab_free+0x6c/0x98
[   29.613688]  kfree+0x214/0x3c8
[   29.616726]  kmalloc_uaf_memset+0x11c/0x310
[   29.620892]  kunit_try_run_case+0x170/0x3f0
[   29.625059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.630529]  kthread+0x328/0x630
[   29.633740]  ret_from_fork+0x10/0x20
[   29.637299] 
[   29.638776] The buggy address belongs to the object at ffff000804b57380
[   29.638776]  which belongs to the cache kmalloc-64 of size 64
[   29.651104] The buggy address is located 0 bytes inside of
[   29.651104]  freed 64-byte region [ffff000804b57380, ffff000804b573c0)
[   29.663079] 
[   29.664559] The buggy address belongs to the physical page:
[   29.670114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b57
[   29.678100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.684609] page_type: f5(slab)
[   29.687746] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.695464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.703183] page dumped because: kasan: bad access detected
[   29.708738] 
[   29.710214] Memory state around the buggy address:
[   29.714997]  ffff000804b57280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.722199]  ffff000804b57300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.729403] >ffff000804b57380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.736602]                    ^
[   29.739819]  ffff000804b57400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.747023]  ffff000804b57480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.754225] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
[   29.155922] ==================================================================
[   29.166218] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   29.172727] Read of size 1 at addr ffff000800e20088 by task kunit_try_catch/229
[   29.180015] 
[   29.181502] CPU: 7 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   29.181568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.181585] Hardware name: WinLink E850-96 board (DT)
[   29.181604] Call trace:
[   29.181617]  show_stack+0x20/0x38 (C)
[   29.181655]  dump_stack_lvl+0x8c/0xd0
[   29.181687]  print_report+0x118/0x608
[   29.181722]  kasan_report+0xdc/0x128
[   29.181754]  __asan_report_load1_noabort+0x20/0x30
[   29.181792]  kmalloc_uaf+0x300/0x338
[   29.181819]  kunit_try_run_case+0x170/0x3f0
[   29.181854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.181891]  kthread+0x328/0x630
[   29.181928]  ret_from_fork+0x10/0x20
[   29.181963] 
[   29.244945] Allocated by task 229:
[   29.248331]  kasan_save_stack+0x3c/0x68
[   29.252148]  kasan_save_track+0x20/0x40
[   29.255967]  kasan_save_alloc_info+0x40/0x58
[   29.260220]  __kasan_kmalloc+0xd4/0xd8
[   29.263954]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.268467]  kmalloc_uaf+0xb8/0x338
[   29.271939]  kunit_try_run_case+0x170/0x3f0
[   29.276105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.281575]  kthread+0x328/0x630
[   29.284786]  ret_from_fork+0x10/0x20
[   29.288345] 
[   29.289822] Freed by task 229:
[   29.292859]  kasan_save_stack+0x3c/0x68
[   29.296679]  kasan_save_track+0x20/0x40
[   29.300498]  kasan_save_free_info+0x4c/0x78
[   29.304665]  __kasan_slab_free+0x6c/0x98
[   29.308572]  kfree+0x214/0x3c8
[   29.311609]  kmalloc_uaf+0x11c/0x338
[   29.315168]  kunit_try_run_case+0x170/0x3f0
[   29.319334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.324803]  kthread+0x328/0x630
[   29.328015]  ret_from_fork+0x10/0x20
[   29.331574] 
[   29.333051] The buggy address belongs to the object at ffff000800e20080
[   29.333051]  which belongs to the cache kmalloc-16 of size 16
[   29.345378] The buggy address is located 8 bytes inside of
[   29.345378]  freed 16-byte region [ffff000800e20080, ffff000800e20090)
[   29.357355] 
[   29.358834] The buggy address belongs to the physical page:
[   29.364390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   29.372375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.378884] page_type: f5(slab)
[   29.382021] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   29.389739] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.397460] page dumped because: kasan: bad access detected
[   29.403014] 
[   29.404489] Memory state around the buggy address:
[   29.409272]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.416474]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.423678] >ffff000800e20080: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.430878]                       ^
[   29.434354]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.441559]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.448761] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
[   28.887789] ==================================================================
[   28.898165] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   28.906062] Read of size 64 at addr ffff000804b57304 by task kunit_try_catch/227
[   28.913438] 
[   28.914926] CPU: 6 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   28.914987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.915003] Hardware name: WinLink E850-96 board (DT)
[   28.915023] Call trace:
[   28.915035]  show_stack+0x20/0x38 (C)
[   28.915073]  dump_stack_lvl+0x8c/0xd0
[   28.915107]  print_report+0x118/0x608
[   28.915142]  kasan_report+0xdc/0x128
[   28.915174]  kasan_check_range+0x100/0x1a8
[   28.915208]  __asan_memmove+0x3c/0x98
[   28.915242]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   28.915275]  kunit_try_run_case+0x170/0x3f0
[   28.915309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.915344]  kthread+0x328/0x630
[   28.915379]  ret_from_fork+0x10/0x20
[   28.915413] 
[   28.982796] Allocated by task 227:
[   28.986183]  kasan_save_stack+0x3c/0x68
[   28.990000]  kasan_save_track+0x20/0x40
[   28.993819]  kasan_save_alloc_info+0x40/0x58
[   28.998072]  __kasan_kmalloc+0xd4/0xd8
[   29.001804]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.006319]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   29.011268]  kunit_try_run_case+0x170/0x3f0
[   29.015433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.020901]  kthread+0x328/0x630
[   29.024113]  ret_from_fork+0x10/0x20
[   29.027672] 
[   29.029150] The buggy address belongs to the object at ffff000804b57300
[   29.029150]  which belongs to the cache kmalloc-64 of size 64
[   29.041478] The buggy address is located 4 bytes inside of
[   29.041478]  allocated 64-byte region [ffff000804b57300, ffff000804b57340)
[   29.053800] 
[   29.055280] The buggy address belongs to the physical page:
[   29.060835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b57
[   29.068821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.075330] page_type: f5(slab)
[   29.078465] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.086185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.093904] page dumped because: kasan: bad access detected
[   29.099459] 
[   29.100935] Memory state around the buggy address:
[   29.105718]  ffff000804b57200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.112917]  ffff000804b57280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.120123] >ffff000804b57300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.127323]                                            ^
[   29.132622]  ffff000804b57380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.139829]  ffff000804b57400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.147030] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size KNOWN ISSUE - log-parser-test/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
[   28.621914] ==================================================================
[   28.631589] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   28.639140] Read of size 18446744073709551614 at addr ffff000800de7404 by task kunit_try_catch/225
[   28.648079] 
[   28.649565] CPU: 7 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   28.649624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.649642] Hardware name: WinLink E850-96 board (DT)
[   28.649665] Call trace:
[   28.649679]  show_stack+0x20/0x38 (C)
[   28.649715]  dump_stack_lvl+0x8c/0xd0
[   28.649747]  print_report+0x118/0x608
[   28.649778]  kasan_report+0xdc/0x128
[   28.649808]  kasan_check_range+0x100/0x1a8
[   28.649844]  __asan_memmove+0x3c/0x98
[   28.649877]  kmalloc_memmove_negative_size+0x154/0x2e0
[   28.649909]  kunit_try_run_case+0x170/0x3f0
[   28.649943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.649981]  kthread+0x328/0x630
[   28.650015]  ret_from_fork+0x10/0x20
[   28.650050] 
[   28.717522] Allocated by task 225:
[   28.720909]  kasan_save_stack+0x3c/0x68
[   28.724726]  kasan_save_track+0x20/0x40
[   28.728546]  kasan_save_alloc_info+0x40/0x58
[   28.732798]  __kasan_kmalloc+0xd4/0xd8
[   28.736531]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.741045]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   28.746079]  kunit_try_run_case+0x170/0x3f0
[   28.750246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.755715]  kthread+0x328/0x630
[   28.758926]  ret_from_fork+0x10/0x20
[   28.762485] 
[   28.763962] The buggy address belongs to the object at ffff000800de7400
[   28.763962]  which belongs to the cache kmalloc-64 of size 64
[   28.776289] The buggy address is located 4 bytes inside of
[   28.776289]  64-byte region [ffff000800de7400, ffff000800de7440)
[   28.787745] 
[   28.789225] The buggy address belongs to the physical page:
[   28.794780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de7
[   28.802765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.809275] page_type: f5(slab)
[   28.812412] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   28.820129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.827849] page dumped because: kasan: bad access detected
[   28.833404] 
[   28.834879] Memory state around the buggy address:
[   28.839662]  ffff000800de7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.846864]  ffff000800de7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.854067] >ffff000800de7400: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   28.861269]                    ^
[   28.864484]  ffff000800de7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.871689]  ffff000800de7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.878891] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16 KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
[   28.314757] ==================================================================
[   28.324389] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   28.331678] Write of size 16 at addr ffff000801ede869 by task kunit_try_catch/223
[   28.339141] 
[   28.340628] CPU: 6 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   28.340688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.340705] Hardware name: WinLink E850-96 board (DT)
[   28.340725] Call trace:
[   28.340738]  show_stack+0x20/0x38 (C)
[   28.340776]  dump_stack_lvl+0x8c/0xd0
[   28.340807]  print_report+0x118/0x608
[   28.340842]  kasan_report+0xdc/0x128
[   28.340872]  kasan_check_range+0x100/0x1a8
[   28.340905]  __asan_memset+0x34/0x78
[   28.340937]  kmalloc_oob_memset_16+0x150/0x2f8
[   28.340966]  kunit_try_run_case+0x170/0x3f0
[   28.340998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.341037]  kthread+0x328/0x630
[   28.341071]  ret_from_fork+0x10/0x20
[   28.341104] 
[   28.407804] Allocated by task 223:
[   28.411192]  kasan_save_stack+0x3c/0x68
[   28.415008]  kasan_save_track+0x20/0x40
[   28.418827]  kasan_save_alloc_info+0x40/0x58
[   28.423081]  __kasan_kmalloc+0xd4/0xd8
[   28.426813]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.431327]  kmalloc_oob_memset_16+0xb0/0x2f8
[   28.435669]  kunit_try_run_case+0x170/0x3f0
[   28.439834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.445302]  kthread+0x328/0x630
[   28.448514]  ret_from_fork+0x10/0x20
[   28.452073] 
[   28.453551] The buggy address belongs to the object at ffff000801ede800
[   28.453551]  which belongs to the cache kmalloc-128 of size 128
[   28.466052] The buggy address is located 105 bytes inside of
[   28.466052]  allocated 120-byte region [ffff000801ede800, ffff000801ede878)
[   28.478636] 
[   28.480115] The buggy address belongs to the physical page:
[   28.485670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede
[   28.493655] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.501293] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.508237] page_type: f5(slab)
[   28.511375] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.519093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.526819] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.534630] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.542444] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff
[   28.550255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.558061] page dumped because: kasan: bad access detected
[   28.563617] 
[   28.565092] Memory state around the buggy address:
[   28.569876]  ffff000801ede700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.577075]  ffff000801ede780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.584282] >ffff000801ede800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.591481]                                                                 ^
[   28.598603]  ffff000801ede880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.605807]  ffff000801ede900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.613010] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8 KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure
[   28.008063] ==================================================================
[   28.017624] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   28.024825] Write of size 8 at addr ffff000801f1c371 by task kunit_try_catch/221
[   28.032201] 
[   28.033688] CPU: 7 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   28.033743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.033758] Hardware name: WinLink E850-96 board (DT)
[   28.033779] Call trace:
[   28.033794]  show_stack+0x20/0x38 (C)
[   28.033831]  dump_stack_lvl+0x8c/0xd0
[   28.033866]  print_report+0x118/0x608
[   28.033899]  kasan_report+0xdc/0x128
[   28.033929]  kasan_check_range+0x100/0x1a8
[   28.033964]  __asan_memset+0x34/0x78
[   28.033998]  kmalloc_oob_memset_8+0x150/0x2f8
[   28.034026]  kunit_try_run_case+0x170/0x3f0
[   28.034056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.034091]  kthread+0x328/0x630
[   28.034126]  ret_from_fork+0x10/0x20
[   28.034158] 
[   28.100777] Allocated by task 221:
[   28.104165]  kasan_save_stack+0x3c/0x68
[   28.107981]  kasan_save_track+0x20/0x40
[   28.111801]  kasan_save_alloc_info+0x40/0x58
[   28.116054]  __kasan_kmalloc+0xd4/0xd8
[   28.119786]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.124300]  kmalloc_oob_memset_8+0xb0/0x2f8
[   28.128554]  kunit_try_run_case+0x170/0x3f0
[   28.132720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.138189]  kthread+0x328/0x630
[   28.141401]  ret_from_fork+0x10/0x20
[   28.144960] 
[   28.146436] The buggy address belongs to the object at ffff000801f1c300
[   28.146436]  which belongs to the cache kmalloc-128 of size 128
[   28.158938] The buggy address is located 113 bytes inside of
[   28.158938]  allocated 120-byte region [ffff000801f1c300, ffff000801f1c378)
[   28.171522] 
[   28.173001] The buggy address belongs to the physical page:
[   28.178557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c
[   28.186541] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.194179] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.201123] page_type: f5(slab)
[   28.204261] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.211979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.219706] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.227517] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.235330] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff
[   28.243142] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.250949] page dumped because: kasan: bad access detected
[   28.256503] 
[   28.257979] Memory state around the buggy address:
[   28.262758]  ffff000801f1c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.269962]  ffff000801f1c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.277166] >ffff000801f1c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.284367]                                                                 ^
[   28.291489]  ffff000801f1c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.298695]  ffff000801f1c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.305896] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4 KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
[   27.701457] ==================================================================
[   27.710858] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   27.718059] Write of size 4 at addr ffff000801ede775 by task kunit_try_catch/219
[   27.725435] 
[   27.726922] CPU: 6 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   27.726981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.726998] Hardware name: WinLink E850-96 board (DT)
[   27.727020] Call trace:
[   27.727033]  show_stack+0x20/0x38 (C)
[   27.727070]  dump_stack_lvl+0x8c/0xd0
[   27.727101]  print_report+0x118/0x608
[   27.727135]  kasan_report+0xdc/0x128
[   27.727164]  kasan_check_range+0x100/0x1a8
[   27.727195]  __asan_memset+0x34/0x78
[   27.727225]  kmalloc_oob_memset_4+0x150/0x300
[   27.727252]  kunit_try_run_case+0x170/0x3f0
[   27.727282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.727317]  kthread+0x328/0x630
[   27.727352]  ret_from_fork+0x10/0x20
[   27.727386] 
[   27.794011] Allocated by task 219:
[   27.797398]  kasan_save_stack+0x3c/0x68
[   27.801215]  kasan_save_track+0x20/0x40
[   27.805034]  kasan_save_alloc_info+0x40/0x58
[   27.809288]  __kasan_kmalloc+0xd4/0xd8
[   27.813020]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.817534]  kmalloc_oob_memset_4+0xb0/0x300
[   27.821789]  kunit_try_run_case+0x170/0x3f0
[   27.825954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.831423]  kthread+0x328/0x630
[   27.834636]  ret_from_fork+0x10/0x20
[   27.838193] 
[   27.839671] The buggy address belongs to the object at ffff000801ede700
[   27.839671]  which belongs to the cache kmalloc-128 of size 128
[   27.852173] The buggy address is located 117 bytes inside of
[   27.852173]  allocated 120-byte region [ffff000801ede700, ffff000801ede778)
[   27.864756] 
[   27.866235] The buggy address belongs to the physical page:
[   27.871790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede
[   27.879775] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.887414] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.894358] page_type: f5(slab)
[   27.897495] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.905213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.912940] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.920751] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.928564] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff
[   27.936376] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.944181] page dumped because: kasan: bad access detected
[   27.949738] 
[   27.951212] Memory state around the buggy address:
[   27.955995]  ffff000801ede600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.963195]  ffff000801ede680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.970400] >ffff000801ede700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.977601]                                                                 ^
[   27.984723]  ffff000801ede780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.991929]  ffff000801ede800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.999130] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2 KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
[   27.394420] ==================================================================
[   27.404090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   27.411292] Write of size 2 at addr ffff000801f1c277 by task kunit_try_catch/217
[   27.418670] 
[   27.420153] CPU: 7 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   27.420207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.420221] Hardware name: WinLink E850-96 board (DT)
[   27.420241] Call trace:
[   27.420255]  show_stack+0x20/0x38 (C)
[   27.420290]  dump_stack_lvl+0x8c/0xd0
[   27.420321]  print_report+0x118/0x608
[   27.420356]  kasan_report+0xdc/0x128
[   27.420387]  kasan_check_range+0x100/0x1a8
[   27.420419]  __asan_memset+0x34/0x78
[   27.420450]  kmalloc_oob_memset_2+0x150/0x2f8
[   27.420480]  kunit_try_run_case+0x170/0x3f0
[   27.420510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.420545]  kthread+0x328/0x630
[   27.420581]  ret_from_fork+0x10/0x20
[   27.420613] 
[   27.487245] Allocated by task 217:
[   27.490633]  kasan_save_stack+0x3c/0x68
[   27.494449]  kasan_save_track+0x20/0x40
[   27.498268]  kasan_save_alloc_info+0x40/0x58
[   27.502521]  __kasan_kmalloc+0xd4/0xd8
[   27.506254]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.510768]  kmalloc_oob_memset_2+0xb0/0x2f8
[   27.515021]  kunit_try_run_case+0x170/0x3f0
[   27.519188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.524657]  kthread+0x328/0x630
[   27.527868]  ret_from_fork+0x10/0x20
[   27.531427] 
[   27.532905] The buggy address belongs to the object at ffff000801f1c200
[   27.532905]  which belongs to the cache kmalloc-128 of size 128
[   27.545405] The buggy address is located 119 bytes inside of
[   27.545405]  allocated 120-byte region [ffff000801f1c200, ffff000801f1c278)
[   27.557989] 
[   27.559469] The buggy address belongs to the physical page:
[   27.565024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c
[   27.573009] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.580648] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.587592] page_type: f5(slab)
[   27.590729] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.598447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.606173] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.613985] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.621798] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff
[   27.629610] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.637417] page dumped because: kasan: bad access detected
[   27.642971] 
[   27.644446] Memory state around the buggy address:
[   27.649229]  ffff000801f1c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.656429]  ffff000801f1c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.663636] >ffff000801f1c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.670835]                                                                 ^
[   27.677956]  ffff000801f1c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.685161]  ffff000801f1c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.692364] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
[   27.087843] ==================================================================
[   27.096978] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   27.104266] Write of size 128 at addr ffff000801ede600 by task kunit_try_catch/215
[   27.111817] 
[   27.113302] CPU: 6 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   27.113358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.113375] Hardware name: WinLink E850-96 board (DT)
[   27.113395] Call trace:
[   27.113407]  show_stack+0x20/0x38 (C)
[   27.113443]  dump_stack_lvl+0x8c/0xd0
[   27.113478]  print_report+0x118/0x608
[   27.113512]  kasan_report+0xdc/0x128
[   27.113541]  kasan_check_range+0x100/0x1a8
[   27.113578]  __asan_memset+0x34/0x78
[   27.113611]  kmalloc_oob_in_memset+0x144/0x2d0
[   27.113641]  kunit_try_run_case+0x170/0x3f0
[   27.113674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.113711]  kthread+0x328/0x630
[   27.113745]  ret_from_fork+0x10/0x20
[   27.113779] 
[   27.180478] Allocated by task 215:
[   27.183866]  kasan_save_stack+0x3c/0x68
[   27.187683]  kasan_save_track+0x20/0x40
[   27.191502]  kasan_save_alloc_info+0x40/0x58
[   27.195755]  __kasan_kmalloc+0xd4/0xd8
[   27.199488]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.204002]  kmalloc_oob_in_memset+0xb0/0x2d0
[   27.208342]  kunit_try_run_case+0x170/0x3f0
[   27.212508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.217977]  kthread+0x328/0x630
[   27.221189]  ret_from_fork+0x10/0x20
[   27.224748] 
[   27.226225] The buggy address belongs to the object at ffff000801ede600
[   27.226225]  which belongs to the cache kmalloc-128 of size 128
[   27.238726] The buggy address is located 0 bytes inside of
[   27.238726]  allocated 120-byte region [ffff000801ede600, ffff000801ede678)
[   27.251136] 
[   27.252616] The buggy address belongs to the physical page:
[   27.258171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede
[   27.266155] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.273795] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.280738] page_type: f5(slab)
[   27.283876] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.291594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.299321] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.307132] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.314945] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff
[   27.322757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.330562] page dumped because: kasan: bad access detected
[   27.336118] 
[   27.337593] Memory state around the buggy address:
[   27.342376]  ffff000801ede500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.349576]  ffff000801ede580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.356782] >ffff000801ede600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.363982]                                                                 ^
[   27.371103]  ffff000801ede680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.378308]  ffff000801ede700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.385511] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16 KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
[   26.783133] ==================================================================
[   26.792296] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   26.799062] Read of size 16 at addr ffff000800e20060 by task kunit_try_catch/213
[   26.806440] 
[   26.807925] CPU: 7 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   26.807980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.807996] Hardware name: WinLink E850-96 board (DT)
[   26.808017] Call trace:
[   26.808031]  show_stack+0x20/0x38 (C)
[   26.808067]  dump_stack_lvl+0x8c/0xd0
[   26.808100]  print_report+0x118/0x608
[   26.808133]  kasan_report+0xdc/0x128
[   26.808162]  __asan_report_load16_noabort+0x20/0x30
[   26.808197]  kmalloc_uaf_16+0x3bc/0x438
[   26.808222]  kunit_try_run_case+0x170/0x3f0
[   26.808255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.808289]  kthread+0x328/0x630
[   26.808324]  ret_from_fork+0x10/0x20
[   26.808357] 
[   26.871716] Allocated by task 213:
[   26.875104]  kasan_save_stack+0x3c/0x68
[   26.878920]  kasan_save_track+0x20/0x40
[   26.882739]  kasan_save_alloc_info+0x40/0x58
[   26.886993]  __kasan_kmalloc+0xd4/0xd8
[   26.890725]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.895239]  kmalloc_uaf_16+0x140/0x438
[   26.899058]  kunit_try_run_case+0x170/0x3f0
[   26.903225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.908694]  kthread+0x328/0x630
[   26.911905]  ret_from_fork+0x10/0x20
[   26.915464] 
[   26.916941] Freed by task 213:
[   26.919978]  kasan_save_stack+0x3c/0x68
[   26.923798]  kasan_save_track+0x20/0x40
[   26.927618]  kasan_save_free_info+0x4c/0x78
[   26.931783]  __kasan_slab_free+0x6c/0x98
[   26.935690]  kfree+0x214/0x3c8
[   26.938728]  kmalloc_uaf_16+0x190/0x438
[   26.942547]  kunit_try_run_case+0x170/0x3f0
[   26.946714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.952182]  kthread+0x328/0x630
[   26.955394]  ret_from_fork+0x10/0x20
[   26.958953] 
[   26.960431] The buggy address belongs to the object at ffff000800e20060
[   26.960431]  which belongs to the cache kmalloc-16 of size 16
[   26.972759] The buggy address is located 0 bytes inside of
[   26.972759]  freed 16-byte region [ffff000800e20060, ffff000800e20070)
[   26.984734] 
[   26.986213] The buggy address belongs to the physical page:
[   26.991769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   26.999753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.006263] page_type: f5(slab)
[   27.009401] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   27.017119] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.024839] page dumped because: kasan: bad access detected
[   27.030393] 
[   27.031868] Memory state around the buggy address:
[   27.036651]  ffff000800e1ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.043852]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.051058] >ffff000800e20000: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   27.058257]                                                        ^
[   27.064598]  ffff000800e20080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.071802]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.079005] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16 KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
[   26.524626] ==================================================================
[   26.533617] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   26.540298] Write of size 16 at addr ffff000800da9680 by task kunit_try_catch/211
[   26.547763] 
[   26.549248] CPU: 6 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   26.549303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.549317] Hardware name: WinLink E850-96 board (DT)
[   26.549337] Call trace:
[   26.549349]  show_stack+0x20/0x38 (C)
[   26.549386]  dump_stack_lvl+0x8c/0xd0
[   26.549420]  print_report+0x118/0x608
[   26.549454]  kasan_report+0xdc/0x128
[   26.549484]  __asan_report_store16_noabort+0x20/0x30
[   26.549523]  kmalloc_oob_16+0x3a0/0x3f8
[   26.549551]  kunit_try_run_case+0x170/0x3f0
[   26.549585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.549618]  kthread+0x328/0x630
[   26.549655]  ret_from_fork+0x10/0x20
[   26.549691] 
[   26.613125] Allocated by task 211:
[   26.616514]  kasan_save_stack+0x3c/0x68
[   26.620330]  kasan_save_track+0x20/0x40
[   26.624149]  kasan_save_alloc_info+0x40/0x58
[   26.628403]  __kasan_kmalloc+0xd4/0xd8
[   26.632135]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.636649]  kmalloc_oob_16+0xb4/0x3f8
[   26.640381]  kunit_try_run_case+0x170/0x3f0
[   26.644548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.650017]  kthread+0x328/0x630
[   26.653229]  ret_from_fork+0x10/0x20
[   26.656787] 
[   26.658267] The buggy address belongs to the object at ffff000800da9680
[   26.658267]  which belongs to the cache kmalloc-16 of size 16
[   26.670592] The buggy address is located 0 bytes inside of
[   26.670592]  allocated 13-byte region [ffff000800da9680, ffff000800da968d)
[   26.682916] 
[   26.684395] The buggy address belongs to the physical page:
[   26.689951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da9
[   26.697936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.704444] page_type: f5(slab)
[   26.707583] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   26.715301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.723019] page dumped because: kasan: bad access detected
[   26.728575] 
[   26.730050] Memory state around the buggy address:
[   26.734834]  ffff000800da9580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.742035]  ffff000800da9600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.749238] >ffff000800da9680: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.756439]                       ^
[   26.759915]  ffff000800da9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.767120]  ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.774322] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
[   23.283866] ==================================================================
[   23.290956] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.298505] Write of size 1 at addr ffff00080348ceda by task kunit_try_catch/203
[   23.305883] 
[   23.307366] CPU: 6 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   23.307418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.307435] Hardware name: WinLink E850-96 board (DT)
[   23.307453] Call trace:
[   23.307465]  show_stack+0x20/0x38 (C)
[   23.307499]  dump_stack_lvl+0x8c/0xd0
[   23.307529]  print_report+0x118/0x608
[   23.307562]  kasan_report+0xdc/0x128
[   23.307590]  __asan_report_store1_noabort+0x20/0x30
[   23.307624]  krealloc_less_oob_helper+0xa80/0xc50
[   23.307653]  krealloc_less_oob+0x20/0x38
[   23.307681]  kunit_try_run_case+0x170/0x3f0
[   23.307712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.307749]  kthread+0x328/0x630
[   23.307784]  ret_from_fork+0x10/0x20
[   23.307815] 
[   23.375934] Allocated by task 203:
[   23.379321]  kasan_save_stack+0x3c/0x68
[   23.383139]  kasan_save_track+0x20/0x40
[   23.386960]  kasan_save_alloc_info+0x40/0x58
[   23.391212]  __kasan_krealloc+0x118/0x178
[   23.395205]  krealloc_noprof+0x128/0x360
[   23.399111]  krealloc_less_oob_helper+0x168/0xc50
[   23.403798]  krealloc_less_oob+0x20/0x38
[   23.407704]  kunit_try_run_case+0x170/0x3f0
[   23.411871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.417339]  kthread+0x328/0x630
[   23.420553]  ret_from_fork+0x10/0x20
[   23.424109] 
[   23.425587] The buggy address belongs to the object at ffff00080348ce00
[   23.425587]  which belongs to the cache kmalloc-256 of size 256
[   23.438088] The buggy address is located 17 bytes to the right of
[   23.438088]  allocated 201-byte region [ffff00080348ce00, ffff00080348cec9)
[   23.451106] 
[   23.452584] The buggy address belongs to the physical page:
[   23.458141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88348c
[   23.466125] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.473764] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.480709] page_type: f5(slab)
[   23.483845] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.491564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.499290] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.507102] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.514915] head: 0bfffe0000000002 fffffdffe00d2301 00000000ffffffff 00000000ffffffff
[   23.522727] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.530532] page dumped because: kasan: bad access detected
[   23.536088] 
[   23.537563] Memory state around the buggy address:
[   23.542345]  ffff00080348cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.549546]  ffff00080348ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.556753] >ffff00080348ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.563952]                                                     ^
[   23.570032]  ffff00080348cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.577237]  ffff00080348cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.584438] ==================================================================
[   25.145382] ==================================================================
[   25.152475] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   25.160022] Write of size 1 at addr ffff00080349a0da by task kunit_try_catch/207
[   25.167400] 
[   25.168884] CPU: 6 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   25.168936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.168950] Hardware name: WinLink E850-96 board (DT)
[   25.168967] Call trace:
[   25.168979]  show_stack+0x20/0x38 (C)
[   25.169012]  dump_stack_lvl+0x8c/0xd0
[   25.169043]  print_report+0x118/0x608
[   25.169076]  kasan_report+0xdc/0x128
[   25.169105]  __asan_report_store1_noabort+0x20/0x30
[   25.169139]  krealloc_less_oob_helper+0xa80/0xc50
[   25.169170]  krealloc_large_less_oob+0x20/0x38
[   25.169199]  kunit_try_run_case+0x170/0x3f0
[   25.169230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.169263]  kthread+0x328/0x630
[   25.169296]  ret_from_fork+0x10/0x20
[   25.169329] 
[   25.237974] The buggy address belongs to the physical page:
[   25.243531] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498
[   25.251515] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.259155] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.266097] page_type: f8(unknown)
[   25.269491] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.277214] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.284940] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.292752] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.300565] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff
[   25.308377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.316183] page dumped because: kasan: bad access detected
[   25.321738] 
[   25.323214] Memory state around the buggy address:
[   25.327994]  ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.335197]  ffff00080349a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.342401] >ffff00080349a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.349602]                                                     ^
[   25.355682]  ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.362887]  ffff00080349a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.370088] ==================================================================
[   22.976557] ==================================================================
[   22.983410] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   22.990958] Write of size 1 at addr ffff00080348ced0 by task kunit_try_catch/203
[   22.998336] 
[   22.999820] CPU: 6 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   22.999877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.999894] Hardware name: WinLink E850-96 board (DT)
[   22.999912] Call trace:
[   22.999925]  show_stack+0x20/0x38 (C)
[   22.999959]  dump_stack_lvl+0x8c/0xd0
[   22.999990]  print_report+0x118/0x608
[   23.000021]  kasan_report+0xdc/0x128
[   23.000049]  __asan_report_store1_noabort+0x20/0x30
[   23.000085]  krealloc_less_oob_helper+0xb9c/0xc50
[   23.000115]  krealloc_less_oob+0x20/0x38
[   23.000142]  kunit_try_run_case+0x170/0x3f0
[   23.000177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.000210]  kthread+0x328/0x630
[   23.000244]  ret_from_fork+0x10/0x20
[   23.000275] 
[   23.068386] Allocated by task 203:
[   23.071774]  kasan_save_stack+0x3c/0x68
[   23.075591]  kasan_save_track+0x20/0x40
[   23.079412]  kasan_save_alloc_info+0x40/0x58
[   23.083664]  __kasan_krealloc+0x118/0x178
[   23.087657]  krealloc_noprof+0x128/0x360
[   23.091563]  krealloc_less_oob_helper+0x168/0xc50
[   23.096251]  krealloc_less_oob+0x20/0x38
[   23.100157]  kunit_try_run_case+0x170/0x3f0
[   23.104323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.109792]  kthread+0x328/0x630
[   23.113005]  ret_from_fork+0x10/0x20
[   23.116563] 
[   23.118040] The buggy address belongs to the object at ffff00080348ce00
[   23.118040]  which belongs to the cache kmalloc-256 of size 256
[   23.130541] The buggy address is located 7 bytes to the right of
[   23.130541]  allocated 201-byte region [ffff00080348ce00, ffff00080348cec9)
[   23.143472] 
[   23.144950] The buggy address belongs to the physical page:
[   23.150507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88348c
[   23.158491] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.166128] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.173074] page_type: f5(slab)
[   23.176208] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.183930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.191656] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.199467] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.207280] head: 0bfffe0000000002 fffffdffe00d2301 00000000ffffffff 00000000ffffffff
[   23.215092] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.222898] page dumped because: kasan: bad access detected
[   23.228453] 
[   23.229929] Memory state around the buggy address:
[   23.234709]  ffff00080348cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.241912]  ffff00080348ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.249117] >ffff00080348ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.256318]                                                  ^
[   23.262137]  ffff00080348cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.269342]  ffff00080348cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.276543] ==================================================================
[   23.900260] ==================================================================
[   23.907267] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.914815] Write of size 1 at addr ffff00080348ceeb by task kunit_try_catch/203
[   23.922193] 
[   23.923676] CPU: 6 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   23.923729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.923743] Hardware name: WinLink E850-96 board (DT)
[   23.923761] Call trace:
[   23.923775]  show_stack+0x20/0x38 (C)
[   23.923808]  dump_stack_lvl+0x8c/0xd0
[   23.923840]  print_report+0x118/0x608
[   23.923872]  kasan_report+0xdc/0x128
[   23.923900]  __asan_report_store1_noabort+0x20/0x30
[   23.923937]  krealloc_less_oob_helper+0xa58/0xc50
[   23.923968]  krealloc_less_oob+0x20/0x38
[   23.923998]  kunit_try_run_case+0x170/0x3f0
[   23.924028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.924062]  kthread+0x328/0x630
[   23.924093]  ret_from_fork+0x10/0x20
[   23.924123] 
[   23.992244] Allocated by task 203:
[   23.995632]  kasan_save_stack+0x3c/0x68
[   23.999449]  kasan_save_track+0x20/0x40
[   24.003268]  kasan_save_alloc_info+0x40/0x58
[   24.007522]  __kasan_krealloc+0x118/0x178
[   24.011515]  krealloc_noprof+0x128/0x360
[   24.015421]  krealloc_less_oob_helper+0x168/0xc50
[   24.020108]  krealloc_less_oob+0x20/0x38
[   24.024015]  kunit_try_run_case+0x170/0x3f0
[   24.028181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.033650]  kthread+0x328/0x630
[   24.036861]  ret_from_fork+0x10/0x20
[   24.040420] 
[   24.041898] The buggy address belongs to the object at ffff00080348ce00
[   24.041898]  which belongs to the cache kmalloc-256 of size 256
[   24.054399] The buggy address is located 34 bytes to the right of
[   24.054399]  allocated 201-byte region [ffff00080348ce00, ffff00080348cec9)
[   24.067417] 
[   24.068894] The buggy address belongs to the physical page:
[   24.074452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88348c
[   24.082436] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.090076] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.097018] page_type: f5(slab)
[   24.100155] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.107874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.115600] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.123412] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.131225] head: 0bfffe0000000002 fffffdffe00d2301 00000000ffffffff 00000000ffffffff
[   24.139037] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.146842] page dumped because: kasan: bad access detected
[   24.152398] 
[   24.153874] Memory state around the buggy address:
[   24.158653]  ffff00080348cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.165857]  ffff00080348ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.173063] >ffff00080348ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.180262]                                                           ^
[   24.186863]  ffff00080348cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.194068]  ffff00080348cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.201269] ==================================================================
[   24.679225] ==================================================================
[   24.689200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   24.696751] Write of size 1 at addr ffff00080349a0c9 by task kunit_try_catch/207
[   24.704126] 
[   24.705612] CPU: 6 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   24.705672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.705688] Hardware name: WinLink E850-96 board (DT)
[   24.705708] Call trace:
[   24.705720]  show_stack+0x20/0x38 (C)
[   24.705755]  dump_stack_lvl+0x8c/0xd0
[   24.705788]  print_report+0x118/0x608
[   24.705821]  kasan_report+0xdc/0x128
[   24.705852]  __asan_report_store1_noabort+0x20/0x30
[   24.705890]  krealloc_less_oob_helper+0xa48/0xc50
[   24.705920]  krealloc_large_less_oob+0x20/0x38
[   24.705949]  kunit_try_run_case+0x170/0x3f0
[   24.705982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.706016]  kthread+0x328/0x630
[   24.706051]  ret_from_fork+0x10/0x20
[   24.706085] 
[   24.774699] The buggy address belongs to the physical page:
[   24.780257] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498
[   24.788241] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.795882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.802824] page_type: f8(unknown)
[   24.806222] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.813939] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.821666] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.829478] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.837291] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff
[   24.845102] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.852910] page dumped because: kasan: bad access detected
[   24.858464] 
[   24.859939] Memory state around the buggy address:
[   24.864719]  ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.871923]  ffff00080349a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.879127] >ffff00080349a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.886328]                                               ^
[   24.891887]  ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.899092]  ffff00080349a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.906295] ==================================================================
[   25.609947] ==================================================================
[   25.617050] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   25.624598] Write of size 1 at addr ffff00080349a0eb by task kunit_try_catch/207
[   25.631976] 
[   25.633458] CPU: 6 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   25.633505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.633520] Hardware name: WinLink E850-96 board (DT)
[   25.633537] Call trace:
[   25.633549]  show_stack+0x20/0x38 (C)
[   25.633581]  dump_stack_lvl+0x8c/0xd0
[   25.633611]  print_report+0x118/0x608
[   25.633643]  kasan_report+0xdc/0x128
[   25.633672]  __asan_report_store1_noabort+0x20/0x30
[   25.633705]  krealloc_less_oob_helper+0xa58/0xc50
[   25.633738]  krealloc_large_less_oob+0x20/0x38
[   25.633767]  kunit_try_run_case+0x170/0x3f0
[   25.633797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.633833]  kthread+0x328/0x630
[   25.633868]  ret_from_fork+0x10/0x20
[   25.633900] 
[   25.702550] The buggy address belongs to the physical page:
[   25.708107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498
[   25.716092] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.723729] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.730673] page_type: f8(unknown)
[   25.734069] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.741790] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.749517] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.757328] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.765142] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff
[   25.772953] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.780759] page dumped because: kasan: bad access detected
[   25.786314] 
[   25.787790] Memory state around the buggy address:
[   25.792574]  ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.799773]  ffff00080349a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.806980] >ffff00080349a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.814178]                                                           ^
[   25.820779]  ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.827984]  ffff00080349a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.835186] ==================================================================
[   24.913812] ==================================================================
[   24.920708] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   24.928255] Write of size 1 at addr ffff00080349a0d0 by task kunit_try_catch/207
[   24.935633] 
[   24.937117] CPU: 6 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   24.937173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.937190] Hardware name: WinLink E850-96 board (DT)
[   24.937208] Call trace:
[   24.937222]  show_stack+0x20/0x38 (C)
[   24.937253]  dump_stack_lvl+0x8c/0xd0
[   24.937283]  print_report+0x118/0x608
[   24.937315]  kasan_report+0xdc/0x128
[   24.937347]  __asan_report_store1_noabort+0x20/0x30
[   24.937384]  krealloc_less_oob_helper+0xb9c/0xc50
[   24.937414]  krealloc_large_less_oob+0x20/0x38
[   24.937444]  kunit_try_run_case+0x170/0x3f0
[   24.937474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.937506]  kthread+0x328/0x630
[   24.937538]  ret_from_fork+0x10/0x20
[   24.937571] 
[   25.006205] The buggy address belongs to the physical page:
[   25.011764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498
[   25.019748] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.027387] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.034331] page_type: f8(unknown)
[   25.037727] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.045447] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.053173] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.060985] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.068798] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff
[   25.076610] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.084418] page dumped because: kasan: bad access detected
[   25.089970] 
[   25.091446] Memory state around the buggy address:
[   25.096224]  ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.103429]  ffff00080349a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.110634] >ffff00080349a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.117835]                                                  ^
[   25.123655]  ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.130859]  ffff00080349a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.138062] ==================================================================
[   23.591776] ==================================================================
[   23.598849] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.606400] Write of size 1 at addr ffff00080348ceea by task kunit_try_catch/203
[   23.613778] 
[   23.615261] CPU: 6 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   23.615310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.615324] Hardware name: WinLink E850-96 board (DT)
[   23.615342] Call trace:
[   23.615352]  show_stack+0x20/0x38 (C)
[   23.615382]  dump_stack_lvl+0x8c/0xd0
[   23.615413]  print_report+0x118/0x608
[   23.615444]  kasan_report+0xdc/0x128
[   23.615473]  __asan_report_store1_noabort+0x20/0x30
[   23.615511]  krealloc_less_oob_helper+0xae4/0xc50
[   23.615542]  krealloc_less_oob+0x20/0x38
[   23.615569]  kunit_try_run_case+0x170/0x3f0
[   23.615599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.615630]  kthread+0x328/0x630
[   23.615664]  ret_from_fork+0x10/0x20
[   23.615696] 
[   23.683828] Allocated by task 203:
[   23.687216]  kasan_save_stack+0x3c/0x68
[   23.691034]  kasan_save_track+0x20/0x40
[   23.694853]  kasan_save_alloc_info+0x40/0x58
[   23.699107]  __kasan_krealloc+0x118/0x178
[   23.703099]  krealloc_noprof+0x128/0x360
[   23.707006]  krealloc_less_oob_helper+0x168/0xc50
[   23.711693]  krealloc_less_oob+0x20/0x38
[   23.715599]  kunit_try_run_case+0x170/0x3f0
[   23.719766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.725234]  kthread+0x328/0x630
[   23.728446]  ret_from_fork+0x10/0x20
[   23.732005] 
[   23.733480] The buggy address belongs to the object at ffff00080348ce00
[   23.733480]  which belongs to the cache kmalloc-256 of size 256
[   23.745981] The buggy address is located 33 bytes to the right of
[   23.745981]  allocated 201-byte region [ffff00080348ce00, ffff00080348cec9)
[   23.759001] 
[   23.760477] The buggy address belongs to the physical page:
[   23.766037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88348c
[   23.774020] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.781657] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.788602] page_type: f5(slab)
[   23.791736] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.799459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.807185] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.814997] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.822810] head: 0bfffe0000000002 fffffdffe00d2301 00000000ffffffff 00000000ffffffff
[   23.830621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.838429] page dumped because: kasan: bad access detected
[   23.843983] 
[   23.845458] Memory state around the buggy address:
[   23.850238]  ffff00080348cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.857441]  ffff00080348ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.864647] >ffff00080348ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.871847]                                                           ^
[   23.878448]  ffff00080348cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.885652]  ffff00080348cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.892854] ==================================================================
[   25.377378] ==================================================================
[   25.384499] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   25.392050] Write of size 1 at addr ffff00080349a0ea by task kunit_try_catch/207
[   25.399428] 
[   25.400909] CPU: 6 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   25.400956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.400971] Hardware name: WinLink E850-96 board (DT)
[   25.400987] Call trace:
[   25.400997]  show_stack+0x20/0x38 (C)
[   25.401030]  dump_stack_lvl+0x8c/0xd0
[   25.401061]  print_report+0x118/0x608
[   25.401093]  kasan_report+0xdc/0x128
[   25.401122]  __asan_report_store1_noabort+0x20/0x30
[   25.401159]  krealloc_less_oob_helper+0xae4/0xc50
[   25.401188]  krealloc_large_less_oob+0x20/0x38
[   25.401217]  kunit_try_run_case+0x170/0x3f0
[   25.401247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.401283]  kthread+0x328/0x630
[   25.401317]  ret_from_fork+0x10/0x20
[   25.401348] 
[   25.470001] The buggy address belongs to the physical page:
[   25.475559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498
[   25.483542] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.491183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.498124] page_type: f8(unknown)
[   25.501519] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.509242] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.516968] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.524781] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.532593] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff
[   25.540405] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.548211] page dumped because: kasan: bad access detected
[   25.553766] 
[   25.555241] Memory state around the buggy address:
[   25.560019]  ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.567224]  ffff00080349a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.574429] >ffff00080349a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.581630]                                                           ^
[   25.588231]  ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.595436]  ffff00080349a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.602637] ==================================================================
[   22.666757] ==================================================================
[   22.676124] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   22.683674] Write of size 1 at addr ffff00080348cec9 by task kunit_try_catch/203
[   22.691051] 
[   22.692536] CPU: 6 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   22.692599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.692617] Hardware name: WinLink E850-96 board (DT)
[   22.692638] Call trace:
[   22.692650]  show_stack+0x20/0x38 (C)
[   22.692688]  dump_stack_lvl+0x8c/0xd0
[   22.692721]  print_report+0x118/0x608
[   22.692757]  kasan_report+0xdc/0x128
[   22.692790]  __asan_report_store1_noabort+0x20/0x30
[   22.692828]  krealloc_less_oob_helper+0xa48/0xc50
[   22.692860]  krealloc_less_oob+0x20/0x38
[   22.692888]  kunit_try_run_case+0x170/0x3f0
[   22.692922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.692955]  kthread+0x328/0x630
[   22.692988]  ret_from_fork+0x10/0x20
[   22.693024] 
[   22.761101] Allocated by task 203:
[   22.764489]  kasan_save_stack+0x3c/0x68
[   22.768305]  kasan_save_track+0x20/0x40
[   22.772125]  kasan_save_alloc_info+0x40/0x58
[   22.776377]  __kasan_krealloc+0x118/0x178
[   22.780370]  krealloc_noprof+0x128/0x360
[   22.784276]  krealloc_less_oob_helper+0x168/0xc50
[   22.788964]  krealloc_less_oob+0x20/0x38
[   22.792870]  kunit_try_run_case+0x170/0x3f0
[   22.797037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.802505]  kthread+0x328/0x630
[   22.805718]  ret_from_fork+0x10/0x20
[   22.809276] 
[   22.810753] The buggy address belongs to the object at ffff00080348ce00
[   22.810753]  which belongs to the cache kmalloc-256 of size 256
[   22.823254] The buggy address is located 0 bytes to the right of
[   22.823254]  allocated 201-byte region [ffff00080348ce00, ffff00080348cec9)
[   22.836185] 
[   22.837665] The buggy address belongs to the physical page:
[   22.843220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88348c
[   22.851204] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.858843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.865787] page_type: f5(slab)
[   22.868925] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.876643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.884369] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.892180] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.899993] head: 0bfffe0000000002 fffffdffe00d2301 00000000ffffffff 00000000ffffffff
[   22.907805] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.915611] page dumped because: kasan: bad access detected
[   22.921166] 
[   22.922642] Memory state around the buggy address:
[   22.927425]  ffff00080348cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.934627]  ffff00080348ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.941831] >ffff00080348ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.949031]                                               ^
[   22.954590]  ffff00080348cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.961797]  ffff00080348cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.968998] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
[   24.210139] ==================================================================
[   24.219507] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   24.227054] Write of size 1 at addr ffff0008067a20eb by task kunit_try_catch/205
[   24.234429] 
[   24.235916] CPU: 7 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   24.235972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.235988] Hardware name: WinLink E850-96 board (DT)
[   24.236008] Call trace:
[   24.236020]  show_stack+0x20/0x38 (C)
[   24.236057]  dump_stack_lvl+0x8c/0xd0
[   24.236088]  print_report+0x118/0x608
[   24.236119]  kasan_report+0xdc/0x128
[   24.236148]  __asan_report_store1_noabort+0x20/0x30
[   24.236185]  krealloc_more_oob_helper+0x60c/0x678
[   24.236215]  krealloc_large_more_oob+0x20/0x38
[   24.236243]  kunit_try_run_case+0x170/0x3f0
[   24.236278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.236312]  kthread+0x328/0x630
[   24.236346]  ret_from_fork+0x10/0x20
[   24.236381] 
[   24.305004] The buggy address belongs to the physical page:
[   24.310559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867a0
[   24.318543] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.326184] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.333126] page_type: f8(unknown)
[   24.336524] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.344242] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.351968] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.359780] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.367593] head: 0bfffe0000000002 fffffdffe019e801 00000000ffffffff 00000000ffffffff
[   24.375405] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.383212] page dumped because: kasan: bad access detected
[   24.388767] 
[   24.390241] Memory state around the buggy address:
[   24.395024]  ffff0008067a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.402224]  ffff0008067a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.409429] >ffff0008067a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.416630]                                                           ^
[   24.423231]  ffff0008067a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.430436]  ffff0008067a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.437638] ==================================================================
[   22.046304] ==================================================================
[   22.055385] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   22.062935] Write of size 1 at addr ffff0008034c88eb by task kunit_try_catch/201
[   22.070313] 
[   22.071799] CPU: 7 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   22.071857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.071874] Hardware name: WinLink E850-96 board (DT)
[   22.071896] Call trace:
[   22.071910]  show_stack+0x20/0x38 (C)
[   22.071947]  dump_stack_lvl+0x8c/0xd0
[   22.071980]  print_report+0x118/0x608
[   22.072014]  kasan_report+0xdc/0x128
[   22.072045]  __asan_report_store1_noabort+0x20/0x30
[   22.072082]  krealloc_more_oob_helper+0x60c/0x678
[   22.072111]  krealloc_more_oob+0x20/0x38
[   22.072138]  kunit_try_run_case+0x170/0x3f0
[   22.072172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.072208]  kthread+0x328/0x630
[   22.072242]  ret_from_fork+0x10/0x20
[   22.072276] 
[   22.140362] Allocated by task 201:
[   22.143752]  kasan_save_stack+0x3c/0x68
[   22.147568]  kasan_save_track+0x20/0x40
[   22.151387]  kasan_save_alloc_info+0x40/0x58
[   22.155640]  __kasan_krealloc+0x118/0x178
[   22.159633]  krealloc_noprof+0x128/0x360
[   22.163539]  krealloc_more_oob_helper+0x168/0x678
[   22.168226]  krealloc_more_oob+0x20/0x38
[   22.172133]  kunit_try_run_case+0x170/0x3f0
[   22.176299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.181768]  kthread+0x328/0x630
[   22.184981]  ret_from_fork+0x10/0x20
[   22.188539] 
[   22.190017] The buggy address belongs to the object at ffff0008034c8800
[   22.190017]  which belongs to the cache kmalloc-256 of size 256
[   22.202517] The buggy address is located 0 bytes to the right of
[   22.202517]  allocated 235-byte region [ffff0008034c8800, ffff0008034c88eb)
[   22.215448] 
[   22.216928] The buggy address belongs to the physical page:
[   22.222483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834c8
[   22.230467] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.238106] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.245050] page_type: f5(slab)
[   22.248188] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.255905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.263632] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.271443] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.279256] head: 0bfffe0000000002 fffffdffe00d3201 00000000ffffffff 00000000ffffffff
[   22.287068] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.294874] page dumped because: kasan: bad access detected
[   22.300429] 
[   22.301905] Memory state around the buggy address:
[   22.306687]  ffff0008034c8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.313889]  ffff0008034c8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.321094] >ffff0008034c8880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.328294]                                                           ^
[   22.334894]  ffff0008034c8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.342099]  ffff0008034c8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.349302] ==================================================================
[   22.356624] ==================================================================
[   22.363713] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   22.371262] Write of size 1 at addr ffff0008034c88f0 by task kunit_try_catch/201
[   22.378640] 
[   22.380125] CPU: 7 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   22.380176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.380192] Hardware name: WinLink E850-96 board (DT)
[   22.380209] Call trace:
[   22.380223]  show_stack+0x20/0x38 (C)
[   22.380255]  dump_stack_lvl+0x8c/0xd0
[   22.380286]  print_report+0x118/0x608
[   22.380319]  kasan_report+0xdc/0x128
[   22.380347]  __asan_report_store1_noabort+0x20/0x30
[   22.380382]  krealloc_more_oob_helper+0x5c0/0x678
[   22.380411]  krealloc_more_oob+0x20/0x38
[   22.380440]  kunit_try_run_case+0x170/0x3f0
[   22.380470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.380502]  kthread+0x328/0x630
[   22.380534]  ret_from_fork+0x10/0x20
[   22.380567] 
[   22.448691] Allocated by task 201:
[   22.452077]  kasan_save_stack+0x3c/0x68
[   22.455896]  kasan_save_track+0x20/0x40
[   22.459717]  kasan_save_alloc_info+0x40/0x58
[   22.463968]  __kasan_krealloc+0x118/0x178
[   22.467961]  krealloc_noprof+0x128/0x360
[   22.471868]  krealloc_more_oob_helper+0x168/0x678
[   22.476555]  krealloc_more_oob+0x20/0x38
[   22.480461]  kunit_try_run_case+0x170/0x3f0
[   22.484628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.490097]  kthread+0x328/0x630
[   22.493308]  ret_from_fork+0x10/0x20
[   22.496867] 
[   22.498345] The buggy address belongs to the object at ffff0008034c8800
[   22.498345]  which belongs to the cache kmalloc-256 of size 256
[   22.510845] The buggy address is located 5 bytes to the right of
[   22.510845]  allocated 235-byte region [ffff0008034c8800, ffff0008034c88eb)
[   22.523777] 
[   22.525252] The buggy address belongs to the physical page:
[   22.530812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834c8
[   22.538794] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.546434] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.553377] page_type: f5(slab)
[   22.556513] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.564234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.571960] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.579772] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.587585] head: 0bfffe0000000002 fffffdffe00d3201 00000000ffffffff 00000000ffffffff
[   22.595397] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.603202] page dumped because: kasan: bad access detected
[   22.608758] 
[   22.610233] Memory state around the buggy address:
[   22.615013]  ffff0008034c8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.622218]  ffff0008034c8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.629421] >ffff0008034c8880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.636622]                                                              ^
[   22.643483]  ffff0008034c8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.650688]  ffff0008034c8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.657889] ==================================================================
[   24.444944] ==================================================================
[   24.452051] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   24.459599] Write of size 1 at addr ffff0008067a20f0 by task kunit_try_catch/205
[   24.466977] 
[   24.468459] CPU: 7 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   24.468508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.468523] Hardware name: WinLink E850-96 board (DT)
[   24.468543] Call trace:
[   24.468554]  show_stack+0x20/0x38 (C)
[   24.468584]  dump_stack_lvl+0x8c/0xd0
[   24.468614]  print_report+0x118/0x608
[   24.468644]  kasan_report+0xdc/0x128
[   24.468673]  __asan_report_store1_noabort+0x20/0x30
[   24.468708]  krealloc_more_oob_helper+0x5c0/0x678
[   24.468737]  krealloc_large_more_oob+0x20/0x38
[   24.468767]  kunit_try_run_case+0x170/0x3f0
[   24.468796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.468828]  kthread+0x328/0x630
[   24.468862]  ret_from_fork+0x10/0x20
[   24.468892] 
[   24.537549] The buggy address belongs to the physical page:
[   24.543107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867a0
[   24.551090] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.558731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.565673] page_type: f8(unknown)
[   24.569066] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.576790] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.584517] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.592328] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.600141] head: 0bfffe0000000002 fffffdffe019e801 00000000ffffffff 00000000ffffffff
[   24.607953] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.615760] page dumped because: kasan: bad access detected
[   24.621315] 
[   24.622790] Memory state around the buggy address:
[   24.627568]  ffff0008067a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.634773]  ffff0008067a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.641978] >ffff0008067a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.649179]                                                              ^
[   24.656040]  ffff0008067a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.663245]  ffff0008067a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.670446] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-use-after-free-in-page_alloc_uaf KNOWN ISSUE - log-parser-test/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
[   21.854485] ==================================================================
[   21.868842] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   21.875177] Read of size 1 at addr ffff0008067a0000 by task kunit_try_catch/199
[   21.882469] 
[   21.883952] CPU: 6 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   21.884014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.884030] Hardware name: WinLink E850-96 board (DT)
[   21.884048] Call trace:
[   21.884061]  show_stack+0x20/0x38 (C)
[   21.884098]  dump_stack_lvl+0x8c/0xd0
[   21.884129]  print_report+0x118/0x608
[   21.884165]  kasan_report+0xdc/0x128
[   21.884196]  __asan_report_load1_noabort+0x20/0x30
[   21.884234]  page_alloc_uaf+0x328/0x350
[   21.884263]  kunit_try_run_case+0x170/0x3f0
[   21.884296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.884329]  kthread+0x328/0x630
[   21.884364]  ret_from_fork+0x10/0x20
[   21.884396] 
[   21.947660] The buggy address belongs to the physical page:
[   21.953216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867a0
[   21.961201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.967711] page_type: f0(buddy)
[   21.970935] raw: 0bfffe0000000000 ffff00087f61bcc8 ffff00087f61bcc8 0000000000000000
[   21.978652] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   21.986372] page dumped because: kasan: bad access detected
[   21.991927] 
[   21.993403] Memory state around the buggy address:
[   21.998186]  ffff00080679ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.005386]  ffff00080679ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.012590] >ffff0008067a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.019791]                    ^
[   22.023007]  ffff0008067a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.030211]  ffff0008067a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.037414] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-invalid-free-in-kfree KNOWN ISSUE - log-parser-test/kasan-bug-kasan-invalid-free-in-kfree: Failure
[   21.618143] ==================================================================
[   21.627354] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   21.632735] Free of addr ffff000803498001 by task kunit_try_catch/195
[   21.639156] 
[   21.640642] CPU: 6 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   21.640699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.640716] Hardware name: WinLink E850-96 board (DT)
[   21.640738] Call trace:
[   21.640750]  show_stack+0x20/0x38 (C)
[   21.640790]  dump_stack_lvl+0x8c/0xd0
[   21.640823]  print_report+0x118/0x608
[   21.640859]  kasan_report_invalid_free+0xc0/0xe8
[   21.640893]  __kasan_kfree_large+0x5c/0xa8
[   21.640927]  free_large_kmalloc+0x64/0x190
[   21.640957]  kfree+0x270/0x3c8
[   21.640984]  kmalloc_large_invalid_free+0x108/0x270
[   21.641015]  kunit_try_run_case+0x170/0x3f0
[   21.641047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.641083]  kthread+0x328/0x630
[   21.641119]  ret_from_fork+0x10/0x20
[   21.641151] 
[   21.712856] The buggy address belongs to the physical page:
[   21.718411] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498
[   21.726394] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.734034] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.740977] page_type: f8(unknown)
[   21.744374] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.752093] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.759821] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.767631] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.775444] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff
[   21.783256] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.791063] page dumped because: kasan: bad access detected
[   21.796617] 
[   21.798092] Memory state around the buggy address:
[   21.802873]  ffff000803497f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.810076]  ffff000803497f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.817282] >ffff000803498000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.824481]                    ^
[   21.827697]  ffff000803498080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.834902]  ffff000803498100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.842104] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf KNOWN ISSUE - log-parser-test/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
[   21.433627] ==================================================================
[   21.443329] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   21.449923] Read of size 1 at addr ffff000803500000 by task kunit_try_catch/193
[   21.457214] 
[   21.458701] CPU: 7 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   21.458755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.458772] Hardware name: WinLink E850-96 board (DT)
[   21.458793] Call trace:
[   21.458806]  show_stack+0x20/0x38 (C)
[   21.458844]  dump_stack_lvl+0x8c/0xd0
[   21.458876]  print_report+0x118/0x608
[   21.458909]  kasan_report+0xdc/0x128
[   21.458943]  __asan_report_load1_noabort+0x20/0x30
[   21.458981]  kmalloc_large_uaf+0x2cc/0x2f8
[   21.459007]  kunit_try_run_case+0x170/0x3f0
[   21.459039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.459073]  kthread+0x328/0x630
[   21.459107]  ret_from_fork+0x10/0x20
[   21.459143] 
[   21.522667] The buggy address belongs to the physical page:
[   21.528222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883500
[   21.536209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.542730] raw: 0bfffe0000000000 ffff00085b012f00 ffff00085b012f00 0000000000000000
[   21.550447] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   21.558168] page dumped because: kasan: bad access detected
[   21.563722] 
[   21.565197] Memory state around the buggy address:
[   21.569981]  ffff0008034fff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.577180]  ffff0008034fff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.584387] >ffff000803500000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.591586]                    ^
[   21.594801]  ffff000803500080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.602006]  ffff000803500100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.609209] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
[   21.204636] ==================================================================
[   21.214255] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   21.221716] Write of size 1 at addr ffff00080349a00a by task kunit_try_catch/191
[   21.229093] 
[   21.230580] CPU: 6 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   21.230637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.230654] Hardware name: WinLink E850-96 board (DT)
[   21.230675] Call trace:
[   21.230688]  show_stack+0x20/0x38 (C)
[   21.230727]  dump_stack_lvl+0x8c/0xd0
[   21.230759]  print_report+0x118/0x608
[   21.230792]  kasan_report+0xdc/0x128
[   21.230822]  __asan_report_store1_noabort+0x20/0x30
[   21.230859]  kmalloc_large_oob_right+0x278/0x2b8
[   21.230887]  kunit_try_run_case+0x170/0x3f0
[   21.230918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.230953]  kthread+0x328/0x630
[   21.230987]  ret_from_fork+0x10/0x20
[   21.231023] 
[   21.295153] The buggy address belongs to the physical page:
[   21.300709] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498
[   21.308693] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.316333] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.323275] page_type: f8(unknown)
[   21.326673] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.334391] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.342118] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.349929] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.357742] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff
[   21.365554] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.373360] page dumped because: kasan: bad access detected
[   21.378915] 
[   21.380391] Memory state around the buggy address:
[   21.385172]  ffff000803499f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.392374]  ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.399580] >ffff00080349a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.406780]                       ^
[   21.410256]  ffff00080349a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.417460]  ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.424663] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
[   20.903028] ==================================================================
[   20.913484] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   20.920767] Write of size 1 at addr ffff000806189f00 by task kunit_try_catch/189
[   20.928141] 
[   20.929629] CPU: 7 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.929687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.929702] Hardware name: WinLink E850-96 board (DT)
[   20.929723] Call trace:
[   20.929735]  show_stack+0x20/0x38 (C)
[   20.929772]  dump_stack_lvl+0x8c/0xd0
[   20.929806]  print_report+0x118/0x608
[   20.929842]  kasan_report+0xdc/0x128
[   20.929872]  __asan_report_store1_noabort+0x20/0x30
[   20.929911]  kmalloc_big_oob_right+0x2a4/0x2f0
[   20.929939]  kunit_try_run_case+0x170/0x3f0
[   20.929972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.930007]  kthread+0x328/0x630
[   20.930042]  ret_from_fork+0x10/0x20
[   20.930078] 
[   20.994026] Allocated by task 189:
[   20.997415]  kasan_save_stack+0x3c/0x68
[   21.001230]  kasan_save_track+0x20/0x40
[   21.005049]  kasan_save_alloc_info+0x40/0x58
[   21.009303]  __kasan_kmalloc+0xd4/0xd8
[   21.013036]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.017549]  kmalloc_big_oob_right+0xb8/0x2f0
[   21.021891]  kunit_try_run_case+0x170/0x3f0
[   21.026056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.031525]  kthread+0x328/0x630
[   21.034737]  ret_from_fork+0x10/0x20
[   21.038295] 
[   21.039774] The buggy address belongs to the object at ffff000806188000
[   21.039774]  which belongs to the cache kmalloc-8k of size 8192
[   21.052274] The buggy address is located 0 bytes to the right of
[   21.052274]  allocated 7936-byte region [ffff000806188000, ffff000806189f00)
[   21.065292] 
[   21.066771] The buggy address belongs to the physical page:
[   21.072326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886188
[   21.080310] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.087949] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.094894] page_type: f5(slab)
[   21.098031] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   21.105749] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.113475] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   21.121287] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.129100] head: 0bfffe0000000003 fffffdffe0186201 00000000ffffffff 00000000ffffffff
[   21.136912] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   21.144719] page dumped because: kasan: bad access detected
[   21.150273] 
[   21.151749] Memory state around the buggy address:
[   21.156531]  ffff000806189e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.163731]  ffff000806189e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.170936] >ffff000806189f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.178137]                    ^
[   21.181353]  ffff000806189f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.188559]  ffff00080618a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.195760] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
[   20.432603] ==================================================================
[   20.442304] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   20.450372] Write of size 1 at addr ffff000801eaa178 by task kunit_try_catch/187
[   20.457750] 
[   20.459236] CPU: 5 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.459292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.459308] Hardware name: WinLink E850-96 board (DT)
[   20.459329] Call trace:
[   20.459343]  show_stack+0x20/0x38 (C)
[   20.459382]  dump_stack_lvl+0x8c/0xd0
[   20.459417]  print_report+0x118/0x608
[   20.459451]  kasan_report+0xdc/0x128
[   20.459481]  __asan_report_store1_noabort+0x20/0x30
[   20.459518]  kmalloc_track_caller_oob_right+0x40c/0x488
[   20.459551]  kunit_try_run_case+0x170/0x3f0
[   20.459583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.459616]  kthread+0x328/0x630
[   20.459652]  ret_from_fork+0x10/0x20
[   20.459684] 
[   20.524415] Allocated by task 187:
[   20.527802]  kasan_save_stack+0x3c/0x68
[   20.531619]  kasan_save_track+0x20/0x40
[   20.535438]  kasan_save_alloc_info+0x40/0x58
[   20.539692]  __kasan_kmalloc+0xd4/0xd8
[   20.543425]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   20.548980]  kmalloc_track_caller_oob_right+0xa8/0x488
[   20.554101]  kunit_try_run_case+0x170/0x3f0
[   20.558268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.563737]  kthread+0x328/0x630
[   20.566948]  ret_from_fork+0x10/0x20
[   20.570507] 
[   20.571985] The buggy address belongs to the object at ffff000801eaa100
[   20.571985]  which belongs to the cache kmalloc-128 of size 128
[   20.584487] The buggy address is located 0 bytes to the right of
[   20.584487]  allocated 120-byte region [ffff000801eaa100, ffff000801eaa178)
[   20.597416] 
[   20.598896] The buggy address belongs to the physical page:
[   20.604452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881eaa
[   20.612436] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.620075] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.627018] page_type: f5(slab)
[   20.630156] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.637874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.645601] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.653412] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.661225] head: 0bfffe0000000001 fffffdffe007aa81 00000000ffffffff 00000000ffffffff
[   20.669037] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.676843] page dumped because: kasan: bad access detected
[   20.682398] 
[   20.683873] Memory state around the buggy address:
[   20.688656]  ffff000801eaa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.695856]  ffff000801eaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.703061] >ffff000801eaa100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.710262]                                                                 ^
[   20.717384]  ffff000801eaa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.724590]  ffff000801eaa200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.731792] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
[   20.131718] ==================================================================
[   20.140921] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   20.148295] Read of size 1 at addr ffff000805615000 by task kunit_try_catch/185
[   20.155585] 
[   20.157069] CPU: 6 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.157126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.157143] Hardware name: WinLink E850-96 board (DT)
[   20.157165] Call trace:
[   20.157180]  show_stack+0x20/0x38 (C)
[   20.157217]  dump_stack_lvl+0x8c/0xd0
[   20.157248]  print_report+0x118/0x608
[   20.157281]  kasan_report+0xdc/0x128
[   20.157314]  __asan_report_load1_noabort+0x20/0x30
[   20.157349]  kmalloc_node_oob_right+0x2f4/0x330
[   20.157379]  kunit_try_run_case+0x170/0x3f0
[   20.157410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.157444]  kthread+0x328/0x630
[   20.157479]  ret_from_fork+0x10/0x20
[   20.157512] 
[   20.221469] Allocated by task 185:
[   20.224855]  kasan_save_stack+0x3c/0x68
[   20.228673]  kasan_save_track+0x20/0x40
[   20.232492]  kasan_save_alloc_info+0x40/0x58
[   20.236745]  __kasan_kmalloc+0xd4/0xd8
[   20.240478]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   20.245426]  kmalloc_node_oob_right+0xbc/0x330
[   20.249854]  kunit_try_run_case+0x170/0x3f0
[   20.254019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.259487]  kthread+0x328/0x630
[   20.262701]  ret_from_fork+0x10/0x20
[   20.266259] 
[   20.267736] The buggy address belongs to the object at ffff000805614000
[   20.267736]  which belongs to the cache kmalloc-4k of size 4096
[   20.280237] The buggy address is located 0 bytes to the right of
[   20.280237]  allocated 4096-byte region [ffff000805614000, ffff000805615000)
[   20.293255] 
[   20.294735] The buggy address belongs to the physical page:
[   20.300290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885610
[   20.308273] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.315913] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.322857] page_type: f5(slab)
[   20.325994] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   20.333712] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.341441] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   20.349250] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.357063] head: 0bfffe0000000003 fffffdffe0158401 00000000ffffffff 00000000ffffffff
[   20.364875] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   20.372680] page dumped because: kasan: bad access detected
[   20.378236] 
[   20.379711] Memory state around the buggy address:
[   20.384494]  ffff000805614f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.391696]  ffff000805614f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.398901] >ffff000805615000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.406100]                    ^
[   20.409315]  ffff000805615080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.416521]  ffff000805615100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.423723] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure
[   19.864318] ==================================================================
[   19.873477] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   19.880329] Read of size 1 at addr ffff000800e2001f by task kunit_try_catch/183
[   19.887620] 
[   19.889106] CPU: 7 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.889162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.889178] Hardware name: WinLink E850-96 board (DT)
[   19.889202] Call trace:
[   19.889215]  show_stack+0x20/0x38 (C)
[   19.889253]  dump_stack_lvl+0x8c/0xd0
[   19.889285]  print_report+0x118/0x608
[   19.889317]  kasan_report+0xdc/0x128
[   19.889349]  __asan_report_load1_noabort+0x20/0x30
[   19.889385]  kmalloc_oob_left+0x2ec/0x320
[   19.889411]  kunit_try_run_case+0x170/0x3f0
[   19.889443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.889479]  kthread+0x328/0x630
[   19.889513]  ret_from_fork+0x10/0x20
[   19.889548] 
[   19.952984] Allocated by task 54:
[   19.956284]  kasan_save_stack+0x3c/0x68
[   19.960099]  kasan_save_track+0x20/0x40
[   19.963919]  kasan_save_alloc_info+0x40/0x58
[   19.968174]  __kasan_kmalloc+0xd4/0xd8
[   19.971905]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   19.977461]  kvasprintf+0xe0/0x180
[   19.980846]  __kthread_create_on_node+0x16c/0x350
[   19.985534]  kthread_create_on_node+0xe4/0x130
[   19.989962]  create_worker+0x380/0x6b8
[   19.993693]  worker_thread+0x5dc/0xf28
[   19.997426]  kthread+0x328/0x630
[   20.000637]  ret_from_fork+0x10/0x20
[   20.004196] 
[   20.005674] The buggy address belongs to the object at ffff000800e20000
[   20.005674]  which belongs to the cache kmalloc-16 of size 16
[   20.018001] The buggy address is located 19 bytes to the right of
[   20.018001]  allocated 12-byte region [ffff000800e20000, ffff000800e2000c)
[   20.030932] 
[   20.032412] The buggy address belongs to the physical page:
[   20.037967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   20.045953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.052462] page_type: f5(slab)
[   20.055599] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   20.063317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.071036] page dumped because: kasan: bad access detected
[   20.076591] 
[   20.078067] Memory state around the buggy address:
[   20.082849]  ffff000800e1ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.090050]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.097256] >ffff000800e20000: 00 04 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   20.104455]                             ^
[   20.108452]  ffff000800e20080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.115657]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.122859] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
[   19.567151] ==================================================================
[   19.574258] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   19.581200] Read of size 1 at addr ffff000801ede580 by task kunit_try_catch/181
[   19.588491] 
[   19.589975] CPU: 6 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.590027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.590041] Hardware name: WinLink E850-96 board (DT)
[   19.590059] Call trace:
[   19.590071]  show_stack+0x20/0x38 (C)
[   19.590104]  dump_stack_lvl+0x8c/0xd0
[   19.590134]  print_report+0x118/0x608
[   19.590165]  kasan_report+0xdc/0x128
[   19.590194]  __asan_report_load1_noabort+0x20/0x30
[   19.590228]  kmalloc_oob_right+0x5d0/0x660
[   19.590257]  kunit_try_run_case+0x170/0x3f0
[   19.590288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.590324]  kthread+0x328/0x630
[   19.590356]  ret_from_fork+0x10/0x20
[   19.590387] 
[   19.653941] Allocated by task 181:
[   19.657329]  kasan_save_stack+0x3c/0x68
[   19.661146]  kasan_save_track+0x20/0x40
[   19.664966]  kasan_save_alloc_info+0x40/0x58
[   19.669219]  __kasan_kmalloc+0xd4/0xd8
[   19.672951]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.677465]  kmalloc_oob_right+0xb0/0x660
[   19.681458]  kunit_try_run_case+0x170/0x3f0
[   19.685625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.691094]  kthread+0x328/0x630
[   19.694305]  ret_from_fork+0x10/0x20
[   19.697864] 
[   19.699340] The buggy address belongs to the object at ffff000801ede500
[   19.699340]  which belongs to the cache kmalloc-128 of size 128
[   19.711842] The buggy address is located 13 bytes to the right of
[   19.711842]  allocated 115-byte region [ffff000801ede500, ffff000801ede573)
[   19.724860] 
[   19.726337] The buggy address belongs to the physical page:
[   19.731895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede
[   19.739880] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.747518] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.754462] page_type: f5(slab)
[   19.757597] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.765318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.773044] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.780856] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.788669] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff
[   19.796480] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.804288] page dumped because: kasan: bad access detected
[   19.809842] 
[   19.811317] Memory state around the buggy address:
[   19.816095]  ffff000801ede480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.823300]  ffff000801ede500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.830506] >ffff000801ede580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.837706]                    ^
[   19.840921]  ffff000801ede600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.848126]  ffff000801ede680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.855327] ==================================================================
[   18.964925] ==================================================================
[   18.971492] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.978433] Write of size 1 at addr ffff000801ede573 by task kunit_try_catch/181
[   18.985809] 
[   18.987298] CPU: 6 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.987356] Tainted: [N]=TEST
[   18.987369] Hardware name: WinLink E850-96 board (DT)
[   18.987388] Call trace:
[   18.987403]  show_stack+0x20/0x38 (C)
[   18.987441]  dump_stack_lvl+0x8c/0xd0
[   18.987472]  print_report+0x118/0x608
[   18.987506]  kasan_report+0xdc/0x128
[   18.987538]  __asan_report_store1_noabort+0x20/0x30
[   18.987575]  kmalloc_oob_right+0x5a4/0x660
[   18.987607]  kunit_try_run_case+0x170/0x3f0
[   18.987638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.987674]  kthread+0x328/0x630
[   18.987707]  ret_from_fork+0x10/0x20
[   18.987741] 
[   19.050133] Allocated by task 181:
[   19.053520]  kasan_save_stack+0x3c/0x68
[   19.057336]  kasan_save_track+0x20/0x40
[   19.061155]  kasan_save_alloc_info+0x40/0x58
[   19.065408]  __kasan_kmalloc+0xd4/0xd8
[   19.069142]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.073655]  kmalloc_oob_right+0xb0/0x660
[   19.077648]  kunit_try_run_case+0x170/0x3f0
[   19.081815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.087283]  kthread+0x328/0x630
[   19.090495]  ret_from_fork+0x10/0x20
[   19.094054] 
[   19.095531] The buggy address belongs to the object at ffff000801ede500
[   19.095531]  which belongs to the cache kmalloc-128 of size 128
[   19.108032] The buggy address is located 0 bytes to the right of
[   19.108032]  allocated 115-byte region [ffff000801ede500, ffff000801ede573)
[   19.120963] 
[   19.122443] The buggy address belongs to the physical page:
[   19.127999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede
[   19.135982] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.143622] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.150565] page_type: f5(slab)
[   19.153703] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.161421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.169147] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.176958] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.184772] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff
[   19.192583] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.200389] page dumped because: kasan: bad access detected
[   19.205944] 
[   19.207420] Memory state around the buggy address:
[   19.212200]  ffff000801ede400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.219403]  ffff000801ede480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.226608] >ffff000801ede500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.233809]                                                              ^
[   19.240670]  ffff000801ede580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.247876]  ffff000801ede600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.255077] ==================================================================
[   19.267735] ==================================================================
[   19.274786] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   19.281726] Write of size 1 at addr ffff000801ede578 by task kunit_try_catch/181
[   19.289103] 
[   19.290589] CPU: 6 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.290644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.290660] Hardware name: WinLink E850-96 board (DT)
[   19.290681] Call trace:
[   19.290694]  show_stack+0x20/0x38 (C)
[   19.290727]  dump_stack_lvl+0x8c/0xd0
[   19.290757]  print_report+0x118/0x608
[   19.290788]  kasan_report+0xdc/0x128
[   19.290815]  __asan_report_store1_noabort+0x20/0x30
[   19.290849]  kmalloc_oob_right+0x538/0x660
[   19.290876]  kunit_try_run_case+0x170/0x3f0
[   19.290906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.290941]  kthread+0x328/0x630
[   19.290977]  ret_from_fork+0x10/0x20
[   19.291011] 
[   19.354640] Allocated by task 181:
[   19.358028]  kasan_save_stack+0x3c/0x68
[   19.361845]  kasan_save_track+0x20/0x40
[   19.365664]  kasan_save_alloc_info+0x40/0x58
[   19.369918]  __kasan_kmalloc+0xd4/0xd8
[   19.373650]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.378164]  kmalloc_oob_right+0xb0/0x660
[   19.382157]  kunit_try_run_case+0x170/0x3f0
[   19.386324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.391793]  kthread+0x328/0x630
[   19.395004]  ret_from_fork+0x10/0x20
[   19.398563] 
[   19.400040] The buggy address belongs to the object at ffff000801ede500
[   19.400040]  which belongs to the cache kmalloc-128 of size 128
[   19.412542] The buggy address is located 5 bytes to the right of
[   19.412542]  allocated 115-byte region [ffff000801ede500, ffff000801ede573)
[   19.425472] 
[   19.426950] The buggy address belongs to the physical page:
[   19.432509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede
[   19.440491] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.448128] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.455074] page_type: f5(slab)
[   19.458209] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.465930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.473656] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.481468] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.489281] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff
[   19.497093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.504899] page dumped because: kasan: bad access detected
[   19.510454] 
[   19.511929] Memory state around the buggy address:
[   19.516708]  ffff000801ede400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.523912]  ffff000801ede480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.531117] >ffff000801ede500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.538318]                                                                 ^
[   19.545440]  ffff000801ede580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.552646]  ffff000801ede600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.559846] ==================================================================
Failure - log-parser-test - exception-warning-cpu-pid-at-libmathint_log-intlog10 KNOWN ISSUE - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure
------------[ cut here ]------------
[  163.423309] WARNING: CPU: 0 PID: 701 at lib/math/int_log.c:120 intlog10+0x38/0x48
[  163.430772] Modules linked in:
[  163.433822] CPU: 0 UID: 0 PID: 701 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[  163.444933] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  163.450736] Hardware name: WinLink E850-96 board (DT)
[  163.455774] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  163.462714] pc : intlog10+0x38/0x48
[  163.466186] lr : intlog10_test+0xe4/0x200
[  163.470179] sp : ffff80008ac77c10
[  163.473477] x29: ffff80008ac77c90 x28: 0000000000000000 x27: 0000000000000000
[  163.480595] x26: 1fffe00100f8d941 x25: 0000000000000000 x24: ffff80008ac77ce0
[  163.487715] x23: ffff80008ac77d00 x22: 0000000000000000 x21: 1ffff0001158ef82
[  163.494831] x20: ffff800083c78400 x19: ffff800087d07990 x18: 00000000aeee72a7
[  163.501949] x17: 00000000e55e74f9 x16: 0000000070aadd38 x15: 00000000e28c8275
[  163.509067] x14: 0000000072f3f0b5 x13: 1fffe0010b5e4181 x12: ffff700010f61579
[  163.516185] x11: 1ffff00010f61578 x10: ffff700010f61578 x9 : ffff800081220e84
[  163.523303] x8 : ffff800087b0abc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  163.530421] x5 : ffff70001158ef82 x4 : 1ffff00010fa0f3a x3 : 1ffff0001078f080
[  163.537539] x2 : 1ffff0001078f080 x1 : 0000000000000003 x0 : 0000000000000000
[  163.544659] Call trace:
[  163.547090]  intlog10+0x38/0x48 (P)
[  163.550563]  kunit_try_run_case+0x170/0x3f0
[  163.554728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  163.560197]  kthread+0x328/0x630
[  163.563408]  ret_from_fork+0x10/0x20
[  163.566971] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test - exception-warning-cpu-pid-at-libmathint_log-intlog2 KNOWN ISSUE - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure
------------[ cut here ]------------
[  163.219667] WARNING: CPU: 0 PID: 683 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[  163.226957] Modules linked in:
[  163.230004] CPU: 0 UID: 0 PID: 683 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[  163.241115] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  163.246052] Hardware name: WinLink E850-96 board (DT)
[  163.251088] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  163.258029] pc : intlog2+0xd8/0xf8
[  163.261415] lr : intlog2_test+0xe4/0x200
[  163.265321] sp : ffff80008ab57c10
[  163.268619] x29: ffff80008ab57c90 x28: 0000000000000000 x27: 0000000000000000
[  163.275737] x26: 1fffe00100f8db81 x25: 0000000000000000 x24: ffff80008ab57ce0
[  163.282855] x23: ffff80008ab57d00 x22: 0000000000000000 x21: 1ffff0001156af82
[  163.289973] x20: ffff800083c78300 x19: ffff800087d07990 x18: 00000000ba9a0737
[  163.297091] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  163.304209] x14: 00000000f1f1f1f1 x13: 1fffe0010b5e4181 x12: ffff700010f61579
[  163.311327] x11: 1ffff00010f61578 x10: ffff700010f61578 x9 : ffff800081221084
[  163.318445] x8 : ffff800087b0abc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  163.325563] x5 : ffff70001156af82 x4 : 1ffff00010fa0f3a x3 : 1ffff0001078f060
[  163.332681] x2 : 1ffff0001078f060 x1 : 0000000000000003 x0 : 0000000000000000
[  163.339803] Call trace:
[  163.342232]  intlog2+0xd8/0xf8 (P)
[  163.345618]  kunit_try_run_case+0x170/0x3f0
[  163.349783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  163.355252]  kthread+0x328/0x630
[  163.358462]  ret_from_fork+0x10/0x20
[  163.362025] ---[ end trace 0000000000000000 ]---
Failure - lava - fastboot-boot KNOWN ISSUE - lava/fastboot-boot: Failure
(no logs available)
Failure - lava - auto-login-action KNOWN ISSUE - lava/auto-login-action: Failure
(no logs available)
Failure - lava - login-action KNOWN ISSUE - lava/login-action: Failure
(no logs available)
Failure - boot - gcc-13-lkftconfig-kunit KNOWN ISSUE - boot/gcc-13-lkftconfig-kunit: Failure
(no logs available)