Hay
Date
May 30, 2025, 4:14 a.m.
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   38.293340] ==================================================================
[   38.303900] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   38.311012] Free of addr ffff000806014000 by task kunit_try_catch/283
[   38.317435] 
[   38.318920] CPU: 4 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   38.318980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.318997] Hardware name: WinLink E850-96 board (DT)
[   38.319017] Call trace:
[   38.319033]  show_stack+0x20/0x38 (C)
[   38.319068]  dump_stack_lvl+0x8c/0xd0
[   38.319105]  print_report+0x118/0x608
[   38.319141]  kasan_report_invalid_free+0xc0/0xe8
[   38.319176]  __kasan_mempool_poison_pages+0xe0/0xe8
[   38.319211]  mempool_free+0x24c/0x328
[   38.319242]  mempool_double_free_helper+0x150/0x2e8
[   38.319275]  mempool_page_alloc_double_free+0xbc/0x118
[   38.319311]  kunit_try_run_case+0x170/0x3f0
[   38.319347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.319386]  kthread+0x328/0x630
[   38.319416]  ret_from_fork+0x10/0x20
[   38.319450] 
[   38.393218] The buggy address belongs to the physical page:
[   38.398775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886014
[   38.406759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.413281] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.420999] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.428720] page dumped because: kasan: bad access detected
[   38.434275] 
[   38.435749] Memory state around the buggy address:
[   38.440530]  ffff000806013f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.447732]  ffff000806013f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.454938] >ffff000806014000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.462138]                    ^
[   38.465353]  ffff000806014080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.472558]  ffff000806014100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.479761] ==================================================================
[   37.680536] ==================================================================
[   37.690278] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   37.697393] Free of addr ffff000801e2a400 by task kunit_try_catch/279
[   37.703816] 
[   37.705301] CPU: 5 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   37.705362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.705380] Hardware name: WinLink E850-96 board (DT)
[   37.705398] Call trace:
[   37.705416]  show_stack+0x20/0x38 (C)
[   37.705449]  dump_stack_lvl+0x8c/0xd0
[   37.705491]  print_report+0x118/0x608
[   37.705528]  kasan_report_invalid_free+0xc0/0xe8
[   37.705561]  check_slab_allocation+0xd4/0x108
[   37.705599]  __kasan_mempool_poison_object+0x78/0x150
[   37.705635]  mempool_free+0x28c/0x328
[   37.705667]  mempool_double_free_helper+0x150/0x2e8
[   37.705701]  mempool_kmalloc_double_free+0xc0/0x118
[   37.705733]  kunit_try_run_case+0x170/0x3f0
[   37.705768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.705807]  kthread+0x328/0x630
[   37.705837]  ret_from_fork+0x10/0x20
[   37.705873] 
[   37.783851] Allocated by task 279:
[   37.787239]  kasan_save_stack+0x3c/0x68
[   37.791054]  kasan_save_track+0x20/0x40
[   37.794873]  kasan_save_alloc_info+0x40/0x58
[   37.799127]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.804422]  remove_element+0x130/0x1f8
[   37.808241]  mempool_alloc_preallocated+0x58/0xc0
[   37.812930]  mempool_double_free_helper+0x94/0x2e8
[   37.817703]  mempool_kmalloc_double_free+0xc0/0x118
[   37.822564]  kunit_try_run_case+0x170/0x3f0
[   37.826730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.832199]  kthread+0x328/0x630
[   37.835411]  ret_from_fork+0x10/0x20
[   37.838970] 
[   37.840447] Freed by task 279:
[   37.843484]  kasan_save_stack+0x3c/0x68
[   37.847303]  kasan_save_track+0x20/0x40
[   37.851123]  kasan_save_free_info+0x4c/0x78
[   37.855290]  __kasan_mempool_poison_object+0xc0/0x150
[   37.860324]  mempool_free+0x28c/0x328
[   37.863969]  mempool_double_free_helper+0x100/0x2e8
[   37.868832]  mempool_kmalloc_double_free+0xc0/0x118
[   37.873692]  kunit_try_run_case+0x170/0x3f0
[   37.877858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.883327]  kthread+0x328/0x630
[   37.886539]  ret_from_fork+0x10/0x20
[   37.890098] 
[   37.891575] The buggy address belongs to the object at ffff000801e2a400
[   37.891575]  which belongs to the cache kmalloc-128 of size 128
[   37.904075] The buggy address is located 0 bytes inside of
[   37.904075]  128-byte region [ffff000801e2a400, ffff000801e2a480)
[   37.915618] 
[   37.917098] The buggy address belongs to the physical page:
[   37.922654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2a
[   37.930639] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.938277] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.945220] page_type: f5(slab)
[   37.948355] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.956076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.963804] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.971613] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.979427] head: 0bfffe0000000001 fffffdffe0078a81 00000000ffffffff 00000000ffffffff
[   37.987238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.995044] page dumped because: kasan: bad access detected
[   38.000601] 
[   38.002075] Memory state around the buggy address:
[   38.006857]  ffff000801e2a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.014058]  ffff000801e2a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.021264] >ffff000801e2a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.028464]                    ^
[   38.031679]  ffff000801e2a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.038884]  ffff000801e2a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.046085] ==================================================================
[   38.055224] ==================================================================
[   38.065185] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   38.072303] Free of addr ffff000804b14000 by task kunit_try_catch/281
[   38.078723] 
[   38.080210] CPU: 2 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   38.080269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.080285] Hardware name: WinLink E850-96 board (DT)
[   38.080305] Call trace:
[   38.080321]  show_stack+0x20/0x38 (C)
[   38.080357]  dump_stack_lvl+0x8c/0xd0
[   38.080397]  print_report+0x118/0x608
[   38.080434]  kasan_report_invalid_free+0xc0/0xe8
[   38.080470]  __kasan_mempool_poison_object+0x14c/0x150
[   38.080508]  mempool_free+0x28c/0x328
[   38.080543]  mempool_double_free_helper+0x150/0x2e8
[   38.080576]  mempool_kmalloc_large_double_free+0xc0/0x118
[   38.080612]  kunit_try_run_case+0x170/0x3f0
[   38.080646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.080685]  kthread+0x328/0x630
[   38.080715]  ret_from_fork+0x10/0x20
[   38.080751] 
[   38.155026] The buggy address belongs to the physical page:
[   38.160584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b14
[   38.168569] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.176208] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.183150] page_type: f8(unknown)
[   38.186546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.194266] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.201994] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.209804] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.217617] head: 0bfffe0000000002 fffffdffe012c501 00000000ffffffff 00000000ffffffff
[   38.225429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.233235] page dumped because: kasan: bad access detected
[   38.238792] 
[   38.240266] Memory state around the buggy address:
[   38.245047]  ffff000804b13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.252248]  ffff000804b13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.259456] >ffff000804b14000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.266655]                    ^
[   38.269870]  ffff000804b14080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.277075]  ffff000804b14100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.284276] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-smp
[  162.754352] Internal error: Oops: 0000000096000005 [#1]  SMP
[  162.759958] Modules linked in:
[  162.763003] CPU: 4 UID: 0 PID: 624 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[  162.773764] Tainted: [B]=BAD_PAGE, [N]=TEST
[  162.777923] Hardware name: WinLink E850-96 board (DT)
[  162.782960] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  162.789901] pc : kunit_test_null_dereference+0x70/0x170
[  162.795110] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.800925] sp : ffff80008a987d30
[  162.804223] x29: ffff80008a987d90 x28: 0000000000000000 x27: 0000000000000000
[  162.811341] x26: 1fffe001001b88a1 x25: 0000000000000000 x24: 0000000000000004
[  162.818459] x23: ffff000800dc450c x22: ffff800081258c48 x21: ffff000801374808
[  162.825577] x20: 1ffff00011530fa6 x19: ffff800087d77990 x18: ffff800087d77b00
[  162.832695] x17: ffff800081e04094 x16: 0000000000000100 x15: ffff80008124b9f0
[  162.839813] x14: ffff800081256b08 x13: 1fffe0010b5f3589 x12: ffff600101304dc4
[  162.846931] x11: 1fffe00101304dc3 x10: ffff600101304dc3 x9 : ffff8000812500b0
[  162.854049] x8 : ffff80008a987c18 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  162.861167] x5 : ffff700011530fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  162.868285] x2 : dfff800000000000 x1 : ffff000809826540 x0 : ffff800087d77990
[  162.875405] Call trace:
[  162.877836]  kunit_test_null_dereference+0x70/0x170 (P)
[  162.883045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.888511]  kthread+0x328/0x630
[  162.891722]  ret_from_fork+0x10/0x20
[  162.895295] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  162.901363] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   99.480988] ==================================================================
[   99.481119] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   99.481119] 
[   99.481264] Use-after-free read at 0x(____ptrval____) (in kfence-#189):
[   99.481373]  test_krealloc+0x51c/0x830
[   99.484519]  kunit_try_run_case+0x170/0x3f0
[   99.488685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.494155]  kthread+0x328/0x630
[   99.497366]  ret_from_fork+0x10/0x20
[   99.500925] 
[   99.502404] kfence-#189: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   99.502404] 
[   99.512039] allocated by task 381 on cpu 6 at 99.480901s (0.031136s ago):
[   99.518826]  test_alloc+0x29c/0x628
[   99.522279]  test_krealloc+0xc0/0x830
[   99.525924]  kunit_try_run_case+0x170/0x3f0
[   99.530091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.535559]  kthread+0x328/0x630
[   99.538773]  ret_from_fork+0x10/0x20
[   99.542332] 
[   99.543808] freed by task 381 on cpu 6 at 99.480929s (0.062877s ago):
[   99.550250]  krealloc_noprof+0x148/0x360
[   99.554136]  test_krealloc+0x1dc/0x830
[   99.557868]  kunit_try_run_case+0x170/0x3f0
[   99.562035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.567504]  kthread+0x328/0x630
[   99.570715]  ret_from_fork+0x10/0x20
[   99.574276] 
[   99.575761] CPU: 6 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   99.586525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   99.590682] Hardware name: WinLink E850-96 board (DT)
[   99.595719] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   99.254524] ==================================================================
[   99.254670] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   99.254670] 
[   99.254839] Use-after-free read at 0x(____ptrval____) (in kfence-#187):
[   99.255726]  test_memcache_typesafe_by_rcu+0x280/0x560
[   99.260847]  kunit_try_run_case+0x170/0x3f0
[   99.265013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.270482]  kthread+0x328/0x630
[   99.273694]  ret_from_fork+0x10/0x20
[   99.277253] 
[   99.278732] kfence-#187: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   99.278732] 
[   99.287847] allocated by task 379 on cpu 5 at 99.200928s (0.086916s ago):
[   99.294633]  test_alloc+0x230/0x628
[   99.298086]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   99.303207]  kunit_try_run_case+0x170/0x3f0
[   99.307374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.312843]  kthread+0x328/0x630
[   99.316054]  ret_from_fork+0x10/0x20
[   99.319616] 
[   99.321091] freed by task 379 on cpu 5 at 99.200945s (0.120144s ago):
[   99.327526]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   99.332634]  kunit_try_run_case+0x170/0x3f0
[   99.336801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.342269]  kthread+0x328/0x630
[   99.345483]  ret_from_fork+0x10/0x20
[   99.349042] 
[   99.350529] CPU: 5 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   99.361288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   99.365447] Hardware name: WinLink E850-96 board (DT)
[   99.370485] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   75.922661] ==================================================================
[   75.922851] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   75.922851] 
[   75.923009] Invalid read at 0x(____ptrval____):
[   75.924120]  test_invalid_access+0xdc/0x1f0
[   75.928336]  kunit_try_run_case+0x170/0x3f0
[   75.932489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.937964]  kthread+0x328/0x630
[   75.941162]  ret_from_fork+0x10/0x20
[   75.944694] 
[   75.946208] CPU: 3 UID: 0 PID: 375 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   75.956973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.961128] Hardware name: WinLink E850-96 board (DT)
[   75.966163] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   75.568999] ==================================================================
[   75.569127] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   75.569127] 
[   75.569275] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#181):
[   75.572965]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   75.578171]  kunit_try_run_case+0x170/0x3f0
[   75.582337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.587806]  kthread+0x328/0x630
[   75.591018]  ret_from_fork+0x10/0x20
[   75.594577] 
[   75.596056] kfence-#181: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   75.596056] 
[   75.605692] allocated by task 369 on cpu 3 at 75.568927s (0.036762s ago):
[   75.612475]  test_alloc+0x29c/0x628
[   75.615931]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   75.621052]  kunit_try_run_case+0x170/0x3f0
[   75.625219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.630687]  kthread+0x328/0x630
[   75.633901]  ret_from_fork+0x10/0x20
[   75.637458] 
[   75.638936] freed by task 369 on cpu 3 at 75.568943s (0.069990s ago):
[   75.645375]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   75.650567]  kunit_try_run_case+0x170/0x3f0
[   75.654733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.660201]  kthread+0x328/0x630
[   75.663413]  ret_from_fork+0x10/0x20
[   75.666973] 
[   75.668459] CPU: 3 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   75.679223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.683379] Hardware name: WinLink E850-96 board (DT)
[   75.688416] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   75.149022] ==================================================================
[   75.149155] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   75.149155] 
[   75.149314] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#177):
[   75.150997]  test_kmalloc_aligned_oob_read+0x238/0x468
[   75.156116]  kunit_try_run_case+0x170/0x3f0
[   75.160283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.165751]  kthread+0x328/0x630
[   75.168963]  ret_from_fork+0x10/0x20
[   75.172522] 
[   75.174001] kfence-#177: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   75.174001] 
[   75.183637] allocated by task 367 on cpu 3 at 75.148985s (0.034649s ago):
[   75.190423]  test_alloc+0x29c/0x628
[   75.193876]  test_kmalloc_aligned_oob_read+0x100/0x468
[   75.198997]  kunit_try_run_case+0x170/0x3f0
[   75.203164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.208633]  kthread+0x328/0x630
[   75.211845]  ret_from_fork+0x10/0x20
[   75.215405] 
[   75.216890] CPU: 3 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   75.227650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.231811] Hardware name: WinLink E850-96 board (DT)
[   75.236848] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   70.960982] ==================================================================
[   70.961116] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   70.961116] 
[   70.961248] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#137):
[   70.963651]  test_corruption+0x120/0x378
[   70.967555]  kunit_try_run_case+0x170/0x3f0
[   70.971722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.977190]  kthread+0x328/0x630
[   70.980402]  ret_from_fork+0x10/0x20
[   70.983961] 
[   70.985440] kfence-#137: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   70.985440] 
[   70.994554] allocated by task 357 on cpu 1 at 70.960912s (0.033639s ago):
[   71.001337]  test_alloc+0x230/0x628
[   71.004794]  test_corruption+0xdc/0x378
[   71.008613]  kunit_try_run_case+0x170/0x3f0
[   71.012780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.018249]  kthread+0x328/0x630
[   71.021460]  ret_from_fork+0x10/0x20
[   71.025019] 
[   71.026497] freed by task 357 on cpu 1 at 70.960927s (0.065568s ago):
[   71.032934]  test_corruption+0x120/0x378
[   71.036825]  kunit_try_run_case+0x170/0x3f0
[   71.040991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.046460]  kthread+0x328/0x630
[   71.049671]  ret_from_fork+0x10/0x20
[   71.053232] 
[   71.054717] CPU: 1 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   71.065482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.069638] Hardware name: WinLink E850-96 board (DT)
[   71.074675] ==================================================================
[   71.288998] ==================================================================
[   71.289131] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   71.289131] 
[   71.289262] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#140):
[   71.289433]  test_corruption+0x1d8/0x378
[   71.292966]  kunit_try_run_case+0x170/0x3f0
[   71.297132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.302601]  kthread+0x328/0x630
[   71.305813]  ret_from_fork+0x10/0x20
[   71.309371] 
[   71.310851] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   71.310851] 
[   71.319965] allocated by task 357 on cpu 1 at 71.288923s (0.031040s ago):
[   71.326748]  test_alloc+0x230/0x628
[   71.330205]  test_corruption+0x198/0x378
[   71.334110]  kunit_try_run_case+0x170/0x3f0
[   71.338277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.343746]  kthread+0x328/0x630
[   71.346958]  ret_from_fork+0x10/0x20
[   71.350518] 
[   71.351995] freed by task 357 on cpu 1 at 71.288939s (0.063053s ago):
[   71.358432]  test_corruption+0x1d8/0x378
[   71.362322]  kunit_try_run_case+0x170/0x3f0
[   71.366489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.371958]  kthread+0x328/0x630
[   71.375169]  ret_from_fork+0x10/0x20
[   71.378730] 
[   71.380216] CPU: 1 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   71.390979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.395136] Hardware name: WinLink E850-96 board (DT)
[   71.400173] ==================================================================
[   70.204994] ==================================================================
[   70.205127] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   70.205127] 
[   70.205260] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#130):
[   70.207662]  test_corruption+0x278/0x378
[   70.211565]  kunit_try_run_case+0x170/0x3f0
[   70.215732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.221200]  kthread+0x328/0x630
[   70.224412]  ret_from_fork+0x10/0x20
[   70.227971] 
[   70.229450] kfence-#130: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   70.229450] 
[   70.239085] allocated by task 355 on cpu 1 at 70.204924s (0.034159s ago):
[   70.245868]  test_alloc+0x29c/0x628
[   70.249325]  test_corruption+0xdc/0x378
[   70.253144]  kunit_try_run_case+0x170/0x3f0
[   70.257311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.262780]  kthread+0x328/0x630
[   70.265992]  ret_from_fork+0x10/0x20
[   70.269552] 
[   70.271028] freed by task 355 on cpu 1 at 70.204939s (0.066087s ago):
[   70.277465]  test_corruption+0x278/0x378
[   70.281356]  kunit_try_run_case+0x170/0x3f0
[   70.285522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.290991]  kthread+0x328/0x630
[   70.294203]  ret_from_fork+0x10/0x20
[   70.297763] 
[   70.299249] CPU: 1 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   70.310012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.314169] Hardware name: WinLink E850-96 board (DT)
[   70.319207] ==================================================================
[   70.532986] ==================================================================
[   70.533122] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   70.533122] 
[   70.533249] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#133):
[   70.533418]  test_corruption+0x284/0x378
[   70.536957]  kunit_try_run_case+0x170/0x3f0
[   70.541123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.546592]  kthread+0x328/0x630
[   70.549804]  ret_from_fork+0x10/0x20
[   70.553362] 
[   70.554842] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   70.554842] 
[   70.564477] allocated by task 355 on cpu 1 at 70.532916s (0.031558s ago):
[   70.571258]  test_alloc+0x29c/0x628
[   70.574716]  test_corruption+0x198/0x378
[   70.578622]  kunit_try_run_case+0x170/0x3f0
[   70.582789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.588258]  kthread+0x328/0x630
[   70.591469]  ret_from_fork+0x10/0x20
[   70.595030] 
[   70.596506] freed by task 355 on cpu 1 at 70.532930s (0.063574s ago):
[   70.602943]  test_corruption+0x284/0x378
[   70.606834]  kunit_try_run_case+0x170/0x3f0
[   70.611000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.616469]  kthread+0x328/0x630
[   70.619681]  ret_from_fork+0x10/0x20
[   70.623242] 
[   70.624727] CPU: 1 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   70.635488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.639647] Hardware name: WinLink E850-96 board (DT)
[   70.644684] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   69.996980] ==================================================================
[   69.997106] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   69.997106] 
[   69.997240] Invalid free of 0x(____ptrval____) (in kfence-#128):
[   69.997342]  test_invalid_addr_free+0xec/0x238
[   70.000680]  kunit_try_run_case+0x170/0x3f0
[   70.004846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.010315]  kthread+0x328/0x630
[   70.013527]  ret_from_fork+0x10/0x20
[   70.017085] 
[   70.018565] kfence-#128: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   70.018565] 
[   70.027679] allocated by task 353 on cpu 2 at 69.996926s (0.030751s ago):
[   70.034466]  test_alloc+0x230/0x628
[   70.037919]  test_invalid_addr_free+0xd4/0x238
[   70.042347]  kunit_try_run_case+0x170/0x3f0
[   70.046512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.051981]  kthread+0x328/0x630
[   70.055193]  ret_from_fork+0x10/0x20
[   70.058755] 
[   70.060238] CPU: 2 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   70.071003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.075159] Hardware name: WinLink E850-96 board (DT)
[   70.080196] ==================================================================
[   69.788977] ==================================================================
[   69.789104] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   69.789104] 
[   69.789237] Invalid free of 0x(____ptrval____) (in kfence-#126):
[   69.789337]  test_invalid_addr_free+0x1ac/0x238
[   69.792852]  kunit_try_run_case+0x170/0x3f0
[   69.797019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.802487]  kthread+0x328/0x630
[   69.805699]  ret_from_fork+0x10/0x20
[   69.809258] 
[   69.810736] kfence-#126: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   69.810736] 
[   69.820373] allocated by task 351 on cpu 1 at 69.788922s (0.031448s ago):
[   69.827156]  test_alloc+0x29c/0x628
[   69.830612]  test_invalid_addr_free+0xd4/0x238
[   69.835039]  kunit_try_run_case+0x170/0x3f0
[   69.839206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.844675]  kthread+0x328/0x630
[   69.847886]  ret_from_fork+0x10/0x20
[   69.851447] 
[   69.852933] CPU: 1 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   69.863693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.867853] Hardware name: WinLink E850-96 board (DT)
[   69.872890] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   69.349010] ==================================================================
[   69.349137] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   69.349137] 
[   69.349262] Invalid free of 0x(____ptrval____) (in kfence-#122):
[   69.349363]  test_double_free+0x1bc/0x238
[   69.351845]  kunit_try_run_case+0x170/0x3f0
[   69.356011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.361480]  kthread+0x328/0x630
[   69.364692]  ret_from_fork+0x10/0x20
[   69.368250] 
[   69.369728] kfence-#122: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   69.369728] 
[   69.379365] allocated by task 347 on cpu 1 at 69.348927s (0.030436s ago):
[   69.386147]  test_alloc+0x29c/0x628
[   69.389604]  test_double_free+0xd4/0x238
[   69.393510]  kunit_try_run_case+0x170/0x3f0
[   69.397677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.403146]  kthread+0x328/0x630
[   69.406358]  ret_from_fork+0x10/0x20
[   69.409918] 
[   69.411393] freed by task 347 on cpu 1 at 69.348943s (0.062447s ago):
[   69.417831]  test_double_free+0x1ac/0x238
[   69.421809]  kunit_try_run_case+0x170/0x3f0
[   69.425976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.431444]  kthread+0x328/0x630
[   69.434657]  ret_from_fork+0x10/0x20
[   69.438216] 
[   69.439701] CPU: 1 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   69.450466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.454622] Hardware name: WinLink E850-96 board (DT)
[   69.459659] ==================================================================
[   69.568977] ==================================================================
[   69.569100] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   69.569100] 
[   69.569228] Invalid free of 0x(____ptrval____) (in kfence-#124):
[   69.569335]  test_double_free+0x100/0x238
[   69.571806]  kunit_try_run_case+0x170/0x3f0
[   69.575972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.581441]  kthread+0x328/0x630
[   69.584654]  ret_from_fork+0x10/0x20
[   69.588212] 
[   69.589691] kfence-#124: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   69.589691] 
[   69.598806] allocated by task 349 on cpu 3 at 69.568902s (0.029902s ago):
[   69.605590]  test_alloc+0x230/0x628
[   69.609045]  test_double_free+0xd4/0x238
[   69.612951]  kunit_try_run_case+0x170/0x3f0
[   69.617118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.622587]  kthread+0x328/0x630
[   69.625799]  ret_from_fork+0x10/0x20
[   69.629359] 
[   69.630835] freed by task 349 on cpu 3 at 69.568916s (0.061917s ago):
[   69.637273]  test_double_free+0xf0/0x238
[   69.641163]  kunit_try_run_case+0x170/0x3f0
[   69.645330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.650798]  kthread+0x328/0x630
[   69.654010]  ret_from_fork+0x10/0x20
[   69.657570] 
[   69.659056] CPU: 3 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   69.669820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.673976] Hardware name: WinLink E850-96 board (DT)
[   69.679014] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   68.920977] ==================================================================
[   68.921103] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   68.921103] 
[   68.921259] Use-after-free read at 0x(____ptrval____) (in kfence-#118):
[   68.921727]  test_use_after_free_read+0x114/0x248
[   68.926414]  kunit_try_run_case+0x170/0x3f0
[   68.930581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.936049]  kthread+0x328/0x630
[   68.939261]  ret_from_fork+0x10/0x20
[   68.942820] 
[   68.944298] kfence-#118: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.944298] 
[   68.953414] allocated by task 341 on cpu 5 at 68.920913s (0.032499s ago):
[   68.960201]  test_alloc+0x230/0x628
[   68.963653]  test_use_after_free_read+0xd0/0x248
[   68.968254]  kunit_try_run_case+0x170/0x3f0
[   68.972420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.977889]  kthread+0x328/0x630
[   68.981101]  ret_from_fork+0x10/0x20
[   68.984661] 
[   68.986138] freed by task 341 on cpu 5 at 68.920928s (0.065207s ago):
[   68.992578]  test_use_after_free_read+0xf0/0x248
[   68.997159]  kunit_try_run_case+0x170/0x3f0
[   69.001326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.006795]  kthread+0x328/0x630
[   69.010007]  ret_from_fork+0x10/0x20
[   69.013567] 
[   69.015053] CPU: 5 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   69.025817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.029973] Hardware name: WinLink E850-96 board (DT)
[   69.035010] ==================================================================
[   68.696977] ==================================================================
[   68.697107] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   68.697107] 
[   68.697261] Use-after-free read at 0x(____ptrval____) (in kfence-#116):
[   68.697732]  test_use_after_free_read+0x114/0x248
[   68.702418]  kunit_try_run_case+0x170/0x3f0
[   68.706585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.712053]  kthread+0x328/0x630
[   68.715265]  ret_from_fork+0x10/0x20
[   68.718824] 
[   68.720303] kfence-#116: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   68.720303] 
[   68.729937] allocated by task 339 on cpu 3 at 68.696917s (0.033018s ago):
[   68.736724]  test_alloc+0x29c/0x628
[   68.740178]  test_use_after_free_read+0xd0/0x248
[   68.744778]  kunit_try_run_case+0x170/0x3f0
[   68.748945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.754414]  kthread+0x328/0x630
[   68.757626]  ret_from_fork+0x10/0x20
[   68.761186] 
[   68.762662] freed by task 339 on cpu 3 at 68.696932s (0.065728s ago):
[   68.769101]  test_use_after_free_read+0x1c0/0x248
[   68.773771]  kunit_try_run_case+0x170/0x3f0
[   68.777937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.783406]  kthread+0x328/0x630
[   68.786618]  ret_from_fork+0x10/0x20
[   68.790179] 
[   68.791665] CPU: 3 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   68.802429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.806584] Hardware name: WinLink E850-96 board (DT)
[   68.811622] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   68.280946] ==================================================================
[   68.281076] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   68.281076] 
[   68.281230] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#112):
[   68.282395]  test_out_of_bounds_write+0x100/0x240
[   68.287081]  kunit_try_run_case+0x170/0x3f0
[   68.291247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.296716]  kthread+0x328/0x630
[   68.299928]  ret_from_fork+0x10/0x20
[   68.303487] 
[   68.304966] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   68.304966] 
[   68.314599] allocated by task 335 on cpu 1 at 68.280912s (0.033685s ago):
[   68.321388]  test_alloc+0x29c/0x628
[   68.324841]  test_out_of_bounds_write+0xc8/0x240
[   68.329443]  kunit_try_run_case+0x170/0x3f0
[   68.333608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.339076]  kthread+0x328/0x630
[   68.342288]  ret_from_fork+0x10/0x20
[   68.345849] 
[   68.347335] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   68.358095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.362255] Hardware name: WinLink E850-96 board (DT)
[   68.367290] ==================================================================
[   68.488948] ==================================================================
[   68.489077] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   68.489077] 
[   68.489230] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#114):
[   68.490397]  test_out_of_bounds_write+0x100/0x240
[   68.495082]  kunit_try_run_case+0x170/0x3f0
[   68.499249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.504718]  kthread+0x328/0x630
[   68.507929]  ret_from_fork+0x10/0x20
[   68.511488] 
[   68.512966] kfence-#114: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.512966] 
[   68.522082] allocated by task 337 on cpu 3 at 68.488914s (0.033165s ago):
[   68.528869]  test_alloc+0x230/0x628
[   68.532321]  test_out_of_bounds_write+0xc8/0x240
[   68.536922]  kunit_try_run_case+0x170/0x3f0
[   68.541088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.546557]  kthread+0x328/0x630
[   68.549769]  ret_from_fork+0x10/0x20
[   68.553330] 
[   68.554815] CPU: 3 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   68.565578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.569735] Hardware name: WinLink E850-96 board (DT)
[   68.574773] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   67.640954] ==================================================================
[   67.641098] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   67.641098] 
[   67.641256] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#106):
[   67.642156]  test_out_of_bounds_read+0x114/0x3e0
[   67.646755]  kunit_try_run_case+0x170/0x3f0
[   67.650921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.656390]  kthread+0x328/0x630
[   67.659602]  ret_from_fork+0x10/0x20
[   67.663161] 
[   67.664640] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.664640] 
[   67.674276] allocated by task 331 on cpu 2 at 67.640920s (0.033353s ago):
[   67.681062]  test_alloc+0x29c/0x628
[   67.684515]  test_out_of_bounds_read+0xdc/0x3e0
[   67.689029]  kunit_try_run_case+0x170/0x3f0
[   67.693195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.698664]  kthread+0x328/0x630
[   67.701876]  ret_from_fork+0x10/0x20
[   67.705436] 
[   67.706922] CPU: 2 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   67.717686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.721842] Hardware name: WinLink E850-96 board (DT)
[   67.726878] ==================================================================
[   68.064920] ==================================================================
[   68.070129] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   68.070129] 
[   68.079156] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#110):
[   68.086534]  test_out_of_bounds_read+0x1c8/0x3e0
[   68.091135]  kunit_try_run_case+0x170/0x3f0
[   68.095302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.100770]  kthread+0x328/0x630
[   68.103982]  ret_from_fork+0x10/0x20
[   68.107541] 
[   68.109017] kfence-#110: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.109017] 
[   68.118131] allocated by task 333 on cpu 3 at 68.064894s (0.053235s ago):
[   68.124918]  test_alloc+0x230/0x628
[   68.128374]  test_out_of_bounds_read+0x198/0x3e0
[   68.132974]  kunit_try_run_case+0x170/0x3f0
[   68.137141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.142609]  kthread+0x328/0x630
[   68.145822]  ret_from_fork+0x10/0x20
[   68.149380] 
[   68.150863] CPU: 3 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   68.161627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.165788] Hardware name: WinLink E850-96 board (DT)
[   68.170824] ==================================================================
[   67.744939] ==================================================================
[   67.749879] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   67.749879] 
[   67.758906] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#107):
[   67.766285]  test_out_of_bounds_read+0x1c8/0x3e0
[   67.770885]  kunit_try_run_case+0x170/0x3f0
[   67.775052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.780520]  kthread+0x328/0x630
[   67.783732]  ret_from_fork+0x10/0x20
[   67.787291] 
[   67.788767] kfence-#107: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.788767] 
[   67.798403] allocated by task 331 on cpu 2 at 67.744913s (0.053487s ago):
[   67.805190]  test_alloc+0x29c/0x628
[   67.808645]  test_out_of_bounds_read+0x198/0x3e0
[   67.813246]  kunit_try_run_case+0x170/0x3f0
[   67.817412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.822881]  kthread+0x328/0x630
[   67.826092]  ret_from_fork+0x10/0x20
[   67.829651] 
[   67.831134] CPU: 2 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   67.841898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.846059] Hardware name: WinLink E850-96 board (DT)
[   67.851095] ==================================================================
[   67.960945] ==================================================================
[   67.961087] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   67.961087] 
[   67.961239] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#109):
[   67.962145]  test_out_of_bounds_read+0x114/0x3e0
[   67.966745]  kunit_try_run_case+0x170/0x3f0
[   67.970911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.976380]  kthread+0x328/0x630
[   67.979591]  ret_from_fork+0x10/0x20
[   67.983150] 
[   67.984630] kfence-#109: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   67.984630] 
[   67.993744] allocated by task 333 on cpu 3 at 67.960910s (0.032832s ago):
[   68.000531]  test_alloc+0x230/0x628
[   68.003984]  test_out_of_bounds_read+0xdc/0x3e0
[   68.008497]  kunit_try_run_case+0x170/0x3f0
[   68.012664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.018133]  kthread+0x328/0x630
[   68.021344]  ret_from_fork+0x10/0x20
[   68.024905] 
[   68.026390] CPU: 3 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   68.037150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.041310] Hardware name: WinLink E850-96 board (DT)
[   68.046348] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   20.824897] ==================================================================
[   20.847561] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   20.847561] 
[   20.857108] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#39):
[   20.866486]  kmalloc_track_caller_oob_right+0x224/0x488
[   20.871691]  kunit_try_run_case+0x170/0x3f0
[   20.875858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.881327]  kthread+0x328/0x630
[   20.884538]  ret_from_fork+0x10/0x20
[   20.888097] 
[   20.889576] kfence-#39: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   20.889576] 
[   20.899299] allocated by task 186 on cpu 3 at 20.824501s (0.074795s ago):
[   20.906084]  kmalloc_track_caller_oob_right+0x184/0x488
[   20.911274]  kunit_try_run_case+0x170/0x3f0
[   20.915441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.920910]  kthread+0x328/0x630
[   20.924121]  ret_from_fork+0x10/0x20
[   20.927680] 
[   20.929157] freed by task 186 on cpu 3 at 20.824857s (0.104298s ago):
[   20.935596]  kmalloc_track_caller_oob_right+0x224/0x488
[   20.940787]  kunit_try_run_case+0x170/0x3f0
[   20.944954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.950423]  kthread+0x328/0x630
[   20.953635]  ret_from_fork+0x10/0x20
[   20.957195] 
[   20.958679] CPU: 3 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   20.969440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.973601] Hardware name: WinLink E850-96 board (DT)
[   20.978637] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   66.610536] ==================================================================
[   66.617623] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   66.624476] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329
[   66.632027] 
[   66.633510] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   66.633558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.633577] Hardware name: WinLink E850-96 board (DT)
[   66.633596] Call trace:
[   66.633607]  show_stack+0x20/0x38 (C)
[   66.633640]  dump_stack_lvl+0x8c/0xd0
[   66.633677]  print_report+0x118/0x608
[   66.633711]  kasan_report+0xdc/0x128
[   66.633743]  kasan_check_range+0x100/0x1a8
[   66.633777]  __kasan_check_write+0x20/0x30
[   66.633806]  strncpy_from_user+0x3c/0x2a0
[   66.633839]  copy_user_test_oob+0x5c0/0xec8
[   66.633874]  kunit_try_run_case+0x170/0x3f0
[   66.633909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.633950]  kthread+0x328/0x630
[   66.633976]  ret_from_fork+0x10/0x20
[   66.634008] 
[   66.704595] Allocated by task 329:
[   66.707981]  kasan_save_stack+0x3c/0x68
[   66.711801]  kasan_save_track+0x20/0x40
[   66.715620]  kasan_save_alloc_info+0x40/0x58
[   66.719874]  __kasan_kmalloc+0xd4/0xd8
[   66.723606]  __kmalloc_noprof+0x190/0x4d0
[   66.727599]  kunit_kmalloc_array+0x34/0x88
[   66.731679]  copy_user_test_oob+0xac/0xec8
[   66.735759]  kunit_try_run_case+0x170/0x3f0
[   66.739925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.745394]  kthread+0x328/0x630
[   66.748606]  ret_from_fork+0x10/0x20
[   66.752165] 
[   66.753640] The buggy address belongs to the object at ffff000800da9800
[   66.753640]  which belongs to the cache kmalloc-128 of size 128
[   66.766140] The buggy address is located 0 bytes inside of
[   66.766140]  allocated 120-byte region [ffff000800da9800, ffff000800da9878)
[   66.778553] 
[   66.780031] The buggy address belongs to the physical page:
[   66.785585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8
[   66.793570] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.801211] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.808153] page_type: f5(slab)
[   66.811286] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.819010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.826737] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.834548] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.842361] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff
[   66.850173] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.857979] page dumped because: kasan: bad access detected
[   66.863536] 
[   66.865010] Memory state around the buggy address:
[   66.869790]  ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.876993]  ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.884197] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.891398]                                                                 ^
[   66.898520]  ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.905725]  ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.912926] ==================================================================
[   66.920336] ==================================================================
[   66.927341] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   66.934280] Write of size 1 at addr ffff000800da9878 by task kunit_try_catch/329
[   66.941658] 
[   66.943142] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   66.943190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.943209] Hardware name: WinLink E850-96 board (DT)
[   66.943229] Call trace:
[   66.943241]  show_stack+0x20/0x38 (C)
[   66.943277]  dump_stack_lvl+0x8c/0xd0
[   66.943315]  print_report+0x118/0x608
[   66.943350]  kasan_report+0xdc/0x128
[   66.943384]  __asan_report_store1_noabort+0x20/0x30
[   66.943415]  strncpy_from_user+0x270/0x2a0
[   66.943444]  copy_user_test_oob+0x5c0/0xec8
[   66.943478]  kunit_try_run_case+0x170/0x3f0
[   66.943514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.943554]  kthread+0x328/0x630
[   66.943580]  ret_from_fork+0x10/0x20
[   66.943614] 
[   67.011015] Allocated by task 329:
[   67.014400]  kasan_save_stack+0x3c/0x68
[   67.018220]  kasan_save_track+0x20/0x40
[   67.022039]  kasan_save_alloc_info+0x40/0x58
[   67.026293]  __kasan_kmalloc+0xd4/0xd8
[   67.030025]  __kmalloc_noprof+0x190/0x4d0
[   67.034018]  kunit_kmalloc_array+0x34/0x88
[   67.038097]  copy_user_test_oob+0xac/0xec8
[   67.042177]  kunit_try_run_case+0x170/0x3f0
[   67.046345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.051813]  kthread+0x328/0x630
[   67.055025]  ret_from_fork+0x10/0x20
[   67.058584] 
[   67.060061] The buggy address belongs to the object at ffff000800da9800
[   67.060061]  which belongs to the cache kmalloc-128 of size 128
[   67.072559] The buggy address is located 0 bytes to the right of
[   67.072559]  allocated 120-byte region [ffff000800da9800, ffff000800da9878)
[   67.085493] 
[   67.086970] The buggy address belongs to the physical page:
[   67.092527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8
[   67.100511] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   67.108149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   67.115093] page_type: f5(slab)
[   67.118229] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   67.125950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.133677] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   67.141488] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.149301] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff
[   67.157113] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   67.164919] page dumped because: kasan: bad access detected
[   67.170474] 
[   67.171950] Memory state around the buggy address:
[   67.176730]  ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.183932]  ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.191137] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   67.198338]                                                                 ^
[   67.205460]  ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.212665]  ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.219866] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   64.770442] ==================================================================
[   64.782756] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   64.789783] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329
[   64.797333] 
[   64.798820] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   64.798875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.798896] Hardware name: WinLink E850-96 board (DT)
[   64.798918] Call trace:
[   64.798932]  show_stack+0x20/0x38 (C)
[   64.798970]  dump_stack_lvl+0x8c/0xd0
[   64.799009]  print_report+0x118/0x608
[   64.799048]  kasan_report+0xdc/0x128
[   64.799082]  kasan_check_range+0x100/0x1a8
[   64.799121]  __kasan_check_write+0x20/0x30
[   64.799152]  copy_user_test_oob+0x234/0xec8
[   64.799187]  kunit_try_run_case+0x170/0x3f0
[   64.799230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.799273]  kthread+0x328/0x630
[   64.799303]  ret_from_fork+0x10/0x20
[   64.799341] 
[   64.865909] Allocated by task 329:
[   64.869296]  kasan_save_stack+0x3c/0x68
[   64.873113]  kasan_save_track+0x20/0x40
[   64.876932]  kasan_save_alloc_info+0x40/0x58
[   64.881186]  __kasan_kmalloc+0xd4/0xd8
[   64.884918]  __kmalloc_noprof+0x190/0x4d0
[   64.888911]  kunit_kmalloc_array+0x34/0x88
[   64.892992]  copy_user_test_oob+0xac/0xec8
[   64.897071]  kunit_try_run_case+0x170/0x3f0
[   64.901237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.906706]  kthread+0x328/0x630
[   64.909918]  ret_from_fork+0x10/0x20
[   64.913477] 
[   64.914955] The buggy address belongs to the object at ffff000800da9800
[   64.914955]  which belongs to the cache kmalloc-128 of size 128
[   64.927456] The buggy address is located 0 bytes inside of
[   64.927456]  allocated 120-byte region [ffff000800da9800, ffff000800da9878)
[   64.939865] 
[   64.941344] The buggy address belongs to the physical page:
[   64.946901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8
[   64.954886] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.962525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.969467] page_type: f5(slab)
[   64.972604] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.980323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.988050] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.995860] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.003673] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff
[   65.011485] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.019291] page dumped because: kasan: bad access detected
[   65.024848] 
[   65.026322] Memory state around the buggy address:
[   65.031104]  ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.038305]  ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.045512] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.052711]                                                                 ^
[   65.059832]  ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.067037]  ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.074239] ==================================================================
[   66.304907] ==================================================================
[   66.311896] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   66.318926] Read of size 121 at addr ffff000800da9800 by task kunit_try_catch/329
[   66.326389] 
[   66.327872] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   66.327924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.327941] Hardware name: WinLink E850-96 board (DT)
[   66.327963] Call trace:
[   66.327978]  show_stack+0x20/0x38 (C)
[   66.328014]  dump_stack_lvl+0x8c/0xd0
[   66.328052]  print_report+0x118/0x608
[   66.328088]  kasan_report+0xdc/0x128
[   66.328120]  kasan_check_range+0x100/0x1a8
[   66.328154]  __kasan_check_read+0x20/0x30
[   66.328184]  copy_user_test_oob+0x4a0/0xec8
[   66.328219]  kunit_try_run_case+0x170/0x3f0
[   66.328255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.328297]  kthread+0x328/0x630
[   66.328324]  ret_from_fork+0x10/0x20
[   66.328359] 
[   66.394878] Allocated by task 329:
[   66.398264]  kasan_save_stack+0x3c/0x68
[   66.402083]  kasan_save_track+0x20/0x40
[   66.405902]  kasan_save_alloc_info+0x40/0x58
[   66.410156]  __kasan_kmalloc+0xd4/0xd8
[   66.413888]  __kmalloc_noprof+0x190/0x4d0
[   66.417881]  kunit_kmalloc_array+0x34/0x88
[   66.421961]  copy_user_test_oob+0xac/0xec8
[   66.426041]  kunit_try_run_case+0x170/0x3f0
[   66.430208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.435676]  kthread+0x328/0x630
[   66.438888]  ret_from_fork+0x10/0x20
[   66.442447] 
[   66.443923] The buggy address belongs to the object at ffff000800da9800
[   66.443923]  which belongs to the cache kmalloc-128 of size 128
[   66.456424] The buggy address is located 0 bytes inside of
[   66.456424]  allocated 120-byte region [ffff000800da9800, ffff000800da9878)
[   66.468835] 
[   66.470313] The buggy address belongs to the physical page:
[   66.475869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8
[   66.483853] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.491492] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.498437] page_type: f5(slab)
[   66.501570] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.509293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.517019] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.524831] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.532643] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff
[   66.540455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.548261] page dumped because: kasan: bad access detected
[   66.553818] 
[   66.555292] Memory state around the buggy address:
[   66.560074]  ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.567275]  ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.574480] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.581681]                                                                 ^
[   66.588803]  ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.596007]  ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.603209] ==================================================================
[   65.999186] ==================================================================
[   66.006001] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   66.013027] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329
[   66.020578] 
[   66.022064] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   66.022115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.022133] Hardware name: WinLink E850-96 board (DT)
[   66.022153] Call trace:
[   66.022168]  show_stack+0x20/0x38 (C)
[   66.022206]  dump_stack_lvl+0x8c/0xd0
[   66.022244]  print_report+0x118/0x608
[   66.022280]  kasan_report+0xdc/0x128
[   66.022312]  kasan_check_range+0x100/0x1a8
[   66.022347]  __kasan_check_write+0x20/0x30
[   66.022376]  copy_user_test_oob+0x434/0xec8
[   66.022409]  kunit_try_run_case+0x170/0x3f0
[   66.022444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.022485]  kthread+0x328/0x630
[   66.022513]  ret_from_fork+0x10/0x20
[   66.022547] 
[   66.089154] Allocated by task 329:
[   66.092539]  kasan_save_stack+0x3c/0x68
[   66.096358]  kasan_save_track+0x20/0x40
[   66.100178]  kasan_save_alloc_info+0x40/0x58
[   66.104431]  __kasan_kmalloc+0xd4/0xd8
[   66.108164]  __kmalloc_noprof+0x190/0x4d0
[   66.112157]  kunit_kmalloc_array+0x34/0x88
[   66.116237]  copy_user_test_oob+0xac/0xec8
[   66.120316]  kunit_try_run_case+0x170/0x3f0
[   66.124483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.129952]  kthread+0x328/0x630
[   66.133163]  ret_from_fork+0x10/0x20
[   66.136723] 
[   66.138200] The buggy address belongs to the object at ffff000800da9800
[   66.138200]  which belongs to the cache kmalloc-128 of size 128
[   66.150700] The buggy address is located 0 bytes inside of
[   66.150700]  allocated 120-byte region [ffff000800da9800, ffff000800da9878)
[   66.163111] 
[   66.164590] The buggy address belongs to the physical page:
[   66.170146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8
[   66.178131] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.185770] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.192713] page_type: f5(slab)
[   66.195846] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.203568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.211294] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.219106] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.226919] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff
[   66.234731] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.242537] page dumped because: kasan: bad access detected
[   66.248094] 
[   66.249568] Memory state around the buggy address:
[   66.254348]  ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.261551]  ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.268755] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.275957]                                                                 ^
[   66.283078]  ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.290283]  ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.297484] ==================================================================
[   65.081656] ==================================================================
[   65.088652] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   65.095679] Read of size 121 at addr ffff000800da9800 by task kunit_try_catch/329
[   65.103144] 
[   65.104629] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   65.104688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.104708] Hardware name: WinLink E850-96 board (DT)
[   65.104729] Call trace:
[   65.104743]  show_stack+0x20/0x38 (C)
[   65.104776]  dump_stack_lvl+0x8c/0xd0
[   65.104814]  print_report+0x118/0x608
[   65.104852]  kasan_report+0xdc/0x128
[   65.104885]  kasan_check_range+0x100/0x1a8
[   65.104922]  __kasan_check_read+0x20/0x30
[   65.104952]  copy_user_test_oob+0x728/0xec8
[   65.104987]  kunit_try_run_case+0x170/0x3f0
[   65.105025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.105064]  kthread+0x328/0x630
[   65.105094]  ret_from_fork+0x10/0x20
[   65.105131] 
[   65.171632] Allocated by task 329:
[   65.175020]  kasan_save_stack+0x3c/0x68
[   65.178838]  kasan_save_track+0x20/0x40
[   65.182657]  kasan_save_alloc_info+0x40/0x58
[   65.186910]  __kasan_kmalloc+0xd4/0xd8
[   65.190643]  __kmalloc_noprof+0x190/0x4d0
[   65.194636]  kunit_kmalloc_array+0x34/0x88
[   65.198715]  copy_user_test_oob+0xac/0xec8
[   65.202795]  kunit_try_run_case+0x170/0x3f0
[   65.206962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.212431]  kthread+0x328/0x630
[   65.215643]  ret_from_fork+0x10/0x20
[   65.219201] 
[   65.220679] The buggy address belongs to the object at ffff000800da9800
[   65.220679]  which belongs to the cache kmalloc-128 of size 128
[   65.233179] The buggy address is located 0 bytes inside of
[   65.233179]  allocated 120-byte region [ffff000800da9800, ffff000800da9878)
[   65.245590] 
[   65.247069] The buggy address belongs to the physical page:
[   65.252624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8
[   65.260607] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.268246] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.275190] page_type: f5(slab)
[   65.278328] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.286047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.293774] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.301585] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.309398] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff
[   65.317210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.325016] page dumped because: kasan: bad access detected
[   65.330572] 
[   65.332047] Memory state around the buggy address:
[   65.336827]  ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.344030]  ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.351237] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.358436]                                                                 ^
[   65.365557]  ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.372762]  ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.379963] ==================================================================
[   65.693259] ==================================================================
[   65.700276] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   65.707304] Read of size 121 at addr ffff000800da9800 by task kunit_try_catch/329
[   65.714767] 
[   65.716252] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   65.716310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.716328] Hardware name: WinLink E850-96 board (DT)
[   65.716348] Call trace:
[   65.716363]  show_stack+0x20/0x38 (C)
[   65.716400]  dump_stack_lvl+0x8c/0xd0
[   65.716437]  print_report+0x118/0x608
[   65.716474]  kasan_report+0xdc/0x128
[   65.716506]  kasan_check_range+0x100/0x1a8
[   65.716542]  __kasan_check_read+0x20/0x30
[   65.716571]  copy_user_test_oob+0x3c8/0xec8
[   65.716604]  kunit_try_run_case+0x170/0x3f0
[   65.716639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.716681]  kthread+0x328/0x630
[   65.716712]  ret_from_fork+0x10/0x20
[   65.716749] 
[   65.783255] Allocated by task 329:
[   65.786644]  kasan_save_stack+0x3c/0x68
[   65.790461]  kasan_save_track+0x20/0x40
[   65.794279]  kasan_save_alloc_info+0x40/0x58
[   65.798533]  __kasan_kmalloc+0xd4/0xd8
[   65.802266]  __kmalloc_noprof+0x190/0x4d0
[   65.806259]  kunit_kmalloc_array+0x34/0x88
[   65.810339]  copy_user_test_oob+0xac/0xec8
[   65.814418]  kunit_try_run_case+0x170/0x3f0
[   65.818585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.824054]  kthread+0x328/0x630
[   65.827265]  ret_from_fork+0x10/0x20
[   65.830824] 
[   65.832302] The buggy address belongs to the object at ffff000800da9800
[   65.832302]  which belongs to the cache kmalloc-128 of size 128
[   65.844800] The buggy address is located 0 bytes inside of
[   65.844800]  allocated 120-byte region [ffff000800da9800, ffff000800da9878)
[   65.857213] 
[   65.858692] The buggy address belongs to the physical page:
[   65.864249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8
[   65.872232] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.879870] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.886814] page_type: f5(slab)
[   65.889950] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.897670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.905397] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.913208] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.921021] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff
[   65.928833] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.936638] page dumped because: kasan: bad access detected
[   65.942196] 
[   65.943669] Memory state around the buggy address:
[   65.948449]  ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.955652]  ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.962857] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.970058]                                                                 ^
[   65.977180]  ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.984384]  ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.991586] ==================================================================
[   65.387656] ==================================================================
[   65.394378] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   65.401404] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329
[   65.408956] 
[   65.410441] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   65.410497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.410514] Hardware name: WinLink E850-96 board (DT)
[   65.410538] Call trace:
[   65.410554]  show_stack+0x20/0x38 (C)
[   65.410590]  dump_stack_lvl+0x8c/0xd0
[   65.410626]  print_report+0x118/0x608
[   65.410664]  kasan_report+0xdc/0x128
[   65.410696]  kasan_check_range+0x100/0x1a8
[   65.410736]  __kasan_check_write+0x20/0x30
[   65.410766]  copy_user_test_oob+0x35c/0xec8
[   65.410797]  kunit_try_run_case+0x170/0x3f0
[   65.410831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.410872]  kthread+0x328/0x630
[   65.410899]  ret_from_fork+0x10/0x20
[   65.410937] 
[   65.477531] Allocated by task 329:
[   65.480917]  kasan_save_stack+0x3c/0x68
[   65.484735]  kasan_save_track+0x20/0x40
[   65.488555]  kasan_save_alloc_info+0x40/0x58
[   65.492808]  __kasan_kmalloc+0xd4/0xd8
[   65.496541]  __kmalloc_noprof+0x190/0x4d0
[   65.500534]  kunit_kmalloc_array+0x34/0x88
[   65.504614]  copy_user_test_oob+0xac/0xec8
[   65.508693]  kunit_try_run_case+0x170/0x3f0
[   65.512860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.518329]  kthread+0x328/0x630
[   65.521541]  ret_from_fork+0x10/0x20
[   65.525100] 
[   65.526577] The buggy address belongs to the object at ffff000800da9800
[   65.526577]  which belongs to the cache kmalloc-128 of size 128
[   65.539077] The buggy address is located 0 bytes inside of
[   65.539077]  allocated 120-byte region [ffff000800da9800, ffff000800da9878)
[   65.551488] 
[   65.552966] The buggy address belongs to the physical page:
[   65.558522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8
[   65.566508] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.574144] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.581088] page_type: f5(slab)
[   65.584225] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.591946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.599673] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.607483] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.615296] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff
[   65.623108] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.630914] page dumped because: kasan: bad access detected
[   65.636471] 
[   65.637945] Memory state around the buggy address:
[   65.642727]  ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.649928]  ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.657135] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.664333]                                                                 ^
[   65.671455]  ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.678660]  ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.685861] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   64.456351] ==================================================================
[   64.463317] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   64.470602] Write of size 8 at addr ffff000805826578 by task kunit_try_catch/325
[   64.477980] 
[   64.479465] CPU: 2 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   64.479519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.479537] Hardware name: WinLink E850-96 board (DT)
[   64.479558] Call trace:
[   64.479572]  show_stack+0x20/0x38 (C)
[   64.479608]  dump_stack_lvl+0x8c/0xd0
[   64.479647]  print_report+0x118/0x608
[   64.479685]  kasan_report+0xdc/0x128
[   64.479716]  kasan_check_range+0x100/0x1a8
[   64.479753]  __kasan_check_write+0x20/0x30
[   64.479783]  copy_to_kernel_nofault+0x8c/0x250
[   64.479822]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   64.479854]  kunit_try_run_case+0x170/0x3f0
[   64.479891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.479930]  kthread+0x328/0x630
[   64.479959]  ret_from_fork+0x10/0x20
[   64.479994] 
[   64.551677] Allocated by task 325:
[   64.555066]  kasan_save_stack+0x3c/0x68
[   64.558882]  kasan_save_track+0x20/0x40
[   64.562701]  kasan_save_alloc_info+0x40/0x58
[   64.566955]  __kasan_kmalloc+0xd4/0xd8
[   64.570687]  __kmalloc_cache_noprof+0x15c/0x3c0
[   64.575201]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.579975]  kunit_try_run_case+0x170/0x3f0
[   64.584142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.589612]  kthread+0x328/0x630
[   64.592822]  ret_from_fork+0x10/0x20
[   64.596381] 
[   64.597858] The buggy address belongs to the object at ffff000805826500
[   64.597858]  which belongs to the cache kmalloc-128 of size 128
[   64.610358] The buggy address is located 0 bytes to the right of
[   64.610358]  allocated 120-byte region [ffff000805826500, ffff000805826578)
[   64.623290] 
[   64.624769] The buggy address belongs to the physical page:
[   64.630324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885826
[   64.638309] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.645947] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.652890] page_type: f5(slab)
[   64.656025] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.663748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.671474] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.679285] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.687098] head: 0bfffe0000000001 fffffdffe0160981 00000000ffffffff 00000000ffffffff
[   64.694910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.702716] page dumped because: kasan: bad access detected
[   64.708273] 
[   64.709747] Memory state around the buggy address:
[   64.714530]  ffff000805826400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.721730]  ffff000805826480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.728935] >ffff000805826500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.736136]                                                                 ^
[   64.743257]  ffff000805826580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.750462]  ffff000805826600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.757663] ==================================================================
[   64.143682] ==================================================================
[   64.157853] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   64.165225] Read of size 8 at addr ffff000805826578 by task kunit_try_catch/325
[   64.172516] 
[   64.174002] CPU: 2 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   64.174060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.174079] Hardware name: WinLink E850-96 board (DT)
[   64.174102] Call trace:
[   64.174117]  show_stack+0x20/0x38 (C)
[   64.174157]  dump_stack_lvl+0x8c/0xd0
[   64.174200]  print_report+0x118/0x608
[   64.174238]  kasan_report+0xdc/0x128
[   64.174272]  __asan_report_load8_noabort+0x20/0x30
[   64.174308]  copy_to_kernel_nofault+0x204/0x250
[   64.174346]  copy_to_kernel_nofault_oob+0x158/0x418
[   64.174380]  kunit_try_run_case+0x170/0x3f0
[   64.174420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.174461]  kthread+0x328/0x630
[   64.174493]  ret_from_fork+0x10/0x20
[   64.174531] 
[   64.242914] Allocated by task 325:
[   64.246302]  kasan_save_stack+0x3c/0x68
[   64.250119]  kasan_save_track+0x20/0x40
[   64.253938]  kasan_save_alloc_info+0x40/0x58
[   64.258192]  __kasan_kmalloc+0xd4/0xd8
[   64.261924]  __kmalloc_cache_noprof+0x15c/0x3c0
[   64.266438]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.271212]  kunit_try_run_case+0x170/0x3f0
[   64.275379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.280849]  kthread+0x328/0x630
[   64.284059]  ret_from_fork+0x10/0x20
[   64.287618] 
[   64.289097] The buggy address belongs to the object at ffff000805826500
[   64.289097]  which belongs to the cache kmalloc-128 of size 128
[   64.301597] The buggy address is located 0 bytes to the right of
[   64.301597]  allocated 120-byte region [ffff000805826500, ffff000805826578)
[   64.314527] 
[   64.316006] The buggy address belongs to the physical page:
[   64.321564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885826
[   64.329548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.337186] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.344129] page_type: f5(slab)
[   64.347267] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.354985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.362713] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.370523] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.378336] head: 0bfffe0000000001 fffffdffe0160981 00000000ffffffff 00000000ffffffff
[   64.386148] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.393954] page dumped because: kasan: bad access detected
[   64.399510] 
[   64.400984] Memory state around the buggy address:
[   64.405769]  ffff000805826400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.412967]  ffff000805826480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.420173] >ffff000805826500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.427373]                                                                 ^
[   64.434494]  ffff000805826580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.441700]  ffff000805826600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.448902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   63.909761] ==================================================================
[   63.916793] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   63.923475] Read of size 1 at addr ffff800087ced7f8 by task kunit_try_catch/313
[   63.930766] 
[   63.932250] CPU: 6 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   63.932302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.932319] Hardware name: WinLink E850-96 board (DT)
[   63.932340] Call trace:
[   63.932352]  show_stack+0x20/0x38 (C)
[   63.932387]  dump_stack_lvl+0x8c/0xd0
[   63.932427]  print_report+0x310/0x608
[   63.932463]  kasan_report+0xdc/0x128
[   63.932495]  __asan_report_load1_noabort+0x20/0x30
[   63.932527]  vmalloc_oob+0x51c/0x5d0
[   63.932557]  kunit_try_run_case+0x170/0x3f0
[   63.932592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.932634]  kthread+0x328/0x630
[   63.932663]  ret_from_fork+0x10/0x20
[   63.932697] 
[   63.995354] The buggy address belongs to the virtual mapping at
[   63.995354]  [ffff800087ced000, ffff800087cef000) created by:
[   63.995354]  vmalloc_oob+0x98/0x5d0
[   64.010452] 
[   64.011932] The buggy address belongs to the physical page:
[   64.017488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8860c3
[   64.025472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.031990] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   64.039712] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.047431] page dumped because: kasan: bad access detected
[   64.052988] 
[   64.054462] Memory state around the buggy address:
[   64.059243]  ffff800087ced680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.066445]  ffff800087ced700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.073651] >ffff800087ced780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   64.080850]                                                                 ^
[   64.087973]  ffff800087ced800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   64.095178]  ffff800087ced880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   64.102378] ==================================================================
[   63.702769] ==================================================================
[   63.717059] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   63.723741] Read of size 1 at addr ffff800087ced7f3 by task kunit_try_catch/313
[   63.731029] 
[   63.732515] CPU: 6 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   63.732573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.732593] Hardware name: WinLink E850-96 board (DT)
[   63.732614] Call trace:
[   63.732631]  show_stack+0x20/0x38 (C)
[   63.732673]  dump_stack_lvl+0x8c/0xd0
[   63.732711]  print_report+0x310/0x608
[   63.732750]  kasan_report+0xdc/0x128
[   63.732782]  __asan_report_load1_noabort+0x20/0x30
[   63.732816]  vmalloc_oob+0x578/0x5d0
[   63.732846]  kunit_try_run_case+0x170/0x3f0
[   63.732881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.732925]  kthread+0x328/0x630
[   63.732955]  ret_from_fork+0x10/0x20
[   63.732990] 
[   63.795619] The buggy address belongs to the virtual mapping at
[   63.795619]  [ffff800087ced000, ffff800087cef000) created by:
[   63.795619]  vmalloc_oob+0x98/0x5d0
[   63.810716] 
[   63.812196] The buggy address belongs to the physical page:
[   63.817751] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8860c3
[   63.825737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.832257] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.839975] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.847696] page dumped because: kasan: bad access detected
[   63.853251] 
[   63.854727] Memory state around the buggy address:
[   63.859507]  ffff800087ced680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.866708]  ffff800087ced700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.873913] >ffff800087ced780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.881114]                                                              ^
[   63.887977]  ffff800087ced800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.895180]  ffff800087ced880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.902381] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   49.182520] ==================================================================
[   49.189583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   49.196873] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   49.204251] 
[   49.205730] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   49.205779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.205796] Hardware name: WinLink E850-96 board (DT)
[   49.205815] Call trace:
[   49.205828]  show_stack+0x20/0x38 (C)
[   49.205862]  dump_stack_lvl+0x8c/0xd0
[   49.205899]  print_report+0x118/0x608
[   49.205933]  kasan_report+0xdc/0x128
[   49.205966]  kasan_check_range+0x100/0x1a8
[   49.206002]  __kasan_check_write+0x20/0x30
[   49.206032]  kasan_atomics_helper+0x47c/0x4858
[   49.206065]  kasan_atomics+0x198/0x2e0
[   49.206098]  kunit_try_run_case+0x170/0x3f0
[   49.206130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.206168]  kthread+0x328/0x630
[   49.206197]  ret_from_fork+0x10/0x20
[   49.206228] 
[   49.276819] Allocated by task 309:
[   49.280205]  kasan_save_stack+0x3c/0x68
[   49.284024]  kasan_save_track+0x20/0x40
[   49.287844]  kasan_save_alloc_info+0x40/0x58
[   49.292097]  __kasan_kmalloc+0xd4/0xd8
[   49.295830]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.300343]  kasan_atomics+0xb8/0x2e0
[   49.303989]  kunit_try_run_case+0x170/0x3f0
[   49.308156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.313624]  kthread+0x328/0x630
[   49.316836]  ret_from_fork+0x10/0x20
[   49.320395] 
[   49.321871] The buggy address belongs to the object at ffff000800c2e200
[   49.321871]  which belongs to the cache kmalloc-64 of size 64
[   49.334197] The buggy address is located 0 bytes to the right of
[   49.334197]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   49.347044] 
[   49.348520] The buggy address belongs to the physical page:
[   49.354076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   49.362061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.368571] page_type: f5(slab)
[   49.371704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.379429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.387148] page dumped because: kasan: bad access detected
[   49.392703] 
[   49.394179] Memory state around the buggy address:
[   49.398957]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.406161]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.413366] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.420567]                                      ^
[   49.425345]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.432550]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.439751] ==================================================================
[   52.618740] ==================================================================
[   52.625817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   52.633106] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   52.640484] 
[   52.641963] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   52.642012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.642029] Hardware name: WinLink E850-96 board (DT)
[   52.642049] Call trace:
[   52.642062]  show_stack+0x20/0x38 (C)
[   52.642094]  dump_stack_lvl+0x8c/0xd0
[   52.642130]  print_report+0x118/0x608
[   52.642163]  kasan_report+0xdc/0x128
[   52.642195]  kasan_check_range+0x100/0x1a8
[   52.642230]  __kasan_check_write+0x20/0x30
[   52.642259]  kasan_atomics_helper+0xa04/0x4858
[   52.642294]  kasan_atomics+0x198/0x2e0
[   52.642326]  kunit_try_run_case+0x170/0x3f0
[   52.642358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.642396]  kthread+0x328/0x630
[   52.642423]  ret_from_fork+0x10/0x20
[   52.642456] 
[   52.713052] Allocated by task 309:
[   52.716438]  kasan_save_stack+0x3c/0x68
[   52.720257]  kasan_save_track+0x20/0x40
[   52.724076]  kasan_save_alloc_info+0x40/0x58
[   52.728330]  __kasan_kmalloc+0xd4/0xd8
[   52.732062]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.736576]  kasan_atomics+0xb8/0x2e0
[   52.740222]  kunit_try_run_case+0x170/0x3f0
[   52.744389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.749857]  kthread+0x328/0x630
[   52.753069]  ret_from_fork+0x10/0x20
[   52.756628] 
[   52.758104] The buggy address belongs to the object at ffff000800c2e200
[   52.758104]  which belongs to the cache kmalloc-64 of size 64
[   52.770430] The buggy address is located 0 bytes to the right of
[   52.770430]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   52.783277] 
[   52.784753] The buggy address belongs to the physical page:
[   52.790309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   52.798294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.804805] page_type: f5(slab)
[   52.807937] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.815662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.823381] page dumped because: kasan: bad access detected
[   52.828936] 
[   52.830411] Memory state around the buggy address:
[   52.835189]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.842394]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.849599] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.856800]                                      ^
[   52.861578]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.868783]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.875984] ==================================================================
[   51.563725] ==================================================================
[   51.570797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   51.578087] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   51.585465] 
[   51.586945] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   51.586993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.587007] Hardware name: WinLink E850-96 board (DT)
[   51.587024] Call trace:
[   51.587037]  show_stack+0x20/0x38 (C)
[   51.587069]  dump_stack_lvl+0x8c/0xd0
[   51.587104]  print_report+0x118/0x608
[   51.587136]  kasan_report+0xdc/0x128
[   51.587169]  kasan_check_range+0x100/0x1a8
[   51.587203]  __kasan_check_write+0x20/0x30
[   51.587235]  kasan_atomics_helper+0x894/0x4858
[   51.587268]  kasan_atomics+0x198/0x2e0
[   51.587297]  kunit_try_run_case+0x170/0x3f0
[   51.587333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.587371]  kthread+0x328/0x630
[   51.587397]  ret_from_fork+0x10/0x20
[   51.587430] 
[   51.658033] Allocated by task 309:
[   51.661419]  kasan_save_stack+0x3c/0x68
[   51.665238]  kasan_save_track+0x20/0x40
[   51.669058]  kasan_save_alloc_info+0x40/0x58
[   51.673311]  __kasan_kmalloc+0xd4/0xd8
[   51.677044]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.681557]  kasan_atomics+0xb8/0x2e0
[   51.685203]  kunit_try_run_case+0x170/0x3f0
[   51.689370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.694838]  kthread+0x328/0x630
[   51.698050]  ret_from_fork+0x10/0x20
[   51.701610] 
[   51.703085] The buggy address belongs to the object at ffff000800c2e200
[   51.703085]  which belongs to the cache kmalloc-64 of size 64
[   51.715412] The buggy address is located 0 bytes to the right of
[   51.715412]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   51.728258] 
[   51.729734] The buggy address belongs to the physical page:
[   51.735290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   51.743275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.749786] page_type: f5(slab)
[   51.752919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.760643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.768362] page dumped because: kasan: bad access detected
[   51.773917] 
[   51.775393] Memory state around the buggy address:
[   51.780171]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.787375]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.794580] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.801781]                                      ^
[   51.806559]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.813764]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.820965] ==================================================================
[   56.567459] ==================================================================
[   56.574543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   56.581918] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   56.589296] 
[   56.590776] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   56.590822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.590838] Hardware name: WinLink E850-96 board (DT)
[   56.590856] Call trace:
[   56.590868]  show_stack+0x20/0x38 (C)
[   56.590901]  dump_stack_lvl+0x8c/0xd0
[   56.590937]  print_report+0x118/0x608
[   56.590969]  kasan_report+0xdc/0x128
[   56.591001]  __asan_report_store8_noabort+0x20/0x30
[   56.591033]  kasan_atomics_helper+0x3e5c/0x4858
[   56.591066]  kasan_atomics+0x198/0x2e0
[   56.591097]  kunit_try_run_case+0x170/0x3f0
[   56.591131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.591170]  kthread+0x328/0x630
[   56.591196]  ret_from_fork+0x10/0x20
[   56.591227] 
[   56.658653] Allocated by task 309:
[   56.662038]  kasan_save_stack+0x3c/0x68
[   56.665858]  kasan_save_track+0x20/0x40
[   56.669677]  kasan_save_alloc_info+0x40/0x58
[   56.673931]  __kasan_kmalloc+0xd4/0xd8
[   56.677663]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.682177]  kasan_atomics+0xb8/0x2e0
[   56.685823]  kunit_try_run_case+0x170/0x3f0
[   56.689989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.695458]  kthread+0x328/0x630
[   56.698670]  ret_from_fork+0x10/0x20
[   56.702229] 
[   56.703704] The buggy address belongs to the object at ffff000800c2e200
[   56.703704]  which belongs to the cache kmalloc-64 of size 64
[   56.716031] The buggy address is located 0 bytes to the right of
[   56.716031]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   56.728877] 
[   56.730354] The buggy address belongs to the physical page:
[   56.735909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   56.743895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.750405] page_type: f5(slab)
[   56.753538] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.761262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.768981] page dumped because: kasan: bad access detected
[   56.774537] 
[   56.776012] Memory state around the buggy address:
[   56.780790]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.787995]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.795200] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.802401]                                      ^
[   56.807179]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.814383]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.821585] ==================================================================
[   62.116371] ==================================================================
[   62.123421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   62.130793] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   62.138084] 
[   62.139564] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   62.139608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.139626] Hardware name: WinLink E850-96 board (DT)
[   62.139645] Call trace:
[   62.139655]  show_stack+0x20/0x38 (C)
[   62.139690]  dump_stack_lvl+0x8c/0xd0
[   62.139724]  print_report+0x118/0x608
[   62.139761]  kasan_report+0xdc/0x128
[   62.139794]  __asan_report_load8_noabort+0x20/0x30
[   62.139824]  kasan_atomics_helper+0x3df4/0x4858
[   62.139858]  kasan_atomics+0x198/0x2e0
[   62.139890]  kunit_try_run_case+0x170/0x3f0
[   62.139924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.139964]  kthread+0x328/0x630
[   62.139989]  ret_from_fork+0x10/0x20
[   62.140022] 
[   62.207354] Allocated by task 309:
[   62.210741]  kasan_save_stack+0x3c/0x68
[   62.214559]  kasan_save_track+0x20/0x40
[   62.218379]  kasan_save_alloc_info+0x40/0x58
[   62.222632]  __kasan_kmalloc+0xd4/0xd8
[   62.226364]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.230878]  kasan_atomics+0xb8/0x2e0
[   62.234524]  kunit_try_run_case+0x170/0x3f0
[   62.238691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.244159]  kthread+0x328/0x630
[   62.247371]  ret_from_fork+0x10/0x20
[   62.250930] 
[   62.252406] The buggy address belongs to the object at ffff000800c2e200
[   62.252406]  which belongs to the cache kmalloc-64 of size 64
[   62.264732] The buggy address is located 0 bytes to the right of
[   62.264732]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   62.277579] 
[   62.279055] The buggy address belongs to the physical page:
[   62.284611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   62.292596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.299106] page_type: f5(slab)
[   62.302239] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.309963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.317683] page dumped because: kasan: bad access detected
[   62.323238] 
[   62.324713] Memory state around the buggy address:
[   62.329492]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.336696]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.343901] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.351102]                                      ^
[   62.355880]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.363085]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.370286] ==================================================================
[   57.358098] ==================================================================
[   57.365156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   57.372445] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   57.379822] 
[   57.381302] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   57.381350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.381366] Hardware name: WinLink E850-96 board (DT)
[   57.381384] Call trace:
[   57.381395]  show_stack+0x20/0x38 (C)
[   57.381426]  dump_stack_lvl+0x8c/0xd0
[   57.381463]  print_report+0x118/0x608
[   57.381496]  kasan_report+0xdc/0x128
[   57.381530]  kasan_check_range+0x100/0x1a8
[   57.381565]  __kasan_check_write+0x20/0x30
[   57.381595]  kasan_atomics_helper+0xf88/0x4858
[   57.381628]  kasan_atomics+0x198/0x2e0
[   57.381659]  kunit_try_run_case+0x170/0x3f0
[   57.381691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.381729]  kthread+0x328/0x630
[   57.381755]  ret_from_fork+0x10/0x20
[   57.381787] 
[   57.452391] Allocated by task 309:
[   57.455777]  kasan_save_stack+0x3c/0x68
[   57.459596]  kasan_save_track+0x20/0x40
[   57.463415]  kasan_save_alloc_info+0x40/0x58
[   57.467669]  __kasan_kmalloc+0xd4/0xd8
[   57.471401]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.475915]  kasan_atomics+0xb8/0x2e0
[   57.479561]  kunit_try_run_case+0x170/0x3f0
[   57.483727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.489196]  kthread+0x328/0x630
[   57.492408]  ret_from_fork+0x10/0x20
[   57.495967] 
[   57.497442] The buggy address belongs to the object at ffff000800c2e200
[   57.497442]  which belongs to the cache kmalloc-64 of size 64
[   57.509769] The buggy address is located 0 bytes to the right of
[   57.509769]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   57.522616] 
[   57.524092] The buggy address belongs to the physical page:
[   57.529647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   57.537633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.544143] page_type: f5(slab)
[   57.547276] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.555000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.562719] page dumped because: kasan: bad access detected
[   57.568275] 
[   57.569750] Memory state around the buggy address:
[   57.574528]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.581733]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.588937] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.596139]                                      ^
[   57.600917]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.608121]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.615323] ==================================================================
[   57.622652] ==================================================================
[   57.629733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   57.637024] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   57.644402] 
[   57.645882] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   57.645928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.645943] Hardware name: WinLink E850-96 board (DT)
[   57.645962] Call trace:
[   57.645973]  show_stack+0x20/0x38 (C)
[   57.646004]  dump_stack_lvl+0x8c/0xd0
[   57.646039]  print_report+0x118/0x608
[   57.646074]  kasan_report+0xdc/0x128
[   57.646105]  kasan_check_range+0x100/0x1a8
[   57.646141]  __kasan_check_write+0x20/0x30
[   57.646171]  kasan_atomics_helper+0xff0/0x4858
[   57.646204]  kasan_atomics+0x198/0x2e0
[   57.646235]  kunit_try_run_case+0x170/0x3f0
[   57.646269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.646307]  kthread+0x328/0x630
[   57.646334]  ret_from_fork+0x10/0x20
[   57.646364] 
[   57.716970] Allocated by task 309:
[   57.720356]  kasan_save_stack+0x3c/0x68
[   57.724175]  kasan_save_track+0x20/0x40
[   57.727995]  kasan_save_alloc_info+0x40/0x58
[   57.732248]  __kasan_kmalloc+0xd4/0xd8
[   57.735981]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.740494]  kasan_atomics+0xb8/0x2e0
[   57.744140]  kunit_try_run_case+0x170/0x3f0
[   57.748307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.753775]  kthread+0x328/0x630
[   57.756987]  ret_from_fork+0x10/0x20
[   57.760546] 
[   57.762022] The buggy address belongs to the object at ffff000800c2e200
[   57.762022]  which belongs to the cache kmalloc-64 of size 64
[   57.774348] The buggy address is located 0 bytes to the right of
[   57.774348]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   57.787195] 
[   57.788671] The buggy address belongs to the physical page:
[   57.794227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   57.802212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.808723] page_type: f5(slab)
[   57.811855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.819579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.827299] page dumped because: kasan: bad access detected
[   57.832854] 
[   57.834330] Memory state around the buggy address:
[   57.839108]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.846312]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.853517] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.860718]                                      ^
[   57.865496]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.872701]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.879902] ==================================================================
[   54.199614] ==================================================================
[   54.206696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   54.213985] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   54.221363] 
[   54.222842] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   54.222890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.222906] Hardware name: WinLink E850-96 board (DT)
[   54.222924] Call trace:
[   54.222936]  show_stack+0x20/0x38 (C)
[   54.222969]  dump_stack_lvl+0x8c/0xd0
[   54.223006]  print_report+0x118/0x608
[   54.223039]  kasan_report+0xdc/0x128
[   54.223071]  kasan_check_range+0x100/0x1a8
[   54.223107]  __kasan_check_write+0x20/0x30
[   54.223138]  kasan_atomics_helper+0xc08/0x4858
[   54.223172]  kasan_atomics+0x198/0x2e0
[   54.223204]  kunit_try_run_case+0x170/0x3f0
[   54.223239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.223279]  kthread+0x328/0x630
[   54.223304]  ret_from_fork+0x10/0x20
[   54.223336] 
[   54.293931] Allocated by task 309:
[   54.297317]  kasan_save_stack+0x3c/0x68
[   54.301137]  kasan_save_track+0x20/0x40
[   54.304956]  kasan_save_alloc_info+0x40/0x58
[   54.309209]  __kasan_kmalloc+0xd4/0xd8
[   54.312942]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.317456]  kasan_atomics+0xb8/0x2e0
[   54.321101]  kunit_try_run_case+0x170/0x3f0
[   54.325268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.330736]  kthread+0x328/0x630
[   54.333948]  ret_from_fork+0x10/0x20
[   54.337507] 
[   54.338983] The buggy address belongs to the object at ffff000800c2e200
[   54.338983]  which belongs to the cache kmalloc-64 of size 64
[   54.351310] The buggy address is located 0 bytes to the right of
[   54.351310]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   54.364156] 
[   54.365632] The buggy address belongs to the physical page:
[   54.371188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   54.379174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.385684] page_type: f5(slab)
[   54.388816] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.396541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.404260] page dumped because: kasan: bad access detected
[   54.409815] 
[   54.411291] Memory state around the buggy address:
[   54.416068]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.423274]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.430478] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.437679]                                      ^
[   54.442457]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.449662]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.456863] ==================================================================
[   51.034563] ==================================================================
[   51.041640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   51.048928] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   51.056306] 
[   51.057785] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   51.057832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.057846] Hardware name: WinLink E850-96 board (DT)
[   51.057864] Call trace:
[   51.057876]  show_stack+0x20/0x38 (C)
[   51.057908]  dump_stack_lvl+0x8c/0xd0
[   51.057942]  print_report+0x118/0x608
[   51.057975]  kasan_report+0xdc/0x128
[   51.058008]  kasan_check_range+0x100/0x1a8
[   51.058042]  __kasan_check_write+0x20/0x30
[   51.058072]  kasan_atomics_helper+0x760/0x4858
[   51.058104]  kasan_atomics+0x198/0x2e0
[   51.058134]  kunit_try_run_case+0x170/0x3f0
[   51.058166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.058207]  kthread+0x328/0x630
[   51.058234]  ret_from_fork+0x10/0x20
[   51.058266] 
[   51.128875] Allocated by task 309:
[   51.132260]  kasan_save_stack+0x3c/0x68
[   51.136080]  kasan_save_track+0x20/0x40
[   51.139899]  kasan_save_alloc_info+0x40/0x58
[   51.144153]  __kasan_kmalloc+0xd4/0xd8
[   51.147885]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.152399]  kasan_atomics+0xb8/0x2e0
[   51.156044]  kunit_try_run_case+0x170/0x3f0
[   51.160211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.165680]  kthread+0x328/0x630
[   51.168892]  ret_from_fork+0x10/0x20
[   51.172451] 
[   51.173926] The buggy address belongs to the object at ffff000800c2e200
[   51.173926]  which belongs to the cache kmalloc-64 of size 64
[   51.186253] The buggy address is located 0 bytes to the right of
[   51.186253]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   51.199099] 
[   51.200575] The buggy address belongs to the physical page:
[   51.206131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   51.214117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.220627] page_type: f5(slab)
[   51.223760] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.231484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.239203] page dumped because: kasan: bad access detected
[   51.244758] 
[   51.246234] Memory state around the buggy address:
[   51.251012]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.258217]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.265421] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.272622]                                      ^
[   51.277401]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.284605]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.291806] ==================================================================
[   59.475791] ==================================================================
[   59.482832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   59.490208] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   59.497586] 
[   59.499066] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   59.499113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.499130] Hardware name: WinLink E850-96 board (DT)
[   59.499148] Call trace:
[   59.499159]  show_stack+0x20/0x38 (C)
[   59.499193]  dump_stack_lvl+0x8c/0xd0
[   59.499229]  print_report+0x118/0x608
[   59.499266]  kasan_report+0xdc/0x128
[   59.499298]  kasan_check_range+0x100/0x1a8
[   59.499332]  __kasan_check_write+0x20/0x30
[   59.499362]  kasan_atomics_helper+0x12d8/0x4858
[   59.499395]  kasan_atomics+0x198/0x2e0
[   59.499425]  kunit_try_run_case+0x170/0x3f0
[   59.499458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.499497]  kthread+0x328/0x630
[   59.499523]  ret_from_fork+0x10/0x20
[   59.499554] 
[   59.570241] Allocated by task 309:
[   59.573627]  kasan_save_stack+0x3c/0x68
[   59.577446]  kasan_save_track+0x20/0x40
[   59.581265]  kasan_save_alloc_info+0x40/0x58
[   59.585519]  __kasan_kmalloc+0xd4/0xd8
[   59.589251]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.593765]  kasan_atomics+0xb8/0x2e0
[   59.597411]  kunit_try_run_case+0x170/0x3f0
[   59.601577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.607046]  kthread+0x328/0x630
[   59.610258]  ret_from_fork+0x10/0x20
[   59.613817] 
[   59.615294] The buggy address belongs to the object at ffff000800c2e200
[   59.615294]  which belongs to the cache kmalloc-64 of size 64
[   59.627619] The buggy address is located 0 bytes to the right of
[   59.627619]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   59.640466] 
[   59.641941] The buggy address belongs to the physical page:
[   59.647498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   59.655483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.661993] page_type: f5(slab)
[   59.665126] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.672851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.680570] page dumped because: kasan: bad access detected
[   59.686126] 
[   59.687600] Memory state around the buggy address:
[   59.692379]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.699583]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.706788] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.713989]                                      ^
[   59.718766]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.725971]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.733173] ==================================================================
[   63.168413] ==================================================================
[   63.175487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   63.182861] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   63.190152] 
[   63.191632] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   63.191678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.191694] Hardware name: WinLink E850-96 board (DT)
[   63.191715] Call trace:
[   63.191726]  show_stack+0x20/0x38 (C)
[   63.191761]  dump_stack_lvl+0x8c/0xd0
[   63.191796]  print_report+0x118/0x608
[   63.191833]  kasan_report+0xdc/0x128
[   63.191866]  __asan_report_load8_noabort+0x20/0x30
[   63.191899]  kasan_atomics_helper+0x3e20/0x4858
[   63.191931]  kasan_atomics+0x198/0x2e0
[   63.191961]  kunit_try_run_case+0x170/0x3f0
[   63.191994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.192032]  kthread+0x328/0x630
[   63.192059]  ret_from_fork+0x10/0x20
[   63.192091] 
[   63.259422] Allocated by task 309:
[   63.262807]  kasan_save_stack+0x3c/0x68
[   63.266627]  kasan_save_track+0x20/0x40
[   63.270446]  kasan_save_alloc_info+0x40/0x58
[   63.274699]  __kasan_kmalloc+0xd4/0xd8
[   63.278432]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.282946]  kasan_atomics+0xb8/0x2e0
[   63.286592]  kunit_try_run_case+0x170/0x3f0
[   63.290758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.296227]  kthread+0x328/0x630
[   63.299439]  ret_from_fork+0x10/0x20
[   63.302998] 
[   63.304473] The buggy address belongs to the object at ffff000800c2e200
[   63.304473]  which belongs to the cache kmalloc-64 of size 64
[   63.316800] The buggy address is located 0 bytes to the right of
[   63.316800]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   63.329646] 
[   63.331122] The buggy address belongs to the physical page:
[   63.336678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   63.344663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.351174] page_type: f5(slab)
[   63.354307] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.362031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.369750] page dumped because: kasan: bad access detected
[   63.375307] 
[   63.376781] Memory state around the buggy address:
[   63.381559]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.388764]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.395969] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.403170]                                      ^
[   63.407947]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.415152]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.422353] ==================================================================
[   54.725478] ==================================================================
[   54.732557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   54.739845] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   54.747223] 
[   54.748703] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   54.748752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.748768] Hardware name: WinLink E850-96 board (DT)
[   54.748786] Call trace:
[   54.748798]  show_stack+0x20/0x38 (C)
[   54.748832]  dump_stack_lvl+0x8c/0xd0
[   54.748868]  print_report+0x118/0x608
[   54.748902]  kasan_report+0xdc/0x128
[   54.748933]  kasan_check_range+0x100/0x1a8
[   54.748968]  __kasan_check_write+0x20/0x30
[   54.748998]  kasan_atomics_helper+0xca0/0x4858
[   54.749031]  kasan_atomics+0x198/0x2e0
[   54.749065]  kunit_try_run_case+0x170/0x3f0
[   54.749098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.749138]  kthread+0x328/0x630
[   54.749164]  ret_from_fork+0x10/0x20
[   54.749194] 
[   54.819791] Allocated by task 309:
[   54.823177]  kasan_save_stack+0x3c/0x68
[   54.826996]  kasan_save_track+0x20/0x40
[   54.830816]  kasan_save_alloc_info+0x40/0x58
[   54.835069]  __kasan_kmalloc+0xd4/0xd8
[   54.838802]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.843316]  kasan_atomics+0xb8/0x2e0
[   54.846961]  kunit_try_run_case+0x170/0x3f0
[   54.851128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.856597]  kthread+0x328/0x630
[   54.859808]  ret_from_fork+0x10/0x20
[   54.863367] 
[   54.864843] The buggy address belongs to the object at ffff000800c2e200
[   54.864843]  which belongs to the cache kmalloc-64 of size 64
[   54.877169] The buggy address is located 0 bytes to the right of
[   54.877169]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   54.890016] 
[   54.891494] The buggy address belongs to the physical page:
[   54.897048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   54.905033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.911544] page_type: f5(slab)
[   54.914676] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.922401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.930120] page dumped because: kasan: bad access detected
[   54.935675] 
[   54.937151] Memory state around the buggy address:
[   54.941929]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.949134]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.956338] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.963540]                                      ^
[   54.968317]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.975522]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.982723] ==================================================================
[   49.447087] ==================================================================
[   49.454163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   49.461452] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   49.468830] 
[   49.470310] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   49.470358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.470372] Hardware name: WinLink E850-96 board (DT)
[   49.470390] Call trace:
[   49.470403]  show_stack+0x20/0x38 (C)
[   49.470434]  dump_stack_lvl+0x8c/0xd0
[   49.470470]  print_report+0x118/0x608
[   49.470506]  kasan_report+0xdc/0x128
[   49.470538]  kasan_check_range+0x100/0x1a8
[   49.470573]  __kasan_check_write+0x20/0x30
[   49.470603]  kasan_atomics_helper+0x4e4/0x4858
[   49.470637]  kasan_atomics+0x198/0x2e0
[   49.470668]  kunit_try_run_case+0x170/0x3f0
[   49.470700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.470738]  kthread+0x328/0x630
[   49.470764]  ret_from_fork+0x10/0x20
[   49.470796] 
[   49.541398] Allocated by task 309:
[   49.544784]  kasan_save_stack+0x3c/0x68
[   49.548604]  kasan_save_track+0x20/0x40
[   49.552423]  kasan_save_alloc_info+0x40/0x58
[   49.556676]  __kasan_kmalloc+0xd4/0xd8
[   49.560409]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.564923]  kasan_atomics+0xb8/0x2e0
[   49.568568]  kunit_try_run_case+0x170/0x3f0
[   49.572735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.578204]  kthread+0x328/0x630
[   49.581416]  ret_from_fork+0x10/0x20
[   49.584974] 
[   49.586450] The buggy address belongs to the object at ffff000800c2e200
[   49.586450]  which belongs to the cache kmalloc-64 of size 64
[   49.598777] The buggy address is located 0 bytes to the right of
[   49.598777]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   49.611623] 
[   49.613099] The buggy address belongs to the physical page:
[   49.618655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   49.626641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.633151] page_type: f5(slab)
[   49.636284] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.644008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.651727] page dumped because: kasan: bad access detected
[   49.657282] 
[   49.658758] Memory state around the buggy address:
[   49.663536]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.670741]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.677945] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.685147]                                      ^
[   49.689924]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.697129]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.704330] ==================================================================
[   47.865999] ==================================================================
[   47.873112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   47.880486] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   47.887778] 
[   47.889258] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   47.889312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.889327] Hardware name: WinLink E850-96 board (DT)
[   47.889348] Call trace:
[   47.889360]  show_stack+0x20/0x38 (C)
[   47.889391]  dump_stack_lvl+0x8c/0xd0
[   47.889429]  print_report+0x118/0x608
[   47.889464]  kasan_report+0xdc/0x128
[   47.889496]  __asan_report_load4_noabort+0x20/0x30
[   47.889528]  kasan_atomics_helper+0x40fc/0x4858
[   47.889560]  kasan_atomics+0x198/0x2e0
[   47.889590]  kunit_try_run_case+0x170/0x3f0
[   47.889626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.889665]  kthread+0x328/0x630
[   47.889693]  ret_from_fork+0x10/0x20
[   47.889727] 
[   47.957047] Allocated by task 309:
[   47.960433]  kasan_save_stack+0x3c/0x68
[   47.964252]  kasan_save_track+0x20/0x40
[   47.968072]  kasan_save_alloc_info+0x40/0x58
[   47.972325]  __kasan_kmalloc+0xd4/0xd8
[   47.976058]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.980571]  kasan_atomics+0xb8/0x2e0
[   47.984217]  kunit_try_run_case+0x170/0x3f0
[   47.988384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.993853]  kthread+0x328/0x630
[   47.997064]  ret_from_fork+0x10/0x20
[   48.000623] 
[   48.002100] The buggy address belongs to the object at ffff000800c2e200
[   48.002100]  which belongs to the cache kmalloc-64 of size 64
[   48.014426] The buggy address is located 0 bytes to the right of
[   48.014426]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   48.027272] 
[   48.028750] The buggy address belongs to the physical page:
[   48.034304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   48.042291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.048800] page_type: f5(slab)
[   48.051934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.059657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.067376] page dumped because: kasan: bad access detected
[   48.072931] 
[   48.074407] Memory state around the buggy address:
[   48.079187]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.086389]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.093596] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.100794]                                      ^
[   48.105573]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.112778]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.119979] ==================================================================
[   51.828322] ==================================================================
[   51.835377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   51.842753] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   51.850045] 
[   51.851524] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   51.851570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.851586] Hardware name: WinLink E850-96 board (DT)
[   51.851602] Call trace:
[   51.851614]  show_stack+0x20/0x38 (C)
[   51.851649]  dump_stack_lvl+0x8c/0xd0
[   51.851684]  print_report+0x118/0x608
[   51.851718]  kasan_report+0xdc/0x128
[   51.851749]  __asan_report_load4_noabort+0x20/0x30
[   51.851780]  kasan_atomics_helper+0x42d8/0x4858
[   51.851814]  kasan_atomics+0x198/0x2e0
[   51.851844]  kunit_try_run_case+0x170/0x3f0
[   51.851877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.851915]  kthread+0x328/0x630
[   51.851942]  ret_from_fork+0x10/0x20
[   51.851974] 
[   51.919314] Allocated by task 309:
[   51.922700]  kasan_save_stack+0x3c/0x68
[   51.926519]  kasan_save_track+0x20/0x40
[   51.930338]  kasan_save_alloc_info+0x40/0x58
[   51.934592]  __kasan_kmalloc+0xd4/0xd8
[   51.938325]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.942838]  kasan_atomics+0xb8/0x2e0
[   51.946484]  kunit_try_run_case+0x170/0x3f0
[   51.950651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.956119]  kthread+0x328/0x630
[   51.959331]  ret_from_fork+0x10/0x20
[   51.962890] 
[   51.964365] The buggy address belongs to the object at ffff000800c2e200
[   51.964365]  which belongs to the cache kmalloc-64 of size 64
[   51.976693] The buggy address is located 0 bytes to the right of
[   51.976693]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   51.989539] 
[   51.991015] The buggy address belongs to the physical page:
[   51.996571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   52.004557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.011066] page_type: f5(slab)
[   52.014199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.021924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.029642] page dumped because: kasan: bad access detected
[   52.035198] 
[   52.036674] Memory state around the buggy address:
[   52.041452]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.048656]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.055861] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.063062]                                      ^
[   52.067840]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.075045]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.082246] ==================================================================
[   56.302907] ==================================================================
[   56.309963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   56.317252] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   56.324630] 
[   56.326109] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   56.326156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.326172] Hardware name: WinLink E850-96 board (DT)
[   56.326190] Call trace:
[   56.326200]  show_stack+0x20/0x38 (C)
[   56.326233]  dump_stack_lvl+0x8c/0xd0
[   56.326268]  print_report+0x118/0x608
[   56.326302]  kasan_report+0xdc/0x128
[   56.326335]  kasan_check_range+0x100/0x1a8
[   56.326370]  __kasan_check_write+0x20/0x30
[   56.326400]  kasan_atomics_helper+0xe44/0x4858
[   56.326432]  kasan_atomics+0x198/0x2e0
[   56.326464]  kunit_try_run_case+0x170/0x3f0
[   56.326497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.326536]  kthread+0x328/0x630
[   56.326563]  ret_from_fork+0x10/0x20
[   56.326593] 
[   56.397198] Allocated by task 309:
[   56.400584]  kasan_save_stack+0x3c/0x68
[   56.404403]  kasan_save_track+0x20/0x40
[   56.408223]  kasan_save_alloc_info+0x40/0x58
[   56.412476]  __kasan_kmalloc+0xd4/0xd8
[   56.416209]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.420723]  kasan_atomics+0xb8/0x2e0
[   56.424368]  kunit_try_run_case+0x170/0x3f0
[   56.428535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.434004]  kthread+0x328/0x630
[   56.437215]  ret_from_fork+0x10/0x20
[   56.440774] 
[   56.442250] The buggy address belongs to the object at ffff000800c2e200
[   56.442250]  which belongs to the cache kmalloc-64 of size 64
[   56.454577] The buggy address is located 0 bytes to the right of
[   56.454577]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   56.467423] 
[   56.468899] The buggy address belongs to the physical page:
[   56.474455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   56.482441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.488951] page_type: f5(slab)
[   56.492083] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.499808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.507527] page dumped because: kasan: bad access detected
[   56.513082] 
[   56.514558] Memory state around the buggy address:
[   56.519336]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.526541]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.533745] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.540946]                                      ^
[   56.545724]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.552929]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.560130] ==================================================================
[   61.851567] ==================================================================
[   61.858668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   61.866040] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   61.873418] 
[   61.874900] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   61.874947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.874962] Hardware name: WinLink E850-96 board (DT)
[   61.874980] Call trace:
[   61.874993]  show_stack+0x20/0x38 (C)
[   61.875028]  dump_stack_lvl+0x8c/0xd0
[   61.875062]  print_report+0x118/0x608
[   61.875098]  kasan_report+0xdc/0x128
[   61.875131]  kasan_check_range+0x100/0x1a8
[   61.875167]  __kasan_check_write+0x20/0x30
[   61.875195]  kasan_atomics_helper+0x1644/0x4858
[   61.875230]  kasan_atomics+0x198/0x2e0
[   61.875260]  kunit_try_run_case+0x170/0x3f0
[   61.875295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.875334]  kthread+0x328/0x630
[   61.875360]  ret_from_fork+0x10/0x20
[   61.875392] 
[   61.946073] Allocated by task 309:
[   61.949462]  kasan_save_stack+0x3c/0x68
[   61.953279]  kasan_save_track+0x20/0x40
[   61.957098]  kasan_save_alloc_info+0x40/0x58
[   61.961351]  __kasan_kmalloc+0xd4/0xd8
[   61.965084]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.969598]  kasan_atomics+0xb8/0x2e0
[   61.973243]  kunit_try_run_case+0x170/0x3f0
[   61.977410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.982879]  kthread+0x328/0x630
[   61.986090]  ret_from_fork+0x10/0x20
[   61.989649] 
[   61.991125] The buggy address belongs to the object at ffff000800c2e200
[   61.991125]  which belongs to the cache kmalloc-64 of size 64
[   62.003452] The buggy address is located 0 bytes to the right of
[   62.003452]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   62.016298] 
[   62.017774] The buggy address belongs to the physical page:
[   62.023330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   62.031317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.037826] page_type: f5(slab)
[   62.040958] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.048682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.056402] page dumped because: kasan: bad access detected
[   62.061957] 
[   62.063432] Memory state around the buggy address:
[   62.068211]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.075416]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.082620] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.089821]                                      ^
[   62.094599]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.101804]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.109005] ==================================================================
[   60.005265] ==================================================================
[   60.012340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   60.019714] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   60.027005] 
[   60.028485] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   60.028530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.028545] Hardware name: WinLink E850-96 board (DT)
[   60.028562] Call trace:
[   60.028575]  show_stack+0x20/0x38 (C)
[   60.028609]  dump_stack_lvl+0x8c/0xd0
[   60.028644]  print_report+0x118/0x608
[   60.028680]  kasan_report+0xdc/0x128
[   60.028713]  __asan_report_load8_noabort+0x20/0x30
[   60.028746]  kasan_atomics_helper+0x3f04/0x4858
[   60.028781]  kasan_atomics+0x198/0x2e0
[   60.028811]  kunit_try_run_case+0x170/0x3f0
[   60.028846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.028885]  kthread+0x328/0x630
[   60.028913]  ret_from_fork+0x10/0x20
[   60.028943] 
[   60.096275] Allocated by task 309:
[   60.099660]  kasan_save_stack+0x3c/0x68
[   60.103480]  kasan_save_track+0x20/0x40
[   60.107299]  kasan_save_alloc_info+0x40/0x58
[   60.111552]  __kasan_kmalloc+0xd4/0xd8
[   60.115285]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.119799]  kasan_atomics+0xb8/0x2e0
[   60.123445]  kunit_try_run_case+0x170/0x3f0
[   60.127611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.133080]  kthread+0x328/0x630
[   60.136292]  ret_from_fork+0x10/0x20
[   60.139851] 
[   60.141328] The buggy address belongs to the object at ffff000800c2e200
[   60.141328]  which belongs to the cache kmalloc-64 of size 64
[   60.153654] The buggy address is located 0 bytes to the right of
[   60.153654]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   60.166499] 
[   60.167976] The buggy address belongs to the physical page:
[   60.173531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   60.181517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.188027] page_type: f5(slab)
[   60.191160] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.198884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.206603] page dumped because: kasan: bad access detected
[   60.212160] 
[   60.213634] Memory state around the buggy address:
[   60.218412]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.225617]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.232821] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.240023]                                      ^
[   60.244801]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.252005]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.259206] ==================================================================
[   48.391917] ==================================================================
[   48.398969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   48.406347] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   48.413725] 
[   48.415207] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   48.415256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.415272] Hardware name: WinLink E850-96 board (DT)
[   48.415292] Call trace:
[   48.415305]  show_stack+0x20/0x38 (C)
[   48.415339]  dump_stack_lvl+0x8c/0xd0
[   48.415374]  print_report+0x118/0x608
[   48.415410]  kasan_report+0xdc/0x128
[   48.415443]  __asan_report_store4_noabort+0x20/0x30
[   48.415475]  kasan_atomics_helper+0x3f94/0x4858
[   48.415509]  kasan_atomics+0x198/0x2e0
[   48.415539]  kunit_try_run_case+0x170/0x3f0
[   48.415574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.415614]  kthread+0x328/0x630
[   48.415641]  ret_from_fork+0x10/0x20
[   48.415674] 
[   48.483081] Allocated by task 309:
[   48.486468]  kasan_save_stack+0x3c/0x68
[   48.490286]  kasan_save_track+0x20/0x40
[   48.494106]  kasan_save_alloc_info+0x40/0x58
[   48.498359]  __kasan_kmalloc+0xd4/0xd8
[   48.502091]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.506605]  kasan_atomics+0xb8/0x2e0
[   48.510251]  kunit_try_run_case+0x170/0x3f0
[   48.514418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.519886]  kthread+0x328/0x630
[   48.523098]  ret_from_fork+0x10/0x20
[   48.526657] 
[   48.528133] The buggy address belongs to the object at ffff000800c2e200
[   48.528133]  which belongs to the cache kmalloc-64 of size 64
[   48.540461] The buggy address is located 0 bytes to the right of
[   48.540461]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   48.553306] 
[   48.554782] The buggy address belongs to the physical page:
[   48.560339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   48.568325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.574833] page_type: f5(slab)
[   48.577966] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.585690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.593410] page dumped because: kasan: bad access detected
[   48.598965] 
[   48.600440] Memory state around the buggy address:
[   48.605218]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.612423]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.619630] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.626829]                                      ^
[   48.631607]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.638812]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.646013] ==================================================================
[   62.642405] ==================================================================
[   62.649453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   62.656827] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   62.664118] 
[   62.665597] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   62.665647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.665664] Hardware name: WinLink E850-96 board (DT)
[   62.665681] Call trace:
[   62.665693]  show_stack+0x20/0x38 (C)
[   62.665726]  dump_stack_lvl+0x8c/0xd0
[   62.665760]  print_report+0x118/0x608
[   62.665795]  kasan_report+0xdc/0x128
[   62.665827]  __asan_report_load8_noabort+0x20/0x30
[   62.665859]  kasan_atomics_helper+0x3e10/0x4858
[   62.665891]  kasan_atomics+0x198/0x2e0
[   62.665924]  kunit_try_run_case+0x170/0x3f0
[   62.665957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.665997]  kthread+0x328/0x630
[   62.666024]  ret_from_fork+0x10/0x20
[   62.666055] 
[   62.733388] Allocated by task 309:
[   62.736777]  kasan_save_stack+0x3c/0x68
[   62.740593]  kasan_save_track+0x20/0x40
[   62.744412]  kasan_save_alloc_info+0x40/0x58
[   62.748666]  __kasan_kmalloc+0xd4/0xd8
[   62.752398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.756912]  kasan_atomics+0xb8/0x2e0
[   62.760558]  kunit_try_run_case+0x170/0x3f0
[   62.764724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.770193]  kthread+0x328/0x630
[   62.773405]  ret_from_fork+0x10/0x20
[   62.776964] 
[   62.778440] The buggy address belongs to the object at ffff000800c2e200
[   62.778440]  which belongs to the cache kmalloc-64 of size 64
[   62.790766] The buggy address is located 0 bytes to the right of
[   62.790766]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   62.803613] 
[   62.805089] The buggy address belongs to the physical page:
[   62.810645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   62.818630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.825140] page_type: f5(slab)
[   62.828273] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.835997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.843716] page dumped because: kasan: bad access detected
[   62.849273] 
[   62.850747] Memory state around the buggy address:
[   62.855525]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.862730]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.869935] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.877136]                                      ^
[   62.881914]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.889118]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.896320] ==================================================================
[   53.938347] ==================================================================
[   53.945415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   53.952791] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   53.960082] 
[   53.961562] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   53.961610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.961625] Hardware name: WinLink E850-96 board (DT)
[   53.961643] Call trace:
[   53.961655]  show_stack+0x20/0x38 (C)
[   53.961685]  dump_stack_lvl+0x8c/0xd0
[   53.961720]  print_report+0x118/0x608
[   53.961756]  kasan_report+0xdc/0x128
[   53.961789]  __asan_report_load4_noabort+0x20/0x30
[   53.961821]  kasan_atomics_helper+0x3dbc/0x4858
[   53.961854]  kasan_atomics+0x198/0x2e0
[   53.961886]  kunit_try_run_case+0x170/0x3f0
[   53.961919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.961957]  kthread+0x328/0x630
[   53.961984]  ret_from_fork+0x10/0x20
[   53.962015] 
[   54.029352] Allocated by task 309:
[   54.032738]  kasan_save_stack+0x3c/0x68
[   54.036557]  kasan_save_track+0x20/0x40
[   54.040376]  kasan_save_alloc_info+0x40/0x58
[   54.044630]  __kasan_kmalloc+0xd4/0xd8
[   54.048362]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.052876]  kasan_atomics+0xb8/0x2e0
[   54.056522]  kunit_try_run_case+0x170/0x3f0
[   54.060688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.066157]  kthread+0x328/0x630
[   54.069369]  ret_from_fork+0x10/0x20
[   54.072928] 
[   54.074403] The buggy address belongs to the object at ffff000800c2e200
[   54.074403]  which belongs to the cache kmalloc-64 of size 64
[   54.086730] The buggy address is located 0 bytes to the right of
[   54.086730]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   54.099577] 
[   54.101052] The buggy address belongs to the physical page:
[   54.106609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   54.114594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.121104] page_type: f5(slab)
[   54.124237] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.131961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.139680] page dumped because: kasan: bad access detected
[   54.145236] 
[   54.146711] Memory state around the buggy address:
[   54.151489]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.158694]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.165899] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.173100]                                      ^
[   54.177878]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.185082]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.192284] ==================================================================
[   47.601600] ==================================================================
[   47.608707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   47.615996] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   47.623285] 
[   47.624765] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   47.624814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.624831] Hardware name: WinLink E850-96 board (DT)
[   47.624853] Call trace:
[   47.624865]  show_stack+0x20/0x38 (C)
[   47.624900]  dump_stack_lvl+0x8c/0xd0
[   47.624939]  print_report+0x118/0x608
[   47.624974]  kasan_report+0xdc/0x128
[   47.625007]  kasan_check_range+0x100/0x1a8
[   47.625044]  __kasan_check_read+0x20/0x30
[   47.625072]  kasan_atomics_helper+0x2b0/0x4858
[   47.625105]  kasan_atomics+0x198/0x2e0
[   47.625137]  kunit_try_run_case+0x170/0x3f0
[   47.625173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.625214]  kthread+0x328/0x630
[   47.625240]  ret_from_fork+0x10/0x20
[   47.625274] 
[   47.695768] Allocated by task 309:
[   47.699152]  kasan_save_stack+0x3c/0x68
[   47.702972]  kasan_save_track+0x20/0x40
[   47.706791]  kasan_save_alloc_info+0x40/0x58
[   47.711044]  __kasan_kmalloc+0xd4/0xd8
[   47.714777]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.719291]  kasan_atomics+0xb8/0x2e0
[   47.722936]  kunit_try_run_case+0x170/0x3f0
[   47.727103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.732572]  kthread+0x328/0x630
[   47.735783]  ret_from_fork+0x10/0x20
[   47.739343] 
[   47.740821] The buggy address belongs to the object at ffff000800c2e200
[   47.740821]  which belongs to the cache kmalloc-64 of size 64
[   47.753145] The buggy address is located 0 bytes to the right of
[   47.753145]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   47.765991] 
[   47.767469] The buggy address belongs to the physical page:
[   47.773023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   47.781010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.787520] page_type: f5(slab)
[   47.790653] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.798375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.806095] page dumped because: kasan: bad access detected
[   47.811652] 
[   47.813126] Memory state around the buggy address:
[   47.817907]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.825108]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.832317] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.839515]                                      ^
[   47.844292]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.851497]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.858698] ==================================================================
[   53.147897] ==================================================================
[   53.154975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   53.162265] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   53.169643] 
[   53.171122] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   53.171170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.171187] Hardware name: WinLink E850-96 board (DT)
[   53.171205] Call trace:
[   53.171217]  show_stack+0x20/0x38 (C)
[   53.171248]  dump_stack_lvl+0x8c/0xd0
[   53.171282]  print_report+0x118/0x608
[   53.171320]  kasan_report+0xdc/0x128
[   53.171352]  kasan_check_range+0x100/0x1a8
[   53.171386]  __kasan_check_write+0x20/0x30
[   53.171415]  kasan_atomics_helper+0xad4/0x4858
[   53.171450]  kasan_atomics+0x198/0x2e0
[   53.171481]  kunit_try_run_case+0x170/0x3f0
[   53.171513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.171553]  kthread+0x328/0x630
[   53.171579]  ret_from_fork+0x10/0x20
[   53.171611] 
[   53.242211] Allocated by task 309:
[   53.245596]  kasan_save_stack+0x3c/0x68
[   53.249416]  kasan_save_track+0x20/0x40
[   53.253235]  kasan_save_alloc_info+0x40/0x58
[   53.257489]  __kasan_kmalloc+0xd4/0xd8
[   53.261221]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.265735]  kasan_atomics+0xb8/0x2e0
[   53.269381]  kunit_try_run_case+0x170/0x3f0
[   53.273548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.279016]  kthread+0x328/0x630
[   53.282228]  ret_from_fork+0x10/0x20
[   53.285787] 
[   53.287263] The buggy address belongs to the object at ffff000800c2e200
[   53.287263]  which belongs to the cache kmalloc-64 of size 64
[   53.299589] The buggy address is located 0 bytes to the right of
[   53.299589]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   53.312436] 
[   53.313911] The buggy address belongs to the physical page:
[   53.319468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   53.327453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.333963] page_type: f5(slab)
[   53.337096] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.344821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.352539] page dumped because: kasan: bad access detected
[   53.358095] 
[   53.359570] Memory state around the buggy address:
[   53.364348]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.371553]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.378758] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.385959]                                      ^
[   53.390737]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.397941]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.405143] ==================================================================
[   58.681481] ==================================================================
[   58.688575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   58.695949] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   58.703327] 
[   58.704806] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   58.704855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.704872] Hardware name: WinLink E850-96 board (DT)
[   58.704889] Call trace:
[   58.704902]  show_stack+0x20/0x38 (C)
[   58.704936]  dump_stack_lvl+0x8c/0xd0
[   58.704971]  print_report+0x118/0x608
[   58.705004]  kasan_report+0xdc/0x128
[   58.705036]  kasan_check_range+0x100/0x1a8
[   58.705071]  __kasan_check_write+0x20/0x30
[   58.705101]  kasan_atomics_helper+0x1190/0x4858
[   58.705134]  kasan_atomics+0x198/0x2e0
[   58.705165]  kunit_try_run_case+0x170/0x3f0
[   58.705197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.705237]  kthread+0x328/0x630
[   58.705264]  ret_from_fork+0x10/0x20
[   58.705295] 
[   58.775982] Allocated by task 309:
[   58.779368]  kasan_save_stack+0x3c/0x68
[   58.783187]  kasan_save_track+0x20/0x40
[   58.787006]  kasan_save_alloc_info+0x40/0x58
[   58.791260]  __kasan_kmalloc+0xd4/0xd8
[   58.794992]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.799506]  kasan_atomics+0xb8/0x2e0
[   58.803152]  kunit_try_run_case+0x170/0x3f0
[   58.807318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.812787]  kthread+0x328/0x630
[   58.815999]  ret_from_fork+0x10/0x20
[   58.819558] 
[   58.821035] The buggy address belongs to the object at ffff000800c2e200
[   58.821035]  which belongs to the cache kmalloc-64 of size 64
[   58.833360] The buggy address is located 0 bytes to the right of
[   58.833360]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   58.846207] 
[   58.847683] The buggy address belongs to the physical page:
[   58.853239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   58.861224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.867734] page_type: f5(slab)
[   58.870867] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.878591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.886311] page dumped because: kasan: bad access detected
[   58.891867] 
[   58.893341] Memory state around the buggy address:
[   58.898120]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.905324]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.912529] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.919730]                                      ^
[   58.924508]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.931713]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.938914] ==================================================================
[   46.542852] ==================================================================
[   46.556985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   46.564363] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   46.571651] 
[   46.573141] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   46.573202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.573219] Hardware name: WinLink E850-96 board (DT)
[   46.573242] Call trace:
[   46.573257]  show_stack+0x20/0x38 (C)
[   46.573296]  dump_stack_lvl+0x8c/0xd0
[   46.573333]  print_report+0x118/0x608
[   46.573370]  kasan_report+0xdc/0x128
[   46.573402]  __asan_report_load4_noabort+0x20/0x30
[   46.573436]  kasan_atomics_helper+0x40a8/0x4858
[   46.573472]  kasan_atomics+0x198/0x2e0
[   46.573504]  kunit_try_run_case+0x170/0x3f0
[   46.573541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.573582]  kthread+0x328/0x630
[   46.573611]  ret_from_fork+0x10/0x20
[   46.573650] 
[   46.640923] Allocated by task 309:
[   46.644311]  kasan_save_stack+0x3c/0x68
[   46.648126]  kasan_save_track+0x20/0x40
[   46.651946]  kasan_save_alloc_info+0x40/0x58
[   46.656199]  __kasan_kmalloc+0xd4/0xd8
[   46.659932]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.664445]  kasan_atomics+0xb8/0x2e0
[   46.668091]  kunit_try_run_case+0x170/0x3f0
[   46.672258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.677728]  kthread+0x328/0x630
[   46.680938]  ret_from_fork+0x10/0x20
[   46.684497] 
[   46.685975] The buggy address belongs to the object at ffff000800c2e200
[   46.685975]  which belongs to the cache kmalloc-64 of size 64
[   46.698301] The buggy address is located 0 bytes to the right of
[   46.698301]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   46.711146] 
[   46.712624] The buggy address belongs to the physical page:
[   46.718181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   46.726168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.732675] page_type: f5(slab)
[   46.735812] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.743531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.751251] page dumped because: kasan: bad access detected
[   46.756807] 
[   46.758281] Memory state around the buggy address:
[   46.763062]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.770263]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.777470] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.784669]                                      ^
[   46.789447]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.796652]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.803854] ==================================================================
[   50.769991] ==================================================================
[   50.777059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   50.784349] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   50.791727] 
[   50.793207] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   50.793254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.793271] Hardware name: WinLink E850-96 board (DT)
[   50.793290] Call trace:
[   50.793302]  show_stack+0x20/0x38 (C)
[   50.793336]  dump_stack_lvl+0x8c/0xd0
[   50.793371]  print_report+0x118/0x608
[   50.793405]  kasan_report+0xdc/0x128
[   50.793438]  kasan_check_range+0x100/0x1a8
[   50.793473]  __kasan_check_write+0x20/0x30
[   50.793502]  kasan_atomics_helper+0x6ec/0x4858
[   50.793535]  kasan_atomics+0x198/0x2e0
[   50.793566]  kunit_try_run_case+0x170/0x3f0
[   50.793599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.793637]  kthread+0x328/0x630
[   50.793663]  ret_from_fork+0x10/0x20
[   50.793692] 
[   50.864295] Allocated by task 309:
[   50.867681]  kasan_save_stack+0x3c/0x68
[   50.871500]  kasan_save_track+0x20/0x40
[   50.875320]  kasan_save_alloc_info+0x40/0x58
[   50.879573]  __kasan_kmalloc+0xd4/0xd8
[   50.883305]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.887819]  kasan_atomics+0xb8/0x2e0
[   50.891465]  kunit_try_run_case+0x170/0x3f0
[   50.895632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.901101]  kthread+0x328/0x630
[   50.904312]  ret_from_fork+0x10/0x20
[   50.907871] 
[   50.909347] The buggy address belongs to the object at ffff000800c2e200
[   50.909347]  which belongs to the cache kmalloc-64 of size 64
[   50.921673] The buggy address is located 0 bytes to the right of
[   50.921673]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   50.934520] 
[   50.935996] The buggy address belongs to the physical page:
[   50.941552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   50.949538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.956047] page_type: f5(slab)
[   50.959180] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.966905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.974624] page dumped because: kasan: bad access detected
[   50.980179] 
[   50.981655] Memory state around the buggy address:
[   50.986433]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.993638]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.000842] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.008043]                                      ^
[   51.012821]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.020026]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.027227] ==================================================================
[   56.041603] ==================================================================
[   56.048683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   56.056058] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   56.063349] 
[   56.064829] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   56.064875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.064890] Hardware name: WinLink E850-96 board (DT)
[   56.064908] Call trace:
[   56.064920]  show_stack+0x20/0x38 (C)
[   56.064952]  dump_stack_lvl+0x8c/0xd0
[   56.064987]  print_report+0x118/0x608
[   56.065021]  kasan_report+0xdc/0x128
[   56.065054]  __asan_report_load8_noabort+0x20/0x30
[   56.065086]  kasan_atomics_helper+0x3f58/0x4858
[   56.065120]  kasan_atomics+0x198/0x2e0
[   56.065151]  kunit_try_run_case+0x170/0x3f0
[   56.065185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.065223]  kthread+0x328/0x630
[   56.065248]  ret_from_fork+0x10/0x20
[   56.065279] 
[   56.132619] Allocated by task 309:
[   56.136004]  kasan_save_stack+0x3c/0x68
[   56.139824]  kasan_save_track+0x20/0x40
[   56.143643]  kasan_save_alloc_info+0x40/0x58
[   56.147897]  __kasan_kmalloc+0xd4/0xd8
[   56.151629]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.156143]  kasan_atomics+0xb8/0x2e0
[   56.159789]  kunit_try_run_case+0x170/0x3f0
[   56.163956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.169424]  kthread+0x328/0x630
[   56.172636]  ret_from_fork+0x10/0x20
[   56.176195] 
[   56.177671] The buggy address belongs to the object at ffff000800c2e200
[   56.177671]  which belongs to the cache kmalloc-64 of size 64
[   56.189997] The buggy address is located 0 bytes to the right of
[   56.189997]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   56.202844] 
[   56.204320] The buggy address belongs to the physical page:
[   56.209875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   56.217861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.224371] page_type: f5(slab)
[   56.227504] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.235229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.242948] page dumped because: kasan: bad access detected
[   56.248503] 
[   56.249978] Memory state around the buggy address:
[   56.254756]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.261961]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.269166] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.276367]                                      ^
[   56.281145]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.288349]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.295551] ==================================================================
[   50.240898] ==================================================================
[   50.247900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   50.255190] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   50.262568] 
[   50.264048] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   50.264095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.264113] Hardware name: WinLink E850-96 board (DT)
[   50.264129] Call trace:
[   50.264141]  show_stack+0x20/0x38 (C)
[   50.264175]  dump_stack_lvl+0x8c/0xd0
[   50.264214]  print_report+0x118/0x608
[   50.264251]  kasan_report+0xdc/0x128
[   50.264284]  kasan_check_range+0x100/0x1a8
[   50.264318]  __kasan_check_write+0x20/0x30
[   50.264348]  kasan_atomics_helper+0x61c/0x4858
[   50.264380]  kasan_atomics+0x198/0x2e0
[   50.264410]  kunit_try_run_case+0x170/0x3f0
[   50.264443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.264483]  kthread+0x328/0x630
[   50.264511]  ret_from_fork+0x10/0x20
[   50.264541] 
[   50.335137] Allocated by task 309:
[   50.338522]  kasan_save_stack+0x3c/0x68
[   50.342342]  kasan_save_track+0x20/0x40
[   50.346161]  kasan_save_alloc_info+0x40/0x58
[   50.350414]  __kasan_kmalloc+0xd4/0xd8
[   50.354147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.358661]  kasan_atomics+0xb8/0x2e0
[   50.362306]  kunit_try_run_case+0x170/0x3f0
[   50.366473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.371942]  kthread+0x328/0x630
[   50.375154]  ret_from_fork+0x10/0x20
[   50.378713] 
[   50.380188] The buggy address belongs to the object at ffff000800c2e200
[   50.380188]  which belongs to the cache kmalloc-64 of size 64
[   50.392515] The buggy address is located 0 bytes to the right of
[   50.392515]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   50.405361] 
[   50.406838] The buggy address belongs to the physical page:
[   50.412393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   50.420378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.426889] page_type: f5(slab)
[   50.430023] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.437746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.445465] page dumped because: kasan: bad access detected
[   50.451021] 
[   50.452496] Memory state around the buggy address:
[   50.457274]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.464479]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.471684] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.478884]                                      ^
[   50.483662]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.490867]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.498068] ==================================================================
[   59.211010] ==================================================================
[   59.218081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   59.225455] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   59.232833] 
[   59.234314] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   59.234359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.234376] Hardware name: WinLink E850-96 board (DT)
[   59.234393] Call trace:
[   59.234404]  show_stack+0x20/0x38 (C)
[   59.234438]  dump_stack_lvl+0x8c/0xd0
[   59.234473]  print_report+0x118/0x608
[   59.234510]  kasan_report+0xdc/0x128
[   59.234543]  kasan_check_range+0x100/0x1a8
[   59.234577]  __kasan_check_write+0x20/0x30
[   59.234609]  kasan_atomics_helper+0x126c/0x4858
[   59.234644]  kasan_atomics+0x198/0x2e0
[   59.234675]  kunit_try_run_case+0x170/0x3f0
[   59.234711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.234749]  kthread+0x328/0x630
[   59.234775]  ret_from_fork+0x10/0x20
[   59.234805] 
[   59.305488] Allocated by task 309:
[   59.308875]  kasan_save_stack+0x3c/0x68
[   59.312693]  kasan_save_track+0x20/0x40
[   59.316513]  kasan_save_alloc_info+0x40/0x58
[   59.320766]  __kasan_kmalloc+0xd4/0xd8
[   59.324498]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.329012]  kasan_atomics+0xb8/0x2e0
[   59.332658]  kunit_try_run_case+0x170/0x3f0
[   59.336825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.342293]  kthread+0x328/0x630
[   59.345505]  ret_from_fork+0x10/0x20
[   59.349064] 
[   59.350540] The buggy address belongs to the object at ffff000800c2e200
[   59.350540]  which belongs to the cache kmalloc-64 of size 64
[   59.362866] The buggy address is located 0 bytes to the right of
[   59.362866]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   59.375713] 
[   59.377188] The buggy address belongs to the physical page:
[   59.382745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   59.390730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.397240] page_type: f5(slab)
[   59.400373] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.408097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.415816] page dumped because: kasan: bad access detected
[   59.421373] 
[   59.422847] Memory state around the buggy address:
[   59.427625]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.434830]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.442035] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.449236]                                      ^
[   59.454014]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.461218]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.468420] ==================================================================
[   62.377633] ==================================================================
[   62.384699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   62.392074] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   62.399452] 
[   62.400934] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   62.400983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.401000] Hardware name: WinLink E850-96 board (DT)
[   62.401016] Call trace:
[   62.401027]  show_stack+0x20/0x38 (C)
[   62.401062]  dump_stack_lvl+0x8c/0xd0
[   62.401097]  print_report+0x118/0x608
[   62.401133]  kasan_report+0xdc/0x128
[   62.401166]  kasan_check_range+0x100/0x1a8
[   62.401201]  __kasan_check_write+0x20/0x30
[   62.401229]  kasan_atomics_helper+0x16d0/0x4858
[   62.401262]  kasan_atomics+0x198/0x2e0
[   62.401294]  kunit_try_run_case+0x170/0x3f0
[   62.401326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.401365]  kthread+0x328/0x630
[   62.401392]  ret_from_fork+0x10/0x20
[   62.401425] 
[   62.472107] Allocated by task 309:
[   62.475494]  kasan_save_stack+0x3c/0x68
[   62.479312]  kasan_save_track+0x20/0x40
[   62.483132]  kasan_save_alloc_info+0x40/0x58
[   62.487385]  __kasan_kmalloc+0xd4/0xd8
[   62.491118]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.495632]  kasan_atomics+0xb8/0x2e0
[   62.499277]  kunit_try_run_case+0x170/0x3f0
[   62.503444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.508912]  kthread+0x328/0x630
[   62.512124]  ret_from_fork+0x10/0x20
[   62.515683] 
[   62.517160] The buggy address belongs to the object at ffff000800c2e200
[   62.517160]  which belongs to the cache kmalloc-64 of size 64
[   62.529486] The buggy address is located 0 bytes to the right of
[   62.529486]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   62.542332] 
[   62.543809] The buggy address belongs to the physical page:
[   62.549364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   62.557349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.563860] page_type: f5(slab)
[   62.566992] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.574717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.582435] page dumped because: kasan: bad access detected
[   62.587992] 
[   62.589466] Memory state around the buggy address:
[   62.594245]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.601449]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.608654] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.615855]                                      ^
[   62.620633]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.627838]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.635039] ==================================================================
[   54.990081] ==================================================================
[   54.997135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   55.004511] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   55.011803] 
[   55.013282] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   55.013330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.013346] Hardware name: WinLink E850-96 board (DT)
[   55.013367] Call trace:
[   55.013379]  show_stack+0x20/0x38 (C)
[   55.013412]  dump_stack_lvl+0x8c/0xd0
[   55.013448]  print_report+0x118/0x608
[   55.013482]  kasan_report+0xdc/0x128
[   55.013515]  __asan_report_load4_noabort+0x20/0x30
[   55.013546]  kasan_atomics_helper+0x3dd8/0x4858
[   55.013580]  kasan_atomics+0x198/0x2e0
[   55.013611]  kunit_try_run_case+0x170/0x3f0
[   55.013646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.013684]  kthread+0x328/0x630
[   55.013711]  ret_from_fork+0x10/0x20
[   55.013743] 
[   55.081072] Allocated by task 309:
[   55.084458]  kasan_save_stack+0x3c/0x68
[   55.088277]  kasan_save_track+0x20/0x40
[   55.092097]  kasan_save_alloc_info+0x40/0x58
[   55.096350]  __kasan_kmalloc+0xd4/0xd8
[   55.100083]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.104596]  kasan_atomics+0xb8/0x2e0
[   55.108242]  kunit_try_run_case+0x170/0x3f0
[   55.112409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.117877]  kthread+0x328/0x630
[   55.121089]  ret_from_fork+0x10/0x20
[   55.124648] 
[   55.126124] The buggy address belongs to the object at ffff000800c2e200
[   55.126124]  which belongs to the cache kmalloc-64 of size 64
[   55.138450] The buggy address is located 0 bytes to the right of
[   55.138450]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   55.151297] 
[   55.152773] The buggy address belongs to the physical page:
[   55.158329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   55.166314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.172825] page_type: f5(slab)
[   55.175957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.183682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.191400] page dumped because: kasan: bad access detected
[   55.196956] 
[   55.198432] Memory state around the buggy address:
[   55.203209]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.210414]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.217619] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.224820]                                      ^
[   55.229598]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.236803]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.244004] ==================================================================
[   59.740516] ==================================================================
[   59.747587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   59.754961] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   59.762339] 
[   59.763819] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   59.763863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.763881] Hardware name: WinLink E850-96 board (DT)
[   59.763898] Call trace:
[   59.763910]  show_stack+0x20/0x38 (C)
[   59.763945]  dump_stack_lvl+0x8c/0xd0
[   59.763980]  print_report+0x118/0x608
[   59.764018]  kasan_report+0xdc/0x128
[   59.764049]  kasan_check_range+0x100/0x1a8
[   59.764083]  __kasan_check_write+0x20/0x30
[   59.764114]  kasan_atomics_helper+0x1384/0x4858
[   59.764148]  kasan_atomics+0x198/0x2e0
[   59.764180]  kunit_try_run_case+0x170/0x3f0
[   59.764214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.764253]  kthread+0x328/0x630
[   59.764281]  ret_from_fork+0x10/0x20
[   59.764312] 
[   59.834994] Allocated by task 309:
[   59.838380]  kasan_save_stack+0x3c/0x68
[   59.842199]  kasan_save_track+0x20/0x40
[   59.846018]  kasan_save_alloc_info+0x40/0x58
[   59.850272]  __kasan_kmalloc+0xd4/0xd8
[   59.854004]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.858518]  kasan_atomics+0xb8/0x2e0
[   59.862164]  kunit_try_run_case+0x170/0x3f0
[   59.866331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.871799]  kthread+0x328/0x630
[   59.875011]  ret_from_fork+0x10/0x20
[   59.878570] 
[   59.880047] The buggy address belongs to the object at ffff000800c2e200
[   59.880047]  which belongs to the cache kmalloc-64 of size 64
[   59.892372] The buggy address is located 0 bytes to the right of
[   59.892372]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   59.905219] 
[   59.906696] The buggy address belongs to the physical page:
[   59.912251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   59.920236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.926746] page_type: f5(slab)
[   59.929879] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.937604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.945322] page dumped because: kasan: bad access detected
[   59.950879] 
[   59.952353] Memory state around the buggy address:
[   59.957131]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.964336]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.971541] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.978742]                                      ^
[   59.983520]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.990724]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.997925] ==================================================================
[   49.711690] ==================================================================
[   49.718742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   49.726032] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   49.733410] 
[   49.734889] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   49.734938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.734956] Hardware name: WinLink E850-96 board (DT)
[   49.734973] Call trace:
[   49.734985]  show_stack+0x20/0x38 (C)
[   49.735020]  dump_stack_lvl+0x8c/0xd0
[   49.735056]  print_report+0x118/0x608
[   49.735093]  kasan_report+0xdc/0x128
[   49.735126]  kasan_check_range+0x100/0x1a8
[   49.735161]  __kasan_check_write+0x20/0x30
[   49.735190]  kasan_atomics_helper+0x54c/0x4858
[   49.735225]  kasan_atomics+0x198/0x2e0
[   49.735257]  kunit_try_run_case+0x170/0x3f0
[   49.735289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.735327]  kthread+0x328/0x630
[   49.735354]  ret_from_fork+0x10/0x20
[   49.735384] 
[   49.805978] Allocated by task 309:
[   49.809364]  kasan_save_stack+0x3c/0x68
[   49.813183]  kasan_save_track+0x20/0x40
[   49.817002]  kasan_save_alloc_info+0x40/0x58
[   49.821255]  __kasan_kmalloc+0xd4/0xd8
[   49.824988]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.829502]  kasan_atomics+0xb8/0x2e0
[   49.833148]  kunit_try_run_case+0x170/0x3f0
[   49.837314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.842783]  kthread+0x328/0x630
[   49.845995]  ret_from_fork+0x10/0x20
[   49.849554] 
[   49.851029] The buggy address belongs to the object at ffff000800c2e200
[   49.851029]  which belongs to the cache kmalloc-64 of size 64
[   49.863356] The buggy address is located 0 bytes to the right of
[   49.863356]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   49.876203] 
[   49.877679] The buggy address belongs to the physical page:
[   49.883234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   49.891220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.897730] page_type: f5(slab)
[   49.900863] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.908587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.916306] page dumped because: kasan: bad access detected
[   49.921861] 
[   49.923337] Memory state around the buggy address:
[   49.928115]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.935320]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.942525] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.949726]                                      ^
[   49.954503]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.961709]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.968910] ==================================================================
[   60.531331] ==================================================================
[   60.538375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   60.545748] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   60.553126] 
[   60.554605] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   60.554652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.554668] Hardware name: WinLink E850-96 board (DT)
[   60.554686] Call trace:
[   60.554699]  show_stack+0x20/0x38 (C)
[   60.554733]  dump_stack_lvl+0x8c/0xd0
[   60.554767]  print_report+0x118/0x608
[   60.554803]  kasan_report+0xdc/0x128
[   60.554835]  kasan_check_range+0x100/0x1a8
[   60.554871]  __kasan_check_write+0x20/0x30
[   60.554899]  kasan_atomics_helper+0x147c/0x4858
[   60.554934]  kasan_atomics+0x198/0x2e0
[   60.554966]  kunit_try_run_case+0x170/0x3f0
[   60.554999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.555038]  kthread+0x328/0x630
[   60.555066]  ret_from_fork+0x10/0x20
[   60.555098] 
[   60.625781] Allocated by task 309:
[   60.629168]  kasan_save_stack+0x3c/0x68
[   60.632986]  kasan_save_track+0x20/0x40
[   60.636805]  kasan_save_alloc_info+0x40/0x58
[   60.641058]  __kasan_kmalloc+0xd4/0xd8
[   60.644791]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.649305]  kasan_atomics+0xb8/0x2e0
[   60.652951]  kunit_try_run_case+0x170/0x3f0
[   60.657117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.662586]  kthread+0x328/0x630
[   60.665798]  ret_from_fork+0x10/0x20
[   60.669357] 
[   60.670832] The buggy address belongs to the object at ffff000800c2e200
[   60.670832]  which belongs to the cache kmalloc-64 of size 64
[   60.683159] The buggy address is located 0 bytes to the right of
[   60.683159]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   60.696006] 
[   60.697482] The buggy address belongs to the physical page:
[   60.703037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   60.711023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.717533] page_type: f5(slab)
[   60.720666] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.728390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.736109] page dumped because: kasan: bad access detected
[   60.741666] 
[   60.743140] Memory state around the buggy address:
[   60.747920]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.755123]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.762328] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.769528]                                      ^
[   60.774307]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.781511]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.788713] ==================================================================
[   48.653380] ==================================================================
[   48.660426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   48.667714] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   48.675092] 
[   48.676573] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   48.676620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.676636] Hardware name: WinLink E850-96 board (DT)
[   48.676656] Call trace:
[   48.676670]  show_stack+0x20/0x38 (C)
[   48.676701]  dump_stack_lvl+0x8c/0xd0
[   48.676737]  print_report+0x118/0x608
[   48.676772]  kasan_report+0xdc/0x128
[   48.676805]  kasan_check_range+0x100/0x1a8
[   48.676843]  __kasan_check_write+0x20/0x30
[   48.676872]  kasan_atomics_helper+0x3ac/0x4858
[   48.676904]  kasan_atomics+0x198/0x2e0
[   48.676935]  kunit_try_run_case+0x170/0x3f0
[   48.676968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.677007]  kthread+0x328/0x630
[   48.677035]  ret_from_fork+0x10/0x20
[   48.677066] 
[   48.747661] Allocated by task 309:
[   48.751046]  kasan_save_stack+0x3c/0x68
[   48.754866]  kasan_save_track+0x20/0x40
[   48.758685]  kasan_save_alloc_info+0x40/0x58
[   48.762938]  __kasan_kmalloc+0xd4/0xd8
[   48.766671]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.771185]  kasan_atomics+0xb8/0x2e0
[   48.774830]  kunit_try_run_case+0x170/0x3f0
[   48.778997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.784466]  kthread+0x328/0x630
[   48.787677]  ret_from_fork+0x10/0x20
[   48.791236] 
[   48.792712] The buggy address belongs to the object at ffff000800c2e200
[   48.792712]  which belongs to the cache kmalloc-64 of size 64
[   48.805039] The buggy address is located 0 bytes to the right of
[   48.805039]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   48.817885] 
[   48.819361] The buggy address belongs to the physical page:
[   48.824917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   48.832903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.839413] page_type: f5(slab)
[   48.842546] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.850270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.857989] page dumped because: kasan: bad access detected
[   48.863544] 
[   48.865020] Memory state around the buggy address:
[   48.869798]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.877002]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.884209] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.891408]                                      ^
[   48.896186]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.903391]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.910592] ==================================================================
[   50.505432] ==================================================================
[   50.512480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   50.519770] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   50.527147] 
[   50.528629] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   50.528674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.528690] Hardware name: WinLink E850-96 board (DT)
[   50.528708] Call trace:
[   50.528720]  show_stack+0x20/0x38 (C)
[   50.528753]  dump_stack_lvl+0x8c/0xd0
[   50.528788]  print_report+0x118/0x608
[   50.528821]  kasan_report+0xdc/0x128
[   50.528854]  kasan_check_range+0x100/0x1a8
[   50.528891]  __kasan_check_write+0x20/0x30
[   50.528922]  kasan_atomics_helper+0x684/0x4858
[   50.528957]  kasan_atomics+0x198/0x2e0
[   50.528987]  kunit_try_run_case+0x170/0x3f0
[   50.529020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.529058]  kthread+0x328/0x630
[   50.529084]  ret_from_fork+0x10/0x20
[   50.529114] 
[   50.599716] Allocated by task 309:
[   50.603101]  kasan_save_stack+0x3c/0x68
[   50.606921]  kasan_save_track+0x20/0x40
[   50.610740]  kasan_save_alloc_info+0x40/0x58
[   50.614994]  __kasan_kmalloc+0xd4/0xd8
[   50.618726]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.623240]  kasan_atomics+0xb8/0x2e0
[   50.626886]  kunit_try_run_case+0x170/0x3f0
[   50.631053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.636521]  kthread+0x328/0x630
[   50.639733]  ret_from_fork+0x10/0x20
[   50.643292] 
[   50.644767] The buggy address belongs to the object at ffff000800c2e200
[   50.644767]  which belongs to the cache kmalloc-64 of size 64
[   50.657094] The buggy address is located 0 bytes to the right of
[   50.657094]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   50.669941] 
[   50.671416] The buggy address belongs to the physical page:
[   50.676973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   50.684958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.691468] page_type: f5(slab)
[   50.694601] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.702325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.710044] page dumped because: kasan: bad access detected
[   50.715599] 
[   50.717075] Memory state around the buggy address:
[   50.721853]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.729058]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.736263] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.743464]                                      ^
[   50.748242]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.755447]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.762648] ==================================================================
[   52.354168] ==================================================================
[   52.361237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   52.368527] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   52.375905] 
[   52.377384] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   52.377430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.377445] Hardware name: WinLink E850-96 board (DT)
[   52.377463] Call trace:
[   52.377475]  show_stack+0x20/0x38 (C)
[   52.377507]  dump_stack_lvl+0x8c/0xd0
[   52.377542]  print_report+0x118/0x608
[   52.377576]  kasan_report+0xdc/0x128
[   52.377609]  kasan_check_range+0x100/0x1a8
[   52.377642]  __kasan_check_write+0x20/0x30
[   52.377671]  kasan_atomics_helper+0x99c/0x4858
[   52.377704]  kasan_atomics+0x198/0x2e0
[   52.377735]  kunit_try_run_case+0x170/0x3f0
[   52.377769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.377806]  kthread+0x328/0x630
[   52.377833]  ret_from_fork+0x10/0x20
[   52.377864] 
[   52.448473] Allocated by task 309:
[   52.451859]  kasan_save_stack+0x3c/0x68
[   52.455678]  kasan_save_track+0x20/0x40
[   52.459497]  kasan_save_alloc_info+0x40/0x58
[   52.463751]  __kasan_kmalloc+0xd4/0xd8
[   52.467483]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.471997]  kasan_atomics+0xb8/0x2e0
[   52.475643]  kunit_try_run_case+0x170/0x3f0
[   52.479809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.485278]  kthread+0x328/0x630
[   52.488490]  ret_from_fork+0x10/0x20
[   52.492049] 
[   52.493524] The buggy address belongs to the object at ffff000800c2e200
[   52.493524]  which belongs to the cache kmalloc-64 of size 64
[   52.505851] The buggy address is located 0 bytes to the right of
[   52.505851]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   52.518698] 
[   52.520174] The buggy address belongs to the physical page:
[   52.525729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   52.533715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.540225] page_type: f5(slab)
[   52.543358] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.551082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.558801] page dumped because: kasan: bad access detected
[   52.564357] 
[   52.565832] Memory state around the buggy address:
[   52.570610]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.577815]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.585020] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.592221]                                      ^
[   52.596999]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.604204]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.611405] ==================================================================
[   53.412507] ==================================================================
[   53.419556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   53.426931] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   53.434222] 
[   53.435702] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   53.435749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.435766] Hardware name: WinLink E850-96 board (DT)
[   53.435784] Call trace:
[   53.435796]  show_stack+0x20/0x38 (C)
[   53.435830]  dump_stack_lvl+0x8c/0xd0
[   53.435865]  print_report+0x118/0x608
[   53.435896]  kasan_report+0xdc/0x128
[   53.435930]  __asan_report_load4_noabort+0x20/0x30
[   53.435961]  kasan_atomics_helper+0x3dcc/0x4858
[   53.435996]  kasan_atomics+0x198/0x2e0
[   53.436027]  kunit_try_run_case+0x170/0x3f0
[   53.436062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.436100]  kthread+0x328/0x630
[   53.436129]  ret_from_fork+0x10/0x20
[   53.436161] 
[   53.503492] Allocated by task 309:
[   53.506878]  kasan_save_stack+0x3c/0x68
[   53.510697]  kasan_save_track+0x20/0x40
[   53.514516]  kasan_save_alloc_info+0x40/0x58
[   53.518770]  __kasan_kmalloc+0xd4/0xd8
[   53.522502]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.527016]  kasan_atomics+0xb8/0x2e0
[   53.530662]  kunit_try_run_case+0x170/0x3f0
[   53.534828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.540297]  kthread+0x328/0x630
[   53.543509]  ret_from_fork+0x10/0x20
[   53.547068] 
[   53.548543] The buggy address belongs to the object at ffff000800c2e200
[   53.548543]  which belongs to the cache kmalloc-64 of size 64
[   53.560870] The buggy address is located 0 bytes to the right of
[   53.560870]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   53.573717] 
[   53.575192] The buggy address belongs to the physical page:
[   53.580748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   53.588734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.595244] page_type: f5(slab)
[   53.598377] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.606101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.613820] page dumped because: kasan: bad access detected
[   53.619376] 
[   53.620851] Memory state around the buggy address:
[   53.625629]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.632834]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.640039] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.647240]                                      ^
[   53.652018]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.659222]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.666423] ==================================================================
[   55.251322] ==================================================================
[   55.258416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   55.265706] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   55.273083] 
[   55.274563] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   55.274611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.274628] Hardware name: WinLink E850-96 board (DT)
[   55.274648] Call trace:
[   55.274661]  show_stack+0x20/0x38 (C)
[   55.274693]  dump_stack_lvl+0x8c/0xd0
[   55.274728]  print_report+0x118/0x608
[   55.274762]  kasan_report+0xdc/0x128
[   55.274796]  kasan_check_range+0x100/0x1a8
[   55.274832]  __kasan_check_write+0x20/0x30
[   55.274861]  kasan_atomics_helper+0xd3c/0x4858
[   55.274895]  kasan_atomics+0x198/0x2e0
[   55.274927]  kunit_try_run_case+0x170/0x3f0
[   55.274960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.274998]  kthread+0x328/0x630
[   55.275024]  ret_from_fork+0x10/0x20
[   55.275058] 
[   55.345652] Allocated by task 309:
[   55.349038]  kasan_save_stack+0x3c/0x68
[   55.352857]  kasan_save_track+0x20/0x40
[   55.356676]  kasan_save_alloc_info+0x40/0x58
[   55.360929]  __kasan_kmalloc+0xd4/0xd8
[   55.364662]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.369176]  kasan_atomics+0xb8/0x2e0
[   55.372822]  kunit_try_run_case+0x170/0x3f0
[   55.376988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.382457]  kthread+0x328/0x630
[   55.385669]  ret_from_fork+0x10/0x20
[   55.389227] 
[   55.390703] The buggy address belongs to the object at ffff000800c2e200
[   55.390703]  which belongs to the cache kmalloc-64 of size 64
[   55.403030] The buggy address is located 0 bytes to the right of
[   55.403030]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   55.415877] 
[   55.417353] The buggy address belongs to the physical page:
[   55.422908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   55.430894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.437404] page_type: f5(slab)
[   55.440536] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.448261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.455980] page dumped because: kasan: bad access detected
[   55.461535] 
[   55.463011] Memory state around the buggy address:
[   55.467789]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.474994]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.482199] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.489399]                                      ^
[   55.494177]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.501382]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.508583] ==================================================================
[   52.883344] ==================================================================
[   52.890397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   52.897685] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   52.905064] 
[   52.906543] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   52.906590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.906604] Hardware name: WinLink E850-96 board (DT)
[   52.906624] Call trace:
[   52.906634]  show_stack+0x20/0x38 (C)
[   52.906668]  dump_stack_lvl+0x8c/0xd0
[   52.906701]  print_report+0x118/0x608
[   52.906738]  kasan_report+0xdc/0x128
[   52.906771]  kasan_check_range+0x100/0x1a8
[   52.906805]  __kasan_check_write+0x20/0x30
[   52.906834]  kasan_atomics_helper+0xa6c/0x4858
[   52.906867]  kasan_atomics+0x198/0x2e0
[   52.906900]  kunit_try_run_case+0x170/0x3f0
[   52.906932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.906971]  kthread+0x328/0x630
[   52.906998]  ret_from_fork+0x10/0x20
[   52.907029] 
[   52.977632] Allocated by task 309:
[   52.981017]  kasan_save_stack+0x3c/0x68
[   52.984837]  kasan_save_track+0x20/0x40
[   52.988656]  kasan_save_alloc_info+0x40/0x58
[   52.992910]  __kasan_kmalloc+0xd4/0xd8
[   52.996642]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.001156]  kasan_atomics+0xb8/0x2e0
[   53.004802]  kunit_try_run_case+0x170/0x3f0
[   53.008968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.014437]  kthread+0x328/0x630
[   53.017648]  ret_from_fork+0x10/0x20
[   53.021208] 
[   53.022683] The buggy address belongs to the object at ffff000800c2e200
[   53.022683]  which belongs to the cache kmalloc-64 of size 64
[   53.035010] The buggy address is located 0 bytes to the right of
[   53.035010]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   53.047856] 
[   53.049332] The buggy address belongs to the physical page:
[   53.054888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   53.062874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.069384] page_type: f5(slab)
[   53.072517] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.080241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.087960] page dumped because: kasan: bad access detected
[   53.093515] 
[   53.094991] Memory state around the buggy address:
[   53.099769]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.106974]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.114178] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.121380]                                      ^
[   53.126157]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.133363]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.140564] ==================================================================
[   47.337022] ==================================================================
[   47.344127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   47.351414] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   47.358793] 
[   47.360274] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   47.360327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.360345] Hardware name: WinLink E850-96 board (DT)
[   47.360365] Call trace:
[   47.360377]  show_stack+0x20/0x38 (C)
[   47.360412]  dump_stack_lvl+0x8c/0xd0
[   47.360450]  print_report+0x118/0x608
[   47.360487]  kasan_report+0xdc/0x128
[   47.360522]  kasan_check_range+0x100/0x1a8
[   47.360559]  __kasan_check_write+0x20/0x30
[   47.360587]  kasan_atomics_helper+0x24c/0x4858
[   47.360624]  kasan_atomics+0x198/0x2e0
[   47.360654]  kunit_try_run_case+0x170/0x3f0
[   47.360691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.360731]  kthread+0x328/0x630
[   47.360759]  ret_from_fork+0x10/0x20
[   47.360792] 
[   47.431361] Allocated by task 309:
[   47.434748]  kasan_save_stack+0x3c/0x68
[   47.438567]  kasan_save_track+0x20/0x40
[   47.442385]  kasan_save_alloc_info+0x40/0x58
[   47.446638]  __kasan_kmalloc+0xd4/0xd8
[   47.450371]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.454885]  kasan_atomics+0xb8/0x2e0
[   47.458531]  kunit_try_run_case+0x170/0x3f0
[   47.462697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.468166]  kthread+0x328/0x630
[   47.471378]  ret_from_fork+0x10/0x20
[   47.474937] 
[   47.476415] The buggy address belongs to the object at ffff000800c2e200
[   47.476415]  which belongs to the cache kmalloc-64 of size 64
[   47.488740] The buggy address is located 0 bytes to the right of
[   47.488740]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   47.501585] 
[   47.503063] The buggy address belongs to the physical page:
[   47.508617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   47.516604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.523114] page_type: f5(slab)
[   47.526248] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.533970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.541689] page dumped because: kasan: bad access detected
[   47.547246] 
[   47.548720] Memory state around the buggy address:
[   47.553500]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.560703]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.567909] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.575109]                                      ^
[   47.579887]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.587091]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.594292] ==================================================================
[   46.811247] ==================================================================
[   46.818268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   46.825641] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   46.833019] 
[   46.834505] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   46.834561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.834576] Hardware name: WinLink E850-96 board (DT)
[   46.834598] Call trace:
[   46.834612]  show_stack+0x20/0x38 (C)
[   46.834646]  dump_stack_lvl+0x8c/0xd0
[   46.834685]  print_report+0x118/0x608
[   46.834720]  kasan_report+0xdc/0x128
[   46.834752]  __asan_report_store4_noabort+0x20/0x30
[   46.834785]  kasan_atomics_helper+0x3f7c/0x4858
[   46.834818]  kasan_atomics+0x198/0x2e0
[   46.834849]  kunit_try_run_case+0x170/0x3f0
[   46.834886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.834926]  kthread+0x328/0x630
[   46.834959]  ret_from_fork+0x10/0x20
[   46.834992] 
[   46.902376] Allocated by task 309:
[   46.905763]  kasan_save_stack+0x3c/0x68
[   46.909580]  kasan_save_track+0x20/0x40
[   46.913400]  kasan_save_alloc_info+0x40/0x58
[   46.917653]  __kasan_kmalloc+0xd4/0xd8
[   46.921386]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.925900]  kasan_atomics+0xb8/0x2e0
[   46.929545]  kunit_try_run_case+0x170/0x3f0
[   46.933712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.939181]  kthread+0x328/0x630
[   46.942393]  ret_from_fork+0x10/0x20
[   46.945951] 
[   46.947430] The buggy address belongs to the object at ffff000800c2e200
[   46.947430]  which belongs to the cache kmalloc-64 of size 64
[   46.959755] The buggy address is located 0 bytes to the right of
[   46.959755]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   46.972600] 
[   46.974078] The buggy address belongs to the physical page:
[   46.979634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   46.987621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.994129] page_type: f5(slab)
[   46.997263] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.004985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.012704] page dumped because: kasan: bad access detected
[   47.018260] 
[   47.019735] Memory state around the buggy address:
[   47.024515]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.031718]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.038924] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.046124]                                      ^
[   47.050901]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.058106]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.065307] ==================================================================
[   48.127288] ==================================================================
[   48.134393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   48.141680] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   48.149058] 
[   48.150541] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   48.150593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.150610] Hardware name: WinLink E850-96 board (DT)
[   48.150631] Call trace:
[   48.150644]  show_stack+0x20/0x38 (C)
[   48.150680]  dump_stack_lvl+0x8c/0xd0
[   48.150717]  print_report+0x118/0x608
[   48.150753]  kasan_report+0xdc/0x128
[   48.150785]  kasan_check_range+0x100/0x1a8
[   48.150822]  __kasan_check_write+0x20/0x30
[   48.150851]  kasan_atomics_helper+0x32c/0x4858
[   48.150886]  kasan_atomics+0x198/0x2e0
[   48.150917]  kunit_try_run_case+0x170/0x3f0
[   48.150952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.150990]  kthread+0x328/0x630
[   48.151018]  ret_from_fork+0x10/0x20
[   48.151050] 
[   48.221627] Allocated by task 309:
[   48.225012]  kasan_save_stack+0x3c/0x68
[   48.228832]  kasan_save_track+0x20/0x40
[   48.232651]  kasan_save_alloc_info+0x40/0x58
[   48.236904]  __kasan_kmalloc+0xd4/0xd8
[   48.240637]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.245151]  kasan_atomics+0xb8/0x2e0
[   48.248797]  kunit_try_run_case+0x170/0x3f0
[   48.252963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.258432]  kthread+0x328/0x630
[   48.261643]  ret_from_fork+0x10/0x20
[   48.265202] 
[   48.266679] The buggy address belongs to the object at ffff000800c2e200
[   48.266679]  which belongs to the cache kmalloc-64 of size 64
[   48.279005] The buggy address is located 0 bytes to the right of
[   48.279005]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   48.291851] 
[   48.293329] The buggy address belongs to the physical page:
[   48.298884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   48.306870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.313379] page_type: f5(slab)
[   48.316513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.324236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.331955] page dumped because: kasan: bad access detected
[   48.337512] 
[   48.338986] Memory state around the buggy address:
[   48.343767]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.350969]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.358175] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.365375]                                      ^
[   48.370152]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.377357]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.384559] ==================================================================
[   55.515923] ==================================================================
[   55.522995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   55.530371] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   55.537663] 
[   55.539142] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   55.539191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.539207] Hardware name: WinLink E850-96 board (DT)
[   55.539228] Call trace:
[   55.539240]  show_stack+0x20/0x38 (C)
[   55.539271]  dump_stack_lvl+0x8c/0xd0
[   55.539304]  print_report+0x118/0x608
[   55.539338]  kasan_report+0xdc/0x128
[   55.539369]  __asan_report_load4_noabort+0x20/0x30
[   55.539400]  kasan_atomics_helper+0x3e04/0x4858
[   55.539435]  kasan_atomics+0x198/0x2e0
[   55.539467]  kunit_try_run_case+0x170/0x3f0
[   55.539501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.539538]  kthread+0x328/0x630
[   55.539565]  ret_from_fork+0x10/0x20
[   55.539596] 
[   55.606933] Allocated by task 309:
[   55.610319]  kasan_save_stack+0x3c/0x68
[   55.614138]  kasan_save_track+0x20/0x40
[   55.617957]  kasan_save_alloc_info+0x40/0x58
[   55.622210]  __kasan_kmalloc+0xd4/0xd8
[   55.625943]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.630457]  kasan_atomics+0xb8/0x2e0
[   55.634102]  kunit_try_run_case+0x170/0x3f0
[   55.638269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.643738]  kthread+0x328/0x630
[   55.646949]  ret_from_fork+0x10/0x20
[   55.650509] 
[   55.651984] The buggy address belongs to the object at ffff000800c2e200
[   55.651984]  which belongs to the cache kmalloc-64 of size 64
[   55.664311] The buggy address is located 0 bytes to the right of
[   55.664311]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   55.677157] 
[   55.678633] The buggy address belongs to the physical page:
[   55.684189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   55.692174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.698684] page_type: f5(slab)
[   55.701817] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.709542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.717261] page dumped because: kasan: bad access detected
[   55.722816] 
[   55.724292] Memory state around the buggy address:
[   55.729070]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.736275]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.743479] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.750680]                                      ^
[   55.755458]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.762663]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.769864] ==================================================================
[   63.429675] ==================================================================
[   63.436768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   63.444141] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   63.451520] 
[   63.452999] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   63.453047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.453064] Hardware name: WinLink E850-96 board (DT)
[   63.453082] Call trace:
[   63.453096]  show_stack+0x20/0x38 (C)
[   63.453127]  dump_stack_lvl+0x8c/0xd0
[   63.453166]  print_report+0x118/0x608
[   63.453200]  kasan_report+0xdc/0x128
[   63.453234]  kasan_check_range+0x100/0x1a8
[   63.453268]  __kasan_check_write+0x20/0x30
[   63.453299]  kasan_atomics_helper+0x17ec/0x4858
[   63.453333]  kasan_atomics+0x198/0x2e0
[   63.453365]  kunit_try_run_case+0x170/0x3f0
[   63.453396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.453437]  kthread+0x328/0x630
[   63.453464]  ret_from_fork+0x10/0x20
[   63.453497] 
[   63.524175] Allocated by task 309:
[   63.527560]  kasan_save_stack+0x3c/0x68
[   63.531380]  kasan_save_track+0x20/0x40
[   63.535199]  kasan_save_alloc_info+0x40/0x58
[   63.539452]  __kasan_kmalloc+0xd4/0xd8
[   63.543185]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.547699]  kasan_atomics+0xb8/0x2e0
[   63.551345]  kunit_try_run_case+0x170/0x3f0
[   63.555511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.560980]  kthread+0x328/0x630
[   63.564192]  ret_from_fork+0x10/0x20
[   63.567751] 
[   63.569226] The buggy address belongs to the object at ffff000800c2e200
[   63.569226]  which belongs to the cache kmalloc-64 of size 64
[   63.581553] The buggy address is located 0 bytes to the right of
[   63.581553]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   63.594399] 
[   63.595875] The buggy address belongs to the physical page:
[   63.601431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   63.609416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.615927] page_type: f5(slab)
[   63.619060] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.626784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.634503] page dumped because: kasan: bad access detected
[   63.640060] 
[   63.641534] Memory state around the buggy address:
[   63.646314]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.653517]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.660722] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.667923]                                      ^
[   63.672701]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.679905]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.687107] ==================================================================
[   60.266528] ==================================================================
[   60.273621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   60.280995] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   60.288373] 
[   60.289852] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   60.289899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.289915] Hardware name: WinLink E850-96 board (DT)
[   60.289934] Call trace:
[   60.289946]  show_stack+0x20/0x38 (C)
[   60.289979]  dump_stack_lvl+0x8c/0xd0
[   60.290012]  print_report+0x118/0x608
[   60.290048]  kasan_report+0xdc/0x128
[   60.290080]  kasan_check_range+0x100/0x1a8
[   60.290114]  __kasan_check_write+0x20/0x30
[   60.290143]  kasan_atomics_helper+0x1414/0x4858
[   60.290177]  kasan_atomics+0x198/0x2e0
[   60.290207]  kunit_try_run_case+0x170/0x3f0
[   60.290240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.290279]  kthread+0x328/0x630
[   60.290306]  ret_from_fork+0x10/0x20
[   60.290336] 
[   60.361028] Allocated by task 309:
[   60.364414]  kasan_save_stack+0x3c/0x68
[   60.368233]  kasan_save_track+0x20/0x40
[   60.372052]  kasan_save_alloc_info+0x40/0x58
[   60.376306]  __kasan_kmalloc+0xd4/0xd8
[   60.380038]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.384552]  kasan_atomics+0xb8/0x2e0
[   60.388198]  kunit_try_run_case+0x170/0x3f0
[   60.392364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.397833]  kthread+0x328/0x630
[   60.401044]  ret_from_fork+0x10/0x20
[   60.404604] 
[   60.406080] The buggy address belongs to the object at ffff000800c2e200
[   60.406080]  which belongs to the cache kmalloc-64 of size 64
[   60.418406] The buggy address is located 0 bytes to the right of
[   60.418406]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   60.431252] 
[   60.432729] The buggy address belongs to the physical page:
[   60.438284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   60.446270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.452780] page_type: f5(slab)
[   60.455913] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.463637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.471356] page dumped because: kasan: bad access detected
[   60.476913] 
[   60.478387] Memory state around the buggy address:
[   60.483165]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.490370]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.497574] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.504776]                                      ^
[   60.509554]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.516759]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.523959] ==================================================================
[   56.828929] ==================================================================
[   56.835998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   56.843286] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   56.850664] 
[   56.852143] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   56.852190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.852206] Hardware name: WinLink E850-96 board (DT)
[   56.852223] Call trace:
[   56.852235]  show_stack+0x20/0x38 (C)
[   56.852265]  dump_stack_lvl+0x8c/0xd0
[   56.852301]  print_report+0x118/0x608
[   56.852334]  kasan_report+0xdc/0x128
[   56.852369]  kasan_check_range+0x100/0x1a8
[   56.852405]  __kasan_check_write+0x20/0x30
[   56.852435]  kasan_atomics_helper+0xeb8/0x4858
[   56.852468]  kasan_atomics+0x198/0x2e0
[   56.852499]  kunit_try_run_case+0x170/0x3f0
[   56.852532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.852570]  kthread+0x328/0x630
[   56.852596]  ret_from_fork+0x10/0x20
[   56.852627] 
[   56.923232] Allocated by task 309:
[   56.926618]  kasan_save_stack+0x3c/0x68
[   56.930437]  kasan_save_track+0x20/0x40
[   56.934257]  kasan_save_alloc_info+0x40/0x58
[   56.938510]  __kasan_kmalloc+0xd4/0xd8
[   56.942242]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.946756]  kasan_atomics+0xb8/0x2e0
[   56.950402]  kunit_try_run_case+0x170/0x3f0
[   56.954568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.960037]  kthread+0x328/0x630
[   56.963249]  ret_from_fork+0x10/0x20
[   56.966808] 
[   56.968284] The buggy address belongs to the object at ffff000800c2e200
[   56.968284]  which belongs to the cache kmalloc-64 of size 64
[   56.980610] The buggy address is located 0 bytes to the right of
[   56.980610]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   56.993457] 
[   56.994933] The buggy address belongs to the physical page:
[   57.000488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   57.008474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.014984] page_type: f5(slab)
[   57.018117] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.025842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.033561] page dumped because: kasan: bad access detected
[   57.039116] 
[   57.040591] Memory state around the buggy address:
[   57.045369]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.052574]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.059779] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.066980]                                      ^
[   57.071758]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.078963]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.086164] ==================================================================
[   53.673738] ==================================================================
[   53.680836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   53.688125] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   53.695503] 
[   53.696982] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   53.697030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.697047] Hardware name: WinLink E850-96 board (DT)
[   53.697065] Call trace:
[   53.697079]  show_stack+0x20/0x38 (C)
[   53.697109]  dump_stack_lvl+0x8c/0xd0
[   53.697143]  print_report+0x118/0x608
[   53.697177]  kasan_report+0xdc/0x128
[   53.697212]  kasan_check_range+0x100/0x1a8
[   53.697247]  __kasan_check_write+0x20/0x30
[   53.697277]  kasan_atomics_helper+0xb70/0x4858
[   53.697311]  kasan_atomics+0x198/0x2e0
[   53.697344]  kunit_try_run_case+0x170/0x3f0
[   53.697377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.697414]  kthread+0x328/0x630
[   53.697440]  ret_from_fork+0x10/0x20
[   53.697471] 
[   53.768071] Allocated by task 309:
[   53.771457]  kasan_save_stack+0x3c/0x68
[   53.775276]  kasan_save_track+0x20/0x40
[   53.779096]  kasan_save_alloc_info+0x40/0x58
[   53.783349]  __kasan_kmalloc+0xd4/0xd8
[   53.787082]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.791595]  kasan_atomics+0xb8/0x2e0
[   53.795241]  kunit_try_run_case+0x170/0x3f0
[   53.799408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.804876]  kthread+0x328/0x630
[   53.808088]  ret_from_fork+0x10/0x20
[   53.811647] 
[   53.813123] The buggy address belongs to the object at ffff000800c2e200
[   53.813123]  which belongs to the cache kmalloc-64 of size 64
[   53.825449] The buggy address is located 0 bytes to the right of
[   53.825449]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   53.838296] 
[   53.839772] The buggy address belongs to the physical page:
[   53.845328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   53.853313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.859823] page_type: f5(slab)
[   53.862956] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.870681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.878400] page dumped because: kasan: bad access detected
[   53.883955] 
[   53.885430] Memory state around the buggy address:
[   53.890208]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.897413]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.904618] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.911819]                                      ^
[   53.916597]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.923802]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.931003] ==================================================================
[   61.325569] ==================================================================
[   61.332632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   61.340007] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   61.347385] 
[   61.348864] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   61.348918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.348933] Hardware name: WinLink E850-96 board (DT)
[   61.348951] Call trace:
[   61.348964]  show_stack+0x20/0x38 (C)
[   61.348998]  dump_stack_lvl+0x8c/0xd0
[   61.349033]  print_report+0x118/0x608
[   61.349069]  kasan_report+0xdc/0x128
[   61.349101]  kasan_check_range+0x100/0x1a8
[   61.349135]  __kasan_check_write+0x20/0x30
[   61.349164]  kasan_atomics_helper+0x15b4/0x4858
[   61.349197]  kasan_atomics+0x198/0x2e0
[   61.349229]  kunit_try_run_case+0x170/0x3f0
[   61.349263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.349304]  kthread+0x328/0x630
[   61.349332]  ret_from_fork+0x10/0x20
[   61.349363] 
[   61.420040] Allocated by task 309:
[   61.423427]  kasan_save_stack+0x3c/0x68
[   61.427245]  kasan_save_track+0x20/0x40
[   61.431064]  kasan_save_alloc_info+0x40/0x58
[   61.435317]  __kasan_kmalloc+0xd4/0xd8
[   61.439050]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.443564]  kasan_atomics+0xb8/0x2e0
[   61.447209]  kunit_try_run_case+0x170/0x3f0
[   61.451376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.456845]  kthread+0x328/0x630
[   61.460056]  ret_from_fork+0x10/0x20
[   61.463615] 
[   61.465091] The buggy address belongs to the object at ffff000800c2e200
[   61.465091]  which belongs to the cache kmalloc-64 of size 64
[   61.477418] The buggy address is located 0 bytes to the right of
[   61.477418]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   61.490264] 
[   61.491740] The buggy address belongs to the physical page:
[   61.497296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   61.505282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.511792] page_type: f5(slab)
[   61.514925] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.522649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.530368] page dumped because: kasan: bad access detected
[   61.535923] 
[   61.537399] Memory state around the buggy address:
[   61.542177]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.549381]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.556586] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.563788]                                      ^
[   61.568566]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.575770]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.582972] ==================================================================
[   51.299168] ==================================================================
[   51.306217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   51.313507] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   51.320886] 
[   51.322365] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   51.322412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.322427] Hardware name: WinLink E850-96 board (DT)
[   51.322443] Call trace:
[   51.322456]  show_stack+0x20/0x38 (C)
[   51.322492]  dump_stack_lvl+0x8c/0xd0
[   51.322527]  print_report+0x118/0x608
[   51.322562]  kasan_report+0xdc/0x128
[   51.322593]  kasan_check_range+0x100/0x1a8
[   51.322632]  __kasan_check_write+0x20/0x30
[   51.322661]  kasan_atomics_helper+0x7cc/0x4858
[   51.322694]  kasan_atomics+0x198/0x2e0
[   51.322725]  kunit_try_run_case+0x170/0x3f0
[   51.322757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.322795]  kthread+0x328/0x630
[   51.322823]  ret_from_fork+0x10/0x20
[   51.322852] 
[   51.393454] Allocated by task 309:
[   51.396840]  kasan_save_stack+0x3c/0x68
[   51.400659]  kasan_save_track+0x20/0x40
[   51.404478]  kasan_save_alloc_info+0x40/0x58
[   51.408732]  __kasan_kmalloc+0xd4/0xd8
[   51.412464]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.416978]  kasan_atomics+0xb8/0x2e0
[   51.420624]  kunit_try_run_case+0x170/0x3f0
[   51.424791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.430259]  kthread+0x328/0x630
[   51.433471]  ret_from_fork+0x10/0x20
[   51.437030] 
[   51.438505] The buggy address belongs to the object at ffff000800c2e200
[   51.438505]  which belongs to the cache kmalloc-64 of size 64
[   51.450832] The buggy address is located 0 bytes to the right of
[   51.450832]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   51.463679] 
[   51.465155] The buggy address belongs to the physical page:
[   51.470711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   51.478696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.485206] page_type: f5(slab)
[   51.488339] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.496063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.503783] page dumped because: kasan: bad access detected
[   51.509338] 
[   51.510813] Memory state around the buggy address:
[   51.515591]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.522796]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.530001] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.537202]                                      ^
[   51.541980]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.549185]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.556386] ==================================================================
[   61.590316] ==================================================================
[   61.597384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   61.604760] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   61.612051] 
[   61.613532] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   61.613579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.613596] Hardware name: WinLink E850-96 board (DT)
[   61.613615] Call trace:
[   61.613627]  show_stack+0x20/0x38 (C)
[   61.613660]  dump_stack_lvl+0x8c/0xd0
[   61.613695]  print_report+0x118/0x608
[   61.613729]  kasan_report+0xdc/0x128
[   61.613761]  __asan_report_load8_noabort+0x20/0x30
[   61.613792]  kasan_atomics_helper+0x3db0/0x4858
[   61.613828]  kasan_atomics+0x198/0x2e0
[   61.613859]  kunit_try_run_case+0x170/0x3f0
[   61.613896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.613932]  kthread+0x328/0x630
[   61.613958]  ret_from_fork+0x10/0x20
[   61.613991] 
[   61.681320] Allocated by task 309:
[   61.684706]  kasan_save_stack+0x3c/0x68
[   61.688525]  kasan_save_track+0x20/0x40
[   61.692345]  kasan_save_alloc_info+0x40/0x58
[   61.696598]  __kasan_kmalloc+0xd4/0xd8
[   61.700331]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.704845]  kasan_atomics+0xb8/0x2e0
[   61.708490]  kunit_try_run_case+0x170/0x3f0
[   61.712657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.718126]  kthread+0x328/0x630
[   61.721337]  ret_from_fork+0x10/0x20
[   61.724896] 
[   61.726372] The buggy address belongs to the object at ffff000800c2e200
[   61.726372]  which belongs to the cache kmalloc-64 of size 64
[   61.738698] The buggy address is located 0 bytes to the right of
[   61.738698]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   61.751545] 
[   61.753021] The buggy address belongs to the physical page:
[   61.758577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   61.766563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.773072] page_type: f5(slab)
[   61.776205] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.783930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.791649] page dumped because: kasan: bad access detected
[   61.797204] 
[   61.798680] Memory state around the buggy address:
[   61.803458]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.810663]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.817867] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.825068]                                      ^
[   61.829846]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.837051]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.844252] ==================================================================
[   55.777199] ==================================================================
[   55.784277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   55.791565] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   55.798857] 
[   55.800336] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   55.800382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.800396] Hardware name: WinLink E850-96 board (DT)
[   55.800416] Call trace:
[   55.800430]  show_stack+0x20/0x38 (C)
[   55.800462]  dump_stack_lvl+0x8c/0xd0
[   55.800497]  print_report+0x118/0x608
[   55.800532]  kasan_report+0xdc/0x128
[   55.800565]  kasan_check_range+0x100/0x1a8
[   55.800601]  __kasan_check_read+0x20/0x30
[   55.800630]  kasan_atomics_helper+0xdd4/0x4858
[   55.800664]  kasan_atomics+0x198/0x2e0
[   55.800695]  kunit_try_run_case+0x170/0x3f0
[   55.800730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.800767]  kthread+0x328/0x630
[   55.800795]  ret_from_fork+0x10/0x20
[   55.800827] 
[   55.871338] Allocated by task 309:
[   55.874724]  kasan_save_stack+0x3c/0x68
[   55.878543]  kasan_save_track+0x20/0x40
[   55.882363]  kasan_save_alloc_info+0x40/0x58
[   55.886616]  __kasan_kmalloc+0xd4/0xd8
[   55.890348]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.894862]  kasan_atomics+0xb8/0x2e0
[   55.898508]  kunit_try_run_case+0x170/0x3f0
[   55.902675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.908143]  kthread+0x328/0x630
[   55.911355]  ret_from_fork+0x10/0x20
[   55.914914] 
[   55.916389] The buggy address belongs to the object at ffff000800c2e200
[   55.916389]  which belongs to the cache kmalloc-64 of size 64
[   55.928717] The buggy address is located 0 bytes to the right of
[   55.928717]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   55.941563] 
[   55.943039] The buggy address belongs to the physical page:
[   55.948595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   55.956580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.963091] page_type: f5(slab)
[   55.966223] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.973947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.981667] page dumped because: kasan: bad access detected
[   55.987222] 
[   55.988697] Memory state around the buggy address:
[   55.993475]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.000681]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.007885] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.015086]                                      ^
[   56.019864]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.027069]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.034270] ==================================================================
[   47.072642] ==================================================================
[   47.079724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   47.087009] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   47.094300] 
[   47.095784] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   47.095837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.095859] Hardware name: WinLink E850-96 board (DT)
[   47.095880] Call trace:
[   47.095893]  show_stack+0x20/0x38 (C)
[   47.095929]  dump_stack_lvl+0x8c/0xd0
[   47.095964]  print_report+0x118/0x608
[   47.096002]  kasan_report+0xdc/0x128
[   47.096034]  kasan_check_range+0x100/0x1a8
[   47.096071]  __kasan_check_read+0x20/0x30
[   47.096101]  kasan_atomics_helper+0x1ec/0x4858
[   47.096134]  kasan_atomics+0x198/0x2e0
[   47.096166]  kunit_try_run_case+0x170/0x3f0
[   47.096205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.096242]  kthread+0x328/0x630
[   47.096273]  ret_from_fork+0x10/0x20
[   47.096306] 
[   47.166781] Allocated by task 309:
[   47.170168]  kasan_save_stack+0x3c/0x68
[   47.173986]  kasan_save_track+0x20/0x40
[   47.177806]  kasan_save_alloc_info+0x40/0x58
[   47.182059]  __kasan_kmalloc+0xd4/0xd8
[   47.185792]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.190306]  kasan_atomics+0xb8/0x2e0
[   47.193951]  kunit_try_run_case+0x170/0x3f0
[   47.198118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.203586]  kthread+0x328/0x630
[   47.206799]  ret_from_fork+0x10/0x20
[   47.210357] 
[   47.211836] The buggy address belongs to the object at ffff000800c2e200
[   47.211836]  which belongs to the cache kmalloc-64 of size 64
[   47.224162] The buggy address is located 0 bytes to the right of
[   47.224162]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   47.237006] 
[   47.238483] The buggy address belongs to the physical page:
[   47.244041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   47.252027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.258535] page_type: f5(slab)
[   47.261670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.269391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.277111] page dumped because: kasan: bad access detected
[   47.282666] 
[   47.284141] Memory state around the buggy address:
[   47.288922]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.296123]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.303330] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.310530]                                      ^
[   47.315307]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.322512]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.329713] ==================================================================
[   57.093478] ==================================================================
[   57.100576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   57.107865] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   57.115243] 
[   57.116723] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   57.116769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.116786] Hardware name: WinLink E850-96 board (DT)
[   57.116803] Call trace:
[   57.116815]  show_stack+0x20/0x38 (C)
[   57.116846]  dump_stack_lvl+0x8c/0xd0
[   57.116882]  print_report+0x118/0x608
[   57.116916]  kasan_report+0xdc/0x128
[   57.116947]  kasan_check_range+0x100/0x1a8
[   57.116981]  __kasan_check_write+0x20/0x30
[   57.117011]  kasan_atomics_helper+0xf20/0x4858
[   57.117044]  kasan_atomics+0x198/0x2e0
[   57.117075]  kunit_try_run_case+0x170/0x3f0
[   57.117109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.117150]  kthread+0x328/0x630
[   57.117176]  ret_from_fork+0x10/0x20
[   57.117206] 
[   57.187812] Allocated by task 309:
[   57.191199]  kasan_save_stack+0x3c/0x68
[   57.195017]  kasan_save_track+0x20/0x40
[   57.198836]  kasan_save_alloc_info+0x40/0x58
[   57.203089]  __kasan_kmalloc+0xd4/0xd8
[   57.206822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.211336]  kasan_atomics+0xb8/0x2e0
[   57.214981]  kunit_try_run_case+0x170/0x3f0
[   57.219148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.224617]  kthread+0x328/0x630
[   57.227828]  ret_from_fork+0x10/0x20
[   57.231388] 
[   57.232863] The buggy address belongs to the object at ffff000800c2e200
[   57.232863]  which belongs to the cache kmalloc-64 of size 64
[   57.245190] The buggy address is located 0 bytes to the right of
[   57.245190]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   57.258036] 
[   57.259512] The buggy address belongs to the physical page:
[   57.265068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   57.273054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.279564] page_type: f5(slab)
[   57.282697] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.290421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.298140] page dumped because: kasan: bad access detected
[   57.303695] 
[   57.305170] Memory state around the buggy address:
[   57.309949]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.317153]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.324359] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.331560]                                      ^
[   57.336338]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.343542]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.350743] ==================================================================
[   58.416751] ==================================================================
[   58.423821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   58.431197] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   58.438574] 
[   58.440057] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   58.440104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.440121] Hardware name: WinLink E850-96 board (DT)
[   58.440138] Call trace:
[   58.440151]  show_stack+0x20/0x38 (C)
[   58.440181]  dump_stack_lvl+0x8c/0xd0
[   58.440216]  print_report+0x118/0x608
[   58.440251]  kasan_report+0xdc/0x128
[   58.440283]  kasan_check_range+0x100/0x1a8
[   58.440319]  __kasan_check_write+0x20/0x30
[   58.440350]  kasan_atomics_helper+0x1128/0x4858
[   58.440383]  kasan_atomics+0x198/0x2e0
[   58.440413]  kunit_try_run_case+0x170/0x3f0
[   58.440447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.440485]  kthread+0x328/0x630
[   58.440511]  ret_from_fork+0x10/0x20
[   58.440544] 
[   58.511229] Allocated by task 309:
[   58.514615]  kasan_save_stack+0x3c/0x68
[   58.518434]  kasan_save_track+0x20/0x40
[   58.522254]  kasan_save_alloc_info+0x40/0x58
[   58.526507]  __kasan_kmalloc+0xd4/0xd8
[   58.530239]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.534753]  kasan_atomics+0xb8/0x2e0
[   58.538399]  kunit_try_run_case+0x170/0x3f0
[   58.542566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.548034]  kthread+0x328/0x630
[   58.551246]  ret_from_fork+0x10/0x20
[   58.554805] 
[   58.556282] The buggy address belongs to the object at ffff000800c2e200
[   58.556282]  which belongs to the cache kmalloc-64 of size 64
[   58.568608] The buggy address is located 0 bytes to the right of
[   58.568608]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   58.581454] 
[   58.582930] The buggy address belongs to the physical page:
[   58.588486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   58.596471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.602982] page_type: f5(slab)
[   58.606115] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.613838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.621558] page dumped because: kasan: bad access detected
[   58.627114] 
[   58.628588] Memory state around the buggy address:
[   58.633367]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.640571]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.647776] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.654977]                                      ^
[   58.659755]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.666959]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.674161] ==================================================================
[   58.151989] ==================================================================
[   58.159067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   58.166443] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   58.173821] 
[   58.175301] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   58.175347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.175363] Hardware name: WinLink E850-96 board (DT)
[   58.175378] Call trace:
[   58.175392]  show_stack+0x20/0x38 (C)
[   58.175424]  dump_stack_lvl+0x8c/0xd0
[   58.175458]  print_report+0x118/0x608
[   58.175496]  kasan_report+0xdc/0x128
[   58.175527]  kasan_check_range+0x100/0x1a8
[   58.175562]  __kasan_check_write+0x20/0x30
[   58.175593]  kasan_atomics_helper+0x10c0/0x4858
[   58.175626]  kasan_atomics+0x198/0x2e0
[   58.175657]  kunit_try_run_case+0x170/0x3f0
[   58.175691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.175729]  kthread+0x328/0x630
[   58.175759]  ret_from_fork+0x10/0x20
[   58.175789] 
[   58.246476] Allocated by task 309:
[   58.249862]  kasan_save_stack+0x3c/0x68
[   58.253681]  kasan_save_track+0x20/0x40
[   58.257501]  kasan_save_alloc_info+0x40/0x58
[   58.261754]  __kasan_kmalloc+0xd4/0xd8
[   58.265486]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.270000]  kasan_atomics+0xb8/0x2e0
[   58.273646]  kunit_try_run_case+0x170/0x3f0
[   58.277813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.283281]  kthread+0x328/0x630
[   58.286493]  ret_from_fork+0x10/0x20
[   58.290052] 
[   58.291527] The buggy address belongs to the object at ffff000800c2e200
[   58.291527]  which belongs to the cache kmalloc-64 of size 64
[   58.303854] The buggy address is located 0 bytes to the right of
[   58.303854]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   58.316701] 
[   58.318177] The buggy address belongs to the physical page:
[   58.323733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   58.331718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.338229] page_type: f5(slab)
[   58.341361] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.349085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.356805] page dumped because: kasan: bad access detected
[   58.362360] 
[   58.363836] Memory state around the buggy address:
[   58.368613]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.375818]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.383023] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.390224]                                      ^
[   58.395002]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.402207]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.409408] ==================================================================
[   62.903663] ==================================================================
[   62.910734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   62.918108] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   62.925486] 
[   62.926965] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   62.927012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.927028] Hardware name: WinLink E850-96 board (DT)
[   62.927046] Call trace:
[   62.927060]  show_stack+0x20/0x38 (C)
[   62.927092]  dump_stack_lvl+0x8c/0xd0
[   62.927128]  print_report+0x118/0x608
[   62.927162]  kasan_report+0xdc/0x128
[   62.927195]  kasan_check_range+0x100/0x1a8
[   62.927231]  __kasan_check_write+0x20/0x30
[   62.927262]  kasan_atomics_helper+0x175c/0x4858
[   62.927296]  kasan_atomics+0x198/0x2e0
[   62.927327]  kunit_try_run_case+0x170/0x3f0
[   62.927360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.927401]  kthread+0x328/0x630
[   62.927427]  ret_from_fork+0x10/0x20
[   62.927459] 
[   62.998141] Allocated by task 309:
[   63.001528]  kasan_save_stack+0x3c/0x68
[   63.005346]  kasan_save_track+0x20/0x40
[   63.009166]  kasan_save_alloc_info+0x40/0x58
[   63.013418]  __kasan_kmalloc+0xd4/0xd8
[   63.017151]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.021665]  kasan_atomics+0xb8/0x2e0
[   63.025311]  kunit_try_run_case+0x170/0x3f0
[   63.029477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.034946]  kthread+0x328/0x630
[   63.038158]  ret_from_fork+0x10/0x20
[   63.041717] 
[   63.043192] The buggy address belongs to the object at ffff000800c2e200
[   63.043192]  which belongs to the cache kmalloc-64 of size 64
[   63.055519] The buggy address is located 0 bytes to the right of
[   63.055519]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   63.068366] 
[   63.069842] The buggy address belongs to the physical page:
[   63.075397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   63.083383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.089893] page_type: f5(slab)
[   63.093026] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.100750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.108469] page dumped because: kasan: bad access detected
[   63.114026] 
[   63.115500] Memory state around the buggy address:
[   63.120278]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.127483]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.134688] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.141889]                                      ^
[   63.146667]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.153872]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.161072] ==================================================================
[   52.089568] ==================================================================
[   52.096659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   52.103947] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   52.111325] 
[   52.112805] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   52.112853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.112868] Hardware name: WinLink E850-96 board (DT)
[   52.112886] Call trace:
[   52.112898]  show_stack+0x20/0x38 (C)
[   52.112930]  dump_stack_lvl+0x8c/0xd0
[   52.112966]  print_report+0x118/0x608
[   52.113000]  kasan_report+0xdc/0x128
[   52.113032]  kasan_check_range+0x100/0x1a8
[   52.113066]  __kasan_check_write+0x20/0x30
[   52.113098]  kasan_atomics_helper+0x934/0x4858
[   52.113130]  kasan_atomics+0x198/0x2e0
[   52.113161]  kunit_try_run_case+0x170/0x3f0
[   52.113193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.113230]  kthread+0x328/0x630
[   52.113257]  ret_from_fork+0x10/0x20
[   52.113287] 
[   52.183894] Allocated by task 309:
[   52.187279]  kasan_save_stack+0x3c/0x68
[   52.191099]  kasan_save_track+0x20/0x40
[   52.194918]  kasan_save_alloc_info+0x40/0x58
[   52.199171]  __kasan_kmalloc+0xd4/0xd8
[   52.202904]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.207418]  kasan_atomics+0xb8/0x2e0
[   52.211064]  kunit_try_run_case+0x170/0x3f0
[   52.215230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.220699]  kthread+0x328/0x630
[   52.223910]  ret_from_fork+0x10/0x20
[   52.227470] 
[   52.228945] The buggy address belongs to the object at ffff000800c2e200
[   52.228945]  which belongs to the cache kmalloc-64 of size 64
[   52.241272] The buggy address is located 0 bytes to the right of
[   52.241272]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   52.254118] 
[   52.255594] The buggy address belongs to the physical page:
[   52.261150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   52.269136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.275646] page_type: f5(slab)
[   52.278779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.286503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.294222] page dumped because: kasan: bad access detected
[   52.299777] 
[   52.301253] Memory state around the buggy address:
[   52.306031]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.313236]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.320440] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.327641]                                      ^
[   52.332419]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.339624]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.346825] ==================================================================
[   57.887256] ==================================================================
[   57.894314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   57.901690] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   57.909070] 
[   57.910548] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   57.910595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.910611] Hardware name: WinLink E850-96 board (DT)
[   57.910630] Call trace:
[   57.910643]  show_stack+0x20/0x38 (C)
[   57.910674]  dump_stack_lvl+0x8c/0xd0
[   57.910709]  print_report+0x118/0x608
[   57.910742]  kasan_report+0xdc/0x128
[   57.910774]  kasan_check_range+0x100/0x1a8
[   57.910810]  __kasan_check_write+0x20/0x30
[   57.910840]  kasan_atomics_helper+0x1058/0x4858
[   57.910874]  kasan_atomics+0x198/0x2e0
[   57.910904]  kunit_try_run_case+0x170/0x3f0
[   57.910940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.910981]  kthread+0x328/0x630
[   57.911008]  ret_from_fork+0x10/0x20
[   57.911040] 
[   57.981723] Allocated by task 309:
[   57.985109]  kasan_save_stack+0x3c/0x68
[   57.988928]  kasan_save_track+0x20/0x40
[   57.992748]  kasan_save_alloc_info+0x40/0x58
[   57.997001]  __kasan_kmalloc+0xd4/0xd8
[   58.000734]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.005247]  kasan_atomics+0xb8/0x2e0
[   58.008893]  kunit_try_run_case+0x170/0x3f0
[   58.013060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.018529]  kthread+0x328/0x630
[   58.021740]  ret_from_fork+0x10/0x20
[   58.025299] 
[   58.026775] The buggy address belongs to the object at ffff000800c2e200
[   58.026775]  which belongs to the cache kmalloc-64 of size 64
[   58.039101] The buggy address is located 0 bytes to the right of
[   58.039101]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   58.051948] 
[   58.053424] The buggy address belongs to the physical page:
[   58.058980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   58.066965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.073475] page_type: f5(slab)
[   58.076608] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.084333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.092051] page dumped because: kasan: bad access detected
[   58.097607] 
[   58.099083] Memory state around the buggy address:
[   58.103860]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.111065]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.118270] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.125471]                                      ^
[   58.130249]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.137454]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.144655] ==================================================================
[   48.917915] ==================================================================
[   48.925003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   48.932293] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   48.939672] 
[   48.941152] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   48.941200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.941217] Hardware name: WinLink E850-96 board (DT)
[   48.941237] Call trace:
[   48.941249]  show_stack+0x20/0x38 (C)
[   48.941281]  dump_stack_lvl+0x8c/0xd0
[   48.941317]  print_report+0x118/0x608
[   48.941355]  kasan_report+0xdc/0x128
[   48.941387]  kasan_check_range+0x100/0x1a8
[   48.941423]  __kasan_check_write+0x20/0x30
[   48.941453]  kasan_atomics_helper+0x414/0x4858
[   48.941488]  kasan_atomics+0x198/0x2e0
[   48.941520]  kunit_try_run_case+0x170/0x3f0
[   48.941554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.941592]  kthread+0x328/0x630
[   48.941617]  ret_from_fork+0x10/0x20
[   48.941651] 
[   49.012240] Allocated by task 309:
[   49.015625]  kasan_save_stack+0x3c/0x68
[   49.019445]  kasan_save_track+0x20/0x40
[   49.023264]  kasan_save_alloc_info+0x40/0x58
[   49.027518]  __kasan_kmalloc+0xd4/0xd8
[   49.031250]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.035764]  kasan_atomics+0xb8/0x2e0
[   49.039411]  kunit_try_run_case+0x170/0x3f0
[   49.043576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.049045]  kthread+0x328/0x630
[   49.052257]  ret_from_fork+0x10/0x20
[   49.055816] 
[   49.057291] The buggy address belongs to the object at ffff000800c2e200
[   49.057291]  which belongs to the cache kmalloc-64 of size 64
[   49.069618] The buggy address is located 0 bytes to the right of
[   49.069618]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   49.082465] 
[   49.083941] The buggy address belongs to the physical page:
[   49.089496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   49.097482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.103992] page_type: f5(slab)
[   49.107125] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.114849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.122568] page dumped because: kasan: bad access detected
[   49.128124] 
[   49.129599] Memory state around the buggy address:
[   49.134377]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.141582]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.148788] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.155988]                                      ^
[   49.160765]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.167970]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.175171] ==================================================================
[   58.946286] ==================================================================
[   58.953327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   58.960702] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   58.968080] 
[   58.969560] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   58.969604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.969619] Hardware name: WinLink E850-96 board (DT)
[   58.969637] Call trace:
[   58.969649]  show_stack+0x20/0x38 (C)
[   58.969687]  dump_stack_lvl+0x8c/0xd0
[   58.969721]  print_report+0x118/0x608
[   58.969758]  kasan_report+0xdc/0x128
[   58.969792]  kasan_check_range+0x100/0x1a8
[   58.969826]  __kasan_check_write+0x20/0x30
[   58.969856]  kasan_atomics_helper+0x11f8/0x4858
[   58.969890]  kasan_atomics+0x198/0x2e0
[   58.969920]  kunit_try_run_case+0x170/0x3f0
[   58.969952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.969992]  kthread+0x328/0x630
[   58.970018]  ret_from_fork+0x10/0x20
[   58.970050] 
[   59.040735] Allocated by task 309:
[   59.044121]  kasan_save_stack+0x3c/0x68
[   59.047940]  kasan_save_track+0x20/0x40
[   59.051759]  kasan_save_alloc_info+0x40/0x58
[   59.056013]  __kasan_kmalloc+0xd4/0xd8
[   59.059745]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.064259]  kasan_atomics+0xb8/0x2e0
[   59.067905]  kunit_try_run_case+0x170/0x3f0
[   59.072071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.077540]  kthread+0x328/0x630
[   59.080752]  ret_from_fork+0x10/0x20
[   59.084311] 
[   59.085787] The buggy address belongs to the object at ffff000800c2e200
[   59.085787]  which belongs to the cache kmalloc-64 of size 64
[   59.098113] The buggy address is located 0 bytes to the right of
[   59.098113]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   59.110959] 
[   59.112436] The buggy address belongs to the physical page:
[   59.117992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   59.125977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.132487] page_type: f5(slab)
[   59.135620] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.143345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.151064] page dumped because: kasan: bad access detected
[   59.156620] 
[   59.158095] Memory state around the buggy address:
[   59.162872]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.170077]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.177284] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.184483]                                      ^
[   59.189261]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.196466]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.203667] ==================================================================
[   60.796057] ==================================================================
[   60.803126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   60.810501] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   60.817879] 
[   60.819358] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   60.819404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.819422] Hardware name: WinLink E850-96 board (DT)
[   60.819438] Call trace:
[   60.819452]  show_stack+0x20/0x38 (C)
[   60.819482]  dump_stack_lvl+0x8c/0xd0
[   60.819517]  print_report+0x118/0x608
[   60.819553]  kasan_report+0xdc/0x128
[   60.819586]  kasan_check_range+0x100/0x1a8
[   60.819619]  __kasan_check_write+0x20/0x30
[   60.819648]  kasan_atomics_helper+0x14e4/0x4858
[   60.819681]  kasan_atomics+0x198/0x2e0
[   60.819713]  kunit_try_run_case+0x170/0x3f0
[   60.819747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.819787]  kthread+0x328/0x630
[   60.819813]  ret_from_fork+0x10/0x20
[   60.819846] 
[   60.890534] Allocated by task 309:
[   60.893921]  kasan_save_stack+0x3c/0x68
[   60.897739]  kasan_save_track+0x20/0x40
[   60.901558]  kasan_save_alloc_info+0x40/0x58
[   60.905812]  __kasan_kmalloc+0xd4/0xd8
[   60.909544]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.914058]  kasan_atomics+0xb8/0x2e0
[   60.917704]  kunit_try_run_case+0x170/0x3f0
[   60.921870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.927339]  kthread+0x328/0x630
[   60.930551]  ret_from_fork+0x10/0x20
[   60.934109] 
[   60.935585] The buggy address belongs to the object at ffff000800c2e200
[   60.935585]  which belongs to the cache kmalloc-64 of size 64
[   60.947911] The buggy address is located 0 bytes to the right of
[   60.947911]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   60.960758] 
[   60.962236] The buggy address belongs to the physical page:
[   60.967790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   60.975776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.982286] page_type: f5(slab)
[   60.985419] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.993143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.000862] page dumped because: kasan: bad access detected
[   61.006419] 
[   61.007893] Memory state around the buggy address:
[   61.012671]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.019875]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.027080] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.034282]                                      ^
[   61.039059]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.046264]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.053465] ==================================================================
[   61.060946] ==================================================================
[   61.067878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   61.075253] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   61.082632] 
[   61.084113] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   61.084162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.084179] Hardware name: WinLink E850-96 board (DT)
[   61.084198] Call trace:
[   61.084210]  show_stack+0x20/0x38 (C)
[   61.084240]  dump_stack_lvl+0x8c/0xd0
[   61.084275]  print_report+0x118/0x608
[   61.084307]  kasan_report+0xdc/0x128
[   61.084339]  kasan_check_range+0x100/0x1a8
[   61.084374]  __kasan_check_write+0x20/0x30
[   61.084403]  kasan_atomics_helper+0x154c/0x4858
[   61.084438]  kasan_atomics+0x198/0x2e0
[   61.084470]  kunit_try_run_case+0x170/0x3f0
[   61.084502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.084544]  kthread+0x328/0x630
[   61.084571]  ret_from_fork+0x10/0x20
[   61.084602] 
[   61.155287] Allocated by task 309:
[   61.158675]  kasan_save_stack+0x3c/0x68
[   61.162492]  kasan_save_track+0x20/0x40
[   61.166311]  kasan_save_alloc_info+0x40/0x58
[   61.170564]  __kasan_kmalloc+0xd4/0xd8
[   61.174297]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.178811]  kasan_atomics+0xb8/0x2e0
[   61.182457]  kunit_try_run_case+0x170/0x3f0
[   61.186623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.192092]  kthread+0x328/0x630
[   61.195304]  ret_from_fork+0x10/0x20
[   61.198863] 
[   61.200340] The buggy address belongs to the object at ffff000800c2e200
[   61.200340]  which belongs to the cache kmalloc-64 of size 64
[   61.212665] The buggy address is located 0 bytes to the right of
[   61.212665]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   61.225511] 
[   61.226989] The buggy address belongs to the physical page:
[   61.232544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   61.240529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.247039] page_type: f5(slab)
[   61.250172] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.257896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.265615] page dumped because: kasan: bad access detected
[   61.271172] 
[   61.272646] Memory state around the buggy address:
[   61.277424]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.284629]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.291834] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.299034]                                      ^
[   61.303813]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.311017]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.318219] ==================================================================
[   54.464222] ==================================================================
[   54.471276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   54.478651] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   54.485943] 
[   54.487422] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   54.487470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.487488] Hardware name: WinLink E850-96 board (DT)
[   54.487506] Call trace:
[   54.487516]  show_stack+0x20/0x38 (C)
[   54.487549]  dump_stack_lvl+0x8c/0xd0
[   54.487583]  print_report+0x118/0x608
[   54.487617]  kasan_report+0xdc/0x128
[   54.487650]  __asan_report_load4_noabort+0x20/0x30
[   54.487681]  kasan_atomics_helper+0x3de4/0x4858
[   54.487714]  kasan_atomics+0x198/0x2e0
[   54.487747]  kunit_try_run_case+0x170/0x3f0
[   54.487779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.487819]  kthread+0x328/0x630
[   54.487845]  ret_from_fork+0x10/0x20
[   54.487877] 
[   54.555212] Allocated by task 309:
[   54.558598]  kasan_save_stack+0x3c/0x68
[   54.562417]  kasan_save_track+0x20/0x40
[   54.566237]  kasan_save_alloc_info+0x40/0x58
[   54.570490]  __kasan_kmalloc+0xd4/0xd8
[   54.574223]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.578736]  kasan_atomics+0xb8/0x2e0
[   54.582382]  kunit_try_run_case+0x170/0x3f0
[   54.586549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.592017]  kthread+0x328/0x630
[   54.595229]  ret_from_fork+0x10/0x20
[   54.598788] 
[   54.600263] The buggy address belongs to the object at ffff000800c2e200
[   54.600263]  which belongs to the cache kmalloc-64 of size 64
[   54.612590] The buggy address is located 0 bytes to the right of
[   54.612590]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   54.625437] 
[   54.626913] The buggy address belongs to the physical page:
[   54.632469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   54.640454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.646964] page_type: f5(slab)
[   54.650097] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.657822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.665540] page dumped because: kasan: bad access detected
[   54.671096] 
[   54.672571] Memory state around the buggy address:
[   54.677349]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.684554]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.691759] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.698960]                                      ^
[   54.703738]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.710943]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.718144] ==================================================================
[   49.976240] ==================================================================
[   49.983321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   49.990611] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   49.997989] 
[   49.999469] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   49.999517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.999535] Hardware name: WinLink E850-96 board (DT)
[   49.999551] Call trace:
[   49.999563]  show_stack+0x20/0x38 (C)
[   49.999596]  dump_stack_lvl+0x8c/0xd0
[   49.999632]  print_report+0x118/0x608
[   49.999666]  kasan_report+0xdc/0x128
[   49.999701]  kasan_check_range+0x100/0x1a8
[   49.999736]  __kasan_check_write+0x20/0x30
[   49.999766]  kasan_atomics_helper+0x5b4/0x4858
[   49.999800]  kasan_atomics+0x198/0x2e0
[   49.999831]  kunit_try_run_case+0x170/0x3f0
[   49.999865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.999904]  kthread+0x328/0x630
[   49.999930]  ret_from_fork+0x10/0x20
[   49.999963] 
[   50.070557] Allocated by task 309:
[   50.073943]  kasan_save_stack+0x3c/0x68
[   50.077762]  kasan_save_track+0x20/0x40
[   50.081581]  kasan_save_alloc_info+0x40/0x58
[   50.085835]  __kasan_kmalloc+0xd4/0xd8
[   50.089567]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.094081]  kasan_atomics+0xb8/0x2e0
[   50.097727]  kunit_try_run_case+0x170/0x3f0
[   50.101894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.107362]  kthread+0x328/0x630
[   50.110574]  ret_from_fork+0x10/0x20
[   50.114133] 
[   50.115609] The buggy address belongs to the object at ffff000800c2e200
[   50.115609]  which belongs to the cache kmalloc-64 of size 64
[   50.127936] The buggy address is located 0 bytes to the right of
[   50.127936]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   50.140782] 
[   50.142258] The buggy address belongs to the physical page:
[   50.147814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   50.155800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.162310] page_type: f5(slab)
[   50.165442] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.173167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.180886] page dumped because: kasan: bad access detected
[   50.186441] 
[   50.187917] Memory state around the buggy address:
[   50.192695]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.199899]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.207104] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.214305]                                      ^
[   50.219083]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.226288]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.233489] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   46.265200] ==================================================================
[   46.272267] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.281205] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   46.288496] 
[   46.289977] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   46.290025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.290040] Hardware name: WinLink E850-96 board (DT)
[   46.290058] Call trace:
[   46.290072]  show_stack+0x20/0x38 (C)
[   46.290105]  dump_stack_lvl+0x8c/0xd0
[   46.290141]  print_report+0x118/0x608
[   46.290177]  kasan_report+0xdc/0x128
[   46.290210]  __asan_report_load8_noabort+0x20/0x30
[   46.290244]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.290281]  kasan_bitops_generic+0x11c/0x1c8
[   46.290315]  kunit_try_run_case+0x170/0x3f0
[   46.290350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.290390]  kthread+0x328/0x630
[   46.290417]  ret_from_fork+0x10/0x20
[   46.290447] 
[   46.359936] Allocated by task 305:
[   46.363322]  kasan_save_stack+0x3c/0x68
[   46.367141]  kasan_save_track+0x20/0x40
[   46.370960]  kasan_save_alloc_info+0x40/0x58
[   46.375214]  __kasan_kmalloc+0xd4/0xd8
[   46.378946]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.383460]  kasan_bitops_generic+0xa0/0x1c8
[   46.387713]  kunit_try_run_case+0x170/0x3f0
[   46.391880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.397349]  kthread+0x328/0x630
[   46.400561]  ret_from_fork+0x10/0x20
[   46.404120] 
[   46.405595] The buggy address belongs to the object at ffff00080444cc20
[   46.405595]  which belongs to the cache kmalloc-16 of size 16
[   46.417922] The buggy address is located 8 bytes inside of
[   46.417922]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   46.430161] 
[   46.431636] The buggy address belongs to the physical page:
[   46.437192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   46.445178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.451688] page_type: f5(slab)
[   46.454821] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.462546] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.470264] page dumped because: kasan: bad access detected
[   46.475819] 
[   46.477295] Memory state around the buggy address:
[   46.482073]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.489278]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   46.496483] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.503684]                                   ^
[   46.508201]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.515406]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.522607] ==================================================================
[   44.934513] ==================================================================
[   44.941557] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.950496] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   44.957787] 
[   44.959269] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   44.959317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.959334] Hardware name: WinLink E850-96 board (DT)
[   44.959352] Call trace:
[   44.959364]  show_stack+0x20/0x38 (C)
[   44.959399]  dump_stack_lvl+0x8c/0xd0
[   44.959435]  print_report+0x118/0x608
[   44.959469]  kasan_report+0xdc/0x128
[   44.959502]  __asan_report_load8_noabort+0x20/0x30
[   44.959533]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.959572]  kasan_bitops_generic+0x11c/0x1c8
[   44.959604]  kunit_try_run_case+0x170/0x3f0
[   44.959638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.959680]  kthread+0x328/0x630
[   44.959706]  ret_from_fork+0x10/0x20
[   44.959738] 
[   45.029227] Allocated by task 305:
[   45.032613]  kasan_save_stack+0x3c/0x68
[   45.036432]  kasan_save_track+0x20/0x40
[   45.040251]  kasan_save_alloc_info+0x40/0x58
[   45.044505]  __kasan_kmalloc+0xd4/0xd8
[   45.048237]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.052751]  kasan_bitops_generic+0xa0/0x1c8
[   45.057004]  kunit_try_run_case+0x170/0x3f0
[   45.061171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.066639]  kthread+0x328/0x630
[   45.069851]  ret_from_fork+0x10/0x20
[   45.073410] 
[   45.074886] The buggy address belongs to the object at ffff00080444cc20
[   45.074886]  which belongs to the cache kmalloc-16 of size 16
[   45.087213] The buggy address is located 8 bytes inside of
[   45.087213]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   45.099451] 
[   45.100927] The buggy address belongs to the physical page:
[   45.106483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   45.114469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.120979] page_type: f5(slab)
[   45.124112] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.131836] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.139555] page dumped because: kasan: bad access detected
[   45.145112] 
[   45.146586] Memory state around the buggy address:
[   45.151364]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.158569]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   45.165774] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.172975]                                   ^
[   45.177492]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.184697]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.191898] ==================================================================
[   44.666269] ==================================================================
[   44.673332] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.682270] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   44.689648] 
[   44.691129] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   44.691177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.691193] Hardware name: WinLink E850-96 board (DT)
[   44.691212] Call trace:
[   44.691224]  show_stack+0x20/0x38 (C)
[   44.691259]  dump_stack_lvl+0x8c/0xd0
[   44.691293]  print_report+0x118/0x608
[   44.691326]  kasan_report+0xdc/0x128
[   44.691356]  kasan_check_range+0x100/0x1a8
[   44.691391]  __kasan_check_write+0x20/0x30
[   44.691418]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.691456]  kasan_bitops_generic+0x11c/0x1c8
[   44.691487]  kunit_try_run_case+0x170/0x3f0
[   44.691523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.691563]  kthread+0x328/0x630
[   44.691588]  ret_from_fork+0x10/0x20
[   44.691618] 
[   44.764474] Allocated by task 305:
[   44.767859]  kasan_save_stack+0x3c/0x68
[   44.771678]  kasan_save_track+0x20/0x40
[   44.775498]  kasan_save_alloc_info+0x40/0x58
[   44.779751]  __kasan_kmalloc+0xd4/0xd8
[   44.783484]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.787998]  kasan_bitops_generic+0xa0/0x1c8
[   44.792251]  kunit_try_run_case+0x170/0x3f0
[   44.796419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.801886]  kthread+0x328/0x630
[   44.805098]  ret_from_fork+0x10/0x20
[   44.808657] 
[   44.810132] The buggy address belongs to the object at ffff00080444cc20
[   44.810132]  which belongs to the cache kmalloc-16 of size 16
[   44.822459] The buggy address is located 8 bytes inside of
[   44.822459]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   44.834698] 
[   44.836174] The buggy address belongs to the physical page:
[   44.841730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   44.849716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.856226] page_type: f5(slab)
[   44.859359] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.867083] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.874802] page dumped because: kasan: bad access detected
[   44.880359] 
[   44.881833] Memory state around the buggy address:
[   44.886611]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.893816]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   44.901021] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.908222]                                   ^
[   44.912739]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.919944]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.927145] ==================================================================
[   45.199214] ==================================================================
[   45.206311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.215249] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   45.222627] 
[   45.224108] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   45.224155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.224171] Hardware name: WinLink E850-96 board (DT)
[   45.224190] Call trace:
[   45.224203]  show_stack+0x20/0x38 (C)
[   45.224237]  dump_stack_lvl+0x8c/0xd0
[   45.224272]  print_report+0x118/0x608
[   45.224307]  kasan_report+0xdc/0x128
[   45.224339]  kasan_check_range+0x100/0x1a8
[   45.224374]  __kasan_check_write+0x20/0x30
[   45.224404]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.224443]  kasan_bitops_generic+0x11c/0x1c8
[   45.224476]  kunit_try_run_case+0x170/0x3f0
[   45.224512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.224551]  kthread+0x328/0x630
[   45.224578]  ret_from_fork+0x10/0x20
[   45.224609] 
[   45.297452] Allocated by task 305:
[   45.300838]  kasan_save_stack+0x3c/0x68
[   45.304657]  kasan_save_track+0x20/0x40
[   45.308476]  kasan_save_alloc_info+0x40/0x58
[   45.312729]  __kasan_kmalloc+0xd4/0xd8
[   45.316462]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.320977]  kasan_bitops_generic+0xa0/0x1c8
[   45.325229]  kunit_try_run_case+0x170/0x3f0
[   45.329396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.334865]  kthread+0x328/0x630
[   45.338077]  ret_from_fork+0x10/0x20
[   45.341636] 
[   45.343111] The buggy address belongs to the object at ffff00080444cc20
[   45.343111]  which belongs to the cache kmalloc-16 of size 16
[   45.355438] The buggy address is located 8 bytes inside of
[   45.355438]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   45.367677] 
[   45.369153] The buggy address belongs to the physical page:
[   45.374708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   45.382694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.389204] page_type: f5(slab)
[   45.392337] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.400061] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.407780] page dumped because: kasan: bad access detected
[   45.413337] 
[   45.414811] Memory state around the buggy address:
[   45.419589]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.426794]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   45.433999] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.441200]                                   ^
[   45.445717]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.452922]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.460123] ==================================================================
[   44.133479] ==================================================================
[   44.140528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.149379] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   44.156757] 
[   44.158239] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   44.158287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.158304] Hardware name: WinLink E850-96 board (DT)
[   44.158324] Call trace:
[   44.158336]  show_stack+0x20/0x38 (C)
[   44.158371]  dump_stack_lvl+0x8c/0xd0
[   44.158404]  print_report+0x118/0x608
[   44.158438]  kasan_report+0xdc/0x128
[   44.158470]  kasan_check_range+0x100/0x1a8
[   44.158506]  __kasan_check_write+0x20/0x30
[   44.158536]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.158572]  kasan_bitops_generic+0x11c/0x1c8
[   44.158605]  kunit_try_run_case+0x170/0x3f0
[   44.158640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.158678]  kthread+0x328/0x630
[   44.158707]  ret_from_fork+0x10/0x20
[   44.158738] 
[   44.231496] Allocated by task 305:
[   44.234881]  kasan_save_stack+0x3c/0x68
[   44.238701]  kasan_save_track+0x20/0x40
[   44.242520]  kasan_save_alloc_info+0x40/0x58
[   44.246773]  __kasan_kmalloc+0xd4/0xd8
[   44.250506]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.255020]  kasan_bitops_generic+0xa0/0x1c8
[   44.259273]  kunit_try_run_case+0x170/0x3f0
[   44.263440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.268908]  kthread+0x328/0x630
[   44.272120]  ret_from_fork+0x10/0x20
[   44.275679] 
[   44.277155] The buggy address belongs to the object at ffff00080444cc20
[   44.277155]  which belongs to the cache kmalloc-16 of size 16
[   44.289481] The buggy address is located 8 bytes inside of
[   44.289481]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   44.301721] 
[   44.303198] The buggy address belongs to the physical page:
[   44.308752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   44.316738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.323248] page_type: f5(slab)
[   44.326380] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.334105] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.341824] page dumped because: kasan: bad access detected
[   44.347381] 
[   44.348855] Memory state around the buggy address:
[   44.353633]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.360838]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   44.368043] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.375244]                                   ^
[   44.379761]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.386966]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.394167] ==================================================================
[   45.732222] ==================================================================
[   45.739289] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.748227] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   45.755604] 
[   45.757086] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   45.757134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.757149] Hardware name: WinLink E850-96 board (DT)
[   45.757168] Call trace:
[   45.757180]  show_stack+0x20/0x38 (C)
[   45.757217]  dump_stack_lvl+0x8c/0xd0
[   45.757250]  print_report+0x118/0x608
[   45.757285]  kasan_report+0xdc/0x128
[   45.757317]  kasan_check_range+0x100/0x1a8
[   45.757351]  __kasan_check_write+0x20/0x30
[   45.757381]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.757418]  kasan_bitops_generic+0x11c/0x1c8
[   45.757450]  kunit_try_run_case+0x170/0x3f0
[   45.757485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.757523]  kthread+0x328/0x630
[   45.757551]  ret_from_fork+0x10/0x20
[   45.757583] 
[   45.830430] Allocated by task 305:
[   45.833816]  kasan_save_stack+0x3c/0x68
[   45.837635]  kasan_save_track+0x20/0x40
[   45.841454]  kasan_save_alloc_info+0x40/0x58
[   45.845707]  __kasan_kmalloc+0xd4/0xd8
[   45.849440]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.853954]  kasan_bitops_generic+0xa0/0x1c8
[   45.858208]  kunit_try_run_case+0x170/0x3f0
[   45.862374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.867843]  kthread+0x328/0x630
[   45.871055]  ret_from_fork+0x10/0x20
[   45.874613] 
[   45.876089] The buggy address belongs to the object at ffff00080444cc20
[   45.876089]  which belongs to the cache kmalloc-16 of size 16
[   45.888416] The buggy address is located 8 bytes inside of
[   45.888416]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   45.900655] 
[   45.902131] The buggy address belongs to the physical page:
[   45.907687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   45.915672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.922182] page_type: f5(slab)
[   45.925315] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.933040] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.940758] page dumped because: kasan: bad access detected
[   45.946314] 
[   45.947789] Memory state around the buggy address:
[   45.952567]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.959772]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   45.966977] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.974178]                                   ^
[   45.978695]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.985900]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.993101] ==================================================================
[   45.467467] ==================================================================
[   45.474534] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.483474] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   45.490765] 
[   45.492246] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   45.492293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.492310] Hardware name: WinLink E850-96 board (DT)
[   45.492329] Call trace:
[   45.492340]  show_stack+0x20/0x38 (C)
[   45.492374]  dump_stack_lvl+0x8c/0xd0
[   45.492409]  print_report+0x118/0x608
[   45.492442]  kasan_report+0xdc/0x128
[   45.492476]  __asan_report_load8_noabort+0x20/0x30
[   45.492506]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.492543]  kasan_bitops_generic+0x11c/0x1c8
[   45.492577]  kunit_try_run_case+0x170/0x3f0
[   45.492609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.492647]  kthread+0x328/0x630
[   45.492674]  ret_from_fork+0x10/0x20
[   45.492705] 
[   45.562205] Allocated by task 305:
[   45.565591]  kasan_save_stack+0x3c/0x68
[   45.569410]  kasan_save_track+0x20/0x40
[   45.573229]  kasan_save_alloc_info+0x40/0x58
[   45.577482]  __kasan_kmalloc+0xd4/0xd8
[   45.581215]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.585729]  kasan_bitops_generic+0xa0/0x1c8
[   45.589983]  kunit_try_run_case+0x170/0x3f0
[   45.594149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.599618]  kthread+0x328/0x630
[   45.602829]  ret_from_fork+0x10/0x20
[   45.606388] 
[   45.607865] The buggy address belongs to the object at ffff00080444cc20
[   45.607865]  which belongs to the cache kmalloc-16 of size 16
[   45.620190] The buggy address is located 8 bytes inside of
[   45.620190]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   45.632430] 
[   45.633906] The buggy address belongs to the physical page:
[   45.639461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   45.647447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.653957] page_type: f5(slab)
[   45.657091] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.664814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.672533] page dumped because: kasan: bad access detected
[   45.678090] 
[   45.679564] Memory state around the buggy address:
[   45.684342]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.691547]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   45.698752] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.705953]                                   ^
[   45.710470]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.717675]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.724876] ==================================================================
[   44.401545] ==================================================================
[   44.408579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.417518] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   44.424809] 
[   44.426291] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   44.426339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.426354] Hardware name: WinLink E850-96 board (DT)
[   44.426375] Call trace:
[   44.426387]  show_stack+0x20/0x38 (C)
[   44.426417]  dump_stack_lvl+0x8c/0xd0
[   44.426454]  print_report+0x118/0x608
[   44.426486]  kasan_report+0xdc/0x128
[   44.426519]  __asan_report_load8_noabort+0x20/0x30
[   44.426550]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.426590]  kasan_bitops_generic+0x11c/0x1c8
[   44.426622]  kunit_try_run_case+0x170/0x3f0
[   44.426658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.426696]  kthread+0x328/0x630
[   44.426724]  ret_from_fork+0x10/0x20
[   44.426754] 
[   44.496249] Allocated by task 305:
[   44.499634]  kasan_save_stack+0x3c/0x68
[   44.503454]  kasan_save_track+0x20/0x40
[   44.507273]  kasan_save_alloc_info+0x40/0x58
[   44.511526]  __kasan_kmalloc+0xd4/0xd8
[   44.515259]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.519773]  kasan_bitops_generic+0xa0/0x1c8
[   44.524026]  kunit_try_run_case+0x170/0x3f0
[   44.528193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.533661]  kthread+0x328/0x630
[   44.536873]  ret_from_fork+0x10/0x20
[   44.540432] 
[   44.541909] The buggy address belongs to the object at ffff00080444cc20
[   44.541909]  which belongs to the cache kmalloc-16 of size 16
[   44.554235] The buggy address is located 8 bytes inside of
[   44.554235]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   44.566473] 
[   44.567949] The buggy address belongs to the physical page:
[   44.573505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   44.581491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.588001] page_type: f5(slab)
[   44.591134] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.598858] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.606577] page dumped because: kasan: bad access detected
[   44.612134] 
[   44.613608] Memory state around the buggy address:
[   44.618388]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.625590]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   44.632795] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.639997]                                   ^
[   44.644514]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.651719]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.658920] ==================================================================
[   46.000472] ==================================================================
[   46.007514] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   46.016452] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   46.023743] 
[   46.025224] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   46.025272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.025288] Hardware name: WinLink E850-96 board (DT)
[   46.025308] Call trace:
[   46.025321]  show_stack+0x20/0x38 (C)
[   46.025355]  dump_stack_lvl+0x8c/0xd0
[   46.025387]  print_report+0x118/0x608
[   46.025422]  kasan_report+0xdc/0x128
[   46.025455]  __asan_report_load8_noabort+0x20/0x30
[   46.025486]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   46.025523]  kasan_bitops_generic+0x11c/0x1c8
[   46.025558]  kunit_try_run_case+0x170/0x3f0
[   46.025592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.025630]  kthread+0x328/0x630
[   46.025656]  ret_from_fork+0x10/0x20
[   46.025687] 
[   46.095183] Allocated by task 305:
[   46.098569]  kasan_save_stack+0x3c/0x68
[   46.102388]  kasan_save_track+0x20/0x40
[   46.106207]  kasan_save_alloc_info+0x40/0x58
[   46.110461]  __kasan_kmalloc+0xd4/0xd8
[   46.114193]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.118707]  kasan_bitops_generic+0xa0/0x1c8
[   46.122960]  kunit_try_run_case+0x170/0x3f0
[   46.127127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.132596]  kthread+0x328/0x630
[   46.135807]  ret_from_fork+0x10/0x20
[   46.139366] 
[   46.140844] The buggy address belongs to the object at ffff00080444cc20
[   46.140844]  which belongs to the cache kmalloc-16 of size 16
[   46.153169] The buggy address is located 8 bytes inside of
[   46.153169]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   46.165407] 
[   46.166884] The buggy address belongs to the physical page:
[   46.172439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   46.180425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.186935] page_type: f5(slab)
[   46.190068] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.197792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.205511] page dumped because: kasan: bad access detected
[   46.211067] 
[   46.212542] Memory state around the buggy address:
[   46.217321]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.224525]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   46.231730] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.238931]                                   ^
[   46.243448]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.250653]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.257854] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   42.277191] ==================================================================
[   42.284306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.292463] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   42.299754] 
[   42.301236] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   42.301289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.301308] Hardware name: WinLink E850-96 board (DT)
[   42.301328] Call trace:
[   42.301340]  show_stack+0x20/0x38 (C)
[   42.301376]  dump_stack_lvl+0x8c/0xd0
[   42.301413]  print_report+0x118/0x608
[   42.301448]  kasan_report+0xdc/0x128
[   42.301479]  __asan_report_load8_noabort+0x20/0x30
[   42.301512]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.301547]  kasan_bitops_generic+0x110/0x1c8
[   42.301581]  kunit_try_run_case+0x170/0x3f0
[   42.301614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.301653]  kthread+0x328/0x630
[   42.301683]  ret_from_fork+0x10/0x20
[   42.301715] 
[   42.370412] Allocated by task 305:
[   42.373798]  kasan_save_stack+0x3c/0x68
[   42.377617]  kasan_save_track+0x20/0x40
[   42.381437]  kasan_save_alloc_info+0x40/0x58
[   42.385690]  __kasan_kmalloc+0xd4/0xd8
[   42.389423]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.393937]  kasan_bitops_generic+0xa0/0x1c8
[   42.398190]  kunit_try_run_case+0x170/0x3f0
[   42.402356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.407825]  kthread+0x328/0x630
[   42.411037]  ret_from_fork+0x10/0x20
[   42.414596] 
[   42.416071] The buggy address belongs to the object at ffff00080444cc20
[   42.416071]  which belongs to the cache kmalloc-16 of size 16
[   42.428398] The buggy address is located 8 bytes inside of
[   42.428398]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   42.440638] 
[   42.442113] The buggy address belongs to the physical page:
[   42.447669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   42.455657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.462165] page_type: f5(slab)
[   42.465299] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.473022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.480741] page dumped because: kasan: bad access detected
[   42.486296] 
[   42.487772] Memory state around the buggy address:
[   42.492550]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.499754]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   42.506959] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.514160]                                   ^
[   42.518678]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.525883]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.533084] ==================================================================
[   42.807042] ==================================================================
[   42.814158] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.822316] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   42.829694] 
[   42.831177] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   42.831228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.831246] Hardware name: WinLink E850-96 board (DT)
[   42.831264] Call trace:
[   42.831276]  show_stack+0x20/0x38 (C)
[   42.831313]  dump_stack_lvl+0x8c/0xd0
[   42.831349]  print_report+0x118/0x608
[   42.831384]  kasan_report+0xdc/0x128
[   42.831415]  kasan_check_range+0x100/0x1a8
[   42.831452]  __kasan_check_write+0x20/0x30
[   42.831483]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.831518]  kasan_bitops_generic+0x110/0x1c8
[   42.831550]  kunit_try_run_case+0x170/0x3f0
[   42.831583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.831622]  kthread+0x328/0x630
[   42.831647]  ret_from_fork+0x10/0x20
[   42.831677] 
[   42.903738] Allocated by task 305:
[   42.907124]  kasan_save_stack+0x3c/0x68
[   42.910943]  kasan_save_track+0x20/0x40
[   42.914762]  kasan_save_alloc_info+0x40/0x58
[   42.919015]  __kasan_kmalloc+0xd4/0xd8
[   42.922748]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.927262]  kasan_bitops_generic+0xa0/0x1c8
[   42.931515]  kunit_try_run_case+0x170/0x3f0
[   42.935682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.941150]  kthread+0x328/0x630
[   42.944362]  ret_from_fork+0x10/0x20
[   42.947921] 
[   42.949397] The buggy address belongs to the object at ffff00080444cc20
[   42.949397]  which belongs to the cache kmalloc-16 of size 16
[   42.961725] The buggy address is located 8 bytes inside of
[   42.961725]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   42.973963] 
[   42.975439] The buggy address belongs to the physical page:
[   42.980994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   42.988981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.995490] page_type: f5(slab)
[   42.998624] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.006347] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.014066] page dumped because: kasan: bad access detected
[   43.019623] 
[   43.021097] Memory state around the buggy address:
[   43.025875]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.033080]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   43.040285] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.047486]                                   ^
[   43.052003]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.059208]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.066409] ==================================================================
[   41.478615] ==================================================================
[   41.487792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.495948] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   41.503325] 
[   41.504811] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   41.504865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.504884] Hardware name: WinLink E850-96 board (DT)
[   41.504903] Call trace:
[   41.504918]  show_stack+0x20/0x38 (C)
[   41.504956]  dump_stack_lvl+0x8c/0xd0
[   41.504996]  print_report+0x118/0x608
[   41.505036]  kasan_report+0xdc/0x128
[   41.505068]  kasan_check_range+0x100/0x1a8
[   41.505109]  __kasan_check_write+0x20/0x30
[   41.505138]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.505174]  kasan_bitops_generic+0x110/0x1c8
[   41.505208]  kunit_try_run_case+0x170/0x3f0
[   41.505247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.505287]  kthread+0x328/0x630
[   41.505315]  ret_from_fork+0x10/0x20
[   41.505354] 
[   41.577369] Allocated by task 305:
[   41.580758]  kasan_save_stack+0x3c/0x68
[   41.584574]  kasan_save_track+0x20/0x40
[   41.588393]  kasan_save_alloc_info+0x40/0x58
[   41.592647]  __kasan_kmalloc+0xd4/0xd8
[   41.596379]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.600893]  kasan_bitops_generic+0xa0/0x1c8
[   41.605146]  kunit_try_run_case+0x170/0x3f0
[   41.609313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.614782]  kthread+0x328/0x630
[   41.617993]  ret_from_fork+0x10/0x20
[   41.621552] 
[   41.623030] The buggy address belongs to the object at ffff00080444cc20
[   41.623030]  which belongs to the cache kmalloc-16 of size 16
[   41.635357] The buggy address is located 8 bytes inside of
[   41.635357]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   41.647593] 
[   41.649074] The buggy address belongs to the physical page:
[   41.654629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   41.662615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.669123] page_type: f5(slab)
[   41.672260] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.679978] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.687699] page dumped because: kasan: bad access detected
[   41.693254] 
[   41.694728] Memory state around the buggy address:
[   41.699511]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   41.706711]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   41.713917] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.721117]                                   ^
[   41.725634]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.732839]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.740040] ==================================================================
[   42.540388] ==================================================================
[   42.547496] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.555653] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   42.563031] 
[   42.564513] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   42.564565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.564582] Hardware name: WinLink E850-96 board (DT)
[   42.564602] Call trace:
[   42.564614]  show_stack+0x20/0x38 (C)
[   42.564648]  dump_stack_lvl+0x8c/0xd0
[   42.564685]  print_report+0x118/0x608
[   42.564720]  kasan_report+0xdc/0x128
[   42.564752]  kasan_check_range+0x100/0x1a8
[   42.564786]  __kasan_check_write+0x20/0x30
[   42.564817]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.564853]  kasan_bitops_generic+0x110/0x1c8
[   42.564884]  kunit_try_run_case+0x170/0x3f0
[   42.564919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.564957]  kthread+0x328/0x630
[   42.564982]  ret_from_fork+0x10/0x20
[   42.565015] 
[   42.637075] Allocated by task 305:
[   42.640460]  kasan_save_stack+0x3c/0x68
[   42.644280]  kasan_save_track+0x20/0x40
[   42.648100]  kasan_save_alloc_info+0x40/0x58
[   42.652353]  __kasan_kmalloc+0xd4/0xd8
[   42.656086]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.660599]  kasan_bitops_generic+0xa0/0x1c8
[   42.664853]  kunit_try_run_case+0x170/0x3f0
[   42.669019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.674488]  kthread+0x328/0x630
[   42.677700]  ret_from_fork+0x10/0x20
[   42.681259] 
[   42.682734] The buggy address belongs to the object at ffff00080444cc20
[   42.682734]  which belongs to the cache kmalloc-16 of size 16
[   42.695061] The buggy address is located 8 bytes inside of
[   42.695061]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   42.707300] 
[   42.708775] The buggy address belongs to the physical page:
[   42.714332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   42.722319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.728827] page_type: f5(slab)
[   42.731962] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.739685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.747403] page dumped because: kasan: bad access detected
[   42.752960] 
[   42.754434] Memory state around the buggy address:
[   42.759213]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.766417]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   42.773622] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.780823]                                   ^
[   42.785341]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.792546]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.799746] ==================================================================
[   41.747347] ==================================================================
[   41.754454] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.762609] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   41.769901] 
[   41.771387] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   41.771444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.771463] Hardware name: WinLink E850-96 board (DT)
[   41.771483] Call trace:
[   41.771497]  show_stack+0x20/0x38 (C)
[   41.771530]  dump_stack_lvl+0x8c/0xd0
[   41.771568]  print_report+0x118/0x608
[   41.771605]  kasan_report+0xdc/0x128
[   41.771638]  __asan_report_load8_noabort+0x20/0x30
[   41.771671]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.771710]  kasan_bitops_generic+0x110/0x1c8
[   41.771744]  kunit_try_run_case+0x170/0x3f0
[   41.771780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.771822]  kthread+0x328/0x630
[   41.771848]  ret_from_fork+0x10/0x20
[   41.771883] 
[   41.840559] Allocated by task 305:
[   41.843947]  kasan_save_stack+0x3c/0x68
[   41.847764]  kasan_save_track+0x20/0x40
[   41.851584]  kasan_save_alloc_info+0x40/0x58
[   41.855837]  __kasan_kmalloc+0xd4/0xd8
[   41.859570]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.864083]  kasan_bitops_generic+0xa0/0x1c8
[   41.868337]  kunit_try_run_case+0x170/0x3f0
[   41.872503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.877972]  kthread+0x328/0x630
[   41.881184]  ret_from_fork+0x10/0x20
[   41.884743] 
[   41.886218] The buggy address belongs to the object at ffff00080444cc20
[   41.886218]  which belongs to the cache kmalloc-16 of size 16
[   41.898548] The buggy address is located 8 bytes inside of
[   41.898548]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   41.910784] 
[   41.912260] The buggy address belongs to the physical page:
[   41.917816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   41.925803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.932313] page_type: f5(slab)
[   41.935446] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.943169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.950887] page dumped because: kasan: bad access detected
[   41.956444] 
[   41.957918] Memory state around the buggy address:
[   41.962696]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   41.969902]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   41.977108] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.984307]                                   ^
[   41.988825]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.996030]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.003231] ==================================================================
[   42.010615] ==================================================================
[   42.017645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   42.025800] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   42.033178] 
[   42.034660] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   42.034715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.034734] Hardware name: WinLink E850-96 board (DT)
[   42.034753] Call trace:
[   42.034763]  show_stack+0x20/0x38 (C)
[   42.034800]  dump_stack_lvl+0x8c/0xd0
[   42.034840]  print_report+0x118/0x608
[   42.034876]  kasan_report+0xdc/0x128
[   42.034908]  kasan_check_range+0x100/0x1a8
[   42.034946]  __kasan_check_write+0x20/0x30
[   42.034976]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   42.035015]  kasan_bitops_generic+0x110/0x1c8
[   42.035046]  kunit_try_run_case+0x170/0x3f0
[   42.035079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.035120]  kthread+0x328/0x630
[   42.035146]  ret_from_fork+0x10/0x20
[   42.035181] 
[   42.107222] Allocated by task 305:
[   42.110609]  kasan_save_stack+0x3c/0x68
[   42.114427]  kasan_save_track+0x20/0x40
[   42.118246]  kasan_save_alloc_info+0x40/0x58
[   42.122500]  __kasan_kmalloc+0xd4/0xd8
[   42.126232]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.130746]  kasan_bitops_generic+0xa0/0x1c8
[   42.134999]  kunit_try_run_case+0x170/0x3f0
[   42.139166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.144635]  kthread+0x328/0x630
[   42.147846]  ret_from_fork+0x10/0x20
[   42.151406] 
[   42.152882] The buggy address belongs to the object at ffff00080444cc20
[   42.152882]  which belongs to the cache kmalloc-16 of size 16
[   42.165208] The buggy address is located 8 bytes inside of
[   42.165208]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   42.177447] 
[   42.178923] The buggy address belongs to the physical page:
[   42.184479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   42.192466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.198974] page_type: f5(slab)
[   42.202108] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.209831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.217550] page dumped because: kasan: bad access detected
[   42.223107] 
[   42.224581] Memory state around the buggy address:
[   42.229362]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.236564]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   42.243768] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.250970]                                   ^
[   42.255487]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.262692]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.269893] ==================================================================
[   43.073711] ==================================================================
[   43.080821] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   43.088978] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   43.096270] 
[   43.097753] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   43.097804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.097821] Hardware name: WinLink E850-96 board (DT)
[   43.097844] Call trace:
[   43.097856]  show_stack+0x20/0x38 (C)
[   43.097890]  dump_stack_lvl+0x8c/0xd0
[   43.097926]  print_report+0x118/0x608
[   43.097961]  kasan_report+0xdc/0x128
[   43.097997]  __asan_report_load8_noabort+0x20/0x30
[   43.098029]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   43.098065]  kasan_bitops_generic+0x110/0x1c8
[   43.098097]  kunit_try_run_case+0x170/0x3f0
[   43.098129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.098167]  kthread+0x328/0x630
[   43.098193]  ret_from_fork+0x10/0x20
[   43.098225] 
[   43.166928] Allocated by task 305:
[   43.170314]  kasan_save_stack+0x3c/0x68
[   43.174133]  kasan_save_track+0x20/0x40
[   43.177952]  kasan_save_alloc_info+0x40/0x58
[   43.182206]  __kasan_kmalloc+0xd4/0xd8
[   43.185939]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.190452]  kasan_bitops_generic+0xa0/0x1c8
[   43.194706]  kunit_try_run_case+0x170/0x3f0
[   43.198872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.204341]  kthread+0x328/0x630
[   43.207553]  ret_from_fork+0x10/0x20
[   43.211111] 
[   43.212589] The buggy address belongs to the object at ffff00080444cc20
[   43.212589]  which belongs to the cache kmalloc-16 of size 16
[   43.224914] The buggy address is located 8 bytes inside of
[   43.224914]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   43.237153] 
[   43.238629] The buggy address belongs to the physical page:
[   43.244185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   43.252170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.258680] page_type: f5(slab)
[   43.261813] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.269538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.277256] page dumped because: kasan: bad access detected
[   43.282813] 
[   43.284288] Memory state around the buggy address:
[   43.289067]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.296270]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   43.303475] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.310676]                                   ^
[   43.315194]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.322398]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.329600] ==================================================================
[   43.603562] ==================================================================
[   43.610675] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.618831] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   43.626210] 
[   43.627691] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   43.627740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.627758] Hardware name: WinLink E850-96 board (DT)
[   43.627775] Call trace:
[   43.627788]  show_stack+0x20/0x38 (C)
[   43.627824]  dump_stack_lvl+0x8c/0xd0
[   43.627857]  print_report+0x118/0x608
[   43.627890]  kasan_report+0xdc/0x128
[   43.627922]  kasan_check_range+0x100/0x1a8
[   43.627958]  __kasan_check_write+0x20/0x30
[   43.627987]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.628023]  kasan_bitops_generic+0x110/0x1c8
[   43.628057]  kunit_try_run_case+0x170/0x3f0
[   43.628089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.628128]  kthread+0x328/0x630
[   43.628156]  ret_from_fork+0x10/0x20
[   43.628189] 
[   43.700254] Allocated by task 305:
[   43.703640]  kasan_save_stack+0x3c/0x68
[   43.707459]  kasan_save_track+0x20/0x40
[   43.711278]  kasan_save_alloc_info+0x40/0x58
[   43.715531]  __kasan_kmalloc+0xd4/0xd8
[   43.719264]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.723778]  kasan_bitops_generic+0xa0/0x1c8
[   43.728031]  kunit_try_run_case+0x170/0x3f0
[   43.732199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.737667]  kthread+0x328/0x630
[   43.740878]  ret_from_fork+0x10/0x20
[   43.744437] 
[   43.745912] The buggy address belongs to the object at ffff00080444cc20
[   43.745912]  which belongs to the cache kmalloc-16 of size 16
[   43.758240] The buggy address is located 8 bytes inside of
[   43.758240]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   43.770478] 
[   43.771954] The buggy address belongs to the physical page:
[   43.777510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   43.785495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.792006] page_type: f5(slab)
[   43.795139] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.802863] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.810582] page dumped because: kasan: bad access detected
[   43.816139] 
[   43.817613] Memory state around the buggy address:
[   43.822391]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.829596]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   43.836800] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.844002]                                   ^
[   43.848519]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.855724]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.862925] ==================================================================
[   43.336895] ==================================================================
[   43.344012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.352169] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   43.359547] 
[   43.361030] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   43.361079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.361098] Hardware name: WinLink E850-96 board (DT)
[   43.361118] Call trace:
[   43.361130]  show_stack+0x20/0x38 (C)
[   43.361166]  dump_stack_lvl+0x8c/0xd0
[   43.361200]  print_report+0x118/0x608
[   43.361236]  kasan_report+0xdc/0x128
[   43.361269]  kasan_check_range+0x100/0x1a8
[   43.361307]  __kasan_check_write+0x20/0x30
[   43.361337]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.361372]  kasan_bitops_generic+0x110/0x1c8
[   43.361405]  kunit_try_run_case+0x170/0x3f0
[   43.361438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.361475]  kthread+0x328/0x630
[   43.361504]  ret_from_fork+0x10/0x20
[   43.361538] 
[   43.433591] Allocated by task 305:
[   43.436977]  kasan_save_stack+0x3c/0x68
[   43.440795]  kasan_save_track+0x20/0x40
[   43.444615]  kasan_save_alloc_info+0x40/0x58
[   43.448869]  __kasan_kmalloc+0xd4/0xd8
[   43.452601]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.457115]  kasan_bitops_generic+0xa0/0x1c8
[   43.461369]  kunit_try_run_case+0x170/0x3f0
[   43.465535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.471004]  kthread+0x328/0x630
[   43.474216]  ret_from_fork+0x10/0x20
[   43.477774] 
[   43.479250] The buggy address belongs to the object at ffff00080444cc20
[   43.479250]  which belongs to the cache kmalloc-16 of size 16
[   43.491577] The buggy address is located 8 bytes inside of
[   43.491577]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   43.503816] 
[   43.505291] The buggy address belongs to the physical page:
[   43.510847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   43.518835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.525343] page_type: f5(slab)
[   43.528479] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.536200] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.543919] page dumped because: kasan: bad access detected
[   43.549474] 
[   43.550950] Memory state around the buggy address:
[   43.555728]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.562933]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   43.570138] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.577339]                                   ^
[   43.581856]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.589061]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.596262] ==================================================================
[   43.870278] ==================================================================
[   43.877340] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.885494] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   43.892785] 
[   43.894268] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   43.894316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.894334] Hardware name: WinLink E850-96 board (DT)
[   43.894354] Call trace:
[   43.894368]  show_stack+0x20/0x38 (C)
[   43.894402]  dump_stack_lvl+0x8c/0xd0
[   43.894437]  print_report+0x118/0x608
[   43.894472]  kasan_report+0xdc/0x128
[   43.894506]  __asan_report_load8_noabort+0x20/0x30
[   43.894535]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.894571]  kasan_bitops_generic+0x110/0x1c8
[   43.894604]  kunit_try_run_case+0x170/0x3f0
[   43.894637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.894677]  kthread+0x328/0x630
[   43.894706]  ret_from_fork+0x10/0x20
[   43.894737] 
[   43.963444] Allocated by task 305:
[   43.966830]  kasan_save_stack+0x3c/0x68
[   43.970649]  kasan_save_track+0x20/0x40
[   43.974468]  kasan_save_alloc_info+0x40/0x58
[   43.978722]  __kasan_kmalloc+0xd4/0xd8
[   43.982454]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.986968]  kasan_bitops_generic+0xa0/0x1c8
[   43.991222]  kunit_try_run_case+0x170/0x3f0
[   43.995388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.000857]  kthread+0x328/0x630
[   44.004069]  ret_from_fork+0x10/0x20
[   44.007628] 
[   44.009103] The buggy address belongs to the object at ffff00080444cc20
[   44.009103]  which belongs to the cache kmalloc-16 of size 16
[   44.021430] The buggy address is located 8 bytes inside of
[   44.021430]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   44.033669] 
[   44.035145] The buggy address belongs to the physical page:
[   44.040701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   44.048687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.055196] page_type: f5(slab)
[   44.058329] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.066054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.073773] page dumped because: kasan: bad access detected
[   44.079329] 
[   44.080803] Memory state around the buggy address:
[   44.085583]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.092786]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   44.099991] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.107192]                                   ^
[   44.111709]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.118914]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.126116] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   41.176918] ==================================================================
[   41.183980] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   41.189963] Read of size 1 at addr ffff000806931190 by task kunit_try_catch/303
[   41.197254] 
[   41.198737] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   41.198796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.198813] Hardware name: WinLink E850-96 board (DT)
[   41.198835] Call trace:
[   41.198849]  show_stack+0x20/0x38 (C)
[   41.198886]  dump_stack_lvl+0x8c/0xd0
[   41.198923]  print_report+0x118/0x608
[   41.198960]  kasan_report+0xdc/0x128
[   41.198992]  __asan_report_load1_noabort+0x20/0x30
[   41.199025]  strnlen+0x80/0x88
[   41.199055]  kasan_strings+0x478/0xb00
[   41.199085]  kunit_try_run_case+0x170/0x3f0
[   41.199122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.199163]  kthread+0x328/0x630
[   41.199192]  ret_from_fork+0x10/0x20
[   41.199227] 
[   41.265047] Allocated by task 303:
[   41.268434]  kasan_save_stack+0x3c/0x68
[   41.272252]  kasan_save_track+0x20/0x40
[   41.276073]  kasan_save_alloc_info+0x40/0x58
[   41.280325]  __kasan_kmalloc+0xd4/0xd8
[   41.284057]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.288571]  kasan_strings+0xc8/0xb00
[   41.292217]  kunit_try_run_case+0x170/0x3f0
[   41.296383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.301852]  kthread+0x328/0x630
[   41.305064]  ret_from_fork+0x10/0x20
[   41.308623] 
[   41.310099] Freed by task 303:
[   41.313138]  kasan_save_stack+0x3c/0x68
[   41.316956]  kasan_save_track+0x20/0x40
[   41.320776]  kasan_save_free_info+0x4c/0x78
[   41.324942]  __kasan_slab_free+0x6c/0x98
[   41.328848]  kfree+0x214/0x3c8
[   41.331886]  kasan_strings+0x24c/0xb00
[   41.335619]  kunit_try_run_case+0x170/0x3f0
[   41.339786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.345254]  kthread+0x328/0x630
[   41.348466]  ret_from_fork+0x10/0x20
[   41.352025] 
[   41.353502] The buggy address belongs to the object at ffff000806931180
[   41.353502]  which belongs to the cache kmalloc-32 of size 32
[   41.365829] The buggy address is located 16 bytes inside of
[   41.365829]  freed 32-byte region [ffff000806931180, ffff0008069311a0)
[   41.377893] 
[   41.379372] The buggy address belongs to the physical page:
[   41.384927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886931
[   41.392913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.399422] page_type: f5(slab)
[   41.402557] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   41.410278] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   41.417996] page dumped because: kasan: bad access detected
[   41.423553] 
[   41.425027] Memory state around the buggy address:
[   41.429808]  ffff000806931080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.437010]  ffff000806931100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   41.444215] >ffff000806931180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.451416]                          ^
[   41.455153]  ffff000806931200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   41.462357]  ffff000806931280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.469558] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   40.877159] ==================================================================
[   40.884154] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   40.890053] Read of size 1 at addr ffff000806931190 by task kunit_try_catch/303
[   40.897344] 
[   40.898828] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   40.898885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.898904] Hardware name: WinLink E850-96 board (DT)
[   40.898926] Call trace:
[   40.898940]  show_stack+0x20/0x38 (C)
[   40.898975]  dump_stack_lvl+0x8c/0xd0
[   40.899012]  print_report+0x118/0x608
[   40.899047]  kasan_report+0xdc/0x128
[   40.899081]  __asan_report_load1_noabort+0x20/0x30
[   40.899114]  strlen+0xa8/0xb0
[   40.899146]  kasan_strings+0x418/0xb00
[   40.899177]  kunit_try_run_case+0x170/0x3f0
[   40.899212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.899254]  kthread+0x328/0x630
[   40.899283]  ret_from_fork+0x10/0x20
[   40.899316] 
[   40.965052] Allocated by task 303:
[   40.968440]  kasan_save_stack+0x3c/0x68
[   40.972257]  kasan_save_track+0x20/0x40
[   40.976077]  kasan_save_alloc_info+0x40/0x58
[   40.980329]  __kasan_kmalloc+0xd4/0xd8
[   40.984062]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.988576]  kasan_strings+0xc8/0xb00
[   40.992222]  kunit_try_run_case+0x170/0x3f0
[   40.996388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.001857]  kthread+0x328/0x630
[   41.005069]  ret_from_fork+0x10/0x20
[   41.008628] 
[   41.010103] Freed by task 303:
[   41.013141]  kasan_save_stack+0x3c/0x68
[   41.016961]  kasan_save_track+0x20/0x40
[   41.020780]  kasan_save_free_info+0x4c/0x78
[   41.024947]  __kasan_slab_free+0x6c/0x98
[   41.028853]  kfree+0x214/0x3c8
[   41.031891]  kasan_strings+0x24c/0xb00
[   41.035623]  kunit_try_run_case+0x170/0x3f0
[   41.039790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.045259]  kthread+0x328/0x630
[   41.048471]  ret_from_fork+0x10/0x20
[   41.052030] 
[   41.053507] The buggy address belongs to the object at ffff000806931180
[   41.053507]  which belongs to the cache kmalloc-32 of size 32
[   41.065833] The buggy address is located 16 bytes inside of
[   41.065833]  freed 32-byte region [ffff000806931180, ffff0008069311a0)
[   41.077897] 
[   41.079376] The buggy address belongs to the physical page:
[   41.084931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886931
[   41.092918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.099426] page_type: f5(slab)
[   41.102561] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   41.110282] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   41.118001] page dumped because: kasan: bad access detected
[   41.123557] 
[   41.125032] Memory state around the buggy address:
[   41.129810]  ffff000806931080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.137015]  ffff000806931100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   41.144219] >ffff000806931180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.151420]                          ^
[   41.155158]  ffff000806931200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   41.162361]  ffff000806931280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.169562] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   40.579419] ==================================================================
[   40.586506] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   40.593182] Read of size 1 at addr ffff000806931190 by task kunit_try_catch/303
[   40.600474] 
[   40.601959] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   40.602011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.602029] Hardware name: WinLink E850-96 board (DT)
[   40.602053] Call trace:
[   40.602067]  show_stack+0x20/0x38 (C)
[   40.602108]  dump_stack_lvl+0x8c/0xd0
[   40.602146]  print_report+0x118/0x608
[   40.602180]  kasan_report+0xdc/0x128
[   40.602212]  __asan_report_load1_noabort+0x20/0x30
[   40.602245]  kasan_strings+0x95c/0xb00
[   40.602275]  kunit_try_run_case+0x170/0x3f0
[   40.602313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.602354]  kthread+0x328/0x630
[   40.602383]  ret_from_fork+0x10/0x20
[   40.602416] 
[   40.665230] Allocated by task 303:
[   40.668617]  kasan_save_stack+0x3c/0x68
[   40.672435]  kasan_save_track+0x20/0x40
[   40.676255]  kasan_save_alloc_info+0x40/0x58
[   40.680507]  __kasan_kmalloc+0xd4/0xd8
[   40.684240]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.688754]  kasan_strings+0xc8/0xb00
[   40.692400]  kunit_try_run_case+0x170/0x3f0
[   40.696566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.702035]  kthread+0x328/0x630
[   40.705247]  ret_from_fork+0x10/0x20
[   40.708806] 
[   40.710281] Freed by task 303:
[   40.713321]  kasan_save_stack+0x3c/0x68
[   40.717139]  kasan_save_track+0x20/0x40
[   40.720958]  kasan_save_free_info+0x4c/0x78
[   40.725125]  __kasan_slab_free+0x6c/0x98
[   40.729031]  kfree+0x214/0x3c8
[   40.732069]  kasan_strings+0x24c/0xb00
[   40.735802]  kunit_try_run_case+0x170/0x3f0
[   40.739968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.745439]  kthread+0x328/0x630
[   40.748649]  ret_from_fork+0x10/0x20
[   40.752208] 
[   40.753685] The buggy address belongs to the object at ffff000806931180
[   40.753685]  which belongs to the cache kmalloc-32 of size 32
[   40.766010] The buggy address is located 16 bytes inside of
[   40.766010]  freed 32-byte region [ffff000806931180, ffff0008069311a0)
[   40.778075] 
[   40.779555] The buggy address belongs to the physical page:
[   40.785110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886931
[   40.793094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.799605] page_type: f5(slab)
[   40.802738] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.810460] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.818179] page dumped because: kasan: bad access detected
[   40.823735] 
[   40.825210] Memory state around the buggy address:
[   40.829990]  ffff000806931080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.837193]  ffff000806931100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   40.844399] >ffff000806931180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.851599]                          ^
[   40.855336]  ffff000806931200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.862539]  ffff000806931280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.869740] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   40.263083] ==================================================================
[   40.286682] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   40.292580] Read of size 1 at addr ffff000806931190 by task kunit_try_catch/303
[   40.299871] 
[   40.301357] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   40.301414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.301432] Hardware name: WinLink E850-96 board (DT)
[   40.301455] Call trace:
[   40.301470]  show_stack+0x20/0x38 (C)
[   40.301509]  dump_stack_lvl+0x8c/0xd0
[   40.301544]  print_report+0x118/0x608
[   40.301582]  kasan_report+0xdc/0x128
[   40.301619]  __asan_report_load1_noabort+0x20/0x30
[   40.301652]  strcmp+0xc0/0xc8
[   40.301682]  kasan_strings+0x340/0xb00
[   40.301712]  kunit_try_run_case+0x170/0x3f0
[   40.301751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.301793]  kthread+0x328/0x630
[   40.301823]  ret_from_fork+0x10/0x20
[   40.301858] 
[   40.367578] Allocated by task 303:
[   40.370966]  kasan_save_stack+0x3c/0x68
[   40.374783]  kasan_save_track+0x20/0x40
[   40.378604]  kasan_save_alloc_info+0x40/0x58
[   40.382856]  __kasan_kmalloc+0xd4/0xd8
[   40.386588]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.391102]  kasan_strings+0xc8/0xb00
[   40.394748]  kunit_try_run_case+0x170/0x3f0
[   40.398914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.404383]  kthread+0x328/0x630
[   40.407595]  ret_from_fork+0x10/0x20
[   40.411153] 
[   40.412631] Freed by task 303:
[   40.415669]  kasan_save_stack+0x3c/0x68
[   40.419487]  kasan_save_track+0x20/0x40
[   40.423306]  kasan_save_free_info+0x4c/0x78
[   40.427473]  __kasan_slab_free+0x6c/0x98
[   40.431379]  kfree+0x214/0x3c8
[   40.434417]  kasan_strings+0x24c/0xb00
[   40.438150]  kunit_try_run_case+0x170/0x3f0
[   40.442317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.447787]  kthread+0x328/0x630
[   40.450997]  ret_from_fork+0x10/0x20
[   40.454556] 
[   40.456035] The buggy address belongs to the object at ffff000806931180
[   40.456035]  which belongs to the cache kmalloc-32 of size 32
[   40.468360] The buggy address is located 16 bytes inside of
[   40.468360]  freed 32-byte region [ffff000806931180, ffff0008069311a0)
[   40.480423] 
[   40.481901] The buggy address belongs to the physical page:
[   40.487459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886931
[   40.495444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.501952] page_type: f5(slab)
[   40.505087] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.512808] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.520528] page dumped because: kasan: bad access detected
[   40.526084] 
[   40.527558] Memory state around the buggy address:
[   40.532339]  ffff000806931080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.539541]  ffff000806931100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   40.546746] >ffff000806931180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.553947]                          ^
[   40.557683]  ffff000806931200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.564887]  ffff000806931280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.572089] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   39.961634] ==================================================================
[   39.971845] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   39.977832] Read of size 1 at addr ffff0008050026d8 by task kunit_try_catch/301
[   39.985120] 
[   39.986605] CPU: 5 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   39.986670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.986690] Hardware name: WinLink E850-96 board (DT)
[   39.986714] Call trace:
[   39.986728]  show_stack+0x20/0x38 (C)
[   39.986766]  dump_stack_lvl+0x8c/0xd0
[   39.986804]  print_report+0x118/0x608
[   39.986844]  kasan_report+0xdc/0x128
[   39.986878]  __asan_report_load1_noabort+0x20/0x30
[   39.986913]  memcmp+0x198/0x1d8
[   39.986944]  kasan_memcmp+0x16c/0x300
[   39.986977]  kunit_try_run_case+0x170/0x3f0
[   39.987017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.987056]  kthread+0x328/0x630
[   39.987088]  ret_from_fork+0x10/0x20
[   39.987125] 
[   40.052914] Allocated by task 301:
[   40.056301]  kasan_save_stack+0x3c/0x68
[   40.060118]  kasan_save_track+0x20/0x40
[   40.063936]  kasan_save_alloc_info+0x40/0x58
[   40.068190]  __kasan_kmalloc+0xd4/0xd8
[   40.071923]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.076436]  kasan_memcmp+0xbc/0x300
[   40.079997]  kunit_try_run_case+0x170/0x3f0
[   40.084162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.089631]  kthread+0x328/0x630
[   40.092842]  ret_from_fork+0x10/0x20
[   40.096403] 
[   40.097879] The buggy address belongs to the object at ffff0008050026c0
[   40.097879]  which belongs to the cache kmalloc-32 of size 32
[   40.110208] The buggy address is located 0 bytes to the right of
[   40.110208]  allocated 24-byte region [ffff0008050026c0, ffff0008050026d8)
[   40.123050] 
[   40.124530] The buggy address belongs to the physical page:
[   40.130086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885002
[   40.138071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.144579] page_type: f5(slab)
[   40.147716] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.155435] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.163155] page dumped because: kasan: bad access detected
[   40.168711] 
[   40.170185] Memory state around the buggy address:
[   40.174968]  ffff000805002580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.182168]  ffff000805002600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.189374] >ffff000805002680: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.196573]                                                     ^
[   40.202653]  ffff000805002700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.209858]  ffff000805002780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.217061] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   39.728171] ==================================================================
[   39.737733] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   39.745280] Read of size 1 at addr ffff800089517b4a by task kunit_try_catch/297
[   39.752570] 
[   39.754054] CPU: 4 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   39.754117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.754138] Hardware name: WinLink E850-96 board (DT)
[   39.754159] Call trace:
[   39.754171]  show_stack+0x20/0x38 (C)
[   39.754212]  dump_stack_lvl+0x8c/0xd0
[   39.754249]  print_report+0x310/0x608
[   39.754287]  kasan_report+0xdc/0x128
[   39.754321]  __asan_report_load1_noabort+0x20/0x30
[   39.754353]  kasan_alloca_oob_right+0x2dc/0x340
[   39.754384]  kunit_try_run_case+0x170/0x3f0
[   39.754423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.754462]  kthread+0x328/0x630
[   39.754495]  ret_from_fork+0x10/0x20
[   39.754530] 
[   39.818109] The buggy address belongs to stack of task kunit_try_catch/297
[   39.824986] 
[   39.826447] The buggy address belongs to the virtual mapping at
[   39.826447]  [ffff800089510000, ffff800089519000) created by:
[   39.826447]  kernel_clone+0x150/0x7a8
[   39.841719] 
[   39.843196] The buggy address belongs to the physical page:
[   39.848753] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886982
[   39.856737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.863258] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.870978] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.878696] page dumped because: kasan: bad access detected
[   39.884253] 
[   39.885727] Memory state around the buggy address:
[   39.890508]  ffff800089517a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.897710]  ffff800089517a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.904917] >ffff800089517b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   39.912116]                                               ^
[   39.917675]  ffff800089517b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   39.924881]  ffff800089517c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.932081] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   39.515122] ==================================================================
[   39.524454] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   39.531916] Read of size 1 at addr ffff8000894f7b5f by task kunit_try_catch/295
[   39.539205] 
[   39.540689] CPU: 2 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   39.540748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.540765] Hardware name: WinLink E850-96 board (DT)
[   39.540786] Call trace:
[   39.540798]  show_stack+0x20/0x38 (C)
[   39.540834]  dump_stack_lvl+0x8c/0xd0
[   39.540871]  print_report+0x310/0x608
[   39.540907]  kasan_report+0xdc/0x128
[   39.540939]  __asan_report_load1_noabort+0x20/0x30
[   39.540971]  kasan_alloca_oob_left+0x2b8/0x310
[   39.541003]  kunit_try_run_case+0x170/0x3f0
[   39.541041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.541083]  kthread+0x328/0x630
[   39.541111]  ret_from_fork+0x10/0x20
[   39.541149] 
[   39.604658] The buggy address belongs to stack of task kunit_try_catch/295
[   39.611537] 
[   39.612994] The buggy address belongs to the virtual mapping at
[   39.612994]  [ffff8000894f0000, ffff8000894f9000) created by:
[   39.612994]  kernel_clone+0x150/0x7a8
[   39.628266] 
[   39.629746] The buggy address belongs to the physical page:
[   39.635302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88696d
[   39.643286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.649803] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.657526] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.665245] page dumped because: kasan: bad access detected
[   39.670802] 
[   39.672276] Memory state around the buggy address:
[   39.677056]  ffff8000894f7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.684258]  ffff8000894f7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.691465] >ffff8000894f7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   39.698665]                                                     ^
[   39.704745]  ffff8000894f7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   39.711949]  ffff8000894f7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.719150] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   39.272633] ==================================================================
[   39.287049] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   39.293898] Read of size 1 at addr ffff8000894d7c2a by task kunit_try_catch/293
[   39.301189] 
[   39.302673] CPU: 5 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   39.302732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.302752] Hardware name: WinLink E850-96 board (DT)
[   39.302776] Call trace:
[   39.302792]  show_stack+0x20/0x38 (C)
[   39.302829]  dump_stack_lvl+0x8c/0xd0
[   39.302867]  print_report+0x310/0x608
[   39.302907]  kasan_report+0xdc/0x128
[   39.302940]  __asan_report_load1_noabort+0x20/0x30
[   39.302974]  kasan_stack_oob+0x238/0x270
[   39.303004]  kunit_try_run_case+0x170/0x3f0
[   39.303042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.303084]  kthread+0x328/0x630
[   39.303113]  ret_from_fork+0x10/0x20
[   39.303152] 
[   39.366120] The buggy address belongs to stack of task kunit_try_catch/293
[   39.372978]  and is located at offset 138 in frame:
[   39.377836]  kasan_stack_oob+0x0/0x270
[   39.381575] 
[   39.383044] This frame has 4 objects:
[   39.386695]  [48, 49) '__assertion'
[   39.386720]  [64, 72) 'array'
[   39.390165]  [96, 112) '__assertion'
[   39.393115]  [128, 138) 'stack_array'
[   39.396674] 
[   39.401799] The buggy address belongs to the virtual mapping at
[   39.401799]  [ffff8000894d0000, ffff8000894d9000) created by:
[   39.401799]  kernel_clone+0x150/0x7a8
[   39.417071] 
[   39.418551] The buggy address belongs to the physical page:
[   39.424107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886959
[   39.432091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.438612] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.446331] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.454052] page dumped because: kasan: bad access detected
[   39.459607] 
[   39.461081] Memory state around the buggy address:
[   39.465862]  ffff8000894d7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.473064]  ffff8000894d7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   39.480270] >ffff8000894d7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   39.487470]                                   ^
[   39.491987]  ffff8000894d7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   39.499192]  ffff8000894d7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.506394] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   39.055428] ==================================================================
[   39.066038] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   39.073588] Read of size 1 at addr ffff800087bb258d by task kunit_try_catch/289
[   39.080879] 
[   39.082364] CPU: 2 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   39.082421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.082439] Hardware name: WinLink E850-96 board (DT)
[   39.082460] Call trace:
[   39.082473]  show_stack+0x20/0x38 (C)
[   39.082512]  dump_stack_lvl+0x8c/0xd0
[   39.082550]  print_report+0x310/0x608
[   39.082588]  kasan_report+0xdc/0x128
[   39.082620]  __asan_report_load1_noabort+0x20/0x30
[   39.082654]  kasan_global_oob_right+0x230/0x270
[   39.082686]  kunit_try_run_case+0x170/0x3f0
[   39.082724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.082764]  kthread+0x328/0x630
[   39.082796]  ret_from_fork+0x10/0x20
[   39.082834] 
[   39.146418] The buggy address belongs to the variable:
[   39.151537]  global_array+0xd/0x40
[   39.154923] 
[   39.156415] The buggy address belongs to the virtual mapping at
[   39.156415]  [ffff800085d50000, ffff800087c71000) created by:
[   39.156415]  paging_init+0x66c/0x7d0
[   39.171589] 
[   39.173069] The buggy address belongs to the physical page:
[   39.178626] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87bb2
[   39.186524] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   39.193822] raw: 03fffe0000002000 fffffdffc01eec88 fffffdffc01eec88 0000000000000000
[   39.201543] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.209263] page dumped because: kasan: bad access detected
[   39.214819] 
[   39.216293] Memory state around the buggy address:
[   39.221074]  ffff800087bb2480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.228275]  ffff800087bb2500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   39.235481] >ffff800087bb2580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   39.242682]                       ^
[   39.246159]  ffff800087bb2600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   39.253362]  ffff800087bb2680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.260564] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   38.488906] ==================================================================
[   38.499120] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.507103] Free of addr ffff000805826101 by task kunit_try_catch/285
[   38.513527] 
[   38.515013] CPU: 2 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   38.515077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.515092] Hardware name: WinLink E850-96 board (DT)
[   38.515113] Call trace:
[   38.515130]  show_stack+0x20/0x38 (C)
[   38.515166]  dump_stack_lvl+0x8c/0xd0
[   38.515207]  print_report+0x118/0x608
[   38.515243]  kasan_report_invalid_free+0xc0/0xe8
[   38.515277]  check_slab_allocation+0xfc/0x108
[   38.515311]  __kasan_mempool_poison_object+0x78/0x150
[   38.515349]  mempool_free+0x28c/0x328
[   38.515383]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.515419]  mempool_kmalloc_invalid_free+0xc0/0x118
[   38.515452]  kunit_try_run_case+0x170/0x3f0
[   38.515487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.515529]  kthread+0x328/0x630
[   38.515559]  ret_from_fork+0x10/0x20
[   38.515594] 
[   38.594429] Allocated by task 285:
[   38.597816]  kasan_save_stack+0x3c/0x68
[   38.601632]  kasan_save_track+0x20/0x40
[   38.605452]  kasan_save_alloc_info+0x40/0x58
[   38.609705]  __kasan_mempool_unpoison_object+0x11c/0x180
[   38.615000]  remove_element+0x130/0x1f8
[   38.618820]  mempool_alloc_preallocated+0x58/0xc0
[   38.623507]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   38.629062]  mempool_kmalloc_invalid_free+0xc0/0x118
[   38.634013]  kunit_try_run_case+0x170/0x3f0
[   38.638177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.643645]  kthread+0x328/0x630
[   38.646857]  ret_from_fork+0x10/0x20
[   38.650416] 
[   38.651894] The buggy address belongs to the object at ffff000805826100
[   38.651894]  which belongs to the cache kmalloc-128 of size 128
[   38.664395] The buggy address is located 1 bytes inside of
[   38.664395]  128-byte region [ffff000805826100, ffff000805826180)
[   38.675937] 
[   38.677415] The buggy address belongs to the physical page:
[   38.682972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885826
[   38.690957] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.698593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.705538] page_type: f5(slab)
[   38.708673] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   38.716394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.724121] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   38.731932] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.739745] head: 0bfffe0000000001 fffffdffe0160981 00000000ffffffff 00000000ffffffff
[   38.747557] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   38.755363] page dumped because: kasan: bad access detected
[   38.760919] 
[   38.762394] Memory state around the buggy address:
[   38.767175]  ffff000805826000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.774376]  ffff000805826080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.781584] >ffff000805826100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.788782]                    ^
[   38.791998]  ffff000805826180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.799202]  ffff000805826200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.806404] ==================================================================
[   38.815651] ==================================================================
[   38.825593] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.833575] Free of addr ffff000806014001 by task kunit_try_catch/287
[   38.839997] 
[   38.841483] CPU: 4 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   38.841539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.841557] Hardware name: WinLink E850-96 board (DT)
[   38.841577] Call trace:
[   38.841590]  show_stack+0x20/0x38 (C)
[   38.841628]  dump_stack_lvl+0x8c/0xd0
[   38.841664]  print_report+0x118/0x608
[   38.841701]  kasan_report_invalid_free+0xc0/0xe8
[   38.841736]  __kasan_mempool_poison_object+0xfc/0x150
[   38.841774]  mempool_free+0x28c/0x328
[   38.841807]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.841843]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   38.841878]  kunit_try_run_case+0x170/0x3f0
[   38.841917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.841956]  kthread+0x328/0x630
[   38.841985]  ret_from_fork+0x10/0x20
[   38.842021] 
[   38.917083] The buggy address belongs to the physical page:
[   38.922639] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886014
[   38.930622] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.938264] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.945205] page_type: f8(unknown)
[   38.948600] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.956321] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.964047] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.971858] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.979672] head: 0bfffe0000000002 fffffdffe0180501 00000000ffffffff 00000000ffffffff
[   38.987484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.995290] page dumped because: kasan: bad access detected
[   39.000846] 
[   39.002321] Memory state around the buggy address:
[   39.007102]  ffff000806013f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.014303]  ffff000806013f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.021511] >ffff000806014000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.028709]                    ^
[   39.031924]  ffff000806014080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.039129]  ffff000806014100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.046330] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   36.936453] ==================================================================
[   36.945760] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   36.952442] Read of size 1 at addr ffff000806070000 by task kunit_try_catch/273
[   36.959730] 
[   36.961218] CPU: 4 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   36.961273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.961293] Hardware name: WinLink E850-96 board (DT)
[   36.961314] Call trace:
[   36.961329]  show_stack+0x20/0x38 (C)
[   36.961370]  dump_stack_lvl+0x8c/0xd0
[   36.961407]  print_report+0x118/0x608
[   36.961446]  kasan_report+0xdc/0x128
[   36.961479]  __asan_report_load1_noabort+0x20/0x30
[   36.961513]  mempool_uaf_helper+0x314/0x340
[   36.961549]  mempool_kmalloc_large_uaf+0xc4/0x120
[   36.961583]  kunit_try_run_case+0x170/0x3f0
[   36.961621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.961659]  kthread+0x328/0x630
[   36.961689]  ret_from_fork+0x10/0x20
[   36.961725] 
[   37.029610] The buggy address belongs to the physical page:
[   37.035168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886070
[   37.043152] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.050792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.057733] page_type: f8(unknown)
[   37.061130] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.068849] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.076577] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.084387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.092200] head: 0bfffe0000000002 fffffdffe0181c01 00000000ffffffff 00000000ffffffff
[   37.100012] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   37.107818] page dumped because: kasan: bad access detected
[   37.113374] 
[   37.114849] Memory state around the buggy address:
[   37.119633]  ffff00080606ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.126832]  ffff00080606ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.134038] >ffff000806070000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.141237]                    ^
[   37.144453]  ffff000806070080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.151657]  ffff000806070100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.158859] ==================================================================
[   37.499457] ==================================================================
[   37.501481] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   37.508161] Read of size 1 at addr ffff000806014000 by task kunit_try_catch/277
[   37.515452] 
[   37.516937] CPU: 4 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   37.516997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.517016] Hardware name: WinLink E850-96 board (DT)
[   37.517035] Call trace:
[   37.517052]  show_stack+0x20/0x38 (C)
[   37.517094]  dump_stack_lvl+0x8c/0xd0
[   37.517131]  print_report+0x118/0x608
[   37.517170]  kasan_report+0xdc/0x128
[   37.517204]  __asan_report_load1_noabort+0x20/0x30
[   37.517238]  mempool_uaf_helper+0x314/0x340
[   37.517270]  mempool_page_alloc_uaf+0xc0/0x118
[   37.517304]  kunit_try_run_case+0x170/0x3f0
[   37.517344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.517383]  kthread+0x328/0x630
[   37.517412]  ret_from_fork+0x10/0x20
[   37.517447] 
[   37.585071] The buggy address belongs to the physical page:
[   37.590628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886014
[   37.598611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.605134] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.612851] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.620572] page dumped because: kasan: bad access detected
[   37.626127] 
[   37.627601] Memory state around the buggy address:
[   37.632382]  ffff000806013f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.639584]  ffff000806013f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.646792] >ffff000806014000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.653990]                    ^
[   37.657205]  ffff000806014080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.664410]  ffff000806014100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.671613] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   37.168414] ==================================================================
[   37.177789] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   37.184901] Read of size 1 at addr ffff000805857240 by task kunit_try_catch/275
[   37.192192] 
[   37.193679] CPU: 2 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   37.193733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.193752] Hardware name: WinLink E850-96 board (DT)
[   37.193774] Call trace:
[   37.193788]  show_stack+0x20/0x38 (C)
[   37.193828]  dump_stack_lvl+0x8c/0xd0
[   37.193866]  print_report+0x118/0x608
[   37.193904]  kasan_report+0xdc/0x128
[   37.193937]  __asan_report_load1_noabort+0x20/0x30
[   37.193971]  mempool_uaf_helper+0x314/0x340
[   37.194002]  mempool_slab_uaf+0xc0/0x118
[   37.194036]  kunit_try_run_case+0x170/0x3f0
[   37.194072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.194113]  kthread+0x328/0x630
[   37.194142]  ret_from_fork+0x10/0x20
[   37.194176] 
[   37.261287] Allocated by task 275:
[   37.264677]  kasan_save_stack+0x3c/0x68
[   37.268492]  kasan_save_track+0x20/0x40
[   37.272312]  kasan_save_alloc_info+0x40/0x58
[   37.276565]  __kasan_mempool_unpoison_object+0xbc/0x180
[   37.281775]  remove_element+0x16c/0x1f8
[   37.285593]  mempool_alloc_preallocated+0x58/0xc0
[   37.290280]  mempool_uaf_helper+0xa4/0x340
[   37.294360]  mempool_slab_uaf+0xc0/0x118
[   37.298267]  kunit_try_run_case+0x170/0x3f0
[   37.302433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.307902]  kthread+0x328/0x630
[   37.311114]  ret_from_fork+0x10/0x20
[   37.314672] 
[   37.316149] Freed by task 275:
[   37.319188]  kasan_save_stack+0x3c/0x68
[   37.323006]  kasan_save_track+0x20/0x40
[   37.326825]  kasan_save_free_info+0x4c/0x78
[   37.330992]  __kasan_mempool_poison_object+0xc0/0x150
[   37.336027]  mempool_free+0x28c/0x328
[   37.339672]  mempool_uaf_helper+0x104/0x340
[   37.343839]  mempool_slab_uaf+0xc0/0x118
[   37.347745]  kunit_try_run_case+0x170/0x3f0
[   37.351911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.357380]  kthread+0x328/0x630
[   37.360592]  ret_from_fork+0x10/0x20
[   37.364151] 
[   37.365628] The buggy address belongs to the object at ffff000805857240
[   37.365628]  which belongs to the cache test_cache of size 123
[   37.378041] The buggy address is located 0 bytes inside of
[   37.378041]  freed 123-byte region [ffff000805857240, ffff0008058572bb)
[   37.390105] 
[   37.391583] The buggy address belongs to the physical page:
[   37.397141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885857
[   37.405125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.411635] page_type: f5(slab)
[   37.414770] raw: 0bfffe0000000000 ffff000801dbb400 dead000000000122 0000000000000000
[   37.422490] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   37.430209] page dumped because: kasan: bad access detected
[   37.435766] 
[   37.437240] Memory state around the buggy address:
[   37.442021]  ffff000805857100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.449223]  ffff000805857180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.456429] >ffff000805857200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   37.463628]                                            ^
[   37.468927]  ffff000805857280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.476132]  ffff000805857300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.483333] ==================================================================
[   36.579403] ==================================================================
[   36.583617] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   36.590729] Read of size 1 at addr ffff000801dbdd00 by task kunit_try_catch/271
[   36.598016] 
[   36.599502] CPU: 2 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   36.599561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.599577] Hardware name: WinLink E850-96 board (DT)
[   36.599599] Call trace:
[   36.599613]  show_stack+0x20/0x38 (C)
[   36.599651]  dump_stack_lvl+0x8c/0xd0
[   36.599689]  print_report+0x118/0x608
[   36.599725]  kasan_report+0xdc/0x128
[   36.599758]  __asan_report_load1_noabort+0x20/0x30
[   36.599789]  mempool_uaf_helper+0x314/0x340
[   36.599820]  mempool_kmalloc_uaf+0xc4/0x120
[   36.599852]  kunit_try_run_case+0x170/0x3f0
[   36.599887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.599926]  kthread+0x328/0x630
[   36.599954]  ret_from_fork+0x10/0x20
[   36.599992] 
[   36.667373] Allocated by task 271:
[   36.670763]  kasan_save_stack+0x3c/0x68
[   36.674578]  kasan_save_track+0x20/0x40
[   36.678399]  kasan_save_alloc_info+0x40/0x58
[   36.682650]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.687946]  remove_element+0x130/0x1f8
[   36.691765]  mempool_alloc_preallocated+0x58/0xc0
[   36.696453]  mempool_uaf_helper+0xa4/0x340
[   36.700532]  mempool_kmalloc_uaf+0xc4/0x120
[   36.704699]  kunit_try_run_case+0x170/0x3f0
[   36.708865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.714336]  kthread+0x328/0x630
[   36.717546]  ret_from_fork+0x10/0x20
[   36.721105] 
[   36.722582] Freed by task 271:
[   36.725618]  kasan_save_stack+0x3c/0x68
[   36.729438]  kasan_save_track+0x20/0x40
[   36.733258]  kasan_save_free_info+0x4c/0x78
[   36.737424]  __kasan_mempool_poison_object+0xc0/0x150
[   36.742459]  mempool_free+0x28c/0x328
[   36.746104]  mempool_uaf_helper+0x104/0x340
[   36.750271]  mempool_kmalloc_uaf+0xc4/0x120
[   36.754438]  kunit_try_run_case+0x170/0x3f0
[   36.758604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.764073]  kthread+0x328/0x630
[   36.767285]  ret_from_fork+0x10/0x20
[   36.770843] 
[   36.772322] The buggy address belongs to the object at ffff000801dbdd00
[   36.772322]  which belongs to the cache kmalloc-128 of size 128
[   36.784821] The buggy address is located 0 bytes inside of
[   36.784821]  freed 128-byte region [ffff000801dbdd00, ffff000801dbdd80)
[   36.796885] 
[   36.798363] The buggy address belongs to the physical page:
[   36.803921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dbc
[   36.811904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.819544] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.826487] page_type: f5(slab)
[   36.829624] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.837343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.845070] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.852880] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.860693] head: 0bfffe0000000001 fffffdffe0076f01 00000000ffffffff 00000000ffffffff
[   36.868505] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.876311] page dumped because: kasan: bad access detected
[   36.881868] 
[   36.883342] Memory state around the buggy address:
[   36.888124]  ffff000801dbdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.895326]  ffff000801dbdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.902531] >ffff000801dbdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.909730]                    ^
[   36.912946]  ffff000801dbdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.920152]  ffff000801dbde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.927353] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   35.759456] ==================================================================
[   35.759638] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.759771] Read of size 1 at addr ffff000801aa0573 by task kunit_try_catch/265
[   35.766172] 
[   35.767659] CPU: 7 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   35.767718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.767734] Hardware name: WinLink E850-96 board (DT)
[   35.767755] Call trace:
[   35.767768]  show_stack+0x20/0x38 (C)
[   35.767808]  dump_stack_lvl+0x8c/0xd0
[   35.767849]  print_report+0x118/0x608
[   35.767884]  kasan_report+0xdc/0x128
[   35.767917]  __asan_report_load1_noabort+0x20/0x30
[   35.767947]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.767979]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.768010]  kunit_try_run_case+0x170/0x3f0
[   35.768048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.768086]  kthread+0x328/0x630
[   35.768117]  ret_from_fork+0x10/0x20
[   35.768151] 
[   35.836571] Allocated by task 265:
[   35.839959]  kasan_save_stack+0x3c/0x68
[   35.843774]  kasan_save_track+0x20/0x40
[   35.847594]  kasan_save_alloc_info+0x40/0x58
[   35.851847]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.857142]  remove_element+0x130/0x1f8
[   35.860961]  mempool_alloc_preallocated+0x58/0xc0
[   35.865651]  mempool_oob_right_helper+0x98/0x2f0
[   35.870249]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.874937]  kunit_try_run_case+0x170/0x3f0
[   35.879104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.884572]  kthread+0x328/0x630
[   35.887784]  ret_from_fork+0x10/0x20
[   35.891343] 
[   35.892820] The buggy address belongs to the object at ffff000801aa0500
[   35.892820]  which belongs to the cache kmalloc-128 of size 128
[   35.905322] The buggy address is located 0 bytes to the right of
[   35.905322]  allocated 115-byte region [ffff000801aa0500, ffff000801aa0573)
[   35.918252] 
[   35.919730] The buggy address belongs to the physical page:
[   35.925289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881aa0
[   35.933271] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.940911] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.947854] page_type: f5(slab)
[   35.950991] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.958710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.966439] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.974248] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.982060] head: 0bfffe0000000001 fffffdffe006a801 00000000ffffffff 00000000ffffffff
[   35.989872] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.997678] page dumped because: kasan: bad access detected
[   36.003235] 
[   36.004709] Memory state around the buggy address:
[   36.009492]  ffff000801aa0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.016692]  ffff000801aa0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.023898] >ffff000801aa0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.031098]                                                              ^
[   36.037959]  ffff000801aa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.045165]  ffff000801aa0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.052365] ==================================================================
[   36.296020] ==================================================================
[   36.305752] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   36.313300] Read of size 1 at addr ffff0008061512bb by task kunit_try_catch/269
[   36.320592] 
[   36.322078] CPU: 4 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   36.322139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.322158] Hardware name: WinLink E850-96 board (DT)
[   36.322180] Call trace:
[   36.322193]  show_stack+0x20/0x38 (C)
[   36.322230]  dump_stack_lvl+0x8c/0xd0
[   36.322267]  print_report+0x118/0x608
[   36.322305]  kasan_report+0xdc/0x128
[   36.322338]  __asan_report_load1_noabort+0x20/0x30
[   36.322371]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.322402]  mempool_slab_oob_right+0xc0/0x118
[   36.322435]  kunit_try_run_case+0x170/0x3f0
[   36.322473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.322511]  kthread+0x328/0x630
[   36.322538]  ret_from_fork+0x10/0x20
[   36.322575] 
[   36.390728] Allocated by task 269:
[   36.394117]  kasan_save_stack+0x3c/0x68
[   36.397933]  kasan_save_track+0x20/0x40
[   36.401752]  kasan_save_alloc_info+0x40/0x58
[   36.406005]  __kasan_mempool_unpoison_object+0xbc/0x180
[   36.411215]  remove_element+0x16c/0x1f8
[   36.415033]  mempool_alloc_preallocated+0x58/0xc0
[   36.419721]  mempool_oob_right_helper+0x98/0x2f0
[   36.424321]  mempool_slab_oob_right+0xc0/0x118
[   36.428748]  kunit_try_run_case+0x170/0x3f0
[   36.432915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.438384]  kthread+0x328/0x630
[   36.441595]  ret_from_fork+0x10/0x20
[   36.445154] 
[   36.446633] The buggy address belongs to the object at ffff000806151240
[   36.446633]  which belongs to the cache test_cache of size 123
[   36.459046] The buggy address is located 0 bytes to the right of
[   36.459046]  allocated 123-byte region [ffff000806151240, ffff0008061512bb)
[   36.471977] 
[   36.473455] The buggy address belongs to the physical page:
[   36.479012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886151
[   36.486998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.493506] page_type: f5(slab)
[   36.496643] raw: 0bfffe0000000000 ffff000801de7900 dead000000000122 0000000000000000
[   36.504362] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   36.512082] page dumped because: kasan: bad access detected
[   36.517637] 
[   36.519111] Memory state around the buggy address:
[   36.523895]  ffff000806151180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.531094]  ffff000806151200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   36.538300] >ffff000806151280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   36.545500]                                         ^
[   36.550538]  ffff000806151300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.557743]  ffff000806151380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.564944] ==================================================================
[   36.061524] ==================================================================
[   36.071294] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   36.078842] Read of size 1 at addr ffff000804b16001 by task kunit_try_catch/267
[   36.086132] 
[   36.087619] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   36.087679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.087695] Hardware name: WinLink E850-96 board (DT)
[   36.087716] Call trace:
[   36.087728]  show_stack+0x20/0x38 (C)
[   36.087764]  dump_stack_lvl+0x8c/0xd0
[   36.087801]  print_report+0x118/0x608
[   36.087839]  kasan_report+0xdc/0x128
[   36.087870]  __asan_report_load1_noabort+0x20/0x30
[   36.087902]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.087936]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   36.087969]  kunit_try_run_case+0x170/0x3f0
[   36.088006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.088045]  kthread+0x328/0x630
[   36.088075]  ret_from_fork+0x10/0x20
[   36.088112] 
[   36.157055] The buggy address belongs to the physical page:
[   36.162611] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b14
[   36.170593] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.178235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.185176] page_type: f8(unknown)
[   36.188571] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.196293] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.204020] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.211831] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.219643] head: 0bfffe0000000002 fffffdffe012c501 00000000ffffffff 00000000ffffffff
[   36.227455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.235261] page dumped because: kasan: bad access detected
[   36.240818] 
[   36.242292] Memory state around the buggy address:
[   36.247074]  ffff000804b15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.254275]  ffff000804b15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.261482] >ffff000804b16000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.268681]                    ^
[   36.271896]  ffff000804b16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.279101]  ffff000804b16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.286303] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   34.871989] ==================================================================
[   34.872176] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   34.872310] Read of size 1 at addr ffff000801e2c140 by task kunit_try_catch/259
[   34.875874] 
[   34.877361] CPU: 5 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   34.877419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.877436] Hardware name: WinLink E850-96 board (DT)
[   34.877458] Call trace:
[   34.877477]  show_stack+0x20/0x38 (C)
[   34.877515]  dump_stack_lvl+0x8c/0xd0
[   34.877552]  print_report+0x118/0x608
[   34.877587]  kasan_report+0xdc/0x128
[   34.877620]  __kasan_check_byte+0x54/0x70
[   34.877653]  kmem_cache_destroy+0x34/0x218
[   34.877689]  kmem_cache_double_destroy+0x174/0x300
[   34.877722]  kunit_try_run_case+0x170/0x3f0
[   34.877756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.877796]  kthread+0x328/0x630
[   34.877826]  ret_from_fork+0x10/0x20
[   34.877862] 
[   34.944970] Allocated by task 259:
[   34.948358]  kasan_save_stack+0x3c/0x68
[   34.952175]  kasan_save_track+0x20/0x40
[   34.955996]  kasan_save_alloc_info+0x40/0x58
[   34.960248]  __kasan_slab_alloc+0xa8/0xb0
[   34.964241]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   34.968841]  __kmem_cache_create_args+0x178/0x280
[   34.973528]  kmem_cache_double_destroy+0xc0/0x300
[   34.978216]  kunit_try_run_case+0x170/0x3f0
[   34.982383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.987851]  kthread+0x328/0x630
[   34.991064]  ret_from_fork+0x10/0x20
[   34.994622] 
[   34.996099] Freed by task 259:
[   34.999137]  kasan_save_stack+0x3c/0x68
[   35.002955]  kasan_save_track+0x20/0x40
[   35.006775]  kasan_save_free_info+0x4c/0x78
[   35.010941]  __kasan_slab_free+0x6c/0x98
[   35.014847]  kmem_cache_free+0x260/0x470
[   35.018754]  slab_kmem_cache_release+0x38/0x50
[   35.023181]  kmem_cache_release+0x1c/0x30
[   35.027174]  kobject_put+0x17c/0x430
[   35.030734]  sysfs_slab_release+0x1c/0x30
[   35.034726]  kmem_cache_destroy+0x118/0x218
[   35.038892]  kmem_cache_double_destroy+0x128/0x300
[   35.043666]  kunit_try_run_case+0x170/0x3f0
[   35.047833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.053302]  kthread+0x328/0x630
[   35.056513]  ret_from_fork+0x10/0x20
[   35.060072] 
[   35.061550] The buggy address belongs to the object at ffff000801e2c140
[   35.061550]  which belongs to the cache kmem_cache of size 208
[   35.073963] The buggy address is located 0 bytes inside of
[   35.073963]  freed 208-byte region [ffff000801e2c140, ffff000801e2c210)
[   35.086027] 
[   35.087505] The buggy address belongs to the physical page:
[   35.093063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2c
[   35.101047] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.108686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.115629] page_type: f5(slab)
[   35.118766] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   35.126484] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.134212] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   35.142022] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.149835] head: 0bfffe0000000001 fffffdffe0078b01 00000000ffffffff 00000000ffffffff
[   35.157647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.165453] page dumped because: kasan: bad access detected
[   35.171010] 
[   35.172483] Memory state around the buggy address:
[   35.177265]  ffff000801e2c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.184467]  ffff000801e2c080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   35.191673] >ffff000801e2c100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   35.198872]                                            ^
[   35.204171]  ffff000801e2c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.211377]  ffff000801e2c200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.218577] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   34.480983] ==================================================================
[   34.481178] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   34.481305] Read of size 1 at addr ffff000801e2e000 by task kunit_try_catch/257
[   34.484694] 
[   34.486181] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   34.486238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.486256] Hardware name: WinLink E850-96 board (DT)
[   34.486275] Call trace:
[   34.486287]  show_stack+0x20/0x38 (C)
[   34.486326]  dump_stack_lvl+0x8c/0xd0
[   34.486364]  print_report+0x118/0x608
[   34.486401]  kasan_report+0xdc/0x128
[   34.486434]  __asan_report_load1_noabort+0x20/0x30
[   34.486468]  kmem_cache_rcu_uaf+0x388/0x468
[   34.486501]  kunit_try_run_case+0x170/0x3f0
[   34.486538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.486579]  kthread+0x328/0x630
[   34.486608]  ret_from_fork+0x10/0x20
[   34.486644] 
[   34.549884] Allocated by task 257:
[   34.553274]  kasan_save_stack+0x3c/0x68
[   34.557089]  kasan_save_track+0x20/0x40
[   34.560908]  kasan_save_alloc_info+0x40/0x58
[   34.565161]  __kasan_slab_alloc+0xa8/0xb0
[   34.569156]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   34.573755]  kmem_cache_rcu_uaf+0x12c/0x468
[   34.577922]  kunit_try_run_case+0x170/0x3f0
[   34.582090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.587557]  kthread+0x328/0x630
[   34.590769]  ret_from_fork+0x10/0x20
[   34.594328] 
[   34.595805] Freed by task 0:
[   34.598672]  kasan_save_stack+0x3c/0x68
[   34.602487]  kasan_save_track+0x20/0x40
[   34.606307]  kasan_save_free_info+0x4c/0x78
[   34.610473]  __kasan_slab_free+0x6c/0x98
[   34.614381]  slab_free_after_rcu_debug+0xd4/0x2f8
[   34.619067]  rcu_core+0x9f4/0x1e20
[   34.622452]  rcu_core_si+0x18/0x30
[   34.625838]  handle_softirqs+0x374/0xb28
[   34.629744]  __do_softirq+0x1c/0x28
[   34.633216] 
[   34.634693] Last potentially related work creation:
[   34.639554]  kasan_save_stack+0x3c/0x68
[   34.643372]  kasan_record_aux_stack+0xb4/0xc8
[   34.647713]  kmem_cache_free+0x120/0x470
[   34.651619]  kmem_cache_rcu_uaf+0x16c/0x468
[   34.655785]  kunit_try_run_case+0x170/0x3f0
[   34.659952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.665422]  kthread+0x328/0x630
[   34.668632]  ret_from_fork+0x10/0x20
[   34.672191] 
[   34.673668] The buggy address belongs to the object at ffff000801e2e000
[   34.673668]  which belongs to the cache test_cache of size 200
[   34.686083] The buggy address is located 0 bytes inside of
[   34.686083]  freed 200-byte region [ffff000801e2e000, ffff000801e2e0c8)
[   34.698146] 
[   34.699624] The buggy address belongs to the physical page:
[   34.705182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2e
[   34.713166] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.720804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.727748] page_type: f5(slab)
[   34.730885] raw: 0bfffe0000000040 ffff00080193e140 dead000000000122 0000000000000000
[   34.738603] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.746332] head: 0bfffe0000000040 ffff00080193e140 dead000000000122 0000000000000000
[   34.754141] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.761954] head: 0bfffe0000000001 fffffdffe0078b81 00000000ffffffff 00000000ffffffff
[   34.769766] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.777571] page dumped because: kasan: bad access detected
[   34.783127] 
[   34.784603] Memory state around the buggy address:
[   34.789385]  ffff000801e2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.796585]  ffff000801e2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.803793] >ffff000801e2e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.810991]                    ^
[   34.814207]  ffff000801e2e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   34.821411]  ffff000801e2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.828614] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   34.095877] ==================================================================
[   34.100244] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   34.107184] Free of addr ffff000801e2e001 by task kunit_try_catch/255
[   34.113605] 
[   34.115093] CPU: 5 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   34.115152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.115170] Hardware name: WinLink E850-96 board (DT)
[   34.115192] Call trace:
[   34.115208]  show_stack+0x20/0x38 (C)
[   34.115247]  dump_stack_lvl+0x8c/0xd0
[   34.115287]  print_report+0x118/0x608
[   34.115322]  kasan_report_invalid_free+0xc0/0xe8
[   34.115358]  check_slab_allocation+0xfc/0x108
[   34.115394]  __kasan_slab_pre_free+0x2c/0x48
[   34.115425]  kmem_cache_free+0xf0/0x470
[   34.115460]  kmem_cache_invalid_free+0x184/0x3c8
[   34.115493]  kunit_try_run_case+0x170/0x3f0
[   34.115528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.115568]  kthread+0x328/0x630
[   34.115600]  ret_from_fork+0x10/0x20
[   34.115638] 
[   34.187910] Allocated by task 255:
[   34.191298]  kasan_save_stack+0x3c/0x68
[   34.195115]  kasan_save_track+0x20/0x40
[   34.198934]  kasan_save_alloc_info+0x40/0x58
[   34.203187]  __kasan_slab_alloc+0xa8/0xb0
[   34.207180]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   34.211781]  kmem_cache_invalid_free+0x12c/0x3c8
[   34.216382]  kunit_try_run_case+0x170/0x3f0
[   34.220548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.226018]  kthread+0x328/0x630
[   34.229229]  ret_from_fork+0x10/0x20
[   34.232788] 
[   34.234265] The buggy address belongs to the object at ffff000801e2e000
[   34.234265]  which belongs to the cache test_cache of size 200
[   34.246678] The buggy address is located 1 bytes inside of
[   34.246678]  200-byte region [ffff000801e2e000, ffff000801e2e0c8)
[   34.258221] 
[   34.259700] The buggy address belongs to the physical page:
[   34.265257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2e
[   34.273242] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.280880] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.287823] page_type: f5(slab)
[   34.290961] raw: 0bfffe0000000040 ffff000801e2c000 dead000000000122 0000000000000000
[   34.298679] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.306407] head: 0bfffe0000000040 ffff000801e2c000 dead000000000122 0000000000000000
[   34.314217] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.322030] head: 0bfffe0000000001 fffffdffe0078b81 00000000ffffffff 00000000ffffffff
[   34.329841] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.337647] page dumped because: kasan: bad access detected
[   34.343204] 
[   34.344678] Memory state around the buggy address:
[   34.349460]  ffff000801e2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.356661]  ffff000801e2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.363868] >ffff000801e2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.371067]                    ^
[   34.374282]  ffff000801e2e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   34.381487]  ffff000801e2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.388689] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   33.759908] ==================================================================
[   33.760083] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   33.760207] Free of addr ffff000803ec2000 by task kunit_try_catch/253
[   33.761614] 
[   33.763102] CPU: 4 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   33.763156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.763172] Hardware name: WinLink E850-96 board (DT)
[   33.763192] Call trace:
[   33.763205]  show_stack+0x20/0x38 (C)
[   33.763240]  dump_stack_lvl+0x8c/0xd0
[   33.763280]  print_report+0x118/0x608
[   33.763319]  kasan_report_invalid_free+0xc0/0xe8
[   33.763355]  check_slab_allocation+0xd4/0x108
[   33.763391]  __kasan_slab_pre_free+0x2c/0x48
[   33.763422]  kmem_cache_free+0xf0/0x470
[   33.763454]  kmem_cache_double_free+0x190/0x3c8
[   33.763486]  kunit_try_run_case+0x170/0x3f0
[   33.763520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.763558]  kthread+0x328/0x630
[   33.763587]  ret_from_fork+0x10/0x20
[   33.763622] 
[   33.835832] Allocated by task 253:
[   33.839220]  kasan_save_stack+0x3c/0x68
[   33.843037]  kasan_save_track+0x20/0x40
[   33.846858]  kasan_save_alloc_info+0x40/0x58
[   33.851110]  __kasan_slab_alloc+0xa8/0xb0
[   33.855103]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   33.859703]  kmem_cache_double_free+0x12c/0x3c8
[   33.864217]  kunit_try_run_case+0x170/0x3f0
[   33.868383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.873852]  kthread+0x328/0x630
[   33.877064]  ret_from_fork+0x10/0x20
[   33.880623] 
[   33.882100] Freed by task 253:
[   33.885138]  kasan_save_stack+0x3c/0x68
[   33.888956]  kasan_save_track+0x20/0x40
[   33.892775]  kasan_save_free_info+0x4c/0x78
[   33.896942]  __kasan_slab_free+0x6c/0x98
[   33.900850]  kmem_cache_free+0x260/0x470
[   33.904754]  kmem_cache_double_free+0x140/0x3c8
[   33.909269]  kunit_try_run_case+0x170/0x3f0
[   33.913435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.918904]  kthread+0x328/0x630
[   33.922115]  ret_from_fork+0x10/0x20
[   33.925674] 
[   33.927153] The buggy address belongs to the object at ffff000803ec2000
[   33.927153]  which belongs to the cache test_cache of size 200
[   33.939565] The buggy address is located 0 bytes inside of
[   33.939565]  200-byte region [ffff000803ec2000, ffff000803ec20c8)
[   33.951108] 
[   33.952586] The buggy address belongs to the physical page:
[   33.958144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883ec2
[   33.966128] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.973768] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.980709] page_type: f5(slab)
[   33.983847] raw: 0bfffe0000000040 ffff000801de7680 dead000000000122 0000000000000000
[   33.991565] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.999293] head: 0bfffe0000000040 ffff000801de7680 dead000000000122 0000000000000000
[   34.007103] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.014916] head: 0bfffe0000000001 fffffdffe00fb081 00000000ffffffff 00000000ffffffff
[   34.022728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.030534] page dumped because: kasan: bad access detected
[   34.036091] 
[   34.037566] Memory state around the buggy address:
[   34.042347]  ffff000803ec1f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.049549]  ffff000803ec1f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   34.056755] >ffff000803ec2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.063953]                    ^
[   34.067169]  ffff000803ec2080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   34.074374]  ffff000803ec2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.081576] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   33.427432] ==================================================================
[   33.436897] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   33.443580] Read of size 1 at addr ffff0008058260c8 by task kunit_try_catch/251
[   33.450869] 
[   33.452355] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   33.452411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.452427] Hardware name: WinLink E850-96 board (DT)
[   33.452450] Call trace:
[   33.452465]  show_stack+0x20/0x38 (C)
[   33.452503]  dump_stack_lvl+0x8c/0xd0
[   33.452541]  print_report+0x118/0x608
[   33.452580]  kasan_report+0xdc/0x128
[   33.452614]  __asan_report_load1_noabort+0x20/0x30
[   33.452648]  kmem_cache_oob+0x344/0x430
[   33.452677]  kunit_try_run_case+0x170/0x3f0
[   33.452714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.452754]  kthread+0x328/0x630
[   33.452782]  ret_from_fork+0x10/0x20
[   33.452819] 
[   33.515712] Allocated by task 251:
[   33.519101]  kasan_save_stack+0x3c/0x68
[   33.522916]  kasan_save_track+0x20/0x40
[   33.526735]  kasan_save_alloc_info+0x40/0x58
[   33.530989]  __kasan_slab_alloc+0xa8/0xb0
[   33.534983]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   33.539582]  kmem_cache_oob+0x12c/0x430
[   33.543402]  kunit_try_run_case+0x170/0x3f0
[   33.547569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.553037]  kthread+0x328/0x630
[   33.556249]  ret_from_fork+0x10/0x20
[   33.559808] 
[   33.561285] The buggy address belongs to the object at ffff000805826000
[   33.561285]  which belongs to the cache test_cache of size 200
[   33.573698] The buggy address is located 0 bytes to the right of
[   33.573698]  allocated 200-byte region [ffff000805826000, ffff0008058260c8)
[   33.586630] 
[   33.588108] The buggy address belongs to the physical page:
[   33.593666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885826
[   33.601650] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.609290] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.616232] page_type: f5(slab)
[   33.619369] raw: 0bfffe0000000040 ffff00080177be00 dead000000000122 0000000000000000
[   33.627088] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.634814] head: 0bfffe0000000040 ffff00080177be00 dead000000000122 0000000000000000
[   33.642627] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.650438] head: 0bfffe0000000001 fffffdffe0160981 00000000ffffffff 00000000ffffffff
[   33.658250] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.666056] page dumped because: kasan: bad access detected
[   33.671613] 
[   33.673087] Memory state around the buggy address:
[   33.677868]  ffff000805825f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.685072]  ffff000805826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.692276] >ffff000805826080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.699476]                                               ^
[   33.705035]  ffff000805826100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.712240]  ffff000805826180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.719441] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   33.091473] ==================================================================
[   33.091629] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   33.095580] Read of size 8 at addr ffff000804990f80 by task kunit_try_catch/244
[   33.102870] 
[   33.104357] CPU: 4 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   33.104411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.104428] Hardware name: WinLink E850-96 board (DT)
[   33.104448] Call trace:
[   33.104465]  show_stack+0x20/0x38 (C)
[   33.104502]  dump_stack_lvl+0x8c/0xd0
[   33.104538]  print_report+0x118/0x608
[   33.104575]  kasan_report+0xdc/0x128
[   33.104607]  __asan_report_load8_noabort+0x20/0x30
[   33.104640]  workqueue_uaf+0x480/0x4a8
[   33.104671]  kunit_try_run_case+0x170/0x3f0
[   33.104711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.104748]  kthread+0x328/0x630
[   33.104773]  ret_from_fork+0x10/0x20
[   33.104809] 
[   33.167626] Allocated by task 244:
[   33.171015]  kasan_save_stack+0x3c/0x68
[   33.174831]  kasan_save_track+0x20/0x40
[   33.178652]  kasan_save_alloc_info+0x40/0x58
[   33.182904]  __kasan_kmalloc+0xd4/0xd8
[   33.186636]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.191150]  workqueue_uaf+0x13c/0x4a8
[   33.194883]  kunit_try_run_case+0x170/0x3f0
[   33.199049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.204518]  kthread+0x328/0x630
[   33.207730]  ret_from_fork+0x10/0x20
[   33.211289] 
[   33.212763] Freed by task 118:
[   33.215804]  kasan_save_stack+0x3c/0x68
[   33.219622]  kasan_save_track+0x20/0x40
[   33.223441]  kasan_save_free_info+0x4c/0x78
[   33.227608]  __kasan_slab_free+0x6c/0x98
[   33.231514]  kfree+0x214/0x3c8
[   33.234552]  workqueue_uaf_work+0x18/0x30
[   33.238545]  process_one_work+0x530/0xf98
[   33.242539]  worker_thread+0x8ac/0xf28
[   33.246271]  kthread+0x328/0x630
[   33.249483]  ret_from_fork+0x10/0x20
[   33.253042] 
[   33.254519] Last potentially related work creation:
[   33.259380]  kasan_save_stack+0x3c/0x68
[   33.263198]  kasan_record_aux_stack+0xb4/0xc8
[   33.267538]  __queue_work+0x65c/0x1010
[   33.271271]  queue_work_on+0xbc/0xf8
[   33.274830]  workqueue_uaf+0x210/0x4a8
[   33.278562]  kunit_try_run_case+0x170/0x3f0
[   33.282728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.288197]  kthread+0x328/0x630
[   33.291409]  ret_from_fork+0x10/0x20
[   33.294968] 
[   33.296445] The buggy address belongs to the object at ffff000804990f80
[   33.296445]  which belongs to the cache kmalloc-32 of size 32
[   33.308770] The buggy address is located 0 bytes inside of
[   33.308770]  freed 32-byte region [ffff000804990f80, ffff000804990fa0)
[   33.320749] 
[   33.322227] The buggy address belongs to the physical page:
[   33.327785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884990
[   33.335771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.342278] page_type: f5(slab)
[   33.345415] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   33.353133] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.360854] page dumped because: kasan: bad access detected
[   33.366409] 
[   33.367883] Memory state around the buggy address:
[   33.372665]  ffff000804990e80: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   33.379866]  ffff000804990f00: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   33.387071] >ffff000804990f80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.394272]                    ^
[   33.397489]  ffff000804991000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.404692]  ffff000804991080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.411893] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   32.712801] ==================================================================
[   32.712971] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   32.713086] Read of size 4 at addr ffff000805002440 by task swapper/5/0
[   32.714161] 
[   32.715647] CPU: 5 UID: 0 PID: 0 Comm: swapper/5 Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   32.715700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.715717] Hardware name: WinLink E850-96 board (DT)
[   32.715737] Call trace:
[   32.715750]  show_stack+0x20/0x38 (C)
[   32.715784]  dump_stack_lvl+0x8c/0xd0
[   32.715824]  print_report+0x118/0x608
[   32.715859]  kasan_report+0xdc/0x128
[   32.715889]  __asan_report_load4_noabort+0x20/0x30
[   32.715923]  rcu_uaf_reclaim+0x64/0x70
[   32.715952]  rcu_core+0x9f4/0x1e20
[   32.715986]  rcu_core_si+0x18/0x30
[   32.716014]  handle_softirqs+0x374/0xb28
[   32.716049]  __do_softirq+0x1c/0x28
[   32.716077]  ____do_softirq+0x18/0x30
[   32.716112]  call_on_irq_stack+0x24/0x30
[   32.716143]  do_softirq_own_stack+0x24/0x38
[   32.716172]  __irq_exit_rcu+0x1fc/0x318
[   32.716203]  irq_exit_rcu+0x1c/0x80
[   32.716232]  el1_interrupt+0x38/0x58
[   32.716261]  el1h_64_irq_handler+0x18/0x28
[   32.716291]  el1h_64_irq+0x6c/0x70
[   32.716320]  arch_local_irq_enable+0x4/0x8 (P)
[   32.716353]  do_idle+0x384/0x4e8
[   32.716384]  cpu_startup_entry+0x68/0x80
[   32.716416]  secondary_start_kernel+0x288/0x340
[   32.716449]  __secondary_switched+0xc0/0xc8
[   32.716492] 
[   32.826226] Allocated by task 242:
[   32.829613]  kasan_save_stack+0x3c/0x68
[   32.833430]  kasan_save_track+0x20/0x40
[   32.837249]  kasan_save_alloc_info+0x40/0x58
[   32.841503]  __kasan_kmalloc+0xd4/0xd8
[   32.845237]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.849749]  rcu_uaf+0xb0/0x2d8
[   32.852874]  kunit_try_run_case+0x170/0x3f0
[   32.857041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.862509]  kthread+0x328/0x630
[   32.865721]  ret_from_fork+0x10/0x20
[   32.869280] 
[   32.870756] Freed by task 0:
[   32.873623]  kasan_save_stack+0x3c/0x68
[   32.877440]  kasan_save_track+0x20/0x40
[   32.881259]  kasan_save_free_info+0x4c/0x78
[   32.885426]  __kasan_slab_free+0x6c/0x98
[   32.889332]  kfree+0x214/0x3c8
[   32.892370]  rcu_uaf_reclaim+0x28/0x70
[   32.896103]  rcu_core+0x9f4/0x1e20
[   32.899488]  rcu_core_si+0x18/0x30
[   32.902875]  handle_softirqs+0x374/0xb28
[   32.906780]  __do_softirq+0x1c/0x28
[   32.910252] 
[   32.911729] Last potentially related work creation:
[   32.916590]  kasan_save_stack+0x3c/0x68
[   32.920408]  kasan_record_aux_stack+0xb4/0xc8
[   32.924748]  __call_rcu_common.constprop.0+0x70/0x8b0
[   32.929783]  call_rcu+0x18/0x30
[   32.932908]  rcu_uaf+0x14c/0x2d8
[   32.936119]  kunit_try_run_case+0x170/0x3f0
[   32.940286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.945755]  kthread+0x328/0x630
[   32.948966]  ret_from_fork+0x10/0x20
[   32.952526] 
[   32.954002] The buggy address belongs to the object at ffff000805002440
[   32.954002]  which belongs to the cache kmalloc-32 of size 32
[   32.966329] The buggy address is located 0 bytes inside of
[   32.966329]  freed 32-byte region [ffff000805002440, ffff000805002460)
[   32.978306] 
[   32.979784] The buggy address belongs to the physical page:
[   32.985342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885002
[   32.993327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.999835] page_type: f5(slab)
[   33.002972] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   33.010691] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.018410] page dumped because: kasan: bad access detected
[   33.023966] 
[   33.025441] Memory state around the buggy address:
[   33.030222]  ffff000805002300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.037423]  ffff000805002380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.044630] >ffff000805002400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.051829]                                            ^
[   33.057128]  ffff000805002480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.064333]  ffff000805002500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.071535] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   32.351317] ==================================================================
[   32.358415] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   32.364748] Read of size 1 at addr ffff000803eb5978 by task kunit_try_catch/240
[   32.372039] 
[   32.373521] CPU: 4 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   32.373575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.373589] Hardware name: WinLink E850-96 board (DT)
[   32.373609] Call trace:
[   32.373619]  show_stack+0x20/0x38 (C)
[   32.373652]  dump_stack_lvl+0x8c/0xd0
[   32.373689]  print_report+0x118/0x608
[   32.373723]  kasan_report+0xdc/0x128
[   32.373756]  __asan_report_load1_noabort+0x20/0x30
[   32.373785]  ksize_uaf+0x544/0x5f8
[   32.373813]  kunit_try_run_case+0x170/0x3f0
[   32.373847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.373885]  kthread+0x328/0x630
[   32.373912]  ret_from_fork+0x10/0x20
[   32.373944] 
[   32.436448] Allocated by task 240:
[   32.439834]  kasan_save_stack+0x3c/0x68
[   32.443653]  kasan_save_track+0x20/0x40
[   32.447472]  kasan_save_alloc_info+0x40/0x58
[   32.451726]  __kasan_kmalloc+0xd4/0xd8
[   32.455458]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.459972]  ksize_uaf+0xb8/0x5f8
[   32.463270]  kunit_try_run_case+0x170/0x3f0
[   32.467437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.472906]  kthread+0x328/0x630
[   32.476118]  ret_from_fork+0x10/0x20
[   32.479677] 
[   32.481152] Freed by task 240:
[   32.484190]  kasan_save_stack+0x3c/0x68
[   32.488010]  kasan_save_track+0x20/0x40
[   32.491829]  kasan_save_free_info+0x4c/0x78
[   32.495996]  __kasan_slab_free+0x6c/0x98
[   32.499902]  kfree+0x214/0x3c8
[   32.502940]  ksize_uaf+0x11c/0x5f8
[   32.506326]  kunit_try_run_case+0x170/0x3f0
[   32.510492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.515961]  kthread+0x328/0x630
[   32.519172]  ret_from_fork+0x10/0x20
[   32.522732] 
[   32.524208] The buggy address belongs to the object at ffff000803eb5900
[   32.524208]  which belongs to the cache kmalloc-128 of size 128
[   32.536707] The buggy address is located 120 bytes inside of
[   32.536707]  freed 128-byte region [ffff000803eb5900, ffff000803eb5980)
[   32.548946] 
[   32.550424] The buggy address belongs to the physical page:
[   32.555980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   32.563964] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.571602] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.578548] page_type: f5(slab)
[   32.581681] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.589404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.597130] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.604941] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.612754] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   32.620566] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.628372] page dumped because: kasan: bad access detected
[   32.633927] 
[   32.635403] Memory state around the buggy address:
[   32.640181]  ffff000803eb5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.647386]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.654591] >ffff000803eb5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.661792]                                                                 ^
[   32.668913]  ffff000803eb5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676118]  ffff000803eb5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.683319] ==================================================================
[   31.676050] ==================================================================
[   31.685856] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.692190] Read of size 1 at addr ffff000803eb5900 by task kunit_try_catch/240
[   31.699480] 
[   31.700964] CPU: 4 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.701016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.701031] Hardware name: WinLink E850-96 board (DT)
[   31.701051] Call trace:
[   31.701066]  show_stack+0x20/0x38 (C)
[   31.701104]  dump_stack_lvl+0x8c/0xd0
[   31.701142]  print_report+0x118/0x608
[   31.701178]  kasan_report+0xdc/0x128
[   31.701208]  __kasan_check_byte+0x54/0x70
[   31.701243]  ksize+0x30/0x88
[   31.701277]  ksize_uaf+0x168/0x5f8
[   31.701305]  kunit_try_run_case+0x170/0x3f0
[   31.701342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.701380]  kthread+0x328/0x630
[   31.701408]  ret_from_fork+0x10/0x20
[   31.701444] 
[   31.765973] Allocated by task 240:
[   31.769360]  kasan_save_stack+0x3c/0x68
[   31.773176]  kasan_save_track+0x20/0x40
[   31.776996]  kasan_save_alloc_info+0x40/0x58
[   31.781250]  __kasan_kmalloc+0xd4/0xd8
[   31.784982]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.789496]  ksize_uaf+0xb8/0x5f8
[   31.792794]  kunit_try_run_case+0x170/0x3f0
[   31.796961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.802429]  kthread+0x328/0x630
[   31.805642]  ret_from_fork+0x10/0x20
[   31.809200] 
[   31.810676] Freed by task 240:
[   31.813716]  kasan_save_stack+0x3c/0x68
[   31.817534]  kasan_save_track+0x20/0x40
[   31.821353]  kasan_save_free_info+0x4c/0x78
[   31.825520]  __kasan_slab_free+0x6c/0x98
[   31.829426]  kfree+0x214/0x3c8
[   31.832464]  ksize_uaf+0x11c/0x5f8
[   31.835850]  kunit_try_run_case+0x170/0x3f0
[   31.840016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.845485]  kthread+0x328/0x630
[   31.848696]  ret_from_fork+0x10/0x20
[   31.852256] 
[   31.853734] The buggy address belongs to the object at ffff000803eb5900
[   31.853734]  which belongs to the cache kmalloc-128 of size 128
[   31.866233] The buggy address is located 0 bytes inside of
[   31.866233]  freed 128-byte region [ffff000803eb5900, ffff000803eb5980)
[   31.878296] 
[   31.879776] The buggy address belongs to the physical page:
[   31.885332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   31.893317] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.900956] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.907899] page_type: f5(slab)
[   31.911036] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.918754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.926481] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.934292] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.942105] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   31.949917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.957723] page dumped because: kasan: bad access detected
[   31.963279] 
[   31.964754] Memory state around the buggy address:
[   31.969533]  ffff000803eb5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.976736]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.983941] >ffff000803eb5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.991142]                    ^
[   31.994358]  ffff000803eb5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.001563]  ffff000803eb5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.008763] ==================================================================
[   32.016297] ==================================================================
[   32.023178] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   32.029510] Read of size 1 at addr ffff000803eb5900 by task kunit_try_catch/240
[   32.036801] 
[   32.038284] CPU: 4 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   32.038340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.038356] Hardware name: WinLink E850-96 board (DT)
[   32.038375] Call trace:
[   32.038386]  show_stack+0x20/0x38 (C)
[   32.038421]  dump_stack_lvl+0x8c/0xd0
[   32.038457]  print_report+0x118/0x608
[   32.038490]  kasan_report+0xdc/0x128
[   32.038522]  __asan_report_load1_noabort+0x20/0x30
[   32.038554]  ksize_uaf+0x598/0x5f8
[   32.038582]  kunit_try_run_case+0x170/0x3f0
[   32.038615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.038653]  kthread+0x328/0x630
[   32.038679]  ret_from_fork+0x10/0x20
[   32.038710] 
[   32.101211] Allocated by task 240:
[   32.104596]  kasan_save_stack+0x3c/0x68
[   32.108415]  kasan_save_track+0x20/0x40
[   32.112234]  kasan_save_alloc_info+0x40/0x58
[   32.116487]  __kasan_kmalloc+0xd4/0xd8
[   32.120220]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.124734]  ksize_uaf+0xb8/0x5f8
[   32.128032]  kunit_try_run_case+0x170/0x3f0
[   32.132199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.137667]  kthread+0x328/0x630
[   32.140879]  ret_from_fork+0x10/0x20
[   32.144438] 
[   32.145914] Freed by task 240:
[   32.148952]  kasan_save_stack+0x3c/0x68
[   32.152771]  kasan_save_track+0x20/0x40
[   32.156591]  kasan_save_free_info+0x4c/0x78
[   32.160757]  __kasan_slab_free+0x6c/0x98
[   32.164664]  kfree+0x214/0x3c8
[   32.167702]  ksize_uaf+0x11c/0x5f8
[   32.171087]  kunit_try_run_case+0x170/0x3f0
[   32.175254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.180723]  kthread+0x328/0x630
[   32.183935]  ret_from_fork+0x10/0x20
[   32.187493] 
[   32.188971] The buggy address belongs to the object at ffff000803eb5900
[   32.188971]  which belongs to the cache kmalloc-128 of size 128
[   32.201469] The buggy address is located 0 bytes inside of
[   32.201469]  freed 128-byte region [ffff000803eb5900, ffff000803eb5980)
[   32.213535] 
[   32.215012] The buggy address belongs to the physical page:
[   32.220571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   32.228552] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.236191] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.243136] page_type: f5(slab)
[   32.246271] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.253992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.261718] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.269530] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.277343] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   32.285154] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.292960] page dumped because: kasan: bad access detected
[   32.298517] 
[   32.299991] Memory state around the buggy address:
[   32.304770]  ffff000803eb5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.311975]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.319179] >ffff000803eb5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.326380]                    ^
[   32.329596]  ffff000803eb5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.336802]  ffff000803eb5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.344003] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   31.073984] ==================================================================
[   31.081004] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   31.088378] Read of size 1 at addr ffff000803eb5878 by task kunit_try_catch/238
[   31.095670] 
[   31.097155] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.097210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.097225] Hardware name: WinLink E850-96 board (DT)
[   31.097246] Call trace:
[   31.097260]  show_stack+0x20/0x38 (C)
[   31.097295]  dump_stack_lvl+0x8c/0xd0
[   31.097331]  print_report+0x118/0x608
[   31.097366]  kasan_report+0xdc/0x128
[   31.097398]  __asan_report_load1_noabort+0x20/0x30
[   31.097429]  ksize_unpoisons_memory+0x618/0x740
[   31.097460]  kunit_try_run_case+0x170/0x3f0
[   31.097494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.097532]  kthread+0x328/0x630
[   31.097560]  ret_from_fork+0x10/0x20
[   31.097596] 
[   31.161207] Allocated by task 238:
[   31.164595]  kasan_save_stack+0x3c/0x68
[   31.168412]  kasan_save_track+0x20/0x40
[   31.172231]  kasan_save_alloc_info+0x40/0x58
[   31.176484]  __kasan_kmalloc+0xd4/0xd8
[   31.180217]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.184731]  ksize_unpoisons_memory+0xc0/0x740
[   31.189157]  kunit_try_run_case+0x170/0x3f0
[   31.193325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.198793]  kthread+0x328/0x630
[   31.202005]  ret_from_fork+0x10/0x20
[   31.205564] 
[   31.207039] The buggy address belongs to the object at ffff000803eb5800
[   31.207039]  which belongs to the cache kmalloc-128 of size 128
[   31.219539] The buggy address is located 5 bytes to the right of
[   31.219539]  allocated 115-byte region [ffff000803eb5800, ffff000803eb5873)
[   31.232473] 
[   31.233951] The buggy address belongs to the physical page:
[   31.239507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   31.247492] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.255129] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.262075] page_type: f5(slab)
[   31.265210] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.272930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.280657] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.288468] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.296281] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   31.304093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.311899] page dumped because: kasan: bad access detected
[   31.317456] 
[   31.318930] Memory state around the buggy address:
[   31.323709]  ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.330913]  ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.338117] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.345319]                                                                 ^
[   31.352440]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.359645]  ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.366846] ==================================================================
[   30.771339] ==================================================================
[   30.781008] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.788384] Read of size 1 at addr ffff000803eb5873 by task kunit_try_catch/238
[   30.795675] 
[   30.797163] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.797221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.797236] Hardware name: WinLink E850-96 board (DT)
[   30.797256] Call trace:
[   30.797273]  show_stack+0x20/0x38 (C)
[   30.797310]  dump_stack_lvl+0x8c/0xd0
[   30.797351]  print_report+0x118/0x608
[   30.797387]  kasan_report+0xdc/0x128
[   30.797418]  __asan_report_load1_noabort+0x20/0x30
[   30.797448]  ksize_unpoisons_memory+0x628/0x740
[   30.797481]  kunit_try_run_case+0x170/0x3f0
[   30.797519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.797559]  kthread+0x328/0x630
[   30.797590]  ret_from_fork+0x10/0x20
[   30.797627] 
[   30.861211] Allocated by task 238:
[   30.864599]  kasan_save_stack+0x3c/0x68
[   30.868416]  kasan_save_track+0x20/0x40
[   30.872235]  kasan_save_alloc_info+0x40/0x58
[   30.876489]  __kasan_kmalloc+0xd4/0xd8
[   30.880223]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.884735]  ksize_unpoisons_memory+0xc0/0x740
[   30.889162]  kunit_try_run_case+0x170/0x3f0
[   30.893329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.898798]  kthread+0x328/0x630
[   30.902009]  ret_from_fork+0x10/0x20
[   30.905568] 
[   30.907046] The buggy address belongs to the object at ffff000803eb5800
[   30.907046]  which belongs to the cache kmalloc-128 of size 128
[   30.919547] The buggy address is located 0 bytes to the right of
[   30.919547]  allocated 115-byte region [ffff000803eb5800, ffff000803eb5873)
[   30.932477] 
[   30.933956] The buggy address belongs to the physical page:
[   30.939514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   30.947497] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.955137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.962079] page_type: f5(slab)
[   30.965217] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.972935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.980663] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.988473] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.996286] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   31.004097] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.011903] page dumped because: kasan: bad access detected
[   31.017460] 
[   31.018934] Memory state around the buggy address:
[   31.023715]  ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.030917]  ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.038122] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.045323]                                                              ^
[   31.052184]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.059389]  ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.066590] ==================================================================
[   31.374165] ==================================================================
[   31.381260] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.388637] Read of size 1 at addr ffff000803eb587f by task kunit_try_catch/238
[   31.395925] 
[   31.397410] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.397462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.397479] Hardware name: WinLink E850-96 board (DT)
[   31.397499] Call trace:
[   31.397511]  show_stack+0x20/0x38 (C)
[   31.397546]  dump_stack_lvl+0x8c/0xd0
[   31.397582]  print_report+0x118/0x608
[   31.397619]  kasan_report+0xdc/0x128
[   31.397651]  __asan_report_load1_noabort+0x20/0x30
[   31.397679]  ksize_unpoisons_memory+0x690/0x740
[   31.397710]  kunit_try_run_case+0x170/0x3f0
[   31.397743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.397783]  kthread+0x328/0x630
[   31.397811]  ret_from_fork+0x10/0x20
[   31.397846] 
[   31.461463] Allocated by task 238:
[   31.464848]  kasan_save_stack+0x3c/0x68
[   31.468668]  kasan_save_track+0x20/0x40
[   31.472487]  kasan_save_alloc_info+0x40/0x58
[   31.476740]  __kasan_kmalloc+0xd4/0xd8
[   31.480473]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.484987]  ksize_unpoisons_memory+0xc0/0x740
[   31.489414]  kunit_try_run_case+0x170/0x3f0
[   31.493580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.499049]  kthread+0x328/0x630
[   31.502261]  ret_from_fork+0x10/0x20
[   31.505820] 
[   31.507297] The buggy address belongs to the object at ffff000803eb5800
[   31.507297]  which belongs to the cache kmalloc-128 of size 128
[   31.519796] The buggy address is located 12 bytes to the right of
[   31.519796]  allocated 115-byte region [ffff000803eb5800, ffff000803eb5873)
[   31.532816] 
[   31.534295] The buggy address belongs to the physical page:
[   31.539850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   31.547836] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.555473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.562416] page_type: f5(slab)
[   31.565552] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.573273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.581001] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.588811] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.596624] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   31.604436] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.612242] page dumped because: kasan: bad access detected
[   31.617798] 
[   31.619273] Memory state around the buggy address:
[   31.624053]  ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.631256]  ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.638460] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.645661]                                                                 ^
[   31.652782]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.659987]  ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.667189] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   30.457547] ==================================================================
[   30.464520] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   30.470506] Free of addr ffff00080147da00 by task kunit_try_catch/236
[   30.476929] 
[   30.478412] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.478462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.478476] Hardware name: WinLink E850-96 board (DT)
[   30.478498] Call trace:
[   30.478510]  show_stack+0x20/0x38 (C)
[   30.478546]  dump_stack_lvl+0x8c/0xd0
[   30.478584]  print_report+0x118/0x608
[   30.478617]  kasan_report_invalid_free+0xc0/0xe8
[   30.478650]  check_slab_allocation+0xd4/0x108
[   30.478684]  __kasan_slab_pre_free+0x2c/0x48
[   30.478715]  kfree+0xe8/0x3c8
[   30.478746]  kfree_sensitive+0x3c/0xb0
[   30.478776]  kmalloc_double_kzfree+0x168/0x308
[   30.478807]  kunit_try_run_case+0x170/0x3f0
[   30.478843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.478884]  kthread+0x328/0x630
[   30.478911]  ret_from_fork+0x10/0x20
[   30.478946] 
[   30.553924] Allocated by task 236:
[   30.557313]  kasan_save_stack+0x3c/0x68
[   30.561129]  kasan_save_track+0x20/0x40
[   30.564948]  kasan_save_alloc_info+0x40/0x58
[   30.569202]  __kasan_kmalloc+0xd4/0xd8
[   30.572935]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.577448]  kmalloc_double_kzfree+0xb8/0x308
[   30.581788]  kunit_try_run_case+0x170/0x3f0
[   30.585955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.591424]  kthread+0x328/0x630
[   30.594636]  ret_from_fork+0x10/0x20
[   30.598195] 
[   30.599670] Freed by task 236:
[   30.602708]  kasan_save_stack+0x3c/0x68
[   30.606528]  kasan_save_track+0x20/0x40
[   30.610347]  kasan_save_free_info+0x4c/0x78
[   30.614514]  __kasan_slab_free+0x6c/0x98
[   30.618421]  kfree+0x214/0x3c8
[   30.621458]  kfree_sensitive+0x80/0xb0
[   30.625191]  kmalloc_double_kzfree+0x11c/0x308
[   30.629617]  kunit_try_run_case+0x170/0x3f0
[   30.633784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.639253]  kthread+0x328/0x630
[   30.642465]  ret_from_fork+0x10/0x20
[   30.646024] 
[   30.647501] The buggy address belongs to the object at ffff00080147da00
[   30.647501]  which belongs to the cache kmalloc-16 of size 16
[   30.659829] The buggy address is located 0 bytes inside of
[   30.659829]  16-byte region [ffff00080147da00, ffff00080147da10)
[   30.671283] 
[   30.672761] The buggy address belongs to the physical page:
[   30.678319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88147d
[   30.686304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.692811] page_type: f5(slab)
[   30.695947] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   30.703668] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.711387] page dumped because: kasan: bad access detected
[   30.716944] 
[   30.718418] Memory state around the buggy address:
[   30.723200]  ffff00080147d900: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.730401]  ffff00080147d980: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.737607] >ffff00080147da00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.744807]                    ^
[   30.748022]  ffff00080147da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.755227]  ffff00080147db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.762428] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   30.144184] ==================================================================
[   30.158017] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.165392] Read of size 1 at addr ffff00080147da00 by task kunit_try_catch/236
[   30.172681] 
[   30.174169] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.174225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.174242] Hardware name: WinLink E850-96 board (DT)
[   30.174263] Call trace:
[   30.174277]  show_stack+0x20/0x38 (C)
[   30.174318]  dump_stack_lvl+0x8c/0xd0
[   30.174356]  print_report+0x118/0x608
[   30.174395]  kasan_report+0xdc/0x128
[   30.174427]  __kasan_check_byte+0x54/0x70
[   30.174459]  kfree_sensitive+0x30/0xb0
[   30.174494]  kmalloc_double_kzfree+0x168/0x308
[   30.174524]  kunit_try_run_case+0x170/0x3f0
[   30.174559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.174597]  kthread+0x328/0x630
[   30.174628]  ret_from_fork+0x10/0x20
[   30.174663] 
[   30.241082] Allocated by task 236:
[   30.244471]  kasan_save_stack+0x3c/0x68
[   30.248286]  kasan_save_track+0x20/0x40
[   30.252107]  kasan_save_alloc_info+0x40/0x58
[   30.256359]  __kasan_kmalloc+0xd4/0xd8
[   30.260092]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.264606]  kmalloc_double_kzfree+0xb8/0x308
[   30.268946]  kunit_try_run_case+0x170/0x3f0
[   30.273112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.278581]  kthread+0x328/0x630
[   30.281793]  ret_from_fork+0x10/0x20
[   30.285352] 
[   30.286827] Freed by task 236:
[   30.289866]  kasan_save_stack+0x3c/0x68
[   30.293685]  kasan_save_track+0x20/0x40
[   30.297504]  kasan_save_free_info+0x4c/0x78
[   30.301671]  __kasan_slab_free+0x6c/0x98
[   30.305579]  kfree+0x214/0x3c8
[   30.308615]  kfree_sensitive+0x80/0xb0
[   30.312348]  kmalloc_double_kzfree+0x11c/0x308
[   30.316774]  kunit_try_run_case+0x170/0x3f0
[   30.320942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.326410]  kthread+0x328/0x630
[   30.329622]  ret_from_fork+0x10/0x20
[   30.333181] 
[   30.334658] The buggy address belongs to the object at ffff00080147da00
[   30.334658]  which belongs to the cache kmalloc-16 of size 16
[   30.346985] The buggy address is located 0 bytes inside of
[   30.346985]  freed 16-byte region [ffff00080147da00, ffff00080147da10)
[   30.358962] 
[   30.360441] The buggy address belongs to the physical page:
[   30.365998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88147d
[   30.373982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.380491] page_type: f5(slab)
[   30.383627] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   30.391347] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.399067] page dumped because: kasan: bad access detected
[   30.404622] 
[   30.406096] Memory state around the buggy address:
[   30.410879]  ffff00080147d900: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.418080]  ffff00080147d980: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.425285] >ffff00080147da00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.432485]                    ^
[   30.435701]  ffff00080147da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.442905]  ffff00080147db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.450107] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   29.840002] ==================================================================
[   29.849338] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   29.855932] Read of size 1 at addr ffff000800c2e128 by task kunit_try_catch/232
[   29.863223] 
[   29.864708] CPU: 5 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.864764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.864779] Hardware name: WinLink E850-96 board (DT)
[   29.864800] Call trace:
[   29.864812]  show_stack+0x20/0x38 (C)
[   29.864848]  dump_stack_lvl+0x8c/0xd0
[   29.864885]  print_report+0x118/0x608
[   29.864921]  kasan_report+0xdc/0x128
[   29.864951]  __asan_report_load1_noabort+0x20/0x30
[   29.864985]  kmalloc_uaf2+0x3f4/0x468
[   29.865012]  kunit_try_run_case+0x170/0x3f0
[   29.865046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.865086]  kthread+0x328/0x630
[   29.865115]  ret_from_fork+0x10/0x20
[   29.865150] 
[   29.927892] Allocated by task 232:
[   29.931280]  kasan_save_stack+0x3c/0x68
[   29.935096]  kasan_save_track+0x20/0x40
[   29.938918]  kasan_save_alloc_info+0x40/0x58
[   29.943170]  __kasan_kmalloc+0xd4/0xd8
[   29.946902]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.951416]  kmalloc_uaf2+0xc4/0x468
[   29.954975]  kunit_try_run_case+0x170/0x3f0
[   29.959142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.964610]  kthread+0x328/0x630
[   29.967822]  ret_from_fork+0x10/0x20
[   29.971381] 
[   29.972856] Freed by task 232:
[   29.975895]  kasan_save_stack+0x3c/0x68
[   29.979714]  kasan_save_track+0x20/0x40
[   29.983533]  kasan_save_free_info+0x4c/0x78
[   29.987700]  __kasan_slab_free+0x6c/0x98
[   29.991608]  kfree+0x214/0x3c8
[   29.994644]  kmalloc_uaf2+0x134/0x468
[   29.998290]  kunit_try_run_case+0x170/0x3f0
[   30.002457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.007926]  kthread+0x328/0x630
[   30.011137]  ret_from_fork+0x10/0x20
[   30.014696] 
[   30.016173] The buggy address belongs to the object at ffff000800c2e100
[   30.016173]  which belongs to the cache kmalloc-64 of size 64
[   30.028500] The buggy address is located 40 bytes inside of
[   30.028500]  freed 64-byte region [ffff000800c2e100, ffff000800c2e140)
[   30.040564] 
[   30.042043] The buggy address belongs to the physical page:
[   30.047599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   30.055585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.062091] page_type: f5(slab)
[   30.065229] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   30.072948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.080667] page dumped because: kasan: bad access detected
[   30.086224] 
[   30.087698] Memory state around the buggy address:
[   30.092480]  ffff000800c2e000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.099681]  ffff000800c2e080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.106886] >ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.114087]                                   ^
[   30.118605]  ffff000800c2e180: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   30.125810]  ffff000800c2e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.133012] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   29.534679] ==================================================================
[   29.543615] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   29.550728] Write of size 33 at addr ffff000804991680 by task kunit_try_catch/230
[   29.558193] 
[   29.559677] CPU: 4 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.559736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.559754] Hardware name: WinLink E850-96 board (DT)
[   29.559777] Call trace:
[   29.559794]  show_stack+0x20/0x38 (C)
[   29.559828]  dump_stack_lvl+0x8c/0xd0
[   29.559864]  print_report+0x118/0x608
[   29.559900]  kasan_report+0xdc/0x128
[   29.559932]  kasan_check_range+0x100/0x1a8
[   29.559968]  __asan_memset+0x34/0x78
[   29.559997]  kmalloc_uaf_memset+0x170/0x310
[   29.560028]  kunit_try_run_case+0x170/0x3f0
[   29.560064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.560103]  kthread+0x328/0x630
[   29.560136]  ret_from_fork+0x10/0x20
[   29.560171] 
[   29.626247] Allocated by task 230:
[   29.629634]  kasan_save_stack+0x3c/0x68
[   29.633452]  kasan_save_track+0x20/0x40
[   29.637271]  kasan_save_alloc_info+0x40/0x58
[   29.641525]  __kasan_kmalloc+0xd4/0xd8
[   29.645257]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.649771]  kmalloc_uaf_memset+0xb8/0x310
[   29.653852]  kunit_try_run_case+0x170/0x3f0
[   29.658018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.663486]  kthread+0x328/0x630
[   29.666698]  ret_from_fork+0x10/0x20
[   29.670257] 
[   29.671733] Freed by task 230:
[   29.674773]  kasan_save_stack+0x3c/0x68
[   29.678590]  kasan_save_track+0x20/0x40
[   29.682410]  kasan_save_free_info+0x4c/0x78
[   29.686576]  __kasan_slab_free+0x6c/0x98
[   29.690482]  kfree+0x214/0x3c8
[   29.693520]  kmalloc_uaf_memset+0x11c/0x310
[   29.697687]  kunit_try_run_case+0x170/0x3f0
[   29.701854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.707324]  kthread+0x328/0x630
[   29.710534]  ret_from_fork+0x10/0x20
[   29.714093] 
[   29.715571] The buggy address belongs to the object at ffff000804991680
[   29.715571]  which belongs to the cache kmalloc-64 of size 64
[   29.727897] The buggy address is located 0 bytes inside of
[   29.727897]  freed 64-byte region [ffff000804991680, ffff0008049916c0)
[   29.739874] 
[   29.741352] The buggy address belongs to the physical page:
[   29.746910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884991
[   29.754893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.761403] page_type: f5(slab)
[   29.764540] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.772258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.779979] page dumped because: kasan: bad access detected
[   29.785534] 
[   29.787008] Memory state around the buggy address:
[   29.791788]  ffff000804991580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.798991]  ffff000804991600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.806196] >ffff000804991680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.813397]                    ^
[   29.816613]  ffff000804991700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.823817]  ffff000804991780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.831018] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   29.233275] ==================================================================
[   29.243704] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   29.250215] Read of size 1 at addr ffff00080444cc08 by task kunit_try_catch/228
[   29.257504] 
[   29.258988] CPU: 4 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.259045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.259063] Hardware name: WinLink E850-96 board (DT)
[   29.259084] Call trace:
[   29.259100]  show_stack+0x20/0x38 (C)
[   29.259136]  dump_stack_lvl+0x8c/0xd0
[   29.259174]  print_report+0x118/0x608
[   29.259211]  kasan_report+0xdc/0x128
[   29.259244]  __asan_report_load1_noabort+0x20/0x30
[   29.259274]  kmalloc_uaf+0x300/0x338
[   29.259301]  kunit_try_run_case+0x170/0x3f0
[   29.259337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.259375]  kthread+0x328/0x630
[   29.259405]  ret_from_fork+0x10/0x20
[   29.259438] 
[   29.322085] Allocated by task 228:
[   29.325474]  kasan_save_stack+0x3c/0x68
[   29.329290]  kasan_save_track+0x20/0x40
[   29.333109]  kasan_save_alloc_info+0x40/0x58
[   29.337363]  __kasan_kmalloc+0xd4/0xd8
[   29.341095]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.345609]  kmalloc_uaf+0xb8/0x338
[   29.349081]  kunit_try_run_case+0x170/0x3f0
[   29.353248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.358717]  kthread+0x328/0x630
[   29.361928]  ret_from_fork+0x10/0x20
[   29.365487] 
[   29.366964] Freed by task 228:
[   29.370003]  kasan_save_stack+0x3c/0x68
[   29.373821]  kasan_save_track+0x20/0x40
[   29.377640]  kasan_save_free_info+0x4c/0x78
[   29.381806]  __kasan_slab_free+0x6c/0x98
[   29.385714]  kfree+0x214/0x3c8
[   29.388751]  kmalloc_uaf+0x11c/0x338
[   29.392310]  kunit_try_run_case+0x170/0x3f0
[   29.396476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.401945]  kthread+0x328/0x630
[   29.405157]  ret_from_fork+0x10/0x20
[   29.408716] 
[   29.410193] The buggy address belongs to the object at ffff00080444cc00
[   29.410193]  which belongs to the cache kmalloc-16 of size 16
[   29.422520] The buggy address is located 8 bytes inside of
[   29.422520]  freed 16-byte region [ffff00080444cc00, ffff00080444cc10)
[   29.434496] 
[   29.435976] The buggy address belongs to the physical page:
[   29.441532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   29.449517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.456026] page_type: f5(slab)
[   29.459161] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   29.466881] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.474602] page dumped because: kasan: bad access detected
[   29.480157] 
[   29.481631] Memory state around the buggy address:
[   29.486413]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.493614]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   29.500819] >ffff00080444cc00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.508020]                       ^
[   29.511496]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.518701]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.525902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   28.965756] ==================================================================
[   28.976002] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   28.983897] Read of size 64 at addr ffff000800cac284 by task kunit_try_catch/226
[   28.991274] 
[   28.992760] CPU: 6 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.992815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.992833] Hardware name: WinLink E850-96 board (DT)
[   28.992852] Call trace:
[   28.992867]  show_stack+0x20/0x38 (C)
[   28.992903]  dump_stack_lvl+0x8c/0xd0
[   28.992939]  print_report+0x118/0x608
[   28.992975]  kasan_report+0xdc/0x128
[   28.993008]  kasan_check_range+0x100/0x1a8
[   28.993044]  __asan_memmove+0x3c/0x98
[   28.993069]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   28.993102]  kunit_try_run_case+0x170/0x3f0
[   28.993137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.993176]  kthread+0x328/0x630
[   28.993205]  ret_from_fork+0x10/0x20
[   28.993240] 
[   29.060285] Allocated by task 226:
[   29.063671]  kasan_save_stack+0x3c/0x68
[   29.067488]  kasan_save_track+0x20/0x40
[   29.071308]  kasan_save_alloc_info+0x40/0x58
[   29.075561]  __kasan_kmalloc+0xd4/0xd8
[   29.079294]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.083807]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   29.088756]  kunit_try_run_case+0x170/0x3f0
[   29.092922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.098391]  kthread+0x328/0x630
[   29.101602]  ret_from_fork+0x10/0x20
[   29.105161] 
[   29.106640] The buggy address belongs to the object at ffff000800cac280
[   29.106640]  which belongs to the cache kmalloc-64 of size 64
[   29.118966] The buggy address is located 4 bytes inside of
[   29.118966]  allocated 64-byte region [ffff000800cac280, ffff000800cac2c0)
[   29.131289] 
[   29.132766] The buggy address belongs to the physical page:
[   29.138324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cac
[   29.146309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.152817] page_type: f5(slab)
[   29.155955] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.163674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.171395] page dumped because: kasan: bad access detected
[   29.176950] 
[   29.178424] Memory state around the buggy address:
[   29.183204]  ffff000800cac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.190407]  ffff000800cac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.197613] >ffff000800cac280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.204812]                                            ^
[   29.210111]  ffff000800cac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.217316]  ffff000800cac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.224517] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   28.700136] ==================================================================
[   28.709771] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   28.717322] Read of size 18446744073709551614 at addr ffff000800c2e084 by task kunit_try_catch/224
[   28.726261] 
[   28.727746] CPU: 5 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.727799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.727816] Hardware name: WinLink E850-96 board (DT)
[   28.727835] Call trace:
[   28.727848]  show_stack+0x20/0x38 (C)
[   28.727884]  dump_stack_lvl+0x8c/0xd0
[   28.727921]  print_report+0x118/0x608
[   28.727959]  kasan_report+0xdc/0x128
[   28.727991]  kasan_check_range+0x100/0x1a8
[   28.728026]  __asan_memmove+0x3c/0x98
[   28.728056]  kmalloc_memmove_negative_size+0x154/0x2e0
[   28.728092]  kunit_try_run_case+0x170/0x3f0
[   28.728127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.728168]  kthread+0x328/0x630
[   28.728197]  ret_from_fork+0x10/0x20
[   28.728231] 
[   28.795357] Allocated by task 224:
[   28.798744]  kasan_save_stack+0x3c/0x68
[   28.802562]  kasan_save_track+0x20/0x40
[   28.806383]  kasan_save_alloc_info+0x40/0x58
[   28.810634]  __kasan_kmalloc+0xd4/0xd8
[   28.814367]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.818881]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   28.823915]  kunit_try_run_case+0x170/0x3f0
[   28.828082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.833551]  kthread+0x328/0x630
[   28.836762]  ret_from_fork+0x10/0x20
[   28.840321] 
[   28.841800] The buggy address belongs to the object at ffff000800c2e080
[   28.841800]  which belongs to the cache kmalloc-64 of size 64
[   28.854125] The buggy address is located 4 bytes inside of
[   28.854125]  64-byte region [ffff000800c2e080, ffff000800c2e0c0)
[   28.865581] 
[   28.867059] The buggy address belongs to the physical page:
[   28.872616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   28.880603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.887109] page_type: f5(slab)
[   28.890247] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   28.897966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.905686] page dumped because: kasan: bad access detected
[   28.911242] 
[   28.912716] Memory state around the buggy address:
[   28.917496]  ffff000800c2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.924699]  ffff000800c2e000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.931904] >ffff000800c2e080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   28.939105]                    ^
[   28.942320]  ffff000800c2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.949525]  ffff000800c2e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.956726] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   28.393395] ==================================================================
[   28.402921] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   28.410206] Write of size 16 at addr ffff000803eb5769 by task kunit_try_catch/222
[   28.417672] 
[   28.419156] CPU: 4 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.419210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.419228] Hardware name: WinLink E850-96 board (DT)
[   28.419248] Call trace:
[   28.419260]  show_stack+0x20/0x38 (C)
[   28.419293]  dump_stack_lvl+0x8c/0xd0
[   28.419329]  print_report+0x118/0x608
[   28.419365]  kasan_report+0xdc/0x128
[   28.419395]  kasan_check_range+0x100/0x1a8
[   28.419428]  __asan_memset+0x34/0x78
[   28.419455]  kmalloc_oob_memset_16+0x150/0x2f8
[   28.419486]  kunit_try_run_case+0x170/0x3f0
[   28.419519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.419556]  kthread+0x328/0x630
[   28.419584]  ret_from_fork+0x10/0x20
[   28.419617] 
[   28.485988] Allocated by task 222:
[   28.489375]  kasan_save_stack+0x3c/0x68
[   28.493191]  kasan_save_track+0x20/0x40
[   28.497011]  kasan_save_alloc_info+0x40/0x58
[   28.501264]  __kasan_kmalloc+0xd4/0xd8
[   28.504997]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.509511]  kmalloc_oob_memset_16+0xb0/0x2f8
[   28.513852]  kunit_try_run_case+0x170/0x3f0
[   28.518017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.523486]  kthread+0x328/0x630
[   28.526698]  ret_from_fork+0x10/0x20
[   28.530257] 
[   28.531732] The buggy address belongs to the object at ffff000803eb5700
[   28.531732]  which belongs to the cache kmalloc-128 of size 128
[   28.544236] The buggy address is located 105 bytes inside of
[   28.544236]  allocated 120-byte region [ffff000803eb5700, ffff000803eb5778)
[   28.556819] 
[   28.558297] The buggy address belongs to the physical page:
[   28.563855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   28.571838] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.579477] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.586420] page_type: f5(slab)
[   28.589555] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.597276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.605004] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.612814] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.620627] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   28.628439] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.636245] page dumped because: kasan: bad access detected
[   28.641801] 
[   28.643275] Memory state around the buggy address:
[   28.648057]  ffff000803eb5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.655259]  ffff000803eb5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.662463] >ffff000803eb5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.669664]                                                                 ^
[   28.676786]  ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.683992]  ffff000803eb5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.691192] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   28.086982] ==================================================================
[   28.096503] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   28.103701] Write of size 8 at addr ffff000801e2a171 by task kunit_try_catch/220
[   28.111079] 
[   28.112562] CPU: 5 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.112614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.112630] Hardware name: WinLink E850-96 board (DT)
[   28.112648] Call trace:
[   28.112662]  show_stack+0x20/0x38 (C)
[   28.112696]  dump_stack_lvl+0x8c/0xd0
[   28.112736]  print_report+0x118/0x608
[   28.112770]  kasan_report+0xdc/0x128
[   28.112800]  kasan_check_range+0x100/0x1a8
[   28.112832]  __asan_memset+0x34/0x78
[   28.112859]  kmalloc_oob_memset_8+0x150/0x2f8
[   28.112890]  kunit_try_run_case+0x170/0x3f0
[   28.112925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.112964]  kthread+0x328/0x630
[   28.112990]  ret_from_fork+0x10/0x20
[   28.113024] 
[   28.179307] Allocated by task 220:
[   28.182696]  kasan_save_stack+0x3c/0x68
[   28.186511]  kasan_save_track+0x20/0x40
[   28.190331]  kasan_save_alloc_info+0x40/0x58
[   28.194585]  __kasan_kmalloc+0xd4/0xd8
[   28.198317]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.202831]  kmalloc_oob_memset_8+0xb0/0x2f8
[   28.207084]  kunit_try_run_case+0x170/0x3f0
[   28.211251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.216720]  kthread+0x328/0x630
[   28.219931]  ret_from_fork+0x10/0x20
[   28.223490] 
[   28.224968] The buggy address belongs to the object at ffff000801e2a100
[   28.224968]  which belongs to the cache kmalloc-128 of size 128
[   28.237469] The buggy address is located 113 bytes inside of
[   28.237469]  allocated 120-byte region [ffff000801e2a100, ffff000801e2a178)
[   28.250052] 
[   28.251531] The buggy address belongs to the physical page:
[   28.257088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2a
[   28.265073] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.272711] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.279654] page_type: f5(slab)
[   28.282791] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.290510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.298238] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.306048] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.313861] head: 0bfffe0000000001 fffffdffe0078a81 00000000ffffffff 00000000ffffffff
[   28.321673] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.329479] page dumped because: kasan: bad access detected
[   28.335035] 
[   28.336509] Memory state around the buggy address:
[   28.341292]  ffff000801e2a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.348492]  ffff000801e2a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.355698] >ffff000801e2a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.362898]                                                                 ^
[   28.370019]  ffff000801e2a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.377226]  ffff000801e2a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.384426] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   27.780406] ==================================================================
[   27.790082] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   27.797282] Write of size 4 at addr ffff000803eb5675 by task kunit_try_catch/218
[   27.804660] 
[   27.806144] CPU: 4 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.806199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.806216] Hardware name: WinLink E850-96 board (DT)
[   27.806234] Call trace:
[   27.806246]  show_stack+0x20/0x38 (C)
[   27.806279]  dump_stack_lvl+0x8c/0xd0
[   27.806316]  print_report+0x118/0x608
[   27.806351]  kasan_report+0xdc/0x128
[   27.806383]  kasan_check_range+0x100/0x1a8
[   27.806418]  __asan_memset+0x34/0x78
[   27.806446]  kmalloc_oob_memset_4+0x150/0x300
[   27.806477]  kunit_try_run_case+0x170/0x3f0
[   27.806511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.806547]  kthread+0x328/0x630
[   27.806572]  ret_from_fork+0x10/0x20
[   27.806607] 
[   27.872888] Allocated by task 218:
[   27.876275]  kasan_save_stack+0x3c/0x68
[   27.880093]  kasan_save_track+0x20/0x40
[   27.883912]  kasan_save_alloc_info+0x40/0x58
[   27.888166]  __kasan_kmalloc+0xd4/0xd8
[   27.891898]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.896412]  kmalloc_oob_memset_4+0xb0/0x300
[   27.900666]  kunit_try_run_case+0x170/0x3f0
[   27.904832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.910300]  kthread+0x328/0x630
[   27.913513]  ret_from_fork+0x10/0x20
[   27.917071] 
[   27.918549] The buggy address belongs to the object at ffff000803eb5600
[   27.918549]  which belongs to the cache kmalloc-128 of size 128
[   27.931050] The buggy address is located 117 bytes inside of
[   27.931050]  allocated 120-byte region [ffff000803eb5600, ffff000803eb5678)
[   27.943634] 
[   27.945112] The buggy address belongs to the physical page:
[   27.950670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   27.958652] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.966293] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.973235] page_type: f5(slab)
[   27.976370] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.984091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.991817] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.999629] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.007441] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   28.015253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.023059] page dumped because: kasan: bad access detected
[   28.028616] 
[   28.030090] Memory state around the buggy address:
[   28.034873]  ffff000803eb5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.042073]  ffff000803eb5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.049278] >ffff000803eb5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.056479]                                                                 ^
[   28.063601]  ffff000803eb5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.070805]  ffff000803eb5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.078007] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   27.474229] ==================================================================
[   27.483663] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   27.490864] Write of size 2 at addr ffff000801e2a077 by task kunit_try_catch/216
[   27.498241] 
[   27.499727] CPU: 5 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.499786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.499804] Hardware name: WinLink E850-96 board (DT)
[   27.499827] Call trace:
[   27.499842]  show_stack+0x20/0x38 (C)
[   27.499881]  dump_stack_lvl+0x8c/0xd0
[   27.499918]  print_report+0x118/0x608
[   27.499954]  kasan_report+0xdc/0x128
[   27.499986]  kasan_check_range+0x100/0x1a8
[   27.500023]  __asan_memset+0x34/0x78
[   27.500051]  kmalloc_oob_memset_2+0x150/0x2f8
[   27.500080]  kunit_try_run_case+0x170/0x3f0
[   27.500115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.500153]  kthread+0x328/0x630
[   27.500183]  ret_from_fork+0x10/0x20
[   27.500217] 
[   27.566470] Allocated by task 216:
[   27.569858]  kasan_save_stack+0x3c/0x68
[   27.573674]  kasan_save_track+0x20/0x40
[   27.577493]  kasan_save_alloc_info+0x40/0x58
[   27.581747]  __kasan_kmalloc+0xd4/0xd8
[   27.585481]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.589993]  kmalloc_oob_memset_2+0xb0/0x2f8
[   27.594246]  kunit_try_run_case+0x170/0x3f0
[   27.598413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.603882]  kthread+0x328/0x630
[   27.607093]  ret_from_fork+0x10/0x20
[   27.610652] 
[   27.612130] The buggy address belongs to the object at ffff000801e2a000
[   27.612130]  which belongs to the cache kmalloc-128 of size 128
[   27.624631] The buggy address is located 119 bytes inside of
[   27.624631]  allocated 120-byte region [ffff000801e2a000, ffff000801e2a078)
[   27.637215] 
[   27.638693] The buggy address belongs to the physical page:
[   27.644251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2a
[   27.652235] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.659872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.666816] page_type: f5(slab)
[   27.669951] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.677672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.685400] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.693209] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.701023] head: 0bfffe0000000001 fffffdffe0078a81 00000000ffffffff 00000000ffffffff
[   27.708835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.716640] page dumped because: kasan: bad access detected
[   27.722197] 
[   27.723673] Memory state around the buggy address:
[   27.728451]  ffff000801e29f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.735654]  ffff000801e29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.742860] >ffff000801e2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.750060]                                                                 ^
[   27.757182]  ffff000801e2a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.764386]  ffff000801e2a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.771587] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   27.167895] ==================================================================
[   27.176897] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   27.184186] Write of size 128 at addr ffff000801939200 by task kunit_try_catch/214
[   27.191735] 
[   27.193220] CPU: 3 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.193276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.193293] Hardware name: WinLink E850-96 board (DT)
[   27.193312] Call trace:
[   27.193325]  show_stack+0x20/0x38 (C)
[   27.193359]  dump_stack_lvl+0x8c/0xd0
[   27.193395]  print_report+0x118/0x608
[   27.193434]  kasan_report+0xdc/0x128
[   27.193464]  kasan_check_range+0x100/0x1a8
[   27.193499]  __asan_memset+0x34/0x78
[   27.193528]  kmalloc_oob_in_memset+0x144/0x2d0
[   27.193558]  kunit_try_run_case+0x170/0x3f0
[   27.193592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.193631]  kthread+0x328/0x630
[   27.193659]  ret_from_fork+0x10/0x20
[   27.193695] 
[   27.260051] Allocated by task 214:
[   27.263439]  kasan_save_stack+0x3c/0x68
[   27.267255]  kasan_save_track+0x20/0x40
[   27.271074]  kasan_save_alloc_info+0x40/0x58
[   27.275328]  __kasan_kmalloc+0xd4/0xd8
[   27.279060]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.283574]  kmalloc_oob_in_memset+0xb0/0x2d0
[   27.287914]  kunit_try_run_case+0x170/0x3f0
[   27.292082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.297549]  kthread+0x328/0x630
[   27.300761]  ret_from_fork+0x10/0x20
[   27.304320] 
[   27.305798] The buggy address belongs to the object at ffff000801939200
[   27.305798]  which belongs to the cache kmalloc-128 of size 128
[   27.318299] The buggy address is located 0 bytes inside of
[   27.318299]  allocated 120-byte region [ffff000801939200, ffff000801939278)
[   27.330709] 
[   27.332187] The buggy address belongs to the physical page:
[   27.337745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881938
[   27.345729] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.353368] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.360309] page_type: f5(slab)
[   27.363447] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.371166] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.378894] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.386704] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.394517] head: 0bfffe0000000001 fffffdffe0064e01 00000000ffffffff 00000000ffffffff
[   27.402329] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.410135] page dumped because: kasan: bad access detected
[   27.415691] 
[   27.417166] Memory state around the buggy address:
[   27.421948]  ffff000801939100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.429149]  ffff000801939180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.436355] >ffff000801939200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.443554]                                                                 ^
[   27.450676]  ffff000801939280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.457880]  ffff000801939300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.465082] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   26.863447] ==================================================================
[   26.872561] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   26.879327] Read of size 16 at addr ffff00080444cbe0 by task kunit_try_catch/212
[   26.886705] 
[   26.888191] CPU: 4 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   26.888245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.888261] Hardware name: WinLink E850-96 board (DT)
[   26.888281] Call trace:
[   26.888293]  show_stack+0x20/0x38 (C)
[   26.888328]  dump_stack_lvl+0x8c/0xd0
[   26.888363]  print_report+0x118/0x608
[   26.888400]  kasan_report+0xdc/0x128
[   26.888429]  __asan_report_load16_noabort+0x20/0x30
[   26.888460]  kmalloc_uaf_16+0x3bc/0x438
[   26.888486]  kunit_try_run_case+0x170/0x3f0
[   26.888520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.888561]  kthread+0x328/0x630
[   26.888589]  ret_from_fork+0x10/0x20
[   26.888624] 
[   26.951634] Allocated by task 212:
[   26.955024]  kasan_save_stack+0x3c/0x68
[   26.958839]  kasan_save_track+0x20/0x40
[   26.962659]  kasan_save_alloc_info+0x40/0x58
[   26.966912]  __kasan_kmalloc+0xd4/0xd8
[   26.970645]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.975159]  kmalloc_uaf_16+0x140/0x438
[   26.978978]  kunit_try_run_case+0x170/0x3f0
[   26.983145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.988613]  kthread+0x328/0x630
[   26.991825]  ret_from_fork+0x10/0x20
[   26.995384] 
[   26.996859] Freed by task 212:
[   26.999899]  kasan_save_stack+0x3c/0x68
[   27.003717]  kasan_save_track+0x20/0x40
[   27.007537]  kasan_save_free_info+0x4c/0x78
[   27.011704]  __kasan_slab_free+0x6c/0x98
[   27.015609]  kfree+0x214/0x3c8
[   27.018648]  kmalloc_uaf_16+0x190/0x438
[   27.022467]  kunit_try_run_case+0x170/0x3f0
[   27.026633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.032102]  kthread+0x328/0x630
[   27.035314]  ret_from_fork+0x10/0x20
[   27.038873] 
[   27.040352] The buggy address belongs to the object at ffff00080444cbe0
[   27.040352]  which belongs to the cache kmalloc-16 of size 16
[   27.052677] The buggy address is located 0 bytes inside of
[   27.052677]  freed 16-byte region [ffff00080444cbe0, ffff00080444cbf0)
[   27.064653] 
[   27.066132] The buggy address belongs to the physical page:
[   27.071690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   27.079674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.086181] page_type: f5(slab)
[   27.089319] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   27.097038] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.104758] page dumped because: kasan: bad access detected
[   27.110314] 
[   27.111788] Memory state around the buggy address:
[   27.116571]  ffff00080444ca80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.123771]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.130976] >ffff00080444cb80: fa fb fc fc 00 04 fc fc 00 00 fc fc fa fb fc fc
[   27.138177]                                                        ^
[   27.144519]  ffff00080444cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.151722]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.158925] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   26.602229] ==================================================================
[   26.611106] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   26.617786] Write of size 16 at addr ffff000801b07760 by task kunit_try_catch/210
[   26.625251] 
[   26.626734] CPU: 3 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   26.626786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.626800] Hardware name: WinLink E850-96 board (DT)
[   26.626819] Call trace:
[   26.626836]  show_stack+0x20/0x38 (C)
[   26.626868]  dump_stack_lvl+0x8c/0xd0
[   26.626903]  print_report+0x118/0x608
[   26.626940]  kasan_report+0xdc/0x128
[   26.626971]  __asan_report_store16_noabort+0x20/0x30
[   26.627004]  kmalloc_oob_16+0x3a0/0x3f8
[   26.627032]  kunit_try_run_case+0x170/0x3f0
[   26.627068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.627106]  kthread+0x328/0x630
[   26.627131]  ret_from_fork+0x10/0x20
[   26.627163] 
[   26.690268] Allocated by task 210:
[   26.693655]  kasan_save_stack+0x3c/0x68
[   26.697473]  kasan_save_track+0x20/0x40
[   26.701292]  kasan_save_alloc_info+0x40/0x58
[   26.705545]  __kasan_kmalloc+0xd4/0xd8
[   26.709277]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.713791]  kmalloc_oob_16+0xb4/0x3f8
[   26.717523]  kunit_try_run_case+0x170/0x3f0
[   26.721690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.727159]  kthread+0x328/0x630
[   26.730370]  ret_from_fork+0x10/0x20
[   26.733929] 
[   26.735406] The buggy address belongs to the object at ffff000801b07760
[   26.735406]  which belongs to the cache kmalloc-16 of size 16
[   26.747733] The buggy address is located 0 bytes inside of
[   26.747733]  allocated 13-byte region [ffff000801b07760, ffff000801b0776d)
[   26.760058] 
[   26.761536] The buggy address belongs to the physical page:
[   26.767092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b07
[   26.775076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.781586] page_type: f5(slab)
[   26.784721] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   26.792442] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.800161] page dumped because: kasan: bad access detected
[   26.805718] 
[   26.807192] Memory state around the buggy address:
[   26.811974]  ffff000801b07600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.819175]  ffff000801b07680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.826380] >ffff000801b07700: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   26.833581]                                                           ^
[   26.840181]  ffff000801b07780: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.847388]  ffff000801b07800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.854588] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   25.922366] ==================================================================
[   25.932122] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   25.938717] Read of size 1 at addr ffff000803394a00 by task kunit_try_catch/208
[   25.946007] 
[   25.947491] CPU: 5 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.947539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.947553] Hardware name: WinLink E850-96 board (DT)
[   25.947573] Call trace:
[   25.947589]  show_stack+0x20/0x38 (C)
[   25.947623]  dump_stack_lvl+0x8c/0xd0
[   25.947658]  print_report+0x118/0x608
[   25.947693]  kasan_report+0xdc/0x128
[   25.947725]  __kasan_check_byte+0x54/0x70
[   25.947757]  krealloc_noprof+0x44/0x360
[   25.947793]  krealloc_uaf+0x180/0x520
[   25.947821]  kunit_try_run_case+0x170/0x3f0
[   25.947857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.947898]  kthread+0x328/0x630
[   25.947924]  ret_from_fork+0x10/0x20
[   25.947959] 
[   26.013715] Allocated by task 208:
[   26.017102]  kasan_save_stack+0x3c/0x68
[   26.020921]  kasan_save_track+0x20/0x40
[   26.024739]  kasan_save_alloc_info+0x40/0x58
[   26.028992]  __kasan_kmalloc+0xd4/0xd8
[   26.032725]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.037239]  krealloc_uaf+0xc8/0x520
[   26.040797]  kunit_try_run_case+0x170/0x3f0
[   26.044964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.050433]  kthread+0x328/0x630
[   26.053645]  ret_from_fork+0x10/0x20
[   26.057204] 
[   26.058681] Freed by task 208:
[   26.061717]  kasan_save_stack+0x3c/0x68
[   26.065537]  kasan_save_track+0x20/0x40
[   26.069356]  kasan_save_free_info+0x4c/0x78
[   26.073523]  __kasan_slab_free+0x6c/0x98
[   26.077429]  kfree+0x214/0x3c8
[   26.080467]  krealloc_uaf+0x12c/0x520
[   26.084114]  kunit_try_run_case+0x170/0x3f0
[   26.088280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.093748]  kthread+0x328/0x630
[   26.096960]  ret_from_fork+0x10/0x20
[   26.100519] 
[   26.101996] The buggy address belongs to the object at ffff000803394a00
[   26.101996]  which belongs to the cache kmalloc-256 of size 256
[   26.114496] The buggy address is located 0 bytes inside of
[   26.114496]  freed 256-byte region [ffff000803394a00, ffff000803394b00)
[   26.126560] 
[   26.128040] The buggy address belongs to the physical page:
[   26.133596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394
[   26.141580] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.149218] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.156162] page_type: f5(slab)
[   26.159298] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.167017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.174746] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.182555] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.190368] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff
[   26.198180] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.205986] page dumped because: kasan: bad access detected
[   26.211543] 
[   26.213017] Memory state around the buggy address:
[   26.217796]  ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.225000]  ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.232205] >ffff000803394a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.239406]                    ^
[   26.242621]  ffff000803394a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.249826]  ffff000803394b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.257027] ==================================================================
[   26.264413] ==================================================================
[   26.271441] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   26.278034] Read of size 1 at addr ffff000803394a00 by task kunit_try_catch/208
[   26.285325] 
[   26.286808] CPU: 5 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   26.286853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.286867] Hardware name: WinLink E850-96 board (DT)
[   26.286886] Call trace:
[   26.286896]  show_stack+0x20/0x38 (C)
[   26.286927]  dump_stack_lvl+0x8c/0xd0
[   26.286962]  print_report+0x118/0x608
[   26.286996]  kasan_report+0xdc/0x128
[   26.287028]  __asan_report_load1_noabort+0x20/0x30
[   26.287058]  krealloc_uaf+0x4c8/0x520
[   26.287087]  kunit_try_run_case+0x170/0x3f0
[   26.287120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.287158]  kthread+0x328/0x630
[   26.287183]  ret_from_fork+0x10/0x20
[   26.287213] 
[   26.349994] Allocated by task 208:
[   26.353381]  kasan_save_stack+0x3c/0x68
[   26.357199]  kasan_save_track+0x20/0x40
[   26.361019]  kasan_save_alloc_info+0x40/0x58
[   26.365272]  __kasan_kmalloc+0xd4/0xd8
[   26.369006]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.373518]  krealloc_uaf+0xc8/0x520
[   26.377077]  kunit_try_run_case+0x170/0x3f0
[   26.381244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.386713]  kthread+0x328/0x630
[   26.389925]  ret_from_fork+0x10/0x20
[   26.393483] 
[   26.394959] Freed by task 208:
[   26.397997]  kasan_save_stack+0x3c/0x68
[   26.401816]  kasan_save_track+0x20/0x40
[   26.405636]  kasan_save_free_info+0x4c/0x78
[   26.409802]  __kasan_slab_free+0x6c/0x98
[   26.413709]  kfree+0x214/0x3c8
[   26.416747]  krealloc_uaf+0x12c/0x520
[   26.420394]  kunit_try_run_case+0x170/0x3f0
[   26.424559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.430028]  kthread+0x328/0x630
[   26.433240]  ret_from_fork+0x10/0x20
[   26.436798] 
[   26.438275] The buggy address belongs to the object at ffff000803394a00
[   26.438275]  which belongs to the cache kmalloc-256 of size 256
[   26.450776] The buggy address is located 0 bytes inside of
[   26.450776]  freed 256-byte region [ffff000803394a00, ffff000803394b00)
[   26.462840] 
[   26.464317] The buggy address belongs to the physical page:
[   26.469873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394
[   26.477857] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.485497] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.492440] page_type: f5(slab)
[   26.495574] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.503297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.511024] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.518835] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.526648] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff
[   26.534460] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.542266] page dumped because: kasan: bad access detected
[   26.547822] 
[   26.549297] Memory state around the buggy address:
[   26.554075]  ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.561279]  ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.568484] >ffff000803394a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.575685]                    ^
[   26.578901]  ffff000803394a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.586105]  ffff000803394b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.593307] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   23.058412] ==================================================================
[   23.065411] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   23.072960] Write of size 1 at addr ffff0008033948d0 by task kunit_try_catch/202
[   23.080339] 
[   23.081824] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   23.081873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.081889] Hardware name: WinLink E850-96 board (DT)
[   23.081908] Call trace:
[   23.081918]  show_stack+0x20/0x38 (C)
[   23.081952]  dump_stack_lvl+0x8c/0xd0
[   23.081988]  print_report+0x118/0x608
[   23.082025]  kasan_report+0xdc/0x128
[   23.082055]  __asan_report_store1_noabort+0x20/0x30
[   23.082086]  krealloc_less_oob_helper+0xb9c/0xc50
[   23.082118]  krealloc_less_oob+0x20/0x38
[   23.082149]  kunit_try_run_case+0x170/0x3f0
[   23.082183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.082222]  kthread+0x328/0x630
[   23.082249]  ret_from_fork+0x10/0x20
[   23.082284] 
[   23.150042] Allocated by task 202:
[   23.153428]  kasan_save_stack+0x3c/0x68
[   23.157247]  kasan_save_track+0x20/0x40
[   23.161066]  kasan_save_alloc_info+0x40/0x58
[   23.165320]  __kasan_krealloc+0x118/0x178
[   23.169314]  krealloc_noprof+0x128/0x360
[   23.173219]  krealloc_less_oob_helper+0x168/0xc50
[   23.177906]  krealloc_less_oob+0x20/0x38
[   23.181813]  kunit_try_run_case+0x170/0x3f0
[   23.185979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.191448]  kthread+0x328/0x630
[   23.194660]  ret_from_fork+0x10/0x20
[   23.198219] 
[   23.199696] The buggy address belongs to the object at ffff000803394800
[   23.199696]  which belongs to the cache kmalloc-256 of size 256
[   23.212196] The buggy address is located 7 bytes to the right of
[   23.212196]  allocated 201-byte region [ffff000803394800, ffff0008033948c9)
[   23.225128] 
[   23.226604] The buggy address belongs to the physical page:
[   23.232163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394
[   23.240145] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.247785] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.254730] page_type: f5(slab)
[   23.257864] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.265586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.273312] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.281123] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.288936] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff
[   23.296748] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.304554] page dumped because: kasan: bad access detected
[   23.310110] 
[   23.311585] Memory state around the buggy address:
[   23.316364]  ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.323568]  ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.330774] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.337974]                                                  ^
[   23.343793]  ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.350998]  ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.358199] ==================================================================
[   24.759205] ==================================================================
[   24.769119] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   24.776670] Write of size 1 at addr ffff0008048ce0c9 by task kunit_try_catch/206
[   24.784046] 
[   24.785531] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.785585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.785602] Hardware name: WinLink E850-96 board (DT)
[   24.785623] Call trace:
[   24.785636]  show_stack+0x20/0x38 (C)
[   24.785671]  dump_stack_lvl+0x8c/0xd0
[   24.785709]  print_report+0x118/0x608
[   24.785744]  kasan_report+0xdc/0x128
[   24.785775]  __asan_report_store1_noabort+0x20/0x30
[   24.785807]  krealloc_less_oob_helper+0xa48/0xc50
[   24.785840]  krealloc_large_less_oob+0x20/0x38
[   24.785871]  kunit_try_run_case+0x170/0x3f0
[   24.785905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.785942]  kthread+0x328/0x630
[   24.785971]  ret_from_fork+0x10/0x20
[   24.786008] 
[   24.854272] The buggy address belongs to the physical page:
[   24.859829] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc
[   24.867814] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.875455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.882397] page_type: f8(unknown)
[   24.885794] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.893513] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.901239] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.909050] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.916863] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff
[   24.924675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.932480] page dumped because: kasan: bad access detected
[   24.938038] 
[   24.939512] Memory state around the buggy address:
[   24.944292]  ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.951496]  ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.958701] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.965900]                                               ^
[   24.971459]  ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.978664]  ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.985865] ==================================================================
[   25.224594] ==================================================================
[   25.231698] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   25.239247] Write of size 1 at addr ffff0008048ce0da by task kunit_try_catch/206
[   25.246625] 
[   25.248108] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.248152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.248166] Hardware name: WinLink E850-96 board (DT)
[   25.248184] Call trace:
[   25.248194]  show_stack+0x20/0x38 (C)
[   25.248229]  dump_stack_lvl+0x8c/0xd0
[   25.248263]  print_report+0x118/0x608
[   25.248295]  kasan_report+0xdc/0x128
[   25.248327]  __asan_report_store1_noabort+0x20/0x30
[   25.248358]  krealloc_less_oob_helper+0xa80/0xc50
[   25.248390]  krealloc_large_less_oob+0x20/0x38
[   25.248421]  kunit_try_run_case+0x170/0x3f0
[   25.248451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.248489]  kthread+0x328/0x630
[   25.248514]  ret_from_fork+0x10/0x20
[   25.248544] 
[   25.316850] The buggy address belongs to the physical page:
[   25.322407] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc
[   25.330392] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.338031] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.344975] page_type: f8(unknown)
[   25.348368] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.356092] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.363818] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.371630] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.379443] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff
[   25.387255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.395061] page dumped because: kasan: bad access detected
[   25.400616] 
[   25.402092] Memory state around the buggy address:
[   25.406870]  ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.414074]  ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.421279] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.428480]                                                     ^
[   25.434560]  ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.441765]  ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.448966] ==================================================================
[   23.673066] ==================================================================
[   23.680159] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.687708] Write of size 1 at addr ffff0008033948ea by task kunit_try_catch/202
[   23.695086] 
[   23.696568] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   23.696616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.696630] Hardware name: WinLink E850-96 board (DT)
[   23.696644] Call trace:
[   23.696655]  show_stack+0x20/0x38 (C)
[   23.696687]  dump_stack_lvl+0x8c/0xd0
[   23.696722]  print_report+0x118/0x608
[   23.696755]  kasan_report+0xdc/0x128
[   23.696786]  __asan_report_store1_noabort+0x20/0x30
[   23.696815]  krealloc_less_oob_helper+0xae4/0xc50
[   23.696847]  krealloc_less_oob+0x20/0x38
[   23.696879]  kunit_try_run_case+0x170/0x3f0
[   23.696911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.696947]  kthread+0x328/0x630
[   23.696971]  ret_from_fork+0x10/0x20
[   23.697002] 
[   23.764791] Allocated by task 202:
[   23.768175]  kasan_save_stack+0x3c/0x68
[   23.771995]  kasan_save_track+0x20/0x40
[   23.775814]  kasan_save_alloc_info+0x40/0x58
[   23.780068]  __kasan_krealloc+0x118/0x178
[   23.784061]  krealloc_noprof+0x128/0x360
[   23.787967]  krealloc_less_oob_helper+0x168/0xc50
[   23.792654]  krealloc_less_oob+0x20/0x38
[   23.796560]  kunit_try_run_case+0x170/0x3f0
[   23.800727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.806196]  kthread+0x328/0x630
[   23.809408]  ret_from_fork+0x10/0x20
[   23.812967] 
[   23.814442] The buggy address belongs to the object at ffff000803394800
[   23.814442]  which belongs to the cache kmalloc-256 of size 256
[   23.826942] The buggy address is located 33 bytes to the right of
[   23.826942]  allocated 201-byte region [ffff000803394800, ffff0008033948c9)
[   23.839962] 
[   23.841439] The buggy address belongs to the physical page:
[   23.846996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394
[   23.854980] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.862619] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.869563] page_type: f5(slab)
[   23.872699] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.880420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.888146] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.895958] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.903771] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff
[   23.911583] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.919388] page dumped because: kasan: bad access detected
[   23.924944] 
[   23.926419] Memory state around the buggy address:
[   23.931200]  ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.938402]  ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.945607] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.952808]                                                           ^
[   23.959408]  ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.966613]  ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.973815] ==================================================================
[   25.456237] ==================================================================
[   25.463377] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   25.470928] Write of size 1 at addr ffff0008048ce0ea by task kunit_try_catch/206
[   25.478306] 
[   25.479785] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.479830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.479844] Hardware name: WinLink E850-96 board (DT)
[   25.479862] Call trace:
[   25.479872]  show_stack+0x20/0x38 (C)
[   25.479903]  dump_stack_lvl+0x8c/0xd0
[   25.479935]  print_report+0x118/0x608
[   25.479969]  kasan_report+0xdc/0x128
[   25.480000]  __asan_report_store1_noabort+0x20/0x30
[   25.480029]  krealloc_less_oob_helper+0xae4/0xc50
[   25.480062]  krealloc_large_less_oob+0x20/0x38
[   25.480092]  kunit_try_run_case+0x170/0x3f0
[   25.480125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.480160]  kthread+0x328/0x630
[   25.480186]  ret_from_fork+0x10/0x20
[   25.480216] 
[   25.548531] The buggy address belongs to the physical page:
[   25.554087] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc
[   25.562072] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.569711] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.576655] page_type: f8(unknown)
[   25.580048] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.587773] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.595499] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.603310] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.611123] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff
[   25.618936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.626741] page dumped because: kasan: bad access detected
[   25.632297] 
[   25.633772] Memory state around the buggy address:
[   25.638550]  ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.645755]  ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.652960] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.660161]                                                           ^
[   25.666761]  ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.673966]  ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.681168] ==================================================================
[   23.981120] ==================================================================
[   23.988227] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.995776] Write of size 1 at addr ffff0008033948eb by task kunit_try_catch/202
[   24.003155] 
[   24.004635] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.004679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.004693] Hardware name: WinLink E850-96 board (DT)
[   24.004711] Call trace:
[   24.004722]  show_stack+0x20/0x38 (C)
[   24.004754]  dump_stack_lvl+0x8c/0xd0
[   24.004789]  print_report+0x118/0x608
[   24.004823]  kasan_report+0xdc/0x128
[   24.004853]  __asan_report_store1_noabort+0x20/0x30
[   24.004882]  krealloc_less_oob_helper+0xa58/0xc50
[   24.004916]  krealloc_less_oob+0x20/0x38
[   24.004946]  kunit_try_run_case+0x170/0x3f0
[   24.004977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.005013]  kthread+0x328/0x630
[   24.005037]  ret_from_fork+0x10/0x20
[   24.005070] 
[   24.072858] Allocated by task 202:
[   24.076244]  kasan_save_stack+0x3c/0x68
[   24.080063]  kasan_save_track+0x20/0x40
[   24.083883]  kasan_save_alloc_info+0x40/0x58
[   24.088136]  __kasan_krealloc+0x118/0x178
[   24.092129]  krealloc_noprof+0x128/0x360
[   24.096035]  krealloc_less_oob_helper+0x168/0xc50
[   24.100723]  krealloc_less_oob+0x20/0x38
[   24.104629]  kunit_try_run_case+0x170/0x3f0
[   24.108795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.114264]  kthread+0x328/0x630
[   24.117476]  ret_from_fork+0x10/0x20
[   24.121035] 
[   24.122510] The buggy address belongs to the object at ffff000803394800
[   24.122510]  which belongs to the cache kmalloc-256 of size 256
[   24.135011] The buggy address is located 34 bytes to the right of
[   24.135011]  allocated 201-byte region [ffff000803394800, ffff0008033948c9)
[   24.148030] 
[   24.149507] The buggy address belongs to the physical page:
[   24.155063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394
[   24.163048] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.170687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.177631] page_type: f5(slab)
[   24.180763] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.188488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.196214] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.204026] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.211839] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff
[   24.219651] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.227456] page dumped because: kasan: bad access detected
[   24.233012] 
[   24.234487] Memory state around the buggy address:
[   24.239267]  ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.246470]  ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.253675] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.260876]                                                           ^
[   24.267477]  ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.274682]  ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.281883] ==================================================================
[   22.749239] ==================================================================
[   22.758473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   22.766022] Write of size 1 at addr ffff0008033948c9 by task kunit_try_catch/202
[   22.773399] 
[   22.774886] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   22.774945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.774962] Hardware name: WinLink E850-96 board (DT)
[   22.774983] Call trace:
[   22.774996]  show_stack+0x20/0x38 (C)
[   22.775033]  dump_stack_lvl+0x8c/0xd0
[   22.775070]  print_report+0x118/0x608
[   22.775107]  kasan_report+0xdc/0x128
[   22.775139]  __asan_report_store1_noabort+0x20/0x30
[   22.775170]  krealloc_less_oob_helper+0xa48/0xc50
[   22.775202]  krealloc_less_oob+0x20/0x38
[   22.775233]  kunit_try_run_case+0x170/0x3f0
[   22.775269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.775306]  kthread+0x328/0x630
[   22.775336]  ret_from_fork+0x10/0x20
[   22.775369] 
[   22.843104] Allocated by task 202:
[   22.846492]  kasan_save_stack+0x3c/0x68
[   22.850307]  kasan_save_track+0x20/0x40
[   22.854127]  kasan_save_alloc_info+0x40/0x58
[   22.858380]  __kasan_krealloc+0x118/0x178
[   22.862374]  krealloc_noprof+0x128/0x360
[   22.866279]  krealloc_less_oob_helper+0x168/0xc50
[   22.870966]  krealloc_less_oob+0x20/0x38
[   22.874873]  kunit_try_run_case+0x170/0x3f0
[   22.879039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.884508]  kthread+0x328/0x630
[   22.887720]  ret_from_fork+0x10/0x20
[   22.891279] 
[   22.892757] The buggy address belongs to the object at ffff000803394800
[   22.892757]  which belongs to the cache kmalloc-256 of size 256
[   22.905258] The buggy address is located 0 bytes to the right of
[   22.905258]  allocated 201-byte region [ffff000803394800, ffff0008033948c9)
[   22.918188] 
[   22.919667] The buggy address belongs to the physical page:
[   22.925224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394
[   22.933208] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.940847] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.947790] page_type: f5(slab)
[   22.950928] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.958646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.966373] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.974183] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.981996] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff
[   22.989808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.997614] page dumped because: kasan: bad access detected
[   23.003171] 
[   23.004644] Memory state around the buggy address:
[   23.009427]  ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.016628]  ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.023834] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.031034]                                               ^
[   23.036593]  ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.043798]  ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.050999] ==================================================================
[   23.365514] ==================================================================
[   23.372611] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.380160] Write of size 1 at addr ffff0008033948da by task kunit_try_catch/202
[   23.387539] 
[   23.389021] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   23.389071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.389087] Hardware name: WinLink E850-96 board (DT)
[   23.389104] Call trace:
[   23.389116]  show_stack+0x20/0x38 (C)
[   23.389150]  dump_stack_lvl+0x8c/0xd0
[   23.389186]  print_report+0x118/0x608
[   23.389221]  kasan_report+0xdc/0x128
[   23.389253]  __asan_report_store1_noabort+0x20/0x30
[   23.389283]  krealloc_less_oob_helper+0xa80/0xc50
[   23.389316]  krealloc_less_oob+0x20/0x38
[   23.389347]  kunit_try_run_case+0x170/0x3f0
[   23.389380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.389416]  kthread+0x328/0x630
[   23.389444]  ret_from_fork+0x10/0x20
[   23.389476] 
[   23.457242] Allocated by task 202:
[   23.460628]  kasan_save_stack+0x3c/0x68
[   23.464448]  kasan_save_track+0x20/0x40
[   23.468267]  kasan_save_alloc_info+0x40/0x58
[   23.472520]  __kasan_krealloc+0x118/0x178
[   23.476515]  krealloc_noprof+0x128/0x360
[   23.480419]  krealloc_less_oob_helper+0x168/0xc50
[   23.485107]  krealloc_less_oob+0x20/0x38
[   23.489013]  kunit_try_run_case+0x170/0x3f0
[   23.493180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.498648]  kthread+0x328/0x630
[   23.501860]  ret_from_fork+0x10/0x20
[   23.505419] 
[   23.506894] The buggy address belongs to the object at ffff000803394800
[   23.506894]  which belongs to the cache kmalloc-256 of size 256
[   23.519395] The buggy address is located 17 bytes to the right of
[   23.519395]  allocated 201-byte region [ffff000803394800, ffff0008033948c9)
[   23.532415] 
[   23.533892] The buggy address belongs to the physical page:
[   23.539448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394
[   23.547433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.555071] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.562015] page_type: f5(slab)
[   23.565151] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.572872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.580599] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.588410] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.596223] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff
[   23.604035] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.611841] page dumped because: kasan: bad access detected
[   23.617398] 
[   23.618872] Memory state around the buggy address:
[   23.623653]  ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.630855]  ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.638060] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.645261]                                                     ^
[   23.651340]  ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.658545]  ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.665747] ==================================================================
[   25.688467] ==================================================================
[   25.695578] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   25.703129] Write of size 1 at addr ffff0008048ce0eb by task kunit_try_catch/206
[   25.710507] 
[   25.711987] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.712033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.712047] Hardware name: WinLink E850-96 board (DT)
[   25.712063] Call trace:
[   25.712073]  show_stack+0x20/0x38 (C)
[   25.712104]  dump_stack_lvl+0x8c/0xd0
[   25.712137]  print_report+0x118/0x608
[   25.712169]  kasan_report+0xdc/0x128
[   25.712201]  __asan_report_store1_noabort+0x20/0x30
[   25.712230]  krealloc_less_oob_helper+0xa58/0xc50
[   25.712261]  krealloc_large_less_oob+0x20/0x38
[   25.712295]  kunit_try_run_case+0x170/0x3f0
[   25.712326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.712362]  kthread+0x328/0x630
[   25.712389]  ret_from_fork+0x10/0x20
[   25.712418] 
[   25.780732] The buggy address belongs to the physical page:
[   25.786288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc
[   25.794274] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.801912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.808856] page_type: f8(unknown)
[   25.812250] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.819974] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.827700] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.835512] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.843325] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff
[   25.851137] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.858943] page dumped because: kasan: bad access detected
[   25.864498] 
[   25.865974] Memory state around the buggy address:
[   25.870752]  ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.877957]  ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.885161] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.892362]                                                           ^
[   25.898963]  ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.906168]  ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.913369] ==================================================================
[   24.993244] ==================================================================
[   25.000279] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   25.007827] Write of size 1 at addr ffff0008048ce0d0 by task kunit_try_catch/206
[   25.015205] 
[   25.016689] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.016736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.016752] Hardware name: WinLink E850-96 board (DT)
[   25.016770] Call trace:
[   25.016779]  show_stack+0x20/0x38 (C)
[   25.016812]  dump_stack_lvl+0x8c/0xd0
[   25.016849]  print_report+0x118/0x608
[   25.016885]  kasan_report+0xdc/0x128
[   25.016916]  __asan_report_store1_noabort+0x20/0x30
[   25.016947]  krealloc_less_oob_helper+0xb9c/0xc50
[   25.016978]  krealloc_large_less_oob+0x20/0x38
[   25.017009]  kunit_try_run_case+0x170/0x3f0
[   25.017043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.017081]  kthread+0x328/0x630
[   25.017107]  ret_from_fork+0x10/0x20
[   25.017141] 
[   25.085432] The buggy address belongs to the physical page:
[   25.090988] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc
[   25.098972] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.106610] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.113555] page_type: f8(unknown)
[   25.116948] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.124672] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.132398] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.140210] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.148023] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff
[   25.155835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.163641] page dumped because: kasan: bad access detected
[   25.169197] 
[   25.170672] Memory state around the buggy address:
[   25.175450]  ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.182654]  ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.189859] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.197060]                                                  ^
[   25.202880]  ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.210085]  ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.217285] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   24.290698] ==================================================================
[   24.300116] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   24.307666] Write of size 1 at addr ffff000801bba0eb by task kunit_try_catch/204
[   24.315043] 
[   24.316527] CPU: 3 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.316578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.316595] Hardware name: WinLink E850-96 board (DT)
[   24.316617] Call trace:
[   24.316629]  show_stack+0x20/0x38 (C)
[   24.316665]  dump_stack_lvl+0x8c/0xd0
[   24.316701]  print_report+0x118/0x608
[   24.316737]  kasan_report+0xdc/0x128
[   24.316767]  __asan_report_store1_noabort+0x20/0x30
[   24.316796]  krealloc_more_oob_helper+0x60c/0x678
[   24.316829]  krealloc_large_more_oob+0x20/0x38
[   24.316859]  kunit_try_run_case+0x170/0x3f0
[   24.316895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.316935]  kthread+0x328/0x630
[   24.316962]  ret_from_fork+0x10/0x20
[   24.316995] 
[   24.385269] The buggy address belongs to the physical page:
[   24.390827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bb8
[   24.398810] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.406451] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.413393] page_type: f8(unknown)
[   24.416789] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.424509] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.432235] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.440047] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.447860] head: 0bfffe0000000002 fffffdffe006ee01 00000000ffffffff 00000000ffffffff
[   24.455672] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.463477] page dumped because: kasan: bad access detected
[   24.469034] 
[   24.470508] Memory state around the buggy address:
[   24.475291]  ffff000801bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.482491]  ffff000801bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.489696] >ffff000801bba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.496897]                                                           ^
[   24.503498]  ffff000801bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.510703]  ffff000801bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.517904] ==================================================================
[   22.129293] ==================================================================
[   22.138430] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   22.145980] Write of size 1 at addr ffff0008030ff2eb by task kunit_try_catch/200
[   22.153356] 
[   22.154843] CPU: 2 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   22.154898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.154914] Hardware name: WinLink E850-96 board (DT)
[   22.154935] Call trace:
[   22.154949]  show_stack+0x20/0x38 (C)
[   22.154989]  dump_stack_lvl+0x8c/0xd0
[   22.155030]  print_report+0x118/0x608
[   22.155067]  kasan_report+0xdc/0x128
[   22.155097]  __asan_report_store1_noabort+0x20/0x30
[   22.155129]  krealloc_more_oob_helper+0x60c/0x678
[   22.155161]  krealloc_more_oob+0x20/0x38
[   22.155190]  kunit_try_run_case+0x170/0x3f0
[   22.155226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.155265]  kthread+0x328/0x630
[   22.155293]  ret_from_fork+0x10/0x20
[   22.155328] 
[   22.223061] Allocated by task 200:
[   22.226448]  kasan_save_stack+0x3c/0x68
[   22.230264]  kasan_save_track+0x20/0x40
[   22.234084]  kasan_save_alloc_info+0x40/0x58
[   22.238337]  __kasan_krealloc+0x118/0x178
[   22.242330]  krealloc_noprof+0x128/0x360
[   22.246236]  krealloc_more_oob_helper+0x168/0x678
[   22.250924]  krealloc_more_oob+0x20/0x38
[   22.254830]  kunit_try_run_case+0x170/0x3f0
[   22.258997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.264465]  kthread+0x328/0x630
[   22.267677]  ret_from_fork+0x10/0x20
[   22.271236] 
[   22.272714] The buggy address belongs to the object at ffff0008030ff200
[   22.272714]  which belongs to the cache kmalloc-256 of size 256
[   22.285215] The buggy address is located 0 bytes to the right of
[   22.285215]  allocated 235-byte region [ffff0008030ff200, ffff0008030ff2eb)
[   22.298145] 
[   22.299623] The buggy address belongs to the physical page:
[   22.305182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   22.313166] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.320805] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.327747] page_type: f5(slab)
[   22.330884] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.338603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.346330] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.354140] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.361953] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   22.369765] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.377571] page dumped because: kasan: bad access detected
[   22.383128] 
[   22.384602] Memory state around the buggy address:
[   22.389384]  ffff0008030ff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.396585]  ffff0008030ff200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.403791] >ffff0008030ff280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.410991]                                                           ^
[   22.417592]  ffff0008030ff300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.424795]  ffff0008030ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.431998] ==================================================================
[   22.439400] ==================================================================
[   22.446415] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   22.453961] Write of size 1 at addr ffff0008030ff2f0 by task kunit_try_catch/200
[   22.461337] 
[   22.462822] CPU: 2 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   22.462876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.462892] Hardware name: WinLink E850-96 board (DT)
[   22.462911] Call trace:
[   22.462922]  show_stack+0x20/0x38 (C)
[   22.462958]  dump_stack_lvl+0x8c/0xd0
[   22.462998]  print_report+0x118/0x608
[   22.463034]  kasan_report+0xdc/0x128
[   22.463064]  __asan_report_store1_noabort+0x20/0x30
[   22.463094]  krealloc_more_oob_helper+0x5c0/0x678
[   22.463128]  krealloc_more_oob+0x20/0x38
[   22.463156]  kunit_try_run_case+0x170/0x3f0
[   22.463194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.463233]  kthread+0x328/0x630
[   22.463262]  ret_from_fork+0x10/0x20
[   22.463298] 
[   22.531041] Allocated by task 200:
[   22.534428]  kasan_save_stack+0x3c/0x68
[   22.538246]  kasan_save_track+0x20/0x40
[   22.542065]  kasan_save_alloc_info+0x40/0x58
[   22.546319]  __kasan_krealloc+0x118/0x178
[   22.550313]  krealloc_noprof+0x128/0x360
[   22.554218]  krealloc_more_oob_helper+0x168/0x678
[   22.558905]  krealloc_more_oob+0x20/0x38
[   22.562812]  kunit_try_run_case+0x170/0x3f0
[   22.566978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.572447]  kthread+0x328/0x630
[   22.575659]  ret_from_fork+0x10/0x20
[   22.579218] 
[   22.580696] The buggy address belongs to the object at ffff0008030ff200
[   22.580696]  which belongs to the cache kmalloc-256 of size 256
[   22.593196] The buggy address is located 5 bytes to the right of
[   22.593196]  allocated 235-byte region [ffff0008030ff200, ffff0008030ff2eb)
[   22.606127] 
[   22.607606] The buggy address belongs to the physical page:
[   22.613162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   22.621148] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.628786] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.635729] page_type: f5(slab)
[   22.638863] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.646584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.654312] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.662122] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.669935] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   22.677747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.685553] page dumped because: kasan: bad access detected
[   22.691109] 
[   22.692584] Memory state around the buggy address:
[   22.697365]  ffff0008030ff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.704568]  ffff0008030ff200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.711773] >ffff0008030ff280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.718972]                                                              ^
[   22.725833]  ffff0008030ff300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.733038]  ffff0008030ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740240] ==================================================================
[   24.525204] ==================================================================
[   24.532318] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   24.539865] Write of size 1 at addr ffff000801bba0f0 by task kunit_try_catch/204
[   24.547244] 
[   24.548726] CPU: 3 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.548777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.548791] Hardware name: WinLink E850-96 board (DT)
[   24.548810] Call trace:
[   24.548823]  show_stack+0x20/0x38 (C)
[   24.548858]  dump_stack_lvl+0x8c/0xd0
[   24.548895]  print_report+0x118/0x608
[   24.548930]  kasan_report+0xdc/0x128
[   24.548960]  __asan_report_store1_noabort+0x20/0x30
[   24.548990]  krealloc_more_oob_helper+0x5c0/0x678
[   24.549021]  krealloc_large_more_oob+0x20/0x38
[   24.549052]  kunit_try_run_case+0x170/0x3f0
[   24.549089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.549128]  kthread+0x328/0x630
[   24.549155]  ret_from_fork+0x10/0x20
[   24.549188] 
[   24.617471] The buggy address belongs to the physical page:
[   24.623025] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bb8
[   24.631010] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.638652] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.645593] page_type: f8(unknown)
[   24.648986] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.656710] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.664436] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.672248] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.680061] head: 0bfffe0000000002 fffffdffe006ee01 00000000ffffffff 00000000ffffffff
[   24.687873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.695679] page dumped because: kasan: bad access detected
[   24.701236] 
[   24.702710] Memory state around the buggy address:
[   24.707491]  ffff000801bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.714692]  ffff000801bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.721899] >ffff000801bba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.729099]                                                              ^
[   24.735960]  ffff000801bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.743165]  ffff000801bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.750366] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   21.937956] ==================================================================
[   21.952235] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   21.958567] Read of size 1 at addr ffff000806250000 by task kunit_try_catch/198
[   21.965858] 
[   21.967345] CPU: 3 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   21.967400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.967417] Hardware name: WinLink E850-96 board (DT)
[   21.967440] Call trace:
[   21.967455]  show_stack+0x20/0x38 (C)
[   21.967491]  dump_stack_lvl+0x8c/0xd0
[   21.967527]  print_report+0x118/0x608
[   21.967561]  kasan_report+0xdc/0x128
[   21.967593]  __asan_report_load1_noabort+0x20/0x30
[   21.967624]  page_alloc_uaf+0x328/0x350
[   21.967654]  kunit_try_run_case+0x170/0x3f0
[   21.967692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.967729]  kthread+0x328/0x630
[   21.967757]  ret_from_fork+0x10/0x20
[   21.967793] 
[   22.030705] The buggy address belongs to the physical page:
[   22.036261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886250
[   22.044245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.050755] page_type: f0(buddy)
[   22.053977] raw: 0bfffe0000000000 ffff00087f61bc60 ffff00087f61bc60 0000000000000000
[   22.061697] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   22.069417] page dumped because: kasan: bad access detected
[   22.074973] 
[   22.076447] Memory state around the buggy address:
[   22.081231]  ffff00080624ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.088430]  ffff00080624ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.095636] >ffff000806250000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.102836]                    ^
[   22.106051]  ffff000806250080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.113256]  ffff000806250100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.120457] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   21.701946] ==================================================================
[   21.711094] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   21.716471] Free of addr ffff000801bb8001 by task kunit_try_catch/194
[   21.722894] 
[   21.724380] CPU: 3 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   21.724438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.724453] Hardware name: WinLink E850-96 board (DT)
[   21.724474] Call trace:
[   21.724487]  show_stack+0x20/0x38 (C)
[   21.724525]  dump_stack_lvl+0x8c/0xd0
[   21.724564]  print_report+0x118/0x608
[   21.724600]  kasan_report_invalid_free+0xc0/0xe8
[   21.724635]  __kasan_kfree_large+0x5c/0xa8
[   21.724672]  free_large_kmalloc+0x64/0x190
[   21.724704]  kfree+0x270/0x3c8
[   21.724732]  kmalloc_large_invalid_free+0x108/0x270
[   21.724764]  kunit_try_run_case+0x170/0x3f0
[   21.724800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.724838]  kthread+0x328/0x630
[   21.724867]  ret_from_fork+0x10/0x20
[   21.724901] 
[   21.796246] The buggy address belongs to the physical page:
[   21.801803] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bb8
[   21.809788] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.817425] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.824370] page_type: f8(unknown)
[   21.827764] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.835485] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.843213] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.851022] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.858836] head: 0bfffe0000000002 fffffdffe006ee01 00000000ffffffff 00000000ffffffff
[   21.866648] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.874454] page dumped because: kasan: bad access detected
[   21.880010] 
[   21.881485] Memory state around the buggy address:
[   21.886269]  ffff000801bb7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.893468]  ffff000801bb7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.900675] >ffff000801bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.907873]                    ^
[   21.911089]  ffff000801bb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.918293]  ffff000801bb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.925497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   21.517682] ==================================================================
[   21.527415] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   21.534008] Read of size 1 at addr ffff0008033bc000 by task kunit_try_catch/192
[   21.541299] 
[   21.542787] CPU: 5 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   21.542846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.542861] Hardware name: WinLink E850-96 board (DT)
[   21.542880] Call trace:
[   21.542893]  show_stack+0x20/0x38 (C)
[   21.542927]  dump_stack_lvl+0x8c/0xd0
[   21.542964]  print_report+0x118/0x608
[   21.543001]  kasan_report+0xdc/0x128
[   21.543030]  __asan_report_load1_noabort+0x20/0x30
[   21.543063]  kmalloc_large_uaf+0x2cc/0x2f8
[   21.543090]  kunit_try_run_case+0x170/0x3f0
[   21.543124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.543162]  kthread+0x328/0x630
[   21.543188]  ret_from_fork+0x10/0x20
[   21.543223] 
[   21.606405] The buggy address belongs to the physical page:
[   21.611962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8833bc
[   21.619947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.626466] raw: 0bfffe0000000000 fffffdffe00cf008 ffff00085afc0f40 0000000000000000
[   21.634186] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   21.641905] page dumped because: kasan: bad access detected
[   21.647462] 
[   21.648936] Memory state around the buggy address:
[   21.653717]  ffff0008033bbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.660919]  ffff0008033bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.668125] >ffff0008033bc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.675325]                    ^
[   21.678540]  ffff0008033bc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.685745]  ffff0008033bc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.692946] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   21.289224] ==================================================================
[   21.298685] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   21.306147] Write of size 1 at addr ffff000804b0e00a by task kunit_try_catch/190
[   21.313525] 
[   21.315011] CPU: 2 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   21.315065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.315082] Hardware name: WinLink E850-96 board (DT)
[   21.315103] Call trace:
[   21.315121]  show_stack+0x20/0x38 (C)
[   21.315156]  dump_stack_lvl+0x8c/0xd0
[   21.315196]  print_report+0x118/0x608
[   21.315232]  kasan_report+0xdc/0x128
[   21.315263]  __asan_report_store1_noabort+0x20/0x30
[   21.315295]  kmalloc_large_oob_right+0x278/0x2b8
[   21.315326]  kunit_try_run_case+0x170/0x3f0
[   21.315362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.315400]  kthread+0x328/0x630
[   21.315427]  ret_from_fork+0x10/0x20
[   21.315461] 
[   21.379237] The buggy address belongs to the physical page:
[   21.384796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b0c
[   21.392780] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.400419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.407362] page_type: f8(unknown)
[   21.410757] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.418477] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.426204] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.434015] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.441828] head: 0bfffe0000000002 fffffdffe012c301 00000000ffffffff 00000000ffffffff
[   21.449640] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.457446] page dumped because: kasan: bad access detected
[   21.463003] 
[   21.464477] Memory state around the buggy address:
[   21.469259]  ffff000804b0df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.476460]  ffff000804b0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.483666] >ffff000804b0e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.490866]                       ^
[   21.494341]  ffff000804b0e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.501546]  ffff000804b0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.508748] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   20.987427] ==================================================================
[   20.998263] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   21.005547] Write of size 1 at addr ffff000805f79f00 by task kunit_try_catch/188
[   21.012922] 
[   21.014410] CPU: 5 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   21.014466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.014482] Hardware name: WinLink E850-96 board (DT)
[   21.014505] Call trace:
[   21.014521]  show_stack+0x20/0x38 (C)
[   21.014558]  dump_stack_lvl+0x8c/0xd0
[   21.014594]  print_report+0x118/0x608
[   21.014631]  kasan_report+0xdc/0x128
[   21.014662]  __asan_report_store1_noabort+0x20/0x30
[   21.014693]  kmalloc_big_oob_right+0x2a4/0x2f0
[   21.014724]  kunit_try_run_case+0x170/0x3f0
[   21.014761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.014799]  kthread+0x328/0x630
[   21.014826]  ret_from_fork+0x10/0x20
[   21.014861] 
[   21.078459] Allocated by task 188:
[   21.081848]  kasan_save_stack+0x3c/0x68
[   21.085664]  kasan_save_track+0x20/0x40
[   21.089483]  kasan_save_alloc_info+0x40/0x58
[   21.093736]  __kasan_kmalloc+0xd4/0xd8
[   21.097469]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.101983]  kmalloc_big_oob_right+0xb8/0x2f0
[   21.106323]  kunit_try_run_case+0x170/0x3f0
[   21.110490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.115958]  kthread+0x328/0x630
[   21.119170]  ret_from_fork+0x10/0x20
[   21.122729] 
[   21.124206] The buggy address belongs to the object at ffff000805f78000
[   21.124206]  which belongs to the cache kmalloc-8k of size 8192
[   21.136708] The buggy address is located 0 bytes to the right of
[   21.136708]  allocated 7936-byte region [ffff000805f78000, ffff000805f79f00)
[   21.149725] 
[   21.151203] The buggy address belongs to the physical page:
[   21.156761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f78
[   21.164744] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.172383] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.179327] page_type: f5(slab)
[   21.182464] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   21.190183] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.197911] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   21.205720] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.213533] head: 0bfffe0000000003 fffffdffe017de01 00000000ffffffff 00000000ffffffff
[   21.221345] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   21.229151] page dumped because: kasan: bad access detected
[   21.234708] 
[   21.236182] Memory state around the buggy address:
[   21.240962]  ffff000805f79e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.248165]  ffff000805f79e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.255371] >ffff000805f79f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.262571]                    ^
[   21.265786]  ffff000805f79f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.272991]  ffff000805f7a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.280193] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   20.518108] ==================================================================
[   20.527779] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   20.535846] Write of size 1 at addr ffff000801939078 by task kunit_try_catch/186
[   20.543224] 
[   20.544711] CPU: 3 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   20.544769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.544784] Hardware name: WinLink E850-96 board (DT)
[   20.544802] Call trace:
[   20.544816]  show_stack+0x20/0x38 (C)
[   20.544850]  dump_stack_lvl+0x8c/0xd0
[   20.544888]  print_report+0x118/0x608
[   20.544925]  kasan_report+0xdc/0x128
[   20.544956]  __asan_report_store1_noabort+0x20/0x30
[   20.544987]  kmalloc_track_caller_oob_right+0x40c/0x488
[   20.545020]  kunit_try_run_case+0x170/0x3f0
[   20.545057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.545096]  kthread+0x328/0x630
[   20.545124]  ret_from_fork+0x10/0x20
[   20.545159] 
[   20.609542] Allocated by task 186:
[   20.612931]  kasan_save_stack+0x3c/0x68
[   20.616748]  kasan_save_track+0x20/0x40
[   20.620567]  kasan_save_alloc_info+0x40/0x58
[   20.624820]  __kasan_kmalloc+0xd4/0xd8
[   20.628553]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   20.634108]  kmalloc_track_caller_oob_right+0xa8/0x488
[   20.639229]  kunit_try_run_case+0x170/0x3f0
[   20.643396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.648866]  kthread+0x328/0x630
[   20.652076]  ret_from_fork+0x10/0x20
[   20.655635] 
[   20.657113] The buggy address belongs to the object at ffff000801939000
[   20.657113]  which belongs to the cache kmalloc-128 of size 128
[   20.669614] The buggy address is located 0 bytes to the right of
[   20.669614]  allocated 120-byte region [ffff000801939000, ffff000801939078)
[   20.682545] 
[   20.684023] The buggy address belongs to the physical page:
[   20.689581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881938
[   20.697565] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.705204] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.712146] page_type: f5(slab)
[   20.715282] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.723002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.730729] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.738539] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.746353] head: 0bfffe0000000001 fffffdffe0064e01 00000000ffffffff 00000000ffffffff
[   20.754165] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.761970] page dumped because: kasan: bad access detected
[   20.767527] 
[   20.769001] Memory state around the buggy address:
[   20.773783]  ffff000801938f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.780984]  ffff000801938f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.788191] >ffff000801939000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.795390]                                                                 ^
[   20.802511]  ffff000801939080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.809716]  ffff000801939100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.816918] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   20.217741] ==================================================================
[   20.226743] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   20.234115] Read of size 1 at addr ffff000802f01000 by task kunit_try_catch/184
[   20.241405] 
[   20.242893] CPU: 6 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   20.242948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.242964] Hardware name: WinLink E850-96 board (DT)
[   20.242984] Call trace:
[   20.243000]  show_stack+0x20/0x38 (C)
[   20.243037]  dump_stack_lvl+0x8c/0xd0
[   20.243074]  print_report+0x118/0x608
[   20.243109]  kasan_report+0xdc/0x128
[   20.243141]  __asan_report_load1_noabort+0x20/0x30
[   20.243173]  kmalloc_node_oob_right+0x2f4/0x330
[   20.243206]  kunit_try_run_case+0x170/0x3f0
[   20.243241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.243278]  kthread+0x328/0x630
[   20.243306]  ret_from_fork+0x10/0x20
[   20.243342] 
[   20.306944] Allocated by task 184:
[   20.310332]  kasan_save_stack+0x3c/0x68
[   20.314147]  kasan_save_track+0x20/0x40
[   20.317967]  kasan_save_alloc_info+0x40/0x58
[   20.322220]  __kasan_kmalloc+0xd4/0xd8
[   20.325953]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   20.330901]  kmalloc_node_oob_right+0xbc/0x330
[   20.335328]  kunit_try_run_case+0x170/0x3f0
[   20.339494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.344963]  kthread+0x328/0x630
[   20.348174]  ret_from_fork+0x10/0x20
[   20.351734] 
[   20.353212] The buggy address belongs to the object at ffff000802f00000
[   20.353212]  which belongs to the cache kmalloc-4k of size 4096
[   20.365713] The buggy address is located 0 bytes to the right of
[   20.365713]  allocated 4096-byte region [ffff000802f00000, ffff000802f01000)
[   20.378730] 
[   20.380208] The buggy address belongs to the physical page:
[   20.385766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882f00
[   20.393749] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.401389] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.408332] page_type: f5(slab)
[   20.411469] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   20.419187] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.426916] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   20.434725] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.442538] head: 0bfffe0000000003 fffffdffe00bc001 00000000ffffffff 00000000ffffffff
[   20.450350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   20.458156] page dumped because: kasan: bad access detected
[   20.463712] 
[   20.465186] Memory state around the buggy address:
[   20.469968]  ffff000802f00f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.477170]  ffff000802f00f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.484374] >ffff000802f01000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.491575]                    ^
[   20.494790]  ffff000802f01080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.501995]  ffff000802f01100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.509197] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   19.848811] ==================================================================
[   19.858083] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   19.864937] Read of size 1 at addr ffff000801b0773f by task kunit_try_catch/182
[   19.872227] 
[   19.873714] CPU: 3 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   19.873771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.873788] Hardware name: WinLink E850-96 board (DT)
[   19.873809] Call trace:
[   19.873821]  show_stack+0x20/0x38 (C)
[   19.873858]  dump_stack_lvl+0x8c/0xd0
[   19.873895]  print_report+0x118/0x608
[   19.873931]  kasan_report+0xdc/0x128
[   19.873962]  __asan_report_load1_noabort+0x20/0x30
[   19.873993]  kmalloc_oob_left+0x2ec/0x320
[   19.874021]  kunit_try_run_case+0x170/0x3f0
[   19.874056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.874095]  kthread+0x328/0x630
[   19.874124]  ret_from_fork+0x10/0x20
[   19.874157] 
[   19.937245] Allocated by task 12:
[   19.940546]  kasan_save_stack+0x3c/0x68
[   19.944361]  kasan_save_track+0x20/0x40
[   19.948182]  kasan_save_alloc_info+0x40/0x58
[   19.952434]  __kasan_kmalloc+0xd4/0xd8
[   19.956166]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   19.961722]  kstrdup+0x54/0xc8
[   19.964760]  kstrdup_const+0x48/0x60
[   19.968319]  __kernfs_new_node+0xb0/0x578
[   19.972312]  kernfs_new_node+0x128/0x1a8
[   19.976218]  kernfs_create_link+0xac/0x228
[   19.980300]  sysfs_do_create_link_sd+0x8c/0x128
[   19.984812]  sysfs_create_link+0x48/0xb8
[   19.988718]  driver_sysfs_add+0x88/0x258
[   19.992624]  really_probe+0xf0/0x7f0
[   19.996183]  __driver_probe_device+0x164/0x378
[   20.000610]  driver_probe_device+0x64/0x180
[   20.004776]  __device_attach_driver+0x174/0x280
[   20.009291]  bus_for_each_drv+0x118/0x1b0
[   20.013285]  __device_attach+0x174/0x378
[   20.017190]  device_initial_probe+0x1c/0x30
[   20.021357]  bus_probe_device+0x12c/0x170
[   20.025350]  deferred_probe_work_func+0x140/0x208
[   20.030037]  process_one_work+0x530/0xf98
[   20.034030]  worker_thread+0x8ac/0xf28
[   20.037763]  kthread+0x328/0x630
[   20.040974]  ret_from_fork+0x10/0x20
[   20.044533] 
[   20.046010] Freed by task 0:
[   20.048877]  kasan_save_stack+0x3c/0x68
[   20.052693]  kasan_save_track+0x20/0x40
[   20.056514]  kasan_save_free_info+0x4c/0x78
[   20.060679]  __kasan_slab_free+0x6c/0x98
[   20.064585]  kfree+0x214/0x3c8
[   20.067623]  kfree_const+0x3c/0x50
[   20.071008]  kernfs_free_rcu+0x4c/0x120
[   20.074828]  rcu_core+0x9f4/0x1e20
[   20.078213]  rcu_core_si+0x18/0x30
[   20.081599]  handle_softirqs+0x374/0xb28
[   20.085506]  __do_softirq+0x1c/0x28
[   20.088977] 
[   20.090455] The buggy address belongs to the object at ffff000801b07720
[   20.090455]  which belongs to the cache kmalloc-16 of size 16
[   20.102783] The buggy address is located 15 bytes to the right of
[   20.102783]  allocated 16-byte region [ffff000801b07720, ffff000801b07730)
[   20.115713] 
[   20.117191] The buggy address belongs to the physical page:
[   20.122749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b07
[   20.130735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.137242] page_type: f5(slab)
[   20.140379] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   20.148097] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.155818] page dumped because: kasan: bad access detected
[   20.161373] 
[   20.162847] Memory state around the buggy address:
[   20.167631]  ffff000801b07600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.174832]  ffff000801b07680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   20.182036] >ffff000801b07700: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   20.189236]                                         ^
[   20.194274]  ffff000801b07780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.201481]  ffff000801b07800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.208680] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   19.252953] ==================================================================
[   19.260090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   19.267028] Write of size 1 at addr ffff000801781a78 by task kunit_try_catch/180
[   19.274406] 
[   19.275891] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   19.275944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.275960] Hardware name: WinLink E850-96 board (DT)
[   19.275981] Call trace:
[   19.275992]  show_stack+0x20/0x38 (C)
[   19.276024]  dump_stack_lvl+0x8c/0xd0
[   19.276062]  print_report+0x118/0x608
[   19.276098]  kasan_report+0xdc/0x128
[   19.276129]  __asan_report_store1_noabort+0x20/0x30
[   19.276160]  kmalloc_oob_right+0x538/0x660
[   19.276188]  kunit_try_run_case+0x170/0x3f0
[   19.276223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.276260]  kthread+0x328/0x630
[   19.276289]  ret_from_fork+0x10/0x20
[   19.276323] 
[   19.339596] Allocated by task 180:
[   19.342985]  kasan_save_stack+0x3c/0x68
[   19.346801]  kasan_save_track+0x20/0x40
[   19.350620]  kasan_save_alloc_info+0x40/0x58
[   19.354874]  __kasan_kmalloc+0xd4/0xd8
[   19.358606]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.363120]  kmalloc_oob_right+0xb0/0x660
[   19.367113]  kunit_try_run_case+0x170/0x3f0
[   19.371280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.376748]  kthread+0x328/0x630
[   19.379960]  ret_from_fork+0x10/0x20
[   19.383519] 
[   19.384996] The buggy address belongs to the object at ffff000801781a00
[   19.384996]  which belongs to the cache kmalloc-128 of size 128
[   19.397496] The buggy address is located 5 bytes to the right of
[   19.397496]  allocated 115-byte region [ffff000801781a00, ffff000801781a73)
[   19.410428] 
[   19.411907] The buggy address belongs to the physical page:
[   19.417464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780
[   19.425449] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.433086] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.440030] page_type: f5(slab)
[   19.443163] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.450886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.458612] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.466423] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.474236] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff
[   19.482048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.489854] page dumped because: kasan: bad access detected
[   19.495411] 
[   19.496885] Memory state around the buggy address:
[   19.501666]  ffff000801781900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.508869]  ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.516075] >ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.523274]                                                                 ^
[   19.530395]  ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.537600]  ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544801] ==================================================================
[   18.950581] ==================================================================
[   18.957142] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.964081] Write of size 1 at addr ffff000801781a73 by task kunit_try_catch/180
[   18.971459] 
[   18.972945] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G                 N  6.15.0-next-20250530 #1 PREEMPT 
[   18.972999] Tainted: [N]=TEST
[   18.973014] Hardware name: WinLink E850-96 board (DT)
[   18.973033] Call trace:
[   18.973047]  show_stack+0x20/0x38 (C)
[   18.973082]  dump_stack_lvl+0x8c/0xd0
[   18.973120]  print_report+0x118/0x608
[   18.973156]  kasan_report+0xdc/0x128
[   18.973188]  __asan_report_store1_noabort+0x20/0x30
[   18.973217]  kmalloc_oob_right+0x5a4/0x660
[   18.973248]  kunit_try_run_case+0x170/0x3f0
[   18.973287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.973323]  kthread+0x328/0x630
[   18.973352]  ret_from_fork+0x10/0x20
[   18.973386] 
[   19.035435] Allocated by task 180:
[   19.038823]  kasan_save_stack+0x3c/0x68
[   19.042639]  kasan_save_track+0x20/0x40
[   19.046458]  kasan_save_alloc_info+0x40/0x58
[   19.050711]  __kasan_kmalloc+0xd4/0xd8
[   19.054445]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.058958]  kmalloc_oob_right+0xb0/0x660
[   19.062951]  kunit_try_run_case+0x170/0x3f0
[   19.067118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.072586]  kthread+0x328/0x630
[   19.075798]  ret_from_fork+0x10/0x20
[   19.079357] 
[   19.080835] The buggy address belongs to the object at ffff000801781a00
[   19.080835]  which belongs to the cache kmalloc-128 of size 128
[   19.093335] The buggy address is located 0 bytes to the right of
[   19.093335]  allocated 115-byte region [ffff000801781a00, ffff000801781a73)
[   19.106266] 
[   19.107745] The buggy address belongs to the physical page:
[   19.113303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780
[   19.121287] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.128926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.135868] page_type: f5(slab)
[   19.139006] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.146724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.154451] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.162261] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.170074] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff
[   19.177886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.185692] page dumped because: kasan: bad access detected
[   19.191249] 
[   19.192723] Memory state around the buggy address:
[   19.197504]  ffff000801781900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.204706]  ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.211912] >ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.219111]                                                              ^
[   19.225973]  ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.233178]  ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.240380] ==================================================================
[   19.552183] ==================================================================
[   19.559215] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   19.566155] Read of size 1 at addr ffff000801781a80 by task kunit_try_catch/180
[   19.573447] 
[   19.574930] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   19.574980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.574995] Hardware name: WinLink E850-96 board (DT)
[   19.575012] Call trace:
[   19.575023]  show_stack+0x20/0x38 (C)
[   19.575054]  dump_stack_lvl+0x8c/0xd0
[   19.575088]  print_report+0x118/0x608
[   19.575124]  kasan_report+0xdc/0x128
[   19.575155]  __asan_report_load1_noabort+0x20/0x30
[   19.575183]  kmalloc_oob_right+0x5d0/0x660
[   19.575212]  kunit_try_run_case+0x170/0x3f0
[   19.575245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.575282]  kthread+0x328/0x630
[   19.575308]  ret_from_fork+0x10/0x20
[   19.575342] 
[   19.638550] Allocated by task 180:
[   19.641937]  kasan_save_stack+0x3c/0x68
[   19.645755]  kasan_save_track+0x20/0x40
[   19.649574]  kasan_save_alloc_info+0x40/0x58
[   19.653828]  __kasan_kmalloc+0xd4/0xd8
[   19.657560]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.662074]  kmalloc_oob_right+0xb0/0x660
[   19.666067]  kunit_try_run_case+0x170/0x3f0
[   19.670234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.675702]  kthread+0x328/0x630
[   19.678914]  ret_from_fork+0x10/0x20
[   19.682473] 
[   19.683950] The buggy address belongs to the object at ffff000801781a00
[   19.683950]  which belongs to the cache kmalloc-128 of size 128
[   19.696449] The buggy address is located 13 bytes to the right of
[   19.696449]  allocated 115-byte region [ffff000801781a00, ffff000801781a73)
[   19.709469] 
[   19.710946] The buggy address belongs to the physical page:
[   19.716503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780
[   19.724488] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.732127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.739071] page_type: f5(slab)
[   19.742204] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.749926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.757653] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.765464] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.773277] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff
[   19.781089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.788895] page dumped because: kasan: bad access detected
[   19.794452] 
[   19.795926] Memory state around the buggy address:
[   19.800706]  ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.807909]  ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.815113] >ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.822314]                    ^
[   19.825530]  ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.832735]  ffff000801781b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.839936] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  164.070161] WARNING: CPU: 2 PID: 749 at lib/math/int_log.c:120 intlog10+0x38/0x48
[  164.077628] Modules linked in:
[  164.080672] CPU: 2 UID: 0 PID: 749 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 PREEMPT 
[  164.091437] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  164.097242] Hardware name: WinLink E850-96 board (DT)
[  164.102279] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  164.109219] pc : intlog10+0x38/0x48
[  164.112691] lr : intlog10_test+0xe4/0x200
[  164.116684] sp : ffff80008b137c10
[  164.119983] x29: ffff80008b137c90 x28: 0000000000000000 x27: 0000000000000000
[  164.127101] x26: 1fffe001003b9861 x25: 0000000000000000 x24: ffff80008b137ce0
[  164.134220] x23: ffff80008b137d00 x22: 0000000000000000 x21: 1ffff00011626f82
[  164.141337] x20: ffff800083cd30c0 x19: ffff800087d77990 x18: 0000000079738866
[  164.148455] x17: 0000000000000001 x16: ffff00085af56d28 x15: 0000000000000000
[  164.155573] x14: 00000000f1f1f1f1 x13: 1fffe0010b5ead89 x12: ffff700010f6f979
[  164.162691] x11: 1ffff00010f6f978 x10: ffff700010f6f978 x9 : ffff80008126b66c
[  164.169809] x8 : ffff800087b7cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  164.176927] x5 : ffff700011626f82 x4 : 1ffff00010faef3a x3 : 1ffff0001079a618
[  164.184045] x2 : 1ffff0001079a618 x1 : 0000000000000003 x0 : 0000000000000000
[  164.191164] Call trace:
[  164.193596]  intlog10+0x38/0x48 (P)
[  164.197068]  kunit_try_run_case+0x170/0x3f0
[  164.201234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  164.206702]  kthread+0x328/0x630
[  164.209914]  ret_from_fork+0x10/0x20
[  164.213474] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  163.866865] WARNING: CPU: 3 PID: 731 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[  163.874157] Modules linked in:
[  163.877202] CPU: 3 UID: 0 PID: 731 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-next-20250530 #1 PREEMPT 
[  163.887971] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  163.892903] Hardware name: WinLink E850-96 board (DT)
[  163.897942] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  163.904882] pc : intlog2+0xd8/0xf8
[  163.908268] lr : intlog2_test+0xe4/0x200
[  163.912174] sp : ffff80008b017c10
[  163.915472] x29: ffff80008b017c90 x28: 0000000000000000 x27: 0000000000000000
[  163.922590] x26: 1fffe001002e6da1 x25: 0000000000000000 x24: ffff80008b017ce0
[  163.929708] x23: ffff80008b017d00 x22: 0000000000000000 x21: 1ffff00011602f82
[  163.936826] x20: ffff800083cd2fc0 x19: ffff800087d77990 x18: 00000000c4b5243a
[  163.943944] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  163.951062] x14: 00000000f1f1f1f1 x13: 1fffe0010b5ef189 x12: ffff700010f6f979
[  163.958180] x11: 1ffff00010f6f978 x10: ffff700010f6f978 x9 : ffff80008126b86c
[  163.965298] x8 : ffff800087b7cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  163.972416] x5 : ffff700011602f82 x4 : 1ffff00010faef3a x3 : 1ffff0001079a5f8
[  163.979534] x2 : 1ffff0001079a5f8 x1 : 0000000000000003 x0 : 0000000000000000
[  163.986655] Call trace:
[  163.989086]  intlog2+0xd8/0xf8 (P)
[  163.992470]  kunit_try_run_case+0x170/0x3f0
[  163.996636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  164.002103]  kthread+0x328/0x630
[  164.005316]  ret_from_fork+0x10/0x20
[  164.008878] ---[ end trace 0000000000000000 ]---
Failure - lava - job
(no logs available)
Failure - lava - fastboot-boot
(no logs available)
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot - panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block KNOWN ISSUE - e850-96: board rootfs mount failed intermittently - /dev/root: Can't open blockdev
[  251.367400] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[  251.375643] SMP: stopping secondary CPUs
[  251.379568] Kernel Offset: disabled
[  251.383016] CPU features: 0x1000,00000000,02004ca0,0400721b
[  251.388571] Memory Limit: none
[  251.391643] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---