Hay
Date
June 24, 2025, 11:37 a.m.
Failure - log-parser-boot - internal-error-oops-oops-smp
[  123.147341] Internal error: Oops: 0000000096000005 [#1]  SMP
[  123.153074] Modules linked in:
[  123.156195] CPU: 4 UID: 0 PID: 631 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[  123.167466] Tainted: [B]=BAD_PAGE, [N]=TEST
[  123.171708] Hardware name: Thundercomm Dragonboard 845c (DT)
[  123.177439] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  123.184493] pc : kunit_test_null_dereference+0x70/0x170
[  123.189811] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  123.195730] sp : ffff800085ff7d30
[  123.199097] x29: ffff800085ff7d90 x28: 0000000000000000 x27: 0000000000000000
[  123.206342] x26: 1fffe000128f8ec1 x25: 0000000000000000 x24: 0000000000000004
[  123.213580] x23: ffff0000947c760c x22: ffffae1d5d82a688 x21: ffff000094649a88
[  123.220820] x20: 1ffff00010bfefa6 x19: ffff8000800a7990 x18: 00000000a6c4e74d
[  123.228059] x17: 000000040044ffff x16: 005000f4b5503510 x15: 0000000000000000
[  123.235301] x14: ffff0000808ed100 x13: ffff51e378d28000 x12: ffff6000106108b4
[  123.242541] x11: 1fffe000106108b3 x10: ffff6000106108b3 x9 : ffffae1d5d821e30
[  123.249781] x8 : ffff800085ff7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  123.257018] x5 : ffff700010bfefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  123.264255] x2 : dfff800000000000 x1 : ffff000083083cc0 x0 : ffff8000800a7990
[  123.271493] Call trace:
[  123.273983]  kunit_test_null_dereference+0x70/0x170 (P)
[  123.279286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  123.284847]  kthread+0x328/0x630
[  123.288132]  ret_from_fork+0x10/0x20
[  123.291785] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  123.297968] ---[ end trace 0000000000000000 ]---
[  209.015722] Internal error: Oops: 0000000096000005 [#2]  SMP
[  209.015737] Modules linked in: qcom_rng(+) videobuf2_common(+) gpi(+) typec qrtr stm_core cfg80211(+) qcom_q6v5_mss qcrypto ufs_qcom(+) slim_qcom_ngd_ctrl(+) phy_qcom_qmp_ufs icc_osm_l3 phy_qcom_qmp_pcie lmh display_connector qcom_q6v5_pas(+) rfkill qcom_pil_info slimbus drm_kms_helper qcom_q6v5 pdr_interface qcom_wdt qcom_pdr_msg qcom_sysmon qcom_common icc_bwmon drm llcc_qcom qcom_glink_smem mdt_loader qmi_helpers backlight socinfo rmtfs_mem
[  209.015930] CPU: 4 UID: 0 PID: 3564 Comm: (udev-worker) Tainted: G    B D W        N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[  209.015960] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  209.015968] Hardware name: Thundercomm Dragonboard 845c (DT)
[  209.015978] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  209.015994] pc : ufs_qcom_setup_clocks+0x50/0x270 [ufs_qcom]
[  209.016029] lr : ufshcd_setup_clocks+0xc0/0xd28
[  209.016051] sp : ffff80008ef76de0
[  209.016058] x29: ffff80008ef76de0 x28: 1fffe00010a94127 x27: ffff0000854a0870
[  209.016084] x26: ffff0000854a12a0 x25: 1ffff00011deedf6 x24: ffff0000854a0870
[  209.016106] x23: ffff0000854a1280 x22: 0000000000000001 x21: ffff0000854a1298
[  209.016128] x20: 0000000000000000 x19: ffff0000854a0870 x18: ffff000083310218
[  209.016150] x17: 0000000000000000 x16: 0000000000000000 x15: ffffae1d5c995db4
[  209.016171] x14: ffffae1d5c99582c x13: ffffae1d5ff35da4 x12: ffff75c3ac812189
[  209.016191] x11: 1ffff5c3ac812188 x10: ffff75c3ac812188 x9 : ffffae1d5f442338
[  209.016213] x8 : ffffae1d64090c43 x7 : 0000000000000001 x6 : ffff75c3ac812188
[  209.016233] x5 : ffffae1d64090c40 x4 : 1fffe00010a94125 x3 : 0000000000000000
[  209.016254] x2 : 0000000000000000 x1 : 0000000000000001 x0 : dfff800000000000
[  209.016276] Call trace:
[  209.016285]  ufs_qcom_setup_clocks+0x50/0x270 [ufs_qcom] (P)
[  209.016313]  ufshcd_setup_clocks+0xc0/0xd28
[  209.016329]  ufshcd_init+0x5c0/0x3690
[  209.016348]  ufshcd_pltfrm_init+0x868/0xf10
[  209.016366]  ufs_qcom_probe+0x2c/0x68 [ufs_qcom]
[  209.016389]  platform_probe+0xcc/0x198
[  209.016409]  really_probe+0x188/0x7f0
[  209.016424]  __driver_probe_device+0x164/0x378
[  209.016441]  driver_probe_device+0x64/0x180
[  209.016454]  __driver_attach+0x1cc/0x478
[  209.016468]  bus_for_each_dev+0x10c/0x1a0
[  209.016487]  driver_attach+0x44/0x68
[  209.016500]  bus_add_driver+0x23c/0x4e8
[  209.016519]  driver_register+0xf8/0x3d0
[  209.016533]  __platform_driver_register+0x64/0x98
[  209.016550]  ufs_qcom_pltform_init+0x28/0xff8 [ufs_qcom]
[  209.016574]  do_one_initcall+0xcc/0x610
[  209.016592]  do_init_module+0x234/0x730
[  209.016613]  load_module+0x4afc/0x5e20
[  209.016630]  init_module_from_file+0xec/0x158
[  209.016648]  __arm64_sys_finit_module+0x434/0x790
[  209.016666]  invoke_syscall+0x74/0x268
[  209.016682]  el0_svc_common.constprop.0+0xb4/0x240
[  209.016697]  do_el0_svc+0x48/0x68
[  209.016710]  el0_svc+0x38/0xb8
[  209.016730]  el0t_64_sync_handler+0x10c/0x138
[  209.016749]  el0t_64_sync+0x198/0x1a0
[  209.016769] Code: f9405e74 d2d00000 f2fbffe0 d343fe83 (38e06860) 
[  209.016781] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[  110.483167] ==================================================================
[  110.490494] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[  110.490494] 
[  110.498882] Use-after-free read at 0x000000000955ff11 (in kfence-#60):
[  110.505502]  test_krealloc+0x51c/0x830
[  110.509329]  kunit_try_run_case+0x170/0x3f0
[  110.513594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.519169]  kthread+0x328/0x630
[  110.522461]  ret_from_fork+0x10/0x20
[  110.526104] 
[  110.527637] kfence-#60: 0x000000000955ff11-0x00000000995ea25e, size=32, cache=kmalloc-32
[  110.527637] 
[  110.537327] allocated by task 435 on cpu 3 at 110.483101s (0.054225s ago):
[  110.544318]  test_alloc+0x29c/0x628
[  110.547875]  test_krealloc+0xc0/0x830
[  110.551604]  kunit_try_run_case+0x170/0x3f0
[  110.555858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.561425]  kthread+0x328/0x630
[  110.564718]  ret_from_fork+0x10/0x20
[  110.568364] 
[  110.569896] freed by task 435 on cpu 3 at 110.483122s (0.086772s ago):
[  110.576524]  krealloc_noprof+0x148/0x360
[  110.580520]  test_krealloc+0x1dc/0x830
[  110.584337]  kunit_try_run_case+0x170/0x3f0
[  110.588592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.594159]  kthread+0x328/0x630
[  110.597453]  ret_from_fork+0x10/0x20
[  110.601097] 
[  110.602638] CPU: 3 UID: 0 PID: 435 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[  110.613909] Tainted: [B]=BAD_PAGE, [N]=TEST
[  110.618159] Hardware name: Thundercomm Dragonboard 845c (DT)
[  110.623901] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[  110.231198] ==================================================================
[  110.238558] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[  110.238558] 
[  110.248353] Use-after-free read at 0x000000007ada8e89 (in kfence-#58):
[  110.254968]  test_memcache_typesafe_by_rcu+0x280/0x560
[  110.260184]  kunit_try_run_case+0x170/0x3f0
[  110.264442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.270013]  kthread+0x328/0x630
[  110.273301]  ret_from_fork+0x10/0x20
[  110.276940] 
[  110.278467] kfence-#58: 0x000000007ada8e89-0x000000004de71c8c, size=32, cache=test
[  110.278467] 
[  110.287628] allocated by task 433 on cpu 4 at 110.180926s (0.106700s ago):
[  110.294611]  test_alloc+0x230/0x628
[  110.298160]  test_memcache_typesafe_by_rcu+0x15c/0x560
[  110.303370]  kunit_try_run_case+0x170/0x3f0
[  110.307623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.313191]  kthread+0x328/0x630
[  110.316477]  ret_from_fork+0x10/0x20
[  110.320110] 
[  110.321635] freed by task 433 on cpu 4 at 110.180936s (0.140697s ago):
[  110.328250]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[  110.333460]  kunit_try_run_case+0x170/0x3f0
[  110.337714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  110.343282]  kthread+0x328/0x630
[  110.346567]  ret_from_fork+0x10/0x20
[  110.350202] 
[  110.351734] CPU: 5 UID: 0 PID: 433 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[  110.363001] Tainted: [B]=BAD_PAGE, [N]=TEST
[  110.367249] Hardware name: Thundercomm Dragonboard 845c (DT)
[  110.372990] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   89.175964] ==================================================================
[   89.187372] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   89.187372] 
[   89.195622] Invalid read at 0x0000000056174ab1:
[   89.200263]  test_invalid_access+0xdc/0x1f0
[   89.205385]  kunit_try_run_case+0x170/0x3f0
[   89.209706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   89.215299]  kthread+0x328/0x630
[   89.218596]  ret_from_fork+0x10/0x20
[   89.222250] 
[   89.223810] CPU: 5 UID: 0 PID: 429 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   89.235099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   89.239358] Hardware name: Thundercomm Dragonboard 845c (DT)
[   89.245115] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   88.807235] ==================================================================
[   88.814585] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   88.814585] 
[   88.824279] Corrupted memory at 0x00000000872b9ec7 [ ! . . . . . . . . . . . . . . . ] (in kfence-#41):
[   88.833914]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   88.839218]  kunit_try_run_case+0x170/0x3f0
[   88.843477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.849046]  kthread+0x328/0x630
[   88.852334]  ret_from_fork+0x10/0x20
[   88.855972] 
[   88.857498] kfence-#41: 0x00000000ef1c4856-0x000000001879bfaf, size=73, cache=kmalloc-96
[   88.857498] 
[   88.867180] allocated by task 423 on cpu 5 at 88.807186s (0.059991s ago):
[   88.874070]  test_alloc+0x29c/0x628
[   88.877621]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   88.882832]  kunit_try_run_case+0x170/0x3f0
[   88.887086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.892653]  kthread+0x328/0x630
[   88.895939]  ret_from_fork+0x10/0x20
[   88.899573] 
[   88.901096] freed by task 423 on cpu 5 at 88.807195s (0.093899s ago):
[   88.907627]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   88.912925]  kunit_try_run_case+0x170/0x3f0
[   88.917177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.922745]  kthread+0x328/0x630
[   88.926031]  ret_from_fork+0x10/0x20
[   88.929666] 
[   88.931197] CPU: 5 UID: 0 PID: 423 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   88.942464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   88.946712] Hardware name: Thundercomm Dragonboard 845c (DT)
[   88.952450] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   88.271217] ==================================================================
[   88.278566] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   88.278566] 
[   88.288273] Out-of-bounds read at 0x00000000af97c6b6 (105B right of kfence-#36):
[   88.295769]  test_kmalloc_aligned_oob_read+0x238/0x468
[   88.300988]  kunit_try_run_case+0x170/0x3f0
[   88.305246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.310817]  kthread+0x328/0x630
[   88.314105]  ret_from_fork+0x10/0x20
[   88.317744] 
[   88.319271] kfence-#36: 0x000000000f436cf1-0x0000000049478458, size=73, cache=kmalloc-96
[   88.319271] 
[   88.328955] allocated by task 421 on cpu 7 at 88.271191s (0.057762s ago):
[   88.335849]  test_alloc+0x29c/0x628
[   88.339399]  test_kmalloc_aligned_oob_read+0x100/0x468
[   88.344611]  kunit_try_run_case+0x170/0x3f0
[   88.348864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.354432]  kthread+0x328/0x630
[   88.357717]  ret_from_fork+0x10/0x20
[   88.361352] 
[   88.362882] CPU: 7 UID: 0 PID: 421 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   88.374149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   88.378397] Hardware name: Thundercomm Dragonboard 845c (DT)
[   88.384134] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   83.135216] ==================================================================
[   83.142572] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   83.142572] 
[   83.150947] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#213):
[   83.157949]  test_corruption+0x1d8/0x378
[   83.161938]  kunit_try_run_case+0x170/0x3f0
[   83.166196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.171765]  kthread+0x328/0x630
[   83.175053]  ret_from_fork+0x10/0x20
[   83.178691] 
[   83.180217] kfence-#213: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   83.180217] 
[   83.189456] allocated by task 411 on cpu 5 at 83.135166s (0.054289s ago):
[   83.196345]  test_alloc+0x230/0x628
[   83.199894]  test_corruption+0x198/0x378
[   83.203878]  kunit_try_run_case+0x170/0x3f0
[   83.208130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.213698]  kthread+0x328/0x630
[   83.216984]  ret_from_fork+0x10/0x20
[   83.220619] 
[   83.222144] freed by task 411 on cpu 5 at 83.135175s (0.086967s ago):
[   83.228674]  test_corruption+0x1d8/0x378
[   83.232658]  kunit_try_run_case+0x170/0x3f0
[   83.236910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.242478]  kthread+0x328/0x630
[   83.245763]  ret_from_fork+0x10/0x20
[   83.249398] 
[   83.250927] CPU: 5 UID: 0 PID: 411 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   83.262196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.266443] Hardware name: Thundercomm Dragonboard 845c (DT)
[   83.272181] ==================================================================
[   82.535265] ==================================================================
[   82.542620] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   82.542620] 
[   82.550998] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#208):
[   82.558001]  test_corruption+0x284/0x378
[   82.561989]  kunit_try_run_case+0x170/0x3f0
[   82.566248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.571818]  kthread+0x328/0x630
[   82.575106]  ret_from_fork+0x10/0x20
[   82.578743] 
[   82.580269] kfence-#208: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   82.580269] 
[   82.590040] allocated by task 409 on cpu 5 at 82.535214s (0.054823s ago):
[   82.596928]  test_alloc+0x29c/0x628
[   82.600477]  test_corruption+0x198/0x378
[   82.604461]  kunit_try_run_case+0x170/0x3f0
[   82.608714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.614282]  kthread+0x328/0x630
[   82.617567]  ret_from_fork+0x10/0x20
[   82.621201] 
[   82.622726] freed by task 409 on cpu 5 at 82.535225s (0.087499s ago):
[   82.629257]  test_corruption+0x284/0x378
[   82.633240]  kunit_try_run_case+0x170/0x3f0
[   82.637492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.643058]  kthread+0x328/0x630
[   82.646343]  ret_from_fork+0x10/0x20
[   82.649977] 
[   82.651508] CPU: 5 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   82.662776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.667024] Hardware name: Thundercomm Dragonboard 845c (DT)
[   82.672762] ==================================================================
[   82.783180] ==================================================================
[   82.790509] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   82.790509] 
[   82.798888] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#210):
[   82.808607]  test_corruption+0x120/0x378
[   82.812596]  kunit_try_run_case+0x170/0x3f0
[   82.816854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.822424]  kthread+0x328/0x630
[   82.825712]  ret_from_fork+0x10/0x20
[   82.829349] 
[   82.830875] kfence-#210: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   82.830875] 
[   82.840114] allocated by task 411 on cpu 5 at 82.783139s (0.056973s ago):
[   82.847005]  test_alloc+0x230/0x628
[   82.850554]  test_corruption+0xdc/0x378
[   82.854451]  kunit_try_run_case+0x170/0x3f0
[   82.858704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.864271]  kthread+0x328/0x630
[   82.867557]  ret_from_fork+0x10/0x20
[   82.871191] 
[   82.872716] freed by task 411 on cpu 5 at 82.783149s (0.089565s ago):
[   82.879247]  test_corruption+0x120/0x378
[   82.883232]  kunit_try_run_case+0x170/0x3f0
[   82.887484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.893052]  kthread+0x328/0x630
[   82.896337]  ret_from_fork+0x10/0x20
[   82.899972] 
[   82.901501] CPU: 5 UID: 0 PID: 411 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   82.912767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.917016] Hardware name: Thundercomm Dragonboard 845c (DT)
[   82.922751] ==================================================================
[   82.075232] ==================================================================
[   82.082588] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   82.082588] 
[   82.090966] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#204):
[   82.100688]  test_corruption+0x278/0x378
[   82.104678]  kunit_try_run_case+0x170/0x3f0
[   82.108937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.114507]  kthread+0x328/0x630
[   82.117796]  ret_from_fork+0x10/0x20
[   82.121435] 
[   82.122963] kfence-#204: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   82.122963] 
[   82.132731] allocated by task 409 on cpu 5 at 82.075182s (0.057548s ago):
[   82.139620]  test_alloc+0x29c/0x628
[   82.143169]  test_corruption+0xdc/0x378
[   82.147066]  kunit_try_run_case+0x170/0x3f0
[   82.151320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.156888]  kthread+0x328/0x630
[   82.160173]  ret_from_fork+0x10/0x20
[   82.163807] 
[   82.165330] freed by task 409 on cpu 5 at 82.075191s (0.090137s ago):
[   82.171861]  test_corruption+0x278/0x378
[   82.175846]  kunit_try_run_case+0x170/0x3f0
[   82.180099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.185666]  kthread+0x328/0x630
[   82.188952]  ret_from_fork+0x10/0x20
[   82.192586] 
[   82.194117] CPU: 5 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   82.205385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.209633] Hardware name: Thundercomm Dragonboard 845c (DT)
[   82.215372] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   81.647195] ==================================================================
[   81.654527] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   81.654527] 
[   81.662989] Invalid free of 0x(____ptrval____) (in kfence-#200):
[   81.669080]  test_invalid_addr_free+0xec/0x238
[   81.673600]  kunit_try_run_case+0x170/0x3f0
[   81.677858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.683428]  kthread+0x328/0x630
[   81.686716]  ret_from_fork+0x10/0x20
[   81.690353] 
[   81.691880] kfence-#200: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   81.691880] 
[   81.701119] allocated by task 407 on cpu 4 at 81.647159s (0.053958s ago):
[   81.708008]  test_alloc+0x230/0x628
[   81.711557]  test_invalid_addr_free+0xd4/0x238
[   81.716074]  kunit_try_run_case+0x170/0x3f0
[   81.720327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.725894]  kthread+0x328/0x630
[   81.729178]  ret_from_fork+0x10/0x20
[   81.732813] 
[   81.734345] CPU: 4 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   81.745610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.749858] Hardware name: Thundercomm Dragonboard 845c (DT)
[   81.755597] ==================================================================
[   81.427194] ==================================================================
[   81.434544] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   81.434544] 
[   81.443100] Invalid free of 0x(____ptrval____) (in kfence-#198):
[   81.449195]  test_invalid_addr_free+0x1ac/0x238
[   81.453803]  kunit_try_run_case+0x170/0x3f0
[   81.458063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.463635]  kthread+0x328/0x630
[   81.466925]  ret_from_fork+0x10/0x20
[   81.470565] 
[   81.472091] kfence-#198: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   81.472091] 
[   81.481862] allocated by task 405 on cpu 4 at 81.427154s (0.054706s ago):
[   81.488751]  test_alloc+0x29c/0x628
[   81.492301]  test_invalid_addr_free+0xd4/0x238
[   81.496816]  kunit_try_run_case+0x170/0x3f0
[   81.501069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.506637]  kthread+0x328/0x630
[   81.509922]  ret_from_fork+0x10/0x20
[   81.513556] 
[   81.515086] CPU: 4 UID: 0 PID: 405 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   81.526353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.530600] Hardware name: Thundercomm Dragonboard 845c (DT)
[   81.536337] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   80.935238] ==================================================================
[   80.942589] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   80.942589] 
[   80.950620] Invalid free of 0x(____ptrval____) (in kfence-#194):
[   80.956711]  test_double_free+0x1bc/0x238
[   80.960788]  kunit_try_run_case+0x170/0x3f0
[   80.965047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.970615]  kthread+0x328/0x630
[   80.973904]  ret_from_fork+0x10/0x20
[   80.977542] 
[   80.979068] kfence-#194: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   80.979068] 
[   80.988838] allocated by task 401 on cpu 4 at 80.935184s (0.053653s ago):
[   80.995727]  test_alloc+0x29c/0x628
[   80.999278]  test_double_free+0xd4/0x238
[   81.003262]  kunit_try_run_case+0x170/0x3f0
[   81.007514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.013082]  kthread+0x328/0x630
[   81.016367]  ret_from_fork+0x10/0x20
[   81.020002] 
[   81.021526] freed by task 401 on cpu 4 at 80.935194s (0.086330s ago):
[   81.028057]  test_double_free+0x1ac/0x238
[   81.032128]  kunit_try_run_case+0x170/0x3f0
[   81.036381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.041948]  kthread+0x328/0x630
[   81.045233]  ret_from_fork+0x10/0x20
[   81.048867] 
[   81.050399] CPU: 4 UID: 0 PID: 401 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   81.061667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.065915] Hardware name: Thundercomm Dragonboard 845c (DT)
[   81.071651] ==================================================================
[   81.183164] ==================================================================
[   81.190502] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   81.190502] 
[   81.198531] Invalid free of 0x(____ptrval____) (in kfence-#196):
[   81.204623]  test_double_free+0x100/0x238
[   81.208708]  kunit_try_run_case+0x170/0x3f0
[   81.212964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.218533]  kthread+0x328/0x630
[   81.221822]  ret_from_fork+0x10/0x20
[   81.225459] 
[   81.226986] kfence-#196: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   81.226986] 
[   81.236224] allocated by task 403 on cpu 5 at 81.183118s (0.053103s ago):
[   81.243112]  test_alloc+0x230/0x628
[   81.246662]  test_double_free+0xd4/0x238
[   81.250645]  kunit_try_run_case+0x170/0x3f0
[   81.254898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.260466]  kthread+0x328/0x630
[   81.263750]  ret_from_fork+0x10/0x20
[   81.267385] 
[   81.268908] freed by task 403 on cpu 5 at 81.183126s (0.085780s ago):
[   81.275439]  test_double_free+0xf0/0x238
[   81.279423]  kunit_try_run_case+0x170/0x3f0
[   81.283676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.289243]  kthread+0x328/0x630
[   81.292528]  ret_from_fork+0x10/0x20
[   81.296164] 
[   81.297695] CPU: 5 UID: 0 PID: 403 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   81.308961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.313208] Hardware name: Thundercomm Dragonboard 845c (DT)
[   81.318945] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   80.227520] ==================================================================
[   80.234858] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   80.234858] 
[   80.244207] Use-after-free read at 0x(____ptrval____) (in kfence-#188):
[   80.250917]  test_use_after_free_read+0x114/0x248
[   80.255698]  kunit_try_run_case+0x170/0x3f0
[   80.259957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.265526]  kthread+0x328/0x630
[   80.268815]  ret_from_fork+0x10/0x20
[   80.272453] 
[   80.273979] kfence-#188: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   80.273979] 
[   80.283748] allocated by task 393 on cpu 4 at 80.227478s (0.056268s ago):
[   80.290641]  test_alloc+0x29c/0x628
[   80.294190]  test_use_after_free_read+0xd0/0x248
[   80.298881]  kunit_try_run_case+0x170/0x3f0
[   80.303134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.308701]  kthread+0x328/0x630
[   80.311986]  ret_from_fork+0x10/0x20
[   80.315621] 
[   80.317145] freed by task 393 on cpu 4 at 80.227488s (0.089655s ago):
[   80.323676]  test_use_after_free_read+0x1c0/0x248
[   80.328451]  kunit_try_run_case+0x170/0x3f0
[   80.332704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.338272]  kthread+0x328/0x630
[   80.341557]  ret_from_fork+0x10/0x20
[   80.345192] 
[   80.346723] CPU: 4 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   80.357988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.362236] Hardware name: Thundercomm Dragonboard 845c (DT)
[   80.367974] ==================================================================
[   80.479182] ==================================================================
[   80.486519] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   80.486519] 
[   80.495873] Use-after-free read at 0x(____ptrval____) (in kfence-#190):
[   80.502584]  test_use_after_free_read+0x114/0x248
[   80.507367]  kunit_try_run_case+0x170/0x3f0
[   80.511625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.517194]  kthread+0x328/0x630
[   80.520483]  ret_from_fork+0x10/0x20
[   80.524122] 
[   80.525647] kfence-#190: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   80.525647] 
[   80.534886] allocated by task 395 on cpu 5 at 80.479146s (0.055738s ago):
[   80.541780]  test_alloc+0x230/0x628
[   80.545329]  test_use_after_free_read+0xd0/0x248
[   80.550018]  kunit_try_run_case+0x170/0x3f0
[   80.554271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.559838]  kthread+0x328/0x630
[   80.563125]  ret_from_fork+0x10/0x20
[   80.566759] 
[   80.568283] freed by task 395 on cpu 5 at 80.479155s (0.089127s ago):
[   80.574814]  test_use_after_free_read+0xf0/0x248
[   80.579505]  kunit_try_run_case+0x170/0x3f0
[   80.583758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.589324]  kthread+0x328/0x630
[   80.592611]  ret_from_fork+0x10/0x20
[   80.596246] 
[   80.597776] CPU: 5 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   80.609041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.613290] Hardware name: Thundercomm Dragonboard 845c (DT)
[   80.619027] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   79.475176] ==================================================================
[   79.482519] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   79.482519] 
[   79.491880] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#181):
[   79.499289]  test_out_of_bounds_write+0x100/0x240
[   79.504072]  kunit_try_run_case+0x170/0x3f0
[   79.508332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.513902]  kthread+0x328/0x630
[   79.517190]  ret_from_fork+0x10/0x20
[   79.520827] 
[   79.522353] kfence-#181: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   79.522353] 
[   79.532123] allocated by task 389 on cpu 5 at 79.475151s (0.056969s ago):
[   79.539015]  test_alloc+0x29c/0x628
[   79.542565]  test_out_of_bounds_write+0xc8/0x240
[   79.547254]  kunit_try_run_case+0x170/0x3f0
[   79.551507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.557073]  kthread+0x328/0x630
[   79.560359]  ret_from_fork+0x10/0x20
[   79.563993] 
[   79.565523] CPU: 5 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   79.576790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.581039] Hardware name: Thundercomm Dragonboard 845c (DT)
[   79.586776] ==================================================================
[   80.007203] ==================================================================
[   80.014563] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   80.014563] 
[   80.023912] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#186):
[   80.031320]  test_out_of_bounds_write+0x100/0x240
[   80.036102]  kunit_try_run_case+0x170/0x3f0
[   80.040361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.045929]  kthread+0x328/0x630
[   80.049217]  ret_from_fork+0x10/0x20
[   80.052856] 
[   80.054381] kfence-#186: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   80.054381] 
[   80.063619] allocated by task 391 on cpu 4 at 80.007178s (0.056440s ago):
[   80.070514]  test_alloc+0x230/0x628
[   80.074064]  test_out_of_bounds_write+0xc8/0x240
[   80.078754]  kunit_try_run_case+0x170/0x3f0
[   80.083006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.088574]  kthread+0x328/0x630
[   80.091859]  ret_from_fork+0x10/0x20
[   80.095494] 
[   80.097024] CPU: 4 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   80.108291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.112540] Hardware name: Thundercomm Dragonboard 845c (DT)
[   80.118279] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   78.931214] ==================================================================
[   78.938574] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   78.938574] 
[   78.947747] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#176):
[   78.955071]  test_out_of_bounds_read+0x114/0x3e0
[   78.959766]  kunit_try_run_case+0x170/0x3f0
[   78.964024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.969595]  kthread+0x328/0x630
[   78.972884]  ret_from_fork+0x10/0x20
[   78.976522] 
[   78.978046] kfence-#176: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   78.978046] 
[   78.987282] allocated by task 387 on cpu 4 at 78.931188s (0.056093s ago):
[   78.994172]  test_alloc+0x230/0x628
[   78.997722]  test_out_of_bounds_read+0xdc/0x3e0
[   79.002326]  kunit_try_run_case+0x170/0x3f0
[   79.006579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.012146]  kthread+0x328/0x630
[   79.015431]  ret_from_fork+0x10/0x20
[   79.019067] 
[   79.020597] CPU: 4 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   79.031863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.036110] Hardware name: Thundercomm Dragonboard 845c (DT)
[   79.041846] ==================================================================
[   79.255191] ==================================================================
[   79.262545] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   79.262545] 
[   79.271716] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#179):
[   79.279209]  test_out_of_bounds_read+0x1c8/0x3e0
[   79.283903]  kunit_try_run_case+0x170/0x3f0
[   79.288161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.293730]  kthread+0x328/0x630
[   79.297019]  ret_from_fork+0x10/0x20
[   79.300656] 
[   79.302192] kfence-#179: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   79.302192] 
[   79.311430] allocated by task 387 on cpu 4 at 79.255168s (0.056260s ago):
[   79.318322]  test_alloc+0x230/0x628
[   79.321871]  test_out_of_bounds_read+0x198/0x3e0
[   79.326562]  kunit_try_run_case+0x170/0x3f0
[   79.330815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.336382]  kthread+0x328/0x630
[   79.339667]  ret_from_fork+0x10/0x20
[   79.343303] 
[   79.344833] CPU: 4 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   79.356100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.360348] Hardware name: Thundercomm Dragonboard 845c (DT)
[   79.366085] ==================================================================
[   78.283153] ==================================================================
[   78.290478] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   78.290478] 
[   78.299642] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#170):
[   78.306964]  test_out_of_bounds_read+0x114/0x3e0
[   78.311658]  kunit_try_run_case+0x170/0x3f0
[   78.315910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.321480]  kthread+0x328/0x630
[   78.324768]  ret_from_fork+0x10/0x20
[   78.328403] 
[   78.329930] kfence-#170: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   78.329930] 
[   78.339699] allocated by task 385 on cpu 4 at 78.283131s (0.056566s ago):
[   78.346590]  test_alloc+0x29c/0x628
[   78.350140]  test_out_of_bounds_read+0xdc/0x3e0
[   78.354742]  kunit_try_run_case+0x170/0x3f0
[   78.358995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.364564]  kthread+0x328/0x630
[   78.367849]  ret_from_fork+0x10/0x20
[   78.371484] 
[   78.373013] CPU: 4 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   78.384276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.388524] Hardware name: Thundercomm Dragonboard 845c (DT)
[   78.394260] ==================================================================
[   78.503190] ==================================================================
[   78.510523] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   78.510523] 
[   78.519688] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#172):
[   78.527183]  test_out_of_bounds_read+0x1c8/0x3e0
[   78.531875]  kunit_try_run_case+0x170/0x3f0
[   78.536133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.541703]  kthread+0x328/0x630
[   78.544991]  ret_from_fork+0x10/0x20
[   78.548624] 
[   78.550150] kfence-#172: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   78.550150] 
[   78.559917] allocated by task 385 on cpu 4 at 78.503167s (0.056748s ago):
[   78.566811]  test_alloc+0x29c/0x628
[   78.570361]  test_out_of_bounds_read+0x198/0x3e0
[   78.575051]  kunit_try_run_case+0x170/0x3f0
[   78.579304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.584873]  kthread+0x328/0x630
[   78.588158]  ret_from_fork+0x10/0x20
[   78.591792] 
[   78.593322] CPU: 4 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   78.604587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.608837] Hardware name: Thundercomm Dragonboard 845c (DT)
[   78.614574] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   30.358053] ==================================================================
[   30.381778] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   30.381778] 
[   30.391464] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#98):
[   30.399638]  kmalloc_track_caller_oob_right+0x224/0x488
[   30.404941]  kunit_try_run_case+0x170/0x3f0
[   30.409189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.414752]  kthread+0x328/0x630
[   30.418031]  ret_from_fork+0x10/0x20
[   30.421671] 
[   30.423204] kfence-#98: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   30.423204] 
[   30.433064] allocated by task 240 on cpu 3 at 30.357028s (0.076034s ago):
[   30.439952]  kmalloc_track_caller_oob_right+0x184/0x488
[   30.445253]  kunit_try_run_case+0x170/0x3f0
[   30.449501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.455060]  kthread+0x328/0x630
[   30.458340]  ret_from_fork+0x10/0x20
[   30.461976] 
[   30.463506] freed by task 240 on cpu 7 at 30.358025s (0.105479s ago):
[   30.470039]  kmalloc_track_caller_oob_right+0x224/0x488
[   30.475339]  kunit_try_run_case+0x170/0x3f0
[   30.479591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.485150]  kthread+0x328/0x630
[   30.488429]  ret_from_fork+0x10/0x20
[   30.492068] 
[   30.493594] CPU: 7 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   30.504863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.509103] Hardware name: Thundercomm Dragonboard 845c (DT)
[   30.514833] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-__nvmem_cell_readpart
[  210.183881] ==================================================================
[  210.183888] BUG: KASAN: slab-out-of-bounds in __nvmem_cell_read.part.0+0x518/0x650
[  210.183904] Read of size 1 at addr ffff000091646f24 by task kworker/u32:2/67
[  210.183910] 
[  210.183917] CPU: 7 UID: 0 PID: 67 Comm: kworker/u32:2 Tainted: G    B D W        N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[  210.183929] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  210.183931] Hardware name: Thundercomm Dragonboard 845c (DT)
[  210.183936] Workqueue: events_unbound deferred_probe_work_func
[  210.183947] Call trace:
[  210.183951]  show_stack+0x20/0x38 (C)
[  210.183959]  dump_stack_lvl+0x8c/0xd0
[  210.183967]  print_report+0x118/0x608
[  210.183976]  kasan_report+0xdc/0x128
[  210.183981]  __asan_report_load1_noabort+0x20/0x30
[  210.183986]  __nvmem_cell_read.part.0+0x518/0x650
[  210.183991]  nvmem_cell_read+0x18c/0x248
[  210.183995]  qusb2_phy_init+0x6a4/0x1748
[  210.184003]  phy_init+0x120/0x2f8
[  210.184010]  dwc3_core_init+0x298/0x5290
[  210.184016]  dwc3_core_probe+0x1d1c/0x4bf8
[  210.184021]  dwc3_probe+0xd4/0x158
[  210.184025]  platform_probe+0xcc/0x198
[  210.184032]  really_probe+0x188/0x7f0
[  210.184036]  __driver_probe_device+0x164/0x378
[  210.184041]  driver_probe_device+0x64/0x180
[  210.184046]  __device_attach_driver+0x174/0x280
[  210.184050]  bus_for_each_drv+0x118/0x1b0
[  210.184056]  __device_attach+0x174/0x378
[  210.184061]  device_initial_probe+0x1c/0x30
[  210.184065]  bus_probe_device+0x12c/0x170
[  210.184071]  deferred_probe_work_func+0x140/0x208
[  210.184075]  process_one_work+0x530/0xf98
[  210.184082]  worker_thread+0x618/0xf38
[  210.184086]  kthread+0x328/0x630
[  210.184091]  ret_from_fork+0x10/0x20
[  210.184098] 
[  210.184101] Allocated by task 67:
[  210.184105]  kasan_save_stack+0x3c/0x68
[  210.184110]  kasan_save_track+0x20/0x40
[  210.184114]  kasan_save_alloc_info+0x40/0x58
[  210.184118]  __kasan_kmalloc+0xd4/0xd8
[  210.184123]  __kmalloc_noprof+0x198/0x4c8
[  210.184129]  nvmem_cell_read+0xb8/0x248
[  210.184133]  qusb2_phy_init+0x6a4/0x1748
[  210.184138]  phy_init+0x120/0x2f8
[  210.184143]  dwc3_core_init+0x298/0x5290
[  210.184147]  dwc3_core_probe+0x1d1c/0x4bf8
[  210.184150]  dwc3_probe+0xd4/0x158
[  210.184154]  platform_probe+0xcc/0x198
[  210.184160]  really_probe+0x188/0x7f0
[  210.184163]  __driver_probe_device+0x164/0x378
[  210.184167]  driver_probe_device+0x64/0x180
[  210.184171]  __device_attach_driver+0x174/0x280
[  210.184174]  bus_for_each_drv+0x118/0x1b0
[  210.184179]  __device_attach+0x174/0x378
[  210.184183]  device_initial_probe+0x1c/0x30
[  210.184186]  bus_probe_device+0x12c/0x170
[  210.184192]  deferred_probe_work_func+0x140/0x208
[  210.184196]  process_one_work+0x530/0xf98
[  210.184200]  worker_thread+0x618/0xf38
[  210.184204]  kthread+0x328/0x630
[  210.184208]  ret_from_fork+0x10/0x20
[  210.184212] 
[  210.184213] The buggy address belongs to the object at ffff000091646f20
[  210.184213]  which belongs to the cache kmalloc-8 of size 8
[  210.184218] The buggy address is located 0 bytes to the right of
[  210.184218]  allocated 4-byte region [ffff000091646f20, ffff000091646f24)
[  210.184223] 
[  210.184226] The buggy address belongs to the physical page:
[  210.184230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff000091646680 pfn:0x111646
[  210.184236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[  210.184243] page_type: f5(slab)
[  210.184250] raw: 0bfffe0000000000 ffff000080002500 dead000000000122 0000000000000000
[  210.184255] raw: ffff000091646680 0000000080800067 00000000f5000000 0000000000000000
[  210.184258] page dumped because: kasan: bad access detected
[  210.184260] 
[  210.184262] Memory state around the buggy address:
[  210.184265]  ffff000091646e00: 00 fc fc fc 00 fc fc fc 04 fc fc fc 04 fc fc fc
[  210.184268]  ffff000091646e80: 00 fc fc fc 00 fc fc fc fa fc fc fc fa fc fc fc
[  210.184272] >ffff000091646f00: 00 fc fc fc 04 fc fc fc fc fc fc fc fc fc fc fc
[  210.184275]                                ^
[  210.184277]  ffff000091646f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  210.184280]  ffff000091647000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  210.184283] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   77.551244] ==================================================================
[   77.558555] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   77.565528] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383
[   77.573192] 
[   77.574718] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   77.574746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.574754] Hardware name: Thundercomm Dragonboard 845c (DT)
[   77.574765] Call trace:
[   77.574771]  show_stack+0x20/0x38 (C)
[   77.574788]  dump_stack_lvl+0x8c/0xd0
[   77.574806]  print_report+0x118/0x608
[   77.574825]  kasan_report+0xdc/0x128
[   77.574844]  kasan_check_range+0x100/0x1a8
[   77.574864]  __kasan_check_write+0x20/0x30
[   77.574880]  strncpy_from_user+0x3c/0x2a0
[   77.574896]  copy_user_test_oob+0x5c0/0xec8
[   77.574914]  kunit_try_run_case+0x170/0x3f0
[   77.574933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.574954]  kthread+0x328/0x630
[   77.574968]  ret_from_fork+0x10/0x20
[   77.574985] 
[   77.648151] Allocated by task 383:
[   77.651607]  kasan_save_stack+0x3c/0x68
[   77.655506]  kasan_save_track+0x20/0x40
[   77.659404]  kasan_save_alloc_info+0x40/0x58
[   77.663742]  __kasan_kmalloc+0xd4/0xd8
[   77.667552]  __kmalloc_noprof+0x198/0x4c8
[   77.671622]  kunit_kmalloc_array+0x34/0x88
[   77.675789]  copy_user_test_oob+0xac/0xec8
[   77.679955]  kunit_try_run_case+0x170/0x3f0
[   77.684210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.689778]  kthread+0x328/0x630
[   77.693064]  ret_from_fork+0x10/0x20
[   77.696699] 
[   77.698223] The buggy address belongs to the object at ffff0000947c2c00
[   77.698223]  which belongs to the cache kmalloc-128 of size 128
[   77.710875] The buggy address is located 0 bytes inside of
[   77.710875]  allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78)
[   77.723445] 
[   77.724969] The buggy address belongs to the physical page:
[   77.730614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2
[   77.738720] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   77.746467] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   77.753521] page_type: f5(slab)
[   77.756720] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.764557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.772392] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.780314] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.788237] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff
[   77.796159] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   77.804076] page dumped because: kasan: bad access detected
[   77.809723] 
[   77.811246] Memory state around the buggy address:
[   77.816101]  ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.823415]  ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.830727] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.838037]                                                                 ^
[   77.845261]  ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.852574]  ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.859884] ==================================================================
[   77.867256] ==================================================================
[   77.874567] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   77.881624] Write of size 1 at addr ffff0000947c2c78 by task kunit_try_catch/383
[   77.889113] 
[   77.890648] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   77.890678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.890686] Hardware name: Thundercomm Dragonboard 845c (DT)
[   77.890697] Call trace:
[   77.890702]  show_stack+0x20/0x38 (C)
[   77.890719]  dump_stack_lvl+0x8c/0xd0
[   77.890738]  print_report+0x118/0x608
[   77.890757]  kasan_report+0xdc/0x128
[   77.890776]  __asan_report_store1_noabort+0x20/0x30
[   77.890793]  strncpy_from_user+0x270/0x2a0
[   77.890810]  copy_user_test_oob+0x5c0/0xec8
[   77.890829]  kunit_try_run_case+0x170/0x3f0
[   77.890846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.890866]  kthread+0x328/0x630
[   77.890881]  ret_from_fork+0x10/0x20
[   77.890897] 
[   77.960792] Allocated by task 383:
[   77.964248]  kasan_save_stack+0x3c/0x68
[   77.968146]  kasan_save_track+0x20/0x40
[   77.972044]  kasan_save_alloc_info+0x40/0x58
[   77.976382]  __kasan_kmalloc+0xd4/0xd8
[   77.980191]  __kmalloc_noprof+0x198/0x4c8
[   77.984261]  kunit_kmalloc_array+0x34/0x88
[   77.988417]  copy_user_test_oob+0xac/0xec8
[   77.992585]  kunit_try_run_case+0x170/0x3f0
[   77.996837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.002404]  kthread+0x328/0x630
[   78.005691]  ret_from_fork+0x10/0x20
[   78.009325] 
[   78.010848] The buggy address belongs to the object at ffff0000947c2c00
[   78.010848]  which belongs to the cache kmalloc-128 of size 128
[   78.023500] The buggy address is located 0 bytes to the right of
[   78.023500]  allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78)
[   78.036589] 
[   78.038112] The buggy address belongs to the physical page:
[   78.043758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2
[   78.051864] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   78.059611] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   78.066664] page_type: f5(slab)
[   78.069862] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   78.077699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.085536] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   78.093459] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.101382] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff
[   78.109303] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   78.117222] page dumped because: kasan: bad access detected
[   78.122867] 
[   78.124390] Memory state around the buggy address:
[   78.129246]  ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.136558]  ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.143870] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.151180]                                                                 ^
[   78.158403]  ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.165714]  ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.173024] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   76.303171] ==================================================================
[   76.310490] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   76.317634] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383
[   76.325298] 
[   76.326824] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   76.326853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.326861] Hardware name: Thundercomm Dragonboard 845c (DT)
[   76.326871] Call trace:
[   76.326879]  show_stack+0x20/0x38 (C)
[   76.326898]  dump_stack_lvl+0x8c/0xd0
[   76.326916]  print_report+0x118/0x608
[   76.326934]  kasan_report+0xdc/0x128
[   76.326953]  kasan_check_range+0x100/0x1a8
[   76.326972]  __kasan_check_write+0x20/0x30
[   76.326987]  copy_user_test_oob+0x35c/0xec8
[   76.327004]  kunit_try_run_case+0x170/0x3f0
[   76.327022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.327042]  kthread+0x328/0x630
[   76.327057]  ret_from_fork+0x10/0x20
[   76.327073] 
[   76.396165] Allocated by task 383:
[   76.399616]  kasan_save_stack+0x3c/0x68
[   76.403520]  kasan_save_track+0x20/0x40
[   76.407425]  kasan_save_alloc_info+0x40/0x58
[   76.411758]  __kasan_kmalloc+0xd4/0xd8
[   76.415574]  __kmalloc_noprof+0x198/0x4c8
[   76.419650]  kunit_kmalloc_array+0x34/0x88
[   76.423811]  copy_user_test_oob+0xac/0xec8
[   76.427973]  kunit_try_run_case+0x170/0x3f0
[   76.432222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.437786]  kthread+0x328/0x630
[   76.441066]  ret_from_fork+0x10/0x20
[   76.444708] 
[   76.446230] The buggy address belongs to the object at ffff0000947c2c00
[   76.446230]  which belongs to the cache kmalloc-128 of size 128
[   76.458879] The buggy address is located 0 bytes inside of
[   76.458879]  allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78)
[   76.471450] 
[   76.472972] The buggy address belongs to the physical page:
[   76.478614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2
[   76.486712] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   76.494460] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   76.501516] page_type: f5(slab)
[   76.504712] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   76.512550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.520389] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   76.528312] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.536237] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff
[   76.544160] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   76.552080] page dumped because: kasan: bad access detected
[   76.557722] 
[   76.559252] Memory state around the buggy address:
[   76.564111]  ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.571423]  ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.578729] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   76.586039]                                                                 ^
[   76.593262]  ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.600575]  ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.607888] ==================================================================
[   77.239310] ==================================================================
[   77.246620] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   77.253763] Read of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383
[   77.261340] 
[   77.262865] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   77.262894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.262902] Hardware name: Thundercomm Dragonboard 845c (DT)
[   77.262912] Call trace:
[   77.262918]  show_stack+0x20/0x38 (C)
[   77.262934]  dump_stack_lvl+0x8c/0xd0
[   77.262952]  print_report+0x118/0x608
[   77.262970]  kasan_report+0xdc/0x128
[   77.262988]  kasan_check_range+0x100/0x1a8
[   77.263007]  __kasan_check_read+0x20/0x30
[   77.263022]  copy_user_test_oob+0x4a0/0xec8
[   77.263041]  kunit_try_run_case+0x170/0x3f0
[   77.263058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.263078]  kthread+0x328/0x630
[   77.263092]  ret_from_fork+0x10/0x20
[   77.263110] 
[   77.332135] Allocated by task 383:
[   77.335591]  kasan_save_stack+0x3c/0x68
[   77.339490]  kasan_save_track+0x20/0x40
[   77.343387]  kasan_save_alloc_info+0x40/0x58
[   77.347726]  __kasan_kmalloc+0xd4/0xd8
[   77.351534]  __kmalloc_noprof+0x198/0x4c8
[   77.355604]  kunit_kmalloc_array+0x34/0x88
[   77.359770]  copy_user_test_oob+0xac/0xec8
[   77.363937]  kunit_try_run_case+0x170/0x3f0
[   77.368191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.373761]  kthread+0x328/0x630
[   77.377046]  ret_from_fork+0x10/0x20
[   77.380682] 
[   77.382205] The buggy address belongs to the object at ffff0000947c2c00
[   77.382205]  which belongs to the cache kmalloc-128 of size 128
[   77.394857] The buggy address is located 0 bytes inside of
[   77.394857]  allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78)
[   77.407426] 
[   77.408950] The buggy address belongs to the physical page:
[   77.414596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2
[   77.422703] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   77.430452] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   77.437505] page_type: f5(slab)
[   77.440703] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.448539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.456375] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.464296] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.472218] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff
[   77.480139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   77.488058] page dumped because: kasan: bad access detected
[   77.493703] 
[   77.495225] Memory state around the buggy address:
[   77.500080]  ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.507392]  ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.514703] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.522013]                                                                 ^
[   77.529235]  ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.536547]  ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.543857] ==================================================================
[   75.672698] ==================================================================
[   75.686193] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   75.693341] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383
[   75.701008] 
[   75.702538] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   75.702570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.702578] Hardware name: Thundercomm Dragonboard 845c (DT)
[   75.702590] Call trace:
[   75.702597]  show_stack+0x20/0x38 (C)
[   75.702616]  dump_stack_lvl+0x8c/0xd0
[   75.702636]  print_report+0x118/0x608
[   75.702656]  kasan_report+0xdc/0x128
[   75.702675]  kasan_check_range+0x100/0x1a8
[   75.702694]  __kasan_check_write+0x20/0x30
[   75.702710]  copy_user_test_oob+0x234/0xec8
[   75.702729]  kunit_try_run_case+0x170/0x3f0
[   75.702749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.702770]  kthread+0x328/0x630
[   75.702785]  ret_from_fork+0x10/0x20
[   75.702803] 
[   75.771925] Allocated by task 383:
[   75.775379]  kasan_save_stack+0x3c/0x68
[   75.779285]  kasan_save_track+0x20/0x40
[   75.783190]  kasan_save_alloc_info+0x40/0x58
[   75.787520]  __kasan_kmalloc+0xd4/0xd8
[   75.791336]  __kmalloc_noprof+0x198/0x4c8
[   75.795411]  kunit_kmalloc_array+0x34/0x88
[   75.799571]  copy_user_test_oob+0xac/0xec8
[   75.803733]  kunit_try_run_case+0x170/0x3f0
[   75.807980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.813543]  kthread+0x328/0x630
[   75.816825]  ret_from_fork+0x10/0x20
[   75.820465] 
[   75.821989] The buggy address belongs to the object at ffff0000947c2c00
[   75.821989]  which belongs to the cache kmalloc-128 of size 128
[   75.834639] The buggy address is located 0 bytes inside of
[   75.834639]  allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78)
[   75.847211] 
[   75.848743] The buggy address belongs to the physical page:
[   75.854385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2
[   75.862491] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   75.870239] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   75.877297] page_type: f5(slab)
[   75.880492] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   75.888330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.896168] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   75.904091] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.912014] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff
[   75.919936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   75.927856] page dumped because: kasan: bad access detected
[   75.933497] 
[   75.935030] Memory state around the buggy address:
[   75.939886]  ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.947202]  ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.954516] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.961826]                                                                 ^
[   75.969050]  ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.976362]  ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.983673] ==================================================================
[   76.927172] ==================================================================
[   76.934488] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   76.941634] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383
[   76.949300] 
[   76.950825] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   76.950854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.950861] Hardware name: Thundercomm Dragonboard 845c (DT)
[   76.950872] Call trace:
[   76.950879]  show_stack+0x20/0x38 (C)
[   76.950896]  dump_stack_lvl+0x8c/0xd0
[   76.950913]  print_report+0x118/0x608
[   76.950931]  kasan_report+0xdc/0x128
[   76.950949]  kasan_check_range+0x100/0x1a8
[   76.950969]  __kasan_check_write+0x20/0x30
[   76.950986]  copy_user_test_oob+0x434/0xec8
[   76.951004]  kunit_try_run_case+0x170/0x3f0
[   76.951022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.951042]  kthread+0x328/0x630
[   76.951056]  ret_from_fork+0x10/0x20
[   76.951073] 
[   77.020199] Allocated by task 383:
[   77.023655]  kasan_save_stack+0x3c/0x68
[   77.027555]  kasan_save_track+0x20/0x40
[   77.031453]  kasan_save_alloc_info+0x40/0x58
[   77.035792]  __kasan_kmalloc+0xd4/0xd8
[   77.039602]  __kmalloc_noprof+0x198/0x4c8
[   77.043672]  kunit_kmalloc_array+0x34/0x88
[   77.047839]  copy_user_test_oob+0xac/0xec8
[   77.052005]  kunit_try_run_case+0x170/0x3f0
[   77.056258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.061827]  kthread+0x328/0x630
[   77.065113]  ret_from_fork+0x10/0x20
[   77.068750] 
[   77.070274] The buggy address belongs to the object at ffff0000947c2c00
[   77.070274]  which belongs to the cache kmalloc-128 of size 128
[   77.082924] The buggy address is located 0 bytes inside of
[   77.082924]  allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78)
[   77.095494] 
[   77.097017] The buggy address belongs to the physical page:
[   77.102664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2
[   77.110771] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   77.118518] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   77.125572] page_type: f5(slab)
[   77.128771] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.136607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.144444] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.152366] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.160289] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff
[   77.168210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   77.176127] page dumped because: kasan: bad access detected
[   77.181774] 
[   77.183296] Memory state around the buggy address:
[   77.188151]  ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.195463]  ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.202774] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.210084]                                                                 ^
[   77.217306]  ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.224618]  ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.231927] ==================================================================
[   75.991135] ==================================================================
[   75.998459] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   76.005605] Read of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383
[   76.013184] 
[   76.014712] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   76.014742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.014750] Hardware name: Thundercomm Dragonboard 845c (DT)
[   76.014761] Call trace:
[   76.014768]  show_stack+0x20/0x38 (C)
[   76.014786]  dump_stack_lvl+0x8c/0xd0
[   76.014805]  print_report+0x118/0x608
[   76.014825]  kasan_report+0xdc/0x128
[   76.014843]  kasan_check_range+0x100/0x1a8
[   76.014864]  __kasan_check_read+0x20/0x30
[   76.014880]  copy_user_test_oob+0x728/0xec8
[   76.014897]  kunit_try_run_case+0x170/0x3f0
[   76.014915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.014937]  kthread+0x328/0x630
[   76.014950]  ret_from_fork+0x10/0x20
[   76.014967] 
[   76.083987] Allocated by task 383:
[   76.087439]  kasan_save_stack+0x3c/0x68
[   76.091346]  kasan_save_track+0x20/0x40
[   76.095249]  kasan_save_alloc_info+0x40/0x58
[   76.099581]  __kasan_kmalloc+0xd4/0xd8
[   76.103396]  __kmalloc_noprof+0x198/0x4c8
[   76.107471]  kunit_kmalloc_array+0x34/0x88
[   76.111633]  copy_user_test_oob+0xac/0xec8
[   76.115795]  kunit_try_run_case+0x170/0x3f0
[   76.120044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.125607]  kthread+0x328/0x630
[   76.128887]  ret_from_fork+0x10/0x20
[   76.132528] 
[   76.134053] The buggy address belongs to the object at ffff0000947c2c00
[   76.134053]  which belongs to the cache kmalloc-128 of size 128
[   76.146702] The buggy address is located 0 bytes inside of
[   76.146702]  allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78)
[   76.159266] 
[   76.160798] The buggy address belongs to the physical page:
[   76.166440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2
[   76.174548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   76.182297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   76.189352] page_type: f5(slab)
[   76.192547] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   76.200385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.208223] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   76.216145] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.224069] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff
[   76.231993] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   76.239911] page dumped because: kasan: bad access detected
[   76.245552] 
[   76.247085] Memory state around the buggy address:
[   76.251943]  ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.259258]  ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.266573] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   76.273884]                                                                 ^
[   76.281107]  ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.288420]  ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.295731] ==================================================================
[   76.615255] ==================================================================
[   76.622563] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   76.629699] Read of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383
[   76.637278] 
[   76.638804] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   76.638833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.638842] Hardware name: Thundercomm Dragonboard 845c (DT)
[   76.638854] Call trace:
[   76.638860]  show_stack+0x20/0x38 (C)
[   76.638877]  dump_stack_lvl+0x8c/0xd0
[   76.638895]  print_report+0x118/0x608
[   76.638913]  kasan_report+0xdc/0x128
[   76.638932]  kasan_check_range+0x100/0x1a8
[   76.638951]  __kasan_check_read+0x20/0x30
[   76.638966]  copy_user_test_oob+0x3c8/0xec8
[   76.638984]  kunit_try_run_case+0x170/0x3f0
[   76.639000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.639021]  kthread+0x328/0x630
[   76.639035]  ret_from_fork+0x10/0x20
[   76.639051] 
[   76.708088] Allocated by task 383:
[   76.711539]  kasan_save_stack+0x3c/0x68
[   76.715443]  kasan_save_track+0x20/0x40
[   76.719347]  kasan_save_alloc_info+0x40/0x58
[   76.723679]  __kasan_kmalloc+0xd4/0xd8
[   76.727495]  __kmalloc_noprof+0x198/0x4c8
[   76.731571]  kunit_kmalloc_array+0x34/0x88
[   76.735732]  copy_user_test_oob+0xac/0xec8
[   76.739894]  kunit_try_run_case+0x170/0x3f0
[   76.744142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.749706]  kthread+0x328/0x630
[   76.752988]  ret_from_fork+0x10/0x20
[   76.756629] 
[   76.758152] The buggy address belongs to the object at ffff0000947c2c00
[   76.758152]  which belongs to the cache kmalloc-128 of size 128
[   76.770802] The buggy address is located 0 bytes inside of
[   76.770802]  allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78)
[   76.783373] 
[   76.784905] The buggy address belongs to the physical page:
[   76.790546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2
[   76.798645] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   76.806394] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   76.813439] page_type: f5(slab)
[   76.816635] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   76.824470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.832308] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   76.840231] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.848155] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff
[   76.856077] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   76.863997] page dumped because: kasan: bad access detected
[   76.869639] 
[   76.871170] Memory state around the buggy address:
[   76.876029]  ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.883342]  ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.890647] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   76.897957]                                                                 ^
[   76.905180]  ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.912494]  ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.919805] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   75.025784] ==================================================================
[   75.040868] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   75.048373] Read of size 8 at addr ffff0000822c2c78 by task kunit_try_catch/379
[   75.055785] 
[   75.057319] CPU: 3 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   75.057349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.057360] Hardware name: Thundercomm Dragonboard 845c (DT)
[   75.057374] Call trace:
[   75.057381]  show_stack+0x20/0x38 (C)
[   75.057401]  dump_stack_lvl+0x8c/0xd0
[   75.057423]  print_report+0x118/0x608
[   75.057444]  kasan_report+0xdc/0x128
[   75.057464]  __asan_report_load8_noabort+0x20/0x30
[   75.057483]  copy_to_kernel_nofault+0x204/0x250
[   75.057503]  copy_to_kernel_nofault_oob+0x158/0x418
[   75.057524]  kunit_try_run_case+0x170/0x3f0
[   75.057547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.057569]  kthread+0x328/0x630
[   75.057586]  ret_from_fork+0x10/0x20
[   75.057605] 
[   75.128617] Allocated by task 379:
[   75.132077]  kasan_save_stack+0x3c/0x68
[   75.135988]  kasan_save_track+0x20/0x40
[   75.139897]  kasan_save_alloc_info+0x40/0x58
[   75.144235]  __kasan_kmalloc+0xd4/0xd8
[   75.148057]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.152671]  copy_to_kernel_nofault_oob+0xc8/0x418
[   75.157540]  kunit_try_run_case+0x170/0x3f0
[   75.161793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.167363]  kthread+0x328/0x630
[   75.170656]  ret_from_fork+0x10/0x20
[   75.174299] 
[   75.175835] The buggy address belongs to the object at ffff0000822c2c00
[   75.175835]  which belongs to the cache kmalloc-128 of size 128
[   75.188493] The buggy address is located 0 bytes to the right of
[   75.188493]  allocated 120-byte region [ffff0000822c2c00, ffff0000822c2c78)
[   75.201601] 
[   75.203130] The buggy address belongs to the physical page:
[   75.208784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   75.216897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   75.224651] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   75.231710] page_type: f5(slab)
[   75.234918] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   75.242769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.250611] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   75.258551] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.266490] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   75.274429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   75.282365] page dumped because: kasan: bad access detected
[   75.288017] 
[   75.289546] Memory state around the buggy address:
[   75.294407]  ffff0000822c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.301728]  ffff0000822c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.309049] >ffff0000822c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.316369]                                                                 ^
[   75.323597]  ffff0000822c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.330911]  ffff0000822c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.338223] ==================================================================
[   75.345608] ==================================================================
[   75.352932] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   75.360347] Write of size 8 at addr ffff0000822c2c78 by task kunit_try_catch/379
[   75.367844] 
[   75.369378] CPU: 3 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   75.369410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.369418] Hardware name: Thundercomm Dragonboard 845c (DT)
[   75.369431] Call trace:
[   75.369439]  show_stack+0x20/0x38 (C)
[   75.369460]  dump_stack_lvl+0x8c/0xd0
[   75.369482]  print_report+0x118/0x608
[   75.369504]  kasan_report+0xdc/0x128
[   75.369523]  kasan_check_range+0x100/0x1a8
[   75.369544]  __kasan_check_write+0x20/0x30
[   75.369563]  copy_to_kernel_nofault+0x8c/0x250
[   75.369583]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   75.369603]  kunit_try_run_case+0x170/0x3f0
[   75.369625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.369650]  kthread+0x328/0x630
[   75.369666]  ret_from_fork+0x10/0x20
[   75.369684] 
[   75.444028] Allocated by task 379:
[   75.447493]  kasan_save_stack+0x3c/0x68
[   75.451402]  kasan_save_track+0x20/0x40
[   75.455312]  kasan_save_alloc_info+0x40/0x58
[   75.459660]  __kasan_kmalloc+0xd4/0xd8
[   75.463482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.468089]  copy_to_kernel_nofault_oob+0xc8/0x418
[   75.472958]  kunit_try_run_case+0x170/0x3f0
[   75.477212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.482785]  kthread+0x328/0x630
[   75.486075]  ret_from_fork+0x10/0x20
[   75.489723] 
[   75.491253] The buggy address belongs to the object at ffff0000822c2c00
[   75.491253]  which belongs to the cache kmalloc-128 of size 128
[   75.503920] The buggy address is located 0 bytes to the right of
[   75.503920]  allocated 120-byte region [ffff0000822c2c00, ffff0000822c2c78)
[   75.517024] 
[   75.518555] The buggy address belongs to the physical page:
[   75.524205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   75.532318] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   75.540073] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   75.547132] page_type: f5(slab)
[   75.550338] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   75.558182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.566025] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   75.573966] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.581906] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   75.589846] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   75.597780] page dumped because: kasan: bad access detected
[   75.603426] 
[   75.604962] Memory state around the buggy address:
[   75.609824]  ffff0000822c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.617145]  ffff0000822c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.624467] >ffff0000822c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.631787]                                                                 ^
[   75.639019]  ffff0000822c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.646339]  ffff0000822c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.653659] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   74.562942] ==================================================================
[   74.578277] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   74.585080] Read of size 1 at addr ffff8000802bd7f3 by task kunit_try_catch/367
[   74.592485] 
[   74.594019] CPU: 3 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   74.594050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.594060] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.594073] Call trace:
[   74.594081]  show_stack+0x20/0x38 (C)
[   74.594100]  dump_stack_lvl+0x8c/0xd0
[   74.594120]  print_report+0x310/0x608
[   74.594140]  kasan_report+0xdc/0x128
[   74.594160]  __asan_report_load1_noabort+0x20/0x30
[   74.594179]  vmalloc_oob+0x578/0x5d0
[   74.594196]  kunit_try_run_case+0x170/0x3f0
[   74.594219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.594243]  kthread+0x328/0x630
[   74.594258]  ret_from_fork+0x10/0x20
[   74.594276] 
[   74.659356] The buggy address belongs to the virtual mapping at
[   74.659356]  [ffff8000802bd000, ffff8000802bf000) created by:
[   74.659356]  vmalloc_oob+0x98/0x5d0
[   74.674655] 
[   74.676194] The buggy address belongs to the physical page:
[   74.681845] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1168cc
[   74.689952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.696574] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   74.704424] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.712269] page dumped because: kasan: bad access detected
[   74.717919] 
[   74.719449] Memory state around the buggy address:
[   74.724309]  ffff8000802bd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.731628]  ffff8000802bd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.738946] >ffff8000802bd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   74.746261]                                                              ^
[   74.753232]  ffff8000802bd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   74.760549]  ffff8000802bd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   74.767864] ==================================================================
[   74.775255] ==================================================================
[   74.782571] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   74.789372] Read of size 1 at addr ffff8000802bd7f8 by task kunit_try_catch/367
[   74.796776] 
[   74.798312] CPU: 3 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   74.798341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.798351] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.798362] Call trace:
[   74.798370]  show_stack+0x20/0x38 (C)
[   74.798388]  dump_stack_lvl+0x8c/0xd0
[   74.798409]  print_report+0x310/0x608
[   74.798429]  kasan_report+0xdc/0x128
[   74.798449]  __asan_report_load1_noabort+0x20/0x30
[   74.798467]  vmalloc_oob+0x51c/0x5d0
[   74.798484]  kunit_try_run_case+0x170/0x3f0
[   74.798505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.798528]  kthread+0x328/0x630
[   74.798543]  ret_from_fork+0x10/0x20
[   74.798563] 
[   74.863663] The buggy address belongs to the virtual mapping at
[   74.863663]  [ffff8000802bd000, ffff8000802bf000) created by:
[   74.863663]  vmalloc_oob+0x98/0x5d0
[   74.878962] 
[   74.880499] The buggy address belongs to the physical page:
[   74.886150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1168cc
[   74.894254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.900874] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   74.908724] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.916567] page dumped because: kasan: bad access detected
[   74.922218] 
[   74.923754] Memory state around the buggy address:
[   74.928617]  ffff8000802bd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.935933]  ffff8000802bd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.943253] >ffff8000802bd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   74.950568]                                                                 ^
[   74.957795]  ffff8000802bd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   74.965111]  ffff8000802bd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   74.972425] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   61.350118] ==================================================================
[   61.357428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   61.364832] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   61.372320] 
[   61.373846] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   61.373875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.373883] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.373894] Call trace:
[   61.373899]  show_stack+0x20/0x38 (C)
[   61.373916]  dump_stack_lvl+0x8c/0xd0
[   61.373935]  print_report+0x118/0x608
[   61.373953]  kasan_report+0xdc/0x128
[   61.373972]  kasan_check_range+0x100/0x1a8
[   61.373992]  __kasan_check_write+0x20/0x30
[   61.374007]  kasan_atomics_helper+0x6ec/0x4858
[   61.374024]  kasan_atomics+0x198/0x2e0
[   61.374041]  kunit_try_run_case+0x170/0x3f0
[   61.374059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.374081]  kthread+0x328/0x630
[   61.374095]  ret_from_fork+0x10/0x20
[   61.374111] 
[   61.447277] Allocated by task 363:
[   61.450732]  kasan_save_stack+0x3c/0x68
[   61.454630]  kasan_save_track+0x20/0x40
[   61.458526]  kasan_save_alloc_info+0x40/0x58
[   61.462864]  __kasan_kmalloc+0xd4/0xd8
[   61.466675]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.471277]  kasan_atomics+0xb8/0x2e0
[   61.474998]  kunit_try_run_case+0x170/0x3f0
[   61.479251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.484820]  kthread+0x328/0x630
[   61.488107]  ret_from_fork+0x10/0x20
[   61.491740] 
[   61.493263] The buggy address belongs to the object at ffff000080acff00
[   61.493263]  which belongs to the cache kmalloc-64 of size 64
[   61.505740] The buggy address is located 0 bytes to the right of
[   61.505740]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   61.518741] 
[   61.520276] The buggy address belongs to the physical page:
[   61.525921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   61.534026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.540633] page_type: f5(slab)
[   61.543832] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.551671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.559503] page dumped because: kasan: bad access detected
[   61.565149] 
[   61.566672] Memory state around the buggy address:
[   61.571529]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.578841]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.586154] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.593463]                                      ^
[   61.598318]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.605630]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.612940] ==================================================================
[   66.196670] ==================================================================
[   66.203980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   66.211471] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   66.218871] 
[   66.220396] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   66.220427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.220435] Hardware name: Thundercomm Dragonboard 845c (DT)
[   66.220445] Call trace:
[   66.220451]  show_stack+0x20/0x38 (C)
[   66.220468]  dump_stack_lvl+0x8c/0xd0
[   66.220486]  print_report+0x118/0x608
[   66.220504]  kasan_report+0xdc/0x128
[   66.220523]  __asan_report_load4_noabort+0x20/0x30
[   66.220540]  kasan_atomics_helper+0x3e04/0x4858
[   66.220558]  kasan_atomics+0x198/0x2e0
[   66.220574]  kunit_try_run_case+0x170/0x3f0
[   66.220591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.220612]  kthread+0x328/0x630
[   66.220627]  ret_from_fork+0x10/0x20
[   66.220643] 
[   66.290439] Allocated by task 363:
[   66.293895]  kasan_save_stack+0x3c/0x68
[   66.297794]  kasan_save_track+0x20/0x40
[   66.301692]  kasan_save_alloc_info+0x40/0x58
[   66.306030]  __kasan_kmalloc+0xd4/0xd8
[   66.309839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.314440]  kasan_atomics+0xb8/0x2e0
[   66.318161]  kunit_try_run_case+0x170/0x3f0
[   66.322415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.327984]  kthread+0x328/0x630
[   66.331269]  ret_from_fork+0x10/0x20
[   66.334903] 
[   66.336426] The buggy address belongs to the object at ffff000080acff00
[   66.336426]  which belongs to the cache kmalloc-64 of size 64
[   66.348902] The buggy address is located 0 bytes to the right of
[   66.348902]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   66.361903] 
[   66.363427] The buggy address belongs to the physical page:
[   66.369071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   66.377177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.383783] page_type: f5(slab)
[   66.386981] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.394817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.402648] page dumped because: kasan: bad access detected
[   66.408293] 
[   66.409816] Memory state around the buggy address:
[   66.414670]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.421981]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.429293] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.436602]                                      ^
[   66.441458]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.448769]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.456078] ==================================================================
[   72.399561] ==================================================================
[   72.406873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   72.414364] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   72.421766] 
[   72.423290] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   72.423320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.423329] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.423338] Call trace:
[   72.423345]  show_stack+0x20/0x38 (C)
[   72.423362]  dump_stack_lvl+0x8c/0xd0
[   72.423380]  print_report+0x118/0x608
[   72.423399]  kasan_report+0xdc/0x128
[   72.423419]  __asan_report_load8_noabort+0x20/0x30
[   72.423436]  kasan_atomics_helper+0x3db0/0x4858
[   72.423454]  kasan_atomics+0x198/0x2e0
[   72.423472]  kunit_try_run_case+0x170/0x3f0
[   72.423491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.423511]  kthread+0x328/0x630
[   72.423527]  ret_from_fork+0x10/0x20
[   72.423544] 
[   72.493342] Allocated by task 363:
[   72.496798]  kasan_save_stack+0x3c/0x68
[   72.500696]  kasan_save_track+0x20/0x40
[   72.504594]  kasan_save_alloc_info+0x40/0x58
[   72.508933]  __kasan_kmalloc+0xd4/0xd8
[   72.512741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.517343]  kasan_atomics+0xb8/0x2e0
[   72.521064]  kunit_try_run_case+0x170/0x3f0
[   72.525317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.530887]  kthread+0x328/0x630
[   72.534173]  ret_from_fork+0x10/0x20
[   72.537808] 
[   72.539331] The buggy address belongs to the object at ffff000080acff00
[   72.539331]  which belongs to the cache kmalloc-64 of size 64
[   72.551809] The buggy address is located 0 bytes to the right of
[   72.551809]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   72.564810] 
[   72.566333] The buggy address belongs to the physical page:
[   72.571979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   72.580086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.586694] page_type: f5(slab)
[   72.589893] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.597730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.605563] page dumped because: kasan: bad access detected
[   72.611210] 
[   72.612733] Memory state around the buggy address:
[   72.617587]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.624900]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.632212] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.639522]                                      ^
[   72.644379]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.651690]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.659000] ==================================================================
[   58.384768] ==================================================================
[   58.392084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   58.399580] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   58.406978] 
[   58.408510] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   58.408539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.408547] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.408557] Call trace:
[   58.408563]  show_stack+0x20/0x38 (C)
[   58.408579]  dump_stack_lvl+0x8c/0xd0
[   58.408598]  print_report+0x118/0x608
[   58.408617]  kasan_report+0xdc/0x128
[   58.408636]  __asan_report_load4_noabort+0x20/0x30
[   58.408651]  kasan_atomics_helper+0x40fc/0x4858
[   58.408669]  kasan_atomics+0x198/0x2e0
[   58.408687]  kunit_try_run_case+0x170/0x3f0
[   58.408704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.408726]  kthread+0x328/0x630
[   58.408739]  ret_from_fork+0x10/0x20
[   58.408756] 
[   58.478546] Allocated by task 363:
[   58.481997]  kasan_save_stack+0x3c/0x68
[   58.485894]  kasan_save_track+0x20/0x40
[   58.489799]  kasan_save_alloc_info+0x40/0x58
[   58.494137]  __kasan_kmalloc+0xd4/0xd8
[   58.497952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.502552]  kasan_atomics+0xb8/0x2e0
[   58.506279]  kunit_try_run_case+0x170/0x3f0
[   58.510530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.516095]  kthread+0x328/0x630
[   58.519377]  ret_from_fork+0x10/0x20
[   58.523011] 
[   58.524543] The buggy address belongs to the object at ffff000080acff00
[   58.524543]  which belongs to the cache kmalloc-64 of size 64
[   58.537021] The buggy address is located 0 bytes to the right of
[   58.537021]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   58.550023] 
[   58.551554] The buggy address belongs to the physical page:
[   58.557197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   58.565298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.571907] page_type: f5(slab)
[   58.575105] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   58.582947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.590784] page dumped because: kasan: bad access detected
[   58.596423] 
[   58.597945] Memory state around the buggy address:
[   58.602806]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.610123]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.617440] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.624755]                                      ^
[   58.629610]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.636916]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   58.644230] ==================================================================
[   59.999242] ==================================================================
[   60.006552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   60.013956] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   60.021445] 
[   60.022971] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   60.023001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.023008] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.023018] Call trace:
[   60.023024]  show_stack+0x20/0x38 (C)
[   60.023041]  dump_stack_lvl+0x8c/0xd0
[   60.023058]  print_report+0x118/0x608
[   60.023077]  kasan_report+0xdc/0x128
[   60.023095]  kasan_check_range+0x100/0x1a8
[   60.023114]  __kasan_check_write+0x20/0x30
[   60.023129]  kasan_atomics_helper+0x4e4/0x4858
[   60.023147]  kasan_atomics+0x198/0x2e0
[   60.023164]  kunit_try_run_case+0x170/0x3f0
[   60.023182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.023202]  kthread+0x328/0x630
[   60.023217]  ret_from_fork+0x10/0x20
[   60.023233] 
[   60.096395] Allocated by task 363:
[   60.099851]  kasan_save_stack+0x3c/0x68
[   60.103749]  kasan_save_track+0x20/0x40
[   60.107646]  kasan_save_alloc_info+0x40/0x58
[   60.111984]  __kasan_kmalloc+0xd4/0xd8
[   60.115792]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.120394]  kasan_atomics+0xb8/0x2e0
[   60.124116]  kunit_try_run_case+0x170/0x3f0
[   60.128368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.133937]  kthread+0x328/0x630
[   60.137223]  ret_from_fork+0x10/0x20
[   60.140859] 
[   60.142383] The buggy address belongs to the object at ffff000080acff00
[   60.142383]  which belongs to the cache kmalloc-64 of size 64
[   60.154861] The buggy address is located 0 bytes to the right of
[   60.154861]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   60.167862] 
[   60.169385] The buggy address belongs to the physical page:
[   60.175031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   60.183137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.189745] page_type: f5(slab)
[   60.192946] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   60.200782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.208613] page dumped because: kasan: bad access detected
[   60.214260] 
[   60.215783] Memory state around the buggy address:
[   60.220639]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.227951]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.235263] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.242571]                                      ^
[   60.247428]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.254738]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   60.262049] ==================================================================
[   64.315559] ==================================================================
[   64.322870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   64.330275] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   64.337764] 
[   64.339289] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   64.339318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.339328] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.339337] Call trace:
[   64.339343]  show_stack+0x20/0x38 (C)
[   64.339360]  dump_stack_lvl+0x8c/0xd0
[   64.339378]  print_report+0x118/0x608
[   64.339398]  kasan_report+0xdc/0x128
[   64.339418]  kasan_check_range+0x100/0x1a8
[   64.339438]  __kasan_check_write+0x20/0x30
[   64.339454]  kasan_atomics_helper+0xb70/0x4858
[   64.339471]  kasan_atomics+0x198/0x2e0
[   64.339488]  kunit_try_run_case+0x170/0x3f0
[   64.339506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.339527]  kthread+0x328/0x630
[   64.339541]  ret_from_fork+0x10/0x20
[   64.339557] 
[   64.412733] Allocated by task 363:
[   64.416190]  kasan_save_stack+0x3c/0x68
[   64.420089]  kasan_save_track+0x20/0x40
[   64.423987]  kasan_save_alloc_info+0x40/0x58
[   64.428324]  __kasan_kmalloc+0xd4/0xd8
[   64.432135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.436736]  kasan_atomics+0xb8/0x2e0
[   64.440457]  kunit_try_run_case+0x170/0x3f0
[   64.444710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.450279]  kthread+0x328/0x630
[   64.453564]  ret_from_fork+0x10/0x20
[   64.457200] 
[   64.458722] The buggy address belongs to the object at ffff000080acff00
[   64.458722]  which belongs to the cache kmalloc-64 of size 64
[   64.471200] The buggy address is located 0 bytes to the right of
[   64.471200]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   64.484203] 
[   64.485725] The buggy address belongs to the physical page:
[   64.491372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   64.499478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.506084] page_type: f5(slab)
[   64.509283] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   64.517120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.524952] page dumped because: kasan: bad access detected
[   64.530599] 
[   64.532122] Memory state around the buggy address:
[   64.536978]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.544290]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.551603] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.558914]                                      ^
[   64.563770]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.571081]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.578391] ==================================================================
[   62.697717] ==================================================================
[   62.705027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   62.712431] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   62.719920] 
[   62.721456] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   62.721484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.721491] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.721501] Call trace:
[   62.721507]  show_stack+0x20/0x38 (C)
[   62.721525]  dump_stack_lvl+0x8c/0xd0
[   62.721542]  print_report+0x118/0x608
[   62.721560]  kasan_report+0xdc/0x128
[   62.721579]  kasan_check_range+0x100/0x1a8
[   62.721599]  __kasan_check_write+0x20/0x30
[   62.721616]  kasan_atomics_helper+0x934/0x4858
[   62.721634]  kasan_atomics+0x198/0x2e0
[   62.721652]  kunit_try_run_case+0x170/0x3f0
[   62.721669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.721689]  kthread+0x328/0x630
[   62.721702]  ret_from_fork+0x10/0x20
[   62.721719] 
[   62.794874] Allocated by task 363:
[   62.798331]  kasan_save_stack+0x3c/0x68
[   62.802229]  kasan_save_track+0x20/0x40
[   62.806126]  kasan_save_alloc_info+0x40/0x58
[   62.810465]  __kasan_kmalloc+0xd4/0xd8
[   62.814274]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.818876]  kasan_atomics+0xb8/0x2e0
[   62.822596]  kunit_try_run_case+0x170/0x3f0
[   62.826849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.832418]  kthread+0x328/0x630
[   62.835704]  ret_from_fork+0x10/0x20
[   62.839339] 
[   62.840861] The buggy address belongs to the object at ffff000080acff00
[   62.840861]  which belongs to the cache kmalloc-64 of size 64
[   62.853339] The buggy address is located 0 bytes to the right of
[   62.853339]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   62.866341] 
[   62.867865] The buggy address belongs to the physical page:
[   62.873511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   62.881619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.888227] page_type: f5(slab)
[   62.891426] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.899263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.907096] page dumped because: kasan: bad access detected
[   62.912742] 
[   62.914265] Memory state around the buggy address:
[   62.919119]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.926431]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.933742] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.941051]                                      ^
[   62.945907]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.953220]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.960528] ==================================================================
[   68.347895] ==================================================================
[   68.355204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   68.362607] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   68.370095] 
[   68.371620] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   68.371648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.371657] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.371666] Call trace:
[   68.371673]  show_stack+0x20/0x38 (C)
[   68.371690]  dump_stack_lvl+0x8c/0xd0
[   68.371707]  print_report+0x118/0x608
[   68.371725]  kasan_report+0xdc/0x128
[   68.371745]  kasan_check_range+0x100/0x1a8
[   68.371766]  __kasan_check_write+0x20/0x30
[   68.371781]  kasan_atomics_helper+0xff0/0x4858
[   68.371800]  kasan_atomics+0x198/0x2e0
[   68.371817]  kunit_try_run_case+0x170/0x3f0
[   68.371836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.371857]  kthread+0x328/0x630
[   68.371871]  ret_from_fork+0x10/0x20
[   68.371887] 
[   68.445051] Allocated by task 363:
[   68.448507]  kasan_save_stack+0x3c/0x68
[   68.452406]  kasan_save_track+0x20/0x40
[   68.456303]  kasan_save_alloc_info+0x40/0x58
[   68.460641]  __kasan_kmalloc+0xd4/0xd8
[   68.464450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.469054]  kasan_atomics+0xb8/0x2e0
[   68.472775]  kunit_try_run_case+0x170/0x3f0
[   68.477028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.482597]  kthread+0x328/0x630
[   68.485884]  ret_from_fork+0x10/0x20
[   68.489518] 
[   68.491041] The buggy address belongs to the object at ffff000080acff00
[   68.491041]  which belongs to the cache kmalloc-64 of size 64
[   68.503519] The buggy address is located 0 bytes to the right of
[   68.503519]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   68.516519] 
[   68.518043] The buggy address belongs to the physical page:
[   68.523689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   68.531796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.538401] page_type: f5(slab)
[   68.541601] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.549436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.557268] page dumped because: kasan: bad access detected
[   68.562914] 
[   68.564437] Memory state around the buggy address:
[   68.569292]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.576604]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.583916] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.591227]                                      ^
[   68.596082]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.603395]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   68.610704] ==================================================================
[   61.620303] ==================================================================
[   61.627615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   61.635020] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   61.642510] 
[   61.644036] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   61.644066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.644076] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.644086] Call trace:
[   61.644093]  show_stack+0x20/0x38 (C)
[   61.644110]  dump_stack_lvl+0x8c/0xd0
[   61.644128]  print_report+0x118/0x608
[   61.644148]  kasan_report+0xdc/0x128
[   61.644167]  kasan_check_range+0x100/0x1a8
[   61.644188]  __kasan_check_write+0x20/0x30
[   61.644204]  kasan_atomics_helper+0x760/0x4858
[   61.644223]  kasan_atomics+0x198/0x2e0
[   61.644240]  kunit_try_run_case+0x170/0x3f0
[   61.644259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.644281]  kthread+0x328/0x630
[   61.644295]  ret_from_fork+0x10/0x20
[   61.644311] 
[   61.717477] Allocated by task 363:
[   61.720933]  kasan_save_stack+0x3c/0x68
[   61.724831]  kasan_save_track+0x20/0x40
[   61.728728]  kasan_save_alloc_info+0x40/0x58
[   61.733066]  __kasan_kmalloc+0xd4/0xd8
[   61.736874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.741476]  kasan_atomics+0xb8/0x2e0
[   61.745199]  kunit_try_run_case+0x170/0x3f0
[   61.749452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.755020]  kthread+0x328/0x630
[   61.758306]  ret_from_fork+0x10/0x20
[   61.761940] 
[   61.763463] The buggy address belongs to the object at ffff000080acff00
[   61.763463]  which belongs to the cache kmalloc-64 of size 64
[   61.775940] The buggy address is located 0 bytes to the right of
[   61.775940]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   61.788943] 
[   61.790467] The buggy address belongs to the physical page:
[   61.796112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   61.804219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.810827] page_type: f5(slab)
[   61.814026] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.821863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.829696] page dumped because: kasan: bad access detected
[   61.835343] 
[   61.836866] Memory state around the buggy address:
[   61.841720]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.849034]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.856345] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.863656]                                      ^
[   61.868513]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.875824]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.883134] ==================================================================
[   72.129206] ==================================================================
[   72.136518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   72.144012] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   72.151501] 
[   72.153026] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   72.153055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.153063] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.153072] Call trace:
[   72.153078]  show_stack+0x20/0x38 (C)
[   72.153094]  dump_stack_lvl+0x8c/0xd0
[   72.153112]  print_report+0x118/0x608
[   72.153130]  kasan_report+0xdc/0x128
[   72.153149]  kasan_check_range+0x100/0x1a8
[   72.153169]  __kasan_check_write+0x20/0x30
[   72.153185]  kasan_atomics_helper+0x15b4/0x4858
[   72.153203]  kasan_atomics+0x198/0x2e0
[   72.153219]  kunit_try_run_case+0x170/0x3f0
[   72.153236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.153258]  kthread+0x328/0x630
[   72.153271]  ret_from_fork+0x10/0x20
[   72.153287] 
[   72.226542] Allocated by task 363:
[   72.229998]  kasan_save_stack+0x3c/0x68
[   72.233897]  kasan_save_track+0x20/0x40
[   72.237795]  kasan_save_alloc_info+0x40/0x58
[   72.242133]  __kasan_kmalloc+0xd4/0xd8
[   72.245942]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.250544]  kasan_atomics+0xb8/0x2e0
[   72.254266]  kunit_try_run_case+0x170/0x3f0
[   72.258520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.264088]  kthread+0x328/0x630
[   72.267373]  ret_from_fork+0x10/0x20
[   72.271008] 
[   72.272530] The buggy address belongs to the object at ffff000080acff00
[   72.272530]  which belongs to the cache kmalloc-64 of size 64
[   72.285010] The buggy address is located 0 bytes to the right of
[   72.285010]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   72.298011] 
[   72.299534] The buggy address belongs to the physical page:
[   72.305179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   72.313287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.319893] page_type: f5(slab)
[   72.323093] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.330930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.338763] page dumped because: kasan: bad access detected
[   72.344409] 
[   72.345932] Memory state around the buggy address:
[   72.350787]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.358100]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.365412] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.372722]                                      ^
[   72.377578]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.384889]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.392198] ==================================================================
[   73.203536] ==================================================================
[   73.210847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   73.218337] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   73.225825] 
[   73.227350] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   73.227379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.227388] Hardware name: Thundercomm Dragonboard 845c (DT)
[   73.227398] Call trace:
[   73.227404]  show_stack+0x20/0x38 (C)
[   73.227421]  dump_stack_lvl+0x8c/0xd0
[   73.227440]  print_report+0x118/0x608
[   73.227458]  kasan_report+0xdc/0x128
[   73.227476]  kasan_check_range+0x100/0x1a8
[   73.227495]  __kasan_check_write+0x20/0x30
[   73.227510]  kasan_atomics_helper+0x16d0/0x4858
[   73.227529]  kasan_atomics+0x198/0x2e0
[   73.227546]  kunit_try_run_case+0x170/0x3f0
[   73.227564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.227583]  kthread+0x328/0x630
[   73.227597]  ret_from_fork+0x10/0x20
[   73.227613] 
[   73.300865] Allocated by task 363:
[   73.304321]  kasan_save_stack+0x3c/0x68
[   73.308220]  kasan_save_track+0x20/0x40
[   73.312118]  kasan_save_alloc_info+0x40/0x58
[   73.316456]  __kasan_kmalloc+0xd4/0xd8
[   73.320265]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.324868]  kasan_atomics+0xb8/0x2e0
[   73.328589]  kunit_try_run_case+0x170/0x3f0
[   73.332842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.338410]  kthread+0x328/0x630
[   73.341695]  ret_from_fork+0x10/0x20
[   73.345330] 
[   73.346853] The buggy address belongs to the object at ffff000080acff00
[   73.346853]  which belongs to the cache kmalloc-64 of size 64
[   73.359330] The buggy address is located 0 bytes to the right of
[   73.359330]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   73.372331] 
[   73.373854] The buggy address belongs to the physical page:
[   73.379499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   73.387605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.394211] page_type: f5(slab)
[   73.397411] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.405245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.413077] page dumped because: kasan: bad access detected
[   73.418723] 
[   73.420246] Memory state around the buggy address:
[   73.425101]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.432412]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.439723] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.447032]                                      ^
[   73.451887]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.459199]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.466508] ==================================================================
[   60.809766] ==================================================================
[   60.817075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   60.824479] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   60.831966] 
[   60.833492] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   60.833520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.833528] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.833538] Call trace:
[   60.833544]  show_stack+0x20/0x38 (C)
[   60.833562]  dump_stack_lvl+0x8c/0xd0
[   60.833580]  print_report+0x118/0x608
[   60.833598]  kasan_report+0xdc/0x128
[   60.833616]  kasan_check_range+0x100/0x1a8
[   60.833637]  __kasan_check_write+0x20/0x30
[   60.833652]  kasan_atomics_helper+0x61c/0x4858
[   60.833670]  kasan_atomics+0x198/0x2e0
[   60.833687]  kunit_try_run_case+0x170/0x3f0
[   60.833705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.833727]  kthread+0x328/0x630
[   60.833740]  ret_from_fork+0x10/0x20
[   60.833756] 
[   60.906920] Allocated by task 363:
[   60.910376]  kasan_save_stack+0x3c/0x68
[   60.914274]  kasan_save_track+0x20/0x40
[   60.918172]  kasan_save_alloc_info+0x40/0x58
[   60.922510]  __kasan_kmalloc+0xd4/0xd8
[   60.926319]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.930919]  kasan_atomics+0xb8/0x2e0
[   60.934641]  kunit_try_run_case+0x170/0x3f0
[   60.938895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.944464]  kthread+0x328/0x630
[   60.947749]  ret_from_fork+0x10/0x20
[   60.951383] 
[   60.952906] The buggy address belongs to the object at ffff000080acff00
[   60.952906]  which belongs to the cache kmalloc-64 of size 64
[   60.965385] The buggy address is located 0 bytes to the right of
[   60.965385]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   60.978387] 
[   60.979909] The buggy address belongs to the physical page:
[   60.985555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   60.993660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.000267] page_type: f5(slab)
[   61.003467] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.011303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.019135] page dumped because: kasan: bad access detected
[   61.024781] 
[   61.026303] Memory state around the buggy address:
[   61.031159]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.038472]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.045783] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.053092]                                      ^
[   61.057947]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.065258]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.072569] ==================================================================
[   73.473868] ==================================================================
[   73.481179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   73.488670] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   73.496071] 
[   73.497596] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   73.497624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.497632] Hardware name: Thundercomm Dragonboard 845c (DT)
[   73.497641] Call trace:
[   73.497647]  show_stack+0x20/0x38 (C)
[   73.497665]  dump_stack_lvl+0x8c/0xd0
[   73.497684]  print_report+0x118/0x608
[   73.497703]  kasan_report+0xdc/0x128
[   73.497722]  __asan_report_load8_noabort+0x20/0x30
[   73.497739]  kasan_atomics_helper+0x3e10/0x4858
[   73.497757]  kasan_atomics+0x198/0x2e0
[   73.497774]  kunit_try_run_case+0x170/0x3f0
[   73.497792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.497812]  kthread+0x328/0x630
[   73.497825]  ret_from_fork+0x10/0x20
[   73.497842] 
[   73.567640] Allocated by task 363:
[   73.571095]  kasan_save_stack+0x3c/0x68
[   73.574995]  kasan_save_track+0x20/0x40
[   73.578891]  kasan_save_alloc_info+0x40/0x58
[   73.583229]  __kasan_kmalloc+0xd4/0xd8
[   73.587037]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.591639]  kasan_atomics+0xb8/0x2e0
[   73.595361]  kunit_try_run_case+0x170/0x3f0
[   73.599613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.605181]  kthread+0x328/0x630
[   73.608467]  ret_from_fork+0x10/0x20
[   73.612101] 
[   73.613623] The buggy address belongs to the object at ffff000080acff00
[   73.613623]  which belongs to the cache kmalloc-64 of size 64
[   73.626100] The buggy address is located 0 bytes to the right of
[   73.626100]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   73.639099] 
[   73.640622] The buggy address belongs to the physical page:
[   73.646267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   73.654372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.660979] page_type: f5(slab)
[   73.664178] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.672013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.679844] page dumped because: kasan: bad access detected
[   73.685489] 
[   73.687011] Memory state around the buggy address:
[   73.691865]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.699175]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.706486] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.713794]                                      ^
[   73.718650]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.725960]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.733269] ==================================================================
[   74.010951] ==================================================================
[   74.018262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   74.025751] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   74.033153] 
[   74.034688] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   74.034717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.034725] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.034735] Call trace:
[   74.034741]  show_stack+0x20/0x38 (C)
[   74.034758]  dump_stack_lvl+0x8c/0xd0
[   74.034776]  print_report+0x118/0x608
[   74.034794]  kasan_report+0xdc/0x128
[   74.034812]  __asan_report_load8_noabort+0x20/0x30
[   74.034828]  kasan_atomics_helper+0x3e20/0x4858
[   74.034847]  kasan_atomics+0x198/0x2e0
[   74.034864]  kunit_try_run_case+0x170/0x3f0
[   74.034881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.034902]  kthread+0x328/0x630
[   74.034915]  ret_from_fork+0x10/0x20
[   74.034932] 
[   74.104729] Allocated by task 363:
[   74.108184]  kasan_save_stack+0x3c/0x68
[   74.112083]  kasan_save_track+0x20/0x40
[   74.115980]  kasan_save_alloc_info+0x40/0x58
[   74.120318]  __kasan_kmalloc+0xd4/0xd8
[   74.124127]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.128728]  kasan_atomics+0xb8/0x2e0
[   74.132449]  kunit_try_run_case+0x170/0x3f0
[   74.136702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.142271]  kthread+0x328/0x630
[   74.145557]  ret_from_fork+0x10/0x20
[   74.149191] 
[   74.150714] The buggy address belongs to the object at ffff000080acff00
[   74.150714]  which belongs to the cache kmalloc-64 of size 64
[   74.163190] The buggy address is located 0 bytes to the right of
[   74.163190]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   74.176190] 
[   74.177713] The buggy address belongs to the physical page:
[   74.183359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   74.191465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.198072] page_type: f5(slab)
[   74.201271] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   74.209108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.216939] page dumped because: kasan: bad access detected
[   74.222584] 
[   74.224107] Memory state around the buggy address:
[   74.228962]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.236273]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.243585] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.250893]                                      ^
[   74.255749]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.263059]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.270368] ==================================================================
[   74.277740] ==================================================================
[   74.285051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   74.292541] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   74.300028] 
[   74.301553] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   74.301582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.301590] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.301600] Call trace:
[   74.301606]  show_stack+0x20/0x38 (C)
[   74.301623]  dump_stack_lvl+0x8c/0xd0
[   74.301640]  print_report+0x118/0x608
[   74.301658]  kasan_report+0xdc/0x128
[   74.301677]  kasan_check_range+0x100/0x1a8
[   74.301698]  __kasan_check_write+0x20/0x30
[   74.301714]  kasan_atomics_helper+0x17ec/0x4858
[   74.301733]  kasan_atomics+0x198/0x2e0
[   74.301751]  kunit_try_run_case+0x170/0x3f0
[   74.301769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.301790]  kthread+0x328/0x630
[   74.301804]  ret_from_fork+0x10/0x20
[   74.301821] 
[   74.375070] Allocated by task 363:
[   74.378526]  kasan_save_stack+0x3c/0x68
[   74.382424]  kasan_save_track+0x20/0x40
[   74.386321]  kasan_save_alloc_info+0x40/0x58
[   74.390659]  __kasan_kmalloc+0xd4/0xd8
[   74.394468]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.399069]  kasan_atomics+0xb8/0x2e0
[   74.402791]  kunit_try_run_case+0x170/0x3f0
[   74.407044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.412613]  kthread+0x328/0x630
[   74.415898]  ret_from_fork+0x10/0x20
[   74.419533] 
[   74.421055] The buggy address belongs to the object at ffff000080acff00
[   74.421055]  which belongs to the cache kmalloc-64 of size 64
[   74.433531] The buggy address is located 0 bytes to the right of
[   74.433531]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   74.446532] 
[   74.448056] The buggy address belongs to the physical page:
[   74.453700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   74.461806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.468413] page_type: f5(slab)
[   74.471613] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   74.479448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.487280] page dumped because: kasan: bad access detected
[   74.492926] 
[   74.494448] Memory state around the buggy address:
[   74.499303]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.506613]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.513925] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.521234]                                      ^
[   74.526090]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.533401]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.540710] ==================================================================
[   69.699541] ==================================================================
[   69.706853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   69.714347] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   69.721838] 
[   69.723363] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   69.723393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.723401] Hardware name: Thundercomm Dragonboard 845c (DT)
[   69.723411] Call trace:
[   69.723418]  show_stack+0x20/0x38 (C)
[   69.723435]  dump_stack_lvl+0x8c/0xd0
[   69.723454]  print_report+0x118/0x608
[   69.723473]  kasan_report+0xdc/0x128
[   69.723491]  kasan_check_range+0x100/0x1a8
[   69.723512]  __kasan_check_write+0x20/0x30
[   69.723528]  kasan_atomics_helper+0x11f8/0x4858
[   69.723546]  kasan_atomics+0x198/0x2e0
[   69.723562]  kunit_try_run_case+0x170/0x3f0
[   69.723580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.723601]  kthread+0x328/0x630
[   69.723614]  ret_from_fork+0x10/0x20
[   69.723630] 
[   69.796882] Allocated by task 363:
[   69.800339]  kasan_save_stack+0x3c/0x68
[   69.804239]  kasan_save_track+0x20/0x40
[   69.808136]  kasan_save_alloc_info+0x40/0x58
[   69.812476]  __kasan_kmalloc+0xd4/0xd8
[   69.816285]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.820886]  kasan_atomics+0xb8/0x2e0
[   69.824607]  kunit_try_run_case+0x170/0x3f0
[   69.828859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.834429]  kthread+0x328/0x630
[   69.837715]  ret_from_fork+0x10/0x20
[   69.841349] 
[   69.842872] The buggy address belongs to the object at ffff000080acff00
[   69.842872]  which belongs to the cache kmalloc-64 of size 64
[   69.855349] The buggy address is located 0 bytes to the right of
[   69.855349]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   69.868350] 
[   69.869874] The buggy address belongs to the physical page:
[   69.875519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   69.883628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.890235] page_type: f5(slab)
[   69.893434] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.901271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.909102] page dumped because: kasan: bad access detected
[   69.914748] 
[   69.916270] Memory state around the buggy address:
[   69.921125]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.928438]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.935750] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.943059]                                      ^
[   69.947916]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.955227]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   69.962536] ==================================================================
[   58.114772] ==================================================================
[   58.122087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   58.129494] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   58.136897] 
[   58.138422] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   58.138452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.138460] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.138470] Call trace:
[   58.138477]  show_stack+0x20/0x38 (C)
[   58.138494]  dump_stack_lvl+0x8c/0xd0
[   58.138512]  print_report+0x118/0x608
[   58.138531]  kasan_report+0xdc/0x128
[   58.138549]  kasan_check_range+0x100/0x1a8
[   58.138569]  __kasan_check_read+0x20/0x30
[   58.138585]  kasan_atomics_helper+0x2b0/0x4858
[   58.138604]  kasan_atomics+0x198/0x2e0
[   58.138622]  kunit_try_run_case+0x170/0x3f0
[   58.138641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.138661]  kthread+0x328/0x630
[   58.138676]  ret_from_fork+0x10/0x20
[   58.138692] 
[   58.211760] Allocated by task 363:
[   58.215215]  kasan_save_stack+0x3c/0x68
[   58.219121]  kasan_save_track+0x20/0x40
[   58.223018]  kasan_save_alloc_info+0x40/0x58
[   58.227352]  __kasan_kmalloc+0xd4/0xd8
[   58.231161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.235759]  kasan_atomics+0xb8/0x2e0
[   58.239488]  kunit_try_run_case+0x170/0x3f0
[   58.243741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.249306]  kthread+0x328/0x630
[   58.252590]  ret_from_fork+0x10/0x20
[   58.256221] 
[   58.257744] The buggy address belongs to the object at ffff000080acff00
[   58.257744]  which belongs to the cache kmalloc-64 of size 64
[   58.270222] The buggy address is located 0 bytes to the right of
[   58.270222]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   58.283235] 
[   58.284759] The buggy address belongs to the physical page:
[   58.290401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   58.298500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.305111] page_type: f5(slab)
[   58.308311] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   58.316151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.323987] page dumped because: kasan: bad access detected
[   58.329630] 
[   58.331162] Memory state around the buggy address:
[   58.336014]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.343321]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.350626] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.357941]                                      ^
[   58.362795]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.370108]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   58.377423] ==================================================================
[   68.888416] ==================================================================
[   68.895726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   68.903217] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   68.910705] 
[   68.912230] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   68.912259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.912268] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.912278] Call trace:
[   68.912285]  show_stack+0x20/0x38 (C)
[   68.912302]  dump_stack_lvl+0x8c/0xd0
[   68.912320]  print_report+0x118/0x608
[   68.912338]  kasan_report+0xdc/0x128
[   68.912358]  kasan_check_range+0x100/0x1a8
[   68.912377]  __kasan_check_write+0x20/0x30
[   68.912394]  kasan_atomics_helper+0x10c0/0x4858
[   68.912413]  kasan_atomics+0x198/0x2e0
[   68.912429]  kunit_try_run_case+0x170/0x3f0
[   68.912447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.912469]  kthread+0x328/0x630
[   68.912483]  ret_from_fork+0x10/0x20
[   68.912500] 
[   68.985750] Allocated by task 363:
[   68.989206]  kasan_save_stack+0x3c/0x68
[   68.993103]  kasan_save_track+0x20/0x40
[   68.997000]  kasan_save_alloc_info+0x40/0x58
[   69.001339]  __kasan_kmalloc+0xd4/0xd8
[   69.005148]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.009749]  kasan_atomics+0xb8/0x2e0
[   69.013471]  kunit_try_run_case+0x170/0x3f0
[   69.017725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.023294]  kthread+0x328/0x630
[   69.026580]  ret_from_fork+0x10/0x20
[   69.030214] 
[   69.031737] The buggy address belongs to the object at ffff000080acff00
[   69.031737]  which belongs to the cache kmalloc-64 of size 64
[   69.044215] The buggy address is located 0 bytes to the right of
[   69.044215]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   69.057216] 
[   69.058740] The buggy address belongs to the physical page:
[   69.064385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   69.072490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.079098] page_type: f5(slab)
[   69.082296] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.090133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.097966] page dumped because: kasan: bad access detected
[   69.103611] 
[   69.105134] Memory state around the buggy address:
[   69.109989]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.117301]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.124615] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.131924]                                      ^
[   69.136780]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.144092]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   69.151402] ==================================================================
[   70.780970] ==================================================================
[   70.788282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   70.795773] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   70.803175] 
[   70.804700] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   70.804729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.804736] Hardware name: Thundercomm Dragonboard 845c (DT)
[   70.804746] Call trace:
[   70.804753]  show_stack+0x20/0x38 (C)
[   70.804770]  dump_stack_lvl+0x8c/0xd0
[   70.804788]  print_report+0x118/0x608
[   70.804807]  kasan_report+0xdc/0x128
[   70.804826]  __asan_report_load8_noabort+0x20/0x30
[   70.804843]  kasan_atomics_helper+0x3f04/0x4858
[   70.804861]  kasan_atomics+0x198/0x2e0
[   70.804878]  kunit_try_run_case+0x170/0x3f0
[   70.804897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.804917]  kthread+0x328/0x630
[   70.804931]  ret_from_fork+0x10/0x20
[   70.804947] 
[   70.874746] Allocated by task 363:
[   70.878203]  kasan_save_stack+0x3c/0x68
[   70.882102]  kasan_save_track+0x20/0x40
[   70.886000]  kasan_save_alloc_info+0x40/0x58
[   70.890339]  __kasan_kmalloc+0xd4/0xd8
[   70.894148]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.898750]  kasan_atomics+0xb8/0x2e0
[   70.902472]  kunit_try_run_case+0x170/0x3f0
[   70.906724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.912293]  kthread+0x328/0x630
[   70.915580]  ret_from_fork+0x10/0x20
[   70.919215] 
[   70.920738] The buggy address belongs to the object at ffff000080acff00
[   70.920738]  which belongs to the cache kmalloc-64 of size 64
[   70.933216] The buggy address is located 0 bytes to the right of
[   70.933216]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   70.946218] 
[   70.947742] The buggy address belongs to the physical page:
[   70.953387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   70.961494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.968102] page_type: f5(slab)
[   70.971301] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   70.979138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.986970] page dumped because: kasan: bad access detected
[   70.992616] 
[   70.994138] Memory state around the buggy address:
[   70.998993]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.006305]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.013616] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.020926]                                      ^
[   71.025782]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.033095]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   71.040406] ==================================================================
[   65.926483] ==================================================================
[   65.933795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   65.941199] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   65.948688] 
[   65.950214] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   65.950243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.950253] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.950262] Call trace:
[   65.950269]  show_stack+0x20/0x38 (C)
[   65.950285]  dump_stack_lvl+0x8c/0xd0
[   65.950304]  print_report+0x118/0x608
[   65.950322]  kasan_report+0xdc/0x128
[   65.950340]  kasan_check_range+0x100/0x1a8
[   65.950360]  __kasan_check_write+0x20/0x30
[   65.950374]  kasan_atomics_helper+0xd3c/0x4858
[   65.950392]  kasan_atomics+0x198/0x2e0
[   65.950409]  kunit_try_run_case+0x170/0x3f0
[   65.950426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.950446]  kthread+0x328/0x630
[   65.950459]  ret_from_fork+0x10/0x20
[   65.950475] 
[   66.023642] Allocated by task 363:
[   66.027099]  kasan_save_stack+0x3c/0x68
[   66.030998]  kasan_save_track+0x20/0x40
[   66.034895]  kasan_save_alloc_info+0x40/0x58
[   66.039234]  __kasan_kmalloc+0xd4/0xd8
[   66.043043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.047644]  kasan_atomics+0xb8/0x2e0
[   66.051367]  kunit_try_run_case+0x170/0x3f0
[   66.055621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.061190]  kthread+0x328/0x630
[   66.064477]  ret_from_fork+0x10/0x20
[   66.068111] 
[   66.069634] The buggy address belongs to the object at ffff000080acff00
[   66.069634]  which belongs to the cache kmalloc-64 of size 64
[   66.082111] The buggy address is located 0 bytes to the right of
[   66.082111]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   66.095112] 
[   66.096636] The buggy address belongs to the physical page:
[   66.102281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   66.110388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.116995] page_type: f5(slab)
[   66.120195] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.128030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.135862] page dumped because: kasan: bad access detected
[   66.141508] 
[   66.143031] Memory state around the buggy address:
[   66.147886]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.155198]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.162510] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.169819]                                      ^
[   66.174676]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.181987]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.189297] ==================================================================
[   57.844583] ==================================================================
[   57.851902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   57.859312] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   57.866796] 
[   57.868331] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   57.868360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.868369] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.868380] Call trace:
[   57.868386]  show_stack+0x20/0x38 (C)
[   57.868403]  dump_stack_lvl+0x8c/0xd0
[   57.868422]  print_report+0x118/0x608
[   57.868441]  kasan_report+0xdc/0x128
[   57.868460]  kasan_check_range+0x100/0x1a8
[   57.868481]  __kasan_check_write+0x20/0x30
[   57.868496]  kasan_atomics_helper+0x24c/0x4858
[   57.868514]  kasan_atomics+0x198/0x2e0
[   57.868530]  kunit_try_run_case+0x170/0x3f0
[   57.868548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.868569]  kthread+0x328/0x630
[   57.868582]  ret_from_fork+0x10/0x20
[   57.868600] 
[   57.941765] Allocated by task 363:
[   57.945217]  kasan_save_stack+0x3c/0x68
[   57.949121]  kasan_save_track+0x20/0x40
[   57.953025]  kasan_save_alloc_info+0x40/0x58
[   57.957360]  __kasan_kmalloc+0xd4/0xd8
[   57.961175]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.965773]  kasan_atomics+0xb8/0x2e0
[   57.969501]  kunit_try_run_case+0x170/0x3f0
[   57.973751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.979311]  kthread+0x328/0x630
[   57.982597]  ret_from_fork+0x10/0x20
[   57.986228] 
[   57.987758] The buggy address belongs to the object at ffff000080acff00
[   57.987758]  which belongs to the cache kmalloc-64 of size 64
[   58.000237] The buggy address is located 0 bytes to the right of
[   58.000237]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   58.013236] 
[   58.014762] The buggy address belongs to the physical page:
[   58.020399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   58.028498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.035111] page_type: f5(slab)
[   58.038308] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   58.046148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.053980] page dumped because: kasan: bad access detected
[   58.059618] 
[   58.061142] Memory state around the buggy address:
[   58.065993]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.073308]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.080623] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.087937]                                      ^
[   58.092789]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.100103]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   58.107416] ==================================================================
[   58.921754] ==================================================================
[   58.929064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   58.936556] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   58.944044] 
[   58.945569] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   58.945599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.945606] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.945617] Call trace:
[   58.945623]  show_stack+0x20/0x38 (C)
[   58.945640]  dump_stack_lvl+0x8c/0xd0
[   58.945658]  print_report+0x118/0x608
[   58.945676]  kasan_report+0xdc/0x128
[   58.945693]  __asan_report_store4_noabort+0x20/0x30
[   58.945711]  kasan_atomics_helper+0x3f94/0x4858
[   58.945729]  kasan_atomics+0x198/0x2e0
[   58.945746]  kunit_try_run_case+0x170/0x3f0
[   58.945765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.945786]  kthread+0x328/0x630
[   58.945800]  ret_from_fork+0x10/0x20
[   58.945817] 
[   59.015700] Allocated by task 363:
[   59.019156]  kasan_save_stack+0x3c/0x68
[   59.023054]  kasan_save_track+0x20/0x40
[   59.026951]  kasan_save_alloc_info+0x40/0x58
[   59.031290]  __kasan_kmalloc+0xd4/0xd8
[   59.035098]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.039699]  kasan_atomics+0xb8/0x2e0
[   59.043420]  kunit_try_run_case+0x170/0x3f0
[   59.047673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.053243]  kthread+0x328/0x630
[   59.056528]  ret_from_fork+0x10/0x20
[   59.060162] 
[   59.061685] The buggy address belongs to the object at ffff000080acff00
[   59.061685]  which belongs to the cache kmalloc-64 of size 64
[   59.074163] The buggy address is located 0 bytes to the right of
[   59.074163]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   59.087164] 
[   59.088687] The buggy address belongs to the physical page:
[   59.094332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   59.102441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.109048] page_type: f5(slab)
[   59.112246] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.120084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.127916] page dumped because: kasan: bad access detected
[   59.133562] 
[   59.135085] Memory state around the buggy address:
[   59.139940]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.147253]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.154565] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.161874]                                      ^
[   59.166730]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.174041]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   59.181350] ==================================================================
[   62.160697] ==================================================================
[   62.168008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   62.175412] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   62.182900] 
[   62.184427] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   62.184455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.184464] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.184474] Call trace:
[   62.184480]  show_stack+0x20/0x38 (C)
[   62.184498]  dump_stack_lvl+0x8c/0xd0
[   62.184515]  print_report+0x118/0x608
[   62.184534]  kasan_report+0xdc/0x128
[   62.184552]  kasan_check_range+0x100/0x1a8
[   62.184572]  __kasan_check_write+0x20/0x30
[   62.184588]  kasan_atomics_helper+0x894/0x4858
[   62.184608]  kasan_atomics+0x198/0x2e0
[   62.184625]  kunit_try_run_case+0x170/0x3f0
[   62.184643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.184663]  kthread+0x328/0x630
[   62.184677]  ret_from_fork+0x10/0x20
[   62.184695] 
[   62.257858] Allocated by task 363:
[   62.261314]  kasan_save_stack+0x3c/0x68
[   62.265212]  kasan_save_track+0x20/0x40
[   62.269111]  kasan_save_alloc_info+0x40/0x58
[   62.273449]  __kasan_kmalloc+0xd4/0xd8
[   62.277260]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.281861]  kasan_atomics+0xb8/0x2e0
[   62.285583]  kunit_try_run_case+0x170/0x3f0
[   62.289836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.295405]  kthread+0x328/0x630
[   62.298690]  ret_from_fork+0x10/0x20
[   62.302324] 
[   62.303848] The buggy address belongs to the object at ffff000080acff00
[   62.303848]  which belongs to the cache kmalloc-64 of size 64
[   62.316326] The buggy address is located 0 bytes to the right of
[   62.316326]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   62.329327] 
[   62.330851] The buggy address belongs to the physical page:
[   62.336496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   62.344604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.351210] page_type: f5(slab)
[   62.354408] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.362244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.370074] page dumped because: kasan: bad access detected
[   62.375720] 
[   62.377242] Memory state around the buggy address:
[   62.382097]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.389409]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.396720] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.404029]                                      ^
[   62.408884]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.416195]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.423505] ==================================================================
[   67.000232] ==================================================================
[   67.007542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   67.014947] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   67.022436] 
[   67.023961] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   67.023990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.023998] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.024008] Call trace:
[   67.024015]  show_stack+0x20/0x38 (C)
[   67.024032]  dump_stack_lvl+0x8c/0xd0
[   67.024049]  print_report+0x118/0x608
[   67.024068]  kasan_report+0xdc/0x128
[   67.024087]  kasan_check_range+0x100/0x1a8
[   67.024107]  __kasan_check_write+0x20/0x30
[   67.024123]  kasan_atomics_helper+0xe44/0x4858
[   67.024142]  kasan_atomics+0x198/0x2e0
[   67.024158]  kunit_try_run_case+0x170/0x3f0
[   67.024177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.024197]  kthread+0x328/0x630
[   67.024210]  ret_from_fork+0x10/0x20
[   67.024228] 
[   67.097396] Allocated by task 363:
[   67.100851]  kasan_save_stack+0x3c/0x68
[   67.104748]  kasan_save_track+0x20/0x40
[   67.108647]  kasan_save_alloc_info+0x40/0x58
[   67.112984]  __kasan_kmalloc+0xd4/0xd8
[   67.116794]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.121395]  kasan_atomics+0xb8/0x2e0
[   67.125116]  kunit_try_run_case+0x170/0x3f0
[   67.129368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.134938]  kthread+0x328/0x630
[   67.138223]  ret_from_fork+0x10/0x20
[   67.141858] 
[   67.143381] The buggy address belongs to the object at ffff000080acff00
[   67.143381]  which belongs to the cache kmalloc-64 of size 64
[   67.155860] The buggy address is located 0 bytes to the right of
[   67.155860]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   67.168861] 
[   67.170386] The buggy address belongs to the physical page:
[   67.176031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   67.184138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.190745] page_type: f5(slab)
[   67.193945] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   67.201781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.209614] page dumped because: kasan: bad access detected
[   67.215259] 
[   67.216782] Memory state around the buggy address:
[   67.221638]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.228950]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.236263] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.243572]                                      ^
[   67.248429]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.255743]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.263055] ==================================================================
[   66.463440] ==================================================================
[   66.470751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   66.478154] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   66.485555] 
[   66.487082] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   66.487111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.487118] Hardware name: Thundercomm Dragonboard 845c (DT)
[   66.487129] Call trace:
[   66.487135]  show_stack+0x20/0x38 (C)
[   66.487152]  dump_stack_lvl+0x8c/0xd0
[   66.487170]  print_report+0x118/0x608
[   66.487189]  kasan_report+0xdc/0x128
[   66.487207]  kasan_check_range+0x100/0x1a8
[   66.487227]  __kasan_check_read+0x20/0x30
[   66.487243]  kasan_atomics_helper+0xdd4/0x4858
[   66.487261]  kasan_atomics+0x198/0x2e0
[   66.487278]  kunit_try_run_case+0x170/0x3f0
[   66.487295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.487316]  kthread+0x328/0x630
[   66.487330]  ret_from_fork+0x10/0x20
[   66.487346] 
[   66.560416] Allocated by task 363:
[   66.563873]  kasan_save_stack+0x3c/0x68
[   66.567771]  kasan_save_track+0x20/0x40
[   66.571670]  kasan_save_alloc_info+0x40/0x58
[   66.576009]  __kasan_kmalloc+0xd4/0xd8
[   66.579817]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.584419]  kasan_atomics+0xb8/0x2e0
[   66.588140]  kunit_try_run_case+0x170/0x3f0
[   66.592392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.597961]  kthread+0x328/0x630
[   66.601246]  ret_from_fork+0x10/0x20
[   66.604881] 
[   66.606403] The buggy address belongs to the object at ffff000080acff00
[   66.606403]  which belongs to the cache kmalloc-64 of size 64
[   66.618880] The buggy address is located 0 bytes to the right of
[   66.618880]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   66.631879] 
[   66.633402] The buggy address belongs to the physical page:
[   66.639047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   66.647153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.653760] page_type: f5(slab)
[   66.656959] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.664794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.672625] page dumped because: kasan: bad access detected
[   66.678270] 
[   66.679793] Memory state around the buggy address:
[   66.684648]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.691959]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.699269] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.706579]                                      ^
[   66.711435]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.718746]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.726057] ==================================================================
[   63.238080] ==================================================================
[   63.245389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   63.252794] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   63.260282] 
[   63.261808] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   63.261837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.261845] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.261856] Call trace:
[   63.261861]  show_stack+0x20/0x38 (C)
[   63.261879]  dump_stack_lvl+0x8c/0xd0
[   63.261897]  print_report+0x118/0x608
[   63.261916]  kasan_report+0xdc/0x128
[   63.261935]  kasan_check_range+0x100/0x1a8
[   63.261955]  __kasan_check_write+0x20/0x30
[   63.261970]  kasan_atomics_helper+0xa04/0x4858
[   63.261988]  kasan_atomics+0x198/0x2e0
[   63.262006]  kunit_try_run_case+0x170/0x3f0
[   63.262023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.262045]  kthread+0x328/0x630
[   63.262058]  ret_from_fork+0x10/0x20
[   63.262075] 
[   63.335241] Allocated by task 363:
[   63.338697]  kasan_save_stack+0x3c/0x68
[   63.342594]  kasan_save_track+0x20/0x40
[   63.346490]  kasan_save_alloc_info+0x40/0x58
[   63.350829]  __kasan_kmalloc+0xd4/0xd8
[   63.354640]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.359241]  kasan_atomics+0xb8/0x2e0
[   63.362964]  kunit_try_run_case+0x170/0x3f0
[   63.367216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.372786]  kthread+0x328/0x630
[   63.376073]  ret_from_fork+0x10/0x20
[   63.379708] 
[   63.381232] The buggy address belongs to the object at ffff000080acff00
[   63.381232]  which belongs to the cache kmalloc-64 of size 64
[   63.393711] The buggy address is located 0 bytes to the right of
[   63.393711]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   63.406712] 
[   63.408236] The buggy address belongs to the physical page:
[   63.413882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   63.421988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.428596] page_type: f5(slab)
[   63.431794] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   63.439630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.447463] page dumped because: kasan: bad access detected
[   63.453109] 
[   63.454638] Memory state around the buggy address:
[   63.459498]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.466813]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.474129] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.481440]                                      ^
[   63.486297]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.493611]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.500921] ==================================================================
[   63.508310] ==================================================================
[   63.515621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   63.523028] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   63.530520] 
[   63.532048] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   63.532076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.532084] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.532095] Call trace:
[   63.532103]  show_stack+0x20/0x38 (C)
[   63.532121]  dump_stack_lvl+0x8c/0xd0
[   63.532139]  print_report+0x118/0x608
[   63.532158]  kasan_report+0xdc/0x128
[   63.532177]  kasan_check_range+0x100/0x1a8
[   63.532197]  __kasan_check_write+0x20/0x30
[   63.532213]  kasan_atomics_helper+0xa6c/0x4858
[   63.532230]  kasan_atomics+0x198/0x2e0
[   63.532249]  kunit_try_run_case+0x170/0x3f0
[   63.532266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.532286]  kthread+0x328/0x630
[   63.532300]  ret_from_fork+0x10/0x20
[   63.532316] 
[   63.605484] Allocated by task 363:
[   63.608941]  kasan_save_stack+0x3c/0x68
[   63.612841]  kasan_save_track+0x20/0x40
[   63.616739]  kasan_save_alloc_info+0x40/0x58
[   63.621077]  __kasan_kmalloc+0xd4/0xd8
[   63.624885]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.629489]  kasan_atomics+0xb8/0x2e0
[   63.633210]  kunit_try_run_case+0x170/0x3f0
[   63.637464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.643033]  kthread+0x328/0x630
[   63.646320]  ret_from_fork+0x10/0x20
[   63.649955] 
[   63.651479] The buggy address belongs to the object at ffff000080acff00
[   63.651479]  which belongs to the cache kmalloc-64 of size 64
[   63.663957] The buggy address is located 0 bytes to the right of
[   63.663957]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   63.676959] 
[   63.678483] The buggy address belongs to the physical page:
[   63.684129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   63.692237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.698845] page_type: f5(slab)
[   63.702047] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   63.709885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.717717] page dumped because: kasan: bad access detected
[   63.723363] 
[   63.724886] Memory state around the buggy address:
[   63.729742]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.737055]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.744367] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.751678]                                      ^
[   63.756535]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.763847]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.771157] ==================================================================
[   68.077722] ==================================================================
[   68.085033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   68.092437] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   68.099925] 
[   68.101450] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   68.101479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.101486] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.101497] Call trace:
[   68.101504]  show_stack+0x20/0x38 (C)
[   68.101521]  dump_stack_lvl+0x8c/0xd0
[   68.101538]  print_report+0x118/0x608
[   68.101556]  kasan_report+0xdc/0x128
[   68.101574]  kasan_check_range+0x100/0x1a8
[   68.101594]  __kasan_check_write+0x20/0x30
[   68.101609]  kasan_atomics_helper+0xf88/0x4858
[   68.101627]  kasan_atomics+0x198/0x2e0
[   68.101643]  kunit_try_run_case+0x170/0x3f0
[   68.101661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.101682]  kthread+0x328/0x630
[   68.101695]  ret_from_fork+0x10/0x20
[   68.101713] 
[   68.174880] Allocated by task 363:
[   68.178336]  kasan_save_stack+0x3c/0x68
[   68.182235]  kasan_save_track+0x20/0x40
[   68.186131]  kasan_save_alloc_info+0x40/0x58
[   68.190468]  __kasan_kmalloc+0xd4/0xd8
[   68.194278]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.198879]  kasan_atomics+0xb8/0x2e0
[   68.202601]  kunit_try_run_case+0x170/0x3f0
[   68.206855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.212423]  kthread+0x328/0x630
[   68.215708]  ret_from_fork+0x10/0x20
[   68.219343] 
[   68.220866] The buggy address belongs to the object at ffff000080acff00
[   68.220866]  which belongs to the cache kmalloc-64 of size 64
[   68.233343] The buggy address is located 0 bytes to the right of
[   68.233343]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   68.246345] 
[   68.247868] The buggy address belongs to the physical page:
[   68.253512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   68.261618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.268225] page_type: f5(slab)
[   68.271423] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.279259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.287091] page dumped because: kasan: bad access detected
[   68.292738] 
[   68.294260] Memory state around the buggy address:
[   68.299114]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.306426]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.313736] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.321045]                                      ^
[   68.325901]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.333212]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   68.340522] ==================================================================
[   64.048734] ==================================================================
[   64.056044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   64.063536] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   64.070938] 
[   64.072463] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   64.072494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.072502] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.072513] Call trace:
[   64.072519]  show_stack+0x20/0x38 (C)
[   64.072537]  dump_stack_lvl+0x8c/0xd0
[   64.072555]  print_report+0x118/0x608
[   64.072575]  kasan_report+0xdc/0x128
[   64.072593]  __asan_report_load4_noabort+0x20/0x30
[   64.072610]  kasan_atomics_helper+0x3dcc/0x4858
[   64.072629]  kasan_atomics+0x198/0x2e0
[   64.072645]  kunit_try_run_case+0x170/0x3f0
[   64.072663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.072685]  kthread+0x328/0x630
[   64.072698]  ret_from_fork+0x10/0x20
[   64.072715] 
[   64.142513] Allocated by task 363:
[   64.145970]  kasan_save_stack+0x3c/0x68
[   64.149871]  kasan_save_track+0x20/0x40
[   64.153769]  kasan_save_alloc_info+0x40/0x58
[   64.158108]  __kasan_kmalloc+0xd4/0xd8
[   64.161917]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.166519]  kasan_atomics+0xb8/0x2e0
[   64.170241]  kunit_try_run_case+0x170/0x3f0
[   64.174495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.180065]  kthread+0x328/0x630
[   64.183352]  ret_from_fork+0x10/0x20
[   64.186987] 
[   64.188511] The buggy address belongs to the object at ffff000080acff00
[   64.188511]  which belongs to the cache kmalloc-64 of size 64
[   64.200989] The buggy address is located 0 bytes to the right of
[   64.200989]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   64.213991] 
[   64.215515] The buggy address belongs to the physical page:
[   64.221161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   64.229268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.235876] page_type: f5(slab)
[   64.239075] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   64.246913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.254744] page dumped because: kasan: bad access detected
[   64.260391] 
[   64.261925] Memory state around the buggy address:
[   64.266779]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.274093]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.281406] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.288716]                                      ^
[   64.293573]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.300884]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.308195] ==================================================================
[   71.858855] ==================================================================
[   71.866166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   71.873657] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   71.881144] 
[   71.882670] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   71.882699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.882707] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.882718] Call trace:
[   71.882724]  show_stack+0x20/0x38 (C)
[   71.882740]  dump_stack_lvl+0x8c/0xd0
[   71.882758]  print_report+0x118/0x608
[   71.882776]  kasan_report+0xdc/0x128
[   71.882796]  kasan_check_range+0x100/0x1a8
[   71.882815]  __kasan_check_write+0x20/0x30
[   71.882832]  kasan_atomics_helper+0x154c/0x4858
[   71.882851]  kasan_atomics+0x198/0x2e0
[   71.882868]  kunit_try_run_case+0x170/0x3f0
[   71.882886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.882906]  kthread+0x328/0x630
[   71.882920]  ret_from_fork+0x10/0x20
[   71.882936] 
[   71.956187] Allocated by task 363:
[   71.959643]  kasan_save_stack+0x3c/0x68
[   71.963542]  kasan_save_track+0x20/0x40
[   71.967438]  kasan_save_alloc_info+0x40/0x58
[   71.971776]  __kasan_kmalloc+0xd4/0xd8
[   71.975586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.980187]  kasan_atomics+0xb8/0x2e0
[   71.983908]  kunit_try_run_case+0x170/0x3f0
[   71.988161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.993730]  kthread+0x328/0x630
[   71.997016]  ret_from_fork+0x10/0x20
[   72.000650] 
[   72.002173] The buggy address belongs to the object at ffff000080acff00
[   72.002173]  which belongs to the cache kmalloc-64 of size 64
[   72.014653] The buggy address is located 0 bytes to the right of
[   72.014653]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   72.027654] 
[   72.029177] The buggy address belongs to the physical page:
[   72.034822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   72.042928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.049535] page_type: f5(slab)
[   72.052734] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.060570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.068401] page dumped because: kasan: bad access detected
[   72.074047] 
[   72.075569] Memory state around the buggy address:
[   72.080424]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.087735]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.095047] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.102357]                                      ^
[   72.107212]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.114524]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.121833] ==================================================================
[   57.574485] ==================================================================
[   57.581814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   57.589227] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   57.596635] 
[   57.598164] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   57.598195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.598203] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.598216] Call trace:
[   57.598222]  show_stack+0x20/0x38 (C)
[   57.598241]  dump_stack_lvl+0x8c/0xd0
[   57.598260]  print_report+0x118/0x608
[   57.598280]  kasan_report+0xdc/0x128
[   57.598299]  kasan_check_range+0x100/0x1a8
[   57.598319]  __kasan_check_read+0x20/0x30
[   57.598335]  kasan_atomics_helper+0x1ec/0x4858
[   57.598354]  kasan_atomics+0x198/0x2e0
[   57.598373]  kunit_try_run_case+0x170/0x3f0
[   57.598391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.598413]  kthread+0x328/0x630
[   57.598427]  ret_from_fork+0x10/0x20
[   57.598447] 
[   57.671530] Allocated by task 363:
[   57.674988]  kasan_save_stack+0x3c/0x68
[   57.678894]  kasan_save_track+0x20/0x40
[   57.682799]  kasan_save_alloc_info+0x40/0x58
[   57.687134]  __kasan_kmalloc+0xd4/0xd8
[   57.690940]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.695545]  kasan_atomics+0xb8/0x2e0
[   57.699263]  kunit_try_run_case+0x170/0x3f0
[   57.703512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.709079]  kthread+0x328/0x630
[   57.712362]  ret_from_fork+0x10/0x20
[   57.715994] 
[   57.717517] The buggy address belongs to the object at ffff000080acff00
[   57.717517]  which belongs to the cache kmalloc-64 of size 64
[   57.729996] The buggy address is located 0 bytes to the right of
[   57.729996]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   57.743006] 
[   57.744537] The buggy address belongs to the physical page:
[   57.750181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   57.758282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.764897] page_type: f5(slab)
[   57.768095] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   57.775937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.783772] page dumped because: kasan: bad access detected
[   57.789418] 
[   57.790940] Memory state around the buggy address:
[   57.795799]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.803107]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.810423] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.817736]                                      ^
[   57.822588]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.829903]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   57.837217] ==================================================================
[   64.852563] ==================================================================
[   64.859873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   64.867278] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   64.874767] 
[   64.876293] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   64.876321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.876330] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.876340] Call trace:
[   64.876346]  show_stack+0x20/0x38 (C)
[   64.876363]  dump_stack_lvl+0x8c/0xd0
[   64.876380]  print_report+0x118/0x608
[   64.876398]  kasan_report+0xdc/0x128
[   64.876416]  kasan_check_range+0x100/0x1a8
[   64.876436]  __kasan_check_write+0x20/0x30
[   64.876451]  kasan_atomics_helper+0xc08/0x4858
[   64.876469]  kasan_atomics+0x198/0x2e0
[   64.876485]  kunit_try_run_case+0x170/0x3f0
[   64.876502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.876523]  kthread+0x328/0x630
[   64.876536]  ret_from_fork+0x10/0x20
[   64.876552] 
[   64.949715] Allocated by task 363:
[   64.953171]  kasan_save_stack+0x3c/0x68
[   64.957069]  kasan_save_track+0x20/0x40
[   64.960966]  kasan_save_alloc_info+0x40/0x58
[   64.965303]  __kasan_kmalloc+0xd4/0xd8
[   64.969112]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.973713]  kasan_atomics+0xb8/0x2e0
[   64.977434]  kunit_try_run_case+0x170/0x3f0
[   64.981686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.987255]  kthread+0x328/0x630
[   64.990540]  ret_from_fork+0x10/0x20
[   64.994176] 
[   64.995699] The buggy address belongs to the object at ffff000080acff00
[   64.995699]  which belongs to the cache kmalloc-64 of size 64
[   65.008175] The buggy address is located 0 bytes to the right of
[   65.008175]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   65.021176] 
[   65.022699] The buggy address belongs to the physical page:
[   65.028344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   65.036450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.043056] page_type: f5(slab)
[   65.046255] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.054090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.061921] page dumped because: kasan: bad access detected
[   65.067567] 
[   65.069089] Memory state around the buggy address:
[   65.073942]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.081253]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.088564] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.095874]                                      ^
[   65.100729]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.108040]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.115349] ==================================================================
[   71.047781] ==================================================================
[   71.055093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   71.062586] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   71.070075] 
[   71.071601] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   71.071631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.071639] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.071649] Call trace:
[   71.071654]  show_stack+0x20/0x38 (C)
[   71.071671]  dump_stack_lvl+0x8c/0xd0
[   71.071689]  print_report+0x118/0x608
[   71.071707]  kasan_report+0xdc/0x128
[   71.071726]  kasan_check_range+0x100/0x1a8
[   71.071746]  __kasan_check_write+0x20/0x30
[   71.071762]  kasan_atomics_helper+0x1414/0x4858
[   71.071780]  kasan_atomics+0x198/0x2e0
[   71.071798]  kunit_try_run_case+0x170/0x3f0
[   71.071816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.071837]  kthread+0x328/0x630
[   71.071852]  ret_from_fork+0x10/0x20
[   71.071868] 
[   71.145122] Allocated by task 363:
[   71.148579]  kasan_save_stack+0x3c/0x68
[   71.152477]  kasan_save_track+0x20/0x40
[   71.156375]  kasan_save_alloc_info+0x40/0x58
[   71.160713]  __kasan_kmalloc+0xd4/0xd8
[   71.164522]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.169123]  kasan_atomics+0xb8/0x2e0
[   71.172845]  kunit_try_run_case+0x170/0x3f0
[   71.177099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.182668]  kthread+0x328/0x630
[   71.185953]  ret_from_fork+0x10/0x20
[   71.189587] 
[   71.191111] The buggy address belongs to the object at ffff000080acff00
[   71.191111]  which belongs to the cache kmalloc-64 of size 64
[   71.203589] The buggy address is located 0 bytes to the right of
[   71.203589]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   71.216590] 
[   71.218112] The buggy address belongs to the physical page:
[   71.223757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   71.231865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.238472] page_type: f5(slab)
[   71.241673] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   71.249509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.257341] page dumped because: kasan: bad access detected
[   71.262987] 
[   71.264510] Memory state around the buggy address:
[   71.269366]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.276678]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.283989] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.291299]                                      ^
[   71.296154]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.303466]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   71.310777] ==================================================================
[   60.539584] ==================================================================
[   60.546895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   60.554299] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   60.561787] 
[   60.563312] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   60.563341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.563349] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.563359] Call trace:
[   60.563365]  show_stack+0x20/0x38 (C)
[   60.563382]  dump_stack_lvl+0x8c/0xd0
[   60.563399]  print_report+0x118/0x608
[   60.563417]  kasan_report+0xdc/0x128
[   60.563436]  kasan_check_range+0x100/0x1a8
[   60.563457]  __kasan_check_write+0x20/0x30
[   60.563472]  kasan_atomics_helper+0x5b4/0x4858
[   60.563491]  kasan_atomics+0x198/0x2e0
[   60.563507]  kunit_try_run_case+0x170/0x3f0
[   60.563525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.563545]  kthread+0x328/0x630
[   60.563558]  ret_from_fork+0x10/0x20
[   60.563574] 
[   60.636738] Allocated by task 363:
[   60.640195]  kasan_save_stack+0x3c/0x68
[   60.644093]  kasan_save_track+0x20/0x40
[   60.647990]  kasan_save_alloc_info+0x40/0x58
[   60.652328]  __kasan_kmalloc+0xd4/0xd8
[   60.656138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.660739]  kasan_atomics+0xb8/0x2e0
[   60.664460]  kunit_try_run_case+0x170/0x3f0
[   60.668714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.674282]  kthread+0x328/0x630
[   60.677567]  ret_from_fork+0x10/0x20
[   60.681201] 
[   60.682725] The buggy address belongs to the object at ffff000080acff00
[   60.682725]  which belongs to the cache kmalloc-64 of size 64
[   60.695204] The buggy address is located 0 bytes to the right of
[   60.695204]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   60.708204] 
[   60.709727] The buggy address belongs to the physical page:
[   60.715373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   60.723480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.730088] page_type: f5(slab)
[   60.733287] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   60.741124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.748956] page dumped because: kasan: bad access detected
[   60.754603] 
[   60.756125] Memory state around the buggy address:
[   60.760980]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.768291]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.775603] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.782914]                                      ^
[   60.787771]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.795083]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   60.802393] ==================================================================
[   59.458897] ==================================================================
[   59.466207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   59.473611] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   59.481101] 
[   59.482626] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   59.482655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.482663] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.482674] Call trace:
[   59.482681]  show_stack+0x20/0x38 (C)
[   59.482698]  dump_stack_lvl+0x8c/0xd0
[   59.482715]  print_report+0x118/0x608
[   59.482734]  kasan_report+0xdc/0x128
[   59.482753]  kasan_check_range+0x100/0x1a8
[   59.482774]  __kasan_check_write+0x20/0x30
[   59.482791]  kasan_atomics_helper+0x414/0x4858
[   59.482810]  kasan_atomics+0x198/0x2e0
[   59.482826]  kunit_try_run_case+0x170/0x3f0
[   59.482844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.482864]  kthread+0x328/0x630
[   59.482877]  ret_from_fork+0x10/0x20
[   59.482893] 
[   59.556058] Allocated by task 363:
[   59.559514]  kasan_save_stack+0x3c/0x68
[   59.563411]  kasan_save_track+0x20/0x40
[   59.567308]  kasan_save_alloc_info+0x40/0x58
[   59.571647]  __kasan_kmalloc+0xd4/0xd8
[   59.575455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.580057]  kasan_atomics+0xb8/0x2e0
[   59.583779]  kunit_try_run_case+0x170/0x3f0
[   59.588033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.593601]  kthread+0x328/0x630
[   59.596886]  ret_from_fork+0x10/0x20
[   59.600521] 
[   59.602044] The buggy address belongs to the object at ffff000080acff00
[   59.602044]  which belongs to the cache kmalloc-64 of size 64
[   59.614523] The buggy address is located 0 bytes to the right of
[   59.614523]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   59.627525] 
[   59.629048] The buggy address belongs to the physical page:
[   59.634694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   59.642801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.649410] page_type: f5(slab)
[   59.652609] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.660447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.668279] page dumped because: kasan: bad access detected
[   59.673926] 
[   59.675448] Memory state around the buggy address:
[   59.680303]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.687617]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.694928] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.702238]                                      ^
[   59.707094]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.714405]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   59.721715] ==================================================================
[   68.618065] ==================================================================
[   68.625377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   68.632869] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   68.640357] 
[   68.641883] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   68.641912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.641921] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.641930] Call trace:
[   68.641937]  show_stack+0x20/0x38 (C)
[   68.641955]  dump_stack_lvl+0x8c/0xd0
[   68.641973]  print_report+0x118/0x608
[   68.641991]  kasan_report+0xdc/0x128
[   68.642010]  kasan_check_range+0x100/0x1a8
[   68.642030]  __kasan_check_write+0x20/0x30
[   68.642045]  kasan_atomics_helper+0x1058/0x4858
[   68.642064]  kasan_atomics+0x198/0x2e0
[   68.642080]  kunit_try_run_case+0x170/0x3f0
[   68.642098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.642119]  kthread+0x328/0x630
[   68.642133]  ret_from_fork+0x10/0x20
[   68.642149] 
[   68.715390] Allocated by task 363:
[   68.718847]  kasan_save_stack+0x3c/0x68
[   68.722745]  kasan_save_track+0x20/0x40
[   68.726642]  kasan_save_alloc_info+0x40/0x58
[   68.730980]  __kasan_kmalloc+0xd4/0xd8
[   68.734788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.739390]  kasan_atomics+0xb8/0x2e0
[   68.743112]  kunit_try_run_case+0x170/0x3f0
[   68.747365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.752934]  kthread+0x328/0x630
[   68.756220]  ret_from_fork+0x10/0x20
[   68.759853] 
[   68.761377] The buggy address belongs to the object at ffff000080acff00
[   68.761377]  which belongs to the cache kmalloc-64 of size 64
[   68.773856] The buggy address is located 0 bytes to the right of
[   68.773856]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   68.786858] 
[   68.788382] The buggy address belongs to the physical page:
[   68.794028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   68.802134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.808741] page_type: f5(slab)
[   68.811940] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.819778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.827609] page dumped because: kasan: bad access detected
[   68.833255] 
[   68.834778] Memory state around the buggy address:
[   68.839633]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.846944]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.854255] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.861566]                                      ^
[   68.866423]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.873735]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   68.881044] ==================================================================
[   65.122723] ==================================================================
[   65.130032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   65.137524] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   65.144924] 
[   65.146449] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   65.146478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.146485] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.146495] Call trace:
[   65.146502]  show_stack+0x20/0x38 (C)
[   65.146518]  dump_stack_lvl+0x8c/0xd0
[   65.146536]  print_report+0x118/0x608
[   65.146555]  kasan_report+0xdc/0x128
[   65.146573]  __asan_report_load4_noabort+0x20/0x30
[   65.146589]  kasan_atomics_helper+0x3de4/0x4858
[   65.146608]  kasan_atomics+0x198/0x2e0
[   65.146624]  kunit_try_run_case+0x170/0x3f0
[   65.146641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.146660]  kthread+0x328/0x630
[   65.146674]  ret_from_fork+0x10/0x20
[   65.146691] 
[   65.216488] Allocated by task 363:
[   65.219944]  kasan_save_stack+0x3c/0x68
[   65.223843]  kasan_save_track+0x20/0x40
[   65.227740]  kasan_save_alloc_info+0x40/0x58
[   65.232078]  __kasan_kmalloc+0xd4/0xd8
[   65.235887]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.240489]  kasan_atomics+0xb8/0x2e0
[   65.244211]  kunit_try_run_case+0x170/0x3f0
[   65.248463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.254032]  kthread+0x328/0x630
[   65.257317]  ret_from_fork+0x10/0x20
[   65.260953] 
[   65.262476] The buggy address belongs to the object at ffff000080acff00
[   65.262476]  which belongs to the cache kmalloc-64 of size 64
[   65.274956] The buggy address is located 0 bytes to the right of
[   65.274956]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   65.287958] 
[   65.289482] The buggy address belongs to the physical page:
[   65.295128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   65.303236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.309844] page_type: f5(slab)
[   65.313042] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.320880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.328711] page dumped because: kasan: bad access detected
[   65.334357] 
[   65.335880] Memory state around the buggy address:
[   65.340736]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.348049]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.355361] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.362671]                                      ^
[   65.367528]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.374840]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.382150] ==================================================================
[   57.031457] ==================================================================
[   57.046538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   57.054036] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   57.061441] 
[   57.062976] CPU: 3 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   57.063009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.063019] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.063032] Call trace:
[   57.063041]  show_stack+0x20/0x38 (C)
[   57.063060]  dump_stack_lvl+0x8c/0xd0
[   57.063083]  print_report+0x118/0x608
[   57.063104]  kasan_report+0xdc/0x128
[   57.063125]  __asan_report_load4_noabort+0x20/0x30
[   57.063146]  kasan_atomics_helper+0x40a8/0x4858
[   57.063168]  kasan_atomics+0x198/0x2e0
[   57.063186]  kunit_try_run_case+0x170/0x3f0
[   57.063206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.063231]  kthread+0x328/0x630
[   57.063246]  ret_from_fork+0x10/0x20
[   57.063265] 
[   57.133078] Allocated by task 363:
[   57.136540]  kasan_save_stack+0x3c/0x68
[   57.140454]  kasan_save_track+0x20/0x40
[   57.144368]  kasan_save_alloc_info+0x40/0x58
[   57.148708]  __kasan_kmalloc+0xd4/0xd8
[   57.152524]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.157127]  kasan_atomics+0xb8/0x2e0
[   57.160854]  kunit_try_run_case+0x170/0x3f0
[   57.165109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.170685]  kthread+0x328/0x630
[   57.173977]  ret_from_fork+0x10/0x20
[   57.177619] 
[   57.179150] The buggy address belongs to the object at ffff000080acff00
[   57.179150]  which belongs to the cache kmalloc-64 of size 64
[   57.191634] The buggy address is located 0 bytes to the right of
[   57.191634]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   57.204646] 
[   57.206178] The buggy address belongs to the physical page:
[   57.211829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   57.219934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.226553] page_type: f5(slab)
[   57.229759] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   57.237606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.245451] page dumped because: kasan: bad access detected
[   57.251102] 
[   57.252629] Memory state around the buggy address:
[   57.257495]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.264812]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.272129] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.279446]                                      ^
[   57.284310]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.291628]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   57.298945] ==================================================================
[   72.666372] ==================================================================
[   72.673684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   72.681176] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   72.688665] 
[   72.690190] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   72.690219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.690228] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.690238] Call trace:
[   72.690246]  show_stack+0x20/0x38 (C)
[   72.690264]  dump_stack_lvl+0x8c/0xd0
[   72.690282]  print_report+0x118/0x608
[   72.690300]  kasan_report+0xdc/0x128
[   72.690320]  kasan_check_range+0x100/0x1a8
[   72.690339]  __kasan_check_write+0x20/0x30
[   72.690356]  kasan_atomics_helper+0x1644/0x4858
[   72.690375]  kasan_atomics+0x198/0x2e0
[   72.690391]  kunit_try_run_case+0x170/0x3f0
[   72.690410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.690430]  kthread+0x328/0x630
[   72.690444]  ret_from_fork+0x10/0x20
[   72.690463] 
[   72.763713] Allocated by task 363:
[   72.767169]  kasan_save_stack+0x3c/0x68
[   72.771067]  kasan_save_track+0x20/0x40
[   72.774964]  kasan_save_alloc_info+0x40/0x58
[   72.779303]  __kasan_kmalloc+0xd4/0xd8
[   72.783113]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.787715]  kasan_atomics+0xb8/0x2e0
[   72.791437]  kunit_try_run_case+0x170/0x3f0
[   72.795689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.801259]  kthread+0x328/0x630
[   72.804546]  ret_from_fork+0x10/0x20
[   72.808181] 
[   72.809703] The buggy address belongs to the object at ffff000080acff00
[   72.809703]  which belongs to the cache kmalloc-64 of size 64
[   72.822181] The buggy address is located 0 bytes to the right of
[   72.822181]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   72.835183] 
[   72.836706] The buggy address belongs to the physical page:
[   72.842352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   72.850460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.857068] page_type: f5(slab)
[   72.860267] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.868104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.875936] page dumped because: kasan: bad access detected
[   72.881583] 
[   72.883105] Memory state around the buggy address:
[   72.887959]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.895271]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.902583] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.909892]                                      ^
[   72.914749]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.922060]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.929370] ==================================================================
[   72.936732] ==================================================================
[   72.944044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   72.951536] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   72.958939] 
[   72.960464] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   72.960492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.960500] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.960512] Call trace:
[   72.960519]  show_stack+0x20/0x38 (C)
[   72.960537]  dump_stack_lvl+0x8c/0xd0
[   72.960555]  print_report+0x118/0x608
[   72.960574]  kasan_report+0xdc/0x128
[   72.960592]  __asan_report_load8_noabort+0x20/0x30
[   72.960609]  kasan_atomics_helper+0x3df4/0x4858
[   72.960628]  kasan_atomics+0x198/0x2e0
[   72.960645]  kunit_try_run_case+0x170/0x3f0
[   72.960662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.960682]  kthread+0x328/0x630
[   72.960695]  ret_from_fork+0x10/0x20
[   72.960711] 
[   73.030509] Allocated by task 363:
[   73.033965]  kasan_save_stack+0x3c/0x68
[   73.037863]  kasan_save_track+0x20/0x40
[   73.041761]  kasan_save_alloc_info+0x40/0x58
[   73.046099]  __kasan_kmalloc+0xd4/0xd8
[   73.049908]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.054510]  kasan_atomics+0xb8/0x2e0
[   73.058232]  kunit_try_run_case+0x170/0x3f0
[   73.062484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.068052]  kthread+0x328/0x630
[   73.071338]  ret_from_fork+0x10/0x20
[   73.074972] 
[   73.076495] The buggy address belongs to the object at ffff000080acff00
[   73.076495]  which belongs to the cache kmalloc-64 of size 64
[   73.088972] The buggy address is located 0 bytes to the right of
[   73.088972]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   73.101973] 
[   73.103496] The buggy address belongs to the physical page:
[   73.109141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   73.117248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.123855] page_type: f5(slab)
[   73.127054] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.134890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.142722] page dumped because: kasan: bad access detected
[   73.148368] 
[   73.149902] Memory state around the buggy address:
[   73.154756]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.162067]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.169378] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.176687]                                      ^
[   73.181542]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.188853]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.196162] ==================================================================
[   63.778525] ==================================================================
[   63.785838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   63.793244] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   63.800734] 
[   63.802272] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   63.802302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.802310] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.802322] Call trace:
[   63.802329]  show_stack+0x20/0x38 (C)
[   63.802347]  dump_stack_lvl+0x8c/0xd0
[   63.802366]  print_report+0x118/0x608
[   63.802384]  kasan_report+0xdc/0x128
[   63.802401]  kasan_check_range+0x100/0x1a8
[   63.802420]  __kasan_check_write+0x20/0x30
[   63.802436]  kasan_atomics_helper+0xad4/0x4858
[   63.802454]  kasan_atomics+0x198/0x2e0
[   63.802472]  kunit_try_run_case+0x170/0x3f0
[   63.802490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.802510]  kthread+0x328/0x630
[   63.802524]  ret_from_fork+0x10/0x20
[   63.802540] 
[   63.875706] Allocated by task 363:
[   63.879164]  kasan_save_stack+0x3c/0x68
[   63.883063]  kasan_save_track+0x20/0x40
[   63.886961]  kasan_save_alloc_info+0x40/0x58
[   63.891299]  __kasan_kmalloc+0xd4/0xd8
[   63.895108]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.899710]  kasan_atomics+0xb8/0x2e0
[   63.903433]  kunit_try_run_case+0x170/0x3f0
[   63.907687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.913255]  kthread+0x328/0x630
[   63.916540]  ret_from_fork+0x10/0x20
[   63.920175] 
[   63.921699] The buggy address belongs to the object at ffff000080acff00
[   63.921699]  which belongs to the cache kmalloc-64 of size 64
[   63.934176] The buggy address is located 0 bytes to the right of
[   63.934176]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   63.947177] 
[   63.948700] The buggy address belongs to the physical page:
[   63.954345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   63.962450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.969058] page_type: f5(slab)
[   63.972257] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   63.980093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.987925] page dumped because: kasan: bad access detected
[   63.993571] 
[   63.995093] Memory state around the buggy address:
[   63.999948]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.007259]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.014570] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.021879]                                      ^
[   64.026736]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.034048]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.041358] ==================================================================
[   67.270428] ==================================================================
[   67.277738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   67.285230] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   67.292718] 
[   67.294243] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   67.294272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.294282] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.294293] Call trace:
[   67.294299]  show_stack+0x20/0x38 (C)
[   67.294317]  dump_stack_lvl+0x8c/0xd0
[   67.294335]  print_report+0x118/0x608
[   67.294354]  kasan_report+0xdc/0x128
[   67.294374]  __asan_report_store8_noabort+0x20/0x30
[   67.294390]  kasan_atomics_helper+0x3e5c/0x4858
[   67.294409]  kasan_atomics+0x198/0x2e0
[   67.294426]  kunit_try_run_case+0x170/0x3f0
[   67.294444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.294465]  kthread+0x328/0x630
[   67.294479]  ret_from_fork+0x10/0x20
[   67.294496] 
[   67.364377] Allocated by task 363:
[   67.367832]  kasan_save_stack+0x3c/0x68
[   67.371731]  kasan_save_track+0x20/0x40
[   67.375627]  kasan_save_alloc_info+0x40/0x58
[   67.379965]  __kasan_kmalloc+0xd4/0xd8
[   67.383776]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.388378]  kasan_atomics+0xb8/0x2e0
[   67.392101]  kunit_try_run_case+0x170/0x3f0
[   67.396355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.401922]  kthread+0x328/0x630
[   67.405208]  ret_from_fork+0x10/0x20
[   67.408842] 
[   67.410365] The buggy address belongs to the object at ffff000080acff00
[   67.410365]  which belongs to the cache kmalloc-64 of size 64
[   67.422843] The buggy address is located 0 bytes to the right of
[   67.422843]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   67.435844] 
[   67.437367] The buggy address belongs to the physical page:
[   67.443014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   67.451121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.457728] page_type: f5(slab)
[   67.460928] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   67.468763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.476595] page dumped because: kasan: bad access detected
[   67.482240] 
[   67.483763] Memory state around the buggy address:
[   67.488619]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.495930]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.503242] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.510552]                                      ^
[   67.515407]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.522718]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.530028] ==================================================================
[   58.651577] ==================================================================
[   58.658885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   58.666285] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   58.673770] 
[   58.675296] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   58.675324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.675333] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.675343] Call trace:
[   58.675349]  show_stack+0x20/0x38 (C)
[   58.675368]  dump_stack_lvl+0x8c/0xd0
[   58.675385]  print_report+0x118/0x608
[   58.675403]  kasan_report+0xdc/0x128
[   58.675422]  kasan_check_range+0x100/0x1a8
[   58.675444]  __kasan_check_write+0x20/0x30
[   58.675460]  kasan_atomics_helper+0x32c/0x4858
[   58.675479]  kasan_atomics+0x198/0x2e0
[   58.675495]  kunit_try_run_case+0x170/0x3f0
[   58.675513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.675533]  kthread+0x328/0x630
[   58.675547]  ret_from_fork+0x10/0x20
[   58.675564] 
[   58.748728] Allocated by task 363:
[   58.752184]  kasan_save_stack+0x3c/0x68
[   58.756082]  kasan_save_track+0x20/0x40
[   58.759979]  kasan_save_alloc_info+0x40/0x58
[   58.764319]  __kasan_kmalloc+0xd4/0xd8
[   58.768128]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.772729]  kasan_atomics+0xb8/0x2e0
[   58.776450]  kunit_try_run_case+0x170/0x3f0
[   58.780703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.786272]  kthread+0x328/0x630
[   58.789557]  ret_from_fork+0x10/0x20
[   58.793193] 
[   58.794717] The buggy address belongs to the object at ffff000080acff00
[   58.794717]  which belongs to the cache kmalloc-64 of size 64
[   58.807196] The buggy address is located 0 bytes to the right of
[   58.807196]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   58.820197] 
[   58.821722] The buggy address belongs to the physical page:
[   58.827367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   58.835475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.842081] page_type: f5(slab)
[   58.845280] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   58.853117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.860948] page dumped because: kasan: bad access detected
[   58.866593] 
[   58.868116] Memory state around the buggy address:
[   58.872971]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.880282]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.887595] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.894906]                                      ^
[   58.899763]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.907073]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   58.914383] ==================================================================
[   67.537390] ==================================================================
[   67.544700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   67.552103] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   67.559592] 
[   67.561117] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   67.561145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.561153] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.561164] Call trace:
[   67.561170]  show_stack+0x20/0x38 (C)
[   67.561187]  dump_stack_lvl+0x8c/0xd0
[   67.561204]  print_report+0x118/0x608
[   67.561223]  kasan_report+0xdc/0x128
[   67.561241]  kasan_check_range+0x100/0x1a8
[   67.561261]  __kasan_check_write+0x20/0x30
[   67.561277]  kasan_atomics_helper+0xeb8/0x4858
[   67.561295]  kasan_atomics+0x198/0x2e0
[   67.561311]  kunit_try_run_case+0x170/0x3f0
[   67.561328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.561348]  kthread+0x328/0x630
[   67.561363]  ret_from_fork+0x10/0x20
[   67.561379] 
[   67.634542] Allocated by task 363:
[   67.637998]  kasan_save_stack+0x3c/0x68
[   67.641895]  kasan_save_track+0x20/0x40
[   67.645792]  kasan_save_alloc_info+0x40/0x58
[   67.650130]  __kasan_kmalloc+0xd4/0xd8
[   67.653938]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.658540]  kasan_atomics+0xb8/0x2e0
[   67.662261]  kunit_try_run_case+0x170/0x3f0
[   67.666514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.672083]  kthread+0x328/0x630
[   67.675369]  ret_from_fork+0x10/0x20
[   67.679003] 
[   67.680526] The buggy address belongs to the object at ffff000080acff00
[   67.680526]  which belongs to the cache kmalloc-64 of size 64
[   67.693003] The buggy address is located 0 bytes to the right of
[   67.693003]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   67.706003] 
[   67.707526] The buggy address belongs to the physical page:
[   67.713171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   67.721280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.727886] page_type: f5(slab)
[   67.731085] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   67.738921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.746754] page dumped because: kasan: bad access detected
[   67.752400] 
[   67.753933] Memory state around the buggy address:
[   67.758788]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.766099]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.773411] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.780721]                                      ^
[   67.785576]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.792887]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.800197] ==================================================================
[   65.389512] ==================================================================
[   65.396822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   65.404226] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   65.411716] 
[   65.413242] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   65.413271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.413278] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.413290] Call trace:
[   65.413296]  show_stack+0x20/0x38 (C)
[   65.413313]  dump_stack_lvl+0x8c/0xd0
[   65.413330]  print_report+0x118/0x608
[   65.413348]  kasan_report+0xdc/0x128
[   65.413366]  kasan_check_range+0x100/0x1a8
[   65.413386]  __kasan_check_write+0x20/0x30
[   65.413401]  kasan_atomics_helper+0xca0/0x4858
[   65.413419]  kasan_atomics+0x198/0x2e0
[   65.413435]  kunit_try_run_case+0x170/0x3f0
[   65.413453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.413475]  kthread+0x328/0x630
[   65.413489]  ret_from_fork+0x10/0x20
[   65.413505] 
[   65.486668] Allocated by task 363:
[   65.490123]  kasan_save_stack+0x3c/0x68
[   65.494021]  kasan_save_track+0x20/0x40
[   65.497918]  kasan_save_alloc_info+0x40/0x58
[   65.502256]  __kasan_kmalloc+0xd4/0xd8
[   65.506065]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.510667]  kasan_atomics+0xb8/0x2e0
[   65.514388]  kunit_try_run_case+0x170/0x3f0
[   65.518640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.524209]  kthread+0x328/0x630
[   65.527495]  ret_from_fork+0x10/0x20
[   65.531129] 
[   65.532652] The buggy address belongs to the object at ffff000080acff00
[   65.532652]  which belongs to the cache kmalloc-64 of size 64
[   65.545128] The buggy address is located 0 bytes to the right of
[   65.545128]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   65.558129] 
[   65.559652] The buggy address belongs to the physical page:
[   65.565297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   65.573403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.580013] page_type: f5(slab)
[   65.583211] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.591047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.598878] page dumped because: kasan: bad access detected
[   65.604523] 
[   65.606045] Memory state around the buggy address:
[   65.610901]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.618211]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.625522] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.632831]                                      ^
[   65.637687]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.644999]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.652308] ==================================================================
[   69.969911] ==================================================================
[   69.977222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   69.984713] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   69.992200] 
[   69.993725] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   69.993754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.993761] Hardware name: Thundercomm Dragonboard 845c (DT)
[   69.993772] Call trace:
[   69.993779]  show_stack+0x20/0x38 (C)
[   69.993796]  dump_stack_lvl+0x8c/0xd0
[   69.993814]  print_report+0x118/0x608
[   69.993832]  kasan_report+0xdc/0x128
[   69.993850]  kasan_check_range+0x100/0x1a8
[   69.993870]  __kasan_check_write+0x20/0x30
[   69.993886]  kasan_atomics_helper+0x126c/0x4858
[   69.993904]  kasan_atomics+0x198/0x2e0
[   69.993920]  kunit_try_run_case+0x170/0x3f0
[   69.993938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.993958]  kthread+0x328/0x630
[   69.993971]  ret_from_fork+0x10/0x20
[   69.993988] 
[   70.067238] Allocated by task 363:
[   70.070693]  kasan_save_stack+0x3c/0x68
[   70.074593]  kasan_save_track+0x20/0x40
[   70.078490]  kasan_save_alloc_info+0x40/0x58
[   70.082830]  __kasan_kmalloc+0xd4/0xd8
[   70.086641]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.091242]  kasan_atomics+0xb8/0x2e0
[   70.094964]  kunit_try_run_case+0x170/0x3f0
[   70.099218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.104787]  kthread+0x328/0x630
[   70.108074]  ret_from_fork+0x10/0x20
[   70.111709] 
[   70.113232] The buggy address belongs to the object at ffff000080acff00
[   70.113232]  which belongs to the cache kmalloc-64 of size 64
[   70.125708] The buggy address is located 0 bytes to the right of
[   70.125708]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   70.138708] 
[   70.140231] The buggy address belongs to the physical page:
[   70.145877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   70.153984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.160590] page_type: f5(slab)
[   70.163788] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   70.171623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.179456] page dumped because: kasan: bad access detected
[   70.185103] 
[   70.186626] Memory state around the buggy address:
[   70.191480]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.198791]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.206102] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.213411]                                      ^
[   70.218267]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.225577]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   70.232887] ==================================================================
[   70.510623] ==================================================================
[   70.517935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   70.525432] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   70.532925] 
[   70.534450] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   70.534479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.534488] Hardware name: Thundercomm Dragonboard 845c (DT)
[   70.534498] Call trace:
[   70.534504]  show_stack+0x20/0x38 (C)
[   70.534521]  dump_stack_lvl+0x8c/0xd0
[   70.534539]  print_report+0x118/0x608
[   70.534557]  kasan_report+0xdc/0x128
[   70.534575]  kasan_check_range+0x100/0x1a8
[   70.534595]  __kasan_check_write+0x20/0x30
[   70.534610]  kasan_atomics_helper+0x1384/0x4858
[   70.534629]  kasan_atomics+0x198/0x2e0
[   70.534646]  kunit_try_run_case+0x170/0x3f0
[   70.534664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.534685]  kthread+0x328/0x630
[   70.534698]  ret_from_fork+0x10/0x20
[   70.534715] 
[   70.607950] Allocated by task 363:
[   70.611406]  kasan_save_stack+0x3c/0x68
[   70.615306]  kasan_save_track+0x20/0x40
[   70.619203]  kasan_save_alloc_info+0x40/0x58
[   70.623541]  __kasan_kmalloc+0xd4/0xd8
[   70.627350]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.631953]  kasan_atomics+0xb8/0x2e0
[   70.635675]  kunit_try_run_case+0x170/0x3f0
[   70.639929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.645497]  kthread+0x328/0x630
[   70.648783]  ret_from_fork+0x10/0x20
[   70.652418] 
[   70.653940] The buggy address belongs to the object at ffff000080acff00
[   70.653940]  which belongs to the cache kmalloc-64 of size 64
[   70.666420] The buggy address is located 0 bytes to the right of
[   70.666420]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   70.679419] 
[   70.680942] The buggy address belongs to the physical page:
[   70.686589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   70.694696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.701305] page_type: f5(slab)
[   70.704504] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   70.712340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.720171] page dumped because: kasan: bad access detected
[   70.725817] 
[   70.727340] Memory state around the buggy address:
[   70.732196]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.739508]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.746820] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.754130]                                      ^
[   70.758986]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.766297]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   70.773607] ==================================================================
[   61.079930] ==================================================================
[   61.087240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   61.094642] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   61.102131] 
[   61.103657] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   61.103687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.103695] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.103705] Call trace:
[   61.103712]  show_stack+0x20/0x38 (C)
[   61.103730]  dump_stack_lvl+0x8c/0xd0
[   61.103748]  print_report+0x118/0x608
[   61.103766]  kasan_report+0xdc/0x128
[   61.103784]  kasan_check_range+0x100/0x1a8
[   61.103803]  __kasan_check_write+0x20/0x30
[   61.103818]  kasan_atomics_helper+0x684/0x4858
[   61.103837]  kasan_atomics+0x198/0x2e0
[   61.103853]  kunit_try_run_case+0x170/0x3f0
[   61.103873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.103893]  kthread+0x328/0x630
[   61.103906]  ret_from_fork+0x10/0x20
[   61.103922] 
[   61.177086] Allocated by task 363:
[   61.180543]  kasan_save_stack+0x3c/0x68
[   61.184443]  kasan_save_track+0x20/0x40
[   61.188341]  kasan_save_alloc_info+0x40/0x58
[   61.192680]  __kasan_kmalloc+0xd4/0xd8
[   61.196489]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.201092]  kasan_atomics+0xb8/0x2e0
[   61.204813]  kunit_try_run_case+0x170/0x3f0
[   61.209067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.214637]  kthread+0x328/0x630
[   61.217923]  ret_from_fork+0x10/0x20
[   61.221558] 
[   61.223081] The buggy address belongs to the object at ffff000080acff00
[   61.223081]  which belongs to the cache kmalloc-64 of size 64
[   61.235559] The buggy address is located 0 bytes to the right of
[   61.235559]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   61.248559] 
[   61.250083] The buggy address belongs to the physical page:
[   61.255729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   61.263836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.270444] page_type: f5(slab)
[   61.273643] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.281479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.289311] page dumped because: kasan: bad access detected
[   61.294957] 
[   61.296479] Memory state around the buggy address:
[   61.301335]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.308647]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.315959] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.323268]                                      ^
[   61.328124]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.335434]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.342744] ==================================================================
[   62.430930] ==================================================================
[   62.438241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   62.445733] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   62.453133] 
[   62.454659] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   62.454688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.454696] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.454707] Call trace:
[   62.454714]  show_stack+0x20/0x38 (C)
[   62.454731]  dump_stack_lvl+0x8c/0xd0
[   62.454749]  print_report+0x118/0x608
[   62.454767]  kasan_report+0xdc/0x128
[   62.454786]  __asan_report_load4_noabort+0x20/0x30
[   62.454804]  kasan_atomics_helper+0x42d8/0x4858
[   62.454822]  kasan_atomics+0x198/0x2e0
[   62.454838]  kunit_try_run_case+0x170/0x3f0
[   62.454858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.454879]  kthread+0x328/0x630
[   62.454893]  ret_from_fork+0x10/0x20
[   62.454911] 
[   62.524708] Allocated by task 363:
[   62.528165]  kasan_save_stack+0x3c/0x68
[   62.532063]  kasan_save_track+0x20/0x40
[   62.535960]  kasan_save_alloc_info+0x40/0x58
[   62.540297]  __kasan_kmalloc+0xd4/0xd8
[   62.544106]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.548708]  kasan_atomics+0xb8/0x2e0
[   62.552429]  kunit_try_run_case+0x170/0x3f0
[   62.556682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.562251]  kthread+0x328/0x630
[   62.565537]  ret_from_fork+0x10/0x20
[   62.569172] 
[   62.570696] The buggy address belongs to the object at ffff000080acff00
[   62.570696]  which belongs to the cache kmalloc-64 of size 64
[   62.583172] The buggy address is located 0 bytes to the right of
[   62.583172]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   62.596174] 
[   62.597698] The buggy address belongs to the physical page:
[   62.603343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   62.611449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.618056] page_type: f5(slab)
[   62.621254] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.629090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.636921] page dumped because: kasan: bad access detected
[   62.642568] 
[   62.644091] Memory state around the buggy address:
[   62.648945]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.656257]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.663568] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.670877]                                      ^
[   62.675732]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.683043]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.690351] ==================================================================
[   65.659681] ==================================================================
[   65.666990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   65.674481] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   65.681882] 
[   65.683407] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   65.683436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.683444] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.683454] Call trace:
[   65.683461]  show_stack+0x20/0x38 (C)
[   65.683479]  dump_stack_lvl+0x8c/0xd0
[   65.683497]  print_report+0x118/0x608
[   65.683515]  kasan_report+0xdc/0x128
[   65.683534]  __asan_report_load4_noabort+0x20/0x30
[   65.683552]  kasan_atomics_helper+0x3dd8/0x4858
[   65.683570]  kasan_atomics+0x198/0x2e0
[   65.683586]  kunit_try_run_case+0x170/0x3f0
[   65.683604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.683624]  kthread+0x328/0x630
[   65.683637]  ret_from_fork+0x10/0x20
[   65.683654] 
[   65.753451] Allocated by task 363:
[   65.756907]  kasan_save_stack+0x3c/0x68
[   65.760807]  kasan_save_track+0x20/0x40
[   65.764703]  kasan_save_alloc_info+0x40/0x58
[   65.769042]  __kasan_kmalloc+0xd4/0xd8
[   65.772851]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.777453]  kasan_atomics+0xb8/0x2e0
[   65.781174]  kunit_try_run_case+0x170/0x3f0
[   65.785428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.790995]  kthread+0x328/0x630
[   65.794282]  ret_from_fork+0x10/0x20
[   65.797917] 
[   65.799440] The buggy address belongs to the object at ffff000080acff00
[   65.799440]  which belongs to the cache kmalloc-64 of size 64
[   65.811920] The buggy address is located 0 bytes to the right of
[   65.811920]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   65.824922] 
[   65.826455] The buggy address belongs to the physical page:
[   65.832101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   65.840209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.846816] page_type: f5(slab)
[   65.850016] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.857852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.865684] page dumped because: kasan: bad access detected
[   65.871330] 
[   65.872853] Memory state around the buggy address:
[   65.877708]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.885020]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.892332] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.899641]                                      ^
[   65.904497]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.911808]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.919119] ==================================================================
[   71.588496] ==================================================================
[   71.595807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   71.603298] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   71.610787] 
[   71.612312] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   71.612341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.612350] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.612361] Call trace:
[   71.612367]  show_stack+0x20/0x38 (C)
[   71.612384]  dump_stack_lvl+0x8c/0xd0
[   71.612401]  print_report+0x118/0x608
[   71.612421]  kasan_report+0xdc/0x128
[   71.612439]  kasan_check_range+0x100/0x1a8
[   71.612459]  __kasan_check_write+0x20/0x30
[   71.612474]  kasan_atomics_helper+0x14e4/0x4858
[   71.612492]  kasan_atomics+0x198/0x2e0
[   71.612510]  kunit_try_run_case+0x170/0x3f0
[   71.612528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.612548]  kthread+0x328/0x630
[   71.612561]  ret_from_fork+0x10/0x20
[   71.612577] 
[   71.685829] Allocated by task 363:
[   71.689285]  kasan_save_stack+0x3c/0x68
[   71.693184]  kasan_save_track+0x20/0x40
[   71.697082]  kasan_save_alloc_info+0x40/0x58
[   71.701419]  __kasan_kmalloc+0xd4/0xd8
[   71.705227]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.709829]  kasan_atomics+0xb8/0x2e0
[   71.713550]  kunit_try_run_case+0x170/0x3f0
[   71.717803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.723372]  kthread+0x328/0x630
[   71.726657]  ret_from_fork+0x10/0x20
[   71.730292] 
[   71.731814] The buggy address belongs to the object at ffff000080acff00
[   71.731814]  which belongs to the cache kmalloc-64 of size 64
[   71.744292] The buggy address is located 0 bytes to the right of
[   71.744292]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   71.757293] 
[   71.758815] The buggy address belongs to the physical page:
[   71.764461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   71.772567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.779173] page_type: f5(slab)
[   71.782375] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   71.790212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.798043] page dumped because: kasan: bad access detected
[   71.803690] 
[   71.805213] Memory state around the buggy address:
[   71.810068]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.817382]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.824693] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.832002]                                      ^
[   71.836859]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.844170]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   71.851479] ==================================================================
[   71.318140] ==================================================================
[   71.325452] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   71.332944] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   71.340432] 
[   71.341957] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   71.341986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.341994] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.342005] Call trace:
[   71.342011]  show_stack+0x20/0x38 (C)
[   71.342027]  dump_stack_lvl+0x8c/0xd0
[   71.342046]  print_report+0x118/0x608
[   71.342066]  kasan_report+0xdc/0x128
[   71.342085]  kasan_check_range+0x100/0x1a8
[   71.342104]  __kasan_check_write+0x20/0x30
[   71.342119]  kasan_atomics_helper+0x147c/0x4858
[   71.342138]  kasan_atomics+0x198/0x2e0
[   71.342154]  kunit_try_run_case+0x170/0x3f0
[   71.342172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.342192]  kthread+0x328/0x630
[   71.342207]  ret_from_fork+0x10/0x20
[   71.342223] 
[   71.415474] Allocated by task 363:
[   71.418930]  kasan_save_stack+0x3c/0x68
[   71.422830]  kasan_save_track+0x20/0x40
[   71.426727]  kasan_save_alloc_info+0x40/0x58
[   71.431065]  __kasan_kmalloc+0xd4/0xd8
[   71.434873]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.439474]  kasan_atomics+0xb8/0x2e0
[   71.443196]  kunit_try_run_case+0x170/0x3f0
[   71.447449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.453018]  kthread+0x328/0x630
[   71.456305]  ret_from_fork+0x10/0x20
[   71.459939] 
[   71.461462] The buggy address belongs to the object at ffff000080acff00
[   71.461462]  which belongs to the cache kmalloc-64 of size 64
[   71.473942] The buggy address is located 0 bytes to the right of
[   71.473942]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   71.486941] 
[   71.488464] The buggy address belongs to the physical page:
[   71.494109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   71.502214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.508822] page_type: f5(slab)
[   71.512021] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   71.519858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.527690] page dumped because: kasan: bad access detected
[   71.533335] 
[   71.534857] Memory state around the buggy address:
[   71.539712]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.547024]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.554335] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.561644]                                      ^
[   71.566500]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.573811]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   71.581121] ==================================================================
[   69.158763] ==================================================================
[   69.166074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   69.173566] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   69.181055] 
[   69.182580] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   69.182609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.182616] Hardware name: Thundercomm Dragonboard 845c (DT)
[   69.182627] Call trace:
[   69.182633]  show_stack+0x20/0x38 (C)
[   69.182650]  dump_stack_lvl+0x8c/0xd0
[   69.182667]  print_report+0x118/0x608
[   69.182685]  kasan_report+0xdc/0x128
[   69.182703]  kasan_check_range+0x100/0x1a8
[   69.182724]  __kasan_check_write+0x20/0x30
[   69.182739]  kasan_atomics_helper+0x1128/0x4858
[   69.182759]  kasan_atomics+0x198/0x2e0
[   69.182776]  kunit_try_run_case+0x170/0x3f0
[   69.182793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.182814]  kthread+0x328/0x630
[   69.182829]  ret_from_fork+0x10/0x20
[   69.182845] 
[   69.256097] Allocated by task 363:
[   69.259553]  kasan_save_stack+0x3c/0x68
[   69.263451]  kasan_save_track+0x20/0x40
[   69.267350]  kasan_save_alloc_info+0x40/0x58
[   69.271689]  __kasan_kmalloc+0xd4/0xd8
[   69.275498]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.280098]  kasan_atomics+0xb8/0x2e0
[   69.283820]  kunit_try_run_case+0x170/0x3f0
[   69.288074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.293642]  kthread+0x328/0x630
[   69.296928]  ret_from_fork+0x10/0x20
[   69.300562] 
[   69.302085] The buggy address belongs to the object at ffff000080acff00
[   69.302085]  which belongs to the cache kmalloc-64 of size 64
[   69.314568] The buggy address is located 0 bytes to the right of
[   69.314568]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   69.327577] 
[   69.329103] The buggy address belongs to the physical page:
[   69.334750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   69.342860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.349469] page_type: f5(slab)
[   69.352669] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.360508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.368341] page dumped because: kasan: bad access detected
[   69.373987] 
[   69.375511] Memory state around the buggy address:
[   69.380367]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.387678]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.394989] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.402298]                                      ^
[   69.407155]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.414466]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   69.421776] ==================================================================
[   59.188727] ==================================================================
[   59.196037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   59.203440] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   59.210929] 
[   59.212454] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   59.212484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.212491] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.212501] Call trace:
[   59.212506]  show_stack+0x20/0x38 (C)
[   59.212523]  dump_stack_lvl+0x8c/0xd0
[   59.212541]  print_report+0x118/0x608
[   59.212559]  kasan_report+0xdc/0x128
[   59.212577]  kasan_check_range+0x100/0x1a8
[   59.212596]  __kasan_check_write+0x20/0x30
[   59.212613]  kasan_atomics_helper+0x3ac/0x4858
[   59.212633]  kasan_atomics+0x198/0x2e0
[   59.212650]  kunit_try_run_case+0x170/0x3f0
[   59.212667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.212688]  kthread+0x328/0x630
[   59.212701]  ret_from_fork+0x10/0x20
[   59.212719] 
[   59.285883] Allocated by task 363:
[   59.289338]  kasan_save_stack+0x3c/0x68
[   59.293237]  kasan_save_track+0x20/0x40
[   59.297135]  kasan_save_alloc_info+0x40/0x58
[   59.301473]  __kasan_kmalloc+0xd4/0xd8
[   59.305283]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.309884]  kasan_atomics+0xb8/0x2e0
[   59.313605]  kunit_try_run_case+0x170/0x3f0
[   59.317859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.323428]  kthread+0x328/0x630
[   59.326713]  ret_from_fork+0x10/0x20
[   59.330348] 
[   59.331870] The buggy address belongs to the object at ffff000080acff00
[   59.331870]  which belongs to the cache kmalloc-64 of size 64
[   59.344345] The buggy address is located 0 bytes to the right of
[   59.344345]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   59.357353] 
[   59.358876] The buggy address belongs to the physical page:
[   59.364522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   59.372629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.379236] page_type: f5(slab)
[   59.382434] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.390271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.398103] page dumped because: kasan: bad access detected
[   59.403749] 
[   59.405272] Memory state around the buggy address:
[   59.410127]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.417440]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.424751] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.432060]                                      ^
[   59.436916]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.444226]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   59.451535] ==================================================================
[   73.740641] ==================================================================
[   73.747952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   73.755441] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   73.762929] 
[   73.764453] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   73.764481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.764489] Hardware name: Thundercomm Dragonboard 845c (DT)
[   73.764498] Call trace:
[   73.764504]  show_stack+0x20/0x38 (C)
[   73.764521]  dump_stack_lvl+0x8c/0xd0
[   73.764538]  print_report+0x118/0x608
[   73.764556]  kasan_report+0xdc/0x128
[   73.764574]  kasan_check_range+0x100/0x1a8
[   73.764593]  __kasan_check_write+0x20/0x30
[   73.764608]  kasan_atomics_helper+0x175c/0x4858
[   73.764626]  kasan_atomics+0x198/0x2e0
[   73.764643]  kunit_try_run_case+0x170/0x3f0
[   73.764661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.764681]  kthread+0x328/0x630
[   73.764694]  ret_from_fork+0x10/0x20
[   73.764710] 
[   73.837961] Allocated by task 363:
[   73.841416]  kasan_save_stack+0x3c/0x68
[   73.845314]  kasan_save_track+0x20/0x40
[   73.849211]  kasan_save_alloc_info+0x40/0x58
[   73.853549]  __kasan_kmalloc+0xd4/0xd8
[   73.857358]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.861959]  kasan_atomics+0xb8/0x2e0
[   73.865680]  kunit_try_run_case+0x170/0x3f0
[   73.869932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.875499]  kthread+0x328/0x630
[   73.878785]  ret_from_fork+0x10/0x20
[   73.882419] 
[   73.883941] The buggy address belongs to the object at ffff000080acff00
[   73.883941]  which belongs to the cache kmalloc-64 of size 64
[   73.896418] The buggy address is located 0 bytes to the right of
[   73.896418]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   73.909417] 
[   73.910941] The buggy address belongs to the physical page:
[   73.916587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   73.924692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.931299] page_type: f5(slab)
[   73.934498] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.942333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.950163] page dumped because: kasan: bad access detected
[   73.955808] 
[   73.957331] Memory state around the buggy address:
[   73.962184]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.969495]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.976806] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.984115]                                      ^
[   73.988970]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.996280]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.003589] ==================================================================
[   59.729090] ==================================================================
[   59.736400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   59.743805] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   59.751293] 
[   59.752818] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   59.752847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.752854] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.752866] Call trace:
[   59.752872]  show_stack+0x20/0x38 (C)
[   59.752889]  dump_stack_lvl+0x8c/0xd0
[   59.752908]  print_report+0x118/0x608
[   59.752925]  kasan_report+0xdc/0x128
[   59.752944]  kasan_check_range+0x100/0x1a8
[   59.752962]  __kasan_check_write+0x20/0x30
[   59.752977]  kasan_atomics_helper+0x47c/0x4858
[   59.752997]  kasan_atomics+0x198/0x2e0
[   59.753014]  kunit_try_run_case+0x170/0x3f0
[   59.753031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.753051]  kthread+0x328/0x630
[   59.753065]  ret_from_fork+0x10/0x20
[   59.753081] 
[   59.826236] Allocated by task 363:
[   59.829692]  kasan_save_stack+0x3c/0x68
[   59.833589]  kasan_save_track+0x20/0x40
[   59.837486]  kasan_save_alloc_info+0x40/0x58
[   59.841823]  __kasan_kmalloc+0xd4/0xd8
[   59.845632]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.850235]  kasan_atomics+0xb8/0x2e0
[   59.853957]  kunit_try_run_case+0x170/0x3f0
[   59.858210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.863778]  kthread+0x328/0x630
[   59.867064]  ret_from_fork+0x10/0x20
[   59.870699] 
[   59.872222] The buggy address belongs to the object at ffff000080acff00
[   59.872222]  which belongs to the cache kmalloc-64 of size 64
[   59.884698] The buggy address is located 0 bytes to the right of
[   59.884698]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   59.897699] 
[   59.899223] The buggy address belongs to the physical page:
[   59.904869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   59.912975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.919582] page_type: f5(slab)
[   59.922780] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.930616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.938449] page dumped because: kasan: bad access detected
[   59.944094] 
[   59.945618] Memory state around the buggy address:
[   59.950473]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.957784]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.965095] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.972404]                                      ^
[   59.977259]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.984572]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   59.991882] ==================================================================
[   57.306328] ==================================================================
[   57.313644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   57.321138] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   57.328637] 
[   57.330171] CPU: 3 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   57.330201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.330212] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.330224] Call trace:
[   57.330231]  show_stack+0x20/0x38 (C)
[   57.330251]  dump_stack_lvl+0x8c/0xd0
[   57.330272]  print_report+0x118/0x608
[   57.330293]  kasan_report+0xdc/0x128
[   57.330313]  __asan_report_store4_noabort+0x20/0x30
[   57.330333]  kasan_atomics_helper+0x3f7c/0x4858
[   57.330355]  kasan_atomics+0x198/0x2e0
[   57.330375]  kunit_try_run_case+0x170/0x3f0
[   57.330396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.330419]  kthread+0x328/0x630
[   57.330435]  ret_from_fork+0x10/0x20
[   57.330454] 
[   57.400377] Allocated by task 363:
[   57.403838]  kasan_save_stack+0x3c/0x68
[   57.407752]  kasan_save_track+0x20/0x40
[   57.411654]  kasan_save_alloc_info+0x40/0x58
[   57.415993]  __kasan_kmalloc+0xd4/0xd8
[   57.419807]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.424410]  kasan_atomics+0xb8/0x2e0
[   57.428145]  kunit_try_run_case+0x170/0x3f0
[   57.432400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.437976]  kthread+0x328/0x630
[   57.441269]  ret_from_fork+0x10/0x20
[   57.444910] 
[   57.446441] The buggy address belongs to the object at ffff000080acff00
[   57.446441]  which belongs to the cache kmalloc-64 of size 64
[   57.458926] The buggy address is located 0 bytes to the right of
[   57.458926]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   57.471938] 
[   57.473470] The buggy address belongs to the physical page:
[   57.479120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   57.487227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.493844] page_type: f5(slab)
[   57.497049] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   57.504899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.512745] page dumped because: kasan: bad access detected
[   57.518396] 
[   57.519933] Memory state around the buggy address:
[   57.524797]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.532122]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.539442] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.546757]                                      ^
[   57.551621]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.558938]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   57.566254] ==================================================================
[   70.240251] ==================================================================
[   70.247562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   70.255056] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   70.262545] 
[   70.264071] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   70.264101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.264110] Hardware name: Thundercomm Dragonboard 845c (DT)
[   70.264121] Call trace:
[   70.264128]  show_stack+0x20/0x38 (C)
[   70.264145]  dump_stack_lvl+0x8c/0xd0
[   70.264162]  print_report+0x118/0x608
[   70.264180]  kasan_report+0xdc/0x128
[   70.264198]  kasan_check_range+0x100/0x1a8
[   70.264217]  __kasan_check_write+0x20/0x30
[   70.264233]  kasan_atomics_helper+0x12d8/0x4858
[   70.264253]  kasan_atomics+0x198/0x2e0
[   70.264269]  kunit_try_run_case+0x170/0x3f0
[   70.264287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.264307]  kthread+0x328/0x630
[   70.264321]  ret_from_fork+0x10/0x20
[   70.264339] 
[   70.337592] Allocated by task 363:
[   70.341048]  kasan_save_stack+0x3c/0x68
[   70.344946]  kasan_save_track+0x20/0x40
[   70.348845]  kasan_save_alloc_info+0x40/0x58
[   70.353182]  __kasan_kmalloc+0xd4/0xd8
[   70.356992]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.361594]  kasan_atomics+0xb8/0x2e0
[   70.365315]  kunit_try_run_case+0x170/0x3f0
[   70.369568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.375138]  kthread+0x328/0x630
[   70.378423]  ret_from_fork+0x10/0x20
[   70.382058] 
[   70.383581] The buggy address belongs to the object at ffff000080acff00
[   70.383581]  which belongs to the cache kmalloc-64 of size 64
[   70.396058] The buggy address is located 0 bytes to the right of
[   70.396058]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   70.409060] 
[   70.410584] The buggy address belongs to the physical page:
[   70.416230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   70.424338] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.430944] page_type: f5(slab)
[   70.434144] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   70.441980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.449812] page dumped because: kasan: bad access detected
[   70.455459] 
[   70.456981] Memory state around the buggy address:
[   70.461836]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.469148]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.476462] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.483771]                                      ^
[   70.488628]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.495938]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   70.503249] ==================================================================
[   62.967904] ==================================================================
[   62.975214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   62.982618] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   62.990106] 
[   62.991631] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   62.991661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.991669] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.991678] Call trace:
[   62.991684]  show_stack+0x20/0x38 (C)
[   62.991701]  dump_stack_lvl+0x8c/0xd0
[   62.991718]  print_report+0x118/0x608
[   62.991736]  kasan_report+0xdc/0x128
[   62.991754]  kasan_check_range+0x100/0x1a8
[   62.991774]  __kasan_check_write+0x20/0x30
[   62.991789]  kasan_atomics_helper+0x99c/0x4858
[   62.991808]  kasan_atomics+0x198/0x2e0
[   62.991824]  kunit_try_run_case+0x170/0x3f0
[   62.991842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.991863]  kthread+0x328/0x630
[   62.991876]  ret_from_fork+0x10/0x20
[   62.991892] 
[   63.065055] Allocated by task 363:
[   63.068510]  kasan_save_stack+0x3c/0x68
[   63.072408]  kasan_save_track+0x20/0x40
[   63.076305]  kasan_save_alloc_info+0x40/0x58
[   63.080642]  __kasan_kmalloc+0xd4/0xd8
[   63.084453]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.089055]  kasan_atomics+0xb8/0x2e0
[   63.092776]  kunit_try_run_case+0x170/0x3f0
[   63.097029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.102600]  kthread+0x328/0x630
[   63.105885]  ret_from_fork+0x10/0x20
[   63.109522] 
[   63.111045] The buggy address belongs to the object at ffff000080acff00
[   63.111045]  which belongs to the cache kmalloc-64 of size 64
[   63.123524] The buggy address is located 0 bytes to the right of
[   63.123524]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   63.136527] 
[   63.138050] The buggy address belongs to the physical page:
[   63.143697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   63.151804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.158411] page_type: f5(slab)
[   63.161611] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   63.169446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.177279] page dumped because: kasan: bad access detected
[   63.182926] 
[   63.184450] Memory state around the buggy address:
[   63.189306]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.196617]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.203929] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.211239]                                      ^
[   63.216094]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.223407]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.230717] ==================================================================
[   67.807572] ==================================================================
[   67.814880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   67.822284] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   67.829771] 
[   67.831296] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   67.831324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.831332] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.831342] Call trace:
[   67.831349]  show_stack+0x20/0x38 (C)
[   67.831366]  dump_stack_lvl+0x8c/0xd0
[   67.831383]  print_report+0x118/0x608
[   67.831402]  kasan_report+0xdc/0x128
[   67.831419]  kasan_check_range+0x100/0x1a8
[   67.831439]  __kasan_check_write+0x20/0x30
[   67.831454]  kasan_atomics_helper+0xf20/0x4858
[   67.831472]  kasan_atomics+0x198/0x2e0
[   67.831489]  kunit_try_run_case+0x170/0x3f0
[   67.831507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.831527]  kthread+0x328/0x630
[   67.831540]  ret_from_fork+0x10/0x20
[   67.831557] 
[   67.904722] Allocated by task 363:
[   67.908177]  kasan_save_stack+0x3c/0x68
[   67.912076]  kasan_save_track+0x20/0x40
[   67.915974]  kasan_save_alloc_info+0x40/0x58
[   67.920311]  __kasan_kmalloc+0xd4/0xd8
[   67.924120]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.928722]  kasan_atomics+0xb8/0x2e0
[   67.932443]  kunit_try_run_case+0x170/0x3f0
[   67.936695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.942263]  kthread+0x328/0x630
[   67.945548]  ret_from_fork+0x10/0x20
[   67.949184] 
[   67.950706] The buggy address belongs to the object at ffff000080acff00
[   67.950706]  which belongs to the cache kmalloc-64 of size 64
[   67.963183] The buggy address is located 0 bytes to the right of
[   67.963183]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   67.976183] 
[   67.977705] The buggy address belongs to the physical page:
[   67.983350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   67.991456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.998063] page_type: f5(slab)
[   68.001263] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.009098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.016930] page dumped because: kasan: bad access detected
[   68.022577] 
[   68.024098] Memory state around the buggy address:
[   68.028953]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.036265]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.043575] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.050884]                                      ^
[   68.055740]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.063051]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   68.070361] ==================================================================
[   66.733431] ==================================================================
[   66.740740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   66.748230] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   66.755632] 
[   66.757157] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   66.757186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.757194] Hardware name: Thundercomm Dragonboard 845c (DT)
[   66.757207] Call trace:
[   66.757214]  show_stack+0x20/0x38 (C)
[   66.757231]  dump_stack_lvl+0x8c/0xd0
[   66.757249]  print_report+0x118/0x608
[   66.757268]  kasan_report+0xdc/0x128
[   66.757286]  __asan_report_load8_noabort+0x20/0x30
[   66.757304]  kasan_atomics_helper+0x3f58/0x4858
[   66.757323]  kasan_atomics+0x198/0x2e0
[   66.757339]  kunit_try_run_case+0x170/0x3f0
[   66.757357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.757377]  kthread+0x328/0x630
[   66.757390]  ret_from_fork+0x10/0x20
[   66.757408] 
[   66.827207] Allocated by task 363:
[   66.830662]  kasan_save_stack+0x3c/0x68
[   66.834560]  kasan_save_track+0x20/0x40
[   66.838458]  kasan_save_alloc_info+0x40/0x58
[   66.842798]  __kasan_kmalloc+0xd4/0xd8
[   66.846608]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.851209]  kasan_atomics+0xb8/0x2e0
[   66.854931]  kunit_try_run_case+0x170/0x3f0
[   66.859184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.864753]  kthread+0x328/0x630
[   66.868038]  ret_from_fork+0x10/0x20
[   66.871674] 
[   66.873197] The buggy address belongs to the object at ffff000080acff00
[   66.873197]  which belongs to the cache kmalloc-64 of size 64
[   66.885676] The buggy address is located 0 bytes to the right of
[   66.885676]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   66.898677] 
[   66.900201] The buggy address belongs to the physical page:
[   66.905846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   66.913954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.920562] page_type: f5(slab)
[   66.923762] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.931599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.939432] page dumped because: kasan: bad access detected
[   66.945079] 
[   66.946603] Memory state around the buggy address:
[   66.951458]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.958770]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.966083] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.973392]                                      ^
[   66.978249]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.985560]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.992870] ==================================================================
[   64.585765] ==================================================================
[   64.593075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   64.600566] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   64.607968] 
[   64.609494] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   64.609523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.609532] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.609542] Call trace:
[   64.609548]  show_stack+0x20/0x38 (C)
[   64.609565]  dump_stack_lvl+0x8c/0xd0
[   64.609583]  print_report+0x118/0x608
[   64.609602]  kasan_report+0xdc/0x128
[   64.609621]  __asan_report_load4_noabort+0x20/0x30
[   64.609637]  kasan_atomics_helper+0x3dbc/0x4858
[   64.609655]  kasan_atomics+0x198/0x2e0
[   64.609672]  kunit_try_run_case+0x170/0x3f0
[   64.609689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.609710]  kthread+0x328/0x630
[   64.609724]  ret_from_fork+0x10/0x20
[   64.609742] 
[   64.679539] Allocated by task 363:
[   64.682995]  kasan_save_stack+0x3c/0x68
[   64.686894]  kasan_save_track+0x20/0x40
[   64.690792]  kasan_save_alloc_info+0x40/0x58
[   64.695130]  __kasan_kmalloc+0xd4/0xd8
[   64.698941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.703542]  kasan_atomics+0xb8/0x2e0
[   64.707264]  kunit_try_run_case+0x170/0x3f0
[   64.711517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.717086]  kthread+0x328/0x630
[   64.720373]  ret_from_fork+0x10/0x20
[   64.724008] 
[   64.725531] The buggy address belongs to the object at ffff000080acff00
[   64.725531]  which belongs to the cache kmalloc-64 of size 64
[   64.738008] The buggy address is located 0 bytes to the right of
[   64.738008]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   64.751012] 
[   64.752535] The buggy address belongs to the physical page:
[   64.758180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   64.766287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.772894] page_type: f5(slab)
[   64.776093] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   64.783928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.791760] page dumped because: kasan: bad access detected
[   64.797406] 
[   64.798929] Memory state around the buggy address:
[   64.803785]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.811097]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.818409] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.825720]                                      ^
[   64.830577]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.837890]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.845200] ==================================================================
[   61.890507] ==================================================================
[   61.897816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   61.905220] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   61.912708] 
[   61.914233] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   61.914262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.914271] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.914283] Call trace:
[   61.914290]  show_stack+0x20/0x38 (C)
[   61.914307]  dump_stack_lvl+0x8c/0xd0
[   61.914325]  print_report+0x118/0x608
[   61.914344]  kasan_report+0xdc/0x128
[   61.914363]  kasan_check_range+0x100/0x1a8
[   61.914383]  __kasan_check_write+0x20/0x30
[   61.914400]  kasan_atomics_helper+0x7cc/0x4858
[   61.914419]  kasan_atomics+0x198/0x2e0
[   61.914435]  kunit_try_run_case+0x170/0x3f0
[   61.914453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.914476]  kthread+0x328/0x630
[   61.914489]  ret_from_fork+0x10/0x20
[   61.914506] 
[   61.987669] Allocated by task 363:
[   61.991125]  kasan_save_stack+0x3c/0x68
[   61.995024]  kasan_save_track+0x20/0x40
[   61.998922]  kasan_save_alloc_info+0x40/0x58
[   62.003261]  __kasan_kmalloc+0xd4/0xd8
[   62.007072]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.011673]  kasan_atomics+0xb8/0x2e0
[   62.015395]  kunit_try_run_case+0x170/0x3f0
[   62.019650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.025219]  kthread+0x328/0x630
[   62.028505]  ret_from_fork+0x10/0x20
[   62.032139] 
[   62.033662] The buggy address belongs to the object at ffff000080acff00
[   62.033662]  which belongs to the cache kmalloc-64 of size 64
[   62.046142] The buggy address is located 0 bytes to the right of
[   62.046142]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   62.059144] 
[   62.060668] The buggy address belongs to the physical page:
[   62.066315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   62.074421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.081029] page_type: f5(slab)
[   62.084228] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.092065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.099898] page dumped because: kasan: bad access detected
[   62.105544] 
[   62.107066] Memory state around the buggy address:
[   62.111922]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.119234]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.126546] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.133857]                                      ^
[   62.138712]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.146024]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.153334] ==================================================================
[   60.269425] ==================================================================
[   60.276734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   60.284139] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   60.291627] 
[   60.293153] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   60.293180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.293188] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.293197] Call trace:
[   60.293203]  show_stack+0x20/0x38 (C)
[   60.293220]  dump_stack_lvl+0x8c/0xd0
[   60.293237]  print_report+0x118/0x608
[   60.293256]  kasan_report+0xdc/0x128
[   60.293273]  kasan_check_range+0x100/0x1a8
[   60.293293]  __kasan_check_write+0x20/0x30
[   60.293308]  kasan_atomics_helper+0x54c/0x4858
[   60.293327]  kasan_atomics+0x198/0x2e0
[   60.293344]  kunit_try_run_case+0x170/0x3f0
[   60.293361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.293382]  kthread+0x328/0x630
[   60.293396]  ret_from_fork+0x10/0x20
[   60.293412] 
[   60.366577] Allocated by task 363:
[   60.370033]  kasan_save_stack+0x3c/0x68
[   60.373931]  kasan_save_track+0x20/0x40
[   60.377829]  kasan_save_alloc_info+0x40/0x58
[   60.382166]  __kasan_kmalloc+0xd4/0xd8
[   60.385974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.390575]  kasan_atomics+0xb8/0x2e0
[   60.394297]  kunit_try_run_case+0x170/0x3f0
[   60.398550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.404119]  kthread+0x328/0x630
[   60.407405]  ret_from_fork+0x10/0x20
[   60.411039] 
[   60.412563] The buggy address belongs to the object at ffff000080acff00
[   60.412563]  which belongs to the cache kmalloc-64 of size 64
[   60.425041] The buggy address is located 0 bytes to the right of
[   60.425041]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   60.438041] 
[   60.439564] The buggy address belongs to the physical page:
[   60.445210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   60.453316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.459923] page_type: f5(slab)
[   60.463122] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   60.470959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.478792] page dumped because: kasan: bad access detected
[   60.484438] 
[   60.485960] Memory state around the buggy address:
[   60.490816]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.498126]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.505436] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.512745]                                      ^
[   60.517601]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.524912]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   60.532222] ==================================================================
[   69.429164] ==================================================================
[   69.436475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   69.443968] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   69.451459] 
[   69.452984] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   69.453015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.453023] Hardware name: Thundercomm Dragonboard 845c (DT)
[   69.453036] Call trace:
[   69.453043]  show_stack+0x20/0x38 (C)
[   69.453061]  dump_stack_lvl+0x8c/0xd0
[   69.453080]  print_report+0x118/0x608
[   69.453099]  kasan_report+0xdc/0x128
[   69.453118]  kasan_check_range+0x100/0x1a8
[   69.453139]  __kasan_check_write+0x20/0x30
[   69.453155]  kasan_atomics_helper+0x1190/0x4858
[   69.453173]  kasan_atomics+0x198/0x2e0
[   69.453190]  kunit_try_run_case+0x170/0x3f0
[   69.453209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.453232]  kthread+0x328/0x630
[   69.453245]  ret_from_fork+0x10/0x20
[   69.453263] 
[   69.526506] Allocated by task 363:
[   69.529963]  kasan_save_stack+0x3c/0x68
[   69.533865]  kasan_save_track+0x20/0x40
[   69.537763]  kasan_save_alloc_info+0x40/0x58
[   69.542103]  __kasan_kmalloc+0xd4/0xd8
[   69.545913]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.550515]  kasan_atomics+0xb8/0x2e0
[   69.554237]  kunit_try_run_case+0x170/0x3f0
[   69.558490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.564059]  kthread+0x328/0x630
[   69.567345]  ret_from_fork+0x10/0x20
[   69.570980] 
[   69.572504] The buggy address belongs to the object at ffff000080acff00
[   69.572504]  which belongs to the cache kmalloc-64 of size 64
[   69.584983] The buggy address is located 0 bytes to the right of
[   69.584983]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   69.597985] 
[   69.599508] The buggy address belongs to the physical page:
[   69.605155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   69.613263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.619871] page_type: f5(slab)
[   69.623070] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.630906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.638739] page dumped because: kasan: bad access detected
[   69.644385] 
[   69.645909] Memory state around the buggy address:
[   69.650764]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.658076]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.665389] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.672698]                                      ^
[   69.677554]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.684865]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   69.692175] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   56.742582] ==================================================================
[   56.749893] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   56.758958] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   56.766361] 
[   56.767887] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   56.767917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.767924] Hardware name: Thundercomm Dragonboard 845c (DT)
[   56.767936] Call trace:
[   56.767943]  show_stack+0x20/0x38 (C)
[   56.767961]  dump_stack_lvl+0x8c/0xd0
[   56.767978]  print_report+0x118/0x608
[   56.767997]  kasan_report+0xdc/0x128
[   56.768016]  __asan_report_load8_noabort+0x20/0x30
[   56.768032]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   56.768053]  kasan_bitops_generic+0x11c/0x1c8
[   56.768072]  kunit_try_run_case+0x170/0x3f0
[   56.768090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.768113]  kthread+0x328/0x630
[   56.768127]  ret_from_fork+0x10/0x20
[   56.768144] 
[   56.840129] Allocated by task 359:
[   56.843585]  kasan_save_stack+0x3c/0x68
[   56.847483]  kasan_save_track+0x20/0x40
[   56.851379]  kasan_save_alloc_info+0x40/0x58
[   56.855718]  __kasan_kmalloc+0xd4/0xd8
[   56.859527]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.864128]  kasan_bitops_generic+0xa0/0x1c8
[   56.868469]  kunit_try_run_case+0x170/0x3f0
[   56.872724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.878292]  kthread+0x328/0x630
[   56.881577]  ret_from_fork+0x10/0x20
[   56.885211] 
[   56.886735] The buggy address belongs to the object at ffff000080b08100
[   56.886735]  which belongs to the cache kmalloc-16 of size 16
[   56.899213] The buggy address is located 8 bytes inside of
[   56.899213]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   56.911607] 
[   56.913131] The buggy address belongs to the physical page:
[   56.918776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   56.926881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.933489] page_type: f5(slab)
[   56.936688] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   56.944523] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   56.952356] page dumped because: kasan: bad access detected
[   56.958001] 
[   56.959525] Memory state around the buggy address:
[   56.964381]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   56.971692]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   56.979004] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.986313]                       ^
[   56.989855]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.997167]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.004477] ==================================================================
[   54.847139] ==================================================================
[   54.854449] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   54.863514] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   54.870915] 
[   54.872440] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   54.872468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.872476] Hardware name: Thundercomm Dragonboard 845c (DT)
[   54.872485] Call trace:
[   54.872491]  show_stack+0x20/0x38 (C)
[   54.872508]  dump_stack_lvl+0x8c/0xd0
[   54.872525]  print_report+0x118/0x608
[   54.872543]  kasan_report+0xdc/0x128
[   54.872561]  __asan_report_load8_noabort+0x20/0x30
[   54.872578]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   54.872599]  kasan_bitops_generic+0x11c/0x1c8
[   54.872616]  kunit_try_run_case+0x170/0x3f0
[   54.872634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.872653]  kthread+0x328/0x630
[   54.872667]  ret_from_fork+0x10/0x20
[   54.872684] 
[   54.944671] Allocated by task 359:
[   54.948126]  kasan_save_stack+0x3c/0x68
[   54.952025]  kasan_save_track+0x20/0x40
[   54.955922]  kasan_save_alloc_info+0x40/0x58
[   54.960260]  __kasan_kmalloc+0xd4/0xd8
[   54.964068]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.968671]  kasan_bitops_generic+0xa0/0x1c8
[   54.973011]  kunit_try_run_case+0x170/0x3f0
[   54.977263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.982833]  kthread+0x328/0x630
[   54.986118]  ret_from_fork+0x10/0x20
[   54.989754] 
[   54.991277] The buggy address belongs to the object at ffff000080b08100
[   54.991277]  which belongs to the cache kmalloc-16 of size 16
[   55.003754] The buggy address is located 8 bytes inside of
[   55.003754]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   55.016149] 
[   55.017672] The buggy address belongs to the physical page:
[   55.023317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   55.031422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.038029] page_type: f5(slab)
[   55.041228] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   55.049065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   55.056896] page dumped because: kasan: bad access detected
[   55.062542] 
[   55.064066] Memory state around the buggy address:
[   55.068921]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   55.076232]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   55.083545] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.090855]                       ^
[   55.094398]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.101710]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.109018] ==================================================================
[   55.116380] ==================================================================
[   55.123692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   55.132758] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   55.140249] 
[   55.141775] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   55.141804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.141813] Hardware name: Thundercomm Dragonboard 845c (DT)
[   55.141822] Call trace:
[   55.141829]  show_stack+0x20/0x38 (C)
[   55.141846]  dump_stack_lvl+0x8c/0xd0
[   55.141863]  print_report+0x118/0x608
[   55.141882]  kasan_report+0xdc/0x128
[   55.141900]  kasan_check_range+0x100/0x1a8
[   55.141919]  __kasan_check_write+0x20/0x30
[   55.141934]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   55.141956]  kasan_bitops_generic+0x11c/0x1c8
[   55.141973]  kunit_try_run_case+0x170/0x3f0
[   55.141990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.142011]  kthread+0x328/0x630
[   55.142024]  ret_from_fork+0x10/0x20
[   55.142041] 
[   55.217482] Allocated by task 359:
[   55.220938]  kasan_save_stack+0x3c/0x68
[   55.224838]  kasan_save_track+0x20/0x40
[   55.228734]  kasan_save_alloc_info+0x40/0x58
[   55.233074]  __kasan_kmalloc+0xd4/0xd8
[   55.236882]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.241484]  kasan_bitops_generic+0xa0/0x1c8
[   55.245824]  kunit_try_run_case+0x170/0x3f0
[   55.250077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.255646]  kthread+0x328/0x630
[   55.258932]  ret_from_fork+0x10/0x20
[   55.262566] 
[   55.264089] The buggy address belongs to the object at ffff000080b08100
[   55.264089]  which belongs to the cache kmalloc-16 of size 16
[   55.276566] The buggy address is located 8 bytes inside of
[   55.276566]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   55.288959] 
[   55.290483] The buggy address belongs to the physical page:
[   55.296128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   55.304235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.310841] page_type: f5(slab)
[   55.314040] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   55.321875] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   55.329706] page dumped because: kasan: bad access detected
[   55.335352] 
[   55.336875] Memory state around the buggy address:
[   55.341731]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   55.349042]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   55.356353] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.363662]                       ^
[   55.367205]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.374515]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.381824] ==================================================================
[   55.389199] ==================================================================
[   55.396508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   55.405573] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   55.412973] 
[   55.414500] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   55.414530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.414537] Hardware name: Thundercomm Dragonboard 845c (DT)
[   55.414548] Call trace:
[   55.414554]  show_stack+0x20/0x38 (C)
[   55.414572]  dump_stack_lvl+0x8c/0xd0
[   55.414591]  print_report+0x118/0x608
[   55.414609]  kasan_report+0xdc/0x128
[   55.414627]  __asan_report_load8_noabort+0x20/0x30
[   55.414644]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   55.414665]  kasan_bitops_generic+0x11c/0x1c8
[   55.414683]  kunit_try_run_case+0x170/0x3f0
[   55.414702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.414724]  kthread+0x328/0x630
[   55.414737]  ret_from_fork+0x10/0x20
[   55.414754] 
[   55.486741] Allocated by task 359:
[   55.490197]  kasan_save_stack+0x3c/0x68
[   55.494096]  kasan_save_track+0x20/0x40
[   55.497993]  kasan_save_alloc_info+0x40/0x58
[   55.502331]  __kasan_kmalloc+0xd4/0xd8
[   55.506139]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.510739]  kasan_bitops_generic+0xa0/0x1c8
[   55.515081]  kunit_try_run_case+0x170/0x3f0
[   55.519334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.524902]  kthread+0x328/0x630
[   55.528188]  ret_from_fork+0x10/0x20
[   55.531822] 
[   55.533346] The buggy address belongs to the object at ffff000080b08100
[   55.533346]  which belongs to the cache kmalloc-16 of size 16
[   55.545824] The buggy address is located 8 bytes inside of
[   55.545824]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   55.558218] 
[   55.559741] The buggy address belongs to the physical page:
[   55.565386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   55.573491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.580099] page_type: f5(slab)
[   55.583298] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   55.591135] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   55.598966] page dumped because: kasan: bad access detected
[   55.604612] 
[   55.606135] Memory state around the buggy address:
[   55.610990]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   55.618303]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   55.625615] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.632924]                       ^
[   55.636468]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.643779]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.651089] ==================================================================
[   55.658452] ==================================================================
[   55.665763] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   55.674829] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   55.682316] 
[   55.683842] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   55.683871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.683879] Hardware name: Thundercomm Dragonboard 845c (DT)
[   55.683891] Call trace:
[   55.683897]  show_stack+0x20/0x38 (C)
[   55.683915]  dump_stack_lvl+0x8c/0xd0
[   55.683934]  print_report+0x118/0x608
[   55.683952]  kasan_report+0xdc/0x128
[   55.683970]  kasan_check_range+0x100/0x1a8
[   55.683990]  __kasan_check_write+0x20/0x30
[   55.684006]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   55.684028]  kasan_bitops_generic+0x11c/0x1c8
[   55.684047]  kunit_try_run_case+0x170/0x3f0
[   55.684064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.684086]  kthread+0x328/0x630
[   55.684100]  ret_from_fork+0x10/0x20
[   55.684117] 
[   55.759555] Allocated by task 359:
[   55.763011]  kasan_save_stack+0x3c/0x68
[   55.766910]  kasan_save_track+0x20/0x40
[   55.770809]  kasan_save_alloc_info+0x40/0x58
[   55.775147]  __kasan_kmalloc+0xd4/0xd8
[   55.778956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.783557]  kasan_bitops_generic+0xa0/0x1c8
[   55.787897]  kunit_try_run_case+0x170/0x3f0
[   55.792150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.797719]  kthread+0x328/0x630
[   55.801004]  ret_from_fork+0x10/0x20
[   55.804638] 
[   55.806161] The buggy address belongs to the object at ffff000080b08100
[   55.806161]  which belongs to the cache kmalloc-16 of size 16
[   55.818639] The buggy address is located 8 bytes inside of
[   55.818639]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   55.831032] 
[   55.832555] The buggy address belongs to the physical page:
[   55.838200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   55.846305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.852911] page_type: f5(slab)
[   55.856110] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   55.863945] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   55.871776] page dumped because: kasan: bad access detected
[   55.877421] 
[   55.878943] Memory state around the buggy address:
[   55.883796]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   55.891108]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   55.898420] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.905729]                       ^
[   55.909272]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.916583]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.923892] ==================================================================
[   56.200509] ==================================================================
[   56.207821] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   56.216885] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   56.224374] 
[   56.225898] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   56.225927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.225936] Hardware name: Thundercomm Dragonboard 845c (DT)
[   56.225945] Call trace:
[   56.225953]  show_stack+0x20/0x38 (C)
[   56.225970]  dump_stack_lvl+0x8c/0xd0
[   56.225988]  print_report+0x118/0x608
[   56.226006]  kasan_report+0xdc/0x128
[   56.226024]  kasan_check_range+0x100/0x1a8
[   56.226043]  __kasan_check_write+0x20/0x30
[   56.226060]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   56.226080]  kasan_bitops_generic+0x11c/0x1c8
[   56.226099]  kunit_try_run_case+0x170/0x3f0
[   56.226116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.226136]  kthread+0x328/0x630
[   56.226150]  ret_from_fork+0x10/0x20
[   56.226166] 
[   56.301605] Allocated by task 359:
[   56.305061]  kasan_save_stack+0x3c/0x68
[   56.308961]  kasan_save_track+0x20/0x40
[   56.312859]  kasan_save_alloc_info+0x40/0x58
[   56.317196]  __kasan_kmalloc+0xd4/0xd8
[   56.321005]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.325605]  kasan_bitops_generic+0xa0/0x1c8
[   56.329947]  kunit_try_run_case+0x170/0x3f0
[   56.334200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.339770]  kthread+0x328/0x630
[   56.343055]  ret_from_fork+0x10/0x20
[   56.346690] 
[   56.348212] The buggy address belongs to the object at ffff000080b08100
[   56.348212]  which belongs to the cache kmalloc-16 of size 16
[   56.360689] The buggy address is located 8 bytes inside of
[   56.360689]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   56.373084] 
[   56.374607] The buggy address belongs to the physical page:
[   56.380251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   56.388359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.394966] page_type: f5(slab)
[   56.398166] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   56.406002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   56.413834] page dumped because: kasan: bad access detected
[   56.419481] 
[   56.421003] Memory state around the buggy address:
[   56.425858]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   56.433171]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   56.440482] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.447793]                       ^
[   56.451335]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.458645]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.465956] ==================================================================
[   56.473329] ==================================================================
[   56.480638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   56.489704] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   56.497104] 
[   56.498629] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   56.498657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.498666] Hardware name: Thundercomm Dragonboard 845c (DT)
[   56.498677] Call trace:
[   56.498684]  show_stack+0x20/0x38 (C)
[   56.498700]  dump_stack_lvl+0x8c/0xd0
[   56.498719]  print_report+0x118/0x608
[   56.498737]  kasan_report+0xdc/0x128
[   56.498755]  __asan_report_load8_noabort+0x20/0x30
[   56.498771]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   56.498793]  kasan_bitops_generic+0x11c/0x1c8
[   56.498811]  kunit_try_run_case+0x170/0x3f0
[   56.498829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.498849]  kthread+0x328/0x630
[   56.498863]  ret_from_fork+0x10/0x20
[   56.498880] 
[   56.570868] Allocated by task 359:
[   56.574323]  kasan_save_stack+0x3c/0x68
[   56.578221]  kasan_save_track+0x20/0x40
[   56.582120]  kasan_save_alloc_info+0x40/0x58
[   56.586459]  __kasan_kmalloc+0xd4/0xd8
[   56.590268]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.594870]  kasan_bitops_generic+0xa0/0x1c8
[   56.599210]  kunit_try_run_case+0x170/0x3f0
[   56.603463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.609032]  kthread+0x328/0x630
[   56.612317]  ret_from_fork+0x10/0x20
[   56.615952] 
[   56.617475] The buggy address belongs to the object at ffff000080b08100
[   56.617475]  which belongs to the cache kmalloc-16 of size 16
[   56.629953] The buggy address is located 8 bytes inside of
[   56.629953]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   56.642347] 
[   56.643870] The buggy address belongs to the physical page:
[   56.649516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   56.657623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.664230] page_type: f5(slab)
[   56.667428] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   56.675265] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   56.683096] page dumped because: kasan: bad access detected
[   56.688742] 
[   56.690265] Memory state around the buggy address:
[   56.695122]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   56.702434]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   56.709747] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.717057]                       ^
[   56.720600]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.727912]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.735221] ==================================================================
[   54.574492] ==================================================================
[   54.581803] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   54.590783] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   54.598270] 
[   54.599796] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   54.599826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.599833] Hardware name: Thundercomm Dragonboard 845c (DT)
[   54.599843] Call trace:
[   54.599850]  show_stack+0x20/0x38 (C)
[   54.599866]  dump_stack_lvl+0x8c/0xd0
[   54.599884]  print_report+0x118/0x608
[   54.599902]  kasan_report+0xdc/0x128
[   54.599921]  kasan_check_range+0x100/0x1a8
[   54.599942]  __kasan_check_write+0x20/0x30
[   54.599958]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   54.599979]  kasan_bitops_generic+0x11c/0x1c8
[   54.599998]  kunit_try_run_case+0x170/0x3f0
[   54.600016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.600037]  kthread+0x328/0x630
[   54.600051]  ret_from_fork+0x10/0x20
[   54.600069] 
[   54.675422] Allocated by task 359:
[   54.678877]  kasan_save_stack+0x3c/0x68
[   54.682776]  kasan_save_track+0x20/0x40
[   54.686674]  kasan_save_alloc_info+0x40/0x58
[   54.691012]  __kasan_kmalloc+0xd4/0xd8
[   54.694822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.699424]  kasan_bitops_generic+0xa0/0x1c8
[   54.703764]  kunit_try_run_case+0x170/0x3f0
[   54.708016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.713585]  kthread+0x328/0x630
[   54.716871]  ret_from_fork+0x10/0x20
[   54.720506] 
[   54.722029] The buggy address belongs to the object at ffff000080b08100
[   54.722029]  which belongs to the cache kmalloc-16 of size 16
[   54.734506] The buggy address is located 8 bytes inside of
[   54.734506]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   54.746900] 
[   54.748423] The buggy address belongs to the physical page:
[   54.754068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   54.762173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.768780] page_type: f5(slab)
[   54.771979] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   54.779814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   54.787645] page dumped because: kasan: bad access detected
[   54.793292] 
[   54.794814] Memory state around the buggy address:
[   54.799669]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   54.806980]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   54.814292] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.821602]                       ^
[   54.825147]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.832457]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.839765] ==================================================================
[   55.931265] ==================================================================
[   55.938574] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   55.947638] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   55.955040] 
[   55.956565] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   55.956594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.956602] Hardware name: Thundercomm Dragonboard 845c (DT)
[   55.956612] Call trace:
[   55.956618]  show_stack+0x20/0x38 (C)
[   55.956635]  dump_stack_lvl+0x8c/0xd0
[   55.956652]  print_report+0x118/0x608
[   55.956670]  kasan_report+0xdc/0x128
[   55.956688]  __asan_report_load8_noabort+0x20/0x30
[   55.956704]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   55.956725]  kasan_bitops_generic+0x11c/0x1c8
[   55.956743]  kunit_try_run_case+0x170/0x3f0
[   55.956761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.956781]  kthread+0x328/0x630
[   55.956796]  ret_from_fork+0x10/0x20
[   55.956812] 
[   56.028796] Allocated by task 359:
[   56.032252]  kasan_save_stack+0x3c/0x68
[   56.036150]  kasan_save_track+0x20/0x40
[   56.040047]  kasan_save_alloc_info+0x40/0x58
[   56.044386]  __kasan_kmalloc+0xd4/0xd8
[   56.048195]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.052796]  kasan_bitops_generic+0xa0/0x1c8
[   56.057137]  kunit_try_run_case+0x170/0x3f0
[   56.061390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.066960]  kthread+0x328/0x630
[   56.070247]  ret_from_fork+0x10/0x20
[   56.073881] 
[   56.075404] The buggy address belongs to the object at ffff000080b08100
[   56.075404]  which belongs to the cache kmalloc-16 of size 16
[   56.087884] The buggy address is located 8 bytes inside of
[   56.087884]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   56.100278] 
[   56.101802] The buggy address belongs to the physical page:
[   56.107447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   56.115553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.122162] page_type: f5(slab)
[   56.125362] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   56.133198] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   56.141031] page dumped because: kasan: bad access detected
[   56.146677] 
[   56.148199] Memory state around the buggy address:
[   56.153054]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   56.160365]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   56.167675] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.174984]                       ^
[   56.178527]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.185840]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.193149] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   53.764262] ==================================================================
[   53.771573] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   53.779857] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   53.787345] 
[   53.788870] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   53.788899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.788908] Hardware name: Thundercomm Dragonboard 845c (DT)
[   53.788918] Call trace:
[   53.788924]  show_stack+0x20/0x38 (C)
[   53.788941]  dump_stack_lvl+0x8c/0xd0
[   53.788958]  print_report+0x118/0x608
[   53.788977]  kasan_report+0xdc/0x128
[   53.788995]  kasan_check_range+0x100/0x1a8
[   53.789015]  __kasan_check_write+0x20/0x30
[   53.789032]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   53.789052]  kasan_bitops_generic+0x110/0x1c8
[   53.789071]  kunit_try_run_case+0x170/0x3f0
[   53.789090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.789110]  kthread+0x328/0x630
[   53.789125]  ret_from_fork+0x10/0x20
[   53.789142] 
[   53.863792] Allocated by task 359:
[   53.867250]  kasan_save_stack+0x3c/0x68
[   53.871148]  kasan_save_track+0x20/0x40
[   53.875046]  kasan_save_alloc_info+0x40/0x58
[   53.879384]  __kasan_kmalloc+0xd4/0xd8
[   53.883193]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.887795]  kasan_bitops_generic+0xa0/0x1c8
[   53.892136]  kunit_try_run_case+0x170/0x3f0
[   53.896389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.901957]  kthread+0x328/0x630
[   53.905243]  ret_from_fork+0x10/0x20
[   53.908877] 
[   53.910400] The buggy address belongs to the object at ffff000080b08100
[   53.910400]  which belongs to the cache kmalloc-16 of size 16
[   53.922877] The buggy address is located 8 bytes inside of
[   53.922877]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   53.935272] 
[   53.936795] The buggy address belongs to the physical page:
[   53.942440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   53.950546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.957154] page_type: f5(slab)
[   53.960353] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   53.968189] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   53.976020] page dumped because: kasan: bad access detected
[   53.981667] 
[   53.983190] Memory state around the buggy address:
[   53.988047]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   53.995359]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   54.002671] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.009981]                       ^
[   54.013524]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.020837]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.028147] ==================================================================
[   52.415034] ==================================================================
[   52.422365] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   52.430648] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   52.438143] 
[   52.439679] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   52.439711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.439720] Hardware name: Thundercomm Dragonboard 845c (DT)
[   52.439732] Call trace:
[   52.439739]  show_stack+0x20/0x38 (C)
[   52.439758]  dump_stack_lvl+0x8c/0xd0
[   52.439779]  print_report+0x118/0x608
[   52.439800]  kasan_report+0xdc/0x128
[   52.439819]  kasan_check_range+0x100/0x1a8
[   52.439840]  __kasan_check_write+0x20/0x30
[   52.439856]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   52.439877]  kasan_bitops_generic+0x110/0x1c8
[   52.439896]  kunit_try_run_case+0x170/0x3f0
[   52.439914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.439935]  kthread+0x328/0x630
[   52.439949]  ret_from_fork+0x10/0x20
[   52.439966] 
[   52.514598] Allocated by task 359:
[   52.518052]  kasan_save_stack+0x3c/0x68
[   52.521959]  kasan_save_track+0x20/0x40
[   52.525864]  kasan_save_alloc_info+0x40/0x58
[   52.530198]  __kasan_kmalloc+0xd4/0xd8
[   52.534014]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.538613]  kasan_bitops_generic+0xa0/0x1c8
[   52.542948]  kunit_try_run_case+0x170/0x3f0
[   52.547196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.552758]  kthread+0x328/0x630
[   52.556038]  ret_from_fork+0x10/0x20
[   52.559670] 
[   52.561194] The buggy address belongs to the object at ffff000080b08100
[   52.561194]  which belongs to the cache kmalloc-16 of size 16
[   52.573670] The buggy address is located 8 bytes inside of
[   52.573670]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   52.586062] 
[   52.587592] The buggy address belongs to the physical page:
[   52.593236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   52.601335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.607945] page_type: f5(slab)
[   52.611145] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   52.618985] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   52.626819] page dumped because: kasan: bad access detected
[   52.632458] 
[   52.633980] Memory state around the buggy address:
[   52.638843]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   52.646157]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   52.653472] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.660784]                       ^
[   52.664325]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.671638]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.678943] ==================================================================
[   52.686360] ==================================================================
[   52.693678] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   52.701957] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   52.709362] 
[   52.710890] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   52.710920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.710929] Hardware name: Thundercomm Dragonboard 845c (DT)
[   52.710939] Call trace:
[   52.710945]  show_stack+0x20/0x38 (C)
[   52.710962]  dump_stack_lvl+0x8c/0xd0
[   52.710980]  print_report+0x118/0x608
[   52.710999]  kasan_report+0xdc/0x128
[   52.711017]  __asan_report_load8_noabort+0x20/0x30
[   52.711034]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   52.711055]  kasan_bitops_generic+0x110/0x1c8
[   52.711073]  kunit_try_run_case+0x170/0x3f0
[   52.711090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.711111]  kthread+0x328/0x630
[   52.711125]  ret_from_fork+0x10/0x20
[   52.711141] 
[   52.782337] Allocated by task 359:
[   52.785791]  kasan_save_stack+0x3c/0x68
[   52.789697]  kasan_save_track+0x20/0x40
[   52.793602]  kasan_save_alloc_info+0x40/0x58
[   52.797935]  __kasan_kmalloc+0xd4/0xd8
[   52.801750]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.806347]  kasan_bitops_generic+0xa0/0x1c8
[   52.810684]  kunit_try_run_case+0x170/0x3f0
[   52.814933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.820492]  kthread+0x328/0x630
[   52.823775]  ret_from_fork+0x10/0x20
[   52.827406] 
[   52.828928] The buggy address belongs to the object at ffff000080b08100
[   52.828928]  which belongs to the cache kmalloc-16 of size 16
[   52.841407] The buggy address is located 8 bytes inside of
[   52.841407]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   52.853799] 
[   52.855331] The buggy address belongs to the physical page:
[   52.860970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   52.869067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.875675] page_type: f5(slab)
[   52.878874] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   52.886714] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   52.894545] page dumped because: kasan: bad access detected
[   52.900183] 
[   52.901706] Memory state around the buggy address:
[   52.906557]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   52.913871]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   52.921184] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.928496]                       ^
[   52.932044]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.939360]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.946665] ==================================================================
[   51.870733] ==================================================================
[   51.881940] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   51.890224] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   51.897725] 
[   51.899263] CPU: 3 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   51.899293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.899305] Hardware name: Thundercomm Dragonboard 845c (DT)
[   51.899317] Call trace:
[   51.899324]  show_stack+0x20/0x38 (C)
[   51.899343]  dump_stack_lvl+0x8c/0xd0
[   51.899364]  print_report+0x118/0x608
[   51.899385]  kasan_report+0xdc/0x128
[   51.899406]  kasan_check_range+0x100/0x1a8
[   51.899427]  __kasan_check_write+0x20/0x30
[   51.899444]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   51.899465]  kasan_bitops_generic+0x110/0x1c8
[   51.899485]  kunit_try_run_case+0x170/0x3f0
[   51.899505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.899529]  kthread+0x328/0x630
[   51.899546]  ret_from_fork+0x10/0x20
[   51.899565] 
[   51.974250] Allocated by task 359:
[   51.977716]  kasan_save_stack+0x3c/0x68
[   51.981625]  kasan_save_track+0x20/0x40
[   51.985531]  kasan_save_alloc_info+0x40/0x58
[   51.989878]  __kasan_kmalloc+0xd4/0xd8
[   51.993696]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.998306]  kasan_bitops_generic+0xa0/0x1c8
[   52.002654]  kunit_try_run_case+0x170/0x3f0
[   52.006915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.012485]  kthread+0x328/0x630
[   52.015773]  ret_from_fork+0x10/0x20
[   52.019417] 
[   52.020948] The buggy address belongs to the object at ffff000080b08100
[   52.020948]  which belongs to the cache kmalloc-16 of size 16
[   52.033439] The buggy address is located 8 bytes inside of
[   52.033439]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   52.045844] 
[   52.047377] The buggy address belongs to the physical page:
[   52.053022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   52.061126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.067742] page_type: f5(slab)
[   52.070944] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   52.078792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   52.086634] page dumped because: kasan: bad access detected
[   52.092281] 
[   52.093812] Memory state around the buggy address:
[   52.098672]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   52.105986]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   52.113303] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.120616]                       ^
[   52.124169]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.131487]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.138801] ==================================================================
[   52.146197] ==================================================================
[   52.153518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   52.161812] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   52.169225] 
[   52.170760] CPU: 3 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   52.170792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.170802] Hardware name: Thundercomm Dragonboard 845c (DT)
[   52.170815] Call trace:
[   52.170823]  show_stack+0x20/0x38 (C)
[   52.170841]  dump_stack_lvl+0x8c/0xd0
[   52.170862]  print_report+0x118/0x608
[   52.170882]  kasan_report+0xdc/0x128
[   52.170901]  __asan_report_load8_noabort+0x20/0x30
[   52.170922]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   52.170943]  kasan_bitops_generic+0x110/0x1c8
[   52.170963]  kunit_try_run_case+0x170/0x3f0
[   52.170982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.171005]  kthread+0x328/0x630
[   52.171021]  ret_from_fork+0x10/0x20
[   52.171039] 
[   52.242280] Allocated by task 359:
[   52.245742]  kasan_save_stack+0x3c/0x68
[   52.249657]  kasan_save_track+0x20/0x40
[   52.253568]  kasan_save_alloc_info+0x40/0x58
[   52.257910]  __kasan_kmalloc+0xd4/0xd8
[   52.261733]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.266335]  kasan_bitops_generic+0xa0/0x1c8
[   52.270676]  kunit_try_run_case+0x170/0x3f0
[   52.274933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.280503]  kthread+0x328/0x630
[   52.283797]  ret_from_fork+0x10/0x20
[   52.287438] 
[   52.288967] The buggy address belongs to the object at ffff000080b08100
[   52.288967]  which belongs to the cache kmalloc-16 of size 16
[   52.301459] The buggy address is located 8 bytes inside of
[   52.301459]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   52.313858] 
[   52.315389] The buggy address belongs to the physical page:
[   52.321036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   52.329152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.335776] page_type: f5(slab)
[   52.338973] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   52.346821] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   52.354663] page dumped because: kasan: bad access detected
[   52.360317] 
[   52.361847] Memory state around the buggy address:
[   52.366709]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   52.374027]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   52.381343] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.388656]                       ^
[   52.392205]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.399523]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.406836] ==================================================================
[   52.954032] ==================================================================
[   52.961346] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   52.969624] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   52.977111] 
[   52.978647] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   52.978676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.978685] Hardware name: Thundercomm Dragonboard 845c (DT)
[   52.978696] Call trace:
[   52.978702]  show_stack+0x20/0x38 (C)
[   52.978720]  dump_stack_lvl+0x8c/0xd0
[   52.978737]  print_report+0x118/0x608
[   52.978756]  kasan_report+0xdc/0x128
[   52.978774]  kasan_check_range+0x100/0x1a8
[   52.978793]  __kasan_check_write+0x20/0x30
[   52.978810]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   52.978830]  kasan_bitops_generic+0x110/0x1c8
[   52.978849]  kunit_try_run_case+0x170/0x3f0
[   52.978866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.978887]  kthread+0x328/0x630
[   52.978901]  ret_from_fork+0x10/0x20
[   52.978918] 
[   53.053565] Allocated by task 359:
[   53.057022]  kasan_save_stack+0x3c/0x68
[   53.060922]  kasan_save_track+0x20/0x40
[   53.064820]  kasan_save_alloc_info+0x40/0x58
[   53.069159]  __kasan_kmalloc+0xd4/0xd8
[   53.072968]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.077570]  kasan_bitops_generic+0xa0/0x1c8
[   53.081910]  kunit_try_run_case+0x170/0x3f0
[   53.086162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.091733]  kthread+0x328/0x630
[   53.095019]  ret_from_fork+0x10/0x20
[   53.098655] 
[   53.100179] The buggy address belongs to the object at ffff000080b08100
[   53.100179]  which belongs to the cache kmalloc-16 of size 16
[   53.112657] The buggy address is located 8 bytes inside of
[   53.112657]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   53.125052] 
[   53.126575] The buggy address belongs to the physical page:
[   53.132222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   53.140329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.146937] page_type: f5(slab)
[   53.150136] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   53.157973] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   53.165805] page dumped because: kasan: bad access detected
[   53.171453] 
[   53.172986] Memory state around the buggy address:
[   53.177841]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   53.185155]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   53.192467] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.199776]                       ^
[   53.203319]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.210630]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.217940] ==================================================================
[   54.306819] ==================================================================
[   54.314129] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   54.322414] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   54.329815] 
[   54.331341] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   54.331369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.331377] Hardware name: Thundercomm Dragonboard 845c (DT)
[   54.331388] Call trace:
[   54.331393]  show_stack+0x20/0x38 (C)
[   54.331410]  dump_stack_lvl+0x8c/0xd0
[   54.331428]  print_report+0x118/0x608
[   54.331446]  kasan_report+0xdc/0x128
[   54.331465]  __asan_report_load8_noabort+0x20/0x30
[   54.331482]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   54.331500]  kasan_bitops_generic+0x110/0x1c8
[   54.331518]  kunit_try_run_case+0x170/0x3f0
[   54.331535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.331555]  kthread+0x328/0x630
[   54.331569]  ret_from_fork+0x10/0x20
[   54.331585] 
[   54.402780] Allocated by task 359:
[   54.406236]  kasan_save_stack+0x3c/0x68
[   54.410135]  kasan_save_track+0x20/0x40
[   54.414034]  kasan_save_alloc_info+0x40/0x58
[   54.418374]  __kasan_kmalloc+0xd4/0xd8
[   54.422184]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.426785]  kasan_bitops_generic+0xa0/0x1c8
[   54.431126]  kunit_try_run_case+0x170/0x3f0
[   54.435379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.440947]  kthread+0x328/0x630
[   54.444233]  ret_from_fork+0x10/0x20
[   54.447869] 
[   54.449392] The buggy address belongs to the object at ffff000080b08100
[   54.449392]  which belongs to the cache kmalloc-16 of size 16
[   54.461869] The buggy address is located 8 bytes inside of
[   54.461869]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   54.474262] 
[   54.475785] The buggy address belongs to the physical page:
[   54.481430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   54.489535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.496142] page_type: f5(slab)
[   54.499341] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   54.507177] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   54.515008] page dumped because: kasan: bad access detected
[   54.520653] 
[   54.522175] Memory state around the buggy address:
[   54.527031]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   54.534343]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   54.541654] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.548964]                       ^
[   54.552508]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.559820]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.567129] ==================================================================
[   54.035551] ==================================================================
[   54.042865] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   54.051151] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   54.058640] 
[   54.060166] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   54.060195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.060205] Hardware name: Thundercomm Dragonboard 845c (DT)
[   54.060216] Call trace:
[   54.060223]  show_stack+0x20/0x38 (C)
[   54.060239]  dump_stack_lvl+0x8c/0xd0
[   54.060257]  print_report+0x118/0x608
[   54.060276]  kasan_report+0xdc/0x128
[   54.060295]  kasan_check_range+0x100/0x1a8
[   54.060315]  __kasan_check_write+0x20/0x30
[   54.060332]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   54.060351]  kasan_bitops_generic+0x110/0x1c8
[   54.060369]  kunit_try_run_case+0x170/0x3f0
[   54.060388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.060410]  kthread+0x328/0x630
[   54.060424]  ret_from_fork+0x10/0x20
[   54.060441] 
[   54.135089] Allocated by task 359:
[   54.138545]  kasan_save_stack+0x3c/0x68
[   54.142444]  kasan_save_track+0x20/0x40
[   54.146342]  kasan_save_alloc_info+0x40/0x58
[   54.150680]  __kasan_kmalloc+0xd4/0xd8
[   54.154490]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.159091]  kasan_bitops_generic+0xa0/0x1c8
[   54.163433]  kunit_try_run_case+0x170/0x3f0
[   54.167687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.173255]  kthread+0x328/0x630
[   54.176541]  ret_from_fork+0x10/0x20
[   54.180176] 
[   54.181698] The buggy address belongs to the object at ffff000080b08100
[   54.181698]  which belongs to the cache kmalloc-16 of size 16
[   54.194177] The buggy address is located 8 bytes inside of
[   54.194177]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   54.206572] 
[   54.208096] The buggy address belongs to the physical page:
[   54.213741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   54.221846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.228453] page_type: f5(slab)
[   54.231651] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   54.239488] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   54.247320] page dumped because: kasan: bad access detected
[   54.252965] 
[   54.254487] Memory state around the buggy address:
[   54.259341]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   54.266654]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   54.273966] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.281276]                       ^
[   54.284818]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.292129]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.299438] ==================================================================
[   53.225326] ==================================================================
[   53.232638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   53.240924] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   53.248413] 
[   53.249940] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   53.249971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.249980] Hardware name: Thundercomm Dragonboard 845c (DT)
[   53.249989] Call trace:
[   53.249995]  show_stack+0x20/0x38 (C)
[   53.250013]  dump_stack_lvl+0x8c/0xd0
[   53.250032]  print_report+0x118/0x608
[   53.250051]  kasan_report+0xdc/0x128
[   53.250070]  kasan_check_range+0x100/0x1a8
[   53.250090]  __kasan_check_write+0x20/0x30
[   53.250106]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   53.250125]  kasan_bitops_generic+0x110/0x1c8
[   53.250143]  kunit_try_run_case+0x170/0x3f0
[   53.250160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.250182]  kthread+0x328/0x630
[   53.250195]  ret_from_fork+0x10/0x20
[   53.250212] 
[   53.324862] Allocated by task 359:
[   53.328318]  kasan_save_stack+0x3c/0x68
[   53.332218]  kasan_save_track+0x20/0x40
[   53.336115]  kasan_save_alloc_info+0x40/0x58
[   53.340452]  __kasan_kmalloc+0xd4/0xd8
[   53.344262]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.348863]  kasan_bitops_generic+0xa0/0x1c8
[   53.353204]  kunit_try_run_case+0x170/0x3f0
[   53.357458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.363026]  kthread+0x328/0x630
[   53.366313]  ret_from_fork+0x10/0x20
[   53.369947] 
[   53.371470] The buggy address belongs to the object at ffff000080b08100
[   53.371470]  which belongs to the cache kmalloc-16 of size 16
[   53.383948] The buggy address is located 8 bytes inside of
[   53.383948]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   53.396336] 
[   53.397858] The buggy address belongs to the physical page:
[   53.403504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   53.411610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.418220] page_type: f5(slab)
[   53.421418] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   53.429254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   53.437087] page dumped because: kasan: bad access detected
[   53.442733] 
[   53.444256] Memory state around the buggy address:
[   53.449111]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   53.456422]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   53.463736] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.471045]                       ^
[   53.474589]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.481902]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.489213] ==================================================================
[   53.496579] ==================================================================
[   53.503889] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   53.512175] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359
[   53.519576] 
[   53.521102] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   53.521131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.521140] Hardware name: Thundercomm Dragonboard 845c (DT)
[   53.521150] Call trace:
[   53.521156]  show_stack+0x20/0x38 (C)
[   53.521174]  dump_stack_lvl+0x8c/0xd0
[   53.521192]  print_report+0x118/0x608
[   53.521212]  kasan_report+0xdc/0x128
[   53.521230]  __asan_report_load8_noabort+0x20/0x30
[   53.521248]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   53.521267]  kasan_bitops_generic+0x110/0x1c8
[   53.521286]  kunit_try_run_case+0x170/0x3f0
[   53.521303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.521326]  kthread+0x328/0x630
[   53.521339]  ret_from_fork+0x10/0x20
[   53.521356] 
[   53.592551] Allocated by task 359:
[   53.596006]  kasan_save_stack+0x3c/0x68
[   53.599905]  kasan_save_track+0x20/0x40
[   53.603801]  kasan_save_alloc_info+0x40/0x58
[   53.608139]  __kasan_kmalloc+0xd4/0xd8
[   53.611948]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.616549]  kasan_bitops_generic+0xa0/0x1c8
[   53.620890]  kunit_try_run_case+0x170/0x3f0
[   53.625142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.630710]  kthread+0x328/0x630
[   53.633995]  ret_from_fork+0x10/0x20
[   53.637629] 
[   53.639151] The buggy address belongs to the object at ffff000080b08100
[   53.639151]  which belongs to the cache kmalloc-16 of size 16
[   53.651627] The buggy address is located 8 bytes inside of
[   53.651627]  allocated 9-byte region [ffff000080b08100, ffff000080b08109)
[   53.664020] 
[   53.665544] The buggy address belongs to the physical page:
[   53.671189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08
[   53.679296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.685903] page_type: f5(slab)
[   53.689101] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   53.696939] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   53.704771] page dumped because: kasan: bad access detected
[   53.710416] 
[   53.711939] Memory state around the buggy address:
[   53.716793]  ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc
[   53.724104]  ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   53.731415] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.738725]                       ^
[   53.742268]  ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.749579]  ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.756888] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   51.560534] ==================================================================
[   51.567852] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   51.573936] Read of size 1 at addr ffff000093781910 by task kunit_try_catch/357
[   51.581341] 
[   51.582866] CPU: 6 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   51.582895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.582903] Hardware name: Thundercomm Dragonboard 845c (DT)
[   51.582914] Call trace:
[   51.582920]  show_stack+0x20/0x38 (C)
[   51.582937]  dump_stack_lvl+0x8c/0xd0
[   51.582955]  print_report+0x118/0x608
[   51.582973]  kasan_report+0xdc/0x128
[   51.582991]  __asan_report_load1_noabort+0x20/0x30
[   51.583008]  strnlen+0x80/0x88
[   51.583021]  kasan_strings+0x478/0xb00
[   51.583036]  kunit_try_run_case+0x170/0x3f0
[   51.583054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.583074]  kthread+0x328/0x630
[   51.583088]  ret_from_fork+0x10/0x20
[   51.583104] 
[   51.651415] Allocated by task 357:
[   51.654870]  kasan_save_stack+0x3c/0x68
[   51.658778]  kasan_save_track+0x20/0x40
[   51.662683]  kasan_save_alloc_info+0x40/0x58
[   51.667019]  __kasan_kmalloc+0xd4/0xd8
[   51.670836]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.675430]  kasan_strings+0xc8/0xb00
[   51.679148]  kunit_try_run_case+0x170/0x3f0
[   51.683396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.688962]  kthread+0x328/0x630
[   51.692243]  ret_from_fork+0x10/0x20
[   51.695874] 
[   51.697396] Freed by task 357:
[   51.700500]  kasan_save_stack+0x3c/0x68
[   51.704395]  kasan_save_track+0x20/0x40
[   51.708300]  kasan_save_free_info+0x4c/0x78
[   51.712548]  __kasan_slab_free+0x6c/0x98
[   51.716538]  kfree+0x214/0x3c8
[   51.719647]  kasan_strings+0x24c/0xb00
[   51.723460]  kunit_try_run_case+0x170/0x3f0
[   51.727710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.733285]  kthread+0x328/0x630
[   51.736579]  ret_from_fork+0x10/0x20
[   51.740215] 
[   51.741741] The buggy address belongs to the object at ffff000093781900
[   51.741741]  which belongs to the cache kmalloc-32 of size 32
[   51.754222] The buggy address is located 16 bytes inside of
[   51.754222]  freed 32-byte region [ffff000093781900, ffff000093781920)
[   51.766441] 
[   51.767974] The buggy address belongs to the physical page:
[   51.773616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113781
[   51.781716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.788329] page_type: f5(slab)
[   51.791527] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000
[   51.799369] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   51.807204] page dumped because: kasan: bad access detected
[   51.812846] 
[   51.814368] Memory state around the buggy address:
[   51.819229]  ffff000093781800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.826534]  ffff000093781880: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   51.833852] >ffff000093781900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.841164]                          ^
[   51.844976]  ffff000093781980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.852291]  ffff000093781a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.859604] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   51.254304] ==================================================================
[   51.261617] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   51.267622] Read of size 1 at addr ffff000093781910 by task kunit_try_catch/357
[   51.275020] 
[   51.276552] CPU: 6 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   51.276583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.276592] Hardware name: Thundercomm Dragonboard 845c (DT)
[   51.276603] Call trace:
[   51.276610]  show_stack+0x20/0x38 (C)
[   51.276627]  dump_stack_lvl+0x8c/0xd0
[   51.276645]  print_report+0x118/0x608
[   51.276666]  kasan_report+0xdc/0x128
[   51.276684]  __asan_report_load1_noabort+0x20/0x30
[   51.276701]  strlen+0xa8/0xb0
[   51.276716]  kasan_strings+0x418/0xb00
[   51.276732]  kunit_try_run_case+0x170/0x3f0
[   51.276750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.276770]  kthread+0x328/0x630
[   51.276783]  ret_from_fork+0x10/0x20
[   51.276800] 
[   51.345009] Allocated by task 357:
[   51.348461]  kasan_save_stack+0x3c/0x68
[   51.352358]  kasan_save_track+0x20/0x40
[   51.356262]  kasan_save_alloc_info+0x40/0x58
[   51.360598]  __kasan_kmalloc+0xd4/0xd8
[   51.364413]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.369014]  kasan_strings+0xc8/0xb00
[   51.372741]  kunit_try_run_case+0x170/0x3f0
[   51.376992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.382556]  kthread+0x328/0x630
[   51.385840]  ret_from_fork+0x10/0x20
[   51.389480] 
[   51.391014] Freed by task 357:
[   51.394120]  kasan_save_stack+0x3c/0x68
[   51.398024]  kasan_save_track+0x20/0x40
[   51.401921]  kasan_save_free_info+0x4c/0x78
[   51.406165]  __kasan_slab_free+0x6c/0x98
[   51.410155]  kfree+0x214/0x3c8
[   51.413265]  kasan_strings+0x24c/0xb00
[   51.417080]  kunit_try_run_case+0x170/0x3f0
[   51.421331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.426897]  kthread+0x328/0x630
[   51.430179]  ret_from_fork+0x10/0x20
[   51.433810] 
[   51.435340] The buggy address belongs to the object at ffff000093781900
[   51.435340]  which belongs to the cache kmalloc-32 of size 32
[   51.447820] The buggy address is located 16 bytes inside of
[   51.447820]  freed 32-byte region [ffff000093781900, ffff000093781920)
[   51.460042] 
[   51.461566] The buggy address belongs to the physical page:
[   51.467208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113781
[   51.475307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.481920] page_type: f5(slab)
[   51.485116] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000
[   51.492957] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   51.500794] page dumped because: kasan: bad access detected
[   51.506437] 
[   51.507964] Memory state around the buggy address:
[   51.512818]  ffff000093781800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.520132]  ffff000093781880: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   51.527448] >ffff000093781900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.534756]                          ^
[   51.538568]  ffff000093781980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.545873]  ffff000093781a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.553187] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   49.847874] ==================================================================
[   49.858909] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   49.866496] Read of size 1 at addr ffff8000842a7b5f by task kunit_try_catch/349
[   49.873906] 
[   49.875443] CPU: 4 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   49.875473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.875482] Hardware name: Thundercomm Dragonboard 845c (DT)
[   49.875496] Call trace:
[   49.875503]  show_stack+0x20/0x38 (C)
[   49.875522]  dump_stack_lvl+0x8c/0xd0
[   49.875541]  print_report+0x310/0x608
[   49.875561]  kasan_report+0xdc/0x128
[   49.875580]  __asan_report_load1_noabort+0x20/0x30
[   49.875596]  kasan_alloca_oob_left+0x2b8/0x310
[   49.875614]  kunit_try_run_case+0x170/0x3f0
[   49.875635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.875655]  kthread+0x328/0x630
[   49.875669]  ret_from_fork+0x10/0x20
[   49.875687] 
[   49.941591] The buggy address belongs to stack of task kunit_try_catch/349
[   49.948562] 
[   49.950089] The buggy address belongs to the virtual mapping at
[   49.950089]  [ffff8000842a0000, ffff8000842a9000) created by:
[   49.950089]  kernel_clone+0x150/0x7a8
[   49.965557] 
[   49.967092] The buggy address belongs to the physical page:
[   49.972732] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11684a
[   49.980834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.987453] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   49.995295] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.003132] page dumped because: kasan: bad access detected
[   50.008772] 
[   50.010295] Memory state around the buggy address:
[   50.015158]  ffff8000842a7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.022465]  ffff8000842a7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.029781] >ffff8000842a7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   50.037095]                                                     ^
[   50.043269]  ffff8000842a7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   50.050578]  ffff8000842a7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   50.057890] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   50.950266] ==================================================================
[   50.957585] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   50.964370] Read of size 1 at addr ffff000093781910 by task kunit_try_catch/357
[   50.971776] 
[   50.973302] CPU: 6 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   50.973333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.973342] Hardware name: Thundercomm Dragonboard 845c (DT)
[   50.973352] Call trace:
[   50.973360]  show_stack+0x20/0x38 (C)
[   50.973378]  dump_stack_lvl+0x8c/0xd0
[   50.973396]  print_report+0x118/0x608
[   50.973415]  kasan_report+0xdc/0x128
[   50.973434]  __asan_report_load1_noabort+0x20/0x30
[   50.973450]  kasan_strings+0x95c/0xb00
[   50.973466]  kunit_try_run_case+0x170/0x3f0
[   50.973485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.973506]  kthread+0x328/0x630
[   50.973520]  ret_from_fork+0x10/0x20
[   50.973536] 
[   51.038768] Allocated by task 357:
[   51.042222]  kasan_save_stack+0x3c/0x68
[   51.046127]  kasan_save_track+0x20/0x40
[   51.050032]  kasan_save_alloc_info+0x40/0x58
[   51.054365]  __kasan_kmalloc+0xd4/0xd8
[   51.058180]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.062778]  kasan_strings+0xc8/0xb00
[   51.066505]  kunit_try_run_case+0x170/0x3f0
[   51.070753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.076321]  kthread+0x328/0x630
[   51.079603]  ret_from_fork+0x10/0x20
[   51.083234] 
[   51.084766] Freed by task 357:
[   51.087869]  kasan_save_stack+0x3c/0x68
[   51.091772]  kasan_save_track+0x20/0x40
[   51.095675]  kasan_save_free_info+0x4c/0x78
[   51.099920]  __kasan_slab_free+0x6c/0x98
[   51.103912]  kfree+0x214/0x3c8
[   51.107024]  kasan_strings+0x24c/0xb00
[   51.110838]  kunit_try_run_case+0x170/0x3f0
[   51.115085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.120646]  kthread+0x328/0x630
[   51.123927]  ret_from_fork+0x10/0x20
[   51.127558] 
[   51.129081] The buggy address belongs to the object at ffff000093781900
[   51.129081]  which belongs to the cache kmalloc-32 of size 32
[   51.141558] The buggy address is located 16 bytes inside of
[   51.141558]  freed 32-byte region [ffff000093781900, ffff000093781920)
[   51.153779] 
[   51.155309] The buggy address belongs to the physical page:
[   51.160949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113781
[   51.169048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.175659] page_type: f5(slab)
[   51.178859] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000
[   51.186696] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   51.194532] page dumped because: kasan: bad access detected
[   51.200179] 
[   51.201713] Memory state around the buggy address:
[   51.206564]  ffff000093781800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.213878]  ffff000093781880: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   51.221193] >ffff000093781900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.228507]                          ^
[   51.232317]  ffff000093781980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.239631]  ffff000093781a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.246937] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   50.627121] ==================================================================
[   50.651273] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   50.657272] Read of size 1 at addr ffff000093781910 by task kunit_try_catch/357
[   50.664676] 
[   50.666206] CPU: 6 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   50.666237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.666246] Hardware name: Thundercomm Dragonboard 845c (DT)
[   50.666260] Call trace:
[   50.666268]  show_stack+0x20/0x38 (C)
[   50.666287]  dump_stack_lvl+0x8c/0xd0
[   50.666306]  print_report+0x118/0x608
[   50.666325]  kasan_report+0xdc/0x128
[   50.666344]  __asan_report_load1_noabort+0x20/0x30
[   50.666362]  strcmp+0xc0/0xc8
[   50.666376]  kasan_strings+0x340/0xb00
[   50.666392]  kunit_try_run_case+0x170/0x3f0
[   50.666412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.666432]  kthread+0x328/0x630
[   50.666446]  ret_from_fork+0x10/0x20
[   50.666465] 
[   50.734709] Allocated by task 357:
[   50.738164]  kasan_save_stack+0x3c/0x68
[   50.742071]  kasan_save_track+0x20/0x40
[   50.745976]  kasan_save_alloc_info+0x40/0x58
[   50.750309]  __kasan_kmalloc+0xd4/0xd8
[   50.754123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.758724]  kasan_strings+0xc8/0xb00
[   50.762451]  kunit_try_run_case+0x170/0x3f0
[   50.766699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.772260]  kthread+0x328/0x630
[   50.775542]  ret_from_fork+0x10/0x20
[   50.779175] 
[   50.780705] Freed by task 357:
[   50.783813]  kasan_save_stack+0x3c/0x68
[   50.787716]  kasan_save_track+0x20/0x40
[   50.791619]  kasan_save_free_info+0x4c/0x78
[   50.795865]  __kasan_slab_free+0x6c/0x98
[   50.799856]  kfree+0x214/0x3c8
[   50.802968]  kasan_strings+0x24c/0xb00
[   50.806781]  kunit_try_run_case+0x170/0x3f0
[   50.811030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.816589]  kthread+0x328/0x630
[   50.819871]  ret_from_fork+0x10/0x20
[   50.823502] 
[   50.825025] The buggy address belongs to the object at ffff000093781900
[   50.825025]  which belongs to the cache kmalloc-32 of size 32
[   50.837503] The buggy address is located 16 bytes inside of
[   50.837503]  freed 32-byte region [ffff000093781900, ffff000093781920)
[   50.849722] 
[   50.851253] The buggy address belongs to the physical page:
[   50.856894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113781
[   50.864994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.871604] page_type: f5(slab)
[   50.874806] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000
[   50.882647] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   50.890483] page dumped because: kasan: bad access detected
[   50.896120] 
[   50.897643] Memory state around the buggy address:
[   50.902494]  ffff000093781800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.909809]  ffff000093781880: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   50.917123] >ffff000093781900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.924435]                          ^
[   50.928244]  ffff000093781980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   50.935561]  ffff000093781a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.942866] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   50.315944] ==================================================================
[   50.327074] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   50.333171] Read of size 1 at addr ffff0000829a87d8 by task kunit_try_catch/355
[   50.340584] 
[   50.342121] CPU: 3 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   50.342153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.342164] Hardware name: Thundercomm Dragonboard 845c (DT)
[   50.342178] Call trace:
[   50.342185]  show_stack+0x20/0x38 (C)
[   50.342204]  dump_stack_lvl+0x8c/0xd0
[   50.342226]  print_report+0x118/0x608
[   50.342246]  kasan_report+0xdc/0x128
[   50.342266]  __asan_report_load1_noabort+0x20/0x30
[   50.342287]  memcmp+0x198/0x1d8
[   50.342304]  kasan_memcmp+0x16c/0x300
[   50.342323]  kunit_try_run_case+0x170/0x3f0
[   50.342344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.342368]  kthread+0x328/0x630
[   50.342383]  ret_from_fork+0x10/0x20
[   50.342401] 
[   50.410771] Allocated by task 355:
[   50.414239]  kasan_save_stack+0x3c/0x68
[   50.418150]  kasan_save_track+0x20/0x40
[   50.422065]  kasan_save_alloc_info+0x40/0x58
[   50.426402]  __kasan_kmalloc+0xd4/0xd8
[   50.430217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.434832]  kasan_memcmp+0xbc/0x300
[   50.438472]  kunit_try_run_case+0x170/0x3f0
[   50.442727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.448297]  kthread+0x328/0x630
[   50.451582]  ret_from_fork+0x10/0x20
[   50.455224] 
[   50.456758] The buggy address belongs to the object at ffff0000829a87c0
[   50.456758]  which belongs to the cache kmalloc-32 of size 32
[   50.469253] The buggy address is located 0 bytes to the right of
[   50.469253]  allocated 24-byte region [ffff0000829a87c0, ffff0000829a87d8)
[   50.482265] 
[   50.483804] The buggy address belongs to the physical page:
[   50.489452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a8
[   50.497557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.504182] page_type: f5(slab)
[   50.507383] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000
[   50.515231] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   50.523074] page dumped because: kasan: bad access detected
[   50.528720] 
[   50.530250] Memory state around the buggy address:
[   50.535117]  ffff0000829a8680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.542432]  ffff0000829a8700: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   50.549758] >ffff0000829a8780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   50.557071]                                                     ^
[   50.563253]  ffff0000829a8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.570567]  ffff0000829a8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.577888] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   50.069082] ==================================================================
[   50.080645] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   50.088320] Read of size 1 at addr ffff8000842c7b4a by task kunit_try_catch/351
[   50.095735] 
[   50.097266] CPU: 3 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   50.097297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.097307] Hardware name: Thundercomm Dragonboard 845c (DT)
[   50.097320] Call trace:
[   50.097327]  show_stack+0x20/0x38 (C)
[   50.097346]  dump_stack_lvl+0x8c/0xd0
[   50.097368]  print_report+0x310/0x608
[   50.097389]  kasan_report+0xdc/0x128
[   50.097409]  __asan_report_load1_noabort+0x20/0x30
[   50.097427]  kasan_alloca_oob_right+0x2dc/0x340
[   50.097447]  kunit_try_run_case+0x170/0x3f0
[   50.097467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.097492]  kthread+0x328/0x630
[   50.097507]  ret_from_fork+0x10/0x20
[   50.097526] 
[   50.163593] The buggy address belongs to stack of task kunit_try_catch/351
[   50.170570] 
[   50.172108] The buggy address belongs to the virtual mapping at
[   50.172108]  [ffff8000842c0000, ffff8000842c9000) created by:
[   50.172108]  kernel_clone+0x150/0x7a8
[   50.187585] 
[   50.189113] The buggy address belongs to the physical page:
[   50.194760] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11685e
[   50.202870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.209496] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   50.217339] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.225180] page dumped because: kasan: bad access detected
[   50.230831] 
[   50.232363] Memory state around the buggy address:
[   50.237226]  ffff8000842c7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.244549]  ffff8000842c7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.251873] >ffff8000842c7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   50.259187]                                               ^
[   50.264838]  ffff8000842c7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   50.272163]  ffff8000842c7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   50.279479] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   49.597726] ==================================================================
[   49.612970] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   49.619945] Read of size 1 at addr ffff800084287c2a by task kunit_try_catch/347
[   49.627361] 
[   49.628896] CPU: 3 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   49.628928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.628938] Hardware name: Thundercomm Dragonboard 845c (DT)
[   49.628950] Call trace:
[   49.628959]  show_stack+0x20/0x38 (C)
[   49.628980]  dump_stack_lvl+0x8c/0xd0
[   49.629002]  print_report+0x310/0x608
[   49.629022]  kasan_report+0xdc/0x128
[   49.629042]  __asan_report_load1_noabort+0x20/0x30
[   49.629062]  kasan_stack_oob+0x238/0x270
[   49.629081]  kunit_try_run_case+0x170/0x3f0
[   49.629101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.629126]  kthread+0x328/0x630
[   49.629142]  ret_from_fork+0x10/0x20
[   49.629160] 
[   49.694597] The buggy address belongs to stack of task kunit_try_catch/347
[   49.701566]  and is located at offset 138 in frame:
[   49.706510]  kasan_stack_oob+0x0/0x270
[   49.710332] 
[   49.711862] This frame has 4 objects:
[   49.715592]  [48, 49) '__assertion'
[   49.715607]  [64, 72) 'array'
[   49.719160]  [96, 112) '__assertion'
[   49.722188]  [128, 138) 'stack_array'
[   49.725827] 
[   49.731070] The buggy address belongs to the virtual mapping at
[   49.731070]  [ffff800084280000, ffff800084289000) created by:
[   49.731070]  kernel_clone+0x150/0x7a8
[   49.746553] 
[   49.748087] The buggy address belongs to the physical page:
[   49.753733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116835
[   49.761841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.768472] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   49.776321] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   49.784165] page dumped because: kasan: bad access detected
[   49.789811] 
[   49.791341] Memory state around the buggy address:
[   49.796201]  ffff800084287b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.803516]  ffff800084287b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   49.810832] >ffff800084287c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   49.818145]                                   ^
[   49.822746]  ffff800084287c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   49.830063]  ffff800084287d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   49.837377] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   49.367750] ==================================================================
[   49.380462] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   49.388141] Read of size 1 at addr ffffae1d640c668d by task kunit_try_catch/343
[   49.395553] 
[   49.397087] CPU: 3 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   49.397120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.397130] Hardware name: Thundercomm Dragonboard 845c (DT)
[   49.397148] Call trace:
[   49.397156]  show_stack+0x20/0x38 (C)
[   49.397176]  dump_stack_lvl+0x8c/0xd0
[   49.397198]  print_report+0x310/0x608
[   49.397219]  kasan_report+0xdc/0x128
[   49.397240]  __asan_report_load1_noabort+0x20/0x30
[   49.397259]  kasan_global_oob_right+0x230/0x270
[   49.397279]  kunit_try_run_case+0x170/0x3f0
[   49.397302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.397326]  kthread+0x328/0x630
[   49.397345]  ret_from_fork+0x10/0x20
[   49.397366] 
[   49.463436] The buggy address belongs to the variable:
[   49.468651]  global_array+0xd/0x40
[   49.472125] 
[   49.473673] The buggy address belongs to the virtual mapping at
[   49.473673]  [ffffae1d62260000, ffffae1d64181000) created by:
[   49.473673]  paging_init+0x66c/0x7d0
[   49.489068] 
[   49.490604] The buggy address belongs to the physical page:
[   49.496260] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa7ac6
[   49.504281] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   49.511696] raw: 03fffe0000002000 fffffdffc09eb188 fffffdffc09eb188 0000000000000000
[   49.519545] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   49.527385] page dumped because: kasan: bad access detected
[   49.533032] 
[   49.534562] Memory state around the buggy address:
[   49.539425]  ffffae1d640c6580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.546739]  ffffae1d640c6600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   49.554066] >ffffae1d640c6680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   49.561389]                       ^
[   49.564934]  ffffae1d640c6700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   49.572257]  ffffae1d640c6780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.579572] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   48.780915] ==================================================================
[   48.793265] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   48.801380] Free of addr ffff000080df5e01 by task kunit_try_catch/339
[   48.807906] 
[   48.809447] CPU: 2 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   48.809482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.809493] Hardware name: Thundercomm Dragonboard 845c (DT)
[   48.809509] Call trace:
[   48.809518]  show_stack+0x20/0x38 (C)
[   48.809540]  dump_stack_lvl+0x8c/0xd0
[   48.809561]  print_report+0x118/0x608
[   48.809582]  kasan_report_invalid_free+0xc0/0xe8
[   48.809606]  check_slab_allocation+0xfc/0x108
[   48.809627]  __kasan_mempool_poison_object+0x78/0x150
[   48.809650]  mempool_free+0x28c/0x328
[   48.809671]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   48.809692]  mempool_kmalloc_invalid_free+0xc0/0x118
[   48.809712]  kunit_try_run_case+0x170/0x3f0
[   48.809734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.809756]  kthread+0x328/0x630
[   48.809774]  ret_from_fork+0x10/0x20
[   48.809795] 
[   48.891443] Allocated by task 339:
[   48.894913]  kasan_save_stack+0x3c/0x68
[   48.898821]  kasan_save_track+0x20/0x40
[   48.902727]  kasan_save_alloc_info+0x40/0x58
[   48.907073]  __kasan_mempool_unpoison_object+0x11c/0x180
[   48.912472]  remove_element+0x130/0x1f8
[   48.916376]  mempool_alloc_preallocated+0x58/0xc0
[   48.921155]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   48.926810]  mempool_kmalloc_invalid_free+0xc0/0x118
[   48.931862]  kunit_try_run_case+0x170/0x3f0
[   48.936123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.941694]  kthread+0x328/0x630
[   48.944981]  ret_from_fork+0x10/0x20
[   48.948626] 
[   48.950158] The buggy address belongs to the object at ffff000080df5e00
[   48.950158]  which belongs to the cache kmalloc-128 of size 128
[   48.962824] The buggy address is located 1 bytes inside of
[   48.962824]  128-byte region [ffff000080df5e00, ffff000080df5e80)
[   48.974528] 
[   48.976062] The buggy address belongs to the physical page:
[   48.981710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100df4
[   48.989818] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.997579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.004639] page_type: f5(slab)
[   49.007844] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   49.015692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.023543] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   49.031478] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.039413] head: 0bfffe0000000001 fffffdffc2037d01 00000000ffffffff 00000000ffffffff
[   49.047347] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.055277] page dumped because: kasan: bad access detected
[   49.060925] 
[   49.062456] Memory state around the buggy address:
[   49.067317]  ffff000080df5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.074633]  ffff000080df5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.081951] >ffff000080df5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.089265]                    ^
[   49.092550]  ffff000080df5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.099867]  ffff000080df5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.107182] ==================================================================
[   49.118583] ==================================================================
[   49.130764] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   49.138872] Free of addr ffff000095610001 by task kunit_try_catch/341
[   49.145397] 
[   49.146931] CPU: 4 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   49.146962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.146971] Hardware name: Thundercomm Dragonboard 845c (DT)
[   49.146982] Call trace:
[   49.146989]  show_stack+0x20/0x38 (C)
[   49.147008]  dump_stack_lvl+0x8c/0xd0
[   49.147028]  print_report+0x118/0x608
[   49.147046]  kasan_report_invalid_free+0xc0/0xe8
[   49.147067]  __kasan_mempool_poison_object+0xfc/0x150
[   49.147088]  mempool_free+0x28c/0x328
[   49.147103]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   49.147123]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   49.147141]  kunit_try_run_case+0x170/0x3f0
[   49.147159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.147180]  kthread+0x328/0x630
[   49.147193]  ret_from_fork+0x10/0x20
[   49.147212] 
[   49.224937] The buggy address belongs to the physical page:
[   49.230578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115610
[   49.238689] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.246437] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.253493] page_type: f8(unknown)
[   49.256961] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   49.264798] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   49.272634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   49.280555] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   49.288487] head: 0bfffe0000000002 fffffdffc2558401 00000000ffffffff 00000000ffffffff
[   49.296410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   49.304326] page dumped because: kasan: bad access detected
[   49.309967] 
[   49.311495] Memory state around the buggy address:
[   49.316357]  ffff00009560ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.323667]  ffff00009560ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.330973] >ffff000095610000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.338283]                    ^
[   49.341561]  ffff000095610080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.348873]  ffff000095610100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.356181] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   48.576619] ==================================================================
[   48.589243] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   48.596482] Free of addr ffff000095610000 by task kunit_try_catch/337
[   48.603010] 
[   48.604551] CPU: 4 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   48.604586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.604596] Hardware name: Thundercomm Dragonboard 845c (DT)
[   48.604612] Call trace:
[   48.604620]  show_stack+0x20/0x38 (C)
[   48.604640]  dump_stack_lvl+0x8c/0xd0
[   48.604661]  print_report+0x118/0x608
[   48.604681]  kasan_report_invalid_free+0xc0/0xe8
[   48.604703]  __kasan_mempool_poison_pages+0xe0/0xe8
[   48.604723]  mempool_free+0x24c/0x328
[   48.604741]  mempool_double_free_helper+0x150/0x2e8
[   48.604759]  mempool_page_alloc_double_free+0xbc/0x118
[   48.604779]  kunit_try_run_case+0x170/0x3f0
[   48.604798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.604819]  kthread+0x328/0x630
[   48.604833]  ret_from_fork+0x10/0x20
[   48.604853] 
[   48.681270] The buggy address belongs to the physical page:
[   48.686916] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115610
[   48.695019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.701640] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   48.709481] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   48.717317] page dumped because: kasan: bad access detected
[   48.722958] 
[   48.724488] Memory state around the buggy address:
[   48.729342]  ffff00009560ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.736657]  ffff00009560ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.743973] >ffff000095610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.751286]                    ^
[   48.754566]  ffff000095610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.761880]  ffff000095610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.769193] ==================================================================
[   47.942736] ==================================================================
[   47.954401] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   47.961645] Free of addr ffff000080f19400 by task kunit_try_catch/333
[   47.968170] 
[   47.969715] CPU: 4 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   47.969750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.969761] Hardware name: Thundercomm Dragonboard 845c (DT)
[   47.969776] Call trace:
[   47.969784]  show_stack+0x20/0x38 (C)
[   47.969805]  dump_stack_lvl+0x8c/0xd0
[   47.969828]  print_report+0x118/0x608
[   47.969850]  kasan_report_invalid_free+0xc0/0xe8
[   47.969872]  check_slab_allocation+0xd4/0x108
[   47.969891]  __kasan_mempool_poison_object+0x78/0x150
[   47.969913]  mempool_free+0x28c/0x328
[   47.969931]  mempool_double_free_helper+0x150/0x2e8
[   47.969949]  mempool_kmalloc_double_free+0xc0/0x118
[   47.969969]  kunit_try_run_case+0x170/0x3f0
[   47.969989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.970011]  kthread+0x328/0x630
[   47.970026]  ret_from_fork+0x10/0x20
[   47.970045] 
[   48.050749] Allocated by task 333:
[   48.054213]  kasan_save_stack+0x3c/0x68
[   48.058118]  kasan_save_track+0x20/0x40
[   48.062024]  kasan_save_alloc_info+0x40/0x58
[   48.066358]  __kasan_mempool_unpoison_object+0x11c/0x180
[   48.071744]  remove_element+0x130/0x1f8
[   48.075645]  mempool_alloc_preallocated+0x58/0xc0
[   48.080414]  mempool_double_free_helper+0x94/0x2e8
[   48.085272]  mempool_kmalloc_double_free+0xc0/0x118
[   48.090224]  kunit_try_run_case+0x170/0x3f0
[   48.094471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.100042]  kthread+0x328/0x630
[   48.103324]  ret_from_fork+0x10/0x20
[   48.106957] 
[   48.108486] Freed by task 333:
[   48.111591]  kasan_save_stack+0x3c/0x68
[   48.115495]  kasan_save_track+0x20/0x40
[   48.119398]  kasan_save_free_info+0x4c/0x78
[   48.123642]  __kasan_mempool_poison_object+0xc0/0x150
[   48.128775]  mempool_free+0x28c/0x328
[   48.132501]  mempool_double_free_helper+0x100/0x2e8
[   48.137454]  mempool_kmalloc_double_free+0xc0/0x118
[   48.142408]  kunit_try_run_case+0x170/0x3f0
[   48.146656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.152224]  kthread+0x328/0x630
[   48.155505]  ret_from_fork+0x10/0x20
[   48.159138] 
[   48.160670] The buggy address belongs to the object at ffff000080f19400
[   48.160670]  which belongs to the cache kmalloc-128 of size 128
[   48.173330] The buggy address is located 0 bytes inside of
[   48.173330]  128-byte region [ffff000080f19400, ffff000080f19480)
[   48.185025] 
[   48.186551] The buggy address belongs to the physical page:
[   48.192200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f18
[   48.200300] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.208050] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.215101] page_type: f5(slab)
[   48.218303] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   48.226141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.233979] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   48.241903] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.249825] head: 0bfffe0000000001 fffffdffc203c601 00000000ffffffff 00000000ffffffff
[   48.257747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   48.265666] page dumped because: kasan: bad access detected
[   48.271315] 
[   48.272847] Memory state around the buggy address:
[   48.277710]  ffff000080f19300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.285022]  ffff000080f19380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.292335] >ffff000080f19400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.299645]                    ^
[   48.302930]  ffff000080f19480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.310241]  ffff000080f19500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.317552] ==================================================================
[   48.328933] ==================================================================
[   48.341027] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   48.348267] Free of addr ffff000095654000 by task kunit_try_catch/335
[   48.354795] 
[   48.356333] CPU: 6 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   48.356367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.356376] Hardware name: Thundercomm Dragonboard 845c (DT)
[   48.356393] Call trace:
[   48.356401]  show_stack+0x20/0x38 (C)
[   48.356422]  dump_stack_lvl+0x8c/0xd0
[   48.356444]  print_report+0x118/0x608
[   48.356462]  kasan_report_invalid_free+0xc0/0xe8
[   48.356484]  __kasan_mempool_poison_object+0x14c/0x150
[   48.356504]  mempool_free+0x28c/0x328
[   48.356522]  mempool_double_free_helper+0x150/0x2e8
[   48.356540]  mempool_kmalloc_large_double_free+0xc0/0x118
[   48.356559]  kunit_try_run_case+0x170/0x3f0
[   48.356579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.356600]  kthread+0x328/0x630
[   48.356615]  ret_from_fork+0x10/0x20
[   48.356635] 
[   48.433563] The buggy address belongs to the physical page:
[   48.439204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115654
[   48.447313] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.455062] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.462110] page_type: f8(unknown)
[   48.465579] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   48.473413] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   48.481256] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   48.489186] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   48.497117] head: 0bfffe0000000002 fffffdffc2559501 00000000ffffffff 00000000ffffffff
[   48.505047] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   48.512964] page dumped because: kasan: bad access detected
[   48.518604] 
[   48.520130] Memory state around the buggy address:
[   48.524994]  ffff000095653f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.532304]  ffff000095653f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.539614] >ffff000095654000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.546929]                    ^
[   48.550208]  ffff000095654080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.557519]  ffff000095654100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.564827] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   47.159853] ==================================================================
[   47.171259] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   47.178065] Read of size 1 at addr ffff0000967e8000 by task kunit_try_catch/327
[   47.185476] 
[   47.187015] CPU: 1 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   47.187051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.187060] Hardware name: Thundercomm Dragonboard 845c (DT)
[   47.187073] Call trace:
[   47.187081]  show_stack+0x20/0x38 (C)
[   47.187104]  dump_stack_lvl+0x8c/0xd0
[   47.187128]  print_report+0x118/0x608
[   47.187149]  kasan_report+0xdc/0x128
[   47.187169]  __asan_report_load1_noabort+0x20/0x30
[   47.187191]  mempool_uaf_helper+0x314/0x340
[   47.187211]  mempool_kmalloc_large_uaf+0xc4/0x120
[   47.187231]  kunit_try_run_case+0x170/0x3f0
[   47.187254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.187277]  kthread+0x328/0x630
[   47.187295]  ret_from_fork+0x10/0x20
[   47.187319] 
[   47.257772] The buggy address belongs to the physical page:
[   47.263423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1167e8
[   47.271538] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.279294] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.286356] page_type: f8(unknown)
[   47.289824] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.297669] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   47.305514] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.313444] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   47.321374] head: 0bfffe0000000002 fffffdffc259fa01 00000000ffffffff 00000000ffffffff
[   47.329305] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   47.337230] page dumped because: kasan: bad access detected
[   47.342880] 
[   47.344412] Memory state around the buggy address:
[   47.349281]  ffff0000967e7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   47.356603]  ffff0000967e7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   47.363926] >ffff0000967e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   47.371239]                    ^
[   47.374531]  ffff0000967e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   47.381852]  ffff0000967e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   47.389173] ==================================================================
[   47.746102] ==================================================================
[   47.757255] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   47.764069] Read of size 1 at addr ffff000095654000 by task kunit_try_catch/331
[   47.771475] 
[   47.773018] CPU: 6 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   47.773056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.773067] Hardware name: Thundercomm Dragonboard 845c (DT)
[   47.773081] Call trace:
[   47.773091]  show_stack+0x20/0x38 (C)
[   47.773113]  dump_stack_lvl+0x8c/0xd0
[   47.773136]  print_report+0x118/0x608
[   47.773157]  kasan_report+0xdc/0x128
[   47.773175]  __asan_report_load1_noabort+0x20/0x30
[   47.773193]  mempool_uaf_helper+0x314/0x340
[   47.773210]  mempool_page_alloc_uaf+0xc0/0x118
[   47.773231]  kunit_try_run_case+0x170/0x3f0
[   47.773251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.773273]  kthread+0x328/0x630
[   47.773288]  ret_from_fork+0x10/0x20
[   47.773308] 
[   47.843473] The buggy address belongs to the physical page:
[   47.849116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115654
[   47.857227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.863852] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   47.871697] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.879530] page dumped because: kasan: bad access detected
[   47.885170] 
[   47.886693] Memory state around the buggy address:
[   47.891550]  ffff000095653f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   47.898857]  ffff000095653f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   47.906169] >ffff000095654000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   47.913476]                    ^
[   47.916755]  ffff000095654080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   47.924062]  ffff000095654100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   47.931373] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   47.401141] ==================================================================
[   47.413056] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   47.420294] Read of size 1 at addr ffff0000875de240 by task kunit_try_catch/329
[   47.427699] 
[   47.429233] CPU: 4 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   47.429271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.429279] Hardware name: Thundercomm Dragonboard 845c (DT)
[   47.429294] Call trace:
[   47.429304]  show_stack+0x20/0x38 (C)
[   47.429324]  dump_stack_lvl+0x8c/0xd0
[   47.429347]  print_report+0x118/0x608
[   47.429367]  kasan_report+0xdc/0x128
[   47.429384]  __asan_report_load1_noabort+0x20/0x30
[   47.429402]  mempool_uaf_helper+0x314/0x340
[   47.429418]  mempool_slab_uaf+0xc0/0x118
[   47.429437]  kunit_try_run_case+0x170/0x3f0
[   47.429458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.429479]  kthread+0x328/0x630
[   47.429495]  ret_from_fork+0x10/0x20
[   47.429514] 
[   47.499155] Allocated by task 329:
[   47.502610]  kasan_save_stack+0x3c/0x68
[   47.506517]  kasan_save_track+0x20/0x40
[   47.510421]  kasan_save_alloc_info+0x40/0x58
[   47.514754]  __kasan_mempool_unpoison_object+0xbc/0x180
[   47.520053]  remove_element+0x16c/0x1f8
[   47.523956]  mempool_alloc_preallocated+0x58/0xc0
[   47.528736]  mempool_uaf_helper+0xa4/0x340
[   47.532896]  mempool_slab_uaf+0xc0/0x118
[   47.536884]  kunit_try_run_case+0x170/0x3f0
[   47.541132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.546694]  kthread+0x328/0x630
[   47.549975]  ret_from_fork+0x10/0x20
[   47.553615] 
[   47.555148] Freed by task 329:
[   47.558253]  kasan_save_stack+0x3c/0x68
[   47.562156]  kasan_save_track+0x20/0x40
[   47.566058]  kasan_save_free_info+0x4c/0x78
[   47.570304]  __kasan_mempool_poison_object+0xc0/0x150
[   47.575430]  mempool_free+0x28c/0x328
[   47.579148]  mempool_uaf_helper+0x104/0x340
[   47.583392]  mempool_slab_uaf+0xc0/0x118
[   47.587380]  kunit_try_run_case+0x170/0x3f0
[   47.591626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.597189]  kthread+0x328/0x630
[   47.600471]  ret_from_fork+0x10/0x20
[   47.604111] 
[   47.605634] The buggy address belongs to the object at ffff0000875de240
[   47.605634]  which belongs to the cache test_cache of size 123
[   47.618198] The buggy address is located 0 bytes inside of
[   47.618198]  freed 123-byte region [ffff0000875de240, ffff0000875de2bb)
[   47.630417] 
[   47.631947] The buggy address belongs to the physical page:
[   47.637591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1075de
[   47.645700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.652311] page_type: f5(slab)
[   47.655509] raw: 0bfffe0000000000 ffff000083322000 dead000000000122 0000000000000000
[   47.663349] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   47.671183] page dumped because: kasan: bad access detected
[   47.676821] 
[   47.678344] Memory state around the buggy address:
[   47.683204]  ffff0000875de100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.690518]  ffff0000875de180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.697830] >ffff0000875de200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   47.705140]                                            ^
[   47.710522]  ffff0000875de280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.717836]  ffff0000875de300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.725146] ==================================================================
[   46.784775] ==================================================================
[   46.796457] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   46.803707] Read of size 1 at addr ffff000080dc0700 by task kunit_try_catch/325
[   46.811118] 
[   46.812658] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   46.812698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.812710] Hardware name: Thundercomm Dragonboard 845c (DT)
[   46.812726] Call trace:
[   46.812735]  show_stack+0x20/0x38 (C)
[   46.812760]  dump_stack_lvl+0x8c/0xd0
[   46.812784]  print_report+0x118/0x608
[   46.812806]  kasan_report+0xdc/0x128
[   46.812826]  __asan_report_load1_noabort+0x20/0x30
[   46.812848]  mempool_uaf_helper+0x314/0x340
[   46.812868]  mempool_kmalloc_uaf+0xc4/0x120
[   46.812886]  kunit_try_run_case+0x170/0x3f0
[   46.812911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.812937]  kthread+0x328/0x630
[   46.812957]  ret_from_fork+0x10/0x20
[   46.812979] 
[   46.882910] Allocated by task 325:
[   46.886373]  kasan_save_stack+0x3c/0x68
[   46.890283]  kasan_save_track+0x20/0x40
[   46.894191]  kasan_save_alloc_info+0x40/0x58
[   46.898528]  __kasan_mempool_unpoison_object+0x11c/0x180
[   46.903923]  remove_element+0x130/0x1f8
[   46.907837]  mempool_alloc_preallocated+0x58/0xc0
[   46.912616]  mempool_uaf_helper+0xa4/0x340
[   46.916785]  mempool_kmalloc_uaf+0xc4/0x120
[   46.921039]  kunit_try_run_case+0x170/0x3f0
[   46.925294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.930867]  kthread+0x328/0x630
[   46.934158]  ret_from_fork+0x10/0x20
[   46.937807] 
[   46.939334] Freed by task 325:
[   46.942449]  kasan_save_stack+0x3c/0x68
[   46.946357]  kasan_save_track+0x20/0x40
[   46.950268]  kasan_save_free_info+0x4c/0x78
[   46.954520]  __kasan_mempool_poison_object+0xc0/0x150
[   46.959659]  mempool_free+0x28c/0x328
[   46.963382]  mempool_uaf_helper+0x104/0x340
[   46.967632]  mempool_kmalloc_uaf+0xc4/0x120
[   46.971884]  kunit_try_run_case+0x170/0x3f0
[   46.976135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.981709]  kthread+0x328/0x630
[   46.984999]  ret_from_fork+0x10/0x20
[   46.988637] 
[   46.990168] The buggy address belongs to the object at ffff000080dc0700
[   46.990168]  which belongs to the cache kmalloc-128 of size 128
[   47.002830] The buggy address is located 0 bytes inside of
[   47.002830]  freed 128-byte region [ffff000080dc0700, ffff000080dc0780)
[   47.015050] 
[   47.016589] The buggy address belongs to the physical page:
[   47.022242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100dc0
[   47.030358] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.038117] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.045179] page_type: f5(slab)
[   47.048389] raw: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122
[   47.056234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.064079] head: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122
[   47.072011] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.079939] head: 0bfffe0000000001 fffffdffc2037001 00000000ffffffff 00000000ffffffff
[   47.087869] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   47.095795] page dumped because: kasan: bad access detected
[   47.101443] 
[   47.102972] Memory state around the buggy address:
[   47.107831]  ffff000080dc0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.115146]  ffff000080dc0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.122471] >ffff000080dc0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.129791]                    ^
[   47.133079]  ffff000080dc0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.140403]  ffff000080dc0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.147715] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   46.485348] ==================================================================
[   46.497787] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   46.505466] Read of size 1 at addr ffff0000875a32bb by task kunit_try_catch/323
[   46.512880] 
[   46.514419] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   46.514450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.514459] Hardware name: Thundercomm Dragonboard 845c (DT)
[   46.514470] Call trace:
[   46.514478]  show_stack+0x20/0x38 (C)
[   46.514498]  dump_stack_lvl+0x8c/0xd0
[   46.514521]  print_report+0x118/0x608
[   46.514542]  kasan_report+0xdc/0x128
[   46.514562]  __asan_report_load1_noabort+0x20/0x30
[   46.514579]  mempool_oob_right_helper+0x2ac/0x2f0
[   46.514599]  mempool_slab_oob_right+0xc0/0x118
[   46.514620]  kunit_try_run_case+0x170/0x3f0
[   46.514642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.514665]  kthread+0x328/0x630
[   46.514680]  ret_from_fork+0x10/0x20
[   46.514700] 
[   46.585419] Allocated by task 323:
[   46.588888]  kasan_save_stack+0x3c/0x68
[   46.592794]  kasan_save_track+0x20/0x40
[   46.596700]  kasan_save_alloc_info+0x40/0x58
[   46.601045]  __kasan_mempool_unpoison_object+0xbc/0x180
[   46.606357]  remove_element+0x16c/0x1f8
[   46.610264]  mempool_alloc_preallocated+0x58/0xc0
[   46.615044]  mempool_oob_right_helper+0x98/0x2f0
[   46.619738]  mempool_slab_oob_right+0xc0/0x118
[   46.624259]  kunit_try_run_case+0x170/0x3f0
[   46.628519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.634088]  kthread+0x328/0x630
[   46.637375]  ret_from_fork+0x10/0x20
[   46.641019] 
[   46.642551] The buggy address belongs to the object at ffff0000875a3240
[   46.642551]  which belongs to the cache test_cache of size 123
[   46.655129] The buggy address is located 0 bytes to the right of
[   46.655129]  allocated 123-byte region [ffff0000875a3240, ffff0000875a32bb)
[   46.668235] 
[   46.669766] The buggy address belongs to the physical page:
[   46.675412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1075a3
[   46.683517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.690134] page_type: f5(slab)
[   46.693336] raw: 0bfffe0000000000 ffff000080e24280 dead000000000122 0000000000000000
[   46.701184] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   46.709027] page dumped because: kasan: bad access detected
[   46.714673] 
[   46.716204] Memory state around the buggy address:
[   46.721064]  ffff0000875a3180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.728379]  ffff0000875a3200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   46.735694] >ffff0000875a3280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   46.743005]                                         ^
[   46.748136]  ffff0000875a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.755452]  ffff0000875a3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.762766] ==================================================================
[   46.241737] ==================================================================
[   46.253661] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   46.261341] Read of size 1 at addr ffff0000967ea001 by task kunit_try_catch/321
[   46.268753] 
[   46.270292] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   46.270325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.270335] Hardware name: Thundercomm Dragonboard 845c (DT)
[   46.270350] Call trace:
[   46.270359]  show_stack+0x20/0x38 (C)
[   46.270380]  dump_stack_lvl+0x8c/0xd0
[   46.270401]  print_report+0x118/0x608
[   46.270422]  kasan_report+0xdc/0x128
[   46.270442]  __asan_report_load1_noabort+0x20/0x30
[   46.270461]  mempool_oob_right_helper+0x2ac/0x2f0
[   46.270481]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   46.270501]  kunit_try_run_case+0x170/0x3f0
[   46.270523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.270547]  kthread+0x328/0x630
[   46.270565]  ret_from_fork+0x10/0x20
[   46.270584] 
[   46.342104] The buggy address belongs to the physical page:
[   46.347752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1167e8
[   46.355866] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.363625] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   46.370687] page_type: f8(unknown)
[   46.374155] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   46.382002] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   46.389847] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   46.397780] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   46.405713] head: 0bfffe0000000002 fffffdffc259fa01 00000000ffffffff 00000000ffffffff
[   46.413644] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   46.421570] page dumped because: kasan: bad access detected
[   46.427217] 
[   46.428745] Memory state around the buggy address:
[   46.433611]  ffff0000967e9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.440934]  ffff0000967e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.448248] >ffff0000967ea000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   46.455562]                    ^
[   46.458842]  ffff0000967ea080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   46.466166]  ffff0000967ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   46.473488] ==================================================================
[   45.912743] ==================================================================
[   45.923800] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   45.931486] Read of size 1 at addr ffff000094709b73 by task kunit_try_catch/319
[   45.938887] 
[   45.940428] CPU: 5 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   45.940464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.940472] Hardware name: Thundercomm Dragonboard 845c (DT)
[   45.940489] Call trace:
[   45.940497]  show_stack+0x20/0x38 (C)
[   45.940520]  dump_stack_lvl+0x8c/0xd0
[   45.940541]  print_report+0x118/0x608
[   45.940562]  kasan_report+0xdc/0x128
[   45.940580]  __asan_report_load1_noabort+0x20/0x30
[   45.940598]  mempool_oob_right_helper+0x2ac/0x2f0
[   45.940615]  mempool_kmalloc_oob_right+0xc4/0x120
[   45.940633]  kunit_try_run_case+0x170/0x3f0
[   45.940705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.940726]  kthread+0x328/0x630
[   45.940741]  ret_from_fork+0x10/0x20
[   45.940759] 
[   46.011698] Allocated by task 319:
[   46.015156]  kasan_save_stack+0x3c/0x68
[   46.019053]  kasan_save_track+0x20/0x40
[   46.022958]  kasan_save_alloc_info+0x40/0x58
[   46.027291]  __kasan_mempool_unpoison_object+0x11c/0x180
[   46.032683]  remove_element+0x130/0x1f8
[   46.036586]  mempool_alloc_preallocated+0x58/0xc0
[   46.041358]  mempool_oob_right_helper+0x98/0x2f0
[   46.046043]  mempool_kmalloc_oob_right+0xc4/0x120
[   46.050816]  kunit_try_run_case+0x170/0x3f0
[   46.055063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.060624]  kthread+0x328/0x630
[   46.063907]  ret_from_fork+0x10/0x20
[   46.067549] 
[   46.069074] The buggy address belongs to the object at ffff000094709b00
[   46.069074]  which belongs to the cache kmalloc-128 of size 128
[   46.081728] The buggy address is located 0 bytes to the right of
[   46.081728]  allocated 115-byte region [ffff000094709b00, ffff000094709b73)
[   46.094818] 
[   46.096352] The buggy address belongs to the physical page:
[   46.101994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114708
[   46.110097] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.117850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   46.124903] page_type: f5(slab)
[   46.128106] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   46.135947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.143786] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   46.151710] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.159632] head: 0bfffe0000000001 fffffdffc251c201 00000000ffffffff 00000000ffffffff
[   46.167556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   46.175478] page dumped because: kasan: bad access detected
[   46.181120] 
[   46.182643] Memory state around the buggy address:
[   46.187503]  ffff000094709a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.194812]  ffff000094709a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.202127] >ffff000094709b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.209438]                                                              ^
[   46.216393]  ffff000094709b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.223707]  ffff000094709c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.231012] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   44.966390] ==================================================================
[   44.977755] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   44.985620] Read of size 1 at addr ffff000083320280 by task kunit_try_catch/313
[   44.993026] 
[   44.994568] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   44.994605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.994614] Hardware name: Thundercomm Dragonboard 845c (DT)
[   44.994631] Call trace:
[   44.994639]  show_stack+0x20/0x38 (C)
[   44.994662]  dump_stack_lvl+0x8c/0xd0
[   44.994686]  print_report+0x118/0x608
[   44.994709]  kasan_report+0xdc/0x128
[   44.994728]  __kasan_check_byte+0x54/0x70
[   44.994750]  kmem_cache_destroy+0x34/0x218
[   44.994773]  kmem_cache_double_destroy+0x174/0x300
[   44.994791]  kunit_try_run_case+0x170/0x3f0
[   44.994815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.994838]  kthread+0x328/0x630
[   44.994858]  ret_from_fork+0x10/0x20
[   44.994879] 
[   45.064534] Allocated by task 313:
[   45.067998]  kasan_save_stack+0x3c/0x68
[   45.071912]  kasan_save_track+0x20/0x40
[   45.075824]  kasan_save_alloc_info+0x40/0x58
[   45.080164]  __kasan_slab_alloc+0xa8/0xb0
[   45.084247]  kmem_cache_alloc_noprof+0x10c/0x398
[   45.088952]  __kmem_cache_create_args+0x178/0x280
[   45.093737]  kmem_cache_double_destroy+0xc0/0x300
[   45.098522]  kunit_try_run_case+0x170/0x3f0
[   45.102780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.108348]  kthread+0x328/0x630
[   45.111643]  ret_from_fork+0x10/0x20
[   45.115281] 
[   45.116809] Freed by task 313:
[   45.119925]  kasan_save_stack+0x3c/0x68
[   45.123836]  kasan_save_track+0x20/0x40
[   45.127747]  kasan_save_free_info+0x4c/0x78
[   45.132001]  __kasan_slab_free+0x6c/0x98
[   45.136000]  kmem_cache_free+0x260/0x468
[   45.139995]  slab_kmem_cache_release+0x38/0x50
[   45.144512]  kmem_cache_release+0x1c/0x30
[   45.148594]  kobject_put+0x17c/0x420
[   45.152236]  sysfs_slab_release+0x1c/0x30
[   45.156317]  kmem_cache_destroy+0x118/0x218
[   45.160572]  kmem_cache_double_destroy+0x128/0x300
[   45.165443]  kunit_try_run_case+0x170/0x3f0
[   45.169698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.175269]  kthread+0x328/0x630
[   45.178564]  ret_from_fork+0x10/0x20
[   45.182203] 
[   45.183739] The buggy address belongs to the object at ffff000083320280
[   45.183739]  which belongs to the cache kmem_cache of size 208
[   45.196312] The buggy address is located 0 bytes inside of
[   45.196312]  freed 208-byte region [ffff000083320280, ffff000083320350)
[   45.208541] 
[   45.210075] The buggy address belongs to the physical page:
[   45.215724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103320
[   45.223832] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   45.231596] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   45.238662] page_type: f5(slab)
[   45.241874] raw: 0bfffe0000000040 ffff000080002000 dead000000000122 0000000000000000
[   45.249721] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   45.257572] head: 0bfffe0000000040 ffff000080002000 dead000000000122 0000000000000000
[   45.265505] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   45.273437] head: 0bfffe0000000001 fffffdffc20cc801 00000000ffffffff 00000000ffffffff
[   45.281372] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   45.289300] page dumped because: kasan: bad access detected
[   45.294952] 
[   45.296487] Memory state around the buggy address:
[   45.301355]  ffff000083320180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.308671]  ffff000083320200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.315987] >ffff000083320280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.323302]                    ^
[   45.326594]  ffff000083320300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   45.333909]  ffff000083320380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.341222] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   44.523252] ==================================================================
[   44.535033] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   44.542284] Read of size 1 at addr ffff000083324000 by task kunit_try_catch/311
[   44.549699] 
[   44.551238] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   44.551275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.551284] Hardware name: Thundercomm Dragonboard 845c (DT)
[   44.551301] Call trace:
[   44.551309]  show_stack+0x20/0x38 (C)
[   44.551335]  dump_stack_lvl+0x8c/0xd0
[   44.551359]  print_report+0x118/0x608
[   44.551382]  kasan_report+0xdc/0x128
[   44.551401]  __asan_report_load1_noabort+0x20/0x30
[   44.551421]  kmem_cache_rcu_uaf+0x388/0x468
[   44.551440]  kunit_try_run_case+0x170/0x3f0
[   44.551465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.551490]  kthread+0x328/0x630
[   44.551509]  ret_from_fork+0x10/0x20
[   44.551531] 
[   44.617225] Allocated by task 311:
[   44.620691]  kasan_save_stack+0x3c/0x68
[   44.624601]  kasan_save_track+0x20/0x40
[   44.628512]  kasan_save_alloc_info+0x40/0x58
[   44.632851]  __kasan_slab_alloc+0xa8/0xb0
[   44.636936]  kmem_cache_alloc_noprof+0x10c/0x398
[   44.641639]  kmem_cache_rcu_uaf+0x12c/0x468
[   44.645896]  kunit_try_run_case+0x170/0x3f0
[   44.650150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.655719]  kthread+0x328/0x630
[   44.659005]  ret_from_fork+0x10/0x20
[   44.662644] 
[   44.664179] Freed by task 0:
[   44.667114]  kasan_save_stack+0x3c/0x68
[   44.671014]  kasan_save_track+0x20/0x40
[   44.674924]  kasan_save_free_info+0x4c/0x78
[   44.679176]  __kasan_slab_free+0x6c/0x98
[   44.683172]  slab_free_after_rcu_debug+0xd4/0x2f8
[   44.687954]  rcu_core+0x9f4/0x1e20
[   44.691429]  rcu_core_si+0x18/0x30
[   44.694896]  handle_softirqs+0x374/0xb28
[   44.698895]  __do_softirq+0x1c/0x28
[   44.702446] 
[   44.703983] Last potentially related work creation:
[   44.708932]  kasan_save_stack+0x3c/0x68
[   44.712842]  kasan_record_aux_stack+0xb4/0xc8
[   44.717270]  kmem_cache_free+0x120/0x468
[   44.721265]  kmem_cache_rcu_uaf+0x16c/0x468
[   44.725521]  kunit_try_run_case+0x170/0x3f0
[   44.729777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.735348]  kthread+0x328/0x630
[   44.738644]  ret_from_fork+0x10/0x20
[   44.742283] 
[   44.743817] The buggy address belongs to the object at ffff000083324000
[   44.743817]  which belongs to the cache test_cache of size 200
[   44.756392] The buggy address is located 0 bytes inside of
[   44.756392]  freed 200-byte region [ffff000083324000, ffff0000833240c8)
[   44.768619] 
[   44.770153] The buggy address belongs to the physical page:
[   44.775800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324
[   44.783909] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.791674] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.798743] page_type: f5(slab)
[   44.801954] raw: 0bfffe0000000040 ffff000083320140 dead000000000122 0000000000000000
[   44.809803] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   44.817651] head: 0bfffe0000000040 ffff000083320140 dead000000000122 0000000000000000
[   44.825586] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   44.833518] head: 0bfffe0000000001 fffffdffc20cc901 00000000ffffffff 00000000ffffffff
[   44.841451] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.849381] page dumped because: kasan: bad access detected
[   44.855034] 
[   44.856568] Memory state around the buggy address:
[   44.861435]  ffff000083323f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   44.868751]  ffff000083323f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   44.876068] >ffff000083324000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.883381]                    ^
[   44.886673]  ffff000083324080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   44.893988]  ffff000083324100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.901301] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   38.747182] ==================================================================
[   38.759443] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   38.767464] Read of size 64 at addr ffff000080acfd04 by task kunit_try_catch/280
[   38.774956] 
[   38.776496] CPU: 3 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   38.776527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.776538] Hardware name: Thundercomm Dragonboard 845c (DT)
[   38.776549] Call trace:
[   38.776556]  show_stack+0x20/0x38 (C)
[   38.776575]  dump_stack_lvl+0x8c/0xd0
[   38.776598]  print_report+0x118/0x608
[   38.776618]  kasan_report+0xdc/0x128
[   38.776640]  kasan_check_range+0x100/0x1a8
[   38.776661]  __asan_memmove+0x3c/0x98
[   38.776677]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   38.776696]  kunit_try_run_case+0x170/0x3f0
[   38.776716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.776738]  kthread+0x328/0x630
[   38.776753]  ret_from_fork+0x10/0x20
[   38.776770] 
[   38.846346] Allocated by task 280:
[   38.849805]  kasan_save_stack+0x3c/0x68
[   38.853716]  kasan_save_track+0x20/0x40
[   38.857627]  kasan_save_alloc_info+0x40/0x58
[   38.861968]  __kasan_kmalloc+0xd4/0xd8
[   38.865789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.870393]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   38.875433]  kunit_try_run_case+0x170/0x3f0
[   38.879685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.885260]  kthread+0x328/0x630
[   38.888551]  ret_from_fork+0x10/0x20
[   38.892189] 
[   38.893720] The buggy address belongs to the object at ffff000080acfd00
[   38.893720]  which belongs to the cache kmalloc-64 of size 64
[   38.906212] The buggy address is located 4 bytes inside of
[   38.906212]  allocated 64-byte region [ffff000080acfd00, ffff000080acfd40)
[   38.918697] 
[   38.920233] The buggy address belongs to the physical page:
[   38.925885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   38.933990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.940614] page_type: f5(slab)
[   38.943818] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   38.951667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.959508] page dumped because: kasan: bad access detected
[   38.965158] 
[   38.966687] Memory state around the buggy address:
[   38.971549]  ffff000080acfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.978866]  ffff000080acfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.986179] >ffff000080acfd00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   38.993501]                                            ^
[   38.998887]  ffff000080acfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.006202]  ffff000080acfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.013515] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   44.107018] ==================================================================
[   44.118706] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   44.125779] Free of addr ffff000083322001 by task kunit_try_catch/309
[   44.132304] 
[   44.133846] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   44.133886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.133896] Hardware name: Thundercomm Dragonboard 845c (DT)
[   44.133911] Call trace:
[   44.133920]  show_stack+0x20/0x38 (C)
[   44.133945]  dump_stack_lvl+0x8c/0xd0
[   44.133969]  print_report+0x118/0x608
[   44.133991]  kasan_report_invalid_free+0xc0/0xe8
[   44.134013]  check_slab_allocation+0xfc/0x108
[   44.134034]  __kasan_slab_pre_free+0x2c/0x48
[   44.134055]  kmem_cache_free+0xf0/0x468
[   44.134078]  kmem_cache_invalid_free+0x184/0x3c8
[   44.134097]  kunit_try_run_case+0x170/0x3f0
[   44.134121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.134147]  kthread+0x328/0x630
[   44.134166]  ret_from_fork+0x10/0x20
[   44.134192] 
[   44.209162] Allocated by task 309:
[   44.212626]  kasan_save_stack+0x3c/0x68
[   44.216538]  kasan_save_track+0x20/0x40
[   44.220447]  kasan_save_alloc_info+0x40/0x58
[   44.224786]  __kasan_slab_alloc+0xa8/0xb0
[   44.228870]  kmem_cache_alloc_noprof+0x10c/0x398
[   44.233570]  kmem_cache_invalid_free+0x12c/0x3c8
[   44.238267]  kunit_try_run_case+0x170/0x3f0
[   44.242519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.248090]  kthread+0x328/0x630
[   44.251382]  ret_from_fork+0x10/0x20
[   44.255021] 
[   44.256557] The buggy address belongs to the object at ffff000083322000
[   44.256557]  which belongs to the cache test_cache of size 200
[   44.269134] The buggy address is located 1 bytes inside of
[   44.269134]  200-byte region [ffff000083322000, ffff0000833220c8)
[   44.280838] 
[   44.282371] The buggy address belongs to the physical page:
[   44.288017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103322
[   44.296138] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.303899] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.310967] page_type: f5(slab)
[   44.314177] raw: 0bfffe0000000040 ffff000083320000 dead000000000122 0000000000000000
[   44.322024] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   44.329871] head: 0bfffe0000000040 ffff000083320000 dead000000000122 0000000000000000
[   44.337807] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   44.345738] head: 0bfffe0000000001 fffffdffc20cc881 00000000ffffffff 00000000ffffffff
[   44.353669] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.361597] page dumped because: kasan: bad access detected
[   44.367247] 
[   44.368784] Memory state around the buggy address:
[   44.373652]  ffff000083321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.380977]  ffff000083321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.388304] >ffff000083322000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.395619]                    ^
[   44.398909]  ffff000083322080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   44.406223]  ffff000083322100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.413534] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   43.732226] ==================================================================
[   43.743204] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   43.750114] Free of addr ffff000080e26000 by task kunit_try_catch/307
[   43.756642] 
[   43.758182] CPU: 2 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   43.758219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.758229] Hardware name: Thundercomm Dragonboard 845c (DT)
[   43.758247] Call trace:
[   43.758256]  show_stack+0x20/0x38 (C)
[   43.758280]  dump_stack_lvl+0x8c/0xd0
[   43.758304]  print_report+0x118/0x608
[   43.758327]  kasan_report_invalid_free+0xc0/0xe8
[   43.758348]  check_slab_allocation+0xd4/0x108
[   43.758370]  __kasan_slab_pre_free+0x2c/0x48
[   43.758391]  kmem_cache_free+0xf0/0x468
[   43.758414]  kmem_cache_double_free+0x190/0x3c8
[   43.758433]  kunit_try_run_case+0x170/0x3f0
[   43.758457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.758481]  kthread+0x328/0x630
[   43.758501]  ret_from_fork+0x10/0x20
[   43.758526] 
[   43.833383] Allocated by task 307:
[   43.836847]  kasan_save_stack+0x3c/0x68
[   43.840760]  kasan_save_track+0x20/0x40
[   43.844670]  kasan_save_alloc_info+0x40/0x58
[   43.849010]  __kasan_slab_alloc+0xa8/0xb0
[   43.853094]  kmem_cache_alloc_noprof+0x10c/0x398
[   43.857794]  kmem_cache_double_free+0x12c/0x3c8
[   43.862404]  kunit_try_run_case+0x170/0x3f0
[   43.866658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.872226]  kthread+0x328/0x630
[   43.875510]  ret_from_fork+0x10/0x20
[   43.879149] 
[   43.880685] Freed by task 307:
[   43.883798]  kasan_save_stack+0x3c/0x68
[   43.887710]  kasan_save_track+0x20/0x40
[   43.891620]  kasan_save_free_info+0x4c/0x78
[   43.895869]  __kasan_slab_free+0x6c/0x98
[   43.899865]  kmem_cache_free+0x260/0x468
[   43.903861]  kmem_cache_double_free+0x140/0x3c8
[   43.908470]  kunit_try_run_case+0x170/0x3f0
[   43.912723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.918299]  kthread+0x328/0x630
[   43.921589]  ret_from_fork+0x10/0x20
[   43.925228] 
[   43.926760] The buggy address belongs to the object at ffff000080e26000
[   43.926760]  which belongs to the cache test_cache of size 200
[   43.939340] The buggy address is located 0 bytes inside of
[   43.939340]  200-byte region [ffff000080e26000, ffff000080e260c8)
[   43.951038] 
[   43.952577] The buggy address belongs to the physical page:
[   43.958228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e26
[   43.966347] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.974110] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.981173] page_type: f5(slab)
[   43.984383] raw: 0bfffe0000000040 ffff000080e24000 dead000000000122 0000000000000000
[   43.992230] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   44.000079] head: 0bfffe0000000040 ffff000080e24000 dead000000000122 0000000000000000
[   44.008010] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   44.015942] head: 0bfffe0000000001 fffffdffc2038981 00000000ffffffff 00000000ffffffff
[   44.023874] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.031801] page dumped because: kasan: bad access detected
[   44.037449] 
[   44.038979] Memory state around the buggy address:
[   44.043840]  ffff000080e25f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.051157]  ffff000080e25f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.058472] >ffff000080e26000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.065795]                    ^
[   44.069084]  ffff000080e26080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   44.076399]  ffff000080e26100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.083713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   43.398781] ==================================================================
[   43.409740] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   43.416539] Read of size 1 at addr ffff0000803c60c8 by task kunit_try_catch/305
[   43.423955] 
[   43.425490] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   43.425520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.425528] Hardware name: Thundercomm Dragonboard 845c (DT)
[   43.425542] Call trace:
[   43.425548]  show_stack+0x20/0x38 (C)
[   43.425567]  dump_stack_lvl+0x8c/0xd0
[   43.425587]  print_report+0x118/0x608
[   43.425606]  kasan_report+0xdc/0x128
[   43.425626]  __asan_report_load1_noabort+0x20/0x30
[   43.425645]  kmem_cache_oob+0x344/0x430
[   43.425662]  kunit_try_run_case+0x170/0x3f0
[   43.425684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.425706]  kthread+0x328/0x630
[   43.425721]  ret_from_fork+0x10/0x20
[   43.425740] 
[   43.491088] Allocated by task 305:
[   43.494555]  kasan_save_stack+0x3c/0x68
[   43.498460]  kasan_save_track+0x20/0x40
[   43.502366]  kasan_save_alloc_info+0x40/0x58
[   43.506711]  __kasan_slab_alloc+0xa8/0xb0
[   43.510788]  kmem_cache_alloc_noprof+0x10c/0x398
[   43.515482]  kmem_cache_oob+0x12c/0x430
[   43.519387]  kunit_try_run_case+0x170/0x3f0
[   43.523648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.529216]  kthread+0x328/0x630
[   43.532503]  ret_from_fork+0x10/0x20
[   43.536148] 
[   43.537678] The buggy address belongs to the object at ffff0000803c6000
[   43.537678]  which belongs to the cache test_cache of size 200
[   43.550255] The buggy address is located 0 bytes to the right of
[   43.550255]  allocated 200-byte region [ffff0000803c6000, ffff0000803c60c8)
[   43.563363] 
[   43.564894] The buggy address belongs to the physical page:
[   43.570539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003c6
[   43.578645] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.586404] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.593461] page_type: f5(slab)
[   43.596661] raw: 0bfffe0000000040 ffff0000803c4000 dead000000000122 0000000000000000
[   43.604508] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   43.612357] head: 0bfffe0000000040 ffff0000803c4000 dead000000000122 0000000000000000
[   43.620291] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   43.628225] head: 0bfffe0000000001 fffffdffc200f181 00000000ffffffff 00000000ffffffff
[   43.636157] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   43.644086] page dumped because: kasan: bad access detected
[   43.649731] 
[   43.651262] Memory state around the buggy address:
[   43.656120]  ffff0000803c5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.663435]  ffff0000803c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.670751] >ffff0000803c6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   43.678063]                                               ^
[   43.683711]  ffff0000803c6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.691027]  ffff0000803c6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.698340] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   43.035976] ==================================================================
[   43.046314] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   43.053115] Read of size 8 at addr ffff000088dd2480 by task kunit_try_catch/298
[   43.060520] 
[   43.062055] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   43.062085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.062095] Hardware name: Thundercomm Dragonboard 845c (DT)
[   43.062108] Call trace:
[   43.062116]  show_stack+0x20/0x38 (C)
[   43.062135]  dump_stack_lvl+0x8c/0xd0
[   43.062156]  print_report+0x118/0x608
[   43.062177]  kasan_report+0xdc/0x128
[   43.062196]  __asan_report_load8_noabort+0x20/0x30
[   43.062216]  workqueue_uaf+0x480/0x4a8
[   43.062234]  kunit_try_run_case+0x170/0x3f0
[   43.062256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.062278]  kthread+0x328/0x630
[   43.062293]  ret_from_fork+0x10/0x20
[   43.062311] 
[   43.127591] Allocated by task 298:
[   43.131054]  kasan_save_stack+0x3c/0x68
[   43.134964]  kasan_save_track+0x20/0x40
[   43.138874]  kasan_save_alloc_info+0x40/0x58
[   43.143219]  __kasan_kmalloc+0xd4/0xd8
[   43.147033]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.151639]  workqueue_uaf+0x13c/0x4a8
[   43.155450]  kunit_try_run_case+0x170/0x3f0
[   43.159702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.165277]  kthread+0x328/0x630
[   43.168568]  ret_from_fork+0x10/0x20
[   43.172207] 
[   43.173737] Freed by task 63:
[   43.176764]  kasan_save_stack+0x3c/0x68
[   43.180673]  kasan_save_track+0x20/0x40
[   43.184583]  kasan_save_free_info+0x4c/0x78
[   43.188833]  __kasan_slab_free+0x6c/0x98
[   43.192831]  kfree+0x214/0x3c8
[   43.195949]  workqueue_uaf_work+0x18/0x30
[   43.200031]  process_one_work+0x530/0xf98
[   43.204116]  worker_thread+0x618/0xf38
[   43.207936]  kthread+0x328/0x630
[   43.211230]  ret_from_fork+0x10/0x20
[   43.214871] 
[   43.216406] Last potentially related work creation:
[   43.221353]  kasan_save_stack+0x3c/0x68
[   43.225265]  kasan_record_aux_stack+0xb4/0xc8
[   43.229691]  __queue_work+0x65c/0xfe0
[   43.233415]  queue_work_on+0xbc/0xf8
[   43.237054]  workqueue_uaf+0x210/0x4a8
[   43.240875]  kunit_try_run_case+0x170/0x3f0
[   43.245130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.250705]  kthread+0x328/0x630
[   43.253995]  ret_from_fork+0x10/0x20
[   43.257635] 
[   43.259163] The buggy address belongs to the object at ffff000088dd2480
[   43.259163]  which belongs to the cache kmalloc-32 of size 32
[   43.271653] The buggy address is located 0 bytes inside of
[   43.271653]  freed 32-byte region [ffff000088dd2480, ffff000088dd24a0)
[   43.283791] 
[   43.285320] The buggy address belongs to the physical page:
[   43.290971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dd2
[   43.299085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.305698] page_type: f5(slab)
[   43.308902] raw: 0bfffe0000000000 ffff000080002780 dead000000000100 dead000000000122
[   43.316747] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   43.324589] page dumped because: kasan: bad access detected
[   43.330240] 
[   43.331776] Memory state around the buggy address:
[   43.336640]  ffff000088dd2380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.343954]  ffff000088dd2400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.351271] >ffff000088dd2480: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc
[   43.358587]                    ^
[   43.361876]  ffff000088dd2500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.369191]  ffff000088dd2580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.376512] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   42.627232] ==================================================================
[   42.637742] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   42.644542] Read of size 4 at addr ffff0000829a85c0 by task swapper/3/0
[   42.651244] 
[   42.652777] CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   42.652807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.652817] Hardware name: Thundercomm Dragonboard 845c (DT)
[   42.652830] Call trace:
[   42.652837]  show_stack+0x20/0x38 (C)
[   42.652855]  dump_stack_lvl+0x8c/0xd0
[   42.652875]  print_report+0x118/0x608
[   42.652895]  kasan_report+0xdc/0x128
[   42.652913]  __asan_report_load4_noabort+0x20/0x30
[   42.652932]  rcu_uaf_reclaim+0x64/0x70
[   42.652949]  rcu_core+0x9f4/0x1e20
[   42.652971]  rcu_core_si+0x18/0x30
[   42.652989]  handle_softirqs+0x374/0xb28
[   42.653011]  __do_softirq+0x1c/0x28
[   42.653027]  ____do_softirq+0x18/0x30
[   42.653044]  call_on_irq_stack+0x24/0x30
[   42.653063]  do_softirq_own_stack+0x24/0x38
[   42.653082]  __irq_exit_rcu+0x1fc/0x318
[   42.653099]  irq_exit_rcu+0x1c/0x80
[   42.653116]  el1_interrupt+0x38/0x58
[   42.653138]  el1h_64_irq_handler+0x18/0x28
[   42.653160]  el1h_64_irq+0x6c/0x70
[   42.653176]  arch_local_irq_enable+0x4/0x8 (P)
[   42.653199]  cpuidle_enter+0x60/0xb8
[   42.653217]  do_idle+0x36c/0x4e8
[   42.653238]  cpu_startup_entry+0x64/0x80
[   42.653260]  secondary_start_kernel+0x288/0x340
[   42.653281]  __secondary_switched+0xc0/0xc8
[   42.653306] 
[   42.770292] Allocated by task 296:
[   42.773751]  kasan_save_stack+0x3c/0x68
[   42.777662]  kasan_save_track+0x20/0x40
[   42.781563]  kasan_save_alloc_info+0x40/0x58
[   42.785901]  __kasan_kmalloc+0xd4/0xd8
[   42.789725]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.794337]  rcu_uaf+0xb0/0x2d8
[   42.797542]  kunit_try_run_case+0x170/0x3f0
[   42.801798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.807370]  kthread+0x328/0x630
[   42.810665]  ret_from_fork+0x10/0x20
[   42.814305] 
[   42.815838] Freed by task 0:
[   42.818775]  kasan_save_stack+0x3c/0x68
[   42.822687]  kasan_save_track+0x20/0x40
[   42.826597]  kasan_save_free_info+0x4c/0x78
[   42.830850]  __kasan_slab_free+0x6c/0x98
[   42.834846]  kfree+0x214/0x3c8
[   42.837965]  rcu_uaf_reclaim+0x28/0x70
[   42.841784]  rcu_core+0x9f4/0x1e20
[   42.845252]  rcu_core_si+0x18/0x30
[   42.848718]  handle_softirqs+0x374/0xb28
[   42.852715]  __do_softirq+0x1c/0x28
[   42.856265] 
[   42.857795] Last potentially related work creation:
[   42.862743]  kasan_save_stack+0x3c/0x68
[   42.866652]  kasan_record_aux_stack+0xb4/0xc8
[   42.871077]  __call_rcu_common.constprop.0+0x74/0x8c8
[   42.876212]  call_rcu+0x18/0x30
[   42.879421]  rcu_uaf+0x14c/0x2d8
[   42.882716]  kunit_try_run_case+0x170/0x3f0
[   42.886970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.892540]  kthread+0x328/0x630
[   42.895832]  ret_from_fork+0x10/0x20
[   42.899475] 
[   42.901002] The buggy address belongs to the object at ffff0000829a85c0
[   42.901002]  which belongs to the cache kmalloc-32 of size 32
[   42.913483] The buggy address is located 0 bytes inside of
[   42.913483]  freed 32-byte region [ffff0000829a85c0, ffff0000829a85e0)
[   42.925624] 
[   42.927152] The buggy address belongs to the physical page:
[   42.932800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a8
[   42.940905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.947520] page_type: f5(slab)
[   42.950728] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000
[   42.958575] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   42.966417] page dumped because: kasan: bad access detected
[   42.972061] 
[   42.973592] Memory state around the buggy address:
[   42.978454]  ffff0000829a8480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   42.985768]  ffff0000829a8500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   42.993082] >ffff0000829a8580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.000397]                                            ^
[   43.005790]  ffff0000829a8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.013105]  ffff0000829a8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.020418] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   41.553421] ==================================================================
[   41.565067] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   41.571514] Read of size 1 at addr ffff0000822c2a00 by task kunit_try_catch/294
[   41.578926] 
[   41.580463] CPU: 3 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   41.580493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.580502] Hardware name: Thundercomm Dragonboard 845c (DT)
[   41.580514] Call trace:
[   41.580522]  show_stack+0x20/0x38 (C)
[   41.580541]  dump_stack_lvl+0x8c/0xd0
[   41.580560]  print_report+0x118/0x608
[   41.580579]  kasan_report+0xdc/0x128
[   41.580599]  __kasan_check_byte+0x54/0x70
[   41.580619]  ksize+0x30/0x88
[   41.580639]  ksize_uaf+0x168/0x5f8
[   41.580655]  kunit_try_run_case+0x170/0x3f0
[   41.580675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.580698]  kthread+0x328/0x630
[   41.580714]  ret_from_fork+0x10/0x20
[   41.580732] 
[   41.647781] Allocated by task 294:
[   41.651245]  kasan_save_stack+0x3c/0x68
[   41.655148]  kasan_save_track+0x20/0x40
[   41.659058]  kasan_save_alloc_info+0x40/0x58
[   41.663396]  __kasan_kmalloc+0xd4/0xd8
[   41.667219]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.671828]  ksize_uaf+0xb8/0x5f8
[   41.675211]  kunit_try_run_case+0x170/0x3f0
[   41.679467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.685038]  kthread+0x328/0x630
[   41.688331]  ret_from_fork+0x10/0x20
[   41.691971] 
[   41.693500] Freed by task 294:
[   41.696613]  kasan_save_stack+0x3c/0x68
[   41.700525]  kasan_save_track+0x20/0x40
[   41.704434]  kasan_save_free_info+0x4c/0x78
[   41.708689]  __kasan_slab_free+0x6c/0x98
[   41.712686]  kfree+0x214/0x3c8
[   41.715806]  ksize_uaf+0x11c/0x5f8
[   41.719272]  kunit_try_run_case+0x170/0x3f0
[   41.723526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.729097]  kthread+0x328/0x630
[   41.732389]  ret_from_fork+0x10/0x20
[   41.736029] 
[   41.737558] The buggy address belongs to the object at ffff0000822c2a00
[   41.737558]  which belongs to the cache kmalloc-128 of size 128
[   41.750214] The buggy address is located 0 bytes inside of
[   41.750214]  freed 128-byte region [ffff0000822c2a00, ffff0000822c2a80)
[   41.762440] 
[   41.763977] The buggy address belongs to the physical page:
[   41.769629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   41.777735] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.785494] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.792550] page_type: f5(slab)
[   41.795755] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.803601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.811449] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.819382] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.827315] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   41.835248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   41.843173] page dumped because: kasan: bad access detected
[   41.848821] 
[   41.850350] Memory state around the buggy address:
[   41.855211]  ffff0000822c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   41.862527]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.869843] >ffff0000822c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   41.877157]                    ^
[   41.880446]  ffff0000822c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.887760]  ffff0000822c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.895075] ==================================================================
[   41.902448] ==================================================================
[   41.909763] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   41.916203] Read of size 1 at addr ffff0000822c2a00 by task kunit_try_catch/294
[   41.923618] 
[   41.925149] CPU: 3 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   41.925179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.925189] Hardware name: Thundercomm Dragonboard 845c (DT)
[   41.925200] Call trace:
[   41.925207]  show_stack+0x20/0x38 (C)
[   41.925225]  dump_stack_lvl+0x8c/0xd0
[   41.925246]  print_report+0x118/0x608
[   41.925265]  kasan_report+0xdc/0x128
[   41.925286]  __asan_report_load1_noabort+0x20/0x30
[   41.925305]  ksize_uaf+0x598/0x5f8
[   41.925323]  kunit_try_run_case+0x170/0x3f0
[   41.925341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.925365]  kthread+0x328/0x630
[   41.925380]  ret_from_fork+0x10/0x20
[   41.925399] 
[   41.990316] Allocated by task 294:
[   41.993778]  kasan_save_stack+0x3c/0x68
[   41.997689]  kasan_save_track+0x20/0x40
[   42.001599]  kasan_save_alloc_info+0x40/0x58
[   42.005939]  __kasan_kmalloc+0xd4/0xd8
[   42.009762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.014363]  ksize_uaf+0xb8/0x5f8
[   42.017743]  kunit_try_run_case+0x170/0x3f0
[   42.021999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.027569]  kthread+0x328/0x630
[   42.030854]  ret_from_fork+0x10/0x20
[   42.034492] 
[   42.036026] Freed by task 294:
[   42.039132]  kasan_save_stack+0x3c/0x68
[   42.043042]  kasan_save_track+0x20/0x40
[   42.046952]  kasan_save_free_info+0x4c/0x78
[   42.051201]  __kasan_slab_free+0x6c/0x98
[   42.055197]  kfree+0x214/0x3c8
[   42.058309]  ksize_uaf+0x11c/0x5f8
[   42.061776]  kunit_try_run_case+0x170/0x3f0
[   42.066031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.071601]  kthread+0x328/0x630
[   42.074885]  ret_from_fork+0x10/0x20
[   42.078523] 
[   42.080056] The buggy address belongs to the object at ffff0000822c2a00
[   42.080056]  which belongs to the cache kmalloc-128 of size 128
[   42.092723] The buggy address is located 0 bytes inside of
[   42.092723]  freed 128-byte region [ffff0000822c2a00, ffff0000822c2a80)
[   42.104949] 
[   42.106479] The buggy address belongs to the physical page:
[   42.112122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   42.120227] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.127984] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.135045] page_type: f5(slab)
[   42.138248] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   42.146096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   42.153940] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   42.161874] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   42.169807] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   42.177740] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   42.185668] page dumped because: kasan: bad access detected
[   42.191317] 
[   42.192844] Memory state around the buggy address:
[   42.197708]  ffff0000822c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   42.205022]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.212338] >ffff0000822c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   42.219650]                    ^
[   42.222930]  ffff0000822c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.230244]  ffff0000822c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.237556] ==================================================================
[   42.245727] ==================================================================
[   42.253057] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   42.259504] Read of size 1 at addr ffff0000822c2a78 by task kunit_try_catch/294
[   42.266907] 
[   42.268442] CPU: 4 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   42.268472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.268482] Hardware name: Thundercomm Dragonboard 845c (DT)
[   42.268493] Call trace:
[   42.268499]  show_stack+0x20/0x38 (C)
[   42.268517]  dump_stack_lvl+0x8c/0xd0
[   42.268537]  print_report+0x118/0x608
[   42.268555]  kasan_report+0xdc/0x128
[   42.268574]  __asan_report_load1_noabort+0x20/0x30
[   42.268590]  ksize_uaf+0x544/0x5f8
[   42.268606]  kunit_try_run_case+0x170/0x3f0
[   42.268624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.268644]  kthread+0x328/0x630
[   42.268658]  ret_from_fork+0x10/0x20
[   42.268675] 
[   42.333535] Allocated by task 294:
[   42.336989]  kasan_save_stack+0x3c/0x68
[   42.340895]  kasan_save_track+0x20/0x40
[   42.344800]  kasan_save_alloc_info+0x40/0x58
[   42.349135]  __kasan_kmalloc+0xd4/0xd8
[   42.352950]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.357547]  ksize_uaf+0xb8/0x5f8
[   42.360919]  kunit_try_run_case+0x170/0x3f0
[   42.365168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.370735]  kthread+0x328/0x630
[   42.374018]  ret_from_fork+0x10/0x20
[   42.377649] 
[   42.379181] Freed by task 294:
[   42.382287]  kasan_save_stack+0x3c/0x68
[   42.386192]  kasan_save_track+0x20/0x40
[   42.390096]  kasan_save_free_info+0x4c/0x78
[   42.394344]  __kasan_slab_free+0x6c/0x98
[   42.398335]  kfree+0x214/0x3c8
[   42.401444]  ksize_uaf+0x11c/0x5f8
[   42.404901]  kunit_try_run_case+0x170/0x3f0
[   42.409151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.414716]  kthread+0x328/0x630
[   42.417998]  ret_from_fork+0x10/0x20
[   42.421629] 
[   42.423161] The buggy address belongs to the object at ffff0000822c2a00
[   42.423161]  which belongs to the cache kmalloc-128 of size 128
[   42.435811] The buggy address is located 120 bytes inside of
[   42.435811]  freed 128-byte region [ffff0000822c2a00, ffff0000822c2a80)
[   42.448207] 
[   42.449731] The buggy address belongs to the physical page:
[   42.455372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   42.463471] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.471225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.478275] page_type: f5(slab)
[   42.481471] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   42.489314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   42.497155] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   42.505083] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   42.513010] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   42.520936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   42.528859] page dumped because: kasan: bad access detected
[   42.534503] 
[   42.536032] Memory state around the buggy address:
[   42.540883]  ffff0000822c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   42.548199]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.555514] >ffff0000822c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   42.562821]                                                                 ^
[   42.570038]  ffff0000822c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.577343]  ffff0000822c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.584657] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   40.935436] ==================================================================
[   40.942752] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   40.950250] Read of size 1 at addr ffff0000822c2978 by task kunit_try_catch/292
[   40.957663] 
[   40.959195] CPU: 3 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   40.959227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.959235] Hardware name: Thundercomm Dragonboard 845c (DT)
[   40.959246] Call trace:
[   40.959254]  show_stack+0x20/0x38 (C)
[   40.959272]  dump_stack_lvl+0x8c/0xd0
[   40.959291]  print_report+0x118/0x608
[   40.959310]  kasan_report+0xdc/0x128
[   40.959330]  __asan_report_load1_noabort+0x20/0x30
[   40.959350]  ksize_unpoisons_memory+0x618/0x740
[   40.959369]  kunit_try_run_case+0x170/0x3f0
[   40.959389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.959413]  kthread+0x328/0x630
[   40.959428]  ret_from_fork+0x10/0x20
[   40.959445] 
[   41.025494] Allocated by task 292:
[   41.028954]  kasan_save_stack+0x3c/0x68
[   41.032865]  kasan_save_track+0x20/0x40
[   41.036775]  kasan_save_alloc_info+0x40/0x58
[   41.041114]  __kasan_kmalloc+0xd4/0xd8
[   41.044938]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.049550]  ksize_unpoisons_memory+0xc0/0x740
[   41.054074]  kunit_try_run_case+0x170/0x3f0
[   41.058330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.063899]  kthread+0x328/0x630
[   41.067183]  ret_from_fork+0x10/0x20
[   41.070824] 
[   41.072358] The buggy address belongs to the object at ffff0000822c2900
[   41.072358]  which belongs to the cache kmalloc-128 of size 128
[   41.085025] The buggy address is located 5 bytes to the right of
[   41.085025]  allocated 115-byte region [ffff0000822c2900, ffff0000822c2973)
[   41.098122] 
[   41.099659] The buggy address belongs to the physical page:
[   41.105307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   41.113421] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.121179] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.128236] page_type: f5(slab)
[   41.131443] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.139291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.147138] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.155070] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.163003] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   41.170936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   41.178864] page dumped because: kasan: bad access detected
[   41.184508] 
[   41.186037] Memory state around the buggy address:
[   41.190901]  ffff0000822c2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   41.198215]  ffff0000822c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.205530] >ffff0000822c2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   41.212852]                                                                 ^
[   41.220078]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.227395]  ffff0000822c2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.234710] ==================================================================
[   41.242897] ==================================================================
[   41.250217] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   41.257718] Read of size 1 at addr ffff0000822c297f by task kunit_try_catch/292
[   41.265119] 
[   41.266648] CPU: 5 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   41.266679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.266688] Hardware name: Thundercomm Dragonboard 845c (DT)
[   41.266698] Call trace:
[   41.266703]  show_stack+0x20/0x38 (C)
[   41.266723]  dump_stack_lvl+0x8c/0xd0
[   41.266741]  print_report+0x118/0x608
[   41.266758]  kasan_report+0xdc/0x128
[   41.266776]  __asan_report_load1_noabort+0x20/0x30
[   41.266792]  ksize_unpoisons_memory+0x690/0x740
[   41.266810]  kunit_try_run_case+0x170/0x3f0
[   41.266828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.266848]  kthread+0x328/0x630
[   41.266862]  ret_from_fork+0x10/0x20
[   41.266879] 
[   41.332875] Allocated by task 292:
[   41.336331]  kasan_save_stack+0x3c/0x68
[   41.340229]  kasan_save_track+0x20/0x40
[   41.344126]  kasan_save_alloc_info+0x40/0x58
[   41.348462]  __kasan_kmalloc+0xd4/0xd8
[   41.352269]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.356868]  ksize_unpoisons_memory+0xc0/0x740
[   41.361383]  kunit_try_run_case+0x170/0x3f0
[   41.365633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.371199]  kthread+0x328/0x630
[   41.374484]  ret_from_fork+0x10/0x20
[   41.378117] 
[   41.379648] The buggy address belongs to the object at ffff0000822c2900
[   41.379648]  which belongs to the cache kmalloc-128 of size 128
[   41.392295] The buggy address is located 12 bytes to the right of
[   41.392295]  allocated 115-byte region [ffff0000822c2900, ffff0000822c2973)
[   41.405477] 
[   41.407001] The buggy address belongs to the physical page:
[   41.412643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   41.420746] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.428491] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.435541] page_type: f5(slab)
[   41.438741] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.446586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.454431] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.462360] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.470289] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   41.478218] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   41.486143] page dumped because: kasan: bad access detected
[   41.491785] 
[   41.493306] Memory state around the buggy address:
[   41.498160]  ffff0000822c2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   41.505470]  ffff0000822c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.512778] >ffff0000822c2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   41.520085]                                                                 ^
[   41.527304]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.534616]  ffff0000822c2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.541921] ==================================================================
[   40.624767] ==================================================================
[   40.636332] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   40.643835] Read of size 1 at addr ffff0000822c2973 by task kunit_try_catch/292
[   40.651246] 
[   40.652788] CPU: 3 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   40.652819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.652828] Hardware name: Thundercomm Dragonboard 845c (DT)
[   40.652840] Call trace:
[   40.652848]  show_stack+0x20/0x38 (C)
[   40.652866]  dump_stack_lvl+0x8c/0xd0
[   40.652886]  print_report+0x118/0x608
[   40.652906]  kasan_report+0xdc/0x128
[   40.652926]  __asan_report_load1_noabort+0x20/0x30
[   40.652944]  ksize_unpoisons_memory+0x628/0x740
[   40.652963]  kunit_try_run_case+0x170/0x3f0
[   40.652984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.653006]  kthread+0x328/0x630
[   40.653022]  ret_from_fork+0x10/0x20
[   40.653039] 
[   40.719100] Allocated by task 292:
[   40.722560]  kasan_save_stack+0x3c/0x68
[   40.726470]  kasan_save_track+0x20/0x40
[   40.730380]  kasan_save_alloc_info+0x40/0x58
[   40.734720]  __kasan_kmalloc+0xd4/0xd8
[   40.738542]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.743151]  ksize_unpoisons_memory+0xc0/0x740
[   40.747675]  kunit_try_run_case+0x170/0x3f0
[   40.751934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.757508]  kthread+0x328/0x630
[   40.760797]  ret_from_fork+0x10/0x20
[   40.764435] 
[   40.765965] The buggy address belongs to the object at ffff0000822c2900
[   40.765965]  which belongs to the cache kmalloc-128 of size 128
[   40.778627] The buggy address is located 0 bytes to the right of
[   40.778627]  allocated 115-byte region [ffff0000822c2900, ffff0000822c2973)
[   40.791729] 
[   40.793256] The buggy address belongs to the physical page:
[   40.798905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   40.807016] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.814772] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.821829] page_type: f5(slab)
[   40.825033] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   40.832877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.840721] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   40.848652] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.856582] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   40.864513] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   40.872439] page dumped because: kasan: bad access detected
[   40.878088] 
[   40.879624] Memory state around the buggy address:
[   40.884483]  ffff0000822c2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   40.891807]  ffff0000822c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.899121] >ffff0000822c2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   40.906444]                                                              ^
[   40.913408]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.920733]  ffff0000822c2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.928053] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   40.298266] ==================================================================
[   40.305578] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   40.311670] Free of addr ffff0000946612e0 by task kunit_try_catch/290
[   40.318195] 
[   40.319725] CPU: 5 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   40.319753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.319761] Hardware name: Thundercomm Dragonboard 845c (DT)
[   40.319771] Call trace:
[   40.319776]  show_stack+0x20/0x38 (C)
[   40.319793]  dump_stack_lvl+0x8c/0xd0
[   40.319812]  print_report+0x118/0x608
[   40.319830]  kasan_report_invalid_free+0xc0/0xe8
[   40.319849]  check_slab_allocation+0xd4/0x108
[   40.319867]  __kasan_slab_pre_free+0x2c/0x48
[   40.319885]  kfree+0xe8/0x3c8
[   40.319899]  kfree_sensitive+0x3c/0xb0
[   40.319915]  kmalloc_double_kzfree+0x168/0x308
[   40.319932]  kunit_try_run_case+0x170/0x3f0
[   40.319950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.319970]  kthread+0x328/0x630
[   40.319983]  ret_from_fork+0x10/0x20
[   40.319999] 
[   40.397639] Allocated by task 290:
[   40.401089]  kasan_save_stack+0x3c/0x68
[   40.404993]  kasan_save_track+0x20/0x40
[   40.408898]  kasan_save_alloc_info+0x40/0x58
[   40.413230]  __kasan_kmalloc+0xd4/0xd8
[   40.417043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.421640]  kmalloc_double_kzfree+0xb8/0x308
[   40.426060]  kunit_try_run_case+0x170/0x3f0
[   40.430306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.435875]  kthread+0x328/0x630
[   40.439158]  ret_from_fork+0x10/0x20
[   40.442790] 
[   40.444319] Freed by task 290:
[   40.447421]  kasan_save_stack+0x3c/0x68
[   40.451322]  kasan_save_track+0x20/0x40
[   40.455225]  kasan_save_free_info+0x4c/0x78
[   40.459467]  __kasan_slab_free+0x6c/0x98
[   40.463455]  kfree+0x214/0x3c8
[   40.466567]  kfree_sensitive+0x80/0xb0
[   40.470380]  kmalloc_double_kzfree+0x11c/0x308
[   40.474888]  kunit_try_run_case+0x170/0x3f0
[   40.479134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.484693]  kthread+0x328/0x630
[   40.487973]  ret_from_fork+0x10/0x20
[   40.491613] 
[   40.493135] The buggy address belongs to the object at ffff0000946612e0
[   40.493135]  which belongs to the cache kmalloc-16 of size 16
[   40.505616] The buggy address is located 0 bytes inside of
[   40.505616]  16-byte region [ffff0000946612e0, ffff0000946612f0)
[   40.517223] 
[   40.518747] The buggy address belongs to the physical page:
[   40.524391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114661
[   40.532498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.539107] page_type: f5(slab)
[   40.542302] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   40.550139] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.557968] page dumped because: kasan: bad access detected
[   40.563613] 
[   40.565136] Memory state around the buggy address:
[   40.569995]  ffff000094661180: fa fb fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   40.577306]  ffff000094661200: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.584615] >ffff000094661280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.591927]                                                        ^
[   40.598364]  ffff000094661300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.605675]  ffff000094661380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.612985] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   31.517559] ==================================================================
[   31.532795] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   31.539242] Read of size 1 at addr ffff000095140000 by task kunit_try_catch/252
[   31.546646] 
[   31.548186] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   31.548215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.548224] Hardware name: Thundercomm Dragonboard 845c (DT)
[   31.548235] Call trace:
[   31.548242]  show_stack+0x20/0x38 (C)
[   31.548261]  dump_stack_lvl+0x8c/0xd0
[   31.548282]  print_report+0x118/0x608
[   31.548302]  kasan_report+0xdc/0x128
[   31.548321]  __asan_report_load1_noabort+0x20/0x30
[   31.548338]  page_alloc_uaf+0x328/0x350
[   31.548357]  kunit_try_run_case+0x170/0x3f0
[   31.548376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.548399]  kthread+0x328/0x630
[   31.548414]  ret_from_fork+0x10/0x20
[   31.548431] 
[   31.613780] The buggy address belongs to the physical page:
[   31.619426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115140
[   31.627538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.634154] page_type: f0(buddy)
[   31.637447] raw: 0bfffe0000000000 ffff0000fd587e70 ffff0000fd587e70 0000000000000000
[   31.645293] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   31.653134] page dumped because: kasan: bad access detected
[   31.658784] 
[   31.660321] Memory state around the buggy address:
[   31.665186]  ffff00009513ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.672499]  ffff00009513ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.679814] >ffff000095140000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.687126]                    ^
[   31.690417]  ffff000095140080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.697730]  ffff000095140100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.705050] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   39.974708] ==================================================================
[   39.989344] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   39.996846] Read of size 1 at addr ffff0000946612e0 by task kunit_try_catch/290
[   40.004255] 
[   40.005784] CPU: 5 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   40.005814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.005823] Hardware name: Thundercomm Dragonboard 845c (DT)
[   40.005835] Call trace:
[   40.005841]  show_stack+0x20/0x38 (C)
[   40.005859]  dump_stack_lvl+0x8c/0xd0
[   40.005878]  print_report+0x118/0x608
[   40.005898]  kasan_report+0xdc/0x128
[   40.005915]  __kasan_check_byte+0x54/0x70
[   40.005934]  kfree_sensitive+0x30/0xb0
[   40.005954]  kmalloc_double_kzfree+0x168/0x308
[   40.005973]  kunit_try_run_case+0x170/0x3f0
[   40.005993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.006013]  kthread+0x328/0x630
[   40.006028]  ret_from_fork+0x10/0x20
[   40.006045] 
[   40.074972] Allocated by task 290:
[   40.078427]  kasan_save_stack+0x3c/0x68
[   40.082335]  kasan_save_track+0x20/0x40
[   40.086239]  kasan_save_alloc_info+0x40/0x58
[   40.090574]  __kasan_kmalloc+0xd4/0xd8
[   40.094389]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.098987]  kmalloc_double_kzfree+0xb8/0x308
[   40.103406]  kunit_try_run_case+0x170/0x3f0
[   40.107655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.113220]  kthread+0x328/0x630
[   40.116500]  ret_from_fork+0x10/0x20
[   40.120131] 
[   40.121654] Freed by task 290:
[   40.124757]  kasan_save_stack+0x3c/0x68
[   40.128662]  kasan_save_track+0x20/0x40
[   40.132565]  kasan_save_free_info+0x4c/0x78
[   40.136813]  __kasan_slab_free+0x6c/0x98
[   40.140803]  kfree+0x214/0x3c8
[   40.143912]  kfree_sensitive+0x80/0xb0
[   40.147725]  kmalloc_double_kzfree+0x11c/0x308
[   40.152236]  kunit_try_run_case+0x170/0x3f0
[   40.156485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.162050]  kthread+0x328/0x630
[   40.165331]  ret_from_fork+0x10/0x20
[   40.168970] 
[   40.170494] The buggy address belongs to the object at ffff0000946612e0
[   40.170494]  which belongs to the cache kmalloc-16 of size 16
[   40.182974] The buggy address is located 0 bytes inside of
[   40.182974]  freed 16-byte region [ffff0000946612e0, ffff0000946612f0)
[   40.195106] 
[   40.196637] The buggy address belongs to the physical page:
[   40.202279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114661
[   40.210379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.216990] page_type: f5(slab)
[   40.220187] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   40.228028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.235863] page dumped because: kasan: bad access detected
[   40.241505] 
[   40.243037] Memory state around the buggy address:
[   40.247897]  ffff000094661180: fa fb fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   40.255206]  ffff000094661200: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.262511] >ffff000094661280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.269823]                                                        ^
[   40.276258]  ffff000094661300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.283572]  ffff000094661380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.290878] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   39.654659] ==================================================================
[   39.665960] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   39.672668] Read of size 1 at addr ffff0000948a0f28 by task kunit_try_catch/286
[   39.680078] 
[   39.681612] CPU: 2 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   39.681641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.681650] Hardware name: Thundercomm Dragonboard 845c (DT)
[   39.681662] Call trace:
[   39.681669]  show_stack+0x20/0x38 (C)
[   39.681688]  dump_stack_lvl+0x8c/0xd0
[   39.681708]  print_report+0x118/0x608
[   39.681728]  kasan_report+0xdc/0x128
[   39.681746]  __asan_report_load1_noabort+0x20/0x30
[   39.681766]  kmalloc_uaf2+0x3f4/0x468
[   39.681782]  kunit_try_run_case+0x170/0x3f0
[   39.681802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.681823]  kthread+0x328/0x630
[   39.681840]  ret_from_fork+0x10/0x20
[   39.681858] 
[   39.747036] Allocated by task 286:
[   39.750500]  kasan_save_stack+0x3c/0x68
[   39.754403]  kasan_save_track+0x20/0x40
[   39.758306]  kasan_save_alloc_info+0x40/0x58
[   39.762649]  __kasan_kmalloc+0xd4/0xd8
[   39.766464]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.771067]  kmalloc_uaf2+0xc4/0x468
[   39.774710]  kunit_try_run_case+0x170/0x3f0
[   39.778967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.784542]  kthread+0x328/0x630
[   39.787836]  ret_from_fork+0x10/0x20
[   39.791476] 
[   39.793007] Freed by task 286:
[   39.796111]  kasan_save_stack+0x3c/0x68
[   39.800013]  kasan_save_track+0x20/0x40
[   39.803916]  kasan_save_free_info+0x4c/0x78
[   39.808171]  __kasan_slab_free+0x6c/0x98
[   39.812160]  kfree+0x214/0x3c8
[   39.815272]  kmalloc_uaf2+0x134/0x468
[   39.819000]  kunit_try_run_case+0x170/0x3f0
[   39.823256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.828822]  kthread+0x328/0x630
[   39.832118]  ret_from_fork+0x10/0x20
[   39.835760] 
[   39.837290] The buggy address belongs to the object at ffff0000948a0f00
[   39.837290]  which belongs to the cache kmalloc-64 of size 64
[   39.849779] The buggy address is located 40 bytes inside of
[   39.849779]  freed 64-byte region [ffff0000948a0f00, ffff0000948a0f40)
[   39.862004] 
[   39.863531] The buggy address belongs to the physical page:
[   39.869185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1148a0
[   39.877295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.883914] page_type: f5(slab)
[   39.887123] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   39.894964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.902802] page dumped because: kasan: bad access detected
[   39.908451] 
[   39.909982] Memory state around the buggy address:
[   39.914848]  ffff0000948a0e00: 00 00 00 00 00 00 05 fc fc fc fc fc fc fc fc fc
[   39.922167]  ffff0000948a0e80: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[   39.929488] >ffff0000948a0f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.936807]                                   ^
[   39.941405]  ffff0000948a0f80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   39.948727]  ffff0000948a1000: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   39.956046] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   39.338174] ==================================================================
[   39.348865] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   39.356101] Write of size 33 at addr ffff000080acfd80 by task kunit_try_catch/284
[   39.363684] 
[   39.365218] CPU: 3 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   39.365249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.365259] Hardware name: Thundercomm Dragonboard 845c (DT)
[   39.365273] Call trace:
[   39.365280]  show_stack+0x20/0x38 (C)
[   39.365299]  dump_stack_lvl+0x8c/0xd0
[   39.365320]  print_report+0x118/0x608
[   39.365339]  kasan_report+0xdc/0x128
[   39.365359]  kasan_check_range+0x100/0x1a8
[   39.365380]  __asan_memset+0x34/0x78
[   39.365396]  kmalloc_uaf_memset+0x170/0x310
[   39.365416]  kunit_try_run_case+0x170/0x3f0
[   39.365435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.365457]  kthread+0x328/0x630
[   39.365472]  ret_from_fork+0x10/0x20
[   39.365490] 
[   39.434114] Allocated by task 284:
[   39.437575]  kasan_save_stack+0x3c/0x68
[   39.441487]  kasan_save_track+0x20/0x40
[   39.445389]  kasan_save_alloc_info+0x40/0x58
[   39.449730]  __kasan_kmalloc+0xd4/0xd8
[   39.453545]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.458149]  kmalloc_uaf_memset+0xb8/0x310
[   39.462319]  kunit_try_run_case+0x170/0x3f0
[   39.466573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.472145]  kthread+0x328/0x630
[   39.475439]  ret_from_fork+0x10/0x20
[   39.479084] 
[   39.480611] Freed by task 284:
[   39.483716]  kasan_save_stack+0x3c/0x68
[   39.487618]  kasan_save_track+0x20/0x40
[   39.491520]  kasan_save_free_info+0x4c/0x78
[   39.495774]  __kasan_slab_free+0x6c/0x98
[   39.499764]  kfree+0x214/0x3c8
[   39.502878]  kmalloc_uaf_memset+0x11c/0x310
[   39.507138]  kunit_try_run_case+0x170/0x3f0
[   39.511392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.516960]  kthread+0x328/0x630
[   39.520254]  ret_from_fork+0x10/0x20
[   39.523898] 
[   39.525428] The buggy address belongs to the object at ffff000080acfd80
[   39.525428]  which belongs to the cache kmalloc-64 of size 64
[   39.537916] The buggy address is located 0 bytes inside of
[   39.537916]  freed 64-byte region [ffff000080acfd80, ffff000080acfdc0)
[   39.550058] 
[   39.551587] The buggy address belongs to the physical page:
[   39.557240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   39.565348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.571967] page_type: f5(slab)
[   39.575175] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   39.583026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.590863] page dumped because: kasan: bad access detected
[   39.596511] 
[   39.598041] Memory state around the buggy address:
[   39.602906]  ffff000080acfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.610225]  ffff000080acfd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.617543] >ffff000080acfd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.624861]                    ^
[   39.628152]  ffff000080acfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.635470]  ffff000080acfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.642791] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   39.025442] ==================================================================
[   39.037615] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   39.044241] Read of size 1 at addr ffff000080a55188 by task kunit_try_catch/282
[   39.051653] 
[   39.053185] CPU: 2 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   39.053215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.053226] Hardware name: Thundercomm Dragonboard 845c (DT)
[   39.053238] Call trace:
[   39.053246]  show_stack+0x20/0x38 (C)
[   39.053265]  dump_stack_lvl+0x8c/0xd0
[   39.053285]  print_report+0x118/0x608
[   39.053305]  kasan_report+0xdc/0x128
[   39.053325]  __asan_report_load1_noabort+0x20/0x30
[   39.053344]  kmalloc_uaf+0x300/0x338
[   39.053360]  kunit_try_run_case+0x170/0x3f0
[   39.053380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.053401]  kthread+0x328/0x630
[   39.053418]  ret_from_fork+0x10/0x20
[   39.053437] 
[   39.118539] Allocated by task 282:
[   39.122002]  kasan_save_stack+0x3c/0x68
[   39.125904]  kasan_save_track+0x20/0x40
[   39.129809]  kasan_save_alloc_info+0x40/0x58
[   39.134151]  __kasan_kmalloc+0xd4/0xd8
[   39.137966]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.142571]  kmalloc_uaf+0xb8/0x338
[   39.146126]  kunit_try_run_case+0x170/0x3f0
[   39.150383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.155957]  kthread+0x328/0x630
[   39.159251]  ret_from_fork+0x10/0x20
[   39.162896] 
[   39.164423] Freed by task 282:
[   39.167527]  kasan_save_stack+0x3c/0x68
[   39.171430]  kasan_save_track+0x20/0x40
[   39.175331]  kasan_save_free_info+0x4c/0x78
[   39.179588]  __kasan_slab_free+0x6c/0x98
[   39.183576]  kfree+0x214/0x3c8
[   39.186690]  kmalloc_uaf+0x11c/0x338
[   39.190331]  kunit_try_run_case+0x170/0x3f0
[   39.194589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.200163]  kthread+0x328/0x630
[   39.203460]  ret_from_fork+0x10/0x20
[   39.207101] 
[   39.208630] The buggy address belongs to the object at ffff000080a55180
[   39.208630]  which belongs to the cache kmalloc-16 of size 16
[   39.221120] The buggy address is located 8 bytes inside of
[   39.221120]  freed 16-byte region [ffff000080a55180, ffff000080a55190)
[   39.233257] 
[   39.234788] The buggy address belongs to the physical page:
[   39.240440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a55
[   39.248550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.255169] page_type: f5(slab)
[   39.258369] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   39.266220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   39.274057] page dumped because: kasan: bad access detected
[   39.279709] 
[   39.281239] Memory state around the buggy address:
[   39.286105]  ffff000080a55080: 00 06 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc
[   39.293425]  ffff000080a55100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   39.300745] >ffff000080a55180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.308062]                       ^
[   39.311613]  ffff000080a55200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.318936]  ffff000080a55280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.326254] ==================================================================
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   38.473791] ==================================================================
[   38.485364] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   38.493043] Read of size 18446744073709551614 at addr ffff000080acfc84 by task kunit_try_catch/278
[   38.502124] 
[   38.503658] CPU: 3 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   38.503688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.503698] Hardware name: Thundercomm Dragonboard 845c (DT)
[   38.503710] Call trace:
[   38.503718]  show_stack+0x20/0x38 (C)
[   38.503736]  dump_stack_lvl+0x8c/0xd0
[   38.503756]  print_report+0x118/0x608
[   38.503776]  kasan_report+0xdc/0x128
[   38.503795]  kasan_check_range+0x100/0x1a8
[   38.503815]  __asan_memmove+0x3c/0x98
[   38.503832]  kmalloc_memmove_negative_size+0x154/0x2e0
[   38.503852]  kunit_try_run_case+0x170/0x3f0
[   38.503873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.503896]  kthread+0x328/0x630
[   38.503911]  ret_from_fork+0x10/0x20
[   38.503928] 
[   38.573600] Allocated by task 278:
[   38.577066]  kasan_save_stack+0x3c/0x68
[   38.580973]  kasan_save_track+0x20/0x40
[   38.584879]  kasan_save_alloc_info+0x40/0x58
[   38.589225]  __kasan_kmalloc+0xd4/0xd8
[   38.593043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.597651]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   38.602787]  kunit_try_run_case+0x170/0x3f0
[   38.607048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.612618]  kthread+0x328/0x630
[   38.615906]  ret_from_fork+0x10/0x20
[   38.619549] 
[   38.621081] The buggy address belongs to the object at ffff000080acfc80
[   38.621081]  which belongs to the cache kmalloc-64 of size 64
[   38.633570] The buggy address is located 4 bytes inside of
[   38.633570]  64-byte region [ffff000080acfc80, ffff000080acfcc0)
[   38.645187] 
[   38.646718] The buggy address belongs to the physical page:
[   38.652365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   38.660470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.667085] page_type: f5(slab)
[   38.670285] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   38.678133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.685976] page dumped because: kasan: bad access detected
[   38.691621] 
[   38.693151] Memory state around the buggy address:
[   38.698010]  ffff000080acfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.705325]  ffff000080acfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.712641] >ffff000080acfc80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   38.719953]                    ^
[   38.723236]  ffff000080acfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.730552]  ffff000080acfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.737866] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   38.156845] ==================================================================
[   38.168313] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   38.175731] Write of size 16 at addr ffff000080df5b69 by task kunit_try_catch/276
[   38.183319] 
[   38.184854] CPU: 2 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   38.184882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.184892] Hardware name: Thundercomm Dragonboard 845c (DT)
[   38.184902] Call trace:
[   38.184908]  show_stack+0x20/0x38 (C)
[   38.184927]  dump_stack_lvl+0x8c/0xd0
[   38.184949]  print_report+0x118/0x608
[   38.184968]  kasan_report+0xdc/0x128
[   38.184986]  kasan_check_range+0x100/0x1a8
[   38.185007]  __asan_memset+0x34/0x78
[   38.185022]  kmalloc_oob_memset_16+0x150/0x2f8
[   38.185042]  kunit_try_run_case+0x170/0x3f0
[   38.185063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.185084]  kthread+0x328/0x630
[   38.185100]  ret_from_fork+0x10/0x20
[   38.185119] 
[   38.254013] Allocated by task 276:
[   38.257478]  kasan_save_stack+0x3c/0x68
[   38.261385]  kasan_save_track+0x20/0x40
[   38.265291]  kasan_save_alloc_info+0x40/0x58
[   38.269635]  __kasan_kmalloc+0xd4/0xd8
[   38.273453]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.278061]  kmalloc_oob_memset_16+0xb0/0x2f8
[   38.282493]  kunit_try_run_case+0x170/0x3f0
[   38.286754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.292324]  kthread+0x328/0x630
[   38.295610]  ret_from_fork+0x10/0x20
[   38.299254] 
[   38.300784] The buggy address belongs to the object at ffff000080df5b00
[   38.300784]  which belongs to the cache kmalloc-128 of size 128
[   38.313445] The buggy address is located 105 bytes inside of
[   38.313445]  allocated 120-byte region [ffff000080df5b00, ffff000080df5b78)
[   38.326195] 
[   38.327726] The buggy address belongs to the physical page:
[   38.333373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100df4
[   38.341478] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.349235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.356295] page_type: f5(slab)
[   38.359495] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   38.367343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.375190] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   38.383125] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.391057] head: 0bfffe0000000001 fffffdffc2037d01 00000000ffffffff 00000000ffffffff
[   38.398991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   38.406919] page dumped because: kasan: bad access detected
[   38.412565] 
[   38.414094] Memory state around the buggy address:
[   38.418953]  ffff000080df5a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.426268]  ffff000080df5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.433583] >ffff000080df5b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.440896]                                                                 ^
[   38.448122]  ffff000080df5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.455437]  ffff000080df5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.462750] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   37.839843] ==================================================================
[   37.851323] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   37.858642] Write of size 8 at addr ffff000080f19171 by task kunit_try_catch/274
[   37.866140] 
[   37.867676] CPU: 4 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.867707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.867716] Hardware name: Thundercomm Dragonboard 845c (DT)
[   37.867726] Call trace:
[   37.867732]  show_stack+0x20/0x38 (C)
[   37.867750]  dump_stack_lvl+0x8c/0xd0
[   37.867769]  print_report+0x118/0x608
[   37.867788]  kasan_report+0xdc/0x128
[   37.867806]  kasan_check_range+0x100/0x1a8
[   37.867825]  __asan_memset+0x34/0x78
[   37.867840]  kmalloc_oob_memset_8+0x150/0x2f8
[   37.867857]  kunit_try_run_case+0x170/0x3f0
[   37.867876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.867897]  kthread+0x328/0x630
[   37.867910]  ret_from_fork+0x10/0x20
[   37.867927] 
[   37.936672] Allocated by task 274:
[   37.940126]  kasan_save_stack+0x3c/0x68
[   37.944033]  kasan_save_track+0x20/0x40
[   37.947938]  kasan_save_alloc_info+0x40/0x58
[   37.952273]  __kasan_kmalloc+0xd4/0xd8
[   37.956088]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.960686]  kmalloc_oob_memset_8+0xb0/0x2f8
[   37.965023]  kunit_try_run_case+0x170/0x3f0
[   37.969272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.974836]  kthread+0x328/0x630
[   37.978118]  ret_from_fork+0x10/0x20
[   37.981747] 
[   37.983278] The buggy address belongs to the object at ffff000080f19100
[   37.983278]  which belongs to the cache kmalloc-128 of size 128
[   37.995930] The buggy address is located 113 bytes inside of
[   37.995930]  allocated 120-byte region [ffff000080f19100, ffff000080f19178)
[   38.008672] 
[   38.010197] The buggy address belongs to the physical page:
[   38.015837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f18
[   38.023937] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.031687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.038738] page_type: f5(slab)
[   38.041935] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   38.049775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.057616] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   38.065542] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.073469] head: 0bfffe0000000001 fffffdffc203c601 00000000ffffffff 00000000ffffffff
[   38.081393] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   38.089313] page dumped because: kasan: bad access detected
[   38.094956] 
[   38.096484] Memory state around the buggy address:
[   38.101337]  ffff000080f19000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.108652]  ffff000080f19080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.115967] >ffff000080f19100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.123270]                                                                 ^
[   38.130488]  ffff000080f19180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.137805]  ffff000080f19200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.145115] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   37.522388] ==================================================================
[   37.533861] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   37.541190] Write of size 4 at addr ffff0000822c2875 by task kunit_try_catch/272
[   37.548688] 
[   37.550222] CPU: 3 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.550252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.550261] Hardware name: Thundercomm Dragonboard 845c (DT)
[   37.550273] Call trace:
[   37.550281]  show_stack+0x20/0x38 (C)
[   37.550300]  dump_stack_lvl+0x8c/0xd0
[   37.550318]  print_report+0x118/0x608
[   37.550338]  kasan_report+0xdc/0x128
[   37.550358]  kasan_check_range+0x100/0x1a8
[   37.550378]  __asan_memset+0x34/0x78
[   37.550394]  kmalloc_oob_memset_4+0x150/0x300
[   37.550413]  kunit_try_run_case+0x170/0x3f0
[   37.550432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.550454]  kthread+0x328/0x630
[   37.550469]  ret_from_fork+0x10/0x20
[   37.550487] 
[   37.619269] Allocated by task 272:
[   37.622729]  kasan_save_stack+0x3c/0x68
[   37.626639]  kasan_save_track+0x20/0x40
[   37.630547]  kasan_save_alloc_info+0x40/0x58
[   37.634885]  __kasan_kmalloc+0xd4/0xd8
[   37.638704]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.643314]  kmalloc_oob_memset_4+0xb0/0x300
[   37.647652]  kunit_try_run_case+0x170/0x3f0
[   37.651902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.657474]  kthread+0x328/0x630
[   37.660762]  ret_from_fork+0x10/0x20
[   37.664400] 
[   37.665931] The buggy address belongs to the object at ffff0000822c2800
[   37.665931]  which belongs to the cache kmalloc-128 of size 128
[   37.678593] The buggy address is located 117 bytes inside of
[   37.678593]  allocated 120-byte region [ffff0000822c2800, ffff0000822c2878)
[   37.691342] 
[   37.692879] The buggy address belongs to the physical page:
[   37.698530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   37.706643] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.714402] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.721458] page_type: f5(slab)
[   37.724659] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   37.732504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.740348] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   37.748279] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.756210] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   37.764141] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.772065] page dumped because: kasan: bad access detected
[   37.777714] 
[   37.779241] Memory state around the buggy address:
[   37.784099]  ffff0000822c2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.791415]  ffff0000822c2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.798729] >ffff0000822c2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.806049]                                                                 ^
[   37.813283]  ffff0000822c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.820606]  ffff0000822c2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.827926] ==================================================================
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   37.204557] ==================================================================
[   37.216118] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   37.223436] Write of size 2 at addr ffff0000822c2777 by task kunit_try_catch/270
[   37.230939] 
[   37.232473] CPU: 3 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.232504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.232512] Hardware name: Thundercomm Dragonboard 845c (DT)
[   37.232523] Call trace:
[   37.232530]  show_stack+0x20/0x38 (C)
[   37.232548]  dump_stack_lvl+0x8c/0xd0
[   37.232566]  print_report+0x118/0x608
[   37.232585]  kasan_report+0xdc/0x128
[   37.232605]  kasan_check_range+0x100/0x1a8
[   37.232626]  __asan_memset+0x34/0x78
[   37.232642]  kmalloc_oob_memset_2+0x150/0x2f8
[   37.232661]  kunit_try_run_case+0x170/0x3f0
[   37.232679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.232701]  kthread+0x328/0x630
[   37.232716]  ret_from_fork+0x10/0x20
[   37.232733] 
[   37.301530] Allocated by task 270:
[   37.304996]  kasan_save_stack+0x3c/0x68
[   37.308904]  kasan_save_track+0x20/0x40
[   37.312808]  kasan_save_alloc_info+0x40/0x58
[   37.317154]  __kasan_kmalloc+0xd4/0xd8
[   37.320971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.325578]  kmalloc_oob_memset_2+0xb0/0x2f8
[   37.329925]  kunit_try_run_case+0x170/0x3f0
[   37.334185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.339756]  kthread+0x328/0x630
[   37.343042]  ret_from_fork+0x10/0x20
[   37.346686] 
[   37.348216] The buggy address belongs to the object at ffff0000822c2700
[   37.348216]  which belongs to the cache kmalloc-128 of size 128
[   37.360877] The buggy address is located 119 bytes inside of
[   37.360877]  allocated 120-byte region [ffff0000822c2700, ffff0000822c2778)
[   37.373626] 
[   37.375157] The buggy address belongs to the physical page:
[   37.380803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   37.388907] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.396664] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.403722] page_type: f5(slab)
[   37.406923] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   37.414770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.422618] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   37.430551] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.438485] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   37.446418] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.454347] page dumped because: kasan: bad access detected
[   37.459993] 
[   37.461523] Memory state around the buggy address:
[   37.466380]  ffff0000822c2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.473696]  ffff0000822c2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.481010] >ffff0000822c2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.488325]                                                                 ^
[   37.495552]  ffff0000822c2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.502868]  ffff0000822c2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.510179] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   36.886759] ==================================================================
[   36.897705] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   36.905111] Write of size 128 at addr ffff0000822c2600 by task kunit_try_catch/268
[   36.912787] 
[   36.914322] CPU: 3 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   36.914353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.914363] Hardware name: Thundercomm Dragonboard 845c (DT)
[   36.914374] Call trace:
[   36.914382]  show_stack+0x20/0x38 (C)
[   36.914400]  dump_stack_lvl+0x8c/0xd0
[   36.914419]  print_report+0x118/0x608
[   36.914440]  kasan_report+0xdc/0x128
[   36.914459]  kasan_check_range+0x100/0x1a8
[   36.914481]  __asan_memset+0x34/0x78
[   36.914497]  kmalloc_oob_in_memset+0x144/0x2d0
[   36.914515]  kunit_try_run_case+0x170/0x3f0
[   36.914535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.914557]  kthread+0x328/0x630
[   36.914572]  ret_from_fork+0x10/0x20
[   36.914590] 
[   36.983472] Allocated by task 268:
[   36.986937]  kasan_save_stack+0x3c/0x68
[   36.990845]  kasan_save_track+0x20/0x40
[   36.994752]  kasan_save_alloc_info+0x40/0x58
[   36.999096]  __kasan_kmalloc+0xd4/0xd8
[   37.002914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.007521]  kmalloc_oob_in_memset+0xb0/0x2d0
[   37.011954]  kunit_try_run_case+0x170/0x3f0
[   37.016214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.021785]  kthread+0x328/0x630
[   37.025071]  ret_from_fork+0x10/0x20
[   37.028716] 
[   37.030247] The buggy address belongs to the object at ffff0000822c2600
[   37.030247]  which belongs to the cache kmalloc-128 of size 128
[   37.042908] The buggy address is located 0 bytes inside of
[   37.042908]  allocated 120-byte region [ffff0000822c2600, ffff0000822c2678)
[   37.055487] 
[   37.057018] The buggy address belongs to the physical page:
[   37.062664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   37.070768] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.078527] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.085585] page_type: f5(slab)
[   37.088784] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   37.096632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.104479] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   37.112413] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.120346] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   37.128280] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.136210] page dumped because: kasan: bad access detected
[   37.141856] 
[   37.143386] Memory state around the buggy address:
[   37.148245]  ffff0000822c2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.155559]  ffff0000822c2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.162875] >ffff0000822c2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.170188]                                                                 ^
[   37.177414]  ffff0000822c2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.184730]  ffff0000822c2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.192042] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   36.575182] ==================================================================
[   36.586123] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   36.593000] Read of size 16 at addr ffff0000958f6180 by task kunit_try_catch/266
[   36.600487] 
[   36.602018] CPU: 4 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   36.602049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.602057] Hardware name: Thundercomm Dragonboard 845c (DT)
[   36.602068] Call trace:
[   36.602074]  show_stack+0x20/0x38 (C)
[   36.602092]  dump_stack_lvl+0x8c/0xd0
[   36.602110]  print_report+0x118/0x608
[   36.602129]  kasan_report+0xdc/0x128
[   36.602147]  __asan_report_load16_noabort+0x20/0x30
[   36.602164]  kmalloc_uaf_16+0x3bc/0x438
[   36.602179]  kunit_try_run_case+0x170/0x3f0
[   36.602198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.602220]  kthread+0x328/0x630
[   36.602232]  ret_from_fork+0x10/0x20
[   36.602248] 
[   36.667641] Allocated by task 266:
[   36.671097]  kasan_save_stack+0x3c/0x68
[   36.674996]  kasan_save_track+0x20/0x40
[   36.678902]  kasan_save_alloc_info+0x40/0x58
[   36.683234]  __kasan_kmalloc+0xd4/0xd8
[   36.687041]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.691639]  kmalloc_uaf_16+0x140/0x438
[   36.695541]  kunit_try_run_case+0x170/0x3f0
[   36.699791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.705357]  kthread+0x328/0x630
[   36.708639]  ret_from_fork+0x10/0x20
[   36.712271] 
[   36.713795] Freed by task 266:
[   36.716900]  kasan_save_stack+0x3c/0x68
[   36.720795]  kasan_save_track+0x20/0x40
[   36.724700]  kasan_save_free_info+0x4c/0x78
[   36.728948]  __kasan_slab_free+0x6c/0x98
[   36.732939]  kfree+0x214/0x3c8
[   36.736050]  kmalloc_uaf_16+0x190/0x438
[   36.739952]  kunit_try_run_case+0x170/0x3f0
[   36.744203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.749768]  kthread+0x328/0x630
[   36.753052]  ret_from_fork+0x10/0x20
[   36.756683] 
[   36.758207] The buggy address belongs to the object at ffff0000958f6180
[   36.758207]  which belongs to the cache kmalloc-16 of size 16
[   36.770690] The buggy address is located 0 bytes inside of
[   36.770690]  freed 16-byte region [ffff0000958f6180, ffff0000958f6190)
[   36.782817] 
[   36.784348] The buggy address belongs to the physical page:
[   36.789990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1158f6
[   36.798093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.804705] page_type: f5(slab)
[   36.807902] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   36.815754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.823598] page dumped because: kasan: bad access detected
[   36.829245] 
[   36.830770] Memory state around the buggy address:
[   36.835632]  ffff0000958f6080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.842945]  ffff0000958f6100: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   36.850252] >ffff0000958f6180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.857568]                    ^
[   36.860850]  ffff0000958f6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.868157]  ffff0000958f6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.875462] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   36.305296] ==================================================================
[   36.316074] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   36.322873] Write of size 16 at addr ffff000080a55140 by task kunit_try_catch/264
[   36.330463] 
[   36.331998] CPU: 2 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   36.332028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.332037] Hardware name: Thundercomm Dragonboard 845c (DT)
[   36.332049] Call trace:
[   36.332058]  show_stack+0x20/0x38 (C)
[   36.332076]  dump_stack_lvl+0x8c/0xd0
[   36.332095]  print_report+0x118/0x608
[   36.332115]  kasan_report+0xdc/0x128
[   36.332134]  __asan_report_store16_noabort+0x20/0x30
[   36.332153]  kmalloc_oob_16+0x3a0/0x3f8
[   36.332171]  kunit_try_run_case+0x170/0x3f0
[   36.332190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.332212]  kthread+0x328/0x630
[   36.332229]  ret_from_fork+0x10/0x20
[   36.332246] 
[   36.397775] Allocated by task 264:
[   36.401240]  kasan_save_stack+0x3c/0x68
[   36.405147]  kasan_save_track+0x20/0x40
[   36.409052]  kasan_save_alloc_info+0x40/0x58
[   36.413396]  __kasan_kmalloc+0xd4/0xd8
[   36.417213]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.421821]  kmalloc_oob_16+0xb4/0x3f8
[   36.425638]  kunit_try_run_case+0x170/0x3f0
[   36.429896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.435466]  kthread+0x328/0x630
[   36.438752]  ret_from_fork+0x10/0x20
[   36.442396] 
[   36.443926] The buggy address belongs to the object at ffff000080a55140
[   36.443926]  which belongs to the cache kmalloc-16 of size 16
[   36.456415] The buggy address is located 0 bytes inside of
[   36.456415]  allocated 13-byte region [ffff000080a55140, ffff000080a5514d)
[   36.468906] 
[   36.470435] The buggy address belongs to the physical page:
[   36.476082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a55
[   36.484187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.490810] page_type: f5(slab)
[   36.494011] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   36.501859] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.509702] page dumped because: kasan: bad access detected
[   36.515347] 
[   36.516876] Memory state around the buggy address:
[   36.521735]  ffff000080a55000: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   36.529050]  ffff000080a55080: 00 06 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc
[   36.536366] >ffff000080a55100: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   36.543678]                                               ^
[   36.549326]  ffff000080a55180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.556642]  ffff000080a55200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.563956] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   35.956371] ==================================================================
[   35.963690] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   35.970396] Read of size 1 at addr ffff000086408c00 by task kunit_try_catch/262
[   35.977811] 
[   35.979342] CPU: 3 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.979372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.979381] Hardware name: Thundercomm Dragonboard 845c (DT)
[   35.979394] Call trace:
[   35.979400]  show_stack+0x20/0x38 (C)
[   35.979418]  dump_stack_lvl+0x8c/0xd0
[   35.979437]  print_report+0x118/0x608
[   35.979457]  kasan_report+0xdc/0x128
[   35.979477]  __asan_report_load1_noabort+0x20/0x30
[   35.979495]  krealloc_uaf+0x4c8/0x520
[   35.979511]  kunit_try_run_case+0x170/0x3f0
[   35.979531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.979552]  kthread+0x328/0x630
[   35.979567]  ret_from_fork+0x10/0x20
[   35.979585] 
[   36.044749] Allocated by task 262:
[   36.048209]  kasan_save_stack+0x3c/0x68
[   36.052119]  kasan_save_track+0x20/0x40
[   36.056030]  kasan_save_alloc_info+0x40/0x58
[   36.060369]  __kasan_kmalloc+0xd4/0xd8
[   36.064192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.068805]  krealloc_uaf+0xc8/0x520
[   36.072444]  kunit_try_run_case+0x170/0x3f0
[   36.076698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.082274]  kthread+0x328/0x630
[   36.085564]  ret_from_fork+0x10/0x20
[   36.089205] 
[   36.090735] Freed by task 262:
[   36.093846]  kasan_save_stack+0x3c/0x68
[   36.097758]  kasan_save_track+0x20/0x40
[   36.101667]  kasan_save_free_info+0x4c/0x78
[   36.105920]  __kasan_slab_free+0x6c/0x98
[   36.109917]  kfree+0x214/0x3c8
[   36.113037]  krealloc_uaf+0x12c/0x520
[   36.116771]  kunit_try_run_case+0x170/0x3f0
[   36.121027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.126598]  kthread+0x328/0x630
[   36.129891]  ret_from_fork+0x10/0x20
[   36.133528] 
[   36.135056] The buggy address belongs to the object at ffff000086408c00
[   36.135056]  which belongs to the cache kmalloc-256 of size 256
[   36.147717] The buggy address is located 0 bytes inside of
[   36.147717]  freed 256-byte region [ffff000086408c00, ffff000086408d00)
[   36.159942] 
[   36.161473] The buggy address belongs to the physical page:
[   36.167121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   36.175225] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.182985] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.190042] page_type: f5(slab)
[   36.193248] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   36.201095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.208943] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   36.216875] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.224808] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   36.232739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.240668] page dumped because: kasan: bad access detected
[   36.246318] 
[   36.247853] Memory state around the buggy address:
[   36.252716]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.260041]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.267358] >ffff000086408c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.274674]                    ^
[   36.277961]  ffff000086408c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.285277]  ffff000086408d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.292588] ==================================================================
[   35.605223] ==================================================================
[   35.616954] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   35.623666] Read of size 1 at addr ffff000086408c00 by task kunit_try_catch/262
[   35.631070] 
[   35.632608] CPU: 3 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.632636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.632644] Hardware name: Thundercomm Dragonboard 845c (DT)
[   35.632655] Call trace:
[   35.632662]  show_stack+0x20/0x38 (C)
[   35.632681]  dump_stack_lvl+0x8c/0xd0
[   35.632700]  print_report+0x118/0x608
[   35.632719]  kasan_report+0xdc/0x128
[   35.632737]  __kasan_check_byte+0x54/0x70
[   35.632757]  krealloc_noprof+0x44/0x360
[   35.632779]  krealloc_uaf+0x180/0x520
[   35.632796]  kunit_try_run_case+0x170/0x3f0
[   35.632815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.632838]  kthread+0x328/0x630
[   35.632854]  ret_from_fork+0x10/0x20
[   35.632871] 
[   35.701135] Allocated by task 262:
[   35.704596]  kasan_save_stack+0x3c/0x68
[   35.708505]  kasan_save_track+0x20/0x40
[   35.712415]  kasan_save_alloc_info+0x40/0x58
[   35.716755]  __kasan_kmalloc+0xd4/0xd8
[   35.720577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.725188]  krealloc_uaf+0xc8/0x520
[   35.728827]  kunit_try_run_case+0x170/0x3f0
[   35.733080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.738653]  kthread+0x328/0x630
[   35.741943]  ret_from_fork+0x10/0x20
[   35.745582] 
[   35.747109] Freed by task 262:
[   35.750222]  kasan_save_stack+0x3c/0x68
[   35.754133]  kasan_save_track+0x20/0x40
[   35.758042]  kasan_save_free_info+0x4c/0x78
[   35.762295]  __kasan_slab_free+0x6c/0x98
[   35.766290]  kfree+0x214/0x3c8
[   35.769411]  krealloc_uaf+0x12c/0x520
[   35.773145]  kunit_try_run_case+0x170/0x3f0
[   35.777400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.782971]  kthread+0x328/0x630
[   35.786263]  ret_from_fork+0x10/0x20
[   35.789900] 
[   35.791426] The buggy address belongs to the object at ffff000086408c00
[   35.791426]  which belongs to the cache kmalloc-256 of size 256
[   35.804087] The buggy address is located 0 bytes inside of
[   35.804087]  freed 256-byte region [ffff000086408c00, ffff000086408d00)
[   35.816309] 
[   35.817839] The buggy address belongs to the physical page:
[   35.823487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   35.831588] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.839344] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.846405] page_type: f5(slab)
[   35.849613] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   35.857458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.865305] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   35.873237] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.881169] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   35.889102] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.897029] page dumped because: kasan: bad access detected
[   35.902680] 
[   35.904215] Memory state around the buggy address:
[   35.909077]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.916401]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.923717] >ffff000086408c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.931032]                    ^
[   35.934321]  ffff000086408c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.941635]  ffff000086408d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.948948] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   34.891734] ==================================================================
[   34.899052] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   34.906727] Write of size 1 at addr ffff0000864220da by task kunit_try_catch/260
[   34.914222] 
[   34.915759] CPU: 4 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   34.915788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.915796] Hardware name: Thundercomm Dragonboard 845c (DT)
[   34.915808] Call trace:
[   34.915813]  show_stack+0x20/0x38 (C)
[   34.915831]  dump_stack_lvl+0x8c/0xd0
[   34.915850]  print_report+0x118/0x608
[   34.915869]  kasan_report+0xdc/0x128
[   34.915887]  __asan_report_store1_noabort+0x20/0x30
[   34.915904]  krealloc_less_oob_helper+0xa80/0xc50
[   34.915922]  krealloc_large_less_oob+0x20/0x38
[   34.915939]  kunit_try_run_case+0x170/0x3f0
[   34.915956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.915975]  kthread+0x328/0x630
[   34.915989]  ret_from_fork+0x10/0x20
[   34.916005] 
[   34.986751] The buggy address belongs to the physical page:
[   34.992391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420
[   35.000492] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.008244] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.015291] page_type: f8(unknown)
[   35.018751] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.026591] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.034431] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.042358] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.050282] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff
[   35.058207] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.066127] page dumped because: kasan: bad access detected
[   35.071766] 
[   35.073289] Memory state around the buggy address:
[   35.078140]  ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.085454]  ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.092759] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   35.100072]                                                     ^
[   35.106239]  ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.113553]  ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.120865] ==================================================================
[   33.614804] ==================================================================
[   33.622122] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   33.629787] Write of size 1 at addr ffff000086408aeb by task kunit_try_catch/256
[   33.637280] 
[   33.638805] CPU: 5 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.638832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.638839] Hardware name: Thundercomm Dragonboard 845c (DT)
[   33.638848] Call trace:
[   33.638853]  show_stack+0x20/0x38 (C)
[   33.638869]  dump_stack_lvl+0x8c/0xd0
[   33.638886]  print_report+0x118/0x608
[   33.638904]  kasan_report+0xdc/0x128
[   33.638921]  __asan_report_store1_noabort+0x20/0x30
[   33.638936]  krealloc_less_oob_helper+0xa58/0xc50
[   33.638953]  krealloc_less_oob+0x20/0x38
[   33.638968]  kunit_try_run_case+0x170/0x3f0
[   33.638985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.639004]  kthread+0x328/0x630
[   33.639017]  ret_from_fork+0x10/0x20
[   33.639033] 
[   33.709274] Allocated by task 256:
[   33.712726]  kasan_save_stack+0x3c/0x68
[   33.716630]  kasan_save_track+0x20/0x40
[   33.720535]  kasan_save_alloc_info+0x40/0x58
[   33.724867]  __kasan_krealloc+0x118/0x178
[   33.728944]  krealloc_noprof+0x128/0x360
[   33.732931]  krealloc_less_oob_helper+0x168/0xc50
[   33.737702]  krealloc_less_oob+0x20/0x38
[   33.741691]  kunit_try_run_case+0x170/0x3f0
[   33.745940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.751500]  kthread+0x328/0x630
[   33.754786]  ret_from_fork+0x10/0x20
[   33.758425] 
[   33.759954] The buggy address belongs to the object at ffff000086408a00
[   33.759954]  which belongs to the cache kmalloc-256 of size 256
[   33.772605] The buggy address is located 34 bytes to the right of
[   33.772605]  allocated 201-byte region [ffff000086408a00, ffff000086408ac9)
[   33.785781] 
[   33.787310] The buggy address belongs to the physical page:
[   33.792951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   33.801050] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.808799] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.815844] page_type: f5(slab)
[   33.819041] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.826880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.834719] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.842641] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.850565] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   33.858490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.866409] page dumped because: kasan: bad access detected
[   33.872047] 
[   33.873569] Memory state around the buggy address:
[   33.878420]  ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.885734]  ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.893048] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   33.900359]                                                           ^
[   33.907052]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.914357]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.921669] ==================================================================
[   32.986878] ==================================================================
[   32.994196] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   33.001870] Write of size 1 at addr ffff000086408ada by task kunit_try_catch/256
[   33.009362] 
[   33.010891] CPU: 5 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.010921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.010928] Hardware name: Thundercomm Dragonboard 845c (DT)
[   33.010939] Call trace:
[   33.010944]  show_stack+0x20/0x38 (C)
[   33.010962]  dump_stack_lvl+0x8c/0xd0
[   33.010979]  print_report+0x118/0x608
[   33.010998]  kasan_report+0xdc/0x128
[   33.011015]  __asan_report_store1_noabort+0x20/0x30
[   33.011031]  krealloc_less_oob_helper+0xa80/0xc50
[   33.011049]  krealloc_less_oob+0x20/0x38
[   33.011065]  kunit_try_run_case+0x170/0x3f0
[   33.011082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.011101]  kthread+0x328/0x630
[   33.011114]  ret_from_fork+0x10/0x20
[   33.011130] 
[   33.081345] Allocated by task 256:
[   33.084798]  kasan_save_stack+0x3c/0x68
[   33.088696]  kasan_save_track+0x20/0x40
[   33.092600]  kasan_save_alloc_info+0x40/0x58
[   33.096935]  __kasan_krealloc+0x118/0x178
[   33.101013]  krealloc_noprof+0x128/0x360
[   33.105004]  krealloc_less_oob_helper+0x168/0xc50
[   33.109775]  krealloc_less_oob+0x20/0x38
[   33.113765]  kunit_try_run_case+0x170/0x3f0
[   33.118015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.123578]  kthread+0x328/0x630
[   33.126863]  ret_from_fork+0x10/0x20
[   33.130495] 
[   33.132025] The buggy address belongs to the object at ffff000086408a00
[   33.132025]  which belongs to the cache kmalloc-256 of size 256
[   33.144674] The buggy address is located 17 bytes to the right of
[   33.144674]  allocated 201-byte region [ffff000086408a00, ffff000086408ac9)
[   33.157851] 
[   33.159382] The buggy address belongs to the physical page:
[   33.165025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   33.173126] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.180878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.187925] page_type: f5(slab)
[   33.191124] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.198966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.206807] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.214731] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.222657] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   33.230582] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.238504] page dumped because: kasan: bad access detected
[   33.244143] 
[   33.245664] Memory state around the buggy address:
[   33.250516]  ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.257822]  ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.265127] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   33.272430]                                                     ^
[   33.278598]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.285903]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.293205] ==================================================================
[   32.672387] ==================================================================
[   32.679705] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.687382] Write of size 1 at addr ffff000086408ad0 by task kunit_try_catch/256
[   32.694873] 
[   32.696412] CPU: 3 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.696441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.696452] Hardware name: Thundercomm Dragonboard 845c (DT)
[   32.696463] Call trace:
[   32.696469]  show_stack+0x20/0x38 (C)
[   32.696487]  dump_stack_lvl+0x8c/0xd0
[   32.696505]  print_report+0x118/0x608
[   32.696524]  kasan_report+0xdc/0x128
[   32.696542]  __asan_report_store1_noabort+0x20/0x30
[   32.696559]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.696579]  krealloc_less_oob+0x20/0x38
[   32.696597]  kunit_try_run_case+0x170/0x3f0
[   32.696615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.696638]  kthread+0x328/0x630
[   32.696653]  ret_from_fork+0x10/0x20
[   32.696671] 
[   32.766953] Allocated by task 256:
[   32.770412]  kasan_save_stack+0x3c/0x68
[   32.774325]  kasan_save_track+0x20/0x40
[   32.778235]  kasan_save_alloc_info+0x40/0x58
[   32.782575]  __kasan_krealloc+0x118/0x178
[   32.786657]  krealloc_noprof+0x128/0x360
[   32.790656]  krealloc_less_oob_helper+0x168/0xc50
[   32.795438]  krealloc_less_oob+0x20/0x38
[   32.799434]  kunit_try_run_case+0x170/0x3f0
[   32.803688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.809261]  kthread+0x328/0x630
[   32.812554]  ret_from_fork+0x10/0x20
[   32.816192] 
[   32.817722] The buggy address belongs to the object at ffff000086408a00
[   32.817722]  which belongs to the cache kmalloc-256 of size 256
[   32.830377] The buggy address is located 7 bytes to the right of
[   32.830377]  allocated 201-byte region [ffff000086408a00, ffff000086408ac9)
[   32.843476] 
[   32.845002] The buggy address belongs to the physical page:
[   32.850651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   32.858757] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.866514] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.873572] page_type: f5(slab)
[   32.876776] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   32.884622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.892468] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   32.900400] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.908334] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   32.916268] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.924196] page dumped because: kasan: bad access detected
[   32.929846] 
[   32.931374] Memory state around the buggy address:
[   32.936233]  ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.943551]  ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.950868] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.958179]                                                  ^
[   32.964098]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.971416]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.978730] ==================================================================
[   32.355014] ==================================================================
[   32.366226] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.373905] Write of size 1 at addr ffff000086408ac9 by task kunit_try_catch/256
[   32.381405] 
[   32.382939] CPU: 3 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.382967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.382976] Hardware name: Thundercomm Dragonboard 845c (DT)
[   32.382988] Call trace:
[   32.382994]  show_stack+0x20/0x38 (C)
[   32.383013]  dump_stack_lvl+0x8c/0xd0
[   32.383032]  print_report+0x118/0x608
[   32.383050]  kasan_report+0xdc/0x128
[   32.383069]  __asan_report_store1_noabort+0x20/0x30
[   32.383086]  krealloc_less_oob_helper+0xa48/0xc50
[   32.383105]  krealloc_less_oob+0x20/0x38
[   32.383125]  kunit_try_run_case+0x170/0x3f0
[   32.383144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.383166]  kthread+0x328/0x630
[   32.383181]  ret_from_fork+0x10/0x20
[   32.383198] 
[   32.453466] Allocated by task 256:
[   32.456927]  kasan_save_stack+0x3c/0x68
[   32.460840]  kasan_save_track+0x20/0x40
[   32.464753]  kasan_save_alloc_info+0x40/0x58
[   32.469093]  __kasan_krealloc+0x118/0x178
[   32.473177]  krealloc_noprof+0x128/0x360
[   32.477175]  krealloc_less_oob_helper+0x168/0xc50
[   32.481960]  krealloc_less_oob+0x20/0x38
[   32.485956]  kunit_try_run_case+0x170/0x3f0
[   32.490211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.495781]  kthread+0x328/0x630
[   32.499075]  ret_from_fork+0x10/0x20
[   32.502715] 
[   32.504252] The buggy address belongs to the object at ffff000086408a00
[   32.504252]  which belongs to the cache kmalloc-256 of size 256
[   32.516907] The buggy address is located 0 bytes to the right of
[   32.516907]  allocated 201-byte region [ffff000086408a00, ffff000086408ac9)
[   32.530008] 
[   32.531537] The buggy address belongs to the physical page:
[   32.537187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   32.545292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.553052] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.560108] page_type: f5(slab)
[   32.563315] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   32.571163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.579010] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   32.586943] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.594876] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   32.602807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.610737] page dumped because: kasan: bad access detected
[   32.616383] 
[   32.617914] Memory state around the buggy address:
[   32.622778]  ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.630094]  ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.637409] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.644721]                                               ^
[   32.650374]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.657691]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.665004] ==================================================================
[   35.128228] ==================================================================
[   35.135545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   35.143216] Write of size 1 at addr ffff0000864220ea by task kunit_try_catch/260
[   35.150701] 
[   35.152234] CPU: 4 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.152260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.152267] Hardware name: Thundercomm Dragonboard 845c (DT)
[   35.152276] Call trace:
[   35.152282]  show_stack+0x20/0x38 (C)
[   35.152299]  dump_stack_lvl+0x8c/0xd0
[   35.152315]  print_report+0x118/0x608
[   35.152334]  kasan_report+0xdc/0x128
[   35.152351]  __asan_report_store1_noabort+0x20/0x30
[   35.152368]  krealloc_less_oob_helper+0xae4/0xc50
[   35.152385]  krealloc_large_less_oob+0x20/0x38
[   35.152402]  kunit_try_run_case+0x170/0x3f0
[   35.152418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.152437]  kthread+0x328/0x630
[   35.152450]  ret_from_fork+0x10/0x20
[   35.152466] 
[   35.223229] The buggy address belongs to the physical page:
[   35.228870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420
[   35.236968] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.244718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.251763] page_type: f8(unknown)
[   35.255220] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.263060] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.270899] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.278824] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.286749] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff
[   35.294672] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.302593] page dumped because: kasan: bad access detected
[   35.308231] 
[   35.309753] Memory state around the buggy address:
[   35.314604]  ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.321920]  ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.329224] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   35.336536]                                                           ^
[   35.343231]  ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.350536]  ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.357838] ==================================================================
[   33.300563] ==================================================================
[   33.307880] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   33.315550] Write of size 1 at addr ffff000086408aea by task kunit_try_catch/256
[   33.323034] 
[   33.324569] CPU: 5 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.324596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.324603] Hardware name: Thundercomm Dragonboard 845c (DT)
[   33.324612] Call trace:
[   33.324618]  show_stack+0x20/0x38 (C)
[   33.324635]  dump_stack_lvl+0x8c/0xd0
[   33.324651]  print_report+0x118/0x608
[   33.324669]  kasan_report+0xdc/0x128
[   33.324689]  __asan_report_store1_noabort+0x20/0x30
[   33.324705]  krealloc_less_oob_helper+0xae4/0xc50
[   33.324723]  krealloc_less_oob+0x20/0x38
[   33.324739]  kunit_try_run_case+0x170/0x3f0
[   33.324756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.324776]  kthread+0x328/0x630
[   33.324790]  ret_from_fork+0x10/0x20
[   33.324807] 
[   33.395032] Allocated by task 256:
[   33.398485]  kasan_save_stack+0x3c/0x68
[   33.402389]  kasan_save_track+0x20/0x40
[   33.406293]  kasan_save_alloc_info+0x40/0x58
[   33.410627]  __kasan_krealloc+0x118/0x178
[   33.414706]  krealloc_noprof+0x128/0x360
[   33.418697]  krealloc_less_oob_helper+0x168/0xc50
[   33.423473]  krealloc_less_oob+0x20/0x38
[   33.427463]  kunit_try_run_case+0x170/0x3f0
[   33.431713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.437278]  kthread+0x328/0x630
[   33.440561]  ret_from_fork+0x10/0x20
[   33.444191] 
[   33.445714] The buggy address belongs to the object at ffff000086408a00
[   33.445714]  which belongs to the cache kmalloc-256 of size 256
[   33.458368] The buggy address is located 33 bytes to the right of
[   33.458368]  allocated 201-byte region [ffff000086408a00, ffff000086408ac9)
[   33.471542] 
[   33.473066] The buggy address belongs to the physical page:
[   33.478709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   33.486809] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.494561] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.501609] page_type: f5(slab)
[   33.504804] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.512645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.520485] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.528412] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.536338] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   33.544264] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.552186] page dumped because: kasan: bad access detected
[   33.557828] 
[   33.559357] Memory state around the buggy address:
[   33.564209]  ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.571514]  ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.578823] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   33.586135]                                                           ^
[   33.592830]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.600146]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.607450] ==================================================================
[   34.655132] ==================================================================
[   34.662446] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   34.670116] Write of size 1 at addr ffff0000864220d0 by task kunit_try_catch/260
[   34.677612] 
[   34.679145] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   34.679174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.679183] Hardware name: Thundercomm Dragonboard 845c (DT)
[   34.679194] Call trace:
[   34.679200]  show_stack+0x20/0x38 (C)
[   34.679218]  dump_stack_lvl+0x8c/0xd0
[   34.679236]  print_report+0x118/0x608
[   34.679255]  kasan_report+0xdc/0x128
[   34.679273]  __asan_report_store1_noabort+0x20/0x30
[   34.679292]  krealloc_less_oob_helper+0xb9c/0xc50
[   34.679311]  krealloc_large_less_oob+0x20/0x38
[   34.679331]  kunit_try_run_case+0x170/0x3f0
[   34.679349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.679371]  kthread+0x328/0x630
[   34.679387]  ret_from_fork+0x10/0x20
[   34.679405] 
[   34.750213] The buggy address belongs to the physical page:
[   34.755867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420
[   34.763978] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.771732] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.778789] page_type: f8(unknown)
[   34.782253] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.790095] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.797938] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.805866] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.813797] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff
[   34.821726] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.829650] page dumped because: kasan: bad access detected
[   34.835296] 
[   34.836831] Memory state around the buggy address:
[   34.841692]  ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.849014]  ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.856337] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   34.863649]                                                  ^
[   34.869557]  ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.876878]  ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.884197] ==================================================================
[   35.365188] ==================================================================
[   35.372503] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   35.380171] Write of size 1 at addr ffff0000864220eb by task kunit_try_catch/260
[   35.387664] 
[   35.389189] CPU: 4 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.389215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.389222] Hardware name: Thundercomm Dragonboard 845c (DT)
[   35.389232] Call trace:
[   35.389237]  show_stack+0x20/0x38 (C)
[   35.389253]  dump_stack_lvl+0x8c/0xd0
[   35.389270]  print_report+0x118/0x608
[   35.389287]  kasan_report+0xdc/0x128
[   35.389305]  __asan_report_store1_noabort+0x20/0x30
[   35.389320]  krealloc_less_oob_helper+0xa58/0xc50
[   35.389337]  krealloc_large_less_oob+0x20/0x38
[   35.389354]  kunit_try_run_case+0x170/0x3f0
[   35.389370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.389390]  kthread+0x328/0x630
[   35.389403]  ret_from_fork+0x10/0x20
[   35.389419] 
[   35.460172] The buggy address belongs to the physical page:
[   35.465816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420
[   35.473917] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.481671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.488720] page_type: f8(unknown)
[   35.492176] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.500016] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.507857] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.515785] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.523713] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff
[   35.531641] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.539564] page dumped because: kasan: bad access detected
[   35.545206] 
[   35.546728] Memory state around the buggy address:
[   35.551578]  ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.558887]  ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.566195] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   35.573501]                                                           ^
[   35.580198]  ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.587505]  ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.594813] ==================================================================
[   34.414507] ==================================================================
[   34.426252] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   34.433926] Write of size 1 at addr ffff0000864220c9 by task kunit_try_catch/260
[   34.441424] 
[   34.442959] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   34.442988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.442996] Hardware name: Thundercomm Dragonboard 845c (DT)
[   34.443006] Call trace:
[   34.443013]  show_stack+0x20/0x38 (C)
[   34.443031]  dump_stack_lvl+0x8c/0xd0
[   34.443050]  print_report+0x118/0x608
[   34.443069]  kasan_report+0xdc/0x128
[   34.443087]  __asan_report_store1_noabort+0x20/0x30
[   34.443106]  krealloc_less_oob_helper+0xa48/0xc50
[   34.443126]  krealloc_large_less_oob+0x20/0x38
[   34.443145]  kunit_try_run_case+0x170/0x3f0
[   34.443164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.443185]  kthread+0x328/0x630
[   34.443201]  ret_from_fork+0x10/0x20
[   34.443219] 
[   34.514036] The buggy address belongs to the physical page:
[   34.519680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420
[   34.527790] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.535546] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.542602] page_type: f8(unknown)
[   34.546065] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.553907] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.561751] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.569689] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.577618] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff
[   34.585548] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.593475] page dumped because: kasan: bad access detected
[   34.599123] 
[   34.600657] Memory state around the buggy address:
[   34.605519]  ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.612839]  ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.620161] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   34.627475]                                               ^
[   34.633120]  ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.640443]  ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.647754] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   33.931667] ==================================================================
[   33.942877] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   33.950548] Write of size 1 at addr ffff00008641a0eb by task kunit_try_catch/258
[   33.958046] 
[   33.959575] CPU: 3 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.959603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.959611] Hardware name: Thundercomm Dragonboard 845c (DT)
[   33.959621] Call trace:
[   33.959627]  show_stack+0x20/0x38 (C)
[   33.959646]  dump_stack_lvl+0x8c/0xd0
[   33.959664]  print_report+0x118/0x608
[   33.959683]  kasan_report+0xdc/0x128
[   33.959702]  __asan_report_store1_noabort+0x20/0x30
[   33.959719]  krealloc_more_oob_helper+0x60c/0x678
[   33.959738]  krealloc_large_more_oob+0x20/0x38
[   33.959757]  kunit_try_run_case+0x170/0x3f0
[   33.959776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.959798]  kthread+0x328/0x630
[   33.959812]  ret_from_fork+0x10/0x20
[   33.959829] 
[   34.030622] The buggy address belongs to the physical page:
[   34.036267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418
[   34.044381] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.052137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.059196] page_type: f8(unknown)
[   34.062662] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.070508] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.078355] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.086287] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.094218] head: 0bfffe0000000002 fffffdffc2190601 00000000ffffffff 00000000ffffffff
[   34.102149] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.110076] page dumped because: kasan: bad access detected
[   34.115722] 
[   34.117251] Memory state around the buggy address:
[   34.122114]  ffff000086419f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.129428]  ffff00008641a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.136742] >ffff00008641a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   34.144053]                                                           ^
[   34.150753]  ffff00008641a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.158066]  ffff00008641a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.165378] ==================================================================
[   32.035808] ==================================================================
[   32.043130] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   32.050799] Write of size 1 at addr ffff000080e358f0 by task kunit_try_catch/254
[   32.058300] 
[   32.059841] CPU: 2 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.059869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.059878] Hardware name: Thundercomm Dragonboard 845c (DT)
[   32.059888] Call trace:
[   32.059895]  show_stack+0x20/0x38 (C)
[   32.059914]  dump_stack_lvl+0x8c/0xd0
[   32.059934]  print_report+0x118/0x608
[   32.059953]  kasan_report+0xdc/0x128
[   32.059972]  __asan_report_store1_noabort+0x20/0x30
[   32.059990]  krealloc_more_oob_helper+0x5c0/0x678
[   32.060010]  krealloc_more_oob+0x20/0x38
[   32.060027]  kunit_try_run_case+0x170/0x3f0
[   32.060046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.060068]  kthread+0x328/0x630
[   32.060083]  ret_from_fork+0x10/0x20
[   32.060100] 
[   32.130377] Allocated by task 254:
[   32.133838]  kasan_save_stack+0x3c/0x68
[   32.137749]  kasan_save_track+0x20/0x40
[   32.141661]  kasan_save_alloc_info+0x40/0x58
[   32.146000]  __kasan_krealloc+0x118/0x178
[   32.150084]  krealloc_noprof+0x128/0x360
[   32.154083]  krealloc_more_oob_helper+0x168/0x678
[   32.158867]  krealloc_more_oob+0x20/0x38
[   32.162862]  kunit_try_run_case+0x170/0x3f0
[   32.167114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.172686]  kthread+0x328/0x630
[   32.175979]  ret_from_fork+0x10/0x20
[   32.179619] 
[   32.181149] The buggy address belongs to the object at ffff000080e35800
[   32.181149]  which belongs to the cache kmalloc-256 of size 256
[   32.193805] The buggy address is located 5 bytes to the right of
[   32.193805]  allocated 235-byte region [ffff000080e35800, ffff000080e358eb)
[   32.206905] 
[   32.208441] The buggy address belongs to the physical page:
[   32.214092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e34
[   32.222197] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.229957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.237014] page_type: f5(slab)
[   32.240220] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   32.248067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.255914] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   32.263847] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.271781] head: 0bfffe0000000002 fffffdffc2038d01 00000000ffffffff 00000000ffffffff
[   32.279714] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.287644] page dumped because: kasan: bad access detected
[   32.293292] 
[   32.294822] Memory state around the buggy address:
[   32.299682]  ffff000080e35780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.307000]  ffff000080e35800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.314317] >ffff000080e35880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.321630]                                                              ^
[   32.328597]  ffff000080e35900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.335913]  ffff000080e35980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.343229] ==================================================================
[   31.717342] ==================================================================
[   31.728285] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   31.735963] Write of size 1 at addr ffff000080e358eb by task kunit_try_catch/254
[   31.743457] 
[   31.744989] CPU: 2 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   31.745017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.745027] Hardware name: Thundercomm Dragonboard 845c (DT)
[   31.745039] Call trace:
[   31.745046]  show_stack+0x20/0x38 (C)
[   31.745066]  dump_stack_lvl+0x8c/0xd0
[   31.745088]  print_report+0x118/0x608
[   31.745108]  kasan_report+0xdc/0x128
[   31.745126]  __asan_report_store1_noabort+0x20/0x30
[   31.745144]  krealloc_more_oob_helper+0x60c/0x678
[   31.745164]  krealloc_more_oob+0x20/0x38
[   31.745181]  kunit_try_run_case+0x170/0x3f0
[   31.745200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.745221]  kthread+0x328/0x630
[   31.745238]  ret_from_fork+0x10/0x20
[   31.745256] 
[   31.815540] Allocated by task 254:
[   31.819002]  kasan_save_stack+0x3c/0x68
[   31.822903]  kasan_save_track+0x20/0x40
[   31.826803]  kasan_save_alloc_info+0x40/0x58
[   31.831141]  __kasan_krealloc+0x118/0x178
[   31.835225]  krealloc_noprof+0x128/0x360
[   31.839225]  krealloc_more_oob_helper+0x168/0x678
[   31.844007]  krealloc_more_oob+0x20/0x38
[   31.848004]  kunit_try_run_case+0x170/0x3f0
[   31.852259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.857834]  kthread+0x328/0x630
[   31.861126]  ret_from_fork+0x10/0x20
[   31.864766] 
[   31.866297] The buggy address belongs to the object at ffff000080e35800
[   31.866297]  which belongs to the cache kmalloc-256 of size 256
[   31.878954] The buggy address is located 0 bytes to the right of
[   31.878954]  allocated 235-byte region [ffff000080e35800, ffff000080e358eb)
[   31.892052] 
[   31.893583] The buggy address belongs to the physical page:
[   31.899232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e34
[   31.907339] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.915098] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.922158] page_type: f5(slab)
[   31.925364] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   31.933212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.941059] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   31.948992] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.956925] head: 0bfffe0000000002 fffffdffc2038d01 00000000ffffffff 00000000ffffffff
[   31.964858] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.972788] page dumped because: kasan: bad access detected
[   31.978438] 
[   31.979974] Memory state around the buggy address:
[   31.984840]  ffff000080e35780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.992156]  ffff000080e35800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.999474] >ffff000080e35880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.006788]                                                           ^
[   32.013495]  ffff000080e35900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.020811]  ffff000080e35980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.028124] ==================================================================
[   34.172752] ==================================================================
[   34.180075] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   34.187750] Write of size 1 at addr ffff00008641a0f0 by task kunit_try_catch/258
[   34.195241] 
[   34.196769] CPU: 3 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   34.196798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.196806] Hardware name: Thundercomm Dragonboard 845c (DT)
[   34.196818] Call trace:
[   34.196825]  show_stack+0x20/0x38 (C)
[   34.196844]  dump_stack_lvl+0x8c/0xd0
[   34.196862]  print_report+0x118/0x608
[   34.196881]  kasan_report+0xdc/0x128
[   34.196900]  __asan_report_store1_noabort+0x20/0x30
[   34.196918]  krealloc_more_oob_helper+0x5c0/0x678
[   34.196938]  krealloc_large_more_oob+0x20/0x38
[   34.196957]  kunit_try_run_case+0x170/0x3f0
[   34.196977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.196999]  kthread+0x328/0x630
[   34.197014]  ret_from_fork+0x10/0x20
[   34.197032] 
[   34.267835] The buggy address belongs to the physical page:
[   34.273486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418
[   34.281600] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.289355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.296412] page_type: f8(unknown)
[   34.299875] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.307721] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.315568] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.323499] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.331430] head: 0bfffe0000000002 fffffdffc2190601 00000000ffffffff 00000000ffffffff
[   34.339362] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.347290] page dumped because: kasan: bad access detected
[   34.352938] 
[   34.354468] Memory state around the buggy address:
[   34.359327]  ffff000086419f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.366640]  ffff00008641a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.373955] >ffff00008641a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   34.381266]                                                              ^
[   34.388231]  ffff00008641a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.395547]  ffff00008641a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.402862] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   31.269289] ==================================================================
[   31.280409] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   31.285892] Free of addr ffff000086418001 by task kunit_try_catch/248
[   31.292418] 
[   31.293952] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   31.293981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.293990] Hardware name: Thundercomm Dragonboard 845c (DT)
[   31.294002] Call trace:
[   31.294009]  show_stack+0x20/0x38 (C)
[   31.294028]  dump_stack_lvl+0x8c/0xd0
[   31.294050]  print_report+0x118/0x608
[   31.294069]  kasan_report_invalid_free+0xc0/0xe8
[   31.294091]  __kasan_kfree_large+0x5c/0xa8
[   31.294111]  free_large_kmalloc+0x68/0x150
[   31.294129]  kfree+0x270/0x3c8
[   31.294145]  kmalloc_large_invalid_free+0x108/0x270
[   31.294163]  kunit_try_run_case+0x170/0x3f0
[   31.294182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.294205]  kthread+0x328/0x630
[   31.294220]  ret_from_fork+0x10/0x20
[   31.294237] 
[   31.368222] The buggy address belongs to the physical page:
[   31.373868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418
[   31.381973] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.389731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.396788] page_type: f8(unknown)
[   31.400258] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.408105] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.415951] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.423883] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.431815] head: 0bfffe0000000002 fffffdffc2190601 00000000ffffffff 00000000ffffffff
[   31.439748] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.447675] page dumped because: kasan: bad access detected
[   31.453320] 
[   31.454850] Memory state around the buggy address:
[   31.459709]  ffff000086417f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.467023]  ffff000086417f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.474338] >ffff000086418000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.481650]                    ^
[   31.484933]  ffff000086418080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.492247]  ffff000086418100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.499559] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   31.076215] ==================================================================
[   31.087866] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   31.094570] Read of size 1 at addr ffff000086418000 by task kunit_try_catch/246
[   31.101977] 
[   31.103509] CPU: 3 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   31.103538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.103546] Hardware name: Thundercomm Dragonboard 845c (DT)
[   31.103556] Call trace:
[   31.103562]  show_stack+0x20/0x38 (C)
[   31.103580]  dump_stack_lvl+0x8c/0xd0
[   31.103602]  print_report+0x118/0x608
[   31.103621]  kasan_report+0xdc/0x128
[   31.103640]  __asan_report_load1_noabort+0x20/0x30
[   31.103658]  kmalloc_large_uaf+0x2cc/0x2f8
[   31.103675]  kunit_try_run_case+0x170/0x3f0
[   31.103693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.103714]  kthread+0x328/0x630
[   31.103728]  ret_from_fork+0x10/0x20
[   31.103747] 
[   31.169347] The buggy address belongs to the physical page:
[   31.174996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418
[   31.183108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.189736] raw: 0bfffe0000000000 fffffdffc2190808 ffff0000dae08c40 0000000000000000
[   31.197579] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   31.205417] page dumped because: kasan: bad access detected
[   31.211062] 
[   31.212598] Memory state around the buggy address:
[   31.217459]  ffff000086417f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.224781]  ffff000086417f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.232103] >ffff000086418000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.239416]                    ^
[   31.242705]  ffff000086418080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.250027]  ffff000086418100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.257344] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   30.838558] ==================================================================
[   30.850029] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   30.857613] Write of size 1 at addr ffff00009561200a by task kunit_try_catch/244
[   30.865104] 
[   30.866634] CPU: 4 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   30.866664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.866672] Hardware name: Thundercomm Dragonboard 845c (DT)
[   30.866683] Call trace:
[   30.866688]  show_stack+0x20/0x38 (C)
[   30.866706]  dump_stack_lvl+0x8c/0xd0
[   30.866725]  print_report+0x118/0x608
[   30.866744]  kasan_report+0xdc/0x128
[   30.866762]  __asan_report_store1_noabort+0x20/0x30
[   30.866779]  kmalloc_large_oob_right+0x278/0x2b8
[   30.866797]  kunit_try_run_case+0x170/0x3f0
[   30.866814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.866833]  kthread+0x328/0x630
[   30.866846]  ret_from_fork+0x10/0x20
[   30.866863] 
[   30.933050] The buggy address belongs to the physical page:
[   30.938693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115610
[   30.946794] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.954556] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.961607] page_type: f8(unknown)
[   30.965068] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.972908] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.980746] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.988669] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.996591] head: 0bfffe0000000002 fffffdffc2558401 00000000ffffffff 00000000ffffffff
[   31.004514] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.012434] page dumped because: kasan: bad access detected
[   31.018075] 
[   31.019605] Memory state around the buggy address:
[   31.024458]  ffff000095611f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.031771]  ffff000095611f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.039076] >ffff000095612000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.046387]                       ^
[   31.049926]  ffff000095612080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.057240]  ffff000095612100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.064550] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   30.526229] ==================================================================
[   30.538850] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   30.546259] Write of size 1 at addr ffff0000956ddf00 by task kunit_try_catch/242
[   30.553754] 
[   30.555286] CPU: 3 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   30.555315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.555325] Hardware name: Thundercomm Dragonboard 845c (DT)
[   30.555337] Call trace:
[   30.555344]  show_stack+0x20/0x38 (C)
[   30.555362]  dump_stack_lvl+0x8c/0xd0
[   30.555383]  print_report+0x118/0x608
[   30.555404]  kasan_report+0xdc/0x128
[   30.555423]  __asan_report_store1_noabort+0x20/0x30
[   30.555441]  kmalloc_big_oob_right+0x2a4/0x2f0
[   30.555459]  kunit_try_run_case+0x170/0x3f0
[   30.555478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.555498]  kthread+0x328/0x630
[   30.555514]  ret_from_fork+0x10/0x20
[   30.555532] 
[   30.621591] Allocated by task 242:
[   30.625047]  kasan_save_stack+0x3c/0x68
[   30.628955]  kasan_save_track+0x20/0x40
[   30.632864]  kasan_save_alloc_info+0x40/0x58
[   30.637201]  __kasan_kmalloc+0xd4/0xd8
[   30.641022]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.645632]  kmalloc_big_oob_right+0xb8/0x2f0
[   30.650067]  kunit_try_run_case+0x170/0x3f0
[   30.654318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.659894]  kthread+0x328/0x630
[   30.663188]  ret_from_fork+0x10/0x20
[   30.666827] 
[   30.668359] The buggy address belongs to the object at ffff0000956dc000
[   30.668359]  which belongs to the cache kmalloc-8k of size 8192
[   30.681017] The buggy address is located 0 bytes to the right of
[   30.681017]  allocated 7936-byte region [ffff0000956dc000, ffff0000956ddf00)
[   30.694206] 
[   30.695742] The buggy address belongs to the physical page:
[   30.701386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1156d8
[   30.709498] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.717251] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.724314] page_type: f5(slab)
[   30.727522] raw: 0bfffe0000000040 ffff000080003180 dead000000000122 0000000000000000
[   30.735364] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.743206] head: 0bfffe0000000040 ffff000080003180 dead000000000122 0000000000000000
[   30.751143] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.759081] head: 0bfffe0000000003 fffffdffc255b601 00000000ffffffff 00000000ffffffff
[   30.767020] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.774942] page dumped because: kasan: bad access detected
[   30.780594] 
[   30.782123] Memory state around the buggy address:
[   30.786983]  ffff0000956dde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.794304]  ffff0000956dde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.801622] >ffff0000956ddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.808941]                    ^
[   30.812226]  ffff0000956ddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.819540]  ffff0000956de000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.826860] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   30.042783] ==================================================================
[   30.054353] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   30.062554] Write of size 1 at addr ffff0000822c2478 by task kunit_try_catch/240
[   30.070048] 
[   30.071591] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   30.071621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.071629] Hardware name: Thundercomm Dragonboard 845c (DT)
[   30.071639] Call trace:
[   30.071645]  show_stack+0x20/0x38 (C)
[   30.071663]  dump_stack_lvl+0x8c/0xd0
[   30.071683]  print_report+0x118/0x608
[   30.071702]  kasan_report+0xdc/0x128
[   30.071720]  __asan_report_store1_noabort+0x20/0x30
[   30.071737]  kmalloc_track_caller_oob_right+0x40c/0x488
[   30.071756]  kunit_try_run_case+0x170/0x3f0
[   30.071775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.071796]  kthread+0x328/0x630
[   30.071810]  ret_from_fork+0x10/0x20
[   30.071828] 
[   30.138667] Allocated by task 240:
[   30.142126]  kasan_save_stack+0x3c/0x68
[   30.146036]  kasan_save_track+0x20/0x40
[   30.149945]  kasan_save_alloc_info+0x40/0x58
[   30.154283]  __kasan_kmalloc+0xd4/0xd8
[   30.158103]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.163760]  kmalloc_track_caller_oob_right+0xa8/0x488
[   30.168983]  kunit_try_run_case+0x170/0x3f0
[   30.173236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.178809]  kthread+0x328/0x630
[   30.182094]  ret_from_fork+0x10/0x20
[   30.185731] 
[   30.187260] The buggy address belongs to the object at ffff0000822c2400
[   30.187260]  which belongs to the cache kmalloc-128 of size 128
[   30.199916] The buggy address is located 0 bytes to the right of
[   30.199916]  allocated 120-byte region [ffff0000822c2400, ffff0000822c2478)
[   30.213019] 
[   30.214549] The buggy address belongs to the physical page:
[   30.220202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   30.228316] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.236071] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.243132] page_type: f5(slab)
[   30.246334] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   30.254178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.262021] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   30.269959] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.277889] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   30.285828] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.293752] page dumped because: kasan: bad access detected
[   30.299400] 
[   30.300933] Memory state around the buggy address:
[   30.305795]  ffff0000822c2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.313116]  ffff0000822c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.320437] >ffff0000822c2400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.327751]                                                                 ^
[   30.334977]  ffff0000822c2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.342299]  ffff0000822c2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.349619] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   29.731623] ==================================================================
[   29.742663] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   29.750163] Read of size 1 at addr ffff0000956f9000 by task kunit_try_catch/238
[   29.757576] 
[   29.759113] CPU: 3 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   29.759144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.759152] Hardware name: Thundercomm Dragonboard 845c (DT)
[   29.759164] Call trace:
[   29.759172]  show_stack+0x20/0x38 (C)
[   29.759190]  dump_stack_lvl+0x8c/0xd0
[   29.759211]  print_report+0x118/0x608
[   29.759231]  kasan_report+0xdc/0x128
[   29.759250]  __asan_report_load1_noabort+0x20/0x30
[   29.759268]  kmalloc_node_oob_right+0x2f4/0x330
[   29.759289]  kunit_try_run_case+0x170/0x3f0
[   29.759309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.759331]  kthread+0x328/0x630
[   29.759347]  ret_from_fork+0x10/0x20
[   29.759365] 
[   29.825388] Allocated by task 238:
[   29.828847]  kasan_save_stack+0x3c/0x68
[   29.832757]  kasan_save_track+0x20/0x40
[   29.836667]  kasan_save_alloc_info+0x40/0x58
[   29.841005]  __kasan_kmalloc+0xd4/0xd8
[   29.844828]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   29.849872]  kmalloc_node_oob_right+0xbc/0x330
[   29.854388]  kunit_try_run_case+0x170/0x3f0
[   29.858642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.864209]  kthread+0x328/0x630
[   29.867494]  ret_from_fork+0x10/0x20
[   29.871140] 
[   29.872674] The buggy address belongs to the object at ffff0000956f8000
[   29.872674]  which belongs to the cache kmalloc-4k of size 4096
[   29.885338] The buggy address is located 0 bytes to the right of
[   29.885338]  allocated 4096-byte region [ffff0000956f8000, ffff0000956f9000)
[   29.898521] 
[   29.900058] The buggy address belongs to the physical page:
[   29.905707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1156f8
[   29.913822] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.921579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.928634] page_type: f5(slab)
[   29.931840] raw: 0bfffe0000000040 ffff000080003040 dead000000000122 0000000000000000
[   29.939686] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.947530] head: 0bfffe0000000040 ffff000080003040 dead000000000122 0000000000000000
[   29.955462] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.963393] head: 0bfffe0000000003 fffffdffc255be01 00000000ffffffff 00000000ffffffff
[   29.971323] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   29.979255] page dumped because: kasan: bad access detected
[   29.984909] 
[   29.986439] Memory state around the buggy address:
[   29.991302]  ffff0000956f8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.998625]  ffff0000956f8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.005947] >ffff0000956f9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.013269]                    ^
[   30.016556]  ffff0000956f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.023870]  ffff0000956f9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.031185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   29.307632] ==================================================================
[   29.318756] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.325727] Read of size 1 at addr ffff000080a5511f by task kunit_try_catch/236
[   29.333137] 
[   29.334674] CPU: 2 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   29.334706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.334715] Hardware name: Thundercomm Dragonboard 845c (DT)
[   29.334728] Call trace:
[   29.334735]  show_stack+0x20/0x38 (C)
[   29.334754]  dump_stack_lvl+0x8c/0xd0
[   29.334775]  print_report+0x118/0x608
[   29.334796]  kasan_report+0xdc/0x128
[   29.334814]  __asan_report_load1_noabort+0x20/0x30
[   29.334831]  kmalloc_oob_left+0x2ec/0x320
[   29.334849]  kunit_try_run_case+0x170/0x3f0
[   29.334869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.334890]  kthread+0x328/0x630
[   29.334905]  ret_from_fork+0x10/0x20
[   29.334922] 
[   29.400476] Allocated by task 67:
[   29.403850]  kasan_save_stack+0x3c/0x68
[   29.407760]  kasan_save_track+0x20/0x40
[   29.411670]  kasan_save_alloc_info+0x40/0x58
[   29.416005]  __kasan_kmalloc+0xd4/0xd8
[   29.419826]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.425484]  kvasprintf+0xe0/0x180
[   29.428951]  kasprintf+0xd0/0x110
[   29.432327]  pinctrl_dt_to_map+0x118/0x778
[   29.436499]  create_pinctrl+0x120/0xb60
[   29.440408]  pinctrl_get+0xf4/0x1d0
[   29.443957]  devm_pinctrl_get+0x54/0xc8
[   29.447865]  pinctrl_bind_pins+0xa4/0x6e0
[   29.451951]  really_probe+0x94/0x7f0
[   29.455590]  __driver_probe_device+0x164/0x378
[   29.460110]  driver_probe_device+0x64/0x180
[   29.464360]  __device_attach_driver+0x174/0x280
[   29.468969]  bus_for_each_drv+0x118/0x1b0
[   29.473054]  __device_attach+0x174/0x378
[   29.477047]  device_initial_probe+0x1c/0x30
[   29.481297]  bus_probe_device+0x12c/0x170
[   29.485381]  deferred_probe_work_func+0x140/0x208
[   29.490161]  process_one_work+0x530/0xf98
[   29.494245]  worker_thread+0x618/0xf38
[   29.498064]  kthread+0x328/0x630
[   29.501354]  ret_from_fork+0x10/0x20
[   29.504991] 
[   29.506521] Freed by task 67:
[   29.509547]  kasan_save_stack+0x3c/0x68
[   29.513455]  kasan_save_track+0x20/0x40
[   29.517365]  kasan_save_free_info+0x4c/0x78
[   29.521615]  __kasan_slab_free+0x6c/0x98
[   29.525612]  kfree+0x214/0x3c8
[   29.528729]  pinctrl_dt_to_map+0x144/0x778
[   29.532898]  create_pinctrl+0x120/0xb60
[   29.536805]  pinctrl_get+0xf4/0x1d0
[   29.540356]  devm_pinctrl_get+0x54/0xc8
[   29.544262]  pinctrl_bind_pins+0xa4/0x6e0
[   29.548346]  really_probe+0x94/0x7f0
[   29.551982]  __driver_probe_device+0x164/0x378
[   29.556501]  driver_probe_device+0x64/0x180
[   29.560752]  __device_attach_driver+0x174/0x280
[   29.565361]  bus_for_each_drv+0x118/0x1b0
[   29.569444]  __device_attach+0x174/0x378
[   29.573439]  device_initial_probe+0x1c/0x30
[   29.577690]  bus_probe_device+0x12c/0x170
[   29.581772]  deferred_probe_work_func+0x140/0x208
[   29.586553]  process_one_work+0x530/0xf98
[   29.590633]  worker_thread+0x618/0xf38
[   29.594451]  kthread+0x328/0x630
[   29.597741]  ret_from_fork+0x10/0x20
[   29.601378] 
[   29.602908] The buggy address belongs to the object at ffff000080a55100
[   29.602908]  which belongs to the cache kmalloc-16 of size 16
[   29.615393] The buggy address is located 15 bytes to the right of
[   29.615393]  allocated 16-byte region [ffff000080a55100, ffff000080a55110)
[   29.628495] 
[   29.630026] The buggy address belongs to the physical page:
[   29.635670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a55
[   29.643780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.650396] page_type: f5(slab)
[   29.653600] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   29.661451] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.669290] page dumped because: kasan: bad access detected
[   29.674938] 
[   29.676472] Memory state around the buggy address:
[   29.681333]  ffff000080a55000: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.688654]  ffff000080a55080: 00 06 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc
[   29.695976] >ffff000080a55100: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   29.703288]                             ^
[   29.707363]  ffff000080a55180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.714679]  ffff000080a55200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.721998] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   28.697928] ==================================================================
[   28.705250] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   28.712318] Write of size 1 at addr ffff0000822c2378 by task kunit_try_catch/234
[   28.719812] 
[   28.721350] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   28.721386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.721396] Hardware name: Thundercomm Dragonboard 845c (DT)
[   28.721409] Call trace:
[   28.721417]  show_stack+0x20/0x38 (C)
[   28.721440]  dump_stack_lvl+0x8c/0xd0
[   28.721462]  print_report+0x118/0x608
[   28.721484]  kasan_report+0xdc/0x128
[   28.721504]  __asan_report_store1_noabort+0x20/0x30
[   28.721523]  kmalloc_oob_right+0x538/0x660
[   28.721541]  kunit_try_run_case+0x170/0x3f0
[   28.721563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.721585]  kthread+0x328/0x630
[   28.721602]  ret_from_fork+0x10/0x20
[   28.721622] 
[   28.787320] Allocated by task 234:
[   28.790777]  kasan_save_stack+0x3c/0x68
[   28.794687]  kasan_save_track+0x20/0x40
[   28.798593]  kasan_save_alloc_info+0x40/0x58
[   28.802941]  __kasan_kmalloc+0xd4/0xd8
[   28.806760]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.811370]  kmalloc_oob_right+0xb0/0x660
[   28.815445]  kunit_try_run_case+0x170/0x3f0
[   28.819705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.825280]  kthread+0x328/0x630
[   28.828567]  ret_from_fork+0x10/0x20
[   28.832213] 
[   28.833744] The buggy address belongs to the object at ffff0000822c2300
[   28.833744]  which belongs to the cache kmalloc-128 of size 128
[   28.846409] The buggy address is located 5 bytes to the right of
[   28.846409]  allocated 115-byte region [ffff0000822c2300, ffff0000822c2373)
[   28.859507] 
[   28.861042] The buggy address belongs to the physical page:
[   28.866691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   28.874802] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.882565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.889631] page_type: f5(slab)
[   28.892834] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   28.900685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.908533] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   28.916469] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.924403] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   28.932339] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.940272] page dumped because: kasan: bad access detected
[   28.945920] 
[   28.947457] Memory state around the buggy address:
[   28.952323]  ffff0000822c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.959643]  ffff0000822c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.966963] >ffff0000822c2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.974279]                                                                 ^
[   28.981507]  ffff0000822c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.988825]  ffff0000822c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.996142] ==================================================================
[   29.003798] ==================================================================
[   29.011125] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.018178] Read of size 1 at addr ffff0000822c2380 by task kunit_try_catch/234
[   29.025584] 
[   29.027124] CPU: 5 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   29.027155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.027163] Hardware name: Thundercomm Dragonboard 845c (DT)
[   29.027174] Call trace:
[   29.027180]  show_stack+0x20/0x38 (C)
[   29.027198]  dump_stack_lvl+0x8c/0xd0
[   29.027216]  print_report+0x118/0x608
[   29.027234]  kasan_report+0xdc/0x128
[   29.027251]  __asan_report_load1_noabort+0x20/0x30
[   29.027267]  kmalloc_oob_right+0x5d0/0x660
[   29.027282]  kunit_try_run_case+0x170/0x3f0
[   29.027300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.027319]  kthread+0x328/0x630
[   29.027332]  ret_from_fork+0x10/0x20
[   29.027349] 
[   29.092922] Allocated by task 234:
[   29.096375]  kasan_save_stack+0x3c/0x68
[   29.100280]  kasan_save_track+0x20/0x40
[   29.104185]  kasan_save_alloc_info+0x40/0x58
[   29.108518]  __kasan_kmalloc+0xd4/0xd8
[   29.112333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.116931]  kmalloc_oob_right+0xb0/0x660
[   29.121005]  kunit_try_run_case+0x170/0x3f0
[   29.125252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.130817]  kthread+0x328/0x630
[   29.134097]  ret_from_fork+0x10/0x20
[   29.137739] 
[   29.139269] The buggy address belongs to the object at ffff0000822c2300
[   29.139269]  which belongs to the cache kmalloc-128 of size 128
[   29.151917] The buggy address is located 13 bytes to the right of
[   29.151917]  allocated 115-byte region [ffff0000822c2300, ffff0000822c2373)
[   29.165101] 
[   29.166624] The buggy address belongs to the physical page:
[   29.172274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   29.180375] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.188126] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.195177] page_type: f5(slab)
[   29.198375] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   29.206214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.214052] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   29.221975] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.229898] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   29.237820] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.245741] page dumped because: kasan: bad access detected
[   29.251378] 
[   29.252909] Memory state around the buggy address:
[   29.257760]  ffff0000822c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.265073]  ffff0000822c2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.272386] >ffff0000822c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.279697]                    ^
[   29.282980]  ffff0000822c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.290292]  ffff0000822c2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.297603] ==================================================================
[   28.388246] ==================================================================
[   28.395592] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   28.402664] Write of size 1 at addr ffff0000822c2373 by task kunit_try_catch/234
[   28.410164] 
[   28.411709] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   28.411746] Tainted: [N]=TEST
[   28.411753] Hardware name: Thundercomm Dragonboard 845c (DT)
[   28.411770] Call trace:
[   28.411779]  show_stack+0x20/0x38 (C)
[   28.411804]  dump_stack_lvl+0x8c/0xd0
[   28.411828]  print_report+0x118/0x608
[   28.411851]  kasan_report+0xdc/0x128
[   28.411870]  __asan_report_store1_noabort+0x20/0x30
[   28.411890]  kmalloc_oob_right+0x5a4/0x660
[   28.411907]  kunit_try_run_case+0x170/0x3f0
[   28.411931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.411956]  kthread+0x328/0x630
[   28.411976]  ret_from_fork+0x10/0x20
[   28.411999] 
[   28.476483] Allocated by task 234:
[   28.479952]  kasan_save_stack+0x3c/0x68
[   28.483859]  kasan_save_track+0x20/0x40
[   28.487763]  kasan_save_alloc_info+0x40/0x58
[   28.492107]  __kasan_kmalloc+0xd4/0xd8
[   28.495925]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.500536]  kmalloc_oob_right+0xb0/0x660
[   28.504612]  kunit_try_run_case+0x170/0x3f0
[   28.508871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.514439]  kthread+0x328/0x630
[   28.517726]  ret_from_fork+0x10/0x20
[   28.521370] 
[   28.522901] The buggy address belongs to the object at ffff0000822c2300
[   28.522901]  which belongs to the cache kmalloc-128 of size 128
[   28.535564] The buggy address is located 0 bytes to the right of
[   28.535564]  allocated 115-byte region [ffff0000822c2300, ffff0000822c2373)
[   28.548670] 
[   28.550202] The buggy address belongs to the physical page:
[   28.555850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   28.563957] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.571718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.578783] page_type: f5(slab)
[   28.581987] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   28.589834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.597681] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   28.605614] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.613546] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   28.621479] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.629408] page dumped because: kasan: bad access detected
[   28.635054] 
[   28.636583] Memory state around the buggy address:
[   28.641445]  ffff0000822c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.648759]  ffff0000822c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.656073] >ffff0000822c2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.663385]                                                              ^
[   28.670351]  ffff0000822c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.677667]  ffff0000822c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.684979] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  124.670015] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#3: kunit_try_catch/757
[  124.678665] Modules linked in:
[  124.681796] CPU: 3 UID: 0 PID: 757 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[  124.693073] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  124.698990] Hardware name: Thundercomm Dragonboard 845c (DT)
[  124.704729] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  124.711782] pc : intlog10+0x38/0x48
[  124.715333] lr : intlog10_test+0xe4/0x200
[  124.719411] sp : ffff800086797c10
[  124.722783] x29: ffff800086797c90 x28: 0000000000000000 x27: 0000000000000000
[  124.730038] x26: 1fffe00011060a61 x25: 0000000000000000 x24: ffff800086797ce0
[  124.737289] x23: ffff800086797d00 x22: 0000000000000000 x21: 1ffff00010cf2f82
[  124.744539] x20: ffffae1d601fcae0 x19: ffff8000800a7990 x18: 000000003fb74825
[  124.751782] x17: 000000040044ffff x16: 005000f2b5503510 x15: 0000000000000000
[  124.759026] x14: ffff0000808ebcc0 x13: 1fffe0001b5c0989 x12: ffff75c3ac812189
[  124.766277] x11: 1ffff5c3ac812188 x10: ffff75c3ac812188 x9 : ffffae1d5d83dbe4
[  124.773530] x8 : ffffae1d64090c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  124.780780] x5 : ffff700010cf2f82 x4 : 1ffff00010014f3a x3 : 1ffff5c3ac03f95c
[  124.788031] x2 : 1ffff5c3ac03f95c x1 : 0000000000000003 x0 : 0000000000000000
[  124.795275] Call trace:
[  124.797776]  intlog10+0x38/0x48 (P)
[  124.801340]  kunit_try_run_case+0x170/0x3f0
[  124.805598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  124.811170]  kthread+0x328/0x630
[  124.814469]  ret_from_fork+0x10/0x20
[  124.818125] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  124.443281] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#5: kunit_try_catch/739
[  124.451749] Modules linked in:
[  124.454878] CPU: 5 UID: 0 PID: 739 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[  124.466147] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  124.471177] Hardware name: Thundercomm Dragonboard 845c (DT)
[  124.476904] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  124.483955] pc : intlog2+0xd8/0xf8
[  124.487412] lr : intlog2_test+0xe4/0x200
[  124.491398] sp : ffff800086677c10
[  124.494765] x29: ffff800086677c90 x28: 0000000000000000 x27: 0000000000000000
[  124.502007] x26: 1fffe0001105fd21 x25: 0000000000000000 x24: ffff800086677ce0
[  124.509246] x23: ffff800086677d00 x22: 0000000000000000 x21: 1ffff00010ccef82
[  124.516483] x20: ffffae1d601fc9e0 x19: ffff8000800a7990 x18: 00000000458fdea4
[  124.523721] x17: 000000040044ffff x16: 005000f4b5503510 x15: 0000000000000000
[  124.530965] x14: ffff0000808ee540 x13: 1fffe0001b5c9189 x12: ffff75c3ac812189
[  124.538202] x11: 1ffff5c3ac812188 x10: ffff75c3ac812188 x9 : ffffae1d5d83dde4
[  124.545440] x8 : ffffae1d64090c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  124.552677] x5 : ffff700010ccef82 x4 : 1ffff00010014f3a x3 : 1ffff5c3ac03f93c
[  124.559913] x2 : 1ffff5c3ac03f93c x1 : 0000000000000003 x0 : 0000000000000000
[  124.567152] Call trace:
[  124.569648]  intlog2+0xd8/0xf8 (P)
[  124.573117]  kunit_try_run_case+0x170/0x3f0
[  124.577370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  124.582934]  kthread+0x328/0x630
[  124.586219]  ret_from_fork+0x10/0x20
[  124.589864] ---[ end trace 0000000000000000 ]---
Failure - lava - job
(no logs available)
Failure - lava - fastboot-boot
(no logs available)